Professional Documents
Culture Documents
3, MARCH 2020
Abstract—In this paper, we address a novel hierarchical Nic Set of robot i’s critical robots.
distributed control (HDC) strategy for networked multirobot Nin Set of robot i’s noncritical robots.
systems (MRSs). This strategy is developed on a geometric rij Relative distance between robots i and j.
approach without requiring estimation of algebraic connectiv-
ity. It is originally based upon behavioral control, but upgraded eij Connectivity between robots i and j.
by distributed node control with a mobility constraint for global ε, εi Critical tolerance and minimum tolerance.
network integrity preservation and distributed connectivity con- Bi Restricted area of robot i.
trol with a local connectivity minimization strategy for network Ti Group of triangle topologies.
coverage expansion. Thanks to properties of HDC, a networked Ki Group of k-connected topologies.
MRS is capable of achieving high performance with cooperative g
tasks. We have examined and evaluated our proposed method in Ni Set of robot i’s neighbors in a group of local
both simulations with up to 100 simulated robots and real-world connectivity topologies.
experiments with up to 14 real robots. Rni Sets of robot i’s redundant critical robots in a group
Index Terms—Behavioral control, distributed connectivity of local connectivity topologies.
control, distributed node control, global network integrity preser- RnTi Set of robot i’s redundant critical robots in groups Ti .
vation, hierarchical distributed control (HDC), local connectivity RnK i Set of robot i’s redundant critical robots in groups Ki .
minimization strategy, multirobot systems (MRSs). −
→vi Velocity vector of robot i.
−
→v ci Cohesion vector.
−
→v si Separation vector.
−
→v ai Alignment vector.
N OMENCLATURE
vimax Maximum velocity of robot i.
N Number of robots in a swarm.
di Assigned destination of robot i inside Si .
λ2 Connectivity property of a robot network.
ρij Consensus signal between robots i and j.
Lc Communication level of a robot in the network.
Iij Path between robots i and j.
Iij Length of the shortest path between robots i and j.
ui Control input of robot i.
xi Position of robot i at time t.
xi Run-step of robot i in a time interval t.
rc Sensing and communication range of robot i. I. I NTRODUCTION
Si Sensing area of robot i.
NETWORKED multirobot system (MRS) has been a
Sci
Sni
Critical area of robot i.
Noncritical area of robot i. A very active research field over the last few decades due to
its challenges and potential applications. It consists of mobile
Sai Obstacle avoidance area of robot i.
robots that cooperatively work through information exchange
Ni Set of robot i’s neighboring robots.
in order to achieve a common goal, thus preserving global
Manuscript received March 19, 2018; revised December 9, 2018 network integrity through all robots over time is an important
and February 18, 2019; accepted April 16, 2019. Date of publication research topic of this field. This paper focuses on designing a
May 16, 2019; date of current version January 21, 2020. This work
was supported in part by the Natural Science and Engineering Research novel distributed control strategy to guarantee global network
Council of Canada (NSERC) under Grant RGPIN-2017-05446, in part by the integrity preservation of mobile robots over time while they are
Mathematics of Information Technology and Complex Systems (MITACS) performing their cooperative tasks toward an assigned ultimate
under Grant IT11073, and in part by the Department of Natural Defence
of Canada-Innovation for Defence Excellence and Security (DND-IDEaS) goal.
under Grant IDEaS-1-1A-CP0726. This paper was recommended by Associate Recent research of distributed control for MRS can be
Editor K.-S. Hwang. (Corresponding author: Trung Dung Ngo.) roughly categorized in three streams: 1) behavior-based con-
P. D. Hung and T. Q. Vinh are with the Department of Electronics and
Computer Engineering, University of Engineering and Technology, Hanoi 084, trol [1]–[11]; 2) artificial potential force field [12]–[23]; and
Vietnam (e-mail: hungpd@vnu.edu.vn; vinhtq@vnu.edu.vn). 3) graph theory-based algebraic connectivity [24]–[31].
T. D. Ngo is with the More-Than-One Robotics Laboratory, University Naturally inspired behavioral control for MRS has been first
of Prince Edward Island, Charlottetown, PE C1A 4R3, Canada (e-mail:
dungnt@ieee.org). seen in the bird-flocking algorithm with only simple rules
This paper has supplementary downloadable material available at of cohesion, separation, and alignment. Behavioral control
http://ieeexplore.ieee.org, provided by the author. was introduced by Reynolds [1] and further extended in [2].
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. Parker [3] introduced heuristic approaches to the design of
Digital Object Identifier 10.1109/TCYB.2019.2913326 interaction rules and emergent behaviors in the behavior-based
2168-2267 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1279
control scheme. Olfati-Saber and Murray [4] developed dis- constraints. An extended version of this method for maintain-
tributed flocking control using navigational feedback for all ing the global connectivity of the MRS is presented in [23].
mobile robots with static and dynamic leaders in the absence Distributed estimation and control of graph connectivity
and presence of obstacles. Jadbabaie et al. [5] provided a proof are popular approaches to guarantee connectivity maintenance
of convergence of distributed consensus and coordination of of MRS. The estimation of algebraic connectivity of the
multiple robots in a noise-free case by modeling changes in graph—equivalent to the second-smallest eigenvalue of the
topology without considering the dependence of switching Laplacian matrix—is highly exploited for connectivity control.
motion. Marino et al. [6] proposed the patrolling algorithm Yang et al. [24] used a decentralized power iteration algo-
based on the high abstraction level of behavioral control with- rithm to estimate the Fiedler eigenvector applied to the control
out using communication, which was also upgraded in [8]. law for connectivity maintenance in a distributed manner.
