-
One-vs-one Threat-Aware Weaponeering with Basic Engagement Zones
Authors:
Alexander Von Moll,
Dejan Milutinović,
Isaac Weintraub,
David W. Casbeer
Abstract:
In this paper we address the problem of 'weaponeering', i.e., placing the weapon engagement zone (WEZ) of a vehicle on a moving target, while simultaneously avoiding the target's WEZ. A WEZ describes the lethality region of a range-limited weapon considering both the range of the weapon along with the state of the target. The weapons are assumed to have simple motion, while the vehicles carrying t…
▽ More
In this paper we address the problem of 'weaponeering', i.e., placing the weapon engagement zone (WEZ) of a vehicle on a moving target, while simultaneously avoiding the target's WEZ. A WEZ describes the lethality region of a range-limited weapon considering both the range of the weapon along with the state of the target. The weapons are assumed to have simple motion, while the vehicles carrying the weapons are modeled with Dubins dynamics. Three scenarios are investigated and are differentiated in the assumptions that can be made about the target in the process of the vehicle control design: 1) no knowledge of target control, 2) avoid unsafe positions assuming the target's optimal control, 3) full knowledge of target's optimal control. The engagement is formulated as a stochastic optimal control problem with uncertainty in the target's control modeled using a noise parameter applied to the target's control input. After discretizing the Hamilton-Jacobi-Bellman equation, Value iteration is then used to obtain an approximate solution for the optimal vehicle control and time-to-go. Simulation results support usage of the first paradigm: assume no knowledge of the target's control.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
Optimal Geodesic Curvature Constrained Dubins' Path on Sphere with Free Terminal Orientation
Authors:
Deepak Prakash Kumar,
Swaroop Darbha,
Satyanarayana Gupta Manyam,
Dzung Tran,
David W. Casbeer
Abstract:
In this paper, motion planning for a vehicle moving on a unit sphere with unit speed is considered, wherein the desired terminal location is fixed, but the terminal orientation is free. The motion of the vehicle is modeled to be constrained by a maximum geodesic curvature $U_{max},$ which controls the rate of change of heading of the vehicle such that the maximum heading change occurs when the veh…
▽ More
In this paper, motion planning for a vehicle moving on a unit sphere with unit speed is considered, wherein the desired terminal location is fixed, but the terminal orientation is free. The motion of the vehicle is modeled to be constrained by a maximum geodesic curvature $U_{max},$ which controls the rate of change of heading of the vehicle such that the maximum heading change occurs when the vehicle travels on a tight circular arc of radius $r = \frac{1}{\sqrt{1 + U_{max}^2}}$. Using Pontryagin's Minimum Principle, the main result of this paper shows that for $r \leq \frac{1}{2}$, the optimal path connecting a given initial configuration and a final location on the sphere belongs to a set of at most seven paths. The candidate paths are of type $CG, CC,$ and degenerate paths of the same, where $C \in \{L, R\}$ denotes a tight left or right turn, respectively, and $G$ denotes a great circular arc.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
Equivalence of Dubins Path on Sphere with Geographic Coordinates and Moving Frames
Authors:
Deepak Prakash Kumar,
Swaroop Darbha,
Satyanarayana G. Manyam,
David W. Casbeer,
Meir Pachter
Abstract:
In this article, two methods of addressing path planning for a Dubins vehicle moving on a sphere are considered, wherein either spherical coordinates or a moving frame are considered to describe the vehicle's motion. The primary contribution of this article is to show the equivalence of these two approaches, which in turn shows that the results known for the moving frame-based description transfer…
▽ More
In this article, two methods of addressing path planning for a Dubins vehicle moving on a sphere are considered, wherein either spherical coordinates or a moving frame are considered to describe the vehicle's motion. The primary contribution of this article is to show the equivalence of these two approaches, which in turn shows that the results known for the moving frame-based description transfer to the model utilizing spherical coordinates.
△ Less
Submitted 13 August, 2024;
originally announced August 2024.
