Coordinated exploration of labyrinthine environments with application to the “pursuit- evasion”...

Preview:

Citation preview

Coordinated exploration of labyrinthine Coordinated exploration of labyrinthine environments with application to the environments with application to the

“pursuit-evasion” problem“pursuit-evasion” problem

Leibniz LaboratoryLeibniz LaboratoryMagma teamMagma team

Damien Pellier – Humbert FiorinoDamien Pellier – Humbert Fiorino

{Pellier, Fiorino}@imag.fr{Pellier, Fiorino}@imag.fr

1

PlanPlan

Problems tackledProblems tackled Principle of surveillance algorithmsPrinciple of surveillance algorithms A cooperative approachA cooperative approach Discussion and future prospectsDiscussion and future prospects DemonstrationDemonstration

1

Problems tackledProblems tackled

« pursuit evasion » problem for mobile robots by a multi robot cooperation approach

Distributed decision Sharing robots knowledge Computing motion strategies Deliberation protocol

1

Principle of Principle of surveillance algorithmssurveillance algorithms

Build a motion strategy that guarantees an intruder will be discovered by the pursuers [Suzuki 92]

Constraints on the environment

known [Yamashita 00]

unknown [Rajko 01]

1. Constraints on the robot perception

omnidirectional perception [Lavalle 97]

flash light perception [Simov 01]

1. Limits

complexity

management of robots resources

1

A cooperative approach A cooperative approach PrinciplePrinciple

Algorithm for one pursuer

Assumptions

- the environment is known

- the robots have an infinite omnidirectional perception

- the intruder can have an infinite speed >> robots speed

1

A cooperative approachA cooperative approachConstruction of the trajectoryConstruction of the trajectory

1st step : the critical points must be found (a critical point is an obstacle vertex that has an internal angle < 180°)

2nd step: from the critical vertices list, build the visibility graph of the environment

1

2

3

4

5

4

2

1

3

5

1

A cooperative approachA cooperative approachConstruction of the trajectoryConstruction of the trajectory

3td step: the surveillance graph construction gathers all surveillance trajectories in the environment

Example from the critical point 1:

4th step: choice of the best motion strategy based upon the Dijkstra algorithm so as to compute the shortest surveillance path

1

2

3

4

5

CCCNN

54321

CCNCC

54321

1, 2

NNCCN

54321

4, 5 4, 5

NNCNN

54321

CCNNN

54321

NNNNN

54321

3

1

3

1, 2 1, 2

4, 5 3

31, 2 4, 5 1, 2

3, 4, 5

N: Cleared

C: Contaminated

1

A cooperative approachCooperation implementationCooperation implementation

Detection of the « delegation points »

Assistance computation The stuck robot tries to split the environment that can be monitored by independent robots

1

A cooperative approach Cooperation implementationCooperation implementation

Tasks delegation: the deliberation protocol

A robot can play 4 different roles: Explorer Guard Idle robot Stuck robot

The robot’s role changes during the exploration

The deliberation protocol is based on « contracts » between the team robots

1

A cooperative approach Cooperation implementationCooperation implementation

Deliberation protocol

1

A cooperative approachA cooperative approach Discussion and future prospectsDiscussion and future prospects

Number of robots minimization by making them work as a team Deliberation protocol allows an efficient use of the robots resources CComputation distribution

Fault tolerance Robustness

Limitation of the critical points representation

Adaptation of the deliberation protocol for unknown environments

1

DemonstrationDemonstration

Recommended