Given the rapid pace of advance in UAV technologies, it appears that UAV swarms will soon become common in many applications [and may sometimes pose a threat for other vehicles in their airspace. In this paper, we consider an interception problem in which three UAVs carrying a net actively attempt to trap a swarm of intruder UAVs. The capturing UAVs are assumed to be capable of flying at speeds higher than the intruder UAVs which, in turn, may maneuver in space. The problem is to decide how the UAVs need to manipulate, as well as orient the net in order to ensure that the net intercepts the intruder UAVs. In the guidance literature, interception problems have been addressed in the context of a missile intercepting an intruder aircraft. However, the problem there is formulated as an interceptor (modeled as a point), trying to intercept a target (which is also a point). In fact much of the guidance laws in the literature (PN being one of them) are based on the idea of guiding a point to intercept a target which may or not maneuver.
The present disclosure is directed to a classes of problems associated with requirements to capture UAV(s) intruding into a guarded airspace, so as to protect the airspace from a proliferation of unauthorized drones. Toward this end, the present disclosure considers the problem of a team of n UAVs on a 2-D plane, pursuing a swarm of intruder UAVs (assumed to fly in a flock), with the objective of eventually surrounding the intruder swarm. There can be several reasons for which a group of UAVs might need to surround a target. By doing so, the UAVs can observe the target from multiple directions and perform a risk assessment of the target, to determine whether it poses a threat to the area that the UAVs are protecting. The act of surrounding the target also prevents it from escaping, and allows the UAVs to escort it to a landing zone without actually destroying it.
The present disclosure also addresses the problem of capturing a swarm of intruder UAVs, using a net manipulated by a team of defense UAVs. The intruder UAV swarm may be stationary, in motion, and even maneuver. The concept of collision cones in 3-dimensional space is used to determine the strategy used by the net carrying UAVs to maneuver or manipulate the net in space in order to capture the intruders. The manipulation of the net involves guiding the net to pursue the intruders and orienting it in space appropriately so as to maximize the effectiveness of capture. The net manipulation strategy is derived from the concept of collision cones defined in a relative velocity framework, and analytical expressions of nonlinear guidance laws are obtained. Simulations are presented to demonstrate the efficacy of these guidance laws.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The components in the drawings are not necessarily to scale relative to each other. Like reference numerals designate corresponding parts throughout the several views.
The APPENDIX, comprising 25 pages and incorporated herein by reference as part of the disclosure of this application, shows simulation results based on the principles disclosed herein.
Cooperative Pursuit Guidance to Surround Intruder Swarms Using Collision Cones
With reference to
To address the three problems, a collision cone approach is disclosed herein. Collision cones represent a collection of velocity vectors of an object which leads to collision with another moving object. Guidance laws to avoid collision are then designed to pull the current velocity vector of the object outside the collision cone. As described herein, collision cones can be used to develop analytical guidance laws for cooperative pursuit being performed by a group of UAVs. Differently from the collision avoidance problem, these guidance laws specify accelerations, which when applied by the pursuing UAVs, enable them to cooperatively drive the velocity vector of any chosen point (that lies in the convex hull of the pursuing UAVs) into the collision cone to the target, thereby facilitating subsequent capture of the target.
Collision Cone Preliminaries
The present disclosure details how the concepts from collision cones can be used to design the cooperative pursuit guidance laws.
V
θ
=r{dot over (θ)}=V
B sin(β-θ)—VA sin(α−θ) Vr={dot over (r)}=VB cos(β-θ)−VA cos(α−θ) (1)
When A and B move with constant velocities, the miss-distance rm (which is the predicted distance between the point A and the center P of the circle at the instant of closest approach), is given by the following equation:
and the time at which the two objects are at their point of closest approach is given by:
When Vr<0, the above expression leads to a positive value of tm. When Vr>0, it leads to a negative value of tm, and this is to be interpreted as the time of closest approach if the trajectories of both the objects are projected backwards in time. Since the objects are moving with constant velocities, projection backwards implies that the trajectories of the objects before time t, are also straight lines.
One can see that if the miss distance rm is less than R, then the point object A is on a collision course with the circle B. Based on the above, one may define a miss-distance function y as follows:
If the two objects continue to move with constant velocities for all future time, then the predicted miss distance rm is equal to the actual miss distance, and therefore, the conditions y<0 and Vr<0 are both necessary and sufficient conditions for one object to intercept the other object. When the two objects move with varying velocities, then the condition y<0, Vr≤0 for all future time is a sufficient condition for interception.
The condition y<0, Vr<0 can be represented by a cone in the relative velocity space, as follows:
R=(Vθ,Vr):y<0∩Vr<0 (5)
This cone R is schematically depicted in
R
α
=α:y<0∩Vr<0 (6)
The cone Rα in physical space is shown in
Cooperative Pursuit Guidance Laws
Below is described details cooperative pursuit by a group of UAVs. Consider n UAVs A1, . . . , An that are pursuing an intruder UAV swarm. The UAVs are all moving on a plane. We assume that the vehicles in the intruder swarm need to stay reasonably close together. The reason for this could be, for example, that the intruders seek to perform a coordinated attack on a protected area, or because the intruder UAVs are flying in a leader-follower configuration and the followers need to be close to the leader. Because of their need to stay close together, the intruder UAVs are moving as a flock. We furthermore assume that this flock of intruder UAVs lies within a circle of radius R. A scenario comprising five UAVs performing a cooperative pursuit of an intruder swarm bounded within a circle is illustrated in
Engagement Geometry Kinematics
Let {right arrow over (r)}1, . . . , {right arrow over (r)}n represent the position vectors of the pursuing UAVs, and V1, Vn represent their respective velocity vectors. Let VB represent the velocity vector of the circle encompassing the intruder UAV swarm. Consider a virtual point X that lies in the convex hull of A1, . . . , An, defined by:
{right arrow over (X)}=Σ
1=1
nλi{right arrow over (r)}i,Σi=1nλi=1,λi>0,i=1, . . . ,n (7)
An algorithm to compute (λ1, . . . , λn) is discussed in Section D. The chosen (λ1, . . . , λn) combination is then used to compute the velocity vector {right arrow over (V)}X of point X as follows:
{right arrow over (V)}
X=λ1{right arrow over (V)}1+ . . . +λn{right arrow over (V)}n (8)
Let V1, . . . , Vn represent the speeds of A1, . . . , An, and let the angles of the associated velocity vectors (with respect to a reference line) be α1, . . . , αn, respectively. Then,
The magnitude of {right arrow over (V)}X is then given by:
V
X=(λ1V1 cos α1+ . . . +λnVn cos αn)2+(λ1V1 sin α1+ . . . +λnVn sin αn)2 (10)
The angle made by {right arrow over (V)}X with respect to the reference line is denoted by αX and is given by:
Let VB represent the speed of B, and let β denote the angle made by {right arrow over (V)}B with respect to the horizontal. Defining rX=XP, and θX as the angular bearing of the line XP, the relative velocity components of B with respect to X are given by:
V
θ,X
=V
B sin(β−θX)−VX Sin(αX−θX) Vr,X=VB cos(β−θX)−VX cos(αX−θX) (12)
Let α1, . . . , αn represent the magnitudes of the applied accelerations of A1, . . . An, and these are applied at angles δi, . . . , δn, respectively, with these angles measured with respect to a reference line. Then, the nonlinear state equations governing the kinematics between the point X and center P of the circle, represented in a polar coordinate frame, are as follows:
Note that Eqs. 17 and 18 above are obtained by differentiating Eqs. 10 and 11, respectively, with respect to time. In these equations, λX and λY are defined as:
λX=λ1V1 cos α1+ . . . +λnVn cos αn (21)
λY=)1V1 sin α1+ . . . +λnVn sin αn (22)
Eqs 19 and 20 represent the lateral and longitudinal acceleration components, respectively, of the ith UAV. Eqs 13-20 thus govern the kinematics of the relative velocity between any point X residing in the convex hull of the pursuing UAVs A1, . . . , An, and the center of the target circle B, when B is non-maneuvering, that is, B moves with constant velocity. The guidance problem is addressed in this section is to determine suitable accelerations of the pursuing UAVs so that they cooperatively steer the velocity vector of X, such that X intercepts the target circle.