Antonelli et al. [7] approached the problem of robot flock- Sabattini et al. [25], [26] exploited the framework to develop
ing using the behavior-based control architecture in which a gradient-based control strategy using energy functions for
robot behaviors are predefined to achieve the assigned mission. maintaining the algebraic connectivity. Giordano et al. [27]
Xu et al. [9] proposed the behavior-based control architec- developed a gradient-based decentralized controller for global
ture for formation generation and control during navigation. connectivity maintenance by using a scalar potential function
Zuo et al. [10] proposed behaviors of multirobot formation of the second smallest eigenvalue. The gradient-based con-
using reinforcement learning. Robots select different behav- troller is used in [28] for the multitarget exploration problem.
iors in various different situations. Fernandez-Gauna et al. [11] Cai et al. [29] proposed a unified control framework to main-
presented a distributed round-robin Q-learning for cooperative tain and control connectivity of the MRS using methods
systems in which each agent selects actions according to a in [24] and [26]. Gasparri et al. [30] introduced a distributed
defined order. bounded control law for global connectivity maintenance of
The artificial potential field method synthesizes the attrac- the MRS in which mobile robots move toward a given bounded
tive and repulsive forces on mobile robots to drive them toward collective control objective. Panerati et al. [31] considered
goals without colliding with obstacles. Howard et al. [12] robust connectivity maintenance control for fallible robots.
deployed large-scale mobile sensors in a distributed manner In summary, global network integrity preservation for MRS
to maximize the coverage area of the network by following was not mentioned in [1]–[9], [12]–[15], and [19]–[21] while
the negative gradient of the artificial potential force fields. the others present connectivity maintenance in two typical
Örgen et al. [13] introduced a modeling method of the approaches: 1) local [16]–[18] and 2) global [22]–[31] connec-
mobile sensor network moving in a fixed formation along tivity maintenance. The local connectivity maintenance means
the estimated gradient in a scalar distributed field. Zou and that connectivity between two robots is maintained over time
Chakrabarty [14] proposed virtual attractive and repulsive if they are connected at the initial stage. In the global connec-
forces for deployment and coverage enhancement in cluster- tivity maintenance, robots are capable of flexibly adding and
based mobile sensor networks. Spears et al. [15] gave a new deleting links while the global network integrity of robots is
potential force field inspired from physics laws to maintain preserved.
the relative localization of mobile robots in either square To the best of our knowledge, most of the aforemen-
or hexagon formations. Ji and Egerstedt [16] developed a tioned distributed control for global connectivity mainte-
distributed control system with unbounded potential forces nance [22]–[31] requires estimation of algebraic connectivity
in order to maintain connectivity of a pair of robots and and applying spatial-potential-based interaction for the con-
to provide the local gradient incorporated in the link addi- nectivity maintenance of robots. The algebraic connectivity
tion function of the connectivity graphs. Dimarogonas and estimation procedure proposed in [24] requests that each robot
Kyriakopoulos [17] modeled network connectivity by combin- update connectivities of the global network through exchang-
ing a repulsive force and an attractive force. The properties of ing information with its neighbors. This procedure fully relies
local gradient and switching of the network connectivity were on intercommunication between the robots and is very time
used to develop the distributed control for the link addition- consuming (a few seconds for only six robots as in [24]) in
based graph partitioning algorithm. Mikkelsen et al. [20] order to obtain the algebraic connectivity that is used as the
released a new kind of potential force field based on a prob- input for distributed control of every robot. This assumption is
abilistic model using empirical statistics of infrared commu- not realistic to apply in the real system, especially a large-scale
nication to maintain relative localization for robot formation. network of mobile robots.
Ajorlou et al. [18] proposed distributed control for connectiv- In this paper, we present a novel distributed control method
ity preservation using the potential function. Julian et al. [19] based on a geometric approach for controlling the global
developed the gradient-based controller to drive the robots to network integrity preservation of MRS. Instead of requiring
measure the environment conditions and maximize observation estimation of the second smallest eigenvalue and its cor-
information by sequential Bayesian filters. Naderi et al. [21] responding eigenvector as was done in previous works, a
proposed a fast centralized method based on the artificial hierarchical distributed control (HDC) is an integration of dis-
potential field applied to drive the leader of the MRS toward tributed node control and distributed connectivity control. The
its target on domes. Williams and Sukhatme [22] proposed distributed node control is developed under a mobility con-
a switching interaction model and potential field controls for straint to guarantee global network integrity preservation of
connectivity maintenance and maximization under local degree MRS while the distributed connectivity control is built up for
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1280 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1281
Fig. 3. Variance of the relative distance between two robots i and j after a
time interval t.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1282 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020
In summary, the global network integrity of MRS is 2) Group Ki consists of consecutive adjacent k-connected
preserved if the control input ui is limited by the bounded topologies only. This group has the following properties:
constraint vimax as follows:
egm gm+1 = 0 ∧ Igm gm+1 \ {gm , i, gm+1 }
⎧ ε
⎨ Nic = ∅ = ∅, ∀m ∈ [1, q) (21)
vimax = 2t , where εi = minc (rc − rij ). (17) g
⎩ εi N c = ∅ j∈Ni j ∈ Ni \ Ni : (ejk = 1) ∧ Ijk \ {j, i, k} = ∅
i
2t k = g1 , gp . (22)
C. Local Connectivity Topologies and Minimization Strategy Note that a group containing both Ti and Ki becomes Ki if
Ti is minimized as explained and proven in Proposition 6.