-
Multi Agent Pathfinding for Noise Restricted Hybrid Fuel Unmanned Aerial Vehicles
Authors:
Drew Scott,
Satyanarayana G. Manyam,
David W. Casbeer,
Manish Kumar,
Isaac E. Weintraub
Abstract:
Multi Agent Path Finding (MAPF) seeks the optimal set of paths for multiple agents from respective start to goal locations such that no paths conflict. We address the MAPF problem for a fleet of hybrid-fuel unmanned aerial vehicles which are subject to location-dependent noise restrictions. We solve this problem by searching a constraint tree for which the subproblem at each node is a set of short…
▽ More
Multi Agent Path Finding (MAPF) seeks the optimal set of paths for multiple agents from respective start to goal locations such that no paths conflict. We address the MAPF problem for a fleet of hybrid-fuel unmanned aerial vehicles which are subject to location-dependent noise restrictions. We solve this problem by searching a constraint tree for which the subproblem at each node is a set of shortest path problems subject to the noise and fuel constraints and conflict zone avoidance. A labeling algorithm is presented to solve this subproblem, including the conflict zones which are treated as dynamic obstacles. We present the experimental results of the algorithms for various graph sizes and number of agents.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Pursuit-Evasion on a Sphere and When It Can Be Considered Flat
Authors:
Dejan Milutinovic,
Alexander Von Moll,
Satyanarayana G. Manyam,
David W. Casbeer,
Isaac E. Weintraub,
Meir Pachter
Abstract:
In classical works on a planar differential pursuit-evasion game with a faster pursuer, the intercept point resulting from the equilibrium strategies lies on the Apollonius circle. This property was exploited for the construction of the equilibrium strategies for two faster pursuers against one evader. Extensions for planar multiple-pursuer single-evader scenarios have been considered. We study a…
▽ More
In classical works on a planar differential pursuit-evasion game with a faster pursuer, the intercept point resulting from the equilibrium strategies lies on the Apollonius circle. This property was exploited for the construction of the equilibrium strategies for two faster pursuers against one evader. Extensions for planar multiple-pursuer single-evader scenarios have been considered. We study a pursuit-evasion game on a sphere and the relation of the equilibrium intercept point to the Apollonius domain on the sphere. The domain is a generalization of the planar Apollonius circle set. We find a condition resulting in the intercept point belonging to the Apollonius domain, which is the characteristic of the planar game solution. Finally, we use this characteristic to discuss pursuit and evasion strategies in the context of two pursuers and a single slower evader on the sphere and illustrate it using numerical simulations.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Shortest Trajectory of a Dubins Vehicle with a Controllable Laser
Authors:
Shivam Bajaj,
Bhargav Jha,
Shaunak D. Bopardikar,
Alexander Von Moll,
David W. Casbeer
Abstract:
We formulate a novel planar motion planning problem for a Dubins-Laser system that consists of a Dubins vehicle with an attached controllable laser. The vehicle moves with unit speed and the laser, having a finite range, can rotate in a clockwise or anti-clockwise direction with a bounded angular rate. From an arbitrary initial position and orientation, the objective is to steer the system so that…
▽ More
We formulate a novel planar motion planning problem for a Dubins-Laser system that consists of a Dubins vehicle with an attached controllable laser. The vehicle moves with unit speed and the laser, having a finite range, can rotate in a clockwise or anti-clockwise direction with a bounded angular rate. From an arbitrary initial position and orientation, the objective is to steer the system so that a given static target is within the range of the laser and the laser is oriented at it in minimum time. We characterize multiple properties of the optimal trajectory and establish that the optimal trajectory for the Dubins-laser system is one out of a total of 16 candidates. Finally, we provide numerical insights that illustrate the properties characterized in this work.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Noise Aware Path Planning and Power Management of Hybrid Fuel UAVs
Authors:
Drew Scott,
Satyanarayana G. Manyam,
Isaac E. Weintraub,
David W. Casbeer,
Manish Kumar
Abstract:
Hybrid fuel Unmanned Aerial Vehicles (UAV), through their combination of multiple energy sources, offer several advantages over the standard single fuel source configuration, the primary one being increased range and efficiency. Multiple power or fuel sources also allow the distinct pitfalls of each source to be mitigated while exploiting the advantages within the mission or path planning. We cons…
▽ More
Hybrid fuel Unmanned Aerial Vehicles (UAV), through their combination of multiple energy sources, offer several advantages over the standard single fuel source configuration, the primary one being increased range and efficiency. Multiple power or fuel sources also allow the distinct pitfalls of each source to be mitigated while exploiting the advantages within the mission or path planning. We consider here a UAV equipped with a combustion engine-generator and battery pack as energy sources. We consider the path planning and power-management of this platform in a noise-aware manner. To solve the path planning problem, we first present the Mixed Integer Linear Program (MILP) formulation of the problem. We then present and analyze a label-correcting algorithm, for which a pseudo-polynomial running time is proven. Results of extensive numerical testing are presented which analyze the performance and scalability of the labeling algorithm for various graph structures, problem parameters, and search heuristics. It is shown that the algorithm can solve instances on graphs as large as twenty thousand nodes in only a few seconds.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Assisted Path Planning for a UGV-UAV Team Through a Stochastic Network
Authors:
Abhay Singh Bhadoriya,
Sivakumar Rathinam,
Swaroop Darbha,
David W. Casbeer,
Satyanarayana G. Manyam
Abstract:
In this article, we consider a multi-agent path planning problem in a stochastic environment. The environment, which can be an urban road network, is represented by a graph where the travel time for selected road segments (impeded edges) is a random variable because of traffic congestion. An unmanned ground vehicle (UGV) wishes to travel from a starting location to a destination while minimizing t…
▽ More
