You are on page 1of 14

1278 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO.

3, MARCH 2020

Hierarchical Distributed Control for Global Network


Integrity Preservation in Multirobot Systems
Pham Duy Hung , Tran Quang Vinh, and Trung Dung Ngo, Senior Member, IEEE

Abstract—In this paper, we address a novel hierarchical Nic Set of robot i’s critical robots.
distributed control (HDC) strategy for networked multirobot Nin Set of robot i’s noncritical robots.
systems (MRSs). This strategy is developed on a geometric rij Relative distance between robots i and j.
approach without requiring estimation of algebraic connectiv-
ity. It is originally based upon behavioral control, but upgraded eij Connectivity between robots i and j.
by distributed node control with a mobility constraint for global ε, εi Critical tolerance and minimum tolerance.
network integrity preservation and distributed connectivity con- Bi Restricted area of robot i.
trol with a local connectivity minimization strategy for network Ti Group of triangle topologies.
coverage expansion. Thanks to properties of HDC, a networked Ki Group of k-connected topologies.
MRS is capable of achieving high performance with cooperative g
tasks. We have examined and evaluated our proposed method in Ni Set of robot i’s neighbors in a group of local
both simulations with up to 100 simulated robots and real-world connectivity topologies.
experiments with up to 14 real robots. Rni Sets of robot i’s redundant critical robots in a group
Index Terms—Behavioral control, distributed connectivity of local connectivity topologies.
control, distributed node control, global network integrity preser- RnTi Set of robot i’s redundant critical robots in groups Ti .
vation, hierarchical distributed control (HDC), local connectivity RnK i Set of robot i’s redundant critical robots in groups Ki .
minimization strategy, multirobot systems (MRSs). −
→vi Velocity vector of robot i.

→v ci Cohesion vector.

→v si Separation vector.

→v ai Alignment vector.
N OMENCLATURE
vimax Maximum velocity of robot i.
N Number of robots in a swarm.
di Assigned destination of robot i inside Si .
λ2 Connectivity property of a robot network.
ρij Consensus signal between robots i and j.
Lc Communication level of a robot in the network.
Iij Path between robots i and j.
Iij Length of the shortest path between robots i and j.
ui Control input of robot i.
xi Position of robot i at time t.
xi Run-step of robot i in a time interval t.
rc Sensing and communication range of robot i. I. I NTRODUCTION
Si Sensing area of robot i.
NETWORKED multirobot system (MRS) has been a
Sci
Sni
Critical area of robot i.
Noncritical area of robot i. A very active research field over the last few decades due to
its challenges and potential applications. It consists of mobile
Sai Obstacle avoidance area of robot i.
robots that cooperatively work through information exchange
Ni Set of robot i’s neighboring robots.
in order to achieve a common goal, thus preserving global
Manuscript received March 19, 2018; revised December 9, 2018 network integrity through all robots over time is an important
and February 18, 2019; accepted April 16, 2019. Date of publication research topic of this field. This paper focuses on designing a
May 16, 2019; date of current version January 21, 2020. This work
was supported in part by the Natural Science and Engineering Research novel distributed control strategy to guarantee global network
Council of Canada (NSERC) under Grant RGPIN-2017-05446, in part by the integrity preservation of mobile robots over time while they are
Mathematics of Information Technology and Complex Systems (MITACS) performing their cooperative tasks toward an assigned ultimate
under Grant IT11073, and in part by the Department of Natural Defence
of Canada-Innovation for Defence Excellence and Security (DND-IDEaS) goal.
under Grant IDEaS-1-1A-CP0726. This paper was recommended by Associate Recent research of distributed control for MRS can be
Editor K.-S. Hwang. (Corresponding author: Trung Dung Ngo.) roughly categorized in three streams: 1) behavior-based con-
P. D. Hung and T. Q. Vinh are with the Department of Electronics and
Computer Engineering, University of Engineering and Technology, Hanoi 084, trol [1]–[11]; 2) artificial potential force field [12]–[23]; and
Vietnam (e-mail: hungpd@vnu.edu.vn; vinhtq@vnu.edu.vn). 3) graph theory-based algebraic connectivity [24]–[31].
T. D. Ngo is with the More-Than-One Robotics Laboratory, University Naturally inspired behavioral control for MRS has been first
of Prince Edward Island, Charlottetown, PE C1A 4R3, Canada (e-mail:
dungnt@ieee.org). seen in the bird-flocking algorithm with only simple rules
This paper has supplementary downloadable material available at of cohesion, separation, and alignment. Behavioral control
http://ieeexplore.ieee.org, provided by the author. was introduced by Reynolds [1] and further extended in [2].
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. Parker [3] introduced heuristic approaches to the design of
Digital Object Identifier 10.1109/TCYB.2019.2913326 interaction rules and emergent behaviors in the behavior-based
2168-2267 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1279

control scheme. Olfati-Saber and Murray [4] developed dis- constraints. An extended version of this method for maintain-
tributed flocking control using navigational feedback for all ing the global connectivity of the MRS is presented in [23].
mobile robots with static and dynamic leaders in the absence Distributed estimation and control of graph connectivity
and presence of obstacles. Jadbabaie et al. [5] provided a proof are popular approaches to guarantee connectivity maintenance
of convergence of distributed consensus and coordination of of MRS. The estimation of algebraic connectivity of the
multiple robots in a noise-free case by modeling changes in graph—equivalent to the second-smallest eigenvalue of the
topology without considering the dependence of switching Laplacian matrix—is highly exploited for connectivity control.
motion. Marino et al. [6] proposed the patrolling algorithm Yang et al. [24] used a decentralized power iteration algo-
based on the high abstraction level of behavioral control with- rithm to estimate the Fiedler eigenvector applied to the control
out using communication, which was also upgraded in [8]. law for connectivity maintenance in a distributed manner.
Antonelli et al. [7] approached the problem of robot flock- Sabattini et al. [25], [26] exploited the framework to develop
ing using the behavior-based control architecture in which a gradient-based control strategy using energy functions for
robot behaviors are predefined to achieve the assigned mission. maintaining the algebraic connectivity. Giordano et al. [27]
Xu et al. [9] proposed the behavior-based control architec- developed a gradient-based decentralized controller for global
ture for formation generation and control during navigation. connectivity maintenance by using a scalar potential function
Zuo et al. [10] proposed behaviors of multirobot formation of the second smallest eigenvalue. The gradient-based con-
using reinforcement learning. Robots select different behav- troller is used in [28] for the multitarget exploration problem.
iors in various different situations. Fernandez-Gauna et al. [11] Cai et al. [29] proposed a unified control framework to main-
presented a distributed round-robin Q-learning for cooperative tain and control connectivity of the MRS using methods
systems in which each agent selects actions according to a in [24] and [26]. Gasparri et al. [30] introduced a distributed
defined order. bounded control law for global connectivity maintenance of
The artificial potential field method synthesizes the attrac- the MRS in which mobile robots move toward a given bounded
tive and repulsive forces on mobile robots to drive them toward collective control objective. Panerati et al. [31] considered
goals without colliding with obstacles. Howard et al. [12] robust connectivity maintenance control for fallible robots.
deployed large-scale mobile sensors in a distributed manner In summary, global network integrity preservation for MRS
to maximize the coverage area of the network by following was not mentioned in [1]–[9], [12]–[15], and [19]–[21] while
the negative gradient of the artificial potential force fields. the others present connectivity maintenance in two typical
Örgen et al. [13] introduced a modeling method of the approaches: 1) local [16]–[18] and 2) global [22]–[31] connec-
mobile sensor network moving in a fixed formation along tivity maintenance. The local connectivity maintenance means
the estimated gradient in a scalar distributed field. Zou and that connectivity between two robots is maintained over time
Chakrabarty [14] proposed virtual attractive and repulsive if they are connected at the initial stage. In the global connec-
forces for deployment and coverage enhancement in cluster- tivity maintenance, robots are capable of flexibly adding and
based mobile sensor networks. Spears et al. [15] gave a new deleting links while the global network integrity of robots is
potential force field inspired from physics laws to maintain preserved.
the relative localization of mobile robots in either square To the best of our knowledge, most of the aforemen-
or hexagon formations. Ji and Egerstedt [16] developed a tioned distributed control for global connectivity mainte-
distributed control system with unbounded potential forces nance [22]–[31] requires estimation of algebraic connectivity
in order to maintain connectivity of a pair of robots and and applying spatial-potential-based interaction for the con-
to provide the local gradient incorporated in the link addi- nectivity maintenance of robots. The algebraic connectivity
tion function of the connectivity graphs. Dimarogonas and estimation procedure proposed in [24] requests that each robot
Kyriakopoulos [17] modeled network connectivity by combin- update connectivities of the global network through exchang-
ing a repulsive force and an attractive force. The properties of ing information with its neighbors. This procedure fully relies
local gradient and switching of the network connectivity were on intercommunication between the robots and is very time
used to develop the distributed control for the link addition- consuming (a few seconds for only six robots as in [24]) in
based graph partitioning algorithm. Mikkelsen et al. [20] order to obtain the algebraic connectivity that is used as the
released a new kind of potential force field based on a prob- input for distributed control of every robot. This assumption is
abilistic model using empirical statistics of infrared commu- not realistic to apply in the real system, especially a large-scale
nication to maintain relative localization for robot formation. network of mobile robots.
Ajorlou et al. [18] proposed distributed control for connectiv- In this paper, we present a novel distributed control method
ity preservation using the potential function. Julian et al. [19] based on a geometric approach for controlling the global
developed the gradient-based controller to drive the robots to network integrity preservation of MRS. Instead of requiring
measure the environment conditions and maximize observation estimation of the second smallest eigenvalue and its cor-
information by sequential Bayesian filters. Naderi et al. [21] responding eigenvector as was done in previous works, a
proposed a fast centralized method based on the artificial hierarchical distributed control (HDC) is an integration of dis-
potential field applied to drive the leader of the MRS toward tributed node control and distributed connectivity control. The
its target on domes. Williams and Sukhatme [22] proposed distributed node control is developed under a mobility con-
a switching interaction model and potential field controls for straint to guarantee global network integrity preservation of
connectivity maintenance and maximization under local degree MRS while the distributed connectivity control is built up for