Cooperative Pursuit Laws for Non-Maneuvering Target
Cooperative pursuit laws for the scenario when the target moves with constant velocity, i.e., it is non-maneuvering are determined below. From Eq 4, a collision cone function yX can be defined as follows:
The condition yX<0, Vr,X<0 indicates that the current velocity vector of X, (that is, {right arrow over (V)}X) is such that X is on a path to intercept with the target circle B. If the initial conditions of the engagement are such that yX<0, Vr,X<0 is not satisfied (See
Z=1/2(yX−w)2 (24)
where, w is a reference value, which is chosen to satisfy −R2<w<0. Note that driving this Lyapunov function to zero is equivalent to driving the velocity vector of X into the collision cone to the target. Then, the derivative of the Lyapunov function (Eq. 24) is Ż=(yX-w){dot over (y)}X. where {dot over (y)}X is as follows:
Evaluating the above along the system trajectories given by Eqs. 13-20, and rearranging terms in the resulting equation leads to the following:
The control inputs may be defined as uα,i and uV,i, where uα,i≡{dot over (α)}i and uV,i≡{dot over (V)}i, represent the acceleration components governing the heading and speed change, respectively, of UAV Ai. Here, uV,i represents the longitudinal acceleration and the lateral acceleration is computed from uα,i Vi These control inputs may be determined so that they will force the Lyapunov function Z to follow the dynamics Ż=−KZ. Choosing the constant K to satisfy K>0 will render Ż to be negative definite, and Z to be globally exponentially stable. By substituting {dot over (V)}X from Eq. 17 and {dot over (α)}X from Eq. 18 into Eq. 26, it is evident that we can enforce Z to follow the dynamics Ż=−KZ, if the accelerations of the pursuing UAVs satisfy the equation:
λ1(N1αuα,1+N1vuV,1)+ . . . +λn(Nnauα,n+NnvuV,n)=−K(yX−w) (27)
where, Niα and Niv are as follows:
It is evident that Eq. 27 represents a single equation in 2n unknowns (uα,1, . . . , uα,n) and (uV,1, . . . , uV,n), which are the heading angle rates and longitudinal accelerations, respectively, of the pursuing UAVs. There are thus multiple combinations of the lateral and longitudinal accelerations of the pursuing UAVs that can satisfy. If the pursuing UAVs are capable of only changing their heading angles (that is, they always move with constant speed), then in order for X to intercept B, the equation governing the heading angle rates of the pursuing UAVs is obtained by setting uV1, . . . , uVn in Eq. 27 to be identically zero. This leads to the following equation:
λ1N1αuα,1+ . . . +λnNnauα,n=K(yX−w) (30)
In Eq. 27, K is a constant. If the initial conditions are such that Vr,X<0, then we choose K>0 to ensure that the Lyapunov function Z decays to zero. Note that since we are enforcing Ż=−KZ, therefore Z will follow the dynamics Z(t)=Z(0)e−Kt, where Z(0) represents the initial value of the Lyapunov function. The decay in Z is thus exponential in nature. We now choose K such that Z decays to E (where E is a small number) within a time that is shorter than tm,X, which (from Eq. 3) is:
From the expression for Z(t), it can be seen that the requisite K that will achieve this is given by:
Thus, for a constant velocity target, when the initial conditions are such that Vr,X<0, then if the control inputs of the pursuing UAVs satisfy Eq. 27, and K>0 is chosen as above, then X will intercept B.
The required sensor data is the target velocity, range and bearing to the target from each of the individual UAVs, as well as the radius of the target UAV circle. The radius R of the target UAV circle can be extracted from image data obtained from camera(s) mounted on the pursuing UAVs. Then, knowing R, the reference point w is chosen so as to satisfy −R2<w<0, in order to ensure interception.
To compute K from Eq. 32, Z(0) is needed and tm,X. Z(0) is computed from Eq. 24, and requires the use of yX(0). yX(0) is computed from Eq. 23, while tm,X is computed from Eq. 31, and these require the values of rX(0), Vθ,X(0), Vr,X(0). These are computed using Eqs. 7-12, in conjunction with the chosen values of (λ1, . . . ,λn).
When the initial conditions are such that Vr,X>0, then the velocity vector {right arrow over (V)}X first needs to be steered into the Vr,X<0 region (See
Cooperative Pursuit Laws that Account for Target's Acceleration
In this section, the developed guidance law Eq. 27 is modified so that it explicitly accounts for the target's lateral acceleration aB. It is assumed that the target swarm maneuvers are such that its acceleration vector acts normal to its velocity vector, that is, the target may change its direction but otherwise moves with constant speed. When B has an acceleration of magnitude aB, then the time derivatives of the relative velocity components and the heading angle of B are as follows:
The kinematics of the engagement between then pursuing UAVs and the maneuvering target are given by Eqs. 13, 14, 17-20 and 33-35.
The quantity yX is, in general, a function that provides the predicted miss-distance. When all the pursuing UAVs A1, . . . , An as well as the target B are not maneuvering, then yX is a constant in time, and is a function of the actual miss-distance. When B is maneuvering, the quantity yX represents a predicted miss-distance function and varies with time. At any time t1, yX(t1) represents a prediction of what the miss distance function would be if the target were to move with constant velocity for all future time t>t1. Eventually, this predicted miss-distance converges to the actual miss distance.
If we drive the Lyapunov function Z to zero, then we are essentially forcing this predicted miss-distance to the reference value w, at each instant in time. Since this predicted miss-distance only eventually converges to the actual miss-distance, therefore, for a maneuvering target, driving Z to zero represents a sufficient condition for X to intercept B.
Differentiating the Lyapunov function Eq. 24 along the trajectories of the system defined by Eqs. 13, 14, 17-20 and 33-35, ensures that Eq. 24 follows the dynamics Ż=−KZ, if the control inputs of the pursuing UAVs follow the equation:
In Eq. 36, if K is large enough to ensure that Z is driven to zero in time less than tm,X, then X is on a path to intercept B.
Assume that at t=0, all the pursuing UAVs are moving in a formation with identical velocities. Refer Eqs. 27 and 36. Each of these represent a single equation with 2n unknowns, and in each of them, one of the solutions corresponds to the case of equal lateral accelerations and equal longitudinal accelerations of the n pursuing UAVs. Employing this solution will cause the pursuing UAVs to move towards the target with no change in either their formation shape, or the formation orientation. On the other hand, when Eqs 27 and 26 are employed with unequal accelerations, then the formation shape and orientation will change as it approaches the target. In Section 4, we show how to obtain the particular solution of Eqs. 27 and 36 that will ensure that the formation approaches the target with an orientation change, while otherwise remaining rigid. In Section 5, we show how to obtain the particular solution of Eqs. 27 and 36 that will ensure that the formation performs an orientation change, as well as a change in the lengths of the formation edges.
Computation of λ1, . . . , λn
The computation of the quantities (λ1, . . . , λn) in Eq. 7 will now be introduced. From Caratheodory's Theorem, when n>3, then the representation of {right arrow over (X)} may not be unique in the sense that there can be more than one (λ1, . . . , λn) tuple that corresponds to the same point {right arrow over (X)}. So in our case, we first choose the coordinates of point X at time t=0, and then take any (λ1, . . . , λn) tuple that will correspond to that point X. Note that if we choose λi=0 for any i, then that UAV does not participate in the guidance laws Eqs. 27 and 36, as a consequence of which the acceleration of that UAV cannot be computed from Eqs. 27 and 36. To ensure that this does not occur, we necessarily require that λi>0, ∀i.
The chosen point X lies at the centroid of the convex hull, we then chose
There can be scenarios when it would be better to choose X to be a point different from the centroid of the convex hull.
The scenarios requiring unequal values of λ1 can be understood from the notion of the Chebyshev center. Here, a definition that the Chebyshev center is the center of the largest radius circle that can be inscribed within a polygon is adopted. If the Chebyshev center is not located at the centroid of the polygon formed by the pursuing UAVs, then unequal values of λi will be required.
An algorithm to compute λ1, . . . , λn is as follows. For a given {right arrow over (X)}, find λ1, . . . , λn:
subject to constraints:
λi>0,Σi=1nλi=1,Σi=1nλiAi=X (37)
Guidance Laws for Pursuing UAVs with a Ropeline (or Suspended Net)
In a scenario where the pursuing UAVs are carrying a ropeline (or suspended net) with which they wish to surround the target. The rope essentially forms an open chain as depicted in
Assuming that the sizes of the target circle and the polygon A1 . . . An formed by the pursuing UAVs are such that (i) the open edge of the polygon is of length greater than the diameter of the circle, and (ii) the perimeter of the polygon is greater than the circumference of the circle B.
