Next Article in Journal
Railcar Dynamic Response during Braking Maneuvers Based on Frequency Analysis
Next Article in Special Issue
Hierarchical Sliding Mode Control Combined with Nonlinear Disturbance Observer for Wheeled Inverted Pendulum Robot Trajectory Tracking
Previous Article in Journal
Preventive Effects of Chlorogenic Acid on Alveolar Bone Loss in Ligature-Induced Periodontitis in Mice
Previous Article in Special Issue
Non-Parametric Calibration of the Inverse Kinematic Matrix of a Three-Wheeled Omnidirectional Mobile Robot Based on Genetic Algorithms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Three-Dimensional Rendezvous Controls of Multiple Robots with Amplitude-Only Measurements in Cluttered Underwater Environments

System Engineering Department, Sejong University, Seoul 05006, Republic of Korea
Appl. Sci. 2023, 13(7), 4130; https://doi.org/10.3390/app13074130
Submission received: 2 March 2023 / Revised: 16 March 2023 / Accepted: 23 March 2023 / Published: 24 March 2023
(This article belongs to the Special Issue Advances in Robot Path Planning, Volume II)

Abstract

:
This study addresses multi-robot distributed rendezvous controls in cluttered underwater environments with many unknown obstacles. In underwater environments, a Unmanned Underwater Vehicle (UUV) cannot localize itself, since a Global Positioning System (GPS) is not available. Assume that each UUV has multiple signal intensity sensors surrounding it. Multiple intensity sensors on a UUV can only measure the amplitude of signals generated from its neighbor UUVs. We prove that multiple UUVs with bounded speed converge to a designated rendezvous point, while maintaining the connectivity of the communication network. This study further discusses a fault detection method, which detects faulty UUVs based on local sensing measurements. In addition, the proposed rendezvous control is adaptive to communication link failure or invisible UUVs. Note that communication link failure or invisible UUVs can happen due to unknown obstacles in the workspace. As far as we know, our study is novel in developing 3D coordinate-free distributed rendezvous control, considering underwater robots that can only measure the amplitude of signals emitted from neighboring robots. The proposed rendezvous algorithms are provably complete, and the effectiveness of the proposed rendezvous algorithms is demonstrated under MATLAB simulations.

1. Introduction

Networked robots have various applications, such as monitoring large environments, rescue missions, and target chasing [1,2,3,4]. Multiple coordinated robots are also used to perform many specific tasks, such as rendezvous [5,6,7], spacecraft docking [8], environmental monitoring [9,10,11], underwater target chasing [12], and formation control [13,14,15].
This study addresses multi-robot rendezvous controls in cluttered underwater environments with many unknown obstacles. Unmanned Underwater Vehicles (UUVs) can be divided into two categories based on whether their bodies are streamlined. The UUV’s shape is determined by the requirements of the application. For example, a streamlined shape reduces water resistance and is preferable if the UUV is required to move at high speeds. However, if underwater detection or operation tasks are the primary roles of a UUV, a non-streamlined shape is often preferred.
Because of the good water pressure resistance of spherical objects, spherical UUVs can perform rotational motions with a 0 degree turn radius. In the literature, various spherical UUVs have been developed [16,17,18,19,20]. References [16,18,19,20,21] addressed a spherical UUV with hybrid propulsion devices including vectored water jet and propeller thrusters. The three Degree-of-Freedom (DoF) motions, including surging, heaving, and yawing, were performed in a swimming pool. References [16,19,21] further demonstrated that by adopting vectored water jets, a spherical UUV can be made to maneuver freely in any direction. Considering a spherical UUV, [22] used fuzzy proportional–integral–derivative (PID) controllers to independently control the robot’s movement in all directions. Since spherical UUVs are highly maneuverable, our study considers a spherical UUV [16,17,18,19,20] as our platform.
We address practical application scenarios where multi-robot rendezvous controls are used. Recently, several studies [23,24,25] handled distributed formation control of multiple robots in environments with obstacles. For instance, a group of robots can be used for tracking a target while measuring the target’s signal [26]. During the robots’ maneuvering in formation controls, robots need to preserve the network connectivity. In order to make all robots gather close to each other, distributed rendezvous controls can be applied occasionally. In other words, distributed rendezvous algorithms can be used as a multi-robot control module to allow a team of robots to maintain network connectivity while they maneuver. For example, we can run rendezvous controls occasionally, so that all robots get closer to a root robot which leads the formation. Moreover, all robots need to get closer to the root robot, in the case where they move through a narrow tunnel.
Furthermore, rendezvous algorithms can be utilized in multi-robot collection or charging scenarios [27]. Suppose that there is a charging station close to a robot, called the root. All the robots can be charged from the charging station, once they gather close to the root.
The difficulty of the rendezvous problem decreases when a robot is equipped with Global Positioning Systems (GPS). However, GPS is unavailable in underwater environments. In difficult scenarios without GPS, robots cannot move toward a designated rendezvous point directly. Thus, we introduce a distributed rendezvous approach that does not require global localization.
A rendezvous algorithm is considered distributed, when it depends on the local interaction between neighboring robots. A distributed rendezvous algorithm is practical, since a robot cannot communicate with another robot that is too far away. Furthermore, obstacles in cluttered 3D environments can easily block the communication links between robots. In this study, we propose distributed rendezvous algorithms for UUVs in 3D unknown environments with many obstacles. Here, unknown obstacles can lead to communication link failure or invisible robots. The proposed rendezvous control is adaptive to communication link failure or invisible robots.
Considering 3D underwater environments, this study addresses the problem of enabling a network of UUVs to rendezvous at a designated root robot. Any robot in the network can be set as the root robot. Thus, the rendezvous system in this study is referred to as the any-robot rendezvous system.
The rendezvous controls in this study consider a UUV that can only measure the signal intensity emitted from its neighbor UUV. Thus, the proposed rendezvous control is suitable for a cheap UUV, which only has sensors for measuring the signal strength.
Reference [28] addressed a received signal strength (RSS) sensor model for underwater sound propagation. We consider multiple UUVs such that each UUV has multiple signal intensity sensors surrounding it. Each intensity sensor can measure the RSS of sound generated from a neighbor UUV [28].
Multiple intensity sensors on a UUV can only measure the amplitude (intensity) of signals emitted from its neighboring UUVs. To enable a distributed rendezvous based on amplitude-only measurements, we utilize a method of making a UUV approach the source of the signal (neighbor UUV) by measuring the intensity of signal at multiple intensity sensors.
We demonstrate that our distributed rendezvous algorithms are provably complete in achieving multi-robot rendezvous in cluttered 3D environments. The proposed 3D rendezvous controls assure the convergence to a designated UUV, while maintaining the connectivity of the time-varying and position-dependent communication network.
Moreover, the proposed rendezvous controls can handle the case where some UUVs are broken. While controlling the networked system, any UUV, including the root UUV, can become faulty owing to various reasons, such as hardware malfunction. This study, thus, discusses a fault detection method, which detects faulty UUVs based on local sensing measurements. Once a UUV failure is sensed, then we update the network structure, so that healthy UUVs without faults can be controlled effectively.
This study handles scenarios where multiple UUVs are deployed in cluttered 3D environments (e.g., [29]). In obstacle-rich environments, the communication (interaction) link between UUVs may be easily blocked owing to obstacles. Furthermore, invisible UUVs may occur, since line-of-sight can be blocked by unknown obstacles. In such scenarios, it is important to assure that the communication link is preserved, while every UUV maneuvers. The proposed distributed rendezvous control is unique in overcoming communication link failure or invisible UUVs. Note that communication link failure or invisible UUVs may happen due to unknown obstacles in cluttered 3D environments.
We address a distributed rendezvous control for spherical UUVs with bounded speed, such that each UUV can only measure the strength of signals emitted from neighboring UUVs. The contributions of our study are summarized as follows.
  • As far as we know, this study is novel in developing 3D distributed rendezvous controls, considering a UUV that can only measure the strength of signals emitted from neighboring UUVs.
  • The proposed 3D rendezvous controls are provably complete, since we prove the rendezvous to the root UUV, while maintaining the connectivity of the time-varying and position-dependent communication network.
  • To the best of our knowledge, our study is unique in addressing a fault detection method that detects faulty UUVs based on local sensing measurements. In addition, the proposed rendezvous controls are adaptive to communication link failure or invisible UUVs.
The study is organized as follows. Section 2 provides the literature review of this study. Section 3 provides the background information of this study. Section 4 discusses the 3D distributed rendezvous controls introduced in this study. Section 5 provides the simulation results of this study. Section 6 provides the conclusions of this study.