If Proposition 2 is satisfied, critical robots of robot i may act g
Proposition 4 (Connectivity in Ni ): In robot i’s group of
like “anchors,” preventing robot i from moving out of sensing g
local connectivity topologies, any two robots j, k ∈ Ni are
area of its critical robots toward its desired target due to mobil-
connected directly or indirectly.
ity constraints as shown in (17)—which is considered as a type
Proof: Assume that j = gm1 and k = gm2 , where 1 ≤ m1 <
of local minima. When robot i falls into a local minimum, its
m2 ≤ q. We consider two cases as follows.
workspace is limited in a restricted area as follows.
1) Group Ti : Equation (19) is satisfied, so egm gm+1 =
Proposition 3 (Restricted Area): If all critical connectivities
1, ∀m ∈ [m1 , m2 ). If m2 = m1 + 1, robots j and k are
of robot i are maintained, robot i’s workspace is limited in a
directly connected by ejk ≡ egm gm+1 . Otherwise, they are
restricted area Bi as follows:
indirectly connected through a path Ijk ≡ Igm1 gm2 = ∅
Bi = Sj , where X = Nic . (18) as follows:
j∈X
Igm1 gm2 = gm1 , . . . , gm2 | egm gm+1 = 1
Proof: If robot i’s critical connectivities are maintained, xi ∈ ∀m ∈ [m1 , m2 )}. (23)
Sj , ∀j ∈ X. That is, xi ∈ Bi . This completes the proof. 2) Group Ki : Equation (21) is satisfied, so robots j and k are
There exist redundant critical connectivities of robot i in connected through a path Ijk ≡ Igm1 gm2 = ∅ combined
dynamic topologies of MRS, thus removing redundant critical by the paths Igm gm+1 \ {gm , i, gm+1 } = ∅, ∀m ∈ [m1 , m2 )
connectivities allows the workspace Bi to be expanded while as follows:
the global network integrity is still preserved. There are three
typical local connectivity topologies as shown in Fig. 4 estab- Igm 1 gm 2 = · Igm gm+1 \ {gm , i, gm+1 } (24)
lished by robot i and its critical robots sorted out in a cyclic m∈[m1 ,m2 )
order as follows. where the operator ∪· is defined as A ∪· B ⇔ (A ∪ B) ∧
Definition 3 (Triangle Topology): Robot i and its pair of (A ∧ B). If (A = ∅) ∨ (B = ∅), then A ∪· B = ∅.
two neighboring robots (j, k) are formed in a triangle topology This completes the proof.
if j ∈ Nic , k ∈ Nic , and ejk = 1. Proposition 5 (Removing Redundant Connectivities): In
Definition 4 (k-Connected Topology): Robot i and its pair robot i’s group of local connectivity topologies, if robot i only
of two neighboring robots (j, k) are formed in a k-connected g
maintains one connectivity eig , g ∈ Ni and removes the other
topology if j ∈ Nic and/or k ∈ Nic , and (ejk = 0) ∧ (∃(Ijk \ connectivities as its redundant links, then robot i is still con-
{j, i, k}) = ∅). g
nected with robot gm ∈ Ni , gm = g through a path Iigm .
Definition 5 (One-Connected Topology): Robot i and its
g
neighboring robot j are formed in a one-connected topology if Proof: According to Proposition 4, robots g , gm ∈ Ni ,
(Iij \ {i, j}) = ∅. are connected either directly by eg gm or indirectly through
The one-connected topology is a minimized topology and Ig gm = {g , . . . , gm }. Moreover, eig is maintained, so robot i
must be maintained for the global network integrity while tri- is connected with robot gm through a path Iigm = {i, , m}
angle and k-connected topologies containing redundant critical or Iigm = {i, g , . . . , gm }, respectively. This completes the
connectivities should be minimized to let robot i escape from proof.
local minimum. Minimization of a group of local connectivity topologies
Assume that the communication level Lc = N, so robot i is on a robot is to remove its redundant critical connectivities as
capable of identifying all of its local connectivity topologies. illustrated in Fig. 5. It is carried out in two consecutive stages:
Triangle and k-connected topologies of robot i are com- 1) minimization of groups Ti using direct communication of
bined into two typical groups of local connectivity topologies: the nearest neighbors and 2) minimization of groups Ki using
g
1) group Ti and 2) group Ki . Let Ni = {g1 , . . . , gq } be a set indirect communication with the communication level Lc .
of robot i’s neighboring robots in cyclic order in which q is Proposition 6 (Minimization of Group Ti ): In a group Ti , if
g
the size of Ni . The groups can be defined as follows. all redundant connectivities are removed, the unique main-
g
1) Group Ti contains consecutive adjacent triangle topolo- tained connectivity eig , g ∈ Ni is formed in either a
gies. This group has the following properties: one-connected topology or a k-connected topology.
g
Proof: Group Ti satisfies (19) and (20). Letting j ∈ Ni \ Ni ,
egm gm+1 = 1, ∀m ∈ [1, q) (19)
g we have ejk = 0, where k = {g1 , gq }. There are two cases
j ∈ Ni \ Ni : ejk = 1, k = g1 , gq . (20) considered as follows.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1283
Fig. 4. Local connectivity topologies: robot i is restricted in an area limited by the green boundary, so it cannot reach destination di . (a) Triangle topology.