In this article, we consider a multi-agent path planning problem in a stochastic environment. The environment, which can be an urban road network, is represented by a graph where the travel time for selected road segments (impeded edges) is a random variable because of traffic congestion. An unmanned ground vehicle (UGV) wishes to travel from a starting location to a destination while minimizing the arrival time at the destination. UGV can traverse through an impeded edge but the true travel time is only realized at the end of that edge. This implies that the UGV can potentially get stuck in an impeded edge with high travel time. A support vehicle, such as an unmanned aerial vehicle (UAV) is simultaneously deployed from its starting position to assist the UGV by inspecting and realizing the true cost of impeded edges. With the updated information from UAV, UGV can efficiently reroute its path to the destination. The UGV does not wait at any time until it reaches the destination. The UAV is permitted to terminate its path at any vertex. The goal is then to develop an online algorithm to determine efficient paths for the UGV and the UAV based on the current information so that the UGV reaches the destination in minimum time. We refer to this problem as Stochastic Assisted Path Planning (SAPP). We present Dynamic $k$-Shortest Path Planning (D*KSPP) algorithm for the UGV planning and Rural Postman Problem (RPP) formulation for the UAV planning. Due to the scalability challenges of RPP, we also present a heuristic based Priority Assignment Algorithm (PAA) for the UAV planning. Computational results are presented to corroborate the effectiveness of the proposed algorithm to solve SAPP.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Virtual Target Selection for a Multiple-Pursuer Multiple-Evader Scenario
Authors:
Isaac E. Weintraub,
Alexander Von Moll,
David W. Casbeer,
Satyanarayana G. Manyam
Abstract:
This paper considers an M-pursuer N-evader scenario involving virtual targets. The virtual targets serve as an intermediary target for the pursuers, allowing the pursuers to delay their final assignment to the evaders. However, upon reaching the virtual target, the pursuers must decide which evader to capture. It is assumed that there are more pursuers than evaders and that the pursuers are faster…
▽ More
This paper considers an M-pursuer N-evader scenario involving virtual targets. The virtual targets serve as an intermediary target for the pursuers, allowing the pursuers to delay their final assignment to the evaders. However, upon reaching the virtual target, the pursuers must decide which evader to capture. It is assumed that there are more pursuers than evaders and that the pursuers are faster than the evaders. The objective is two-part: first, assign each pursuer to a virtual target and evader such that the pursuer team's energy is minimized, and second, choose the virtual targets' locations for this minimization problem. The approach taken is to consider the Apollonius geometry between each pursuer's virtual target location and each evader. Using the constructed Apollonius circles, the pursuer's travel distance and maneuver at a virtual target are obtained. These metrics serve as a gauge for the total energy required to capture a particular evader and are used to solve the joint virtual target selection and pursuer-evader assignment problem. This paper provides a mathematical definition of this problem, the solution approach taken, and an example.
△ Less
Submitted 20 December, 2023; v1 submitted 30 May, 2023;
originally announced May 2023.
-
Perimeter Defense using a Turret with Finite Range and Service Times
Authors:
Shivam Bajaj,
Shaunak D. Bopardikar,
Alexander Von Moll,
Eric Torng,
David W. Casbeer
Abstract:
We consider a perimeter defense problem in a planar conical environment comprising a single turret that has a finite range and non-zero service time. The turret seeks to defend a concentric perimeter against $N\geq 2$ intruders. Upon release, each intruder moves radially towards the perimeter with a fixed speed. To capture an intruder, the turret's angle must be aligned with that of the intruder's…
▽ More
We consider a perimeter defense problem in a planar conical environment comprising a single turret that has a finite range and non-zero service time. The turret seeks to defend a concentric perimeter against $N\geq 2$ intruders. Upon release, each intruder moves radially towards the perimeter with a fixed speed. To capture an intruder, the turret's angle must be aligned with that of the intruder's angle and must spend a specified service time at that orientation. We address offline and online versions of this optimization problem. Specifically, in the offline version, we establish that in general parameter regimes, this problem is equivalent to solving a Travelling Repairperson Problem with Time Windows (TRP-TW). We then identify specific parameter regimes in which there is a polynomial time algorithm that maximizes the number of intruders captured. In the online version, we present a competitive analysis technique in which we establish a fundamental guarantee on the existence of at best $(N-1)$-competitive algorithms. We also design two online algorithms that are provably $1$ and $2$-competitive in specific parameter regimes.
△ Less
Submitted 4 February, 2023;
originally announced February 2023.
-
Development of Linear Battery Model for Path Planning with Mixed Integer Linear Programming: Simulated and Experimental Validation
Authors:
Drew Scott,
Satyanarayana G. Manyam,
David W. Casbeer,
Manish Kumar,
Isaac E. Weintraub,
Michael J. Rothenberger
Abstract:
Mixed Integer Linear Programs (MILPs) are often used in the path planning of both ground and aerial vehicles. Such a formulation of the path planning problem requires a linear objective function and constraints, limiting the fidelity of the the tracking of vehicle states. One such parameter is the state of charge of the battery used to power the vehicle. Accurate battery state estimation requires…
▽ More
Mixed Integer Linear Programs (MILPs) are often used in the path planning of both ground and aerial vehicles. Such a formulation of the path planning problem requires a linear objective function and constraints, limiting the fidelity of the the tracking of vehicle states. One such parameter is the state of charge of the battery used to power the vehicle. Accurate battery state estimation requires nonlinear differential equations to be solved. This state estimation is important in path planning to ensure flyable paths, however when using MILPs to formulate the path planning problem these nonlinear equations cannot be implemented. Poor accuracy in battery estimation during the path planning runs the risk of the planned path being feasible by the estimation model but in reality will deplete the battery to a critical level. To the end of higher accuracy battery estimation within a MILP, we present here a simple linear battery model which predicts the change in state-of-charge (SOC) of a battery given a power draw and duration. This model accounts for changes in battery voltage due to applied electrical load and changes in battery SOC. The battery model is presented and then tested against alternate battery models in numerical and in experimental tests. Further, the effect the proposed linear model has over a simpler SOC estimation on the time-to-solve a resource constrained shortest path problem is also evaluated, implemented in two different algorithms. It is seen that the linear model performs well in battery state estimation while remaining implementable in a Linear Program or MILP, with little affect on the time-to-solve.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