2. Literature Review

Considering 2D environments, there are many studies on distributed controllers to make all robots rendezvous, considering the case where a robot measures the relative position of its nearby robot [7,30,31,32]. In [33], circumcenter-based consensus algorithms were introduced to achieve distributed rendezvous of multiple robots. However, how to handle faulty robots was not discussed in [33]. Considering 2D environments, [34] introduced rendezvous controllers that are tolerant to faulty robots. However, this method needs a controllable sensing range, which may not be feasible in practice. The authors of [35] considered the optimal consensus problem of asynchronous sampling single-integrator and double-integrator multi-robot systems utilizing distributed model predictive control algorithms.
Event-driven rendezvous strategies [36,37,38] for multi-agent systems were motivated by the use of embedded microprocessors with limited resources that will gather information and actuate the individual agent controller updates. Considering event-triggered rendezvous controls, [38] proved that if the communication graph is connected, consensus is achieved exponentially. The authors of [37] showed that with appropriate control gains in event-triggering conditions, subsystems employing discrete-time signals from neighbors achieve the state consensus. The authors of [36] studied the rendezvous problem of multi-robot systems by parallel event-triggered connectivity-preserving controls. The event-triggered control laws in [36] can assure the system convergence, and can maintain the connectivity of the time-varying and position-dependent communication network. However, [36,37,38] considered 2D environments without obstacles. In cluttered underwater environments, obstacles can block the communication link between robots, resulting in the loss of a robot.
Our study handles practical scenarios where multiple underwater robots are deployed in cluttered environments (e.g., [29]). In obstacle-rich environments, the communication (interaction) link between robots may be blocked owing to obstacles. In such scenarios, it is important to assure that the communication link is preserved while every robot maneuvers. As far as we know, the proposed distributed rendezvous control is unique in overcoming communication link failure or invisible robots.
As far as we know, other studies on distributed rendezvous controls [7,30,31,32,36,37,38] assumed that a robot can measure the relative position of its neighbor robot using local sensors, such as laser. However, no physical sensors were clearly described for this local interaction. In other words, other rendezvous controls in [7,30,31,32,36,37,38] were designed, while the specific sensors that were used for the controls were not considered. However, considering specific sensors is crucial, since robots move based on local sensing measurements.
Considering 2D environments, [39] addressed rendezvous algorithms using received signal strength indicator (RSSI) data from the radio. Reference [40] addressed a simple rendezvous algorithm using RSSI data from the radio. Reference [40] used a small, low-cost, modular robotics platform in 2D environments. Reference [40] explored the potential for using RSSI in platforms equipped with radios in order to rendezvous at a desired location or agent. The authors of [39] addressed multi-robot rendezvous with range-only measurements. However, references [39,40] considered simple 2D environments with no obstacles. In addition, [39,40] did not show that their rendezvous algorithm is provably complete in achieving multi-robot rendezvous. Moreover, [39,40] did not consider how to handle the case where a UUV is broken.
In [41], the authors applied radars with a variable sensing range in order to make all robots rendezvous in 3D environments. However, obstacle environments were not considered in [41]. Unknown obstacles can block the communication link between robots in practice. Moreover, in underwater environments, electromagnetic signals easily dissipate, and thus, radars are not suitable in underwater environments.
In 3D underwater environments, a UUV needs to be equipped with expensive 3D sonar sensors with sensing arrays, in order to measure the relative position of its neighbor UUV. However, the intensity sampling sensors used in our study are not sufficient for measuring the relative position of a neighbor UUV. In other words, intensity sensors used in our study cannot be used for measuring the relative position of a neighbor UUV.
To the best of our knowledge, our study is novel in developing provably complete 3D distributed rendezvous controls, considering a UUV which can only measure the strength of signals emitted from neighboring UUVs. Moreover, our study is unique in introducing a 3D rendezvous control, which is robust to intensity sensor failures or UUV failures.

3. Background Information

3.1. Reference Frames

Two reference frames are used in our study: an inertial reference frame { I } and a body−fixed frame { B } [42]. The origin of { I } is an appropriate position with three axes pointing north, east, and down, respectively. The body−fixed frame { B } is fixed to a UUV’s body and acts as the moving frame. The origin of { B } is fixed at the UUV’s center.
Let ϕ , θ , ψ present the euler roll, euler pitch, and euler yaw, respectively. The counterclockwise (CC) rotation of ψ centered at the z-axis in { B } is as follows:
R ( ψ ) = cos ( ψ ) sin ( ψ ) 0 sin ( ψ ) cos ( ψ ) 0 0 0 1 .
The CC rotation of θ centered at the y-axis in { B } is as follows:
R ( θ ) = cos ( θ ) 0 sin ( θ ) 0 1 0 sin ( θ ) 0 cos ( θ ) .
The CC rotation of ϕ centered at the x-axis in { B } is as follows:
R ( ϕ ) = 1 0 0 0 cos ( ϕ ) sin ( ϕ ) 0 sin ( ϕ ) cos ( ϕ ) .
The combined rotation matrix is built by multiplying the yaw, pitch, and roll rotation matrices in this order to obtain the following:
R ( ψ , θ , ϕ ) = R ( ψ ) R ( θ ) R ( ϕ ) .
Figure 1 depicts three euler angles ( ϕ , θ , and ψ ). In this figure, there is a spherical UUV, and we plot a cross-shaped propeller at the back of the UUV. Furthermore, this figure depicts the inertial reference frame { I } and the body−fixed frame { B } .

3.2. Graph Theory

We present several definitions from graph theory in [43]. First, G = ( V ( G ) , E ( G ) ) is an undirected graph with a vertex set V and an edge set E. The two vertices at the end of an edge e are called neighbors.
A tree (T) is a connected graph containing no cycles. Thus, a path connecting any two vertices in a tree T is unique. One vertex of T is set as the root. In T, p ( v ) , the parent of v, is the neighbor of v along the path to the root. Furthermore, c ( v ) , the child of v, is a vertex such that v is the parent of c ( v ) . A leaf is a vertex with no children. A descendant of v is a vertex that is either c ( v ) or is the descendant of c ( v ) (recursively). An ancestor of v is a vertex that is either p ( v ) or is the ancestor of p ( v ) (recursively). Figure 2 depicts a tree T.