(b) k-connected topology. (c) One-connected topology.
Fig. 5. Minimization of local connectivity topologies. (a) Robot i = 1 has two groups Ti {2, 3, 4}, {9, 10, 11} and a group Ki {4, 6, 9}. (b) After minimization
of triangle topologies, group {2, 3, 4} and its adjacent k-connected topology {4, 6} are combined into a k-connected topology {2, 6}. Group {9, 10, 11} and its
adjacent k-connected topology {6, 9} are combined into a k-connected topology {6, 11}, so that robot i has a group Ki {2, 6, 11}. (c) Group Ki is minimized
to become a one-connected topology ei2 . In all the figures, robot i is blocked off in the area bounded by green boundary. Robot i’s workspace is expanded
when the topologies are minimized.
1) ∃Ijk \ {j, i, k} = ∅ (Ti Adjacent to Ki ): and Ijk \ {j, i, k} = ∅, k = {g1 , gq } ⇔ Ijg \ {j, i, g } = ∅.
a) If k ≡ g : According to Definition 4, robot i and It means that Iig \ {i, g } = ∅. According to Definition 5,
a pair (j, k) ≡ (j, g ) are formed in a k-connected robots i and g are formed in a one-connected topology. This
topology. completes the proof.
b) If k = g : Robots k and g are connected through In short, after removing redundant critical connectivities
Ikg \ {k, i, g } = ∅ (refer to Proposition 4), so formed in groups Ti and Ki by applying Propositions 6 and 7,
Ijg \ {j, i, g } = Ijk \ {j, i, k} ∪· Ikg \ {k, i, g } = ∅. robot i has only one-connected topologies and it successfully
According to Definition 4, robot i and a pair (j, g ) escaped from the local minima. The minimization must be per-
are formed in a k-connected topology. formed so that the workspace Bi is possibly expanded in the
2) Ijk \ {j, i, k} = ∅ (Only Ti Exists): Ijk \ {j, i, k} = ∅ best way. Hence, we give a rule to identify redundant critical
⇔ Ijg \ {j, i, g } = ∅: it means that Iig \ {j, i, g } = ∅. connectivities as follows.
According to Definition 5, robots i and g are formed Proposition 8 (Connectivity Removal Rule): In each robot
in a one-connected topology. i’s group of local connectivity topologies, if robot i only main-
Hence, the group Ti is minimized to either a k-connected tains one critical connectivity eij satisfying (25), robot i’s
g
topology if Ti is adjacent to Ki or a one-connected topology workspace blocked off by critical robots in Ni is expanded,
if only Ti exists, which is not adjacent to Ki . This completes allowing robot i to move closer to a desired target di
the proof.
j
After minimization of groups Ti , all local connectivity θi = ming (θik ) (25)
k∈Ni
topologies of robot i only exist in k-connected topologies
where θik = (− →
v ai , −
→r ik ) and −
→
and/or one-connected topologies. Consecutively, we consider
v ai as robot i’s velocity vector
the minimization of group Ki .
toward target di .
Proposition 7 (Minimization of Group Ki ): In a group Ki ,
Proof: Robot i is blocked off in Bi as described in (18)
if all redundant connectivities are removed, the unique main- g
g with X = Ni . After minimization, X = {j}, so Bi is expanded,
tained connectivity eig , g ∈ Ni is formed in a one-connected
Bi → Sj . Moreover, the critical connectivity eij satisfies (25),
topology.
so rjdi = ming (rkdi ). It means that Sj is closer to robot i’s target.
Proof: Group Ki satisfies (21) and (22). Because all triangle k∈Ni
g
topologies were minimized, any robot j ∈ Ni \ Ni has ejk = 0 This completes the proof.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1284 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1285
TABLE I
S YSTEM PARAMETER S ETTING
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1286 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020
Fig. 7. Statistical results of successfully reached targets per total targets. (a) Level 2. (b) Level 3. (c) Level 4 with Lc = 1. (d) Level 4 with Lc = N.
Fig. 8. Rate of successfully reached targets over time with 100 targets. (a) d = 1.0 (Dense). (b) d = 1.5 (Hybrid). (c) d = 2.0 (Sparse).