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1280 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020

of its nearest neighbors Ni within a disc-like sensing area Si


with radius rc and carrying out peer-to-peer communication
with robots inside Si . Let xi and ui be the position and velocity
of robot i ∈ N, respectively. MRS is described by a single-
integrator kinematic model as follows:
ẋi = ui , i ∈ N. (1)
Robot i’s sensing range Si is divided into two areas as illus-
Fig. 1. Robot i’s sensing range is separated into two areas: the critical area
Sci and the noncritical area Sni covering the obstacle avoidance area Sai . Robot trated in Fig. 1: 1) critical area Sci inside the annulus circle
i has Nic = {j} and Nin = {k, m}. between two radii rc and rn , where ε  rc − rn > 0 is a
constant, so-called critical tolerance and 2) noncritical area
local connectivity minimization strategy, allowing the MRS to Sni inside the circle with the radius rn covering an obstacle
expand its global network coverage. The HDC is capable of: avoidance area Sai with the radius range ra < rn , Sai ⊂ Sni .
1) preserving global network integrity of MRS over time A network of mobile robots is modeled by an undirected
while robots perform its assigned task in cooperation; graph G = (V, E) with a vertex set V = {1, . . . , N} indexed by
2) expanding global network coverage of MRS by using the a set of robots and a set of connectivity edges E = {eij | i, j ∈
local connectivity minimization strategy, allowing the V, i = j}. The graph G can be represented by an adjacency
MRS to achieve the highest performance of cooperative matrix A. It is a symmetric matrix in which each element eij
tasks. is defined as the weight of the edge between the robots i and j,
This paper is a comprehensive extension of the preliminary and presented as follows:
version presented in [32]–[35]. The contributions of this paper 
1 rij ≤ rc
are claimed as follows. eij = eji  (2)
0 rij > rc
1) We developed an HDC based on the geometric approach
for preserving the global network integrity of MRS where rij  xi − xj  is the relative distance between robots
without requiring algebraic connectivity estimation. The i and j.
HDC results in integrating a mobility constraint for In graph G, two robots i and j are either directly connected
preserving global network integrity and local connec- if eij = 1 or indirectly connected if there exists a path Iij
tivity minimization strategy, enabling the MRS to be between them as described as follows:
adaptable to any network topology for network coverage  
expansion. Iij = n1 , . . . , np | i = n1 , j = np , enm nm+1 = 1, ∀m ∈ [1, p) .
2) We investigated and evaluated the effectiveness of the (3)
HDC in both simulations and real-world experiments to
confirm that the HDC is potentially applicable in the Let Iij be the length of the shortest path between robots
real world. i and j, defined as the least number of robots on the path.
In comparison with our previous works [32]–[35], we Let Lc be the communication level defined as the maximum
completed system modeling and synthesis of the HDC for number of robots that a packet passes through from source
preserving and expanding the network of MRS. It was clearly to destination, which is preset on each robot as a timeout of
explained with detailed information on the mobility con- communication. Two robots i and j can only communicate
straint based on only local connectivities on each robot for together if Iij ≤ Lc .
global network integrity preservation and local connectiv- The connectivity property of the network can be identified
ity minimization strategy with an optimal rule for removing through the second smallest eigenvalue λ2 of the Laplacian
redundant critical connectivities formed in local topologies in matrix of the graph G. The global network is considered as
order to expand network coverage. We extensively investigated being connected if λ2 > 0. Connectivity strength is propor-
and evaluated the effectiveness of our proposed method in both tional to the value of λ2 —the higher the value, the stronger
simulation and real-world experiments with detailed analysis the connectivity graph. Note that we only use λ2 to verify
and discussion. whether the global network integrity is preserved as illustrated
The remainder of this paper is organized as follows. in Fig. 14 but do not use it for controlling network connectivity
Section II provides preliminary knowledge used to build up in the HDC.
the HDC. The HDC and its characteristics are described in In a distributed control scheme, each robot is aware of its
Section III. The results of simulations and real-world experi- local connectivity graph formed with its direct neighbors rep-
ments are demonstrated and discussed in Section IV. Finally, resented by a subadjacency matrix Asi as illustrated in Fig. 2.
the conclusions are shown in Section V. Definition 1 (Critical Robot and Connectivity): Robot j is
called a critical robot of robot i if xj ∈ Sci and k : xk ∈ Sni ∩Snj .
II. BACKGROUND Robot i’s critical robot set is presented as follows:
 
A. Network Model Nic  j | xj ∈ Sci , k : xk ∈ Sni ∩ Snj . (4)
A networked MRS consists of N mobile robots in which
each robot i ∈ N is capable of measuring relative localization eij , j ∈ Nic is called a critical connectivity.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1281

Fig. 3. Variance of the relative distance between two robots i and j after a
time interval t.