3.3. Assumptions and Definitions

This subsection discusses the assumptions and definitions used in this study. Suppose we have N UUVs in total. Let u i indicate the i-th UUV ( i { 1 , 2 , , N } ). Let u N indicate the root in the robot network. In our study, u N is set as the root of a tree graph T. In the inertial reference frame, u i R 3 is the 3D location of a UUV u i .
A UUV has communication devices to enable information sharing with its neighboring UUVs. This local communication ability is fundamental for multi-agent controls as well as for handling UUV faults.
Consider a UUV that has six signal intensity sensors surrounding it. Each intensity sensor can measure the received signal strength of sound generated from a neighbor UUV [28]. As a UUV, e.g., u i , detects a signal from its neighbor UUV u j , six intensity sensors on u i can measure the strength of the signal emitted from u j .
Figure 3 plots the local coordinates of every intensity sensors positioned on a UUV. The local coordinates are defined in the UUV’s body−fixed frame. In Figure 3, the path of signal emitted from the emitter is illustrated with dotted arrow. The origin of the local coordinates frame is at the UUV’s center. The numbering in front of local coordinates indicates the index of the associated intensity sensor. For instance, 1 : [ d r , 0 , 0 ] indicates that the first sensor has local coordinates [ d r , 0 , 0 ] . We can see that every intensity sensor is positioned at an equidistant point from the UUV’s center. Here, d r is the relative distance between the UUV’s center and any other sensor.
In the body−fixed frame of u i , let c i r R 3 indicate the local coordinates of the r-th intensity sensor ( r { 1 , 2 , , 6 } ) of u i . Let P ( c i r ) R indicate the signal power received by the r-th intensity sensor ( r { 1 , 2 , , 6 } ) of u i . Recall that Figure 3 plots the local coordinates of every intensity sensor positioned on u i .
In emitter localization, complexity increases owing to obstacles blocking the line-of-sight (LOS) path between an intensity sensor and an emitter [44,45,46,47,48,49]. Considering an LOS emitter, the Received Signal Strength Indicator (RSSI) is modeled utilizing a log-normal shadowing model [28,50]. Based on the log-normal shadowing model in [28], we use the following equation:
P ( c i r ) = P 0 10 E p l o g 10 ( d I ) + γ ( d I 1 ) + n P .
where d I indicates the relative distance between the intensity sensor at the local coordinates c i r R 3 and the emitter, P 0 (dB) is the received signal power at 1 m, E p is the propagation exponent, and n P is a random variable with mean 0 and standard deviation σ P .
In Equation (5), γ is the path loss exponent (PLE), which models the geometric spreading loss. The term γ (dB/m) is the frequency-dependent medium absorption, and γ can be determined using Thorp’s model, which is based on the experiments in [28].
We consider the case where all sensors of a UUV are identical to those of another UUV. Let P ( u i ) R denote the average intensity measurement associated with u i . We have
P ( u i ) = 1 6 r = 1 6 P ( c i r ) .
It is assumed that P 0 , E p , and σ P in Equation (5) are known a priori. This is feasible using experiments with UUVs [28]. For realistic simulations of the RSSI for an underwater emitter, we use the model parameters in [28]. In Equation (5), P 0 = 100 dB, E p = 2 , γ = 0.05 , σ P = 1 are used, according to [28]. In this case, Figure 4 shows the relationship between d I and P ( u i ) using (5) and (6). As d I increases, P ( u i ) decreases.
It is assumed that if P ( u i ) > P t h r e s , then SNR is sufficiently large and the intensity sensor can detect the LOS signal generated from the emitter. We say that a UUV u i is a neighbor to UUV u j if P ( u i ) > P t h r e s and P ( u j ) > P t h r e s . Here, P t h r e s is a tuning parameter for determining a neighbor.
The neighbor information can be set by mutual communication between u i and u j . In the case where u i and u j are neighbors, u i u j < r s ( P t h r e s ) and the LOS between u i and u j is not blocked by obstacles. Here, r s ( P t h r e s ) can be considered as the maximum sensing range for a UUV. Note that r s ( P t h r e s ) is determined by P t h r e s . As P t h r e s decreases, r s ( P t h r e s ) increases using (5).
For notation convenience, we use r s instead of r s ( P t h r e s ) . See Figure 4 for an illustration. If we set P t h r e s = 52 dB, then r s = 10 m; if we set P t h r e s = 20 dB, then r s = 60 m.
We say that a UUV u i encounters u j if u i u j < ϵ 0 . Let P e denote the signal power measured when u i encounters u j . Thus, using Equation (5), we obtain the following:
P e = P 0 10 E p l o g 10 ( ϵ ) + γ ( ϵ 1 ) .
If both P ( u i ) and P ( u j ) exceed P e , then we assume that u i encountered u j .
Let G = ( V ( G ) , E ( G ) ) indicate the graph presenting the networked system. Every node in V ( G ) indicates a UUV. An edge, e.g., { u i , u j } E ( G ) , indicates that u i and u j are neighboring UUVs. Recall that u i is a neighbor to u j if P ( u i ) > P t h r e s and P ( u j ) > P t h r e s . Since we check both P ( u i ) and P ( u j ) for detecting neighbors, G is an undirected graph.
Let G 0 = ( V 0 , E 0 ) indicate the initial connectivity network (at sampling step t = 0 ). Without loss of generality, it is assumed that G 0 is connected. As far as we know, this initial connectivity assumption is required for any distributed rendezvous controls in the literature [34,41,51,52]. This is due to the fact that distributed rendezvous controls are based on local interaction between neighboring agents.
Note that the initial connectivity assumption does not assure that the network connectivity is maintained during the maneuver of an agent. As agents move around, the communication link among them may be broken due to obstacles in the environments. Moreover, an agent cannot communicate with another agent if the relative distance between them is larger than r s . Thus, we need to develop distributed rendezvous controls, which assure that the network connectivity is maintained while all agents rendezvous at u N .
In the inertial reference frame, let h i ( k ) R 3 present the heading direction of u i at sampling step k. Note that h i ( k ) R 3 is a unit vector. Let d t indicate the sampling interval in discrete-time systems. As a UUV’s dynamic model in the inertial reference frame, we utilize the following equation:
u i ( k + 1 ) = u i ( k ) + h i ( k ) d t s i ( k ) .
This simple motion model is commonly utilized in the literature on multi-agent systems [51,53,54,55,56,57,58,59,60]. In Equation (8), s i ( k ) denotes the linear speed of u i at sampling step k. We assume that s i ( k ) s m a x for all k. This implies that s m a x is the speed limit of every UUV.
This study considers a spherical UUV. The authors of [16,19,21] showed that by adopting vectored water jets, a spherical UUV can maneuver freely in any direction. The control of a spherical UUV appeared in [22]. The reference [22] proposed a decoupling motion control algorithm based on the robot attitude calculation for an underwater spherical robot. The reference [22] used fuzzy PID controllers to independently control the robot’s movement in all directions. Since a spherical UUV is highly maneuverable, the process model in Equation (8) is feasible.

4. Robust Distributed Rendezvous Control

4.1. Distributed Breadth First Search (BFS) Algorithm to Generate a Spanning Tree T

In our study, u N is set as the root of a tree graph T. In order to generate a tree T rooted at u N , we use a distributed Breadth First Search (BFS) algorithm in [61]. We acknowledge that [61] addressed a distributed BFS algorithm, so that a node in the network can guide a moving object across the network to the goal. Algorithm 2 in [61] can be applied to make a tree T rooted at u N . The tree T is rooted at u N , and T has a unique path from the UUV u i to u N .
Algorithm 1 shows a distributed BFS algorithm to generate a tree T containing all UUVs. The goal sensor in Algorithm 2 of [61] represents the root u N in Algorithm 1. Initially, every UUV u contains h o p s g ( u ) , which indicates the hop distance to the root. The root u N sets h o p s g ( u N ) = 0 initially. For every UUV except for the root, we initially set h o p s g ( u ) = , where u u N . Here, h o p s g ( u ) = implies that one has not set the hop distance for u u N .
Algorithm 1 Distributed BFS algorithm to generate a spanning tree T
1:
Every UUV u contains h o p s g ( u ) , which indicates the hop distance to the root;
2:
The root u N sets h o p s g ( u N ) = 0 initially;
3:
We initially set h o p s g ( u ) = , where u u N ;
4:
Initially, u N sends its hop distance information h o p s g ( u N ) to its neighbor UUVs;
5:
repeat
6:
   u← every UUV;
7:
   if the UUV u satisfies h o p s g ( u ) = , and it receives a hop distance message from its neighbor UUV, e.g., n then
8:
     The UUV u updates its hop distance information using (9);
9:
     The UUV u broadcasts h o p s g ( u ) to its neighbors;
10:
  end if
11:
until  h o p s g ( u ) for all u;
Initially, u N sends its hop distance information h o p s g ( u N ) to its neighbor UUVs. Suppose a UUV u satisfies h o p s g ( u ) = , and it receives a hop distance message from its neighbor UUV, e.g., n. Then, u updates its hop distance information using the following equation:
h o p s g ( u ) = m i n ( h o p s g ( u ) , h o p s g ( n ) + 1 ) .
Using Equation (9), h o p s g ( u ) can be updated to h o p s g ( n ) + 1 . In this case, the parent of u is updated to n. Thereafter, u broadcasts h o p s g ( u ) to its neighbors. In Equation (9), m i n ( a , b ) returns a smaller value between a and b.
References [61,62] proved that the number of message broadcasted by every UUV is 1 in this distributed BFS algorithm. This implies that the distributed BFS has the computational complexity O ( 1 ) .

Utilization of Signal Intensity Sensors to Detect Neighbors

Note that in Algorithm 1, every UUV u i utilizes its signal intensity sensors to detect its neighbors. Recall that u i is a neighbor to u j if P ( u i ) > P t h r e s and P ( u j ) > P t h r e s . Based on the signal intensity measurements, u i finds its neighbors, e.g., N i . For instance, if u i detects two UUVs u j and u l , then we set N i = [ u j , u l ] . By making a UUV u i stand still while measuring the signals from neighbor UUVs, u i can determine N i .
The obstacle environment is not known in advance. In order to build T in unknown obstacle environments, every UUV u i utilizes its signal intensity sensors to detect its neighbors. As every UUV u i turns on its signal intensity sensors while standing still, u i can detect its neighbors.
For the detection of neighbors, we assume that a UUV, e.g., u j , can identify another UUV, e.g., u l , by analyzing the signal emitted from u l . Each UUV emits signal using Binary Phase Shift Keying (BPSK) with a distinct frequency band. Suppose that every UUV shares the frequency band information of all UUVs. Suppose that a UUV, e.g., u j , receives the signal from another UUV, e.g., u l . Then, u j runs a bandpass filter to analyze the frequency of the signal. By running the bandpass filter, u j can detect that the signal was generated from u l . In this way, a UUV can distinguish the signal of a UUV from that of another UUV. Moreover, the bandpass filter in a UUV can be used to filter out signal interference, such as a signal generated from unknown transmitters.
We acknowledge that there exists a serious delay of underwater communication. This implies that u j cannot detect its neighbors instantly. A UUV u j needs to emit signals and receive signals from its neighbors. However, this delay does not cause problems, since no UUV moves while we generate a spanning tree T using Algorithm 1.

