35 research outputs found

    Mobile robotic network deployment for intruder detection and tracking

    Get PDF
    This thesis investigates the problem of intruder detection and tracking using mobile robotic networks. In the first part of the thesis, we consider the problem of seeking an electromagnetic source using a team of robots that measure the local intensity of the emitted signal. We propose a planner for a team of robots based on Particle Swarm Optimization (PSO) which is a population based stochastic optimization technique. An equivalence is established between particles generated in the traditional PSO technique, and the mobile agents in the swarm. Since the positions of the robots are updated using the PSO algorithm, modifications are required to implement the PSO algorithm on real robots to incorporate collision avoidance strategies. The modifications necessary to implement PSO on mobile robots, and strategies to adapt to real environments are presented in this thesis. Our results are also validated on an experimental testbed. In the second part, we present a game theoretic framework for visibility-based target tracking in multi-robot teams. A team of observers (pursuers) and a team of targets (evaders) are present in an environment with obstacles. The objective of the team of observers is to track the team of targets for the maximum possible time. While the objective of the team of targets is to escape (break line-of-sight) in the minimum time. We decompose the problem into two layers. At the upper level, each pursuer is allocated to an evader through a minimum cost allocation strategy based on the risk of each evader, thereby, decomposing the agents into multiple single pursuer-single evader pairs. Two decentralized allocation strategies are proposed and implemented in this thesis. At the lower level, each pursuer computes its strategy based on the results of the single pursuer-single evader target-tracking problem. We initially address this problem in an environment containing a semi-infinite obstacle with one corner. The pursuer\u27s optimal tracking strategy is obtained regardless of the evader\u27s strategy using techniques from optimal control theory and differential games. Next, we extend the result to an environment containing multiple polygonal obstacles. We construct a pursuit field to provide a guiding vector for the pursuer which is a weighted sum of several component vectors. The performance of different combinations of component vectors is investigated. Finally, we extend our work to address the case when the obstacles are not polygonal, and the observers have constraints in motion

    Visibility-Based Pursuit-Evasion In The Plane

    Get PDF
    As technological advances further increase the amount of memory and computing power available to mobile robots, we are seeing an unprecedented explosion in the utilization of deployable robots for various tasks. The speed at which robots begin to enter various domains is largely dependent on the availability of robust and efficient algorithms that are capable of solving the complex planning problems inherent to the given domain. One such domain which is experiencing unprecedented growth in recent years requires a robot to detect and/or track a mobile agent or group of agents. In these scenarios, there are typically two players with diametrically opposed goals. For matters of security, we have a guard and an intruder. The guard’s goal is to ensure that if an intruder enters the premises they are caught in a timely manner. Analogously, the intruder wishes to evade detection for as long as possible. Search and rescue operations are often framed as a two-player game between rescuers and survivors. Though the survivors are unlikely to behave antagonistically, an agnostic model is useful for the rescuers to guarantee that the survivors are found, regardless of their movements. Both of these tasks, are at their core, pursuit-evasion problems. There are many variants of the pursuit-evasion problem, the common theme amongst them is that one group of agents, the “pursuers”, attempts to track members of another group, the “evaders”. Geometric formulations of the pursuit-evasion problem require a pursuer(s) to systematically search an environment to locate one or more evaders ensuring that all evaders will be captured by the pursuer(s) in a finite time. The visibility-based pursuit-evasion problem is a geometric variant of the pursuit-evasion problem that defines a visibility-region which corresponds to the region of the environment that the pursuer(s) can actively perceive. If an evader lies within this visibility region then it is captured (detected). This thesis contains four novel contributions that solve various visibility-based pursuit-evasion problems. The first contribution is an algorithm that computes the optimal (minimal path length) pursuer trajectory for a single pursuer. The second contribution is an algorithm that generates a joint motion strategy for multiple pursuers. Motivated by the result of the second contribution, the third result is a sampling-based algorithm for the multiple pursuer scenario. The fourth contribution is a complete algorithm that computes a trajectory for a pursuer that has a very limited sensor footprint