The problem addressed in this section is to develop guidance laws governing the longitudinal and lateral accelerations of then pursuing UAVs with which, the pursuing UAVs can simultaneously achieve the following:
Objective a: To meet this objective, we determine the equation governing the longitudinal and lateral accelerations of the pursuing UAVs that will drive yX to a reference value w<0, since yX<0 corresponds to the physical scenario of the velocity vector of X being inside the collision cone to the target. For a maneuvering target, this objective is met if the control inputs of the pursuing UAVs satisfy Eq. 36. If the target is non-maneuvering, then Eq. 36 reduces to Eq. 27.
Objective b: In order to meet this objective, Eq. 36 is combined with additional conditions that will enable the formation to be oriented appropriately. Toward determining these additional conditions, we look at the kinematics of each of the lines AiAj. The states governing each line AiAj are represented by the quantities rij, θij, Vθ,ij and Vr,ij. These quantities are schematically shown in
where, δi and δi represent the directions of the acceleration vectors of ai and aj, respectively. From Eq. 38, it is evident that when {right arrow over (a)}i={right arrow over (a)}j then the relative velocity component of Aj with respect to Ai is zero, that is, Vr,ij=0, Vθ,ij=0 and rij is constant.
Now consider the two UAVs carrying the open ends of the rope. Without loss of generality, assume that these two UAVs are A1 and An. Then, θ1n represents the angle made by the line A1An. Let θ1n,d represent the desired orientation of this line. We define an error quantity eθ,1n=θ1n−θ1n,d, Differentiating eθ,1n twice, we get the following:
The quantity eθ,1n follows the dynamics ëθ,1n=−K1ėθ,1n−K2 eθ,1n, (where, K1>0 and K2>0 are constants). Such a choice ensures that eθ,1n follows stable dynamics and decays to zero. After substituting terms from Eq. 38, it is required that the accelerations of A1 and An satisfy the following equation:
—a1 sin(δ1−θ1n)+an sin(δn−θ1n)=Vθ,1n(2Vr,1n/r1n−K1)−r1nK2(θ1n−θ1n,d)+r1nK1{dot over (θ)}1,nd (40)
The above equation can then be written in terms of the control inputs uα,1, uV,1, uα,n, uV,n as follows:
−uα,1V1 cos(α1−θ1n)−uV,1 sin(α1−θ1n)+uα,nVn cos(αn−θ1n)+uV,n sin(αn−θ1n)=Vθ,1n(2Vr,1n/r1n−K1)−r1nK2(θ1n−θ1n,d)+r1nK1{dot over (θ)}1,nd (41)
If the control inputs are applied such that (36) and (41) are satisfied, then the pursuing UAVs will be able to surround the target with the rope at the appropriate orientation. The reference value θ1n,d would be equal (or close) to
Objective c: This requirement dictates that the distances between the UAVs need to remain constant throughout the engagement. a n-sided polygon can be triangulated into n−2 distinct triangles. As an example, the pentagon A1A2A3A4A5 in
The distance between a UAV pair (Ai,Aj) can be kept constant if the accelerations of UAVs Ai and Aj are such that {dot over (V)}r,ij=0 (with the assumption that the initial conditions are such that Vr,ij=0). From Eq. 38, {dot over (V)}r,ij=0 will hold, if the following condition is satisfied:
−ai cos(δi−θij)+aj cos(δj−θij)=Vθ,ij2/rij,∀(i,j)∈E (42)
The above equation can then be written in terms of the control inputs uα,i, uV,i, uα,j, uV,j as follows:
u
V,i cos(αi−θij)−uα,iVi sin(αi−θij)−uV,j cos(αj−θij)+uα,jVj sin(αj−θij)=Vθ,ij2/rij,∀(i,j)∈E (43)
Eqs 27, 41 and 43 can now be combined and written in the following matrix form AU=Y:
where, we have used the shorthand notation that for every pair of adjacent UAVs i and j, si≡sin (αi−θij), sj=sin(αj−θij) and ci=cos(αi−θij), cj=cos(αj−θij).
Eq 44 represents a total of 2n−1 equations with 2n unknowns. The 2n−1 equations comprise one equation that drives the collision cone function yX, 2n−3 equations that ensure that the inter-UAV distances are such that the formation remains rigid, and one equation that drives the orientation of the open end A1An of the chain. The 2n unknowns correspond to the control inputs (longitudinal acceleration and heading angle rate) of each of the n UAVs. This thus represents an under-determined system of equations, with there being one more unknown than the number of equations. Solution of this linear system of equations leads to control inputs of the pursuing UAVs with which objectives (a)-(c) are simultaneously satisfied.
In general, an undetermined system of equations (that are consistent), have non-unique solutions. For the current system (Eq. 44), from the given sizes of the A and Y matrices, it can be determined that the general solution will lie along a line in the R2n control (U) space. A particular solution U1 can be found as U1=A+Y, where A+ is the Moore-Penrose pseudoinverse of A. The general solution is then obtained as U=U1+cN, where N is the null space of A, and c is a scalar.
it can sometimes happen that the accelerations lead to a trajectory that puts one of the n pursuing UAVs on a collision course with the target. The occurrence of such a collision can be predicted by defining functions y1, . . . , yn representing the miss distance functions of each of n pursuing UAVs to the target circle, similar to Eq. 4, along with the corresponding miss-times tm1, . . . , tmn, similar to Eq. 3. If it is determined that y1<0,Vr,i<0,tmi<tm,X holds for some UAV Ai, this means that UAV Ai will collide with the target before X intercepts the target. This collision can be averted by rotating the formation appropriately, and this can be achieved by modifying the reference value θ1n,d used in Eq. 44. Collisions between the rope and the target circle can be detected and avoided by following a similar process.
Guidance Laws for Time-Varying Target Size
Below is described a scenario where the size of the target changes with time. This could happen, for example, when the vehicles in the intruder swarm spread apart during their flight. At the same time however, we have assumed at the outset that their mission requires them to remain as a flock (given that they are performing a coordinated attack or flying in a leader-follower configuration), and they cannot stray too far apart from one another. We incorporate the effect of such a size change by making the radius of the circle that bounds the target, to be a function of time, that is, R is now R(t). In this case, the pursuers not only need to surround the target, but they may also need to increase their inter-vehicle distances appropriately so that they can enclose the target within their convex hull.
It is assumed that the pursuing UAVs have the ability to vary the length of the rope to some extent. Such a length change can be achieved by means of a spinning reel deployment mechanism (similar to the mechanism used in a fishing rod) that is carried by each UAV. Then, in response to an increase in the size of the target, if the distance between a pair of UAVs needs to increase, those UAVs can extend the rope between them till it is of desired length. Similarly, if the distance between a pair of UAVs needs to decrease, those UAVs reel in the rope between them. since each UAV can carry only a finite amount of cable, the permissible change in the length of the rope is upper bounded. This is schematically depicted in
The problem addressed in this section is to develop guidance laws governing the longitudinal and lateral accelerations of then pursuing UAVs with which, the pursuing UAVs can simultaneously achieve the following:
It is preferable to determine a radius R(t) of the smallest circle that bounds the intruder swarm. The desired values of the edges of the formation then need to be such that the perimeter of the polygon is larger than the circumference of this computed circle.
Objective a: This objective can be met if Eq. 27 is modified to account for the changing radius of the circle. Toward this end, Eq. 4 takes the following form:
The time derivative of yX is:
Note that
We differentiate the Lyapunov function Eq. 24 along the trajectories of the system defined by Eq. 13-20. After doing so, it is seen that that we can ensure Eq. 24 follows the dynamics Ż=−KZ, if the control inputs of the pursuing UAVs satisfy the following equation, which is the counterpart of Eq. 27:
λ1(N1αuα,1+N1vuV,1)+ . . . +λn(Nnαuα,n+NnvuV,n)=−K(yX-w)+2R{dot over (R)} (47)
When the lateral acceleration aB of the maneuvering swarm is explicitly incorporated in the guidance law, we get the following equation that will ensure that Ż=−KZ continues to be satisfied even when the target maneuvers:
Objective b: This is met if the accelerations of A1 and An satisfy Eq. 41.