4.2. Distributed Rendezvous Algorithms

While all UUVs stop, Algorithm 1 in Section 4.1 runs to build a spanning tree T in a distributed manner. Based on the tree T, Algorithm 2 runs to achieve rendezvous at u N . In other words, Algorithm 2 makes every UUV encounter at the root u N .
We explain Algorithm 2. Initially ( t = 0 ), all leaf UUVs begin visiting every UUV along the path to u N . Each leaf UUV finds a path to u N using T. Since T is a tree graph, only one path exists from a node to the root in T. Once the path is found, each UUV stores the UUV indexes along the path to u N . How to make a UUV visit the UUVs along the path to the root u N is discussed in Section 4.4.
In order to maintain network connectivity, the maneuver of a UUV must not disconnect the network. Therefore, each UUV does not begin moving until it encounters all its descendants in T. This implies that each UUV needs to store the UUV indexes associated with its all descendants.
Let us consider a UUV u with at least one child. From u to u N in T, only one path exists. As soon as u encounters all its descendants, u starts visiting every UUV along the path to u N under Algorithm 2. As time elapses, p ( u ) encounters all its descendants and p ( u ) starts visiting every UUV along the path to u N . This procedure continues until all UUVs encounter at u N .
Algorithm 2 Distributed rendezvous strategy
1:
While all UUVs stop, Algorithm 1 in Section 4.1 runs to build the tree T rooted at u N ;
2:
repeat
3:
   u← every UUV;
4:
   if u is a leaf in T then
5:
     The UUV u finds a path to u N using T;
6:
     The UUV u starts visiting every UUV along the path; u is not a leaf in T
7:
    else if u is not a leaf in T then
8:
      if u encounters all its descendants then
9:
        The UUV u finds a path to u N using T;
10:
       The UUV u starts visiting every UUV along the path;
11:
     end if
12:
   end if
13:
   if a UUV is broken or interaction link between two neighboring UUVs in T is broken by moving obstacles then
14:
      All UUVs stop moving, and re-build a tree T by re-running Algorithm 1 in Section 4.1;
15:
   end if
16:
   if an invisible UUV blocked by unknown obstacles appears suddenly then
17:
      All UUVs stop moving, and re-build a tree T by re-running Algorithm 1 in Section 4.1;
18:
   end if
19:
until every UUV encounters u N ;
Whether a UUV encounters another UUV can be detected utilizing signal power measurements. Recall that if both P ( u i ) and P ( u j ) exceed P e , then we assume that u i encountered u j .
As long as we consider static obstacles, the connectivity of the path to the root u N is not broken by obstacles. In other words, as long as obstacles have not moved after the initial tree generation, the maneuver of a UUV along the path to the root is not blocked by obstacles.
Theorem 1 proves that Algorithm 2 is distributed. Furthermore, Theorem 1 proves that network connectivity is preserved while a UUV maneuvers until reaching the root. This implies that under Algorithm 2, every UUV reaches the root, while preserving network connectivity.
Theorem 1. 
Algorithm 2 is distributed. Under Algorithm 2, every UUV reaches the root, while preserving network connectivity to the root.
Proof. 
Suppose that u has been visiting UUVs along the path to u N in Algorithm 2. Let P A T H indicate the path for convenience. Suppose that P A T H consists of a set of UUVs p 1 p 2 p 3 p e n d in this order. Here, p e n d is the root u N . As u moves along this path, it reaches the root in the end.
We first prove that p i , where i { 1 , 2 , , e n d 1 } , starts moving only after u encounters p i . A UUV, other than a leaf starts moving only after all its descendants in T encounter it. Any UUV on P A T H is an ancestor of u. Hence, p i does not start moving before it encounters u.
In the case where u has just encountered p i , u can sense p i + 1 utilizing its local sensors. Since u moves based on local sensing measurements, Algorithm 2 is distributed.
As u moves along P A T H , it reaches the root in the end. We next prove that u remains connected to the root, during its maneuver along P A T H to the root. Consider the case where u has just encountered p i and starts moving towards p i + 1 . In this case, u is connected to p i + 1 . All UUVs in p i + 1 p i + 2 p i + 3 p e n d = u N stand still. Hence, p i + 1 is connected to u N . Since u is connected to p i + 1 , u is also connected to u N . It is proved that any UUV u remains connected to the root during its maneuver along P A T H to the root. □

4.3. Handling of Dynamic Scenarios, including Faulty UUVs

One may have a situation where a UUV is broken or the interaction link between two neighboring UUVs in T is broken by moving obstacles. Moreover, we may have a situation where an invisible UUV blocked by unknown obstacles appears suddenly. In these cases, every UUV stops moving, and we re-build a tree T utilizing Algorithm 1 in Section 4.1, so that network connectivity among UUVs can be re-established. Then, Algorithm 2 re-runs to achieve rendezvous at u N . In this way, we can handle dynamic scenarios which may happen due to unknown obstacles.
As we re-build a tree T utilizing Algorithm 1 in Section 4.1, we may have a case where a tree T cannot be generated. This implies that a UUV may not be connected to the root, even after running Algorithm 1 in Section 4.1. For handling this case, we need to increase the number of neighbors for each UUV.
For handling the case where a UUV may not be connected to the root, we increase P 0 in Equation (5) for each UUV. As P 0 increases, the number of neighbors can increase, since a UUV u i is a neighbor to u j if P ( u i ) > P t h r e s and P ( u j ) > P t h r e s . By increasing the signal emission strength, u i can detect a UUV that is located far from u i . This emission power increase was also used in [41], for improving the network connectivity in multi-agent systems. We acknowledge that by increasing the signal emission strength, u i consumes more power.

4.3.1. Discard Faulty UUVs

Note that a UUV can become faulty owing to various reasons, such as hardware malfunction. We next address how to handle faulty UUVs. Let a healthy UUV denote a UUV having no faults.
Every UUV is encountered by its child under Algorithm 2. Thus, every faulty UUV, including a faulty root, can be detected by its child. Once a healthy UUV meets with a faulty UUV, the healthy UUV sends signal to the faulty UUV. A healthy UUV responds with an acknowledge signal whenever it receives a signal. If a UUV does not respond to the received signal, then the healthy UUV can find that a fault has occurred in the responding UUV.
Algorithm 2 is further designed to cope with a faulty UUV (including a faulty root). We discuss how to handle faulty UUVs from now on.
We first introduce a method of discarding (dropping) faulty UUVs once they are sensed. Once a broken UUV, e.g., u B , is sensed, then a tree T is updated by applying Algorithm 1 in Section 4.1 without u B . Thereafter, Algorithm 2 runs utilizing the updated T. The updated T does not contain u B . This implies that we discarded (dropped) u B .
If there are too many faulty UUVs, then it may be impossible to build a tree T without them. If we cannot build a tree without faulty UUVs, then we cannot make every healthy UUV encounter at the root UUV.

4.3.2. Using Static Faulty UUVs as Waypoints

There may be a case where a static faulty UUV has a communication ability, and thus, can emit a signal from it. We discuss a method which does not discard a static faulty UUV with communication ability. In this method, every UUV utilizes static faulty UUVs as “waypoints” along the path to the root UUV. Note that we do not discard faulty UUVs under this method.
Note that a healthy UUV, which does not have faults, can still measure the signal from a static faulty UUV. Assume that a healthy UUV, e.g., u, has a static faulty UUV, e.g., f, as its ancestor. In this case, the healthy UUV can still visit UUVs along the path, which contains f, to the root. This implies that u utilizes f as “waypoints” along the path to the root UUV.
Note that if f is healthy, then f waits until it encounters all its descendants. However, since f is faulty and static, f cannot move even after all its descendants encounter f. In this case, p ( f ) , the parent of f, cannot begin moving, since f is faulty and cannot move towards p ( f ) .
In order to resolve this problem, p ( f ) removes f from its descendants list. In this way, p ( f ) starts moving after all its descendants, other than f, encounter p ( f ) .

