1
|
Zhao T, Li M, Zhao Y, Song P. UV communication cooperative formation UAV alliance capture algorithm. APPLIED OPTICS 2024; 63:1495-1505. [PMID: 38437361 DOI: 10.1364/ao.515698] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/12/2023] [Accepted: 01/22/2024] [Indexed: 03/06/2024]
Abstract
The capture of target unmanned aerial vehicles (UAVs) by a UAV formation is one of the important and typical tasks in multi-UAV battlefield operations. In this paper, an ultraviolet (UV) light communication-assisted formation UAV alliance capture algorithm is proposed, which combines UV light communication technology with a capture algorithm. With the help of wireless UV light to assist UAV formation inter-UAV data confidentiality transmission and non-line-of-sight communication, the algorithm integrates the alliance generation algorithm with the region minimization strategy, solves the optimal alliance structure by using the dynamic programming method, and implements the aerial capture of the target UAVs by using the region minimization strategy, so as to complete the task of efficiently capturing multi-targets by the UAV formation in complex scenarios. Simulation comparisons were conducted between the region minimization strategy and the proposed UV communication-assisted formation UAV alliance capture algorithm. The results show that the proposed algorithm reduces energy consumption by 12.73% on average and decreases the average number of algorithm iterations by 27.49% during the UAV formation capture of multiple targets, which verifies its low energy consumption and high capture efficiency.
Collapse
|
2
|
Zhang R, Zong Q, Zhang X, Dou L, Tian B. Game of Drones: Multi-UAV Pursuit-Evasion Game With Online Motion Planning by Deep Reinforcement Learning. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023; 34:7900-7909. [PMID: 35157597 DOI: 10.1109/tnnls.2022.3146976] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
As one of the tiniest flying objects, unmanned aerial vehicles (UAVs) are often expanded as the "swarm" to execute missions. In this article, we investigate the multiquadcopter and target pursuit-evasion game in the obstacles environment. For high-quality simulation of the urban environment, we propose the pursuit-evasion scenario (PES) framework to create the environment with a physics engine, which enables quadcopter agents to take actions and interact with the environment. On this basis, we construct multiagent coronal bidirectionally coordinated with target prediction network (CBC-TP Net) with a vectorized extension of multiagent deep deterministic policy gradient (MADDPG) formulation to ensure the effectiveness of the damaged "swarm" system in pursuit-evasion mission. Unlike traditional reinforcement learning, we design a target prediction network (TP Net) innovatively in the common framework to imitate the way of human thinking: situation prediction is always before decision-making. The experiments of the pursuit-evasion game are conducted to verify the state-of-the-art performance of the proposed strategy, both in the normal and antidamaged situations.
Collapse
|
3
|
Tian B, Li P, Lu H, Zong Q, He L. Distributed Pursuit of an Evader With Collision and Obstacle Avoidance. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:13512-13520. [PMID: 34653011 DOI: 10.1109/tcyb.2021.3112572] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
The distributed, real-time algorithms for multiple pursuers cooperating to capture an evader are developed in an obstacle-free and an obstacle-cluttered environment, respectively. The developed algorithm is based on the idea of planning the control action within its safe, collision-free region for each robot. We initially present a greedy capturing strategy for an obstacle-free environment based on the Buffered Voronoi Cell (BVC). For an environment with obstacles, the obstacle-aware BVC (OABVC) is defined as the safe region, which considers the physical radius of each robot, and dynamically weights the Voronoi boundary between robot and obstacle to make it tangent to the obstacle. Each robot continually computes its safe cells and plans its control actions in a recursion fashion. In both cases, the pursuers successfully capture the evader with only relative positions of neighboring robots. A rigorous proof is provided to ensure the collision and obstacle avoidance during the pursuit-evasion games. Simulation results are presented to demonstrate the efficiency of the developed algorithms.
Collapse
|
4
|
Yan R, Shi Z, Zhong Y. Guarding a Subspace in High-Dimensional Space With Two Defenders and One Attacker. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:3998-4011. [PMID: 32881703 DOI: 10.1109/tcyb.2020.3015031] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article considers a subspace guarding game in high-dimensional space which consists of a play subspace and a target subspace. Two faster defenders as a team cooperate to protect the target subspace by capturing an attacker which strives to enter the target subspace from the play subspace without being captured. A closed-form solution is provided from the perspectives of kind and degree. Contributions of the work include the use of the attack subspace (AS) method to construct the barrier, by which the game winner can be perfectly predicted before the game starts. In addition to this inclusion, with the priori information about the game result, a critical payoff function is designed when the defenders can win the game. Then, the optimal strategy for each player is explicitly reformulated as a saddle-point equilibrium. Finally, we apply these theoretical results to two half-space and half-plane guarding games in 3-D space and 2-D plane, respectively. Since the entire achieved developments are analytical, they require a little memory without the computational burden and allow for real-time updates, beyond the capacity of the traditional Hamilton-Jacobi-Isaacs method. It is worth noting that this is the first time in the current work to consider the target guarding games for arbitrary high-dimensional space and in a fully analytical form.