Objective c: Consider UAVs Ai, Aj∈E that have an inter-UAV distance of rij(t). Let rij,d represent the desired inter-UAV distance between this pair of UAVs. We define an error quantity er,ij=rij−rij,d. Differentiating er,ij twice, we get the following:
ë
r,ij
={dot over (V)}
r,ij
−{umlaut over (r)}
ij,d (49)
We enforce that the quantity er,ij follows the dynamics ër,ij=−K3ėr,ij−K4er,ij, (where, K3>0 and K4>0 are constants). This choice of dynamics will ensure that er,ij decays to zero. Then, substituting terms from Eq. 38, we eventually arrive at the following equation governing the accelerations of UAVs Ai and Aj:
−ai cos(δi−θij)+aj cos(δ−θij)=—Vθ,ij2/rij−K3(Vr,ij−{dot over (r)}ij,d)−K4(rij−rij,d),∀(i,j)∈E (50)
The above equation can then be written in terms of the control inputs uα,i, uV,i, uα,j, uV,j as follows:
u
α,i
V
i sin(αi−θij)−uV,i cos(αi−θij)−uα,jVj sin(αj−θij)+uV,j cos(αj−θij)=−Vθ,ij2/rij−K3(Vr,ij−rij,d)−K4(rij−rij,d),∀(i,j)∈E (51)
Eqs. 47, 51 and 43 can now be combined and written in the following matrix form AU=B:
By solving the above matrix equation for the 2n unknowns uα,i, uV,i, i=1, . . . , n, we can determine the control inputs of the n pursuing UAVs that will simultaneously satisfy Objectives (a)-(c).
Guidance Laws for Arbitrarily-Shaped Intruder Swarms
The guidance laws developed in the preceding sections assumed that the shape of the intruder swarm is bounded within a circle. In cases where the intruder swarm has a somewhat elongated shape, then the circular approximation can represent an over-approximation to the shape of the swarm, and this can be therefore inadequate. In this section, we show how the guidance laws can be modified when the shape of the intruder swarm is arbitrary.
By way of background, the following is a result on the collision cone between a point and an arbitrarily shaped object with reference to
In the above equations, ψ represents the angle subtended at A by the tangent lines AT1 and AT2 to B. T1AT2 represents the conical hull of B, relative to A, and ψ thus represents the angle of this conical hull. When there exist more than two tangent lines to B, then AT1 and AT2 represent the pair of tangents that are such that B is completely contained within the sector T1AT2. Note that since B is moving, the conical hull is distinct from the collision cone, which is an entity computed in the relative velocity space. The quantity θb represents the angle made by the angular bisector of T1AT2 with the horizontal. Vθ and Vr are the relative velocity components that are respectively normal to, and along, a line from A that passes through a reference point in B. Note that when the arbitrary shape is replaced by a circle, (and the reference point P is the center of this circle), then
Substituting these in Eqs. 53 and 54. these reduce to Eq. 4, and Vr, respectively.
Now consider the engagement geometry between n pursuing UAVs carrying a stretchable ropeline and an arbitrarily shaped swarm, as shown in
Substituting VX from Eq. 17 and {dot over (α)}X from Eq. 18 in the above equation, it is evident that we can enforce the Lyapunov function Z to follow the dynamics Ż=−KZ, if the quantities uα,1, uV,1, . . . , uα,n, uV,n of the pursuing UAVs satisfy the equation:
where, Niα, i=1, . . . , n is as in Eq. 28, and Niv, i=1, . . . , n is as in Eq. 29.
Eq 56 thus represents a generalization of Eq. 27 to the general case of arbitrarily shaped swarms. This equation can be combined with Eq. 41 and Eq. 43 to reorient the formation and lead to a matrix equation along the lines of Eq. 44. Similarly, Eq. 56 can be combined with Eqs. 41 and 51 to reorient the formation as well as change the inter-UAV distances and lead to a matrix equation along the lines of Eq. 44. In the latter case, the reference lengths rij,d of the formation edges need to be such that the perimeter of the polygon formed by the pursuing UAVs is greater than the perimeter of the swarm.
Thus, as described herein, the present disclosure teaches solutions to the problem of n UAVs needing to pursue, and subsequently surround, a swarm of hostile UAVs (flying as a flock) that has intruded into a protected airspace. The development of analytical cooperative pursuit guidance laws that will meet the objective of the pursuing UAVs, is addressed. These cooperative pursuit guidance laws are developed based on a collision cone framework. Using this framework, analytical cooperative pursuit guidance laws that enable the n UAVs to enclose the intruder swarm within their convex hull are developed, for scenarios where the intruder swarm is enclosed in a bounding circle, and the circle may change size with time. In subsequent variants of this problem, the pursuing UAVs are assumed to be carrying a dragnet in an open-chain configuration, and the collision cone-based guidance laws are further developed to enable the UAVs to re-orient their formation appropriately (so that they approach the target from the open end of this chain), and also adjust their inter-vehicle distances appropriately (so that they are able to surround the target even as the target increases in size). These guidance laws are then generalized to the case when the intruder swarm is arbitrarily shaped. Simulations demonstrate the efficacy of the cooperative guidance laws.
Collision Cone-Based Net Capture of a Swarm of UAVs
Below addresses the problem of capturing a swarm of intruder UAVs, using a net manipulated by a team of defense UAVs. The intruder UAV swarm may be stationary, in motion, and even maneuver. The concept of collision cones in 3-dimensional space is used to determine the strategy used by the net carrying UAVs to maneuver or manipulate the net in space in order to capture the intruders. The manipulation of the net involves guiding the net to pursue the intruders and orienting it in space appropriately so as to maximize the effectiveness of capture. The net manipulation strategy is derived from the concept of collision cones defined in a relative velocity framework, and analytical expressions of nonlinear guidance laws are obtained. Simulations are presented to demonstrate the efficacy of these guidance laws.
Nomenclature
The following nomenclature is used hereinbelow.
indicates data missing or illegible when filed
Introduction
The problem of a team of UAVs capturing a swarm of intruder UAVs with a net is disclosed hereinbelow. This class of net capture applications, in which a net carried by one or more UAVs, is used to capture a UAV intruding into a guarded airspace, has received considerable recent attention from researchers working on drone technologies due to the obvious need to protect the airspace from a proliferation of unauthorized drones. A related (but distinct) problem is that of net recovery, in which a UAV approaching a landing site (which could be an unprepared runway or a ship deck), is made to land on a net. Most net recovery problems involve a guidance algorithm that guides the UAV to a particular point on the net, with the net being fixed on the ground or on a stationary or moving platform. These methods may be termed as passive when the net carrying platform is either stationary or mobile, but does not maneuver to aid the landing operation, and it is the landing UAV that uses a guidance algorithm to modulate its trajectory in order to land on the recovery net. On the other hand, the net capture algorithms are active methods in which the net-carrying platform maneuvers itself to capture the intruder UAVs, which may themselves be maneuvering. Some of the net recovery methods can also be termed as active in the sense that the net is maneuvered in such a way as to bring it in the path of the landing UAV, thereby aiding the landing operation.
Given the rapid pace of advance in UAV technologies, it appears that UAV swarms will soon become common in many applications and may sometimes pose a threat for other vehicles in their airspace. In the present disclosure, we consider an interception problem in which three UAVs carrying a net actively attempt to trap a swarm of intruder UAVs. The capturing UAVs are assumed to be capable of flying at speeds higher than the intruder UAVs which, in turn, may maneuver in space. The problem is to decide how the UAVs need to manipulate, as well as orient the net in order to ensure that the net intercepts the intruder UAVs. In the guidance literature, interception problems have been addressed in the context of a missile intercepting an intruder aircraft. However, the problem there is formulated as an interceptor (modeled as a point), trying to intercept a target (which is also a point). In fact much of the guidance laws in the literature (PN being one of them) are based on the idea of guiding a point to intercept a target which may or not maneuver. In the present disclosure, we do not consider the problem as that of guiding a point but rather that of guiding multiple points (UAVs) together. Such a coordinated guidance is required in order to ensure that the net-carrying UAVs achieve the simultaneous objectives of target interception as well as appropriate net orientation.
To solve this problem, we use the notion of collision cones which are primarily used for collision detection and avoidance. The collision cone is a cone of velocity vectors of an arbitrarily shaped object in motion which lead to collision with another arbitrarily shaped object moving in space. Initially, the collision cones were defined for objects moving on a plane and then extended to 3-D space. The concept was later extended to define what is known as a safe passage cone which was used to maneuver vehicles through narrow orifices.