4.4. Visiting UUVs along the Path to the Root, Based on Signal Strength Measurements

At the beginning of Algorithm 2, Algorithm 1 in Section 4.1 runs to build a spanning tree T in a distributed manner. Algorithm 1 has the computational complexity O ( 1 ) [61,62]. Once T is generated, the only control applied to each UUV is visiting UUVs along the path, e.g., P A T H , to the root in T. This control is a high-level control of every UUV.
We introduce a local control to make one UUV visit UUVs along P A T H utilizing signal strength measurements. Consider the case where P A T H consists of a set of UUVs p 1 p 2 p 3 p e n d in this order. Here, p e n d is the root. In the inertial reference frame, let p j R 3 indicate the 3D position of p j for convenience.
Suppose that u i encountered p j 1 R 3 and that the next UUV to encounter is p j R 3 . Since u i encountered p j 1 , u i can detect the signal emitted from p j utilizing its intensity sensors. Each intensity sensor on u i measures the strength of signals emitted from p j .
Signal field intensity is maximized at the signal source. See Equation (5) for RSSI. The gradient direction of a field defines the direction which maximizes the increase in the field. We let a UUV u i move in the gradient direction of the field. Since the gradient is the direction representing the maximum increase of the field, this maneuver makes the UUV move towards the signal source.
The gradient direction is measured in the body−fixed frame of u i . In the body−fixed frame of u i , let gr i ( P ) R 3 present the gradient of P at the center of u i . Moving in the direction of gr i ( P ) makes u i move towards the signal source p j .
We next discuss how to derive gr i ( P ) utilizing signal intensity measurements. The local coordinates of every intensity sensor are presented in Figure 3.
Assume that c i r is sufficiently small for all r { 1 , , 6 } . Through Taylor expansion up to the first-order derivative, one obtains the following:
P ( c i r ) = P ( u i ) + c i r gr i ( P ) ,
which leads to:
P ( c i r ) P ( u i ) = c i r gr i ( P ) .
At each sampling step k, one obtains the following:
P S = [ P c 1 , P c 2 , , P c 6 ] .
Here, P c r = P ( c i r ) P ( u i ) . Furthermore, we utilize the following:
C S = [ c i 1 ; c i 2 ; c i 6 ] .
Utilizing (11)–(13), we derive the following:
P S T = C S gr i ( P ) .
Thereafter, gr i ( P ) R 3 is derived using the pseudo-inverse as follows:
gr i ( P ) = ( C S T C S ) 1 C S P S T .
where gr i ( P ) R 3 defines the gradient of P, measured in the the body−fixed frame of u i . In order to make u i head towards the signal source, the heading of u i is set as the gradient direction. Since the gradient is the direction representing the maximum increase of the field, this maneuver makes the UUV move towards the source.
In Equation (8), the UUV’s heading vector h i ( k ) R 3 is defined in the inertial reference frame. Since gr i ( P ) is defined in the body−fixed frame of u i , one changes gr i ( P ) into a gradient vector in the inertial reference frame.
Notice that R ( ψ ( k ) , θ ( k ) , ϕ ( k ) ) gr i ( P ) gr i ( P ) is a gradient vector in the inertial reference frame. In order to set the heading of u i as the gradient direction, u i sets its new heading using the following equation:
h i ( k + 1 ) = R ( ψ ( k ) , θ ( k ) , ϕ ( k ) ) gr i ( P ) gr i ( P ) .
Note that a UUV does not have to measure its attitude ϕ , θ , ψ for moving towards the signal source. The UUV can move in the gradient direction gr i ( P ) in its body−fixed frame. For instance, suppose that the gradient field gr i ( P ) is estimated as [1,0,0] in the UUV’s body−fixed frame. Using (16), the UUV’s control command is generated for moving in the direction of [1,0,0] in its body−fixed frame.
We next discuss how u i can detect the moment when it encounters p j . If P ( u i ) in Equation (6) exceeds P e in Equation (7), then we assume that u i encountered p j . Thus, u i begins moving towards p j + 1 if it exists.
For collision avoidance, we make u i slow down as it gets closer to p j . The UUV’s linear speed s i ( k ) is set as follows. If P ( u i ) in Equation (6) is larger than P e , then u i begins moving towards p j + 1 . Otherwise, we set the following:
s i ( k ) = m i n ( s m a x , β ( P e P ( u i ) ) ) .
where β > 0 is a tuning parameter. In MATLAB simulations, we use β = 10 . In Equation (17), m i n ( a , b ) returns a smaller value between a and b.
When a UUV u i is sufficiently close to p j R 3 , it begins moving towards the next UUV p j + 1 . In this way, u i avoids collision with UUVs on its path to the root. In the case where u i encounters the root, u i stops moving.
This study considers a spherical UUV. The authors of [16,19,20,21] showed that by adopting vectored water jets, a spherical UUV can maneuver freely in any direction. The control of a spherical UUV appeared in [22], which used fuzzy PID controllers to independently control the robot’s movement in all directions.
While u i maneuvers, a moving obstacle may abruptly appear in practice. In this case, the UUV u i can avoid collision using reactive collision avoidance controls. We acknowledge that any reactive control method can be applied for this evasion [63,64,65].

5. Simulations

The MATLAB R2014a simulator is utilized to demonstrate the effectiveness of the proposed rendezvous controllers. The system environment includes Window 10, Intel Core TM i5-7600K CPU@3.80 GHz. The controllers are implemented in a discrete-time system, and the sampling time interval to discretize the UUV’s velocity control (8) is 0.3 s.
We simulate a 3D underwater environment (200 × 200 × 200) with many obstacles. For realistic simulations of the RSSI for an underwater emitter, we use the model parameters used in [28]. In Equation (5), P 0 = 100 dB, E p = 2 , γ = 0.05 , and σ P = 1 are used, according to [28].
Recall that we said that a UUV u i is a neighbor to UUV u j if P ( u i ) > P t h r e s and P ( u j ) > P t h r e s . We set P t h r e s = 52 dB. Using Figure 4, the associated maximum sensing range r s is 10 m. In this way, the relative distance between two neighbor UUVs is less than 10 m.
The maximum speed of every UUV is set as s m a x = 2 (m/s). Recall that if P ( u i , p j ) and P ( u j , p i ) exceeds P e , then we assume that u i encountered p j . We set P e = 100 (in dB), which is identical to P 0 . Using (7), P e = 100 (in dB) is associated with ϵ = 1 m.
In this study, a UUV uses six intensity sensors. Figure 3 plots the local coordinates of every intensity sensors positioned on a UUV. d r is the relative distance between the first sensor and any other sensor. d r is a tuning parameter in our control.
If d r is too small, then intensity measurements of six sensors on a UUV are not distinct from each other. In this case, the gradient direction at the UUV position cannot be estimated accurately. If d r is too large, then we cannot apply the Taylor expansion in Equation (10). In the simulations, six intensity sensors are installed such that d r = 1 m.
To prove the robustness of the proposed methods, we run 100 Monte Carlo (MC) simulations, such that the initial network satisfies this initial connectivity assumption. As far as we know, this initial connectivity assumption is required for any distributed rendezvous controls in the literature [34,41,51,52].
At the beginning of each MC simulation, 50 UUVs are randomly deployed until the following two conditions are met:
  • No UUV is deployed inside an obstacle boundary.
  • The deployed UUVs satisfy the initial connectivity assumption.
Once these two conditions are satisfied, then 50 UUVs begin to move under Algorithm 2. Otherwise, we keep deploying 50 UUVs until the above two conditions are met.
Once these two conditions are satisfied, then 50 UUVs begin to maneuver under Algorithm 2. This maneuver indicates the beginning of a single MC simulation. In all MC simulations, rendezvous is achieved for every UUV.
Considering one MC simulation, Figure 5 shows the initial position of every UUV. The initial position of every UUV is plotted with a green circle. This figure shows the obstacle boundaries with spheres. We also plot the tree graph T (blue line segments) generated initially.
Figure 6 shows each UUV’s maneuver until t = 20 s have passed. We also plot the tree graph T (blue line segments) generated at time 0. Every UUV’s maneuver is illustrated as circles with a distinct color. After 148 s have passed, all UUVs encounter at the root UUV while avoiding collision with obstacles. Figure 7 shows each UUV’s maneuver once the rendezvous is completed. Figure 8 shows the final position (green circle) of every UUV.

5.1. Using the Discard Approach in Section 4.3.1

We utilize the initial position of every UUV as in Figure 5. In this scenario, 25 UUVs among 50 UUVs are broken after 20 s have elapsed. Recall that Figure 6 shows each UUV’s maneuver until t = 20 s pass.
To handle broken UUVs, we utilize the discard approach in Section 4.3.1. Considering one MC simulation, Figure 9 plots every UUV’s maneuver until t = 20 s have passed. In this figure, every UUV’s maneuver is illustrated as circles with a distinct color. At t = 0 s, we build a tree T (blue line segments in Figure 9) containing all UUVs. At t = 20 s, 25 broken UUVs are illustrated with red circles in Figure 9. At t = 20 s, we re-build a connected tree T without broken UUVs. The re-built tree T is marked with red line segments in Figure 9.
Considering UUVs’ faults, Figure 10 and Figure 11 show the movement of every UUV under our 3D distributed rendezvous controllers. In the figures, every UUV’s maneuver is illustrated as circles with a distinct color. In total, 25 broken UUVs are illustrated with red circles. To handle broken UUVs, one utilizes the discard approach in Section 4.3.1. In total, 25 healthy UUVs spend 180 s to encounter at the root, while avoiding collision with obstacles. Figure 11 shows every UUV’s final position (green circles) after the rendezvous is completed (discard approach is utilized). A total of 25 broken UUVs are illustrated with red circles.