If (8) is applied to (9), we obtain rij (t + t) ≤ rc ; that


is, eij is maintained at time-step t + t. This completes the
proof.
Proposition 2 (Global Network Integrity Preservation):
The global network integrity of MRS is preserved if every
Fig. 2. Example of an adjacency matrix of a networked MRS. Robot 4 robot i has run-step xi , satisfying the following constraint:
(green) has a subgraph adjacency matrix (As4 ) established by robot 4 and its ⎧ε
neighbors {2, 5, 12}. Robot 5 (magenta) has a subgraph adjacency matrix ⎨ Nic = ∅
(As5 ) established by robot 5 and its neighbors {4, 6, 7}. These robots have
xi ≤ ε2i , where εi = minc (rc − rij ) ≤ ε. (10)
a common critical connectivity e45 ; thus, their subgraph adjacency matrices ⎩ Nic = ∅ j∈Ni
intersect at the rows and columns 4 and 5. 2
Proof: Consider the connectivity between robots i and j ∈ Ni
Definition 2 (Noncritical Robot and Connectivity): Robot j after each run-step. According to Definitions 1 and 2, we have
is called a noncritical robot of robot i if j ∈ Ni but j ∈
/ Nic . Ni = Nic ∪ Nin1 ∪ Nin2 , so there are three cases considered as
Robot i’s noncritical robot set is presented as follows: follows.
  1) j ∈ Nin1 : According to (6), j ∈ Nin1 ⇔ xj ∈ Sni . It means
Nin  j ∈ Ni \ Nic = Nin1 ∪ Nin2 (5)
that
where
  rc − rij > ε. (11)
Nin1 = j | xj ∈ Sni (6)
  If robots i and j satisfy the constraint in Proposition 2,
n2
Ni = j | xj ∈ Si , ∃k : xk ∈ Si ∩ Sj .
c n n
(7)
we have
eij , j ∈ Nin is called a noncritical connectivity. ε εi ε
xi ≤ or xi ≤ ≤ (12)
Remark 1 (Symmetry Property): Definitions 1 and 2 2 2 2
exhibit a symmetrical property of critical/noncritical robots ε εj ε
xj ≤ or xj ≤ ≤ . (13)
that if robot j is a critical/noncritical robot of robot i, 2 2 2
robot i is also considered a critical/noncritical robot of Applying (11) into (12) and (13), we have xi ≤ (rc −
robot j. rij )/2 and xj ≤ (rc −rij )/2. According to Proposition 1,
The objective of this paper is to identify the mobility con- connectivity eij is maintained.
straint of robot i’s control input ui based on its local connectiv- 2) j ∈ Nin2 : According to (7), j ∈ Nin2 ⇔ xj ∈ Sci and
ities only in order to preserve global network integrity of MRS, ∃k : xk ∈ Sni ∩ Snj , that is, k ∈ Nin1 and k ∈ Njn1 . Similar
guaranteeing that any robots i, j ∈ N are always connected to the first case, the connectivities eik and ejk are main-
either directly by eij or indirectly through the path Iij . tained. Therefore, robots i and j are connected together
indirectly through intermediate robot k and independent
B. Global Network Integrity Preservation to the connectivity eij .
In this section, we present a bounded constraint for the 3) j ∈ Nic : If robots i and j satisfy the mobility constraint
control input ui , guaranteeing global network integrity preser- in Proposition 2, we have
vation of MRS. Let xi (t), xi (t + t), and rij (t), rij (t + t) εi εj
be the position of robot i and the relative distance between xi ≤ , and xj ≤ . (14)
2 2
robots i and j at consecutive time-steps t and t + t, respec-
tively. xi = xi (t + t) − xi (t) is a run-step of robot i in a In addition
time-step t. We release the following propositions. εi = minc (rc − rik ) ⇒ εi ≤ rc − rij , ∀j ∈ Nic (15)
Proposition 1 (Mobility Constraint for Connectivity k∈Ni
Maintenance): A connectivity eij between two robots i and j εj = minc (rc − rjk ) ⇒ εj ≤ rc − rij , i ∈ Njc . (16)
k∈Nj
is maintained if their run-step satisfies the following condition:
rc − rij rc − rij
xi ≤ , and xj ≤ . (8) Applying (15) and (16) into (14), we gain xi ≤ (rc −
2 2 rij )/2 and xj ≤ (rc −rij )/2. According to Proposition 1,
Proof: Considering the movement of robots i and j between connectivity eij is maintained.
two consecutive time-steps t and t +t as shown in Fig. 3, we Hence, after each run-step x, robot i maintains connectiv-
have −→r ij (t+t) = xj (t+t)−xi (t+t) = − →xj + −

r ij −−

xi . ity with robot j either directly if j ∈ Nin1 or j ∈ Nic , or indirectly
The length of sum of vectors is less than or equal to the sum through intermediate robot k ∈ Nin1 if j ∈ Nin2 . It means that
of their lengths, so we obtain the global network integrity of the MRS is preserved. This
rij (t + t) ≤ rij + xj + xi . (9) completes the proof.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1282 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020

In summary, the global network integrity of MRS is 2) Group Ki consists of consecutive adjacent k-connected
preserved if the control input ui is limited by the bounded topologies only. This group has the following properties:
constraint vimax as follows:
egm gm+1 = 0 ∧ Igm gm+1 \ {gm , i, gm+1 }
⎧ ε
⎨ Nic = ∅ = ∅, ∀m ∈ [1, q) (21)
vimax = 2t , where εi = minc (rc − rij ). (17) g
⎩ εi N c = ∅ j∈Ni j ∈ Ni \ Ni : (ejk = 1) ∧ Ijk \ {j, i, k} = ∅
 
i
2t k = g1 , gp . (22)

C. Local Connectivity Topologies and Minimization Strategy Note that a group containing both Ti and Ki becomes Ki if
Ti is minimized as explained and proven in Proposition 6.
If Proposition 2 is satisfied, critical robots of robot i may act g
Proposition 4 (Connectivity in Ni ): In robot i’s group of
like “anchors,” preventing robot i from moving out of sensing g
local connectivity topologies, any two robots j, k ∈ Ni are
area of its critical robots toward its desired target due to mobil-
connected directly or indirectly.
ity constraints as shown in (17)—which is considered as a type
Proof: Assume that j = gm1 and k = gm2 , where 1 ≤ m1 <
of local minima. When robot i falls into a local minimum, its
m2 ≤ q. We consider two cases as follows.
workspace is limited in a restricted area as follows.
1) Group Ti : Equation (19) is satisfied, so egm gm+1 =
Proposition 3 (Restricted Area): If all critical connectivities
1, ∀m ∈ [m1 , m2 ). If m2 = m1 + 1, robots j and k are
of robot i are maintained, robot i’s workspace is limited in a
directly connected by ejk ≡ egm gm+1 . Otherwise, they are
restricted area Bi as follows:

indirectly connected through a path Ijk ≡ Igm1 gm2 = ∅
Bi = Sj , where X = Nic . (18) as follows:
j∈X 
Igm1 gm2 = gm1 , . . . , gm2 | egm gm+1 = 1
Proof: If robot i’s critical connectivities are maintained, xi ∈ ∀m ∈ [m1 , m2 )}. (23)
Sj , ∀j ∈ X. That is, xi ∈ Bi . This completes the proof. 2) Group Ki : Equation (21) is satisfied, so robots j and k are
There exist redundant critical connectivities of robot i in connected through a path Ijk ≡ Igm1 gm2 = ∅ combined
dynamic topologies of MRS, thus removing redundant critical by the paths Igm gm+1 \ {gm , i, gm+1 } = ∅, ∀m ∈ [m1 , m2 )
connectivities allows the workspace Bi to be expanded while as follows:
the global network integrity is still preserved. There are three
typical local connectivity topologies as shown in Fig. 4 estab- Igm 1 gm 2 = · Igm gm+1 \ {gm , i, gm+1 } (24)
lished by robot i and its critical robots sorted out in a cyclic m∈[m1 ,m2 )
order as follows. where the operator ∪· is defined as A ∪· B ⇔ (A ∪ B) ∧
Definition 3 (Triangle Topology): Robot i and its pair of (A ∧ B). If (A = ∅) ∨ (B = ∅), then A ∪· B = ∅.
two neighboring robots (j, k) are formed in a triangle topology This completes the proof.
if j ∈ Nic , k ∈ Nic , and ejk = 1. Proposition 5 (Removing Redundant Connectivities): In
Definition 4 (k-Connected Topology): Robot i and its pair robot i’s group of local connectivity topologies, if robot i only
of two neighboring robots (j, k) are formed in a k-connected g
maintains one connectivity eig , g ∈ Ni and removes the other
topology if j ∈ Nic and/or k ∈ Nic , and (ejk = 0) ∧ (∃(Ijk \ connectivities as its redundant links, then robot i is still con-
{j, i, k}) = ∅). g
nected with robot gm ∈ Ni , gm = g through a path Iigm .
Definition 5 (One-Connected Topology): Robot i and its
g
neighboring robot j are formed in a one-connected topology if Proof: According to Proposition 4, robots g , gm ∈ Ni ,
(Iij \ {i, j}) = ∅. are connected either directly by eg gm or indirectly through
The one-connected topology is a minimized topology and Ig gm = {g , . . . , gm }. Moreover, eig is maintained, so robot i
must be maintained for the global network integrity while tri- is connected with robot gm through a path Iigm = {i, , m}
angle and k-connected topologies containing redundant critical or Iigm = {i, g , . . . , gm }, respectively. This completes the
connectivities should be minimized to let robot i escape from proof.
local minimum. Minimization of a group of local connectivity topologies
Assume that the communication level Lc = N, so robot i is on a robot is to remove its redundant critical connectivities as
capable of identifying all of its local connectivity topologies. illustrated in Fig. 5. It is carried out in two consecutive stages:
Triangle and k-connected topologies of robot i are com- 1) minimization of groups Ti using direct communication of
bined into two typical groups of local connectivity topologies: the nearest neighbors and 2) minimization of groups Ki using
g
1) group Ti and 2) group Ki . Let Ni = {g1 , . . . , gq } be a set indirect communication with the communication level Lc .
of robot i’s neighboring robots in cyclic order in which q is Proposition 6 (Minimization of Group Ti ): In a group Ti , if
g
the size of Ni . The groups can be defined as follows. all redundant connectivities are removed, the unique main-
g
1) Group Ti contains consecutive adjacent triangle topolo- tained connectivity eig , g ∈ Ni is formed in either a
gies. This group has the following properties: one-connected topology or a k-connected topology.
g
Proof: Group Ti satisfies (19) and (20). Letting j ∈ Ni \ Ni ,
egm gm+1 = 1, ∀m ∈ [1, q) (19)
g   we have ejk = 0, where k = {g1 , gq }. There are two cases
j ∈ Ni \ Ni : ejk = 1, k = g1 , gq . (20) considered as follows.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1283

Fig. 4. Local connectivity topologies: robot i is restricted in an area limited by the green boundary, so it cannot reach destination di . (a) Triangle topology.
(b) k-connected topology. (c) One-connected topology.

Fig. 5. Minimization of local connectivity topologies. (a) Robot i = 1 has two groups Ti {2, 3, 4}, {9, 10, 11} and a group Ki {4, 6, 9}. (b) After minimization
of triangle topologies, group {2, 3, 4} and its adjacent k-connected topology {4, 6} are combined into a k-connected topology {2, 6}. Group {9, 10, 11} and its
adjacent k-connected topology {6, 9} are combined into a k-connected topology {6, 11}, so that robot i has a group Ki {2, 6, 11}. (c) Group Ki is minimized
to become a one-connected topology ei2 . In all the figures, robot i is blocked off in the area bounded by green boundary. Robot i’s workspace is expanded
when the topologies are minimized.

1) ∃Ijk \ {j, i, k} = ∅ (Ti Adjacent to Ki ): and Ijk \ {j, i, k} = ∅, k = {g1 , gq } ⇔ Ijg \ {j, i, g } = ∅.
a) If k ≡ g : According to Definition 4, robot i and It means that Iig \ {i, g } = ∅. According to Definition 5,
a pair (j, k) ≡ (j, g ) are formed in a k-connected robots i and g are formed in a one-connected topology. This
topology. completes the proof.
b) If k = g : Robots k and g are connected through In short, after removing redundant critical connectivities
Ikg \ {k, i, g } = ∅ (refer to Proposition 4), so formed in groups Ti and Ki by applying Propositions 6 and 7,
Ijg \ {j, i, g } = Ijk \ {j, i, k} ∪· Ikg \ {k, i, g } = ∅. robot i has only one-connected topologies and it successfully
According to Definition 4, robot i and a pair (j, g ) escaped from the local minima. The minimization must be per-
are formed in a k-connected topology. formed so that the workspace Bi is possibly expanded in the
2) Ijk \ {j, i, k} = ∅ (Only Ti Exists): Ijk \ {j, i, k} = ∅ best way. Hence, we give a rule to identify redundant critical
⇔ Ijg \ {j, i, g } = ∅: it means that Iig \ {j, i, g } = ∅. connectivities as follows.
According to Definition 5, robots i and g are formed Proposition 8 (Connectivity Removal Rule): In each robot
in a one-connected topology. i’s group of local connectivity topologies, if robot i only main-
Hence, the group Ti is minimized to either a k-connected tains one critical connectivity eij satisfying (25), robot i’s
g
topology if Ti is adjacent to Ki or a one-connected topology workspace blocked off by critical robots in Ni is expanded,
if only Ti exists, which is not adjacent to Ki . This completes allowing robot i to move closer to a desired target di
the proof.
j
After minimization of groups Ti , all local connectivity θi = ming (θik ) (25)
k∈Ni
topologies of robot i only exist in k-connected topologies
where θik = (− →
v ai , −
→r ik ) and −

and/or one-connected topologies. Consecutively, we consider
v ai as robot i’s velocity vector
the minimization of group Ki .
toward target di .
Proposition 7 (Minimization of Group Ki ): In a group Ki ,
Proof: Robot i is blocked off in Bi as described in (18)
if all redundant connectivities are removed, the unique main- g
g with X = Ni . After minimization, X = {j}, so Bi is expanded,
tained connectivity eig , g ∈ Ni is formed in a one-connected
Bi → Sj . Moreover, the critical connectivity eij satisfies (25),
topology.
so rjdi = ming (rkdi ). It means that Sj is closer to robot i’s target.
Proof: Group Ki satisfies (21) and (22). Because all triangle k∈Ni
g
topologies were minimized, any robot j ∈ Ni \ Ni has ejk = 0 This completes the proof.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1284 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020

Algorithm 1: HDC 2) Level 2—Global Network Integrity Preservation


Input: Ni , α, β, γ , ε, t Control: Level 2 is added on the top of level 1 to keep all
Output: − →vi of the robots connected robustly through the network. Level 2
ε
Initialize: vimax = uses the mobility constraint with the control input ui , seen in

→ 2t
v = α−
i

v c + β−
i
→v s + γ− →
va
i i
(17), to preserve the global network integrity of the MRS.
Nic = {j | xj ∈ Sci , k : xk ∈ Sni ∩ Snj } When robot i has at least one critical robot Nic = ∅, robot
if Nic  = ∅ then i’s velocity is restricted by vimax = (εi /2t).
if ∃Ti then
Calculate RnTi by Eq. (30)
B. Distributed Connectivity Control
Rni ← RnTi
The distributed node control strategy guarantees that all
if (Nic \ Rni  ≥ 2) ∧ (∃Ki ) then
of the robots are well connected in terms of global network
Calculate RnK i by Eq. (31)
Rni ← RnTi ∪ RnK
integrity. However, preserving all critical connectivities of a
i
robot i causes its workspace to be limited in Bi as shown
Nic ← Nic \ Rni
εi = minc (rc − rij )
in Proposition 3. It is possibly expanded as pointed out in
j∈Ni Proposition 8 after minimization of redundant critical connec-
εi
vimax = tivities by applying Propositions 6 and 7 while the global
2t network integrity of the MRS is still preserved. Because
if vi > vimax then