capable of only identifying k-connected topologies in terms In an experiment, the computational complexity of MRS can
of quadrangle topologies. The success rate is 100% when we be theoretically computed in the volume, denoted by Ct , of a
examined the dense scenarios, while it is only 97.97% when cube with dimensions corresponding to a number of robots,
we experimented with the sparse scenarios. The successful rate the time taken to reach targets, and the communication level
is only 90% in the worst case, where only one robot could activated as shown in Fig. 9. The computational complexity
not reach its target in the ten-target scenario. As predicted, mostly depends on the number of local connectivity topolo-
when Lc = N, the robots occupied the targets with a 100% gies appearing during the experiment and the communication
success rate in all randomly selected scenarios because all level used for minimization of local connectivity topologies,
local connectivity topologies were detected. denoted by Cf . The statistical results in Fig. 9 show that the
We also examined the computational complexity of the rate (Cf /Ct ) is always less than 1% and at the level 4, the
HDC algorithm over the average rate of successfully reached average communication level is 3, 3.057, and 3.657, corre-
targets to realize that the computational complexity is highly sponding to Fig. 9(c), (f), and (i). This confirms that level 4
scenario-dependant, increasing from dense scenarios (d = of HDC with Lc = N (a robot must broadcast a message to
1.0rc ) to sparse scenarios (d = 2.0rc ) as illustrated in Fig. 8. all of the other robots to identify local connectivity topolo-
This also affirms that in the same scenario, releasing mobility gies) is rarely used; that is, broadcasting communication is
constraints of critical connectivity topologies is necessary to rarely used while level 3 is often activated to minimize local
increase the successful rate of target occupation and it is best connectivity topologies in the distributed connectivity control
at level 4 with Lc = N. algorithm.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1287
Fig. 9. Computational complexity of the HDC in scenarios: dense with d = 1.0 (a)–(c), hybrid with d = 1.5 (d)–(f), and sparse with d = 2.0 (g)–(i). The
total of each typical topologies processed by the HDC is shown in the legend of each figure.
B. Experiments by a red circle, and the blue and red links represent critical
1) System Setup: In real-world experiments, we used up to connectivities and redundant connectivities, respectively.
14 customized 14-cm diameter disc-like differentially-driven In the quadrangle scenario,2 four robots were dispersed to
wheel platforms. We set the maximum velocity of the robot to track four targets formed in a quadrangle as shown in Fig. 10.
vmax = 0.8 m/s and compared it with the actual maximum of A k-connected topology was established when the MRS was
1.6 m/s, the sensing and communication range to rc = 1 m, deployed to track targets. If the HDC system was only acti-
and the obstacle avoidance range to ra = 0.15 m. We used a vated at level 2 or level 3, the robot trapped in the k-connected
motion-tracking system to reduce difficulties by representing topology was unable to reach its assigned target. However,
the sensing and communication range of the robots. the trapped robot successfully escaped when the HDC system
2) Results: The HDC strategy was demonstrated in two was activated at level 4 because the k-connected topology was
case studies: 1) the number of robots is equal to the number reduced to a one-connected topology.
of targets and 2) the number of robots is less than the number In the swing scenario,3 we deployed six robots to track and
of targets. In the first case, we developed three special sce- occupy six targets as illustrated in Fig. 11. When the HDC
narios, including quadrangle, swing, and random containing system worked at level 2, there were two robots constrained by
“topology traps” of which local connectivity topologies are the triangle topologies, making it impossible for them to reach
established. In the second case, every robot was set to occupy
a target in an interval of time, and then it leaves to occupy the 2 Quadrangle scenario: https://youtu.be/gOEfKlHD7vM.
next target. As seen in Figs. 10–13, the trapped robot is marked 3 Swing scenario: https://youtu.be/6aEeFRkyl0g.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1288 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020
Fig. 10. Quadrangle scenario with four robots. (a) Level 2. (b) Level 3. (c) Level 4.
Fig. 11. Swing scenario with six robots. (a) Level 2. (b) Level 3. (c) Level 4.
Fig. 12. Random scenario with 14 robots. (a) Level 2. (b) Level 3. (c) Level 4.
their targets. At level 3, one of them successfully escaped to In the random scenario,4 we deployed 14 robots to occupy
reach its assigned target while another one was still obstructed 14 randomly distributed targets as illustrated in Fig. 12. When
by the k-connected topology. At level 4, all of the local connec- the HDC system was activated at level 2, a robot was trapped
tivity topologies were minimized so that all robots successfully
reached their targets. 4 Random scenario: https://youtu.be/DbOFo0dYye0.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1289
Fig. 13. Snapshots of five robots coordination for tracking and occupying 20 randomly distributed targets. (a) Robots occupied the first targets. (b) Robots
are trapped in a triangle topology. (c) Robots formed in one-connected topology.
Fig. 14. Connectivity properties of the graph G(V, E) over run-steps. (a) λ2min > 0 in 6400 simulations (λ2min = 0.0068). (b) λ2min > 0 in ten real
experiments (λ2min = 0.2163).
by both the triangle and k-connected topology while it was the MRS. It is always greater than zero for all run-steps of the
only blocked by the k-connected topology when the HDC experiments as illustrated in Fig. 14, that is, λ2 > 0. It affirms
system was set at level 3. When the HDC system was trig- that the global network integrity of the MRS was preserved
gered at level 4, the robot successfully escaped from all of the during the period of experiments.