    Sampling and Robustness in Multi-Robot Visibility-Based Pursuit-Evasion

    Get PDF
    Given a two-dimensional polygonal space, the multi-robot visibility-based pursuit-evasion problem tasks several pursuer robots with the goal of establishing visibility with an arbitrarily fast evader. The best-known complete algorithm for this problem takes time doubly exponential in the number of robots. However, sampling-based techniques have shown promise in generating feasible solutions in these scenarios. Existing sampling-based algorithms have long execution times and high failure rates for complex environments. We first address that limitation by proposing a new algorithm that takes an environment as its input and returns a joint motion strategy which ensures that the evader is captured by one of the pursuers. Starting with a single pursuer, we sequentially construct data structures called Sample-Generated Pursuit-Evasion Graphs to create such a joint motion strategy. This sequential graph structure ensures that our algorithm will always terminate with a solution, regardless of the complexity of the environment. Another aspect of this problem that has yet to be explored concerns how to ensure that the robots can recover from catastrophic failures which leave one or more robots unexpectedly incapable of continuing to contribute to the pursuit of the evader. To address this issue, we propose an algorithm that can rapidly recover from catastrophic failures. When such failures occur, a replanning occurs, leveraging both the information retained from the previous iteration and the partial progress of the search completed before the failure to generate a new motion strategy for the reduced team of pursuers. The final contribution is a novel formulation of the pursuit-evasion problem that modifies the pursuers\u27 objective by requiring that the evader still be detected, even in spite of the malfunction of any single pursuer robot. This novel constraint, whereby two pursuers are required to detect an evader, has the benefit of providing redundancy to the search, should any member of the team become unresponsive, suffer temporary sensor disruption/failure, or otherwise become incapacitated. The proposed formulation produces plans that are inherently tolerant of some level of disturbance. For each contribution discussed above, we describe an implementation of the algorithm and provide quantitative results that show substantial improvement over existing results

    Analysis of multi-agent systems under varying degrees of trust, cooperation, and competition

    Full text link
    Multi-agent systems rely heavily on coordination and cooperation to achieve a variety of tasks. It is often assumed that these agents will be fully cooperative, or have reliable and equal performance among group members. Instead, we consider cooperation as a spectrum of possible interactions, ranging from performance variations within the group to adversarial agents. This thesis examines several scenarios where cooperation and performance are not guaranteed. Potential applications include sensor coverage, emergency response, wildlife management, tracking, and surveillance. We use geometric methods, such as Voronoi tessellations, for design insight and Lyapunov-based stability theory to analyze our proposed controllers. Performance is verified through simulations and experiments on a variety of ground and aerial robotic platforms. First, we consider the problem of Voronoi-based coverage control, where a group of robots must spread out over an environment to provide coverage. Our approach adapts online to sensing and actuation performance variations with the group. The robots have no prior knowledge of their relative performance, and in a distributed fashion, compensate by assigning weaker robots a smaller portion of the environment. Next, we consider the problem of multi-agent herding, akin to shepherding. Here, a group of dog-like robots must drive a herd of non-cooperative sheep-like agents around the environment. Our key insight in designing the control laws for the herders is to enforce geometrical relationships that allow for the combined system dynamics to reduce to a single nonholonomic vehicle. We also investigate the cooperative pursuit of an evader by a group of quadrotors in an environment with no-fly zones. While the pursuers cannot enter the no-fly zones, the evader moves freely through the zones to avoid capture. Using tools for Voronoi-based coverage control, we provide an algorithm to distribute the pursuers around the zone's boundary and minimize capture time once the evader emerges. Finally, we present an algorithm for the guaranteed capture of multiple evaders by one or more pursuers in a bounded, convex environment. The pursuers utilize properties of the evader's Voronoi cell to choose a control strategy that minimizes the safe-reachable area of the evader, which in turn leads to the evader's capture