→ vimax −
→ the critical connectivity has a symmetry property as shown
vi← − vi
→v i in Remark 1, robots must negotiate through information
exchange in order to make consensus decisions in removing
redundant critical connectivities.
The distributed connectivity control strategy is implemented
III. H IERARCHICAL D ISTRIBUTED C ONTROL on the top of the distributed node control architecture in order
In this section, we present the HDC strategy consisting of to allow robot i to expand its workspace through minimization
a distributed node control for mobility control and global of redundant critical connectivities formed in groups of local
network integrity preservation and distributed connectivity connectivity topologies. It includes two consecutive stages as
control for network coverage expansion. The HDC is presented follows.
in Algorithm 1 and described as follows. 1) Level 3—Minimization of Triangle Topologies: Level 3
is added on the top of level 2 and triggered when robot i has
A. Distributed Node Control at least one triangle topology. It allows robot i to minimize
1) Level 1—Behavioral Control: Inspired from behavioral redundant critical connectivities formed in group Ti as shown
control in [1] and [2], robot i’s velocity vector is synthe- in Proposition 6 by using direct communication to make a
sized by cohesion velocity −→v ci , driving the robot closer to its consensus decision between robot i and its neighboring robots.
neighbors; separation velocity − →v si controls the robot to avoid By applying Proposition 8, a set of redundant critical robots
colliding with other robots; and alignment velocity − →
v ai steers in group Ti is presented as follows:
   
the robot toward the desired target
g j

→ RnTi = j ∈ Ni | θi > ming (θik ) ∧ (ρij = 1)
v = α− →v c + β− →v s + γ−→ (30)
i i va i (26)i k∈Ni
where α, β, and γ are the factors used to adjust cohesion, where ρij = ρji is a consensus signal between robots i and j.
separation, and alignment for the overall behavior of robot i. Its value is 1 if robot j agrees with robot i; otherwise, it is
Separation Velocity Is Represented as: zero.

→ 
vs=− i w e−ζ (rij −ra ) r̂ij (27) ij
After minimization, if robot i has only one-connected topol-
j∈Nia ogy, that is, Nic \ RnTi  = 1, its workspace is expanded closer
to the desired target. Otherwise, level 4 is activated for the
where Nia = {j | xj ∈ Si \ Sai }, ζ is a predefined constant, and minimization of k-connected topologies.
j
wij = σ +(1−σ )[(1+cos(ϕi ))/2] represents the potential force 2) Level 4—Minimization of k-Connected Topologies:
j
field for collision avoidance, where ϕi is the angle between the Level 4 is added on the top of level 3 in order to allow robot i
heading of robot i and r ij , and σ ∈ [0, 1], r̂ij = [(−

→ →
r ij )/rij ]. to minimize group Ki by removing redundant critical connec-
Cohesion Velocity Is Represented as: tivities as shown in Proposition 7. Level 4 is triggered when

→ − →
vc= r (28) robot i is constrained in either k-connected or one-connected
i ij
topologies Nic \ RnTi  ≥ 2; or in other words, robot i can-
j∈Niā
not move toward its target when triggered at level 3. It uses
where Niā = {j | xj ∈ Si \ Sai }. a peer-to-peer communication protocol of the global network
Alignment Velocity Is Represented as: with communication level Lc to identify whether critical robots
g

→ in Ni = Nic \ RnTi are formed in k-connected topologies, and
v a = r̂ i idi (29)
then make a consensus decision to remove redundant critical
where r̂idi = [(−

r idi )/ridi ] is a vector toward target di . connectivities. The topology is considered to be a k-connected

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1285

TABLE I
S YSTEM PARAMETER S ETTING

topology if a packet traverses from one branch, through the


network, and comes back to the other branch of the topology. If
the packet does not come back after a timeout, robot i belongs
to one-connected topologies. According to Proposition 8, a set
of redundant critical robots in group Ki is presented as follows:
   
 
g j
Rni = j ∈ Ni | θi > ming θi
K k
∧ (ρij = 1) . (31)
k∈Ni
Fig. 6. Complexity of scenarios: d = 0.5rc –2.0rc , Nt = 5, and Nc = 3.
After minimization of local connectivity topologies, robot i
has only one-connected topologies with robots j ∈ X, where arbitrary value in the range of Sci and Sai . The factors α, β,
X = Nic \ (RnTi ∪ RnK
i ), that must be preserved for the global and γ are selected to adjust behaviors of robotics swarm: β
network integrity. impacts on the interaction between robots when performing
collision avoidance and obstacle avoidance and is proportional
C. Computational Complexity to the strength of repulsive force—the higher the value, the
The HDC algorithm consists of both the distributed node stronger the repulsive force; α and γ impact cohesion of the
control and the distributed connectivity control algorithms so robot swarm. A swarm dispersion behavior is generated if
computational complexity is calculated based on these con- (α/γ ) < 1; otherwise, it is swarm aggregation behavior. Time
trol algorithms. In the distributed node control algorithm, the step t is selected so that it covers the computational time of
velocity command is calculated based on the number of neigh- the HDC on each run-step of a robot and is limited by the
boring robots Ni , while the distributed connectivity control maximum run-steps of robots.
algorithm uses peer-to-peer communication with the maxi- We have collected data from 6400 simulations1 executed in
mum communication level Lc to exchange information and four cases with respect to the control level activated: level 2,
negotiate removing redundant critical connectivities. Thus, level 3, and level 4 with two cases (Lc = 1 for quadrangle
the computational complexity of the HDC algorithm depends topologies only and Lc = N for the entire network). We used
on the number of neighboring robots Ni , O(Ni ), and the 1600 different scenarios filtered from hundreds of thousands of
communication level O(Lc ). scenarios generated by the Gaussian random distribution rules
when we increased the number of targets from 10 to 100 and
IV. R ESULTS AND D ISCUSSION d = 0.5rc − 2.0rc , Nt = 5, and Nc = 3. In simulations, the
multitarget tracking problem is considered with the number
In this section, the HDC system is examined and evalu-
of robots equal to the number of targets. The Monte Carlo
ated through the multitarget tracking problem as a typical
simulation statistical results are presented in Fig. 7.
case of cooperative tasks of a networked MRS. The MRS
2) Results: The simulation results show that the average
is deployed into a 2-D space to occupy randomly distributed
ratio of successfully reached targets to total targets is 83.06%
targets. Initially, all robots are connected in a network.
when the HDC system was activated at level 2, as shown in
Fig. 7(a). The rate decreases from 98.82% with the easiest
A. Simulation (dense) scenarios (d = 0.5rc ) to 69.06% with the most difficult
1) Simulation Setup: Experimental scenarios are randomly (sparse) scenarios. In the worst case, it is only 47.50%.
generated by the Gaussian random distribution in which an Fig. 7(b) illustrates the average rate of successfully reached
experimental area 2-D are divided into d × d cells, and four targets when the HDC system was activated at level 3. The
cells are gathered in a group. Targets are distributed within rate with this control level is 97.41%, which is higher than the
the cells by Gaussian random distribution so that the target rate at level 2 because all redundant critical connectivities of
distribution graph is connected under the constraint of radius triangle topologies were removed. Similar to level 2, the rate
rc . Each cell has Nt targets and each group of targets has Nc decreases from 99.47% to 94.73% when we tested the dense
cells Nc ≤ 4. Therefore, the complexity of generated scenarios and sparse scenarios, respectively. The rate is only 72.50% in
depends on parameters d, Nt , and Nc and is represented by the worst case.
the connectivity property of the target distribution graph. It We examined the HDC system activated at level 4 in two
increases when the connectivity property decreases as shown cases, with the communication levels Lc = 1 (one-hop) and
in Fig. 6. Lc = N (N-hops) as shown in Fig. 7(c) and (d), respectively.
We set the system parameters as seen in Table I. The value When level 4 was activated with Lc = 1, the average rate
of ra is chosen according to the robot’s drivability and steer- was extremely high at 99.24%, even through the robots were
ability for its reaction time and maintenance of safe distance
with other robots and obstacles. Critical tolerance ε is an 1 100 robots track 100 targets: https://youtu.be/1nas4pGv2i8.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1286 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020

Fig. 7. Statistical results of successfully reached targets per total targets. (a) Level 2. (b) Level 3. (c) Level 4 with Lc = 1. (d) Level 4 with Lc = N.