Collapse
|
5
|
Zhang L, Prorok A, Bhattacharya S. Pursuer Assignment and Control Strategies in Multi-Agent Pursuit-Evasion Under Uncertainties. Front Robot AI 2021; 8:691637. [PMID: 34485390 PMCID: PMC8415911 DOI: 10.3389/frobt.2021.691637] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/06/2021] [Accepted: 07/31/2021] [Indexed: 11/13/2022] Open
Abstract
We consider a pursuit-evasion problem with a heterogeneous team of multiple pursuers and multiple evaders. Although both the pursuers and the evaders are aware of each others' control and assignment strategies, they do not have exact information about the other type of agents' location or action. Using only noisy on-board sensors the pursuers (or evaders) make probabilistic estimation of positions of the evaders (or pursuers). Each type of agent use Markov localization to update the probability distribution of the other type. A search-based control strategy is developed for the pursuers that intrinsically takes the probability distribution of the evaders into account. Pursuers are assigned using an assignment algorithm that takes redundancy (i.e., an excess in the number of pursuers than the number of evaders) into account, such that the total or maximum estimated time to capture the evaders is minimized. In this respect we assume the pursuers to have clear advantage over the evaders. However, the objective of this work is to use assignment strategies that minimize the capture time. This assignment strategy is based on a modified Hungarian algorithm as well as a novel algorithm for determining assignment of redundant pursuers. The evaders, in order to effectively avoid the pursuers, predict the assignment based on their probabilistic knowledge of the pursuers and use a control strategy to actively move away from those pursues. Our experimental evaluation shows that the redundant assignment algorithm performs better than an alternative nearest-neighbor based assignment algorithm.
Collapse
Affiliation(s)
- Leiming Zhang
- Department of Mechanical Engineering and Mechanics, Lehigh University, Bethlehem, PA, United States
| | - Amanda Prorok
- Department of Computer Science and Technology, Cambridge University, Cambridge, United Kingdom
| | - Subhrajit Bhattacharya
- Department of Mechanical Engineering and Mechanics, Lehigh University, Bethlehem, PA, United States
| |
Collapse
|
6
|
|
7
|
Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope. J INTELL ROBOT SYST 2021; 102:10. [PMID: 33879973 PMCID: PMC8051283 DOI: 10.1007/s10846-021-01378-2] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/03/2020] [Accepted: 03/26/2021] [Indexed: 11/13/2022]
Abstract
Recently, Multi-Robot Systems (MRS) have attained considerable recognition because of their efficiency and applicability in different types of real-life applications. This paper provides a comprehensive research study on MRS coordination, starting with the basic terminology, categorization, application domains, and finally, give a summary and insights on the proposed coordination approaches for each application domain. We have done an extensive study on recent contributions in this research area in order to identify the strengths, limitations, and open research issues, and also highlighted the scope for future research. Further, we have examined a series of MRS state-of-the-art parameters that affect MRS coordination and, thus, the efficiency of MRS, like communication mechanism, planning strategy, control architecture, scalability, and decision-making. We have proposed a new taxonomy to classify various coordination approaches of MRS based on the six broad dimensions. We have also analyzed that how coordination can be achieved and improved in two fundamental problems, i.e., multi-robot motion planning, and task planning, and in various application domains of MRS such as exploration, object transport, target tracking, etc.
Collapse
|
8
|
|
9
|
Stolfi DH, Brust MR, Danoy G, Bouvry P. UAV-UGV-UMV Multi-Swarms for Cooperative Surveillance. Front Robot AI 2021; 8:616950. [PMID: 33681299 PMCID: PMC7933201 DOI: 10.3389/frobt.2021.616950] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2020] [Accepted: 01/08/2021] [Indexed: 11/13/2022] Open
Abstract
In this paper we present a surveillance system for early detection of escapers from a restricted area based on a new swarming mobility model called CROMM-MS (Chaotic Rössler Mobility Model for Multi-Swarms). CROMM-MS is designed for controlling the trajectories of heterogeneous multi-swarms of aerial, ground and marine unmanned vehicles with important features such as prioritising early detections and success rate. A new Competitive Coevolutionary Genetic Algorithm (CompCGA) is proposed to optimise the vehicles’ parameters and escapers’ evasion ability using a predator-prey approach. Our results show that CROMM-MS is not only viable for surveillance tasks but also that its results are competitive in regard to the state-of-the-art approaches.