Cooperative Coverage with a Leader and a Wingmate in Communication-Constrained Environments
Authors:
Sai Krishna Kanth Hari,
Sivakumar Rathinam,
Swaroop Darbha,
David W. Casbeer
Abstract:
We consider a mission framework in which two unmanned vehicles (UVs), a leader and a wingmate, are required to provide cooperative coverage of an environment while being within a short communication range. This framework finds applications in underwater and/or military domains, where certain constraints are imposed on communication by either the application or the environment. An important objecti…
▽ More
We consider a mission framework in which two unmanned vehicles (UVs), a leader and a wingmate, are required to provide cooperative coverage of an environment while being within a short communication range. This framework finds applications in underwater and/or military domains, where certain constraints are imposed on communication by either the application or the environment. An important objective of missions within this framework is to minimize the total travel and communication costs of the leader-wingmate duo. In this paper, we propose and formulate the problem of finding routes for the UVs that minimize the sum of their travel and communication costs as a network optimization problem of the form of a binary program (BP). The BP is computationally expensive, with the time required to compute optimal solutions increasing rapidly with the problem size. To address this challenge, here, we propose two algorithms, an approximation algorithm and a heuristic algorithm, to solve large-scale instances of the problem swiftly. We demonstrate the effectiveness and the scalability of these algorithms through an analysis of extensive numerical simulations performed over 500 instances, with the number of targets in the instances ranging from 6 to 100.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
Surveillance of a Faster Fixed-Course Target
Authors:
Isaac E. Weintraub,
Alexander Von Moll,
Eloy Garcia,
David W. Casbeer,
Meir Pachter
Abstract:
The maximum surveillance of a target which is holding course is considered, wherein an observer vehicle aims to maximize the time that a faster target remains within a fixed-range of the observer. This entails two coupled phases: an approach phase and observation phase. In the approach phase, the observer strives to make contact with the faster target, such that in the observation phase, the obser…
▽ More
The maximum surveillance of a target which is holding course is considered, wherein an observer vehicle aims to maximize the time that a faster target remains within a fixed-range of the observer. This entails two coupled phases: an approach phase and observation phase. In the approach phase, the observer strives to make contact with the faster target, such that in the observation phase, the observer is able to maximize the time where the target remains within range. Using Pontryagin's Minimum Principle, the optimal control laws for the observer are found in closed-form. Example scenarios highlight various aspects of the engagement.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Path Planning and Energy Management of Hybrid Air Vehicles for Urban Air Mobility
Authors:
Satyanarayana G. Manyam,
David W. Casbeer,
Swaroop Darbha,
Isaac E. Weintraub,
Krishna Kalyanam
Abstract:
A novel coupled path planning and energy management problem for a hybrid unmanned air vehicle is considered, where the hybrid vehicle is powered by a dual gas/electric system. Such an aerial robot is envisioned for use in an urban setting where noise restrictions are in place in certain zones necessitating battery only operation. We consider the discrete version of this problem, where a graph is c…
▽ More
A novel coupled path planning and energy management problem for a hybrid unmanned air vehicle is considered, where the hybrid vehicle is powered by a dual gas/electric system. Such an aerial robot is envisioned for use in an urban setting where noise restrictions are in place in certain zones necessitating battery only operation. We consider the discrete version of this problem, where a graph is constructed by sampling the boundaries of the restricted zones, and develop a path planning algorithm. The planner simultaneously solves the path planing along with the energy mode switching control, under battery constraints and noise restrictions. This is a coupled problem involving discrete decision making to find the path to travel, and determining the state of charge of the battery along the path, which is a continuous variable. A sampling based algorithm to find near optimal solution to this problem is presented. To quantify the efficacy of the solution, an algorithm that computes tight lower bounds is also presented. The algorithms presented are verified using numerical simulations, and the average gap between the feasible solutions (upper bounds) and the lower bounds are, empirically, shown to be within 15% of each other.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
Assisted Shortest Path Planning for a Convoy through a Repairable Network
Authors:
Abhay Singh Bhadoriya,
Christopher Montez,
Sivakumar Rathinam,
Swaroop Darbha,
David W. Casbeer,
Satyanarayana G. Manyam
Abstract:
In this article, we consider a multi-agent path planning problem in a partially impeded environment. The impeded environment is represented by a graph with select road segments (edges) in disrepair impeding vehicular movement in the road network. A convoy wishes to travel from a starting location to a destination while minimizing some accumulated cost. The convoy may traverse an impeded edge for a…
▽ More
In this article, we consider a multi-agent path planning problem in a partially impeded environment. The impeded environment is represented by a graph with select road segments (edges) in disrepair impeding vehicular movement in the road network. A convoy wishes to travel from a starting location to a destination while minimizing some accumulated cost. The convoy may traverse an impeded edge for an additional cost (associated with repairing the edge) than if it were unimpeded. A second vehicle, referred to as a service vehicle, is simultaneously deployed with the convoy. The service vehicle assists the convoy by repairing an edge, reducing the cost for the convoy to traverse that edge. The convoy is permitted to wait at any vertex to allow the service vehicle to complete repairing an edge. The service vehicle is permitted to terminate its path at any vertex. The goal is then to find a pair of paths so the convoy reaches its destination while minimizing the total time (cost) the two vehicles are active, including any time the convoy waits. We refer to this problem as the Assisted Shortest Path Problem (ASPP). We present a generalized permanent labeling algorithm to find an optimal solution for the ASPP. We also introduce additional modifications to the labeling algorithm to significantly improve the computation time and refer to the modified labeling algorithm as $GPLA^*$. Computational results are presented to illustrate the effectiveness of $GPLA^*$ in solving the ASPP. We then give concluding remarks and briefly discuss potential variants of the ASPP for future work.