Fig. 8. Rate of successfully reached targets over time with 100 targets. (a) d = 1.0 (Dense). (b) d = 1.5 (Hybrid). (c) d = 2.0 (Sparse).

capable of only identifying k-connected topologies in terms In an experiment, the computational complexity of MRS can
of quadrangle topologies. The success rate is 100% when we be theoretically computed in the volume, denoted by Ct , of a
examined the dense scenarios, while it is only 97.97% when cube with dimensions corresponding to a number of robots,
we experimented with the sparse scenarios. The successful rate the time taken to reach targets, and the communication level
is only 90% in the worst case, where only one robot could activated as shown in Fig. 9. The computational complexity
not reach its target in the ten-target scenario. As predicted, mostly depends on the number of local connectivity topolo-
when Lc = N, the robots occupied the targets with a 100% gies appearing during the experiment and the communication
success rate in all randomly selected scenarios because all level used for minimization of local connectivity topologies,
local connectivity topologies were detected. denoted by Cf . The statistical results in Fig. 9 show that the
We also examined the computational complexity of the rate (Cf /Ct ) is always less than 1% and at the level 4, the
HDC algorithm over the average rate of successfully reached average communication level is 3, 3.057, and 3.657, corre-
targets to realize that the computational complexity is highly sponding to Fig. 9(c), (f), and (i). This confirms that level 4
scenario-dependant, increasing from dense scenarios (d = of HDC with Lc = N (a robot must broadcast a message to
1.0rc ) to sparse scenarios (d = 2.0rc ) as illustrated in Fig. 8. all of the other robots to identify local connectivity topolo-
This also affirms that in the same scenario, releasing mobility gies) is rarely used; that is, broadcasting communication is
constraints of critical connectivity topologies is necessary to rarely used while level 3 is often activated to minimize local
increase the successful rate of target occupation and it is best connectivity topologies in the distributed connectivity control
at level 4 with Lc = N. algorithm.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1287

Fig. 9. Computational complexity of the HDC in scenarios: dense with d = 1.0 (a)–(c), hybrid with d = 1.5 (d)–(f), and sparse with d = 2.0 (g)–(i). The
total of each typical topologies processed by the HDC is shown in the legend of each figure.

B. Experiments by a red circle, and the blue and red links represent critical
1) System Setup: In real-world experiments, we used up to connectivities and redundant connectivities, respectively.
14 customized 14-cm diameter disc-like differentially-driven In the quadrangle scenario,2 four robots were dispersed to
wheel platforms. We set the maximum velocity of the robot to track four targets formed in a quadrangle as shown in Fig. 10.
vmax = 0.8 m/s and compared it with the actual maximum of A k-connected topology was established when the MRS was
1.6 m/s, the sensing and communication range to rc = 1 m, deployed to track targets. If the HDC system was only acti-
and the obstacle avoidance range to ra = 0.15 m. We used a vated at level 2 or level 3, the robot trapped in the k-connected
motion-tracking system to reduce difficulties by representing topology was unable to reach its assigned target. However,
the sensing and communication range of the robots. the trapped robot successfully escaped when the HDC system
2) Results: The HDC strategy was demonstrated in two was activated at level 4 because the k-connected topology was
case studies: 1) the number of robots is equal to the number reduced to a one-connected topology.
of targets and 2) the number of robots is less than the number In the swing scenario,3 we deployed six robots to track and
of targets. In the first case, we developed three special sce- occupy six targets as illustrated in Fig. 11. When the HDC
narios, including quadrangle, swing, and random containing system worked at level 2, there were two robots constrained by
“topology traps” of which local connectivity topologies are the triangle topologies, making it impossible for them to reach
established. In the second case, every robot was set to occupy
a target in an interval of time, and then it leaves to occupy the 2 Quadrangle scenario: https://youtu.be/gOEfKlHD7vM.
next target. As seen in Figs. 10–13, the trapped robot is marked 3 Swing scenario: https://youtu.be/6aEeFRkyl0g.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1288 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020

Fig. 10. Quadrangle scenario with four robots. (a) Level 2. (b) Level 3. (c) Level 4.

Fig. 11. Swing scenario with six robots. (a) Level 2. (b) Level 3. (c) Level 4.

Fig. 12. Random scenario with 14 robots. (a) Level 2. (b) Level 3. (c) Level 4.

their targets. At level 3, one of them successfully escaped to In the random scenario,4 we deployed 14 robots to occupy
reach its assigned target while another one was still obstructed 14 randomly distributed targets as illustrated in Fig. 12. When
by the k-connected topology. At level 4, all of the local connec- the HDC system was activated at level 2, a robot was trapped
tivity topologies were minimized so that all robots successfully
reached their targets. 4 Random scenario: https://youtu.be/DbOFo0dYye0.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1289

Fig. 13. Snapshots of five robots coordination for tracking and occupying 20 randomly distributed targets. (a) Robots occupied the first targets. (b) Robots
are trapped in a triangle topology. (c) Robots formed in one-connected topology.

Fig. 14. Connectivity properties of the graph G(V, E) over run-steps. (a) λ2min > 0 in 6400 simulations (λ2min = 0.0068). (b) λ2min > 0 in ten real
experiments (λ2min = 0.2163).

by both the triangle and k-connected topology while it was the MRS. It is always greater than zero for all run-steps of the
only blocked by the k-connected topology when the HDC experiments as illustrated in Fig. 14, that is, λ2 > 0. It affirms
system was set at level 3. When the HDC system was trig- that the global network integrity of the MRS was preserved
gered at level 4, the robot successfully escaped from all of the during the period of experiments.
local topology constraints to reach its target. The HDC strategy solves the global network integrity
To demonstrate the adaptability of the HDC for the MRS, preservation problem in a distributed manner by applying the
we designed an experiment5 using five robots to track 20 mobility constraint for critical neighbors only as shown in
randomly distributed targets as shown in Fig. 13. In this exper- (17). The method is different from other methods [22]–[31],
iment, a robot released its target occupation and after a short requiring algebraic connectivity estimation in which a robot
while, it moved further to occupy the next target. The result must frequently update connectivities with its neighbors to
shows that when the HDC was activated at level 4, a group estimate the second smallest eigenvalue for distributed con-
of five robots successfully tracked and occupied 20 randomly trol, so it is very time consuming (a few seconds for only
distributed targets while preserving global network integrity. six robots as in [24]) due to network dynamics and a large
number of robots. In our method, we examined that the HDC
C. Discussion was rarely activated at the communication level Lc = N as
From the experimental results described in Sections IV-A shown in the statistical results in Fig. 9. Moreover, if level
and IV-B, we analyze the key properties of the HDC as 4 with the communication level Lc = N was even activated,
follows. it was only active in a very short period of time in order to
1) Preserving Global Network Integrity: In all experiments check the type of local network topology of robot i. Therefore,
in both simulations and real-world experiments, we measured our proposed method can operate with time-step t within a
the second smallest eigenvalue of the connectivity graph of few milliseconds, compared to a few seconds in the methods
using intercommunication to estimate algebraic connectivity.
5 Five robots track 20 targets: https://youtu.be/uWuljXp1A5s. Hence, to the best of our knowledge, the HDC is the first-ever