    Advanced Mobile Robotics: Volume 3

    Get PDF
    Mobile robotics is a challenging field with great potential. It covers disciplines including electrical engineering, mechanical engineering, computer science, cognitive science, and social science. It is essential to the design of automated robots, in combination with artificial intelligence, vision, and sensor technologies. Mobile robots are widely used for surveillance, guidance, transportation and entertainment tasks, as well as medical applications. This Special Issue intends to concentrate on recent developments concerning mobile robots and the research surrounding them to enhance studies on the fundamental problems observed in the robots. Various multidisciplinary approaches and integrative contributions including navigation, learning and adaptation, networked system, biologically inspired robots and cognitive methods are welcome contributions to this Special Issue, both from a research and an application perspective

    Multi Robot Intruder Search

    Get PDF
    The aim of this work is the development and analysis of methods and algorithms to allow a multi robot system to cooperatively search a closed, 2-dimensional environment for a human intruder. The underlying problem corresponds to the game-theoretic concept of a classical pursuit evasion game, whereas the focus is set to the generation of plans for the group of pursuers. While the main aspect of of this work lies in the field of probabilistic robotics, concepts and ideas are incorporated from differential game theory, algorithmic geometry and graph theory. The probabilistic basis allows the integration of sensor error as well as nondeterministic robot motion. The main contributions of this work can be divided into three major parts: The first part deals with the development and implementation of probabilistic human models. Depending on the specific behavior of an intruder, ranging from uncooperative to unaware, different classes of intruders are identified. Models are proposed for two of these classes. For the case of a clever and uncooperative intruder who actively evades detection, we propose a model based on the concept of contamination. The second class corresponds to a person who is unaware of the pursuit. We show that simple Markov models, which are often proposed in literature, are not suited for modeling realistic human motion and develop advanced Markov models, which conform to random waypoint motion models. The second part, which is also the most extensive part of this work, deals with the problem of finding an uncooperative and clever intruder. A solution is presented, which projects the problem on a graph structure, which is then searched by a highly optimized A* planner. The solution for the corresponding graph problem is afterwards projected back to the original search space and can be executed by the robotic pursuers. By means of the models proposed in the first part, the performance and correctness of the method is shown. We present experiments in simulation as on real robots to show the practicability and efficiency of the method. The third part deals with the problem of finding an intruder who is unaware of the search. Based on the advanced Markov model previously discussed, a greedy algorithm is proposed, which aims at maximizing the probability to find the intruder in the near future. Experimental results for this method are shown and comparisons to simpler methods are given.Mehrroboter-Eindringlings-Suche Ziel dieser Arbeit ist die Entwicklung und Analyse von Methoden und Algorithmen, die einem kooperativen Mehrrobotersystem erlauben nach einem Eindringling in einer zweidimensionalen, geschlossenen Umgebung zu suchen. Das dem zugrunde liegende Problem entspricht dem spieltheoretischen Konzept eines Suche und Ausweichen Spieles (pursuit evasion game), wobei der Fokus auf der Generierung von Plänen für die Verfolger liegt. Der Hauptaspekt dieser Arbeit liegt dabei im Feld der probabilistischen Robotik, wobei Konzepte und Ideen aus dem Gebiet der differentiellen Spieltheorie, der algorithmischen Geometrie und der Graph Theorie verwendet werden. Die probabilistische Modellierung erlaubt dabei die Integration von Sensorfehlern wie auch nichtdeterministische Roboter-Bewegung. Die Arbeit gliedert sich in drei Hauptteile: Der erste Teil beschäftigt sich mit dem Entwurf und der Implementierung von probabilistischen Modellen für menschliche Bewegung. Abhängig vom angenommenen Verhalten eines Eindringlings, von aktiv ausweichend bis zu ignorant, werden verschiedene Klassen von menschlichem Verhalten unterschieden. Für zwei dieser Klassen stellen wir Modelle auf: Für den Fall einer intelligenten und aktiv ausweichenden Person, generieren wir ein Modell basierend auf dem Konzept von Kontamination. Das zweite Modell entspricht einem Eindringling, der sich der Suche nach ihm nicht bewusst ist. Wir zeigen, dass einfache Markov-Modelle, wie sie in der Vergangenheit oft vorgeschlagen worden sind, ungeeignet sind, um realistische Bewegung zu abzubilden und entwickeln entsprechend erweiterte Markov-Modelle für eine realistischere Modellierung. Der zweite Teil der Arbeit beschäftigt sich mit der Frage, wie man einen intelligente und aktiv ausweichenden Eindringling aufspüren kann. Die vorgestellte Lösung basiert auf der Projektion des Problems auf einen Graphen, der anschließend von einem hoch optimierten A*-Planungsalgorithmus durchsucht werden kann. Diese Lösung kann anschließend auf den ursprünglichen Raum rückprojeziert werden und kann als direkter Plan von den verfolgenden Robotern ausgeführt werden. Mittels der Modelle aus dem ersten Teil wird die Korrektheit und Effizienz der Lösung gezeigt. Der letzte Teil befasst sich mit der Frage, wie ein Eindringling gefunden werden kann, der sich neutral zur Suche verhält. Basierend auf den erweiterten Markov-Modellen aus dem ersten Teil, wird eine Lösung durch gierige Suche präsentiert, die die Wahrscheinlichkeit eine Person im nächsten Zeitschritt aufzuspüren, maximiert. Wie im zweiten Teil werden Experimente diskutiert und diese mit der Proformanz simplerer Methoden verglichen