△ Less
Submitted 10 April, 2022; v1 submitted 1 April, 2022;
originally announced April 2022.
-
Optimal Geodesic Curvature Constrained Dubins' Paths on a Sphere
Authors:
Swaroop Darbha,
Athindra Pavan,
K. R. Rajagopal,
Sivakumar Rathinam,
David W. Casbeer,
Satyanarayana G. Manyam
Abstract:
In this article, we consider the motion planning of a rigid object on the unit sphere with a unit speed. The motion of the object is constrained by the maximum absolute value, $U_{max}$ of geodesic curvature of its path; this constrains the object to change the heading at the fastest rate only when traveling on a tight smaller circular arc of radius $r <1$, where $r$ depends on the bound,…
▽ More
In this article, we consider the motion planning of a rigid object on the unit sphere with a unit speed. The motion of the object is constrained by the maximum absolute value, $U_{max}$ of geodesic curvature of its path; this constrains the object to change the heading at the fastest rate only when traveling on a tight smaller circular arc of radius $r <1$, where $r$ depends on the bound, $U_{max}$. We show in this article that if $0<r \le \frac{1}{2}$, the shortest path between any two configurations of the rigid body on the sphere consists of a concatenation of at most three circular arcs. Specifically, if $C$ is the smaller circular arc and $G$ is the great circular arc, then the optimal path can only be $CCC, CGC, CC, CG, GC, C$ or $G$. If $r> \frac{1}{2}$, while paths of the above type may cease to exist depending on the boundary conditions and the value of $r$, optimal paths may be concatenations of more than three circular arcs.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Optimal Strategies for the Game of Protecting a Plane in 3-D
Authors:
Eloy Garcia,
Isaac Weintraub,
David W. Casbeer,
Meir Pachter
Abstract:
A conflict between rational and autonomous agents is considered. The paper addresses a differential game of protecting a target in the 3-D space. This problem highlights the strong correlation between the highly dynamic scenario, the uncertainty on the behavior of the adversary, and the online and robust computation of state-feedback strategies which guarantee the required level of performance of…
▽ More
A conflict between rational and autonomous agents is considered. The paper addresses a differential game of protecting a target in the 3-D space. This problem highlights the strong correlation between the highly dynamic scenario, the uncertainty on the behavior of the adversary, and the online and robust computation of state-feedback strategies which guarantee the required level of performance of each player. This work significantly expands previous results around this problem by providing the players' state-feedback saddle-point strategies. Additionally, the continuously differentiable Value function of the multi-agent differential game is obtained and it is shown to be the solution of the Hamilton-Jacobi-Isaacs equation. Finally, the Barrier surface is explicitly obtained and illustrative examples highlight the robustness properties and the guarantees provided by the saddle-point strategies obtained in this paper.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
Competitive Perimeter Defense of Conical Environments
Authors:
Shivam Bajaj,
Eric Torng,
Shaunak D. Bopardikar,
Alexander Von Moll,
Isaac Weintraub,
Eloy Garcia,
David W. Casbeer
Abstract:
We consider a perimeter defense problem in a planar conical environment in which a single vehicle, having a finite capture radius, aims to defend a concentric perimeter from mobile intruders. The intruders are arbitrarily released at the circumference of the environment and they move radially toward the perimeter with fixed speed. We present a competitive analysis approach to this problem by measu…
▽ More
We consider a perimeter defense problem in a planar conical environment in which a single vehicle, having a finite capture radius, aims to defend a concentric perimeter from mobile intruders. The intruders are arbitrarily released at the circumference of the environment and they move radially toward the perimeter with fixed speed. We present a competitive analysis approach to this problem by measuring the performance of multiple online algorithms for the vehicle against arbitrary inputs, relative to an optimal offline algorithm that has information about entire input sequence in advance. In particular, we establish two necessary conditions on the parameter space to guarantee (i) finite competitiveness of any algorithm and (ii) a competitive ratio of at least 2 for any algorithm. We then design and analyze three online algorithms and characterize parameter regimes in which they have finite competitive ratios. Specifically, our first two algorithms are provably 1, and 2-competitive, respectively, whereas our third algorithm exhibits different competitive ratios in different regimes of problem parameters. Finally, we provide a numerical plot in the parameter space to reveal additional insights into the relative performance of our algorithms.
△ Less
Submitted 29 March, 2022; v1 submitted 9 October, 2021;
originally announced October 2021.
-
A Differential Game Approach for Beyond Visual Range Tactics
Authors:
Eloy Garcia,
David W. Casbeer,
Dzung Tran,
Meir Pachter
Abstract:
An operational relevant conflict between teams of autonomous vehicles in the Beyond Visual Range domain is addressed in this paper. Optimal strategies are designed in order for a team of air interceptors to protect a high value asset and block the attacking team at a safe distance from such asset. The attacking agents take specific roles of leader and wingman and also devise their own optimal stra…
▽ More
An operational relevant conflict between teams of autonomous vehicles in the Beyond Visual Range domain is addressed in this paper. Optimal strategies are designed in order for a team of air interceptors to protect a high value asset and block the attacking team at a safe distance from such asset. The attacking agents take specific roles of leader and wingman and also devise their own optimal strategies in order to launch an attack as close as possible from the asset. The problem is formulated as a zero-sum differential game between players with different speed over two stages: the attack and the retreat stages. For each stage the state-feedback optimal strategies of each player are derived in analytical form.