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
1290 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 50, NO. 3, MARCH 2020

method of global network integrity preservation without using HDC is capable of achieving the highest performance in the
estimation of algebraic connectivity. multitarget tracking problem because of the systematic prop-
2) Expanding the Network Coverage: The network cover- erty of flexibility, which is necessary and sufficient to enable
age area is expanded by the local connectivity minimization the MRS to perform different tasks in various environments.
strategy of the HDC described in Section II-C, allowing robots In the scope of this paper, we used two assumptions of sens-
to reach their desired destinations. ing and communication capacities for mobile robots. In the
As mentioned in Section I, the distributed control laws for former, we applied a disc-like ranging sensor model for all of
the global connectivity maintenance problem in the previous the robots so that they can detect and identify its neighbors
works use potential fields for interaction among robots. within the sensing range. Although this assumption has been
Therefore, the local minima is a critical problem of potential widely used in communities of robotics and wireless-sensor
force fields [36]. In this paper, a local minima corresponds to networks, it is not truly realistic with current state-of-the-art
a topology trap. Thanks to the local connectivity minimization sensor technologies and when the robotic system is applied
strategy, robots are capable of escaping from topology traps in a real-world environment. A probabilistic model for rang-
to move toward assigned targets so task performance is at ing sensors is more reliable and additive white noise might be
the highest success rate, 100%, of multiple target tracking in applied to increase the reality of sensor modeling. In the latter,
all experiments. To the best of our knowledge, we have not we used a binary communication model to represent the com-
found a similar method of minimization of local connectivity munication rate of robots. We assumed that a communication
topologies in previous works. protocol of networked MRSs exists with a secured success rate
3) High Performance and Flexibility: Thanks to the local of peer-to-peer communication if the wireless communication
connectivity minimization strategy that is adaptable to any range of a robot is restricted within its sensing range. Although
network topology, the MRS had a capacity of expanding the this assumption is reasonable according to existing wireless
coverage area, so it achieved a high performance level as communication technologies, communication between robots
shown in the statistical simulation results. Specifically, the within a short distance might be obstructed by obstacles, and
average rate is 83.06% at level 2, 97.41% at level 3, 99.24% delay and latency of peer-to-peer communication caused by
at level 4 with one-hop communication, and 100% at level 4 robot mobility are still an open research problem in wireless
with N-hop communication. networks. Therefore, integrating different probabilistic models
The HDC is scalable to different numbers of robots in the for ranging sensor and wireless communication in the HDC
network as demonstrated through simulations executed from strategy will be a focus of our future in this research direction.
10 to 100 robots and real-world experiments with 4, 5, 6, and
14 robots. Time consumption for experiments was bounded ACKNOWLEDGMENT
and did not dramatically increase with respect to the num- The authors would like to thank M. Hall (http://www.matt-
ber of the robots or the complexity of scenarios. Specifically, hall.ca) for proofreading this paper.
the robots took more time for local connectivity minimization
strategy in complex scenarios, but they accelerated target R EFERENCES
tracking and an occupation process once they escaped from
[1] C. W. Reynolds, “Flocks, herds and schools: A distributed behav-
topology traps. The HDC was adaptable to assigned tasks and ioral model,” SIGGRAPH Comput. Graph., vol. 21, no. 4, pp. 25–34,
application scenarios as demonstrated through a series of sim- Aug. 1987.
ulations and real experiments. We demonstrated that assigned [2] M. J. Matarić, “Designing and understanding adaptive group behavior,”
Adapt. Behav., vol. 4, no. 1, pp. 51–80, 1995.
tasks of the robots can be easily switched or modified but the [3] L. E. Parker, “Distributed algorithms for multi-robot observation of
HDC system was still capable of handling different assigned multiple moving targets,” Auton. Robots, vol. 12, no. 3, pp. 231–255,
tasks, for example, “track to occupy permanently” as shown in May 2002.
[4] R. Olfati-Saber and R. M. Murray, “Graph rigidity and distributed for-
Figs. 10–12, “track to occupy temporary” as seen in Fig. 13. mation stabilization of multi-vehicle systems,” in Proc. IEEE Int. Conf.
The scalability and adaptability affirm that the HDC is flexi- Decis. Control, vol. 3. Las Vegas, NV, USA, 2002, pp. 2965–2971.
ble to deploy the MRS into an unknown environment without [5] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of mobile
autonomous agents using nearest neighbor rules,” IEEE Trans. Autom.
resetting the robot configuration. Control, vol. 48, no. 6, pp. 988–1001, Jun. 2003.
[6] A. Marino, L. Parker, G. Antonelli, and F. Caccavale, “Behavioral con-
trol for multi-robot perimeter patrol: A finite state automata approach,”
V. C ONCLUSION in Proc. IEEE Int. Conf. Robot. Autom. (ICRA), 2009, pp. 831–836.
[7] G. Antonelli, F. Arrichiello, and S. Chiaverini, “Flocking for multi-
We addressed our novel HDC strategy for the MRS. It robot systems via the null-space-based behavioral control,” Swarm
includes the two-layer distributed mobility controller of nodes Intell., vol. 4, no. 1, pp. 37–56, Mar. 2010. [Online]. Available:
http://link.springer.com/10.1007/s11721-009-0036-6
with a bounded mobility constraint, guaranteeing the global [8] A. Marino, L. E. Parker, G. Antonelli, and F. Caccavale, “A decentralized
network integrity preservation and the two-layer distributed architecture for multi-robot systems based on the null-space-behavioral
connectivity controller of network topologies with a local con- control with application to multi-robot border patrolling,” J. Intell.
Robot. Syst., vol. 71, nos. 3–4, pp. 423–444, 2013.
nectivity minimization strategy, allowing network coverage [9] D. Xu, X. Zhang, Z. Zhu, C. Chen, and P. Yang, “Behavior-based
expansion. To the best of our knowledge, the HDC is the formation control of swarm robots,” Math. Problems Eng., vol. 2014,
first method for global network integrity preservation with- Jun. 2014, Art. no. 205759.
[10] G. Zuo, J. Han, and G. Han, “Multi-robot formation control using rein-
out requiring estimation of the algebraic connectivity of the forcement learning method,” in Proc. Int. Conf. Swarm Intell., 2010,
communication graph. The experimental results show that the pp. 667–674.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.
HUNG et al.: HDC FOR GLOBAL NETWORK INTEGRITY PRESERVATION IN MRSs 1291