5.2. Using the Waypoint Approach in Section 4.3.2

We utilize the initial position of every UUV as in Figure 5. In this scenario, 25 UUVs among 50 UUVs are broken after 20 s have elapsed. Recall that Figure 6 shows each UUV’s maneuver until t = 20 s pass.
Considering UUVs’ faults, Figure 12 and Figure 13 show the movement of every UUV under our 3D distributed rendezvous controllers. In the figures, every UUV’s maneuver is illustrated as circles with a distinct color. To handle broken UUVs, we utilize the waypoint approach in Section 4.3.2. At t = 0 s, we build a tree T (blue line segments in Figure 12) containing all UUVs. A total of 25 broken UUVs are illustrated with red circles. In Figure 13, all healthy UUVs (green circles) rendezvous at the root. We can see that healthy UUVs use broken UUVs as waypoints for reaching the root. A total of 25 healthy UUVs spend 148 s to encounter at the root UUV, while avoiding collision with obstacles.

6. Conclusions

This article proposed distributed rendezvous controllers to solve the multi-robot rendezvous problem in cluttered 3D environments without GPS. The proposed 3D rendezvous controls assure the convergence to the root, while maintaining the connectivity of the time-varying and position-dependent communication network.
This study considers multiple UUVs such that each UUV has multiple signal intensity sensors surrounding it. Multiple intensity sensors on a UUV can measure the strength of signals, and the UUV moves based on the signal strength measurements. Our rendezvous algorithms are robust to faults in the system. This study proves the convergence of the proposed rendezvous algorithms and demonstrates the effectiveness of the proposed algorithms utilizing MATLAB simulations.
Note that the proposed rendezvous algorithms do not rely on the dimension (2D or 3D) of the environment. This implies that our algorithms can be applied for the rendezvous problem of autonomous aerial vehicles, autonomous underwater vehicles, or autonomous ground vehicles. In future studies, we will perform experiments utilizing real UUVs to verify the effectiveness of the proposed rendezvous algorithms.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (Grant Number: 2022R1A2C1091682). This research was supported by the faculty research fund of Sejong university in 2023.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Kim, J.; Kim, S. Motion control of multiple autonomous ships to approach a target without being detected. Int. J. Adv. Robot. Syst. 2018, 15, 1729881418763184. [Google Scholar] [CrossRef]
  2. Kim, J. Cooperative Exploration and Protection of a Workspace Assisted by Information Networks. Ann. Math. Artif. Intell. 2014, 70, 203–220. [Google Scholar] [CrossRef]
  3. Kim, J. Capturing intruders based on Voronoi diagrams assisted by information networks. Int. J. Adv. Robot. Syst. 2017, 14, 1–8. [Google Scholar] [CrossRef]
  4. Kim, J. Cooperative Exploration and Networking While Preserving Collision Avoidance. IEEE Trans. Cybern. 2017, 47, 4038–4048. [Google Scholar] [CrossRef]
  5. Cortés, J.; Martínez, S.; Bullo, F. Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions. IEEE Trans. Autom. Control. 2006, 51, 1289–1298. [Google Scholar] [CrossRef]
  6. Roza, A.; Maggiore, M.; Scardovi, L. A class of rendezvous controllers for underactuated thrust-propelled rigid bodies. In Proceedings of the IEEE International Conference on Decision and Control, Los Angeles, CA, USA, 15–17 December 2014; pp. 1649–1654. [Google Scholar]
  7. Park, H.; Hutchinson, S. A distributed optimal strategy for rendezvous of multi-robots with random node failures. In Proceedings of the IEEE International Conference on Intelligent Robots and Systems, Chicago, IL, USA, 14–18 September 2014; pp. 1155–1160. [Google Scholar]
  8. Muralidharan, V.; Emami, M.R. Concurrent rendezvous control of underactuated spacecraft. Acta Astronaut. 2017, 138, 28–42. [Google Scholar] [CrossRef]
  9. Yu, X.; Hsieh, M.A.; Wei, C.; Tanner, H.G. Synchronous Rendezvous for Networks of Marine Robots in Large Scale Ocean Monitoring. Front. Robot. AI 2019, 6, 76. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Wei, C.; Li, C.; Tanner, H.G. Synchronous Rendezvous for Periodically Orbiting Vehicles with Very-Low-Range Interactions. In Proceedings of the 2018 Annual American Control Conference (ACC), Milwaukee, WU, USA, 27–29 June 2018; pp. 1641–1646. [Google Scholar]
  11. Wei, C.; Tanner, H.G.; Yu, X.; Hsieh, M.A. Low-Range Interaction Periodic Rendezvous Along Lagrangian Coherent Structures. In Proceedings of the 2019 American Control Conference (ACC), Philadelphia, PA, USA, 10–12 July 2019; pp. 4012–4017. [Google Scholar]
  12. Wei, W.; Wang, J.; Fang, Z.; Chen, J.; Ren, Y.; Dong, Y. 3U: Joint Design of UAV-USV-UUV Networks for Cooperative Target Hunting. IEEE Trans. Veh. Technol. 2023, 72, 4085–4090. [Google Scholar] [CrossRef]
  13. Ajorlou, A.; Momeni, A.; Aghdam, A.G. A Class of Bounded Distributed Control Strategies for Connectivity Preservation in Multi-Agent Systems. IEEE Trans. Autom. Control. 2010, 55, 2828–2833. [Google Scholar] [CrossRef]
  14. Dimarogonas, D.V.; Johansson, K.H. Decentralized connectivity maintenance in mobile networks with bounded inputs. In Proceedings of the IEEE International Conference on Robotics and Automation, Pasadena, CA, USA, 19–23 May 2008; pp. 1507–1512. [Google Scholar]
  15. Chen, C.; Chen, G.; Guo, L. Consensus of flocks under M-nearest-neighbor rules. J. Syst. Sci. Complex. 2015, 28, 1–15. [Google Scholar] [CrossRef]
  16. Gu, S.; Guo, S.; Zheng, L. A highly stable and efficient spherical underwater robot with hybrid propulsion devices. Auton. Robot 2020, 44, 759–771. [Google Scholar] [CrossRef]
  17. Prasad, B.; Agrawal, A.; Viswanathan, V.; Chowdhury, A.R.; Kumar, R.; Panda, S.K. A visually guided spherical underwater robot. In Proceedings of the 2015 IEEE Underwater Technology (UT), Chennai, India, 23–25 February 2015; pp. 1–6. [Google Scholar]
  18. He, Y.; Zhu, L.; Sun, G.; Qian, J.; Guo, S. Underwater motion characteristics evaluation of multi amphibious spherical robots. Microsyst. Technol. 2019, 25, 499–508. [Google Scholar] [CrossRef]
  19. Zheng, L.; Guo, S.; Gu, S. The communication and stability evaluation of amphibious spherical robots. Microsyst. Technol. 2019, 25, 2625–2639. [Google Scholar] [CrossRef]
  20. He, Y.; Zhu, L.; Sun, G.; Dong, M. Study on formation control system for underwater spherical multi-robot. Microsyst. Technol. 2019, 25, 1455–1466. [Google Scholar] [CrossRef]
  21. Yue, C.; Guo, S.; Shi, L. Hydrodynamic Analysis of the Spherical Underwater Robot SUR-II. Int. J. Adv. Robot. Syst. 2013, 10, 247. [Google Scholar] [CrossRef]
  22. Bao, P.; Hu, Y.; Shi, L.; Guo, S.; Li, Z. A decoupling three-dimensional motion control algorithm for spherical underwater robot. Biomim. Intell. Robot. 2022, 2, 100067. [Google Scholar] [CrossRef]
  23. Lin, J.; Yang, X.; Zheng, P.; Cheng, H. End-to-end Decentralized Multi-robot Navigation in Unknown Complex Environments via Deep Reinforcement Learning. In Proceedings of the 2019 IEEE International Conference on Mechatronics and Automation (ICMA), Tianjin, China, 4–7 August 2019; pp. 2493–2500. [Google Scholar]
  24. Hu, J.; Sun, J.; Zou, Z.; Ji, D.; Xiong, Z. Distributed multi-robot formation control under dynamic obstacle interference. In Proceedings of the 2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), Boston, MA, USA, 6–10 July 2020; pp. 1435–1440. [Google Scholar]
  25. Alonso-Mora, J.; Baker, S.; Rus, D. Multi-robot formation control and object transport in dynamic environments via constrained optimization. Int. J. Robot. Res. 2017, 36, 1000–1021. [Google Scholar] [CrossRef]
  26. Kim, J. Tracking Controllers to Chase a Target Using Multiple Autonomous Underwater Vehicles Measuring the Sound Emitted From the Target. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 4579–4587. [Google Scholar] [CrossRef]