    Path planning for autonomous vehicles

    Get PDF
    In this study, we first address the problem of visibility-based target tracking for a team of mobile observers trying to track a team of mobile targets. Initially, we introduce the notion of pursuit fields for a single observer to track a single target around a corner based on the previous work. Pursuit fields are used to generate navigation strategies for a single observer. In order to account for the scenario with the presence of more than one observer or target, we propose a hierarchical approach. At first a ranking and aggregation technique is used for allocating each observer to a target. Subsequently, each observer computes its navigation strategy based on the results of the single observer-single target problem, thereby, decomposing a large multi-agent problem into numerous 2-agent problems. Based on the aforementioned analysis, we present a scalable algorithm that can accommodate an arbitrary number of observers and targets. The performance of this algorithm is evaluated based on simulation and implementation. To implement the strategy in reality, we further propose a setup of omni-directional camera, which can be used to get the visual information of the surroundings. With the help of this setup, we apply a position estimation technique for the pursuer to locate the evader. Experimental results show that the error has considerable effect when the measuring distance is very large. Due to this reason, the aforementioned tracking strategy is modified to keep the evader in an effective range for estimation. Finally, based on the error in position estimation, we present PID controllers for the pursuer to track the evader along a straight line. The responses of the proposed controllers are given by simulations. Considering the situation that pursuer does not have an on board vision sensor, we propose a novel tracking strategy based on the information on social network. We first introduce the notion of common agents, who take pictures around and share them on social network website. In order to take advantage of these images, a network evolution algorithm and an image scanning algorithm are presented. Based on the information from these images, evader can be located accordingly. Implementation results are presented to validate the feasibility. In the rest of the thesis, we address the scheduling and motion planning problem for an autonomous grain cart serving multiple combines. In the first part, we present the mathematical models of both combine harvester and grain cart. Based on the models, we propose a scheduling scheme which allows grain cart to unload all the combines without interruption in the harvesting activity. The proposed scheme is generalized to an arbitrary number of combines. In the second part, we present path planning analysis for the grain cart to switch between two combines. A numerical approach and a primitive-based approach are considered to obtain the time-optimal solution. The former approach needs a value function corresponding to the goal position to be computed beforehand. Based on the value function, a time-optimal path can be obtained accordingly. In the latter approach, path consists of singular primitives and regular primitives which ensure local time optimality. Finally, simulation results are presented to validate the feasibility of the proposed techniques
    corecore