local topology constraints to reach its target. The HDC strategy solves the global network integrity
To demonstrate the adaptability of the HDC for the MRS, preservation problem in a distributed manner by applying the
we designed an experiment5 using five robots to track 20 mobility constraint for critical neighbors only as shown in
randomly distributed targets as shown in Fig. 13. In this exper- (17). The method is different from other methods [22]–[31],
iment, a robot released its target occupation and after a short requiring algebraic connectivity estimation in which a robot
while, it moved further to occupy the next target. The result must frequently update connectivities with its neighbors to
shows that when the HDC was activated at level 4, a group estimate the second smallest eigenvalue for distributed con-
of five robots successfully tracked and occupied 20 randomly trol, so it is very time consuming (a few seconds for only
distributed targets while preserving global network integrity. six robots as in [24]) due to network dynamics and a large
number of robots. In our method, we examined that the HDC
C. Discussion was rarely activated at the communication level Lc = N as
From the experimental results described in Sections IV-A shown in the statistical results in Fig. 9. Moreover, if level
and IV-B, we analyze the key properties of the HDC as 4 with the communication level Lc = N was even activated,
follows. it was only active in a very short period of time in order to
1) Preserving Global Network Integrity: In all experiments check the type of local network topology of robot i. Therefore,
in both simulations and real-world experiments, we measured our proposed method can operate with time-step t within a
the second smallest eigenvalue of the connectivity graph of few milliseconds, compared to a few seconds in the methods
using intercommunication to estimate algebraic connectivity.
5 Five robots track 20 targets: https://youtu.be/uWuljXp1A5s. Hence, to the best of our knowledge, the HDC is the first-ever
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1290 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020
method of global network integrity preservation without using HDC is capable of achieving the highest performance in the
estimation of algebraic connectivity. multitarget tracking problem because of the systematic prop-
2) Expanding the Network Coverage: The network cover- erty of flexibility, which is necessary and sufficient to enable
age area is expanded by the local connectivity minimization the MRS to perform different tasks in various environments.
strategy of the HDC described in Section II-C, allowing robots In the scope of this paper, we used two assumptions of sens-
to reach their desired destinations. ing and communication capacities for mobile robots. In the
As mentioned in Section I, the distributed control laws for former, we applied a disc-like ranging sensor model for all of
the global connectivity maintenance problem in the previous the robots so that they can detect and identify its neighbors
works use potential fields for interaction among robots. within the sensing range. Although this assumption has been
Therefore, the local minima is a critical problem of potential widely used in communities of robotics and wireless-sensor
force fields [36]. In this paper, a local minima corresponds to networks, it is not truly realistic with current state-of-the-art
a topology trap. Thanks to the local connectivity minimization sensor technologies and when the robotic system is applied
strategy, robots are capable of escaping from topology traps in a real-world environment. A probabilistic model for rang-
to move toward assigned targets so task performance is at ing sensors is more reliable and additive white noise might be
the highest success rate, 100%, of multiple target tracking in applied to increase the reality of sensor modeling. In the latter,
all experiments. To the best of our knowledge, we have not we used a binary communication model to represent the com-
found a similar method of minimization of local connectivity munication rate of robots. We assumed that a communication
topologies in previous works. protocol of networked MRSs exists with a secured success rate
3) High Performance and Flexibility: Thanks to the local of peer-to-peer communication if the wireless communication
connectivity minimization strategy that is adaptable to any range of a robot is restricted within its sensing range. Although
network topology, the MRS had a capacity of expanding the this assumption is reasonable according to existing wireless
coverage area, so it achieved a high performance level as communication technologies, communication between robots
shown in the statistical simulation results. Specifically, the within a short distance might be obstructed by obstacles, and
average rate is 83.06% at level 2, 97.41% at level 3, 99.24% delay and latency of peer-to-peer communication caused by
at level 4 with one-hop communication, and 100% at level 4 robot mobility are still an open research problem in wireless
with N-hop communication. networks. Therefore, integrating different probabilistic models
The HDC is scalable to different numbers of robots in the for ranging sensor and wireless communication in the HDC
network as demonstrated through simulations executed from strategy will be a focus of our future in this research direction.
10 to 100 robots and real-world experiments with 4, 5, 6, and
14 robots. Time consumption for experiments was bounded ACKNOWLEDGMENT
and did not dramatically increase with respect to the num- The authors would like to thank M. Hall (http://www.matt-
ber of the robots or the complexity of scenarios. Specifically, hall.ca) for proofreading this paper.
the robots took more time for local connectivity minimization
strategy in complex scenarios, but they accelerated target R EFERENCES
tracking and an occupation process once they escaped from
[1] C. W. Reynolds, “Flocks, herds and schools: A distributed behav-
topology traps. The HDC was adaptable to assigned tasks and ioral model,” SIGGRAPH Comput. Graph., vol. 21, no. 4, pp. 25–34,
application scenarios as demonstrated through a series of sim- Aug. 1987.
ulations and real experiments. We demonstrated that assigned [2] M. J. Matarić, “Designing and understanding adaptive group behavior,”
Adapt. Behav., vol. 4, no. 1, pp. 51–80, 1995.
tasks of the robots can be easily switched or modified but the [3] L. E. Parker, “Distributed algorithms for multi-robot observation of
HDC system was still capable of handling different assigned multiple moving targets,” Auton. Robots, vol. 12, no. 3, pp. 231–255,
tasks, for example, “track to occupy permanently” as shown in May 2002.
[4] R. Olfati-Saber and R. M. Murray, “Graph rigidity and distributed for-
Figs. 10–12, “track to occupy temporary” as seen in Fig. 13. mation stabilization of multi-vehicle systems,” in Proc. IEEE Int. Conf.