  27. Mathew, N.; Smith, S.L.; Waslander, S.L. Multirobot Rendezvous Planning for Recharging in Persistent Tasks. IEEE Trans. Robot. 2015, 31, 128–142. [Google Scholar] [CrossRef]
  28. Zhang, B.; Wang, H.; Xu, T.; Zheng, L.; Yang, Q. Received signal strength-based underwater acoustic localization considering stratification effect. In Proceedings of the OCEANS 2016, Shanghai, China, 10–13 April 2016; pp. 1–8. [Google Scholar]
  29. Giordano, P.R.; Franchi, A.; Seccos, C.; Bulthoff, H.H. A passivity-based decentralized strategy for generalized connectivity maintenance. Int. J. Robot. Res. 2013, 32, 299–323. [Google Scholar] [CrossRef] [Green Version]
  30. Sabattini, L.; Secchi, C.; Chopra, N.; Gasparri, A. Distributed Control of Multirobot Systems with Global Connectivity Maintenance. IEEE Trans. Robot. 2013, 29, 1326–1332. [Google Scholar] [CrossRef]
  31. Ajorlou, A.; Momeni, A.; Aghdam, A.G. Connectivity Preservation in Nonholonomic Multi-Agent Systems: A Bounded Distributed Control Strategy. IEEE Trans. Autom. Control. 2013, 58, 2366–2371. [Google Scholar] [CrossRef] [Green Version]
  32. Gong, C.; Tully, S.; Kantor, G.; Choset, H. Multi-agent deterministic graph mapping via robot rendezvous. In Proceedings of the Robotics and Automation (ICRA), 2012 IEEE International Conference on Robotics and Automation, St. Paul, MN, USA, 14–18 May 2012; pp. 1278–1283. [Google Scholar]
  33. Martinez, S. Practical multiagent rendezvous through modified circumcenter algorithms. Automatica 2009, 45, 2010–2017. [Google Scholar] [CrossRef]
  34. Park, H.; Hutchinson, S. An efficient algorithm for fault-tolerant rendezvous of multi-robot systems with controllable sensing range. In Proceedings of the Robotics and Automation (ICRA), 2016 IEEE International Conference on Robotics and Automation, Stockholm, Sweden, 16–21 May 2016; pp. 358–365. [Google Scholar]
  35. Wang, Q.; Duan, Z.; Lv, Y.; Wang, Q.; Chen, G. Distributed Model Predictive Control for Linear-Quadratic Performance and Consensus State Optimization of Multiagent Systems. IEEE Trans. Cybern. 2021, 51, 2905–2915. [Google Scholar] [CrossRef]
  36. Dong, Y.; Xu, S. Rendezvous with Connectivity Preservation Problem of Linear Multiagent Systems via Parallel Event-Triggered Control Strategies. IEEE Trans. Cybern. 2022, 52, 2725–2734. [Google Scholar] [CrossRef]
  37. Liu, P.; Xiao, F.; Wei, B. Event-Triggered Control for Multi-Agent Systems: Event Mechanisms for Information Transmission and Controller Update. J. Syst. Sci. Complex. 2022, 35, 953–972. [Google Scholar] [CrossRef]
  38. Yi, X.; Liu, K.; Dimarogonas, D.V.; Johansson, K.H. Distributed dynamic event-triggered control for multi-agent systems. In Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC), Melbourne, Australia, 12–15 December 2017; pp. 6683–6698. [Google Scholar]
  39. Zheng, R.; Sun, D. Multirobot rendezvous with bearing-only or range-only measurements. Robot. Biomimetics 2014, 1, 4. [Google Scholar] [CrossRef] [Green Version]
  40. Sabelhaus, A.P.; Mirsky, D.; Hill, L.M.; Martins, N.C.; Bergbreiter, S. TinyTeRP: A Tiny Terrestrial Robotic Platform with modular sensing. In Proceedings of the 2013 IEEE International Conference on Robotics and Automation, Karlsruhe, Germany, 6–10 May 2013; pp. 2600–2605. [Google Scholar]
  41. Cho, C.; Kim, J. Robust Distributed Rendezvous Using Multiple Robots with Variable Range Radars. Appl. Sci. 2022, 12, 8535. [Google Scholar] [CrossRef]
  42. Fossen, T.I. Guidance and Control of Ocean Vehicles; John Wiley and Sons: Hoboken, NJ, USA, 1994. [Google Scholar]
  43. Douglas, B.W. Introduction to Graph Theory, 2nd ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2001. [Google Scholar]
  44. Go, S.; Chong, J.W. Improved TOA-Based Localization Method with BS Selection Scheme for Wireless Sensor Networks. ETRI J. 2015, 37, 707–716. [Google Scholar] [CrossRef] [Green Version]
  45. Guvenc, I.; Chong, C.C. A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques. IEEE Commun. Surv. Tutorials 2009, 11, 107–124. [Google Scholar] [CrossRef]
  46. Montminy, M.B. Passive Geolocation of Low-Power Emitters in Urban Environments Using TDOA; BiblioScholar: Singapore, 2012. [Google Scholar]
  47. Chen, B.S.; Yang, C.Y.; Liao, F.K.; Liao, J.F. Mobile Location Estimator in a Rough Wireless Environment Using Extended Kalman-Based IMM and Data Fusion. IEEE Trans. Veh. Technol. 2008, 58, 1157–1169. [Google Scholar] [CrossRef]
  48. Kim, J. Tracking a manoeuvring target while mitigating NLOS errors in TDOA measurements. IET Radar Sonar Navig. 2020, 14, 495–502. [Google Scholar] [CrossRef]
  49. Liu, D.; Lee, M.C.; Pun, C.M.; Liu, H. Analysis of Wireless Localization in Non-Line-of-Sight Conditions. IEEE Trans. Veh. Technol. 2013, 62, 1484–1492. [Google Scholar] [CrossRef]
  50. Wann, C.; Chin, H. Hybrid TOA/RSSI Wireless Location with Unconstrained Nonlinear Optimization for Indoor UWB Channels. In Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, Hong Kong, China, 11–15 March 2007; pp. 3940–3945. [Google Scholar] [CrossRef]
  51. Ji, M.; Egerstedt, M. Distributed Coordination Control of Multi-Agent Systems While Preserving Connectedness. IEEE Trans. Robot. 2007, 23, 693–703. [Google Scholar] [CrossRef]
  52. Kan, Z.; Klotz, J.R.; Shea, J.M.; Doucette, E.A.; Dixon, W.E. Decentralized Rendezvous of Nonholonomic Robots with Sensing and Connectivity Constraints. J. Dyn. Syst. Meas. Control. 2016, 139. [Google Scholar] [CrossRef] [Green Version]
  53. Wu, W.; Zhang, F. A Speeding-Up and Slowing-Down Strategy for Distributed Source Seeking with Robustness Analysis. IEEE Trans. Control. Netw. Syst. 2016, 3, 231–240. [Google Scholar] [CrossRef]
  54. Al-Abri, S.; Wu, W.; Zhang, F. A Gradient-Free Three-Dimensional Source Seeking Strategy with Robustness Analysis. IEEE Trans. Autom. Control. 2019, 64, 3439–3446. [Google Scholar] [CrossRef]
  55. Kim, J. Three-dimensional multi-robot control to chase a target while not being observed. Int. J. Adv. Robot. Syst. 2019, 16, 1–11. [Google Scholar] [CrossRef]
  56. Garcia de Marina, H.; Cao, M.; Jayawardhana, B. Controlling Rigid Formations of Mobile Agents Under Inconsistent Measurements. IEEE Trans. Robot. 2015, 31, 31–39. [Google Scholar] [CrossRef] [Green Version]
  57. Krick, L.; Broucke, M.E.; Francis, B.A. Stabilization of infinitesimally rigid formations of multi-robot networks. In Proceedings of the 2008 47th IEEE Conference on Decision and Control, Cancun, Mexico, 9–11 December 2008; pp. 477–482. [Google Scholar]
  58. Paley, D.A.; Zhang, F.; Leonard, N.E. Cooperative Control for Ocean Sampling: The Glider Coordinated Control System. IEEE Trans. Control. Syst. Technol. 2008, 16, 735–744. [Google Scholar] [CrossRef]
  59. Kim, J. Constructing 3D Underwater Sensor Networks without Sensing Holes Utilizing Heterogeneous Underwater Robots. Appl. Sci. 2021, 11, 4293. [Google Scholar] [CrossRef]
  60. Luo, S.; Kim, J.; Parasuraman, R.; Bae, J.H.; Matson, E.T.; Min, B.C. Multi-robot rendezvous based on bearing-aided hierarchical tracking of network topology. Hoc Netw. 2019, 86, 131–143. [Google Scholar] [CrossRef]
  61. Li, Q.; De Rosa, M.; Rus, D. Distributed Algorithms for Guiding Navigation across a Sensor Network. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, MobiCom’03, San Diego, CA, USA, 14–19 September 2003; Association for Computing Machinery: New York, NY, USA, 2003; pp. 313–325. [Google Scholar]
  62. Li, Q.; Aslam, J.; Rus, D. Distributed Energy-conserving Routing Protocols for Sensor Networks. In Proceedings of the IEEE Hawaii International Conference on System Science, Big Island, HI, USA, 6–9 January 2003. [Google Scholar]
  63. Kim, J. Control laws to avoid collision with three dimensional obstacles using sensors. Ocean. Eng. 2019, 172, 342–349. [Google Scholar] [CrossRef]