[11] B. Fernandez-Gauna, I. Etxeberria-Agiriano, and M. Graña, “Learning [34] P. D. Hung, M.-T. Pham, T. Q. Vinh, and T. D. Ngo, “Self-deployment
multirobot hose transportation and deployment by distributed round- strategy for a swarm of robots with global network preservation to assist
Robin Q-learning,” PLoS ONE, vol. 10, no. 7, pp. 1–27, 2015. [Online]. rescuers in hazardous environments,” in Proc. IEEE Int. Conf. Robot.
Available: https://doi.org/10.1371/journal.pone.0127129 Biomimetics (ROBIO), 2014, pp. 2655–2660.
[12] A. Howard, M. J. Matarić, and G. S. Sukhatme, “Mobile sensor network [35] P. D. Hung, T. Q. Vinh, and T. D. Ngo, “Distributed coverage con-
deployment using potential fields: A distributed, scalable solution to the trol for networked multi-robot systems in any environments,” in Proc.
area coverage problem,” in Proc. Int. Symp. Distrib. Auton. Robot. Syst., IEEE Int. Conf. Adv. Intell. Mechatron. (AIM), Banff, AB, Canada, 2016,
2002, pp. 299–308. pp. 1067–1072.
[13] P. Ögren, E. Fiorelli, and N. E. Leonard, “Cooperative control of mobile [36] F. Matoui, B. Boussaid, and M. N. Abdelkrim, “Local minimum solution
sensor networks: Adaptive gradient climbing in a distributed environ- for the potential field method in multiple robot motion planning task,”
ment,” IEEE Trans. Autom. Control, vol. 49, no. 8, pp. 1292–1302, in Proc. 16th Int. Conf. Sci. Techn. Autom. Control Comput. Eng. (STA),
Aug. 2004. Monastir, Tunisia, Dec. 2015, pp. 452–457.
[14] Y. Zou and K. Chakrabarty, “Sensor deployment and target localization
in distributed sensor networks,” ACM Trans. Embedded Comput. Syst.,
vol. 3, no. 1, pp. 61–91, Feb. 2004.
[15] W. M. Spears, D. F. Spears, J. C. Hamann, and R. Heil, “Distributed,
physics-based control of swarms of vehicles,” Auton. Robot., vol. 17,
nos. 2–3, pp. 137–162, 2004.
[16] M. Ji and M. Egerstedt, “Distributed coordination control of multiagent
systems while preserving connectedness,” IEEE Trans. Robot., vol. 23,
no. 4, pp. 693–703, Aug. 2007.
[17] D. V. Dimarogonas and K. J. Kyriakopoulos, “Connectedness preserving
Pham Duy Hung received the B.Sc. and M.Sc.
distributed swarm aggregation for multiple kinematic robots,” IEEE
degrees in electronics and telecommunication from
Trans. Robot., vol. 24, no. 5, pp. 1213–1223, Oct. 2008.
the University of Engineering and Technology,
[18] A. Ajorlou, A. Momeni, and A. G. Aghdam, “A class of bounded dis-
Hanoi, Vietnam, in 2003 and 2006, respectively,
tributed control strategies for connectivity preservation in multi-agent
where he is currently pursuing the Ph.D. degree in
systems,” IEEE Trans. Autom. Control, vol. 55, no. 12, pp. 2828–2833,
robotics.
Dec. 2010.
His current research interests include distributed
[19] B. J. Julian, M. Angermann, M. Schwager, and D. Rus, “Distributed
control of multiagent systems with an emphasis
robotic sensor networks: An information-theoretic approach,” Int. J.
on deployment, exploration, coverage, and multiple
Robot. Res., vol. 31, no. 10, pp. 1134–1154, Sep. 2012.
target tracking.
[20] S. B. Mikkelsen, R. Jespersen, and T. D. Ngo, “Probabilistic communi-
cation based potential force for robot formations: A practical approach,”
in Proc. DARS, 2010, pp. 243–253.
[21] K. Naderi, K. Taheri, H. Moradi, and M. N. Ahmadabadi, “An evo-
lutionary artificial potential field algorithm for stable operation of a
multi-robot system on domes,” in Proc. IEEE Int. Conf. Auton. Robot
Syst. Competitions (ICARSC), 2014, pp. 92–97.
[22] R. K. Williams and G. S. Sukhatme, “Locally constrained connectiv-
ity control in mobile robot networks,” in Proc. IEEE Int. Conf. Robot.
Autom., Karlsruhe, Germany, May 2013, pp. 901–906.
[23] R. K. Williams, A. Gasparri, G. S. Sukhatme, and G. Ulivi, “Global Tran Quang Vinh received the Ph.D. degree in
connectivity control for spatially interacting multi-robot systems with radio physics from Vietnam National University,
unicycle kinematics,” in Proc. IEEE Int. Conf. Robot. Autom. (ICRA), Hanoi, Vietnam, in 2003.
May 2015, pp. 1255–1261. He is an Associate Professor with the University
[24] P. Yang et al., “Decentralized estimation and control of graph connectiv- of Engineering and Technology, Hanoi. His cur-
ity in mobile sensor networks,” Automatica, vol. 46, no. 2, pp. 390–396, rent research interests include intelligent robotics,
2010. fuzzy logics, sensor fusion, networked robotics,
[25] L. Sabattini, N. Chopra, and C. Secchi, “Decentralized connectivity computer architecture, instrumentation, and control
maintenance for cooperative control of mobile robotic systems,” Int. engineering.
J. Robot. Res., vol. 32, no. 12, pp. 1411–1423, 2013.
[26] L. Sabattini, C. Secchi, N. Chopra, and A. Gasparri, “Distributed con-
trol of multirobot systems with global connectivity maintenance,” IEEE
Trans. Robot., vol. 29, no. 5, pp. 1326–1332, Oct. 2013.
[27] P. R. Giordano, A. Franchi, C. Secchi, and H. H. Bülthoff, “A passivity-
based decentralized strategy for generalized connectivity maintenance,”
Int. J. Robot. Res., vol. 32, no. 3, pp. 299–323, Mar. 2013.
[28] T. Nestmeyer, P. R. Giordano, H. H. Bülthoff, and A. Franchi,
“Decentralized simultaneous multi-target exploration using a connected
network of multiple robots,” Auton. Robots, vol. 41, no. 4, pp. 989–1011, Trung Dung Ngo (M’08–SM’18) received the B.Sc.
2017. degree in electronics and telecommunication from
[29] D. Cai, S. Wu, and J. Deng, “Distributed global connectivity main- Vietnam National University, Hanoi, Vietnam, in
tenance and control of multi-robot networks,” IEEE Access, vol. 5, 2000, the M.Sc. degree in computer systems engi-
pp. 9398–9414, 2017. neering (robotics) from the University of Southern
[30] A. Gasparri, L. Sabattini, and G. Ulivi, “Bounded control law for Denmark, Odense, Denmark, in 2004, and the
global connectivity maintenance in cooperative multirobot systems,” Ph.D. degree in electrical and electronic engineer-
IEEE Trans. Robot., vol. 33, no. 3, pp. 700–717, Jun. 2017. ing (robotics) from Aalborg University, Aalborg,
[31] J. Panerati et al., “Robust connectivity maintenance for fallible robots,” Denmark, in 2008,
Auton. Robots, vol. 43, no. 3, pp. 769–787, 2019. He was a Faculty Member with the Department
[32] P. D. Hung, T. Q. Vinh, and T. D. Ngo, “A scalable, decentralised large- of Electronic Systems, Aalborg University, and the
scale network of mobile robots for multi-target tracking,” in Proc. Intell. Faculty of Science, University of Brunei, Bandar Seri Begawan, Brunei. He is
Auton. Syst., 2016, pp. 621–637. currently an Associate Professor with the University of Prince Edward Island,
[33] T. D. Ngo, P. D. Hung, and M.-T. Pham, “A Kangaroo inspired het- Charlottetown, PE, Canada, where he is the Founder and the Director of the
erogeneous swarm of mobile robots with global network integrity for More-Than-One Robotics Laboratory and the Lead Researcher of the Centre
fast deployment and exploration in large scale structured environments,” for Excellence in Robotics and Industrial Automation. His current research
in Proc. IEEE Int. Conf. Robot. Biomimetics (ROBIO), Dec. 2014, interests include multirobot systems, modular robotics, and human–robot
pp. 1205–1212. collaboration.

Authorized licensed use limited to: University of Prince Edward Island. Downloaded on January 06,2021 at 18:35:58 UTC from IEEE Xplore. Restrictions apply.

You might also like