The scalability and adaptability affirm that the HDC is flexi- Decis. Control, vol. 3. Las Vegas, NV, USA, 2002, pp. 2965–2971.
ble to deploy the MRS into an unknown environment without [5] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of mobile
autonomous agents using nearest neighbor rules,” IEEE Trans. Autom.
resetting the robot configuration. Control, vol. 48, no. 6, pp. 988–1001, Jun. 2003.
[6] A. Marino, L. Parker, G. Antonelli, and F. Caccavale, “Behavioral con-
trol for multi-robot perimeter patrol: A finite state automata approach,”
V. C ONCLUSION in Proc. IEEE Int. Conf. Robot. Autom. (ICRA), 2009, pp. 831–836.
[7] G. Antonelli, F. Arrichiello, and S. Chiaverini, “Flocking for multi-
We addressed our novel HDC strategy for the MRS. It robot systems via the null-space-based behavioral control,” Swarm
includes the two-layer distributed mobility controller of nodes Intell., vol. 4, no. 1, pp. 37–56, Mar. 2010. [Online]. Available:
http://link.springer.com/10.1007/s11721-009-0036-6
with a bounded mobility constraint, guaranteeing the global [8] A. Marino, L. E. Parker, G. Antonelli, and F. Caccavale, “A decentralized
network integrity preservation and the two-layer distributed architecture for multi-robot systems based on the null-space-behavioral
connectivity controller of network topologies with a local con- control with application to multi-robot border patrolling,” J. Intell.
Robot. Syst., vol. 71, nos. 3–4, pp. 423–444, 2013.
nectivity minimization strategy, allowing network coverage [9] D. Xu, X. Zhang, Z. Zhu, C. Chen, and P. Yang, “Behavior-based
expansion. To the best of our knowledge, the HDC is the formation control of swarm robots,” Math. Problems Eng., vol. 2014,
first method for global network integrity preservation with- Jun. 2014, Art. no. 205759.
[10] G. Zuo, J. Han, and G. Han, “Multi-robot formation control using rein-
out requiring estimation of the algebraic connectivity of the forcement learning method,” in Proc. Int. Conf. Swarm Intell., 2010,
communication graph. The experimental results show that the pp. 667–674.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1291
[11] B. Fernandez-Gauna, I. Etxeberria-Agiriano, and M. Graña, “Learning [34] P. D. Hung, M.-T. Pham, T. Q. Vinh, and T. D. Ngo, “Self-deployment
multirobot hose transportation and deployment by distributed round- strategy for a swarm of robots with global network preservation to assist
Robin Q-learning,” PLoS ONE, vol. 10, no. 7, pp. 1–27, 2015. [Online]. rescuers in hazardous environments,” in Proc. IEEE Int. Conf. Robot.
Available: https://doi.org/10.1371/journal.pone.0127129 Biomimetics (ROBIO), 2014, pp. 2655–2660.
[12] A. Howard, M. J. Matarić, and G. S. Sukhatme, “Mobile sensor network [35] P. D. Hung, T. Q. Vinh, and T. D. Ngo, “Distributed coverage con-
deployment using potential fields: A distributed, scalable solution to the trol for networked multi-robot systems in any environments,” in Proc.
area coverage problem,” in Proc. Int. Symp. Distrib. Auton. Robot. Syst., IEEE Int. Conf. Adv. Intell. Mechatron. (AIM), Banff, AB, Canada, 2016,
2002, pp. 299–308. pp. 1067–1072.
[13] P. Ögren, E. Fiorelli, and N. E. Leonard, “Cooperative control of mobile [36] F. Matoui, B. Boussaid, and M. N. Abdelkrim, “Local minimum solution
sensor networks: Adaptive gradient climbing in a distributed environ- for the potential field method in multiple robot motion planning task,”
ment,” IEEE Trans. Autom. Control, vol. 49, no. 8, pp. 1292–1302, in Proc. 16th Int. Conf. Sci. Techn. Autom. Control Comput. Eng. (STA),
Aug. 2004. Monastir, Tunisia, Dec. 2015, pp. 452–457.
[14] Y. Zou and K. Chakrabarty, “Sensor deployment and target localization
in distributed sensor networks,” ACM Trans. Embedded Comput. Syst.,
vol. 3, no. 1, pp. 61–91, Feb. 2004.
[15] W. M. Spears, D. F. Spears, J. C. Hamann, and R. Heil, “Distributed,
physics-based control of swarms of vehicles,” Auton. Robot., vol. 17,
nos. 2–3, pp. 137–162, 2004.
[16] M. Ji and M. Egerstedt, “Distributed coordination control of multiagent
systems while preserving connectedness,” IEEE Trans. Robot., vol. 23,
no. 4, pp. 693–703, Aug. 2007.
[17] D. V. Dimarogonas and K. J. Kyriakopoulos, “Connectedness preserving
Pham Duy Hung received the B.Sc. and M.Sc.
distributed swarm aggregation for multiple kinematic robots,” IEEE
degrees in electronics and telecommunication from
Trans. Robot., vol. 24, no. 5, pp. 1213–1223, Oct. 2008.
the University of Engineering and Technology,
[18] A. Ajorlou, A. Momeni, and A. G. Aghdam, “A class of bounded dis-
Hanoi, Vietnam, in 2003 and 2006, respectively,
tributed control strategies for connectivity preservation in multi-agent
where he is currently pursuing the Ph.D. degree in
systems,” IEEE Trans. Autom. Control, vol. 55, no. 12, pp. 2828–2833,
robotics.