Collapse
Affiliation(s)
- Daniel H Stolfi
- Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-sur-Alzette, Luxembourg
| | - Matthias R Brust
- Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-sur-Alzette, Luxembourg
| | - Grégoire Danoy
- Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-sur-Alzette, Luxembourg.,FSTM/DCS, University of Luxembourg, Esch-sur-Alzette, Luxembourg
| | - Pascal Bouvry
- Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-sur-Alzette, Luxembourg.,FSTM/DCS, University of Luxembourg, Esch-sur-Alzette, Luxembourg
| |
Collapse
|
10
|
Deng Z, Kong Z. Multi-Agent Cooperative Pursuit-Defense Strategy Against One Single Attacker. IEEE Robot Autom Lett 2020. [DOI: 10.1109/lra.2020.3010740] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
|
11
|
Garcia E, Casbeer DW, Pachter M. Optimal Strategies for a Class of Multi-Player Reach-Avoid Differential Games in 3D Space. IEEE Robot Autom Lett 2020. [DOI: 10.1109/lra.2020.2994023] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
|
12
|
Shishika D, Paulos J, Kumar V. Cooperative Team Strategies for Multi-Player Perimeter-Defense Games. IEEE Robot Autom Lett 2020. [DOI: 10.1109/lra.2020.2972818] [Citation(s) in RCA: 37] [Impact Index Per Article: 7.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
|
13
|
Yan R, Shi Z, Zhong Y. Task Assignment for Multiplayer Reach–Avoid Games in Convex Domains via Analytical Barriers. IEEE T ROBOT 2020. [DOI: 10.1109/tro.2019.2935345] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
14
|
Trajectory Planning and the Target Search by the Mobile Robot in an Environment Using a Behavior-Based Neural Network Approach. ROBOTICA 2019. [DOI: 10.1017/s0263574719001668] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
Abstract
SUMMARYNavigation and path analysis in a cluttered environment is a challenging task over the last few decades. In this paper, a behavior-based neural network (BNN) and reactive control architecture have been presented for navigation of the mobile robot. Two different reactive behaviors have been taken as inputs function. Obstacle position is the first reactive behavior given by u(o), whereas obstacle angle u(n) according to the target position is the second reactive behavior. The angular velocity and steering angle are the output of the controller. The backpropagation architecture reduces the errors of weight function and records the best weight data that match the BNN controller. Using the BNN algorithm, the robot reacts quickly as compared to other developed techniques. To validate the performance of the controller, simulation and experimental results have been compared in the common platforms. The deviation in results for both the scenarios is found to be within 10%. The results of the BNN algorithm have also been compared with other existing techniques. Effectiveness of the proposed technique is measured in terms of smoothness of the realistic path, collision point detection, path length, and performance time.
Collapse
|
15
|
Trenkwalder SM. Computational Resources of Miniature Robots: Classification and Implications. IEEE Robot Autom Lett 2019. [DOI: 10.1109/lra.2019.2917395] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
|
16
|
Yan R, Shi Z, Zhong Y. Reach-Avoid Games With Two Defenders and One Attacker: An Analytical Approach. IEEE TRANSACTIONS ON CYBERNETICS 2019; 49:1035-1046. [PMID: 29994434 DOI: 10.1109/tcyb.2018.2794769] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
This paper considers a reach-avoid game on a rectangular domain with two defenders and one attacker. The attacker aims to reach a specified edge of the game domain boundary, while the defenders strive to prevent that by capturing the attacker. First, we are concerned with the barrier, which is the boundary of the reach-avoid set, splitting the state space into two disjoint parts: 1) defender dominance region (DDR) and 2) attacker dominance region (ADR). For the initial states lying in the DDR, there exists a strategy for the defenders to intercept the attacker regardless of the attacker's best effort, while for the initial states lying in the ADR, the attacker can always find a successful attack strategy. We propose an attack region method to construct the barrier analytically by employing Voronoi diagram and Apollonius circle for two kinds of speed ratios. Then, by taking practical payoff functions into considerations, we present optimal strategies for the players when their initial states lie in their winning regions, and show that the ADR is divided into several parts corresponding to different strategies for the players. Numerical approaches, which suffer from inherent inaccuracy, have already been utilized for multiplayer reach-avoid games, but computational complexity complicates solving such games and consequently hinders efficient on-line applications. However, this method can obtain the exact formulation of the barrier and is applicable for real-time updates.
Collapse
|
17
|
|
18
|
|
19
|
Zhou L, Tzoumas V, Pappas GJ, Tokekar P. Resilient Active Target Tracking With Multiple Robots. IEEE Robot Autom Lett 2019. [DOI: 10.1109/lra.2018.2881296] [Citation(s) in RCA: 27] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
|