△ Less
Submitted 22 September, 2020;
originally announced September 2020.
-
The Barrier Surface in the Cooperative Football Differential Game
Authors:
Eloy Garcia,
David W. Casbeer,
Meir Pachter
Abstract:
This paper considers the blocking or football pursuit-evasion differential game. Two pursuers cooperate and try to capture the ball carrying evader as far as possible from the goal line. The evader wishes to be as close as possible to the goal line at the time of capture and, if possible, reach the line. In this paper the solution of the game of kind is provided: The Barrier surface that partition…
▽ More
This paper considers the blocking or football pursuit-evasion differential game. Two pursuers cooperate and try to capture the ball carrying evader as far as possible from the goal line. The evader wishes to be as close as possible to the goal line at the time of capture and, if possible, reach the line. In this paper the solution of the game of kind is provided: The Barrier surface that partitions the state space into two winning sets, one for the pursuer team and one for the evader, is constructed. Under optimal play, the winning team is determined by evaluating the associated Barrier function.
△ Less
Submitted 5 June, 2020;
originally announced June 2020.
-
The Complete Differential Game of Active Target Defense
Authors:
Eloy Garcia,
David W. Casbeer,
Meir Pachter
Abstract:
In the Target-Attacker-Defender (TAD) differential game, an Attacker missile strives to capture a Target aircraft. The Target tries to escape the Attacker and is aided by a Defender missile which aims at intercepting the Attacker before the latter manages to close in on the Target. The conflict between these intelligent adversaries has been suitably modeled as a zero-sum differential game. Optimal…
▽ More
In the Target-Attacker-Defender (TAD) differential game, an Attacker missile strives to capture a Target aircraft. The Target tries to escape the Attacker and is aided by a Defender missile which aims at intercepting the Attacker before the latter manages to close in on the Target. The conflict between these intelligent adversaries has been suitably modeled as a zero-sum differential game. Optimal strategies have been synthesized covering the region of the state space where the Target/Defender team is able to win the game. However, the Game of Degree in the Attacker's region of win has not been fully addressed. Preliminary attempts at designing the players' strategies have not been proven to be optimal in the differential game sense. The main results of the paper present the optimal strategies of the Game of Degree in the Attacker's winning region of the state space. It is proven that the obtained strategies provide the saddle-point solution of the game; the Value function is obtained and it is shown to be continuous and continuously differentiable. It is also demonstrated that it is the solution of the Hamilton-Jacobi-Isaacs (HJI) equation. Finally, the obtained strategies are compared to recent results addressing the TAD differential game in [22]. It is shown by counterexample that the strategies proposed in [22] are not optimal. The unique regular solution of this differential game that actually provides a semipermeable Barrier surface is synthesized and verified in this paper.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.
-
Multiple Pursuer Multiple Evader Differential Games
Authors:
Eloy Garcia,
David W. Casbeer,
Alexander Von Moll,
Meir Pachter
Abstract:
In this paper an N-pursuer vs. M-evader team conflict is studied. The differential game of border defense is addressed and we focus on the game of degree in the region of the state space where the pursuers are able to win. This work extends classical differential game theory to simultaneously address weapon assignments and multi-player pursuit-evasion scenarios. Saddle-point strategies that provid…
▽ More
In this paper an N-pursuer vs. M-evader team conflict is studied. The differential game of border defense is addressed and we focus on the game of degree in the region of the state space where the pursuers are able to win. This work extends classical differential game theory to simultaneously address weapon assignments and multi-player pursuit-evasion scenarios. Saddle-point strategies that provide guaranteed performance for each team regardless of the actual strategies implemented by the opponent are devised. The players' optimal strategies require the co-design of cooperative optimal assignments and optimal guidance laws. A representative measure of performance is proposed and the Value function of the game is obtained. It is shown that the Value function is continuous, continuously differentiable, and that it satisfies the Hamilton-Jacobi-Isaacs equation - the curse of dimensionality is overcome and the optimal strategies are obtained. The cases of N=M and N>M are considered. In the latter case, cooperative guidance strategies are also developed in order for the pursuers to exploit their numerical advantage. This work provides a foundation to formally analyze complex and high-dimensional conflicts between teams of N pursuers and M evaders by means of differential game theory.
△ Less
Submitted 9 November, 2019;
originally announced November 2019.
-
Cooperative Routing for an Air-Ground Vehicle Team -- Exact Algorithm, Transformation Method, and Heuristics
Authors:
Satyanarayana G. Manyam,
Kaarthik Sundar,
David W. Casbeer
Abstract:
This article considers a cooperative vehicle routing problem for an intelligence, surveillance, and reconnaissance mission in the presence of communication constraints between the vehicles. The proposed framework uses a ground vehicle and an Unmanned Aerial Vehicle (UAV) that travel cooperatively and visit a set of targets while satisfying the communication constraints. The problem is formulated a…
▽ More
This article considers a cooperative vehicle routing problem for an intelligence, surveillance, and reconnaissance mission in the presence of communication constraints between the vehicles. The proposed framework uses a ground vehicle and an Unmanned Aerial Vehicle (UAV) that travel cooperatively and visit a set of targets while satisfying the communication constraints. The problem is formulated as a mixed-integer linear program, and a branch-and-cut algorithm is developed to solve the problem to optimality. Furthermore, a transformation method and a heuristic are also developed for the problem. The effectiveness of all the algorithms is corroborated through extensive computational experiments on several randomly generated instances.
△ Less
Submitted 28 February, 2019; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Multi-UAV Routing for Persistent Intelligence Surveillance & Reconnaissance Missions
Authors:
Satyanarayana G. Manyam,
Steven Rasmussen,
David W. Casbeer,
Krishnamoorthy Kalyanam,
Suresh Manickam
Abstract:
We consider a Persistent Intelligence, Surveillance and Reconnaissance (PISR) routing problem, which includes collecting data from a set of specified task locations and delivering that data to a control station. Each task is assigned a refresh rate based on its priority, where higher priority tasks require higher refresh rates. The UAV team's objective is to minimize the maximum of the delivery ti…
▽ More
We consider a Persistent Intelligence, Surveillance and Reconnaissance (PISR) routing problem, which includes collecting data from a set of specified task locations and delivering that data to a control station. Each task is assigned a refresh rate based on its priority, where higher priority tasks require higher refresh rates. The UAV team's objective is to minimize the maximum of the delivery times of all the tasks' data to the control station, while simultaneously, satisfying each task's revisit period constraint. The centralized path planning problem for this PISR routing problem is formulated using mixed integer linear programming and solved using a branch-and-cut algorithm. Heuristics are presented to find sub-optimal feasible solutions that require much less computation time. The algorithms are tested on several instances and their performance is compared with respect to the optimal cost and computation time.
△ Less
Submitted 27 February, 2017;
originally announced February 2017.
-
Pursuit on a Graph under Partial Information from Sensors
Authors:
Shreyas Sundaram,
Krishnamoorthy Kalyanam,
David W. Casbeer
Abstract:
We consider a class of pursuit-evasion problems where an evader enters a directed acyclic graph and attempts to reach one of the terminal nodes. A pursuer enters the graph at a later time and attempts to capture the evader before it reaches a terminal node. The pursuer can only obtain information about the evader's path via sensors located at each node in the graph; the sensor measurements are eit…
▽ More
We consider a class of pursuit-evasion problems where an evader enters a directed acyclic graph and attempts to reach one of the terminal nodes. A pursuer enters the graph at a later time and attempts to capture the evader before it reaches a terminal node. The pursuer can only obtain information about the evader's path via sensors located at each node in the graph; the sensor measurements are either green or red (indicating whether or not the evader has passed through that node). We first show that it is NP-hard to determine whether the pursuer can enter with some nonzero delay and still be guaranteed to capture the evader, even for the simplest case when the underlying graph is a tree. This also implies that it is NP-hard to determine the largest delay at which the pursuer can enter and still have a guaranteed capture policy. We further show that it is NP-hard to approximate (within any constant factor) the largest delay at which the pursuer can enter. Finally, we provide an algorithm to compute the maximum pursuer delay for a class of node-sweeping policies on tree networks and show that this algorithm runs in linear-time for bounded-degree trees.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Decentralized Event-Triggered Consensus over Unreliable Communication Networks
Authors:
Eloy Garcia,
Yongcan Cao,
David W. Casbeer
Abstract:
This article studies distributed event-triggered consensus over unreliable communication channels. Communication is unreliable in the sense that the broadcast channel from one agent to its neighbors can drop the event-triggered packets of information, where the transmitting agent is unaware that the packet was not received and the receiving agents have no knowledge of the transmitted packet. Addit…
▽ More
This article studies distributed event-triggered consensus over unreliable communication channels. Communication is unreliable in the sense that the broadcast channel from one agent to its neighbors can drop the event-triggered packets of information, where the transmitting agent is unaware that the packet was not received and the receiving agents have no knowledge of the transmitted packet. Additionally, packets that successfully arrive at their destination may suffer from time-varying communication delays. In this paper, we consider directed graphs, and we also relax the consistency on the packet dropouts and the delays. Relaxing consistency means that the delays and dropouts for a packet broadcast by one agent can be different for each receiving node. We show that even under this challenging scenario, agents can reach consensus asymptotically while reducing transmissions of measurements based on the proposed event-triggered consensus protocol. In addition, positive inter-event times are obtained which guarantee that Zeno behavior does not occur.
△ Less
Submitted 23 November, 2015;
originally announced November 2015.
-
Escape Regions of the Active Target Defense Differential Game
Authors:
Eloy Garcia,
David W. Casbeer,
Meir Pachter
Abstract:
The active target defense differential game is addressed in this paper. In this differential game an Attacker missile pursues a Target aircraft. The aircraft is however aided by a Defender missile launched by, say, the wingman, to intercept the Attacker before it reaches the Target aircraft. Thus, a team is formed by the Target and the Defender which cooperate to maximize the separation between th…
▽ More
The active target defense differential game is addressed in this paper. In this differential game an Attacker missile pursues a Target aircraft. The aircraft is however aided by a Defender missile launched by, say, the wingman, to intercept the Attacker before it reaches the Target aircraft. Thus, a team is formed by the Target and the Defender which cooperate to maximize the separation between the Target aircraft and the point where the Attacker missile is intercepted by the Defender missile, while the Attacker simultaneously tries to minimize said distance. This paper focuses on characterizing the set of coordinates such that if the Target's initial position belong to this set then its survival is guaranteed if both the Target and the Defender follow their optimal strategies. Such optimal strategies are presented in this paper as well.
△ Less
Submitted 29 April, 2015;
originally announced April 2015.
-
Periodic Event-Triggered Synchronization of Linear Multi-agent Systems with Communication Delays
Authors:
Eloy Garcia,
Yongcan Cao,
David W. Casbeer
Abstract:
Multi-agent systems cooperation to achieve global goals is usually limited by sensing, actuation, and communication issues. At the local level, continuous measurement and actuation is only approximated by the use of digital mechanisms that measure and process information in order to compute and update new control input values at discrete time instants. Interaction with other agents or subsystems t…
▽ More
Multi-agent systems cooperation to achieve global goals is usually limited by sensing, actuation, and communication issues. At the local level, continuous measurement and actuation is only approximated by the use of digital mechanisms that measure and process information in order to compute and update new control input values at discrete time instants. Interaction with other agents or subsystems takes place, in general, through a digital communication channel with limited bandwidth where transmission of continuous-time signals is not possible. Additionally, communication channels may be subject to other imperfections such as time-varying delays. This paper considers the problem of consensus (or synchronization of state trajectories) of multi-agent systems that are described by general linear dynamics and are connected using undirected graphs. An event-triggered consensus protocol is proposed, where each agent implements discretized and decoupled models of the states of its neighbors. This approach not only avoids the need for continuous communication between agents but also provides a decentralized method for transmission of information in the presence of time-varying communication delays where each agent decides its own broadcasting time instants based only on local information. This method gives more flexibility for scheduling information broadcasting compared to periodic and sampled-data implementations. The use of discretized models by each agent allows for a periodic event-triggered strategy where continuous actuation and continuous measurement of the states are not necessary.
△ Less
Submitted 14 April, 2015;
originally announced April 2015.
-
Decentralized Event-Triggered Consensus of Linear Multi-agent Systems under Directed Graphs
Authors:
Eloy Garcia,
Yongcan Cao,
Xiaofeng Wang,
David W. Casbeer
Abstract:
An event-triggered control technique for consensus of multi-agent systems with general linear dynamics is presented. This paper extends previous work to consider agents that are connected using directed graphs. Additionally, the approach shown here provides asymptotic consensus with guaranteed positive inter-event time intervals. This event-triggered control method is also used in the case where c…
▽ More
An event-triggered control technique for consensus of multi-agent systems with general linear dynamics is presented. This paper extends previous work to consider agents that are connected using directed graphs. Additionally, the approach shown here provides asymptotic consensus with guaranteed positive inter-event time intervals. This event-triggered control method is also used in the case where communication delays are present. For the communication delay case we also show that the agents achieve consensus asymptotically and that, for every agent, the time intervals between consecutive transmissions is lower-bounded by a positive constant.
△ Less
Submitted 11 February, 2015;
originally announced February 2015.
-
Active Target Defense Differential Game with a Fast Defender
Authors:
Eloy Garcia,
David W. Casbeer,
Meir Pachter
Abstract:
This paper addresses the active target defense differential game where an Attacker missile pursues a Target aircraft. A Defender missile is fired by the Target's wingman in order to intercept the Attacker before it reaches the aircraft. Thus, a team is formed by the Target and the Defender which cooperate to maximize the distance between the Target aircraft and the point where the Attacker missile…
▽ More
This paper addresses the active target defense differential game where an Attacker missile pursues a Target aircraft. A Defender missile is fired by the Target's wingman in order to intercept the Attacker before it reaches the aircraft. Thus, a team is formed by the Target and the Defender which cooperate to maximize the distance between the Target aircraft and the point where the Attacker missile is intercepted by the Defender missile, while the Attacker tries to minimize said distance. The results shown here extend previous work. We consider here the case where the Defender is faster than the Attacker. The solution to this differential game provides optimal heading angles for the Target and the Defender team to maximize the terminal separation between Target and Attacker and it also provides the optimal heading angle for the Attacker to minimize the said distance.
△ Less
Submitted 9 February, 2015;
originally announced February 2015.
-
Bridge Consensus: Ignoring Initial Inessentials
Authors:
David W. Casbeer,
Yongcan Cao,
Eloy Garcia,
Dejan Milutinovic
Abstract:
In this paper, the problem of bridge consensus is presented and solved. Bridge consensus consists of a network of nodes, some of whom are participating and others are non-participating. The objective is for all the agents to reach average consensus of the participating nodes initial values in a distributed and scalable manner. To do this, the nodes must use the network connections of the non-parti…
▽ More
In this paper, the problem of bridge consensus is presented and solved. Bridge consensus consists of a network of nodes, some of whom are participating and others are non-participating. The objective is for all the agents to reach average consensus of the participating nodes initial values in a distributed and scalable manner. To do this, the nodes must use the network connections of the non-participating nodes, which act as bridges for information and ignore the initial values of the non-participating nodes. The solution to this problem is made by merging the ideas from estimation theory and consensus theory. By considering the participating nodes has having equal information and the non-participating nodes as having no information, the nodes initial values are transformed into information space. Two consensus filters are run in parallel on the information state and information matrix. Conditions ensuring that the product of the inverse information matrix and the information state of each agent reaches average consensus of the participating agents' initial values is given.
△ Less
Submitted 12 January, 2015;
originally announced January 2015.