Dec. 2010.
His current research interests include distributed
[19] B. J. Julian, M. Angermann, M. Schwager, and D. Rus, “Distributed
control of multiagent systems with an emphasis
robotic sensor networks: An information-theoretic approach,” Int. J.
on deployment, exploration, coverage, and multiple
Robot. Res., vol. 31, no. 10, pp. 1134–1154, Sep. 2012.
target tracking.
[20] S. B. Mikkelsen, R. Jespersen, and T. D. Ngo, “Probabilistic communi-
cation based potential force for robot formations: A practical approach,”
in Proc. DARS, 2010, pp. 243–253.
[21] K. Naderi, K. Taheri, H. Moradi, and M. N. Ahmadabadi, “An evo-
lutionary artificial potential field algorithm for stable operation of a
multi-robot system on domes,” in Proc. IEEE Int. Conf. Auton. Robot
Syst. Competitions (ICARSC), 2014, pp. 92–97.
[22] R. K. Williams and G. S. Sukhatme, “Locally constrained connectiv-
ity control in mobile robot networks,” in Proc. IEEE Int. Conf. Robot.
Autom., Karlsruhe, Germany, May 2013, pp. 901–906.
[23] R. K. Williams, A. Gasparri, G. S. Sukhatme, and G. Ulivi, “Global Tran Quang Vinh received the Ph.D. degree in
connectivity control for spatially interacting multi-robot systems with radio physics from Vietnam National University,
unicycle kinematics,” in Proc. IEEE Int. Conf. Robot. Autom. (ICRA), Hanoi, Vietnam, in 2003.
May 2015, pp. 1255–1261. He is an Associate Professor with the University
[24] P. Yang et al., “Decentralized estimation and control of graph connectiv- of Engineering and Technology, Hanoi. His cur-
ity in mobile sensor networks,” Automatica, vol. 46, no. 2, pp. 390–396, rent research interests include intelligent robotics,
2010. fuzzy logics, sensor fusion, networked robotics,
[25] L. Sabattini, N. Chopra, and C. Secchi, “Decentralized connectivity computer architecture, instrumentation, and control
maintenance for cooperative control of mobile robotic systems,” Int. engineering.
J. Robot. Res., vol. 32, no. 12, pp. 1411–1423, 2013.
[26] L. Sabattini, C. Secchi, N. Chopra, and A. Gasparri, “Distributed con-
trol of multirobot systems with global connectivity maintenance,” IEEE
Trans. Robot., vol. 29, no. 5, pp. 1326–1332, Oct. 2013.
[27] P. R. Giordano, A. Franchi, C. Secchi, and H. H. Bülthoff, “A passivity-
based decentralized strategy for generalized connectivity maintenance,”
Int. J. Robot. Res., vol. 32, no. 3, pp. 299–323, Mar. 2013.
[28] T. Nestmeyer, P. R. Giordano, H. H. Bülthoff, and A. Franchi,
“Decentralized simultaneous multi-target exploration using a connected
network of multiple robots,” Auton. Robots, vol. 41, no. 4, pp. 989–1011, Trung Dung Ngo (M’08–SM’18) received the B.Sc.
2017. degree in electronics and telecommunication from
[29] D. Cai, S. Wu, and J. Deng, “Distributed global connectivity main- Vietnam National University, Hanoi, Vietnam, in
tenance and control of multi-robot networks,” IEEE Access, vol. 5, 2000, the M.Sc. degree in computer systems engi-
pp. 9398–9414, 2017. neering (robotics) from the University of Southern
[30] A. Gasparri, L. Sabattini, and G. Ulivi, “Bounded control law for Denmark, Odense, Denmark, in 2004, and the
global connectivity maintenance in cooperative multirobot systems,” Ph.D. degree in electrical and electronic engineer-
IEEE Trans. Robot., vol. 33, no. 3, pp. 700–717, Jun. 2017. ing (robotics) from Aalborg University, Aalborg,
[31] J. Panerati et al., “Robust connectivity maintenance for fallible robots,” Denmark, in 2008,
Auton. Robots, vol. 43, no. 3, pp. 769–787, 2019. He was a Faculty Member with the Department
[32] P. D. Hung, T. Q. Vinh, and T. D. Ngo, “A scalable, decentralised large- of Electronic Systems, Aalborg University, and the
scale network of mobile robots for multi-target tracking,” in Proc. Intell. Faculty of Science, University of Brunei, Bandar Seri Begawan, Brunei. He is
Auton. Syst., 2016, pp. 621–637. currently an Associate Professor with the University of Prince Edward Island,
[33] T. D. Ngo, P. D. Hung, and M.-T. Pham, “A Kangaroo inspired het- Charlottetown, PE, Canada, where he is the Founder and the Director of the
erogeneous swarm of mobile robots with global network integrity for More-Than-One Robotics Laboratory and the Lead Researcher of the Centre
fast deployment and exploration in large scale structured environments,” for Excellence in Robotics and Industrial Automation. His current research
in Proc. IEEE Int. Conf. Robot. Biomimetics (ROBIO), Dec. 2014, interests include multirobot systems, modular robotics, and human–robot
pp. 1205–1212. collaboration.
Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.