9 research outputs found

    Mosquito-inspired Swarming and Pursuit for Autonomous Rotorcraft

    Get PDF
    The long-term goal of this research is to design cooperative-control algorithms for autonomous vehicles inspired by the collective behaviors in animal groups. The specific research objectives of this dissertation are twofold: (1) to analyze and model the swarming and pursuit behaviors observed in the mating swarms of mosquitoes, and (2) to design mosquito-inspired control algorithms to perform swarming and pursuit with autonomous rotorcraft. The first part of this dissertation analyzes the reconstructed flight data of the malarial mosquito Anopheles gambiae to characterize the velocity-alignment interaction between male mosquitoes, who aggregate to form mating swarms and subsequently pursue a female mosquito. Both swarming and pursuit behaviors are represented using self-propelled particle models. The model is used together with tools from control theory to investigate the connection between velocity-alignment behavior and success in pursuit. The results of this research have a potential impact on vector-control methods for malaria, and are also utilized in the second part of this dissertation. The second part of this dissertation studies two types of pursuit problems inspired by the collective behavior in mosquito swarms. The first problem considers the strategy for a single pursuer chasing a single target. This problem has been studied extensively for the application to missile guidance and navigation. Here, we tailor the assumptions on the dynamics of the agents as well as the design criteria for the application to small and agile rotorcraft. The second pursuit problem incorporates the swarming behavior by considering a scenario in which multiple guardian vehicles are deployed to protect an area against fast intruders. We derive necessary and sufficient conditions for capturing the intruder. We also present swarming strategies to maximize the performance of the guardians, inspired by the random-oscillatory motion and the velocity-alignment behavior of male mosquitoes

    Decentralization of Multiagent Policies by Learning What to Communicate

    Full text link
    Effective communication is required for teams of robots to solve sophisticated collaborative tasks. In practice it is typical for both the encoding and semantics of communication to be manually defined by an expert; this is true regardless of whether the behaviors themselves are bespoke, optimization based, or learned. We present an agent architecture and training methodology using neural networks to learn task-oriented communication semantics based on the example of a communication-unaware expert policy. A perimeter defense game illustrates the system's ability to handle dynamically changing numbers of agents and its graceful degradation in performance as communication constraints are tightened or the expert's observability assumptions are broken.Comment: 7 page

    Asymptotic Stability of Active Disturbance Rejection Control for Linear SISO Plants with Low Observer Gains

    Full text link
    This paper theoretically investigates the closed-loop performance of active disturbance rejection control (ADRC) on a third-order linear plant with relative degree 3, subject to a class of exogenous disturbances. While PID control cannot be guaranteed to be capable of stabilizing such plants, ADRC offers a model-free alternative. However, many existing works on ADRC consider the observer gains to be taken arbitrarily large, in order to guarantee desired performance, such as works which consider parameterizing ADRC by bandwidth. This work finds that, for constant exogenous disturbances, arbitrary eigenvalue assignment is possible for the closed-loop system under linear ADRC, thus guaranteeing the existence of an ADRC controller for desired performance without taking any gains arbitrarily large. We also find that stabilization is possible when the exogenous disturbance is stable, and show how ADRC can recover the performance of model-based observers. We demonstrate aspects of the resulting closed-loop systems under ADRC in simulations

    Guarding a Non-Maneuverable Translating Line with an Attached Defender

    Full text link
    In this paper we consider a target-guarding differential game where the defender must protect a linearly translating line-segment by intercepting an attacker who tries to reach it. In contrast to common target-guarding problems, we assume that the defender is attached to the target and moves along with it. This assumption affects the defenders' maximum speed in inertial frame, which depends on the target's direction of motion. Zero-sum differential game of degree for both the attacker-win and defender-win scenarios are studied, where the payoff is defined to be the distance between the two agents at the time of game termination. We derive the equilibrium strategies and the Value function by leveraging the solution for the infinite-length target scenario. The zero-level set of this Value function provides the barrier surface that divides the state space into defender-win and attacker-win regions. We present simulation results to demonstrate the theoretical results.Comment: 8 pages, 8 figures. arXiv admin note: text overlap with arXiv:2207.0409

    The Eater and the Mover Game

    Full text link
    This paper studies the idea of ``deception by motion'' through a two-player dynamic game played between a Mover who must retrieve resources at a goal location, and an Eater who can consume resources at two candidate goals. The Mover seeks to minimize the resource consumption at the true goal, and the Eater tries to maximize it. While the Mover has the knowledge about the true goal, the Eater cannot differentiate between the two candidates. Unlike existing works on deceptive motion control that measures the deceptiveness through the quality of inference made by a distant observer (an estimator), we incorporate their actions to directly measure the efficacy of deception through the outcome of the game. An equilibrium concept is then proposed without the notion of an estimator. We further identify a pair of equilibrium strategies and demonstrate that if the Eater optimizes for the worst-case scenario, hiding the intention (deception by ambiguity) is still effective, whereas trying to fake the true goal (deception by exaggeration) is not.Comment: Submitted to the IEEE Control Systems Letters (L-CSS), 202

    Dynamic Adversarial Resource Allocation: the dDAB Game

    Full text link
    This work proposes a dynamic and adversarial resource allocation problem in a graph environment, which is referred to as the dynamic Defender-Attacker Blotto (dDAB) game. A team of defender robots is tasked to ensure numerical advantage at every node in the graph against a team of attacker robots. The engagement is formulated as a discrete-time dynamic game, where the two teams reallocate their robots in sequence and each robot can move at most one hop at each time step. The game terminates with the attacker's victory if any node has more attacker robots than defender robots. Our goal is to identify the necessary and sufficient number of defender robots to guarantee defense. Through a reachability analysis, we first solve the problem for the case where the attacker team stays as a single group. The results are then generalized to the case where the attacker team can freely split and merge into subteams. Crucially, our analysis indicates that there is no incentive for the attacker team to split, which significantly reduces the search space for the attacker's winning strategies and also enables us to design defender counter-strategies using superposition. We also present an efficient numerical algorithm to identify the necessary and sufficient number of defender robots to defend a given graph. Finally, we present illustrative examples to verify the efficacy of the proposed framework

    Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information

    Full text link
    We consider a path guarding problem in dynamic Defender-Attacker Blotto games (dDAB), where a team of robots must defend a path in a graph against adversarial agents. Multi-robot systems are particularly well suited to this application, as recent work has shown the effectiveness of these systems in related areas such as perimeter defense and surveillance. When designing a defender policy that guarantees the defense of a path, information about the adversary and the environment can be helpful and may reduce the number of resources required by the defender to achieve a sufficient level of security. In this work, we characterize the necessary and sufficient number of assets needed to guarantee the defense of a shortest path between two nodes in dDAB games when the defender can only detect assets within kk-hops of a shortest path. By characterizing the relationship between sensing horizon and required resources, we show that increasing the sensing capability of the defender greatly reduces the number of defender assets needed to defend the path
    corecore