Apart from the novelty of using the collision cone approach for the net capture problem, there are several other differences that the present disclosure has with similar problems addressed in the literature. We consider a swarm of intruder UAVs flying as a flock. We do not consider any restriction on their trajectory, which may be a straight line or a curved trajectory. We model the intruder UAV flock as being enclosed inside a sphere, and formulate the problem as one of interception between the net and the sphere, with the net at a desired orientation. The kinematics-based guidance laws are developed in a relative velocity framework, and thus the kinematic effect of the wind acting on the vehicles are implicitly accounted for in the analysis. As far as dynamic effects are concerned, we assume that the drones are robust enough to take care of the disturbances caused by the wind and the net.
Problem Formulation and Solution Approach
With reference to
Net carrying UAVs: In the present disclosure, we assume that the net-carrying UAVs are of a fixed-wing type. There are several scenarios where fixed-wing UAVs have advantages over quadcopters for this application: Fixed-wing UAVs generally have speeds that are higher than quadrotors [fwing], have longer flight times and longer ranges, as well as the ability to carry heavier payloads. Also, it is often desirable that the intruder is intercepted by the net-carrying UAVs some safe distance away from the protected area, and for such operations the longer flight range of fixed-wing UAVs offers benefits.
Since fixed wing UAVs always need to fly at speeds above a certain threshold in order to generate lift, therefore the permissible speed variation for such UAVs is somewhat small. When the net carrying UAVs move with equal velocities, the formation is rigid. However, with equal velocities, these UAVs cannot rotate or orient the net in space. In the present disclosure, we assume that while the speeds of the net carrying UAVs are all equal (and constant in time), the velocity headings of these UAVs can be different from one another. This difference in velocity headings can be used to rotate the net whenever required.
if the UAVs are very light and/or the net is very heavy, then the UAVs may not be robust to disturbances caused by the net. We assume that the UAVs and the net are so chosen that the drone controller is robust to these disturbances.
Intruder Swarm: We assume that the vehicles in the intruder swarm need to stay reasonably close to each other. This could be either because the swarm is in a leader-follower configuration and the followers need to stay close to the leader, or because the swarm has an objective to carry out a coordinated attack on a specific point in a protected area, and in order to increase the effectiveness of this attack, they need to stay close together.
We also assume that while the adversaries are trying to perform such a focused attack on a target, they do not have the intelligence to simultaneously detect that they themselves are being attacked. This thus belongs to a class of scenarios wherein the adversaries have been given a predefined trajectory (possibly computed off-line) to their target, and as they fly towards their target, they do not have the sensors to detect a threat. Therefore, the adversaries do not have the ability to take reactive, evasive action to avoid being intercepted by the net, or the ability to re-compute their trajectory to the target, based on sensor data. This is close to the technology level of present day drones. Smart drones working in swarms and capable of detecting an attacker and taking evasive maneuvers is still a futuristic concept. We also assume that the target of the adversaries, as well as their intended trajectory to the target, is unknown to the net-carrying UAVs.
The intruder swarm need not remain confined to a sphere of constant radius, and the geometry of the swarm can indeed be arbitrary. Our approach then can be used to intercept as many vehicles as possible. Algorithms like the circumcenter algorithm [circumcenter] can be employed to determine the center and radius of the smallest sphere that will bound a chosen subset of vehicles in the intruder swarm, and the net-carrying UAVs will then attempt to intercept this sphere.
Guidance Objectives: We define a point X on the net as a weighted centroid of the three UAVs. The guidance objective is to maneuver the net so as to close the distance between X and B with the additional requirement that the net approaches B at a certain angle, where the angle may be defined with respect to the current direction of motion of B. This is similar to the impact angle requirement in the interceptor guidance literature, but with the important difference that the net itself needs to maintain a pre-specified angle with respect to the motion of the point X. The impact angle and the net angle are illustrated in
Phases of engagement: The engagement comprises two phases. During the initial phase of the engagement, the objective is primarily to get the net sufficiently close to the intruder swarm. Subsequently, when the time-to-go becomes smaller than a threshold, we begin to rotate the net, in order to achieve a desired net angle. The reasons for which we rotate the net only during the latter phase of the engagement are the following: (i) The purpose of net rotation is to orient the net such that it's normal is roughly parallel to the velocity vector of the intruder swarm. If the intruder swarm performs continual maneuvers, then doing net orientations early (in response to these maneuvers) can lead to unnecessary wastage of control effort by the net-carrying UAVs. (ii) The interceptor seeker range is also relevant here, since the UAV sensors tracking the intruder swarm may be less effective at larger distances and more effective at closer distances. So it makes sense to first guide the UAVs to get close to the intruder UAV and then do the orientation maneuver when its sensors are able to track the intruder trajectory better.
The threshold value of the time-to-go at which to start rotating the net, will be a function of the resolution of the cameras mounted on the UAVs. This threshold value can be set based on the appropriate distance to the target, at which the camera's resolution is adequate for switching to the net rotation phase.
When we desire a point object moving with constant speed to intercept another point object moving with constant velocity, there is typically a single (at most, two) heading angle(s) of the former that will lead to collision with the latter. On the other hand, when we desire a finite-sized object (such as a net) to intercept with another finite-sized object (such as a sphere), there is a range (or more precisely, a cone) of heading angles of the net, with which such an interception can be achieved. We refer to this cone as the collision cone. By maneuvering the heading angle of the net into the collision cone, and ensuring that the heading angle stays inside this cone, it can be ensured that the net intercepts the intruder UAV swarm. The UAVs use the accelerations aAi, i=1, 2, 3, to orient the net and carry it along a trajectory that leads to interception of the intruder UAV swarm.
Let {right arrow over (r)}A1, {right arrow over (r)}A2, {right arrow over (r)}A3 represent the position vectors of A1, A2, and A3, respectively (with respect to some inertial reference frame). Then, any point X on the plane A1A2A3 can be represented as a convex combination of these three vectors as follows:
{right arrow over (r)}
X=λ1{right arrow over (r)}A1+λ2{right arrow over (r)}A2+λ3{right arrow over (r)}A3,λ1+λ2+λ3=1,λ1,λ2,λ3≥0 (1-1)
The weighted centroid X of the triangle A1A2A3, has a velocity {right arrow over (V)}X:
i. {right arrow over (V)}
X=λ1{right arrow over (V)}A1+λ2{right arrow over (V)}A2+λ3{right arrow over (V)}A3 (1-2)
where, the components of {right arrow over (V)}X are as follows:
From (1-3), the magnitude of {right arrow over (V)}X is as follows:
The azimuth and elevation angles of {right arrow over (V)}X are denoted by ψX and γX, respectively, and are given by:
In the remainder of the paper, for ease of notation, we will drop the subscript X in the terms {right arrow over (V)}X, VX, ψX and γX, except when necessary. Therefore, in the sequel, the terms {right arrow over (V)}, V, ψ and γ are all to be interpreted as quantities associated with the interception point X.