  64. Lalish, E.; Morgansen, K. Distributed reactive collision avoidance. Auton. Robot. 2012, 32, 207–226. [Google Scholar] [CrossRef]
  65. Lavalle, S.M. Planning Algorithms; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
Figure 1. This figure depicts three euler angles ( ϕ , θ , and ψ ). In this figure, there is a spherical UUV, and we plot a cross-shaped propeller at the back of the UUV. Furthermore, this figure depicts the inertial reference frame { I } and the body−fixed frame { B } .
Figure 1. This figure depicts three euler angles ( ϕ , θ , and ψ ). In this figure, there is a spherical UUV, and we plot a cross-shaped propeller at the back of the UUV. Furthermore, this figure depicts the inertial reference frame { I } and the body−fixed frame { B } .
Applsci 13 04130 g001
Figure 2. This figure depicts a tree T.
Figure 2. This figure depicts a tree T.
Applsci 13 04130 g002
Figure 3. The local coordinates of every intensity sensor positioned on a UUV. The origin of the local coordinates frame is at the UUV’s center. The numbering in front of local coordinates indicates the index of the associated intensity sensor. We can see that every intensity sensor is positioned at equidistant point from the UUV’s center. Here, d r is the relative distance between the UUV’s center and any other sensor.
Figure 3. The local coordinates of every intensity sensor positioned on a UUV. The origin of the local coordinates frame is at the UUV’s center. The numbering in front of local coordinates indicates the index of the associated intensity sensor. We can see that every intensity sensor is positioned at equidistant point from the UUV’s center. Here, d r is the relative distance between the UUV’s center and any other sensor.
Applsci 13 04130 g003
Figure 4. The relationship between d I and P ( u i ) using Equations (5) and (6). As d I increases, P ( u i ) decreases.
Figure 4. The relationship between d I and P ( u i ) using Equations (5) and (6). As d I increases, P ( u i ) decreases.
Applsci 13 04130 g004
Figure 5. The initial position of every UUV is plotted with a green circle. We also plot the tree graph T (blue line segments) generated at time 0 (one MC simulation). We can see that the initial connectivity assumption is satisfied. Obstacles are plotted with spheres.
Figure 5. The initial position of every UUV is plotted with a green circle. We also plot the tree graph T (blue line segments) generated at time 0 (one MC simulation). We can see that the initial connectivity assumption is satisfied. Obstacles are plotted with spheres.
Applsci 13 04130 g005
Figure 6. Every UUV’s maneuver until t = 20 s has passed (one MC simulation). Every UUV’s maneuver is illustrated as circles with a distinct color. We also plot the tree graph T (blue line segments) generated at time 0. Obstacles are plotted with spheres.
Figure 6. Every UUV’s maneuver until t = 20 s has passed (one MC simulation). Every UUV’s maneuver is illustrated as circles with a distinct color. We also plot the tree graph T (blue line segments) generated at time 0. Obstacles are plotted with spheres.
Applsci 13 04130 g006
Figure 7. Every UUV’s maneuver once the rendezvous is completed (one MC simulation). Every UUV’s maneuver is illustrated as circles with a distinct color. Obstacles are plotted with spheres.
Figure 7. Every UUV’s maneuver once the rendezvous is completed (one MC simulation). Every UUV’s maneuver is illustrated as circles with a distinct color. Obstacles are plotted with spheres.
Applsci 13 04130 g007
Figure 8. Every UUV’s final position (green circle in this figure) after the rendezvous is completed (one MC simulation). Obstacles are plotted with spheres.
Figure 8. Every UUV’s final position (green circle in this figure) after the rendezvous is completed (one MC simulation). Obstacles are plotted with spheres.
Applsci 13 04130 g008
Figure 9. Every UUV’s maneuver until t = 20 s have passed (one MC simulation). Every UUV’s maneuver is illustrated as circles with a distinct color. At t = 0 s, we build a tree T (blue line segments) containing all UUVs. At t = 20 s, 25 broken UUVs are illustrated with red circles. At t = 20 s, we re-build a connected tree T without broken UUVs. The re-built tree T is marked with red line segments. Obstacles are plotted with spheres.
Figure 9. Every UUV’s maneuver until t = 20 s have passed (one MC simulation). Every UUV’s maneuver is illustrated as circles with a distinct color. At t = 0 s, we build a tree T (blue line segments) containing all UUVs. At t = 20 s, 25 broken UUVs are illustrated with red circles. At t = 20 s, we re-build a connected tree T without broken UUVs. The re-built tree T is marked with red line segments. Obstacles are plotted with spheres.
Applsci 13 04130 g009
Figure 10. Every UUV’s maneuver once the rendezvous is completed (the discard approach is utilized). Every UUV’s maneuver is illustrated as circles with a distinct color. A total of 25 broken UUVs are illustrated with red circles. Obstacles are plotted with spheres.
Figure 10. Every UUV’s maneuver once the rendezvous is completed (the discard approach is utilized). Every UUV’s maneuver is illustrated as circles with a distinct color. A total of 25 broken UUVs are illustrated with red circles. Obstacles are plotted with spheres.
Applsci 13 04130 g010
Figure 11. Every UUV’s final position (green circles) after the rendezvous is completed (the discard approach is utilized). A total of 25 broken UUVs are illustrated with red circles. Obstacles are plotted with spheres.
Figure 11. Every UUV’s final position (green circles) after the rendezvous is completed (the discard approach is utilized). A total of 25 broken UUVs are illustrated with red circles. Obstacles are plotted with spheres.
Applsci 13 04130 g011
Figure 12. Every UUV’s maneuver once the rendezvous is completed (the waypoint approach is utilized). Every UUV’s maneuver is illustrated as circles with a distinct color. At t = 0 s, we build a tree T (blue line segments) containing all UUVs. A total of 25 broken UUVs are illustrated with red circles. Healthy UUVs use broken UUVs as waypoints for reaching the root. Obstacles are plotted with spheres.
Figure 12. Every UUV’s maneuver once the rendezvous is completed (the waypoint approach is utilized). Every UUV’s maneuver is illustrated as circles with a distinct color. At t = 0 s, we build a tree T (blue line segments) containing all UUVs. A total of 25 broken UUVs are illustrated with red circles. Healthy UUVs use broken UUVs as waypoints for reaching the root. Obstacles are plotted with spheres.
Applsci 13 04130 g012
Figure 13. Every UUV’s final position after the rendezvous is completed (the waypoint approach is utilized). A total of 25 broken UUVs are illustrated with red circles. All healthy UUVs (green circles in the figure) rendezvous at the root. Obstacles are plotted with spheres.
Figure 13. Every UUV’s final position after the rendezvous is completed (the waypoint approach is utilized). A total of 25 broken UUVs are illustrated with red circles. All healthy UUVs (green circles in the figure) rendezvous at the root. Obstacles are plotted with spheres.
Applsci 13 04130 g013
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kim, J. Three-Dimensional Rendezvous Controls of Multiple Robots with Amplitude-Only Measurements in Cluttered Underwater Environments. Appl. Sci. 2023, 13, 4130. https://doi.org/10.3390/app13074130

AMA Style

Kim J. Three-Dimensional Rendezvous Controls of Multiple Robots with Amplitude-Only Measurements in Cluttered Underwater Environments. Applied Sciences. 2023; 13(7):4130. https://doi.org/10.3390/app13074130

Chicago/Turabian Style

Kim, Jonghoek. 2023. "Three-Dimensional Rendezvous Controls of Multiple Robots with Amplitude-Only Measurements in Cluttered Underwater Environments" Applied Sciences 13, no. 7: 4130. https://doi.org/10.3390/app13074130

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop