Beruflich Dokumente
Kultur Dokumente
Abstract—This paper presents an end-to-end solution to the 3) For each UAV with velocity constraints ,
cooperative control problem represented by the scenario where determine a path (specified via waypoints), such that if
unmanned air vehicles (UAVs) are assigned to transition the UAV were to fly along straight-line paths, it could
through known target locations in the presence of dynamic
threats. The problem is decomposed into the subproblems of: complete the path in the specified TOT, while satisfying
1) cooperative target assignment; 2) coordinated UAV intercept; the given velocity constraints.
3) path planning; 4) feasible trajectory generation; and 5) asymp- 4) Transform each waypoint path into a feasible trajectory
totic trajectory following. The design technique is based on a for the UAV. By feasible, we mean that the turning rate
hierarchical approach to coordinated control. Simulation results constraints and velocity constraints are not violated along
are presented to demonstrate the effectiveness of the approach.
the trajectory. Also, the trajectory should have the same
Index Terms—Cooperation, multiagent coordination, path plan- TOT as the path specified by waypoints.
ning, trajectory generation, unmanned air vehicles. 5) Develop globally asymptotically stable controllers for
each UAV, such that the UAVs track their specified
I. INTRODUCTION AND PROBLEM STATEMENT trajectory.
In this paper, we propose an approach to this problem, and
Fig. 2. System architecture for a single UAV. Fig. 3. Threat-based Voronoi diagram. The threats are represented by dots.
The trajectory generation block in Fig. 2 receives a set of way- equidistant from the closest threats, thereby maximizing their
points, which specify the desired path of the UAV. The way- distance from the closest threats. The initial and target locations
points the trajectory generator receives are not parameterized in are also contained within cells and are connected to the nodes
time, they are simply a set of , , and coordinates. The forming the cell. Fig. 3 shows a Voronoi diagram created for a
role of the trajectory generator is to generate a feasible time set of threats, UAV location, and target location.
trajectory for the UAV. By feasible, we mean that in the ab- Each edge of the Voronoi diagram is assigned two costs: a
sence of disturbances and modeling errors, an input trajectory threat cost and a length cost. Threat costs are based on a UAV’s
causes the UAV to fly the trajectory without violating its velocity exposure to a radar located at the threat. Assuming that the UAV
and heading rate constraints. The trajectory generator outputs a radar signature is uniform in all directions and is proportional
flag that indicates when a new waypoint path is needed. Several to (where is the distance from the UAV to the threat),
events may necessitate a new path. First, the UAV may success- the threat cost for traveling along an edge is inversely propor-
fully complete its path. Second, a pop-up threat may be detected tional to the distance (to the threat) to the fourth power. An exact
in the environment. Third, because of disturbances, the tracking threat cost calculation would involve the integration of the cost
error may become unacceptably large. The design of the trajec- along each edge. A computationally more efficient and accept-
tory generator is discussed in Section III-D. ably accurate approximation to the exact solution is to calcu-
The communication manager shown in Fig. 2 facilitates late the threat cost at several locations along an edge and take
communication between different UAVs. Each UAV imple- the length of the edge into account. In this work, the threat cost
ments a separate target manager, intercept manager, and path was calculated at three points along each edge: , , and
planner. Therefore, the decisions reached by these functional , where is the length of edge . The threat cost associ-
blocks must be synchronized among the different UAVs. ated with the th edge is given by the expression
The primary role of the communication manager is to ensure
synchronization. The design of communication managers for
multiple cooperating autonomous vehicles has been discussed (1)
in [23] for UAVs, and [24] for autonomous underwater vehicles.
where is the total number of threats, is the distance
A. Path Planner from the 1/2 point on the th edge to the th threat, and is a
constant scale factor. Using this three-term approximation, er-
The path planner shown in Fig. 2 is used by both the target rors were typically less than two percent for threats most closely
manager and the intercept manager. The output of the path situated to an edge, and on the order of tenths of a percent for
planner is a set of waypoints and commanded velocity for each threats located at a distance.
vehicle. Paths from the initial vehicle location to the target To include the path length as part of the cost, the length cost
location are derived from a -best paths graph search [15] of a associated with each edge is
Voronoi diagram that is constructed from the known threat lo-
cations [25]. Creating the Voronoi diagram entails partitioning (2)
the region of interest with threats into convex polygons or
cells. Each cell contains exactly one threat, and every location The total cost for traveling along an edge comes from a weighted
within a given cell is closer to its associated threat than to any sum of the threat and length costs
other threat. By using threat locations to create the diagram,
the resulting Voronoi polygon edges form a set of lines that are (3)
914 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 18, NO. 6, DECEMBER 2002
The choice of between 0 and 1 gives the designer flexibility The first step is to use the path planner described in Sec-
to place weight on exposure to threats or fuel expenditure de- tion III-A to generate -best paths to each target. Associated
pending on the particular mission scenario. A value closer to with these -best paths is a median length cost, denoted as
1 would result in the shortest paths, with little regard for the ex- , and a median threat exposure cost, denoted as
posure to radar, while a value closer to 0 would result in paths , where is the th UAV and is the th target.
that avoid threat exposure at the expense of longer path length. The median operator throws away targets that have only one
For this work, a value of 0.25 was found to produce paths that good path but keeps targets that have at least reasonable
were balanced in terms of threat avoidance and path length. paths.
With the cost determined for each of the Voronoi edges, the For an individual UAV, close targets are deemed acceptable,
Voronoi diagram is searched to find the set of lowest-cost can- while targets with large threat exposure are deemed rejectable.
didate paths between the initial UAV location and the location Normalized measures of acceptability and rejectability can be
of the target. The graph search is carried out using a variation defined as
of Eppstein’s -best paths algorithm [15]. For the results pre-
sented here, ten candidate paths are calculated for each vehicle.
In Fig. 3, the five best paths to the target are shown.
Taken in different combinations, the edges of the Voronoi
diagram provide a rich set of paths from the starting point to
(4)
the target. A great advantage of the Voronoi diagram approach
is that it reduces the path-planning problem from an infinite-
dimensional search, to a finite-dimensional graph search. This
important abstraction makes the path-planning problem feasible
in near-real time. Because the resulting Voronoi-based paths (5)
inherently avoid threats, the significant reduction in the solution
space that occurs tends to eliminate paths that are undesirable The acceptability function assigns the closest target the
from a threat-avoidance perspective. highest measure of acceptability (equal to one), the most distant
target the lowest measure of acceptability (equal to zero),
B. Target Manager and all other targets some assignment in the range . The
rejectability function assigns the target that requires the
Assume that there are targets, UAVs, and threats.
most threat exposure the highest measure of rejectability (equal
The task is to assign each vehicle to a target such that the overall
to one), the target that requires the least threat exposure the
group cost is mitigated, while maximizing the number of targets
lowest measure of rejectability (equal to zero), and all other
that are destroyed.
targets some assignment in the range . Notice that both of
For this type of decision problem, the standard approach is to
these functions can be computed in order time.
create an objective function that encodes the desired objectives
For each vehicle, we can identify the set of assignments that
of the decision problem. An optimal solution is one that max-
are individually satisficing. This set is given by
imizes this objective function. We can find the expected com-
plexity for finding an optimal solution to the target assignment
(6)
problem. For agents with targets, we must search through
possible assignments. Although for the world diagrammed
where is a selectivity index used to ensure that is
in Fig. 1, where and , an exhaustive search is
nonempty. Whenever the ShortPath objective has a more
possible; in worlds with a large number of vehicles and targets,
significant contribution than the AvoidThreats objective, the
an exhaustive search is not possible.
corresponding assignment is individually satisficing. In other
1) Individually Satisficing: In assigning targets to UAVs,
words, a vehicle balances the desire to take short paths with the
there are four objectives.
desire to avoid threats; the path to a target (relative to the path
1) Minimize the group path length to the target. length to the closest target) must be short enough to justify the
2) Minimize group threat exposure. risks that arise by coming into proximity with threats (relative
3) Maximize the number of vehicles prosecuting each target to the minimum threat proximity). Since each vehicle must
(to maximize survivability). accept an assignment, these heuristics are encoded relative
4) Maximize the number of targets visited. to the best and worst cases, thereby causing actions to be
We refer to these objectives as the ShortPath, AvoidThreats, evaluated with respect to the existing situation rather than with
MaxForce, and MaxSpread objectives, respectively. respect to an artificial standard. The value of can be adjusted
The ShortPath and AvoidThreats objectives are myopic ob- to ensure that is nonempty, or to reduce the size of .
jectives, whereas, the MaxForce and MaxSpread objectives are We are now in a position to explore the time complexity of
team objectives. The proposed solution methodology is based searching through the set of all individually satisficing options.
on the satisficing paradigm [6], used to select a set of potential Let denote the cardinality of the set . The time com-
targets that are acceptable for each UAV. The set of selected tar- plexity to find the optimal social welfare function over the set
gets is then used by each agent to negotiate an acceptable group of satisficing options is given by , which, in general,
assignment. is much less than , since .
BEARD et al.: COORDINATED TARGET ASSIGNMENT AND INTERCEPT FOR UNMANNED AIR VEHICLES 915
Fig. 5. Target assignment for case study scenario. Solid lines connect each
vehicle to its assigned target. The dotted lines represent satisficing paths for the
UAV in the bottom left corner. Fig. 7. Cooperative path planning algorithm.
Fig. 6. Frequency of occurrence of each team size for 1000 experimental trials.
line. In addition, the satisficing paths for the UAV in the bottom
left-hand corner are plotted as dotted lines. Note the preference
for nearby targets and targets that do not require passing too
close to threats.
One of the more interesting ways to quantify the algorithm
behavior is in the average chosen team size. Fig. 6 presents the Fig. 8. Coordination functions for two UAVs.
results for 1000 experimental trials. This figure demonstrates
that the algorithm tends to select teams with between two and
four agents per team, and tends to avoid teams of one and teams The corresponding waypoint paths avoid the threats and allow
greater than four. Thus, we can conclude that the team selec- for simultaneous arrival of the vehicles at the assigned target.
tion algorithm accomplishes our objective of maximizing the Once candidate paths have been determined by searching the
number of vehicles assigned to each target but also maximizing Voronoi graph, it remains to select which path each UAV should
the spread of the prosecution. If vehicles are too far away to fly. Path selection should result in minimal collective threat ex-
coordinate effectively (as enforced by the path length and threat posure for the team and simultaneous arrival of team members at
exposure tradeoff), then they naturally form smaller strike forces their target. The strategy for cooperatively planning UAV paths
to cover closer and more exposed targets. employed here is presented in detail in [12]. Fig. 7 depicts the
steps of the cooperative path planning algorithm.
Candidate paths to the target for UAV are parameterized by
C. Intercept Manager the waypoints and the UAV forward speed . TOT for each
Once teams have been formed and targets assigned to each UAV is a function of the speed of the UAV along the selected
team, it is necessary to plan the trajectories that each vehicle will path: . Similarly, the cost (threat and fuel) to
take to its respective target. We will assume that coordinating travel along any path to the target is a function of the path and the
the timing of target interception is critical. In the architecture speed: . To choose the best TOT for the team in a
developed here, the vehicles composing a team are required cooperative manner, some information regarding the candidate
to prosecute their target simultaneously to enhance mission paths for the UAVs must be exchanged. Rather than passing
effectiveness. The challenge is to determine the best TOT and around among all of the UAVs, a more efficient param-
specification for the team in light of the threat scenario and eterization of information, called the coordination function, is
dynamic capabilities of the vehicles. The output of the intercept used. In this problem, the coordination function models the
manager is a velocity and a set of waypoints for each vehicle. cost to UAV of achieving a particular TOT: .
BEARD et al.: COORDINATED TARGET ASSIGNMENT AND INTERCEPT FOR UNMANNED AIR VEHICLES 917
Fig. 10. Average threat cost, path length, and number of instantiations needed
for ten successes, versus number of threats.
Fig. 14. Mission scenario: one fourth of the way through the mission.
Fig. 12. Time-optimal transitions between path segments. The dashed line is
not constrained to go through the waypoint. The solid line is constrained to pass
through the waypoint.
Fig. 15. Mission scenario: one half of the way through the mission.
(8)
Fig. 18. Mission scenario: the second team has intercepted their target.
Fig. 16. Mission scenario: three quarters through the mission.
Algorithm 1:
ACKNOWLEDGMENT
The technical guidance of Dr. P. Chandler at AFLR is grate-
fully acknowledged. The authors would like to thank K. Judd
for assistance with developing the path planner.
REFERENCES
[1] R. E. Burkard, “Selected topics in assignment problems,” Inst. Math. B,
Tech. Univ. Graz, Graz, Austria, 1999.
[2] P. Stone and M. Veloso, “Task decomposition, dynamic role assignment,
and low-bandwidth communication for real-time strategic teamwork,”
Artif. Intell., vol. 110, no. 2, pp. 241–273, June 1999.
[3] F. Brandt, W. Brauer, and G. Weiß, “Task assignment in multiagent
systems based on Vickrey-type auctioning and leveled commitment
contracting,” in Proc. Cooperative Information Agents (CIA-2000)
Workshop, Boston, MA, 2000, pp. 95–106.
Fig. 22. Pop-up scenario: The first target is reached. [4] R. Borndörfer, A. Eisenblätter, M. Grötschel, and A. Martin, “Frequency
assignment in cellular phone networks,” in Proc. Int. Symp. Mathemat-
ical Programming, Lausanne, Switzerland, Aug. 24–29, 1997.
Pop-Up Threats: When pop-up threats are encountered [5] Y. Li, P. M. Pardalos, and M. G. C. Resende, “A greedy randomized
the target assignment algorithm is reinstantiated with the new adaptive search procedure for the quadratic assignment problem,” DI-
MACS Series on Discrete Math. and Theoretical Comp. Sci., vol. 16, pp.
threats list. Subsequently, the rendezvous manager and path 237–261, 1994.
planner are also reinstantiated. For clarity, the response to [6] W. C. Stirling and M. A. Goodrich, “Conditional preferences for social
pop-up threats is shown with a single UAV, assigned to a systems,” in Proc. IEEE Int. Conf. Systems, Man, Cybernetics, 2001, pp.
single target. The dotted line in Fig. 19 is the initial waypoint 995–1000.
[7] M. A. Goodrich, W. C. Stirling, and R. L. Frost, “A theory of satisficing
path. The solid line shows the trajectory produced by the TG decisions and control,” IEEE Trans. Syst., Man, and Cybern. A, vol. 28,
from the initial time until the instant immediately before the pp. 763–779, Nov. 1998.
detection of the first pop-up threat. In Fig. 20, a new threat at [8] , “Model predictive satisficing fuzzy logic control,” IEEE Trans.
location ( 15 km, 2 km) has been detected by the UAV. The Fuzzy Syst., vol. 7, pp. 319–332, June 1999.
[9] W. C. Stirling and M. A. Goodrich, “Satisficing games,” Inform. Sci.,
new waypoint path is shown in the dotted line. Fig. 21 shows vol. 114, pp. 255–280, Mar. 1999.
the state of the path planner/TG immediately after a second [10] R. Beard, R. Frost, and W. Stirling, “A hierarchical coordination scheme
pop-up threat has been detected at position ( 8 km, 5 km). for satellite formation initialization,” in Proc. AIAA Guidance, Naviga-
Finally, Fig. 22 shows the state of the path planner/TG at the tion and Control Conf., Boston, MA, Aug. 1998, AIAA Paper 98-4225,
pp. 677–685.
instant of time when the first target location has been reached [11] T. McLain and R. Beard, “Cooperative rendezvous of multiple un-
and a new waypoint path, represented by the dotted line, to the manned air vehicles,” in Proc. AIAA Guidance, Navigation and Control
next target has been planned. Conf., Denver, CO, Aug. 2000, AIAA Paper 2000-4369 (CD-ROM).
922 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 18, NO. 6, DECEMBER 2002
[12] T. McLain, P. Chandler, S. Rasmussen, and M. Pachter, “Cooperative Randal W. Beard (S’91–M’92) received the B.S. de-
control of UAV rendezvous,” in Proc. ACC, June 2001, pp. 2309–2314. gree in electrical engineering from the University of
[13] F. Gentili and F. Martinelli, “Robot group formations: A dynamic pro- Utah, Salt Lake City, in 1991, and the M.S. degree
gramming approach for a shortest path computation,” in Proc. IEEE in electrical engineering in 1993, the M.S. degree in
Int. Conf. Robotics and Automation, San Francisco, CA, Apr. 2000, pp. mathematics in 1994, and the Ph.D. degree in elec-
3152–3157. trical engineering in 1995, all from Rensselaer Poly-
[14] R. Sedgewick, Algorithms, 2nd ed. Reading, MA: Addison-Wesley, technic Institute, Troy, NY.
Since 1996, he has been with the Electrical and
1988.
Computer Engineering Department at Brigham
[15] D. Eppstein, “Finding the k shortest paths,” SIAM J. Comput., vol. 28,
Young University, Provo, UT, where he is currently
no. 2, pp. 652–673, 1999. an Associate Professor. In 1997 and 1998, he was a
[16] P. Chandler, S. Rasumussen, and M. Pachter, “UAV cooperative path Summer Faculty Fellow at the Jet Propulsion Laboratory, California Institute of
planning,” in Proc. AIAA Guidance, Navigation, and Control Conf., Technology, Pasadena, CA. His research interests include coordinated control
Denver, CO, Aug. 2000, AIAA Paper 2000-4370. of multiple vehicle systems and nonlinear and optimal control.
[17] M. J. Van Nieuwstadt and R. M. Murray, “Real time trajectory genera- Dr. Beard is a member of the AIAA, and Tau Beta Pi, and is currently an
tion for differentially flat systems,” Int. J. Robust Nonlinear Contr., vol. Associate Editor for the IEEE Control Systems Society Conference Editorial
8, no. 11, pp. 995–1020, 1998. Board.
[18] F. Lamiraux, S. Sekhavat, and J.-P. Laumond, “Motion planning and
control for Hilare pulling a trailer,” IEEE Trans. Robot. Automat., vol.
15, pp. 640–652, Aug. 1999. Timothy W. McLain (S’91–M’93) received the B.S.
[19] M. B. Milam, K. Mushambi, and R. M. Murray, “A computational ap- and the M.S. degrees in mechanical engineering from
proach to real-time trajectory generation for constrained mechanical sys- Brigham Young University, Provo, UT, in 1986 and
tems,” in Proc. IEEE Conf. Decision and Control, Sydney, Australia, 1987, respectively. In 1995, he received the Ph.D. de-
2000, pp. 845–851. gree in mechanical engineering from Stanford Uni-
[20] S. Sun, M. B. Egerstedt, and C. F. Martin, “Control theoretic smoothing versity, Stanford, CA.
splines,” IEEE Trans. Automat. Contr., vol. 45, pp. 2271–2279, Dec. From 1987 to 1989, he was employed at the Center
2000. for Engineering Design at the University of Utah, Salt
[21] N. Faiz, S. K. Agrawal, and R. M. Murray, “Trajectory planning of dif- Lake City. Since 1995, he has been with the Depart-
ferentially flat systems with dynamics and inequalities,” AIAA J. Guid- ment of Mechanical Engineering at Brigham Young
ance, Contr., Dynam., vol. 24, pp. 219–227, Mar.–Apr. 2001. University, Provo, UT, where he is currently an As-
sociate Professor. In the summers of 1999 and 2000, he was a Visiting Scientist
[22] J.-S. Choi and B. K. Kim, “Near-time-optimal trajectory planning for
at the Air Force Research Laboratory, Air Vehicles Directorate. His research
wheeled mobile robots with translational and rotational sections,” IEEE
interests include cooperative control of multiple vehicle systems and modeling
Trans. Robot. Automat., vol. 17, pp. 85–90, Feb. 2001. and control of microelectromechanical systems.
[23] F. Giulietti, L. Pollini, and M. Innocenti, “Autonomous formation Dr. McLain is a member of the AIAA.
flight,” IEEE Contr. Syst. Mag., vol. 20, pp. 34–44, Dec. 2000.
[24] D. J. Stilwell and B. E. Bishop, “Platoons of underwater vehicles,” IEEE
Contr. Syst. Mag., vol. 20, pp. 45–52, Dec. 2000.
[25] M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf, Michael A. Goodrich (S’92–M’92) received the
B.S., M.S., and Ph.D. degrees from the Electrical
Computational Geometry: Algorithms and Applications. New York:
and Computer Engineering Department, Brigham
Springer-Verlag, 2000. Young University, Provo, UT, in 1992, 1995, and
[26] A. W. Proud, M. Pachter, and J. J. D’Azzo, “Close formation flight con- 1996, respectively.
trol,” in Proc. AIAA Guidance, Navigation, and Control Conf., Portland, From 1996 to 1998, he was a Postdoctoral
OR, Aug. 1999, AIAA Paper 99-4207, pp. 1231–1246. Research Associate at Nissan Cambridge Basic
[27] E. P. Anderson, “Constrained extremal trajectories and unmanned air Research, Cambridge, MA. Since 1998, he has been
vehicle trajectory generation,” Master’s thesis, Brigham Young Univ., with the Computer Science Department at Brigham
Provo, UT, 2002. Young University, Provo, UT, where he is currently
[28] E. P. Anderson and R. W. Beard, “Constrained extremal trajectories and an Assistant Professor. His research interests include
UAV path planning,” in Proc. AIAA Guidance, Navigation and Control human–robot interaction, decision theory, and multiagent choice.
Conf., Aug. 2002, AIAA Paper 2002–4470.
[29] T. Balch and R. C. Arkin, “Behavior-based formation control for multi-
robot teams,” IEEE Trans. Robot. Automat., vol. 14, pp. 926–939, Dec. Erik P. Anderson received the B.S. degree in elec-
1998. trical engineering, the B.S. degree in mathematics,
and the M.S. degree in electrical engineering, all from
Brigham Young University, Provo, UT, in 2002.
He currently is a graduate student in electrical
engineering at Stanford University, Palo Alto, CA,
where he is working toward the Ph.D. degree.