The orientation of the net is defined by the normal to the plane A1A2A3, denoted by {circumflex over (n)}. Then, defining {right arrow over (r)}21={right arrow over (r)}A2−{right arrow over (r)}A1 and {right arrow over (r)}31={right arrow over (r)}A3−{right arrow over (r)}A1, we can write {circumflex over (n)} as the normal to the plane that contains these vectors, as follows:
Let F represent the center of the sphere enclosing the swarm of intruder UAVs moving with speed VB, at an azimuth-elevation angle pair (ψB, γB). Consider the line XF. Defining r=XF, and (ϕ, θ) as the azimuth-bearing angle pair of XF, the relative velocity components of F with respect to X are:
V
ϕ
=V
B cos γB sin(ψB−ϕ)−V sin γ sin(ψ−ϕ) (1-7)
V
θ
=V
B{−cos γB sin θ cos(ψB−ϕ)+sin γB cos θ}−V{−cos γ sin θ cos(ψ−ϕ)+sin γ cos θ} (1-8)
V
r
=V
B{cos γB cos θ cos(ψB−ϕ)+sin γB sin θ}−V{cos γ cos θ(ψ−ϕ)+sin γ sin θ} (1-9)
where, Vr is the relative velocity component along XF, and Vϕ and Vθ represent relative velocity components orthogonal to XF. These quantities are defined as follows:
{dot over (r)}=V
r
,ϕ=V
ϕ/(r cos θ),{dot over (θ)}=Vθ/r (1-10)
The derivatives of these relative velocity components are:
{dot over (V)}ϕ=−ϕ(Vr cos θ−Vθ sin θ)−{dot over (V)} cos γ sin(ψ−ϕ)+V sin γ{dot over (γ)}sin(ψ−ϕ)−V cos γψ cos(ψ−ϕ) (1-11)
{dot over (V)}
θ
=−{dot over (θ)}V
r
−ϕV
ϕ sin θ−{dot over (V)}[cos γ sin θ cos(ψ−ϕ)+sin γ cos θ]−V[−{dot over (γ)}sin γ sin θ cos(ψ−ϕ)−cos γ sin θ{dot over (ψ)}sin(ψ−ϕ)+{dot over (γ)}cos γ cos θ] (1-12)
{dot over (V)}
r
={dot over (θ)}V
θ
+{dot over (ϕ)}V
ϕ cos θ−{dot over (V)}[cos γ cos θ cos(ψ−ϕ)+sin γ sin θ]−V[−{dot over (γ)}sin γ cos θ cos(ψ−ϕ)−cos γ cos θ{dot over (ψ)}sin(ψ−ϕ)+{dot over (γ)}cos γ sin θ] (1-13)
Eqs (1-11)-(1-13) are valid with the assumption that B moves with a constant velocity, that is, {dot over (V)}B=0, {dot over (ψ)}B=0, {dot over (γ)}B=0. The guidance laws for capture are initially designed in Section 3.C with this constant velocity assumption. We subsequently relax this assumption in Section 3.F. From (1-11)-(1-13), it is evident that the derivatives of the relative velocity components vary with the quantities {dot over (V)}, {dot over (γ)}, {dot over (ψ)}, which govern the acceleration of the weighted centroid X of the net. These derivatives are as follows.
In (1-14)-(1-16), for the sake of brevity, we have used ψi and γi for ψAi and γAi, respectively. It is seen from the above that {dot over (V)}, {dot over (γ)}, and {dot over (ψ)} depend linearly on {dot over (γ)}Ai and {dot over (ψ)}Ai, which are the velocity heading angle rates for A1, A2 and A3. They evolve as follows:
{dot over (γ)}Ai=aAi[cos αAi sin γAi cos(βAi−ψAi)−cos γAi sin αAi]/VA, (1-17)
{dot over (ψ)}Ai=−aAi cos αAi sin(βAi−ψAi)/(VA cos γAi) (1-18)
where, (βAi, αAi) are the azimuth-elevation angle pair of the acceleration vector {right arrow over (a)}Ai. Eqs (1-10)-(1-18) thus represent the kinematic state equations for the engagement between the net and the threat UAV sphere B. Additionally, after substitution of (1-18) in (1-14)-(1-16), the equations corresponding to (1-14), (1-15) and (1-16) are seen to be linear functions of aA1, aA2, aA3 and can be written in the following form:
where, the expressions for Gi,Hi,Ji,i=1,2,3 are lengthy (and therefore not presented here), but can be readily inferred from (1-14)-(1-16).
Guidance Laws for Net Capture
In the following we will show how the concepts from collision cones can be used to design the net capture guidance law.
Point Object and a Sphere Moving in 3-D
When a point object and a sphere of radius R are moving with constant velocities, the miss-distance rm (which is the predicted distance between the point and the center of the sphere at the instant of closest approach), is given by the following equation:
r
m
2
=r
2(Vϕ2+Vθ2)/(Vϕ2+Vr2+Vθ2) (1-20)
and the time of closest approach is given by:
t
m=(−rVr)/(Vϕ2+Vr2+Vθ2) (1-21)
When Vr<0, the above expression leads to a positive value of tm. When Vr>0, it leads to a negative value of tm, which can be interpreted as the time of closest approach if the trajectories of both the objects are projected backwards in time.
If the miss distance rm is less than R, then the point object is on a collision course with the sphere. Based on this, one may define a miss-distance function y as follows [ref2]:
If the two objects move with constant velocities, then the predicted miss distance is equal to the actual miss distance, and therefore, the condition y<0 and Vr<0 are both necessary and sufficient conditions for one object to intercept the other object. When the two objects move with varying velocities, then the condition y<0,Vr<0 for all future time is a sufficient condition for interception.
In the 3-D physical space, we can construct a surface defined by the set of heading angles of {right arrow over (V)} that satisfy y=0, that is, (ψ,γ):y=0. This surface is shown in
Collision Conditions Between the Net A1A2A3 and the Sphere B
Eq (1-22) can now be used to represent the miss distance from any point on the net A1A2A3 to the sphere, as follows. As stated in (1-1), any point X on the net can be written as a convex combination of {right arrow over (r)}A1, {right arrow over (r)}A2 and {right arrow over (r)}A3. Therefore, the vector r from any point X on the net to the center of the sphere B is:
{right arrow over (r)}={right arrow over (r)}
B−(λ1{right arrow over (r)}A1+λ2{right arrow over (r)}A2+λ3{right arrow over (r)}A3) (1-23)
where, {right arrow over (r)}B is the position vector of the center of B. Similarly, the relative velocity vector of the center of the sphere with respect to X on the net is given by:
{right arrow over (V)}
REL
={right arrow over (V)}
B−(λ1{right arrow over ({dot over (r)})}A1+λ2{right arrow over ({dot over (r)})}A2+λ3{right arrow over ({dot over (r)})}A3) (1-24)
Then, {right arrow over (V)}REL can be resolved into components Vr, Vϕ, and Vθ, where Vr=<{right arrow over (V)}REL,{circumflex over (r)}> is the relative velocity component along the unit vector {circumflex over (r)} that corresponds to (1-23), while Vϕ, and Vθ are the two mutually orthogonal components of VREL that are also orthogonal to {circumflex over (r)}.
We can then state the following. The net is on a collision course with B if there exists a (λ1,λ2,λ3) with Σi=13λi=1,λi≥0, such that:
is satisfied. Since each point on the net is parametrized by (λ1,λ2,λ3), we can use (1-25) to write the miss distance function from each point on the net to the sphere as y(λ1,λ2,λ3). Along similar lines, we can also write Vr associated with each point on the net as a function Vr(λ1,λ2,λ3). The collision cone between the net A1A2A3 and the sphere B can be defined in the (ψ,γ) space as:
CC
NB={(ψ,γ):y(λ1,λ2,λ3)<0 and Vr(λ1,λ2,λ3)<0,∀λi≥0,Σi=13λi=1} (1-26)
As an illustrative example, assume that the three UAVs A1, A2, A3 are at a distance 10 m apart from each other and they are moving with a speed of 5 m/sec. The intruder swarm is moving with a speed of 2.3 m/sec and a heading angle given by ψ=45 deg, γ=20 deg. The initial positions of the net-carrying UAVs are (0,0,8.7), (−5,0,0) and (5,0,0), respectively, while that of the center of the intruder sphere is (30,0,4.3). Assuming identical heading angles of the UAVs A1, A2, A3, the collision cone CCNB from the net to the intruder sphere (computed from (1-26)), is depicted on a (ψ,γ) plane as shown in
Intercept point on the net: The interception point on the net needs to be chosen such that the net hits the entire intruder swarm (or at least most of it). While there will be many engagement scenarios where the ideal interception point on the net is located close to its center, there can also be other scenarios where this is not necessarily the case. For example, consider the scenario when the net triangle is isosceles (with its two equal sides being significantly longer than the third side), and the intruder swarm is arranged in a somewhat linear configuration, with the length of this configuration being greater than the longest side of the net. If we now choose the center of the net as the intercept point, then the entire swarm cannot be intercepted by the net. It would be better to choose the intercept point closer to the longer side of the net, so as to intercept as many intruder UAVs as possible. This is shown in
Intercept point on the sphere: In many engagements, the ideal interception point on the sphere is located close to the center of the sphere. However, there can also be scenarios where the radius of the bounding sphere on the intruder swarm is larger than the size of the net, and moreover, the intruders are not uniformly distributed inside this bounding sphere. In such cases, we choose an intercept point on the intruder sphere that lies in the denser part of the swarm (where the denser part basically contains more vehicles). This will enable the interception of more vehicles in the swarm. This is shown in
Different intercept points on the sphere also lead to different impact angles. This is illustrated in
Intercepting a subset of the intruder swarm: As mentioned earlier, if the size of the swarm is larger than the net, we then attempt to intercept a subset of the swarm. If we choose an interception point on the net that lies close to the centroid of the net, then the net will be able to intercept those vehicles in the swarm that lie within a sphere whose radius is less than (or equal to) the radius of the in-circle of the net. If there are members of the intruder swarm outside this sphere, then those intruders can potentially escape â€″ however our approach ensures that we have intercepted at least some of the intruding vehicles. For a given geometry of the intruder swarm, the larger the size of the net, the larger the radius of the sphere of intruders that can be intercepted. Refer to
Acceleration Magnitude for Capture
In this section, we determine guidance laws for the three net carrying UAVs so as to enable them to intercept the swarm of threat UAVs enclosed in a sphere. The guidance laws are initially designed with an assumption that B moves with a constant velocity, that is, {dot over (V)}B=0, {dot over (ψ)}B=0, {dot over (γ)}B=0. In a subsequent section, we will relax this assumption. Define a function Z as follows:
Z=(1/2)(y−w)2 (1-27)
where, w≤0 is a specified reference value, which may be time-varying. having an arbitrary w<0 provides us the flexibility to choose different interception points on the sphere. By determining aAi, i=1,2,3 which will make Ż negative definite, interception of the swarm of threat UAVs B can be guaranteed.
Theorem 1: Let UAV A1 have an acceleration aAi whose magnitude is given by:
N
1
a
A1
+N
2
a
A2
+N
3
a
A3
=−K(y−w) (1-28)
where, Ni, i=1,2,3, is given in (1-34). Then, the error function Z in (1-27) is globally asymptotically stable almost everywhere.
Proof: Ż=(y−w)({dot over (y)}−{dot over (w)}), where the time derivative of y(t) is as follows:
Evaluating (1-29) along the system trajectories defined by (1-10)-(1-18), we get:
which can be written in a compact form as follows:
where, Y1, Y2 and Y3 are the expressions within the square brackets in (1-30), and the partial derivatives of y are as follows:
Substituting for {dot over (γ)}, {dot over (ψ)} and {dot over (V)} from (1-19), we can rewrite (1-31) in the form:
The elements in the row matrix of (1-33) have a specific structure, and this is used to define Ni,i=1,2,3 as follows:
N
i
=Y
1
G
i
+Y
2
H
i
V+Y
3
J
i
V cos γ (1-34)
Then, by substituting (1-28) in the time derivative of the error function Z in (1-27), we get the equation Ż=−KZ, which is the dynamics of the error function, and Z is globally asymptotically negative definite “almost everywhere” in the state space.
for the choice of control given in (1-28) when Ni=0 occurs at some time t=t1, there is a singularity in the sense that aAi becomes undefined, and this means that at that instant in time, application of any finite acceleration aAi does not influence Ż, and does not drive y toward w. This can happen under the following scenarios: (a) At t=t1, the aAi vector becomes parallel to the VRi vector (where, {dot over (V)}Ri≡{dot over (V)}B−{dot over (V)}Ai is the velocity of B with respect to A1), (b) At t=t1, the aiming point of VAi passes through the center of B. When either (a) or (b) occur, we simply allow aAi to hit its saturation limit at t=t1. Since we have chosen the direction of aAi such that it always acts normal to VAi, this causes the velocity vector VAi to continue to rotate at t=t1. This drives Ni away from zero, which in turn causes aAi to revert to generating a finite acceleration. At the isolated instant t=t1, the error function Z does not follow the equation Ż=−KZ, and for this reason, we have the caveat that Z is globally asymptotically stable “almost everywhere”. [ ]
Remark 1: We observe that there can be multiple (aA1, aA2, aA3) combinations that satisfy (1-28). During the phase of the engagement when we do not want the net to rotate, we require that the acceleration vectors of A1, A2 and A3 all be identical. In the non-rotating phase, the UAVs A1, A2, A3 have N1=N2=N3 and therefore, it can be ensured that they all have equal accelerations, if we use:
a
Ai
=−K(y−w)/(3Ni),i=1,2,3 (1-35)
During the phases of the engagement when we do want the net to rotate, we employ unequal accelerations. During those phases, we do not use the individual acceleration magnitudes given in (1-35), but continue to use the cumulative acceleration magnitude given in (1-28). This is elaborated in more detail in Section 4, where we discuss aspects of net rotation.
Remark 2: If K in (1-28) satisfies the condition
K>(1/tm)In(Z(0)/ϵ) (1-36)
then Z will decay to a quantity ϵ in time t<tm, where tm is given in (1-21).
Remark 3: With K>0, the guidance acceleration (1-28) will drive the error function Z to zero. If the initial velocity heading angles (ψ,γ) lie in the Vr<0 region, K satisfies (1-36), and the intruder swarm moves with constant velocity, then it is guaranteed that the net will intercept the intruder swarm. However, when the initial velocity heading angles lie in the Vr>0 region (See
Direction of Acceleration Vector
Ni in (1-34) depends on Gi, Hi and Ji, which in turn are functions of (βAi,αAi) which represent the direction of the acceleration vector of Ai. We next choose the appropriate direction of the acceleration vector aAi, i=1,2,3, to enable capture. Towards this end, we impose the following conditions on the direction of the acceleration vector for each vehicle: (a) The unit acceleration vector âAi always acts normal to the unit velocity vector {circumflex over (V)}Ai, and (b) The acceleration vector âAi lies on the plane containing the line XF and {circumflex over (V)}Ai.
To satisfy (a), we require <âA1, {circumflex over (V)}Ai≥0, which simplifies to:
cos γAi cos αAi cos(ψAi−βAi)+sin γAi sin αAi=0 (1-37)
When cos γAi≠0 and cos α≠0, (1-37) can be written as:
cos(ψAi−βAi)+tan γAi tan αAi=0(1-38)
For (b), we first define a plane that contains XF and {circumflex over (V)}Ai. The unit normal to this plane is computed as:
{circumflex over (n)}
i=({circumflex over (V)}Ai×{right arrow over (X)}F)/|XF| (1-39)
To satisfy (b), we need that <{circumflex over (n)}i,âAi≥0 which, after some algebraic manipulations, simplifies to:
S
Ai cos αAi cos βAi+
where, SAi,
S
Ai=cos γAi sin ψAi sin θ−sin γAi cos θ sin ϕ
When cos αAi≠0, (1-40) can be written as:
S
Ai cos βAi+
Solving Eqs. (1-38) and (1-42) for αAi and βAi, we get
cot2αAi=tan2γAi+DAi2 (1-43)
βAi=ψAi−π+cos−1[tan γAi tan αAi] (1-44)
where,
In the special case when DAi=0, (1-43) and (1-44) reduce to
Robustness of the Guidance Law to Acceleration of Intruder Swarm
The guidance law (1-28) was derived with an assumption that the intruder swarm moves with constant velocity in a straight line. In this section we quantify the robustness of (1-28) when the sphere B moves with a curvilinear trajectory, that is, B is maneuvering. Note that although B is maneuvering, this maneuver is not for the purpose of evading the net, but rather to reach its intended goal by following a pre-specified curvilinear trajectory.
When B has an acceleration of magnitude aB, which acts at an azimuth-elevation angle pair (βB, αB), then the time derivatives of the relative velocity components and the heading angles of B are:
{dot over (V)}ϕ=f
ϕ
+a
B cos αB sin(βB−ϕ) (1-46)
{dot over (V)}
θ
=f
θ
−a
B[cos αB sin θ cos(βB−ϕ)−sin αB cos θ] (1-47)
{dot over (V)}
r
=f
r
+a
B[cos αB cos θ cos(βB−ϕ)+sin αB sin θ] (1-48)
{dot over (γ)}B=−aB[cos αB sin γB cos(βB−ψB)−cos ψB sin αB]/VB (1-49)
{dot over (ψ)}B=aB cos αB sin(βB−ψB)/VB cos γB (1-50)
where, fϕ, fθ, and fr are the expressions on the right hand sides of (1-11)-(1-13), respectively. We assume that the intruder swarm maneuvers such that its acceleration vector acts normal to its velocity vector, that is, the intruder swarm may change its direction but moves with constant speed. We point out that the quantity y in (1-25) is, in general, a function that provides the predicted miss-distance. When all the UAVs A1, A2, A3, and B are not maneuvering, then y is a constant in time, and is a function of the actual miss-distance. When B moves with constant velocity, the designed guidance law (1-28), with K greater than the threshold in (1-36), ensures that the actual miss-distance also goes to zero.
When B is maneuvering, the quantity y represents a predicted miss-distance function and varies with time. At any time t1, y(t1) represents a prediction of what the miss distance function would be if the intruder swarm were to move with constant velocity for all future time t>t1.
Theorem 2: Let UAV Ai have an acceleration aAi given by (1-28), (1-43), (1-44) and
B be a maneuvering swarm. Then, if K is large enough to ensure that the following inequality is satisfied:
then, the error function (1-27) is globally stable almost everywhere, and is upper bounded by ZSS, where
Z
SS
=a
B
2
c
max
2
/K
2 (1-52)
Proof: Substitute the acceleration equation (1-28) in the time derivative of the error function (1-27) evaluated along the trajectories of the system defined by (1-10),(1-46)-(1-50), (1-14)-(1-18). The error function then evolves according to the following equation:
It is evident that in (1-53), the influence of aB is that of a vanishing perturbation, that is, when Z=0, aB does not influence the dynamics of Z(t). When Z≠0, (1-53) provides a condition on the relative values of the gain K and aB with which Ż can remain negative definite. If the engagement geometry is such that the second term in the right hand side of (1-53) is always negative, then Z will asymptotically decay to zero at a rate which would be faster than if the target was not maneuvering.
If this term is not negative, then Z attains a steady state value. An upper-bound to this steady state value is obtained by setting Ż=0 in (1-53) and solving for Z, which will yield (1-52), where cmax corresponds to the maximum value of the quantity inside the square brackets in (1-53). The reasons for the caveat “almost everywhere” are similar to those outlined in the proof of Theorem 1.
A characterization of the value of cmax is obtained as follows. From (1-53), the quantity c is defined as:
the following identities are true:
This can be shown as follows. Consider (1-55). Let
−sin
−cos
−cos
Substituting the expression for cos
sin
Similarly, substituting the expression for sin
cos
It is then evident that (1-60)-(1-62) are satisfied simultaneously only for the cases: (i) sin(
By virtue of the above, (1-54) leads to the following inequality:
Substituting the partial derivatives of y from (1-32) in the above, we get:
Multiplying and dividing the right hand side of the above equation by VB4, we get:
where, {tilde over (V)}ϕ≡Vϕ/VB, {tilde over (V)}θ≡Vθ/VB and {tilde over (V)}r≡Vr/VB represent non-dimensional quantities. The above equation is then written in a compact form as:
where, ν=V/VB represents the ratio of the speed of the weighted centroid X of the net to the target speed.
From (1-52), we can obtain an upper bound to the predicted miss distance function as:
Y
b=√{square root over (2)}aBcmax/K+W (1-67)
From the above, we can determine an upper bound on the predicted miss-distance between the center of the sphere B and the point X on the net as follows:
r
m,b=[√{square root over (2)}aBcmax/K+R2+w]1/2 (1-68)
Incorporating Intruder UAV Acceleration
In this section, we modify the proposed guidance law (1-28) so that it explicitly accounts for the intruder swarm's acceleration. We state the following theorem:
Theorem 3: Let the intruder swarm maneuver with an acceleration vector aB that is normal to its velocity vector {right arrow over (V)}B. Let UAVs Ai, i=1,2,3 have acceleration magnitudes aAi,i=1,2,3, that satisfy the equation:
with K>0, and whose direction is given by (1-43) and (1-44). Then, the error function (1-27) is globally asymptotically stable almost everywhere.
Proof: Substitute the acceleration equation (1-69) in the time derivative of the error function (1-27) evaluated along the trajectories of the system defined by (1-10), (1-46)-(1-50), (1-14)-(1-18). This will make the error function Z follow the dynamics Ż=−KZ. The rest of the proof then follows. The reasons for the caveat “almost everywhere” are similar to those outlined in the proof of Theorem 1.
Remark 4: From (1-69), the counterpart of (1-35) can be determined to be the following:
We now make the following statement similar to that made for (1-35). Eq (1-70) will ensure that the acceleration magnitudes of A1, A2 and A3 are all equal and these magnitudes can be used during the non-rotating phase of the engagement. During the phase of the engagement when the net needs to be rotated, we will employ unequal acceleration magnitudes for A1, A2 and A3, but still ensure that the sum of these acceleration magnitudes satisfies (1-69). This is discussed in Section 4.
Remark 5: Consider scenarios where the acceleration magnitude of B is not precisely known to the net-carrying UAVs, but the maximum possible acceleration of B is known. Let aB,max represent the maximum acceleration of B. Then, we can replace aB in (1-70) with sgn(aB)|aB,max|. Using arguments similar to those given in [anderson], it can be proved that such a modified guidance law will still ensure that the net intercepts the intruder swarm.
Remark 6: the assumption on constant speed of the intruder swarm is used only for the derivation of the guidance law. In practice, the intruder UAVs within the sphere may have relative motion with respect to one another. In scenarios when the speed VB of the center of the sphere changes with time, we can employ a piecewise-constant (in time) approximation to VB, and use this in the guidance law.
Net Capture on a Two-dimensional Plane
It is instructive to look at the two-dimensional version of the capture equations developed thus far. This will make it easier to follow the subsequent discussion in Section 4 about net rotation. Refer
and, from (1-26), the collision cone between the net and B can be defined as:
CC
NB
=γ:y(λ1,λ2)<θ and Vr(λ1,λ2)<0,∀λi≥0,Σi=12λi=1 (1-72)
The equation governing the accelerations of the two UAVs with which interception (of the point X on the net), with the intruder UAV circle is achieved (when B does not maneuver) is as follows:
N
1
a
A1
+N
2
a
A2
=−K(y−w) (1-73)
where, N1 and N2 are obtained from the 2-D version of (1-34). When B is maneuvering with an acceleration magnitude aB, capture can be ensured if the acceleration magnitudes satisfy the following equation (which is the 2-D counterpart of (1-69)):
where, αB is the angle at which the acceleration of B is applied, and
In the scenario when the magnitude of aB is not known, but only the sign of aB and |aB,max| is known, interception is achieved if we replace aB in (1-74) with sgn(aB)|aB,max|.
Orienting the Net
The discussion thus far pertains to the phase of the engagement when the net does not need to rotate. In order to meet requirements on the net angle (See
At this point, we recall that a standing assumption in the present disclosure is that the UAVs A1, A2 and A3 are of fixed-wing type and move with constant speeds throughout the engagement. For each UAV, the acceleration vector acts normal to the velocity vector. Therefore, a side-effect of applying differential accelerations to rotate the net is that these will cause an ensuing change in the distance between the net-carrying UAVs, and this in turn can lead to stretching (or compression) of one or more sides of the net. In Section IV.D, we discuss strategies by which such a stretching/compression of the net can be averted. Our objective now is to characterize the interplay between the application of these differential accelerations and the subsequent change in orientation as well as the distance between the net-carrying UAVs. For ease of description, we will first consider the 2-D case depicted in
Orienting the Net in 2-D
Refer
where, αA1 and αA2 are the directions of the acceleration vectors of aA1 and aA2, respectively, and are taken as
Let Γ represent the angle made by the normal {circumflex over (n)} to the line A1A2, with the horizontal. From
By differentiating Γ twice, we get:
From the first and last equations in (1-75), we obtain the equation for the length of the net as:
{umlaut over (r)}
21=(Vθ,212)/r21+sin(γA1-θ21)aA1-sin(γA2-θ21)aA2 (1-77)
Eqs (1-76) and (1-77) demonstrate the influence of {right arrow over (a)}A1 and {right arrow over (a)}A2 on the net orientation angle Γ and the distance r21. In these equations, if a {right arrow over (a)}A1={right arrow over (a)}A2=0, then the two ends A1 and A2 both move along straight lines and the net orientation and length remains unchanged. If {right arrow over (a)}A1={right arrow over (a)}A2≠0, then A1 and A2 both move along identical arcs and again, Γ and r21 remain unchanged. When {right arrow over (a)}A1≠{right arrow over (a)}A2, the ensuing differential acceleration will cause the net to rotate as illustrated subsequently.
We provide below an analytical solution for Γ(t) and r21(t), when the input accelerations aA1 and aA2 are piecewise-constant in time. Refer
Here, A1A2 (represented by {right arrow over (L)}) is the net at time t=t1 while A1′A2′ (represented by {right arrow over (L)}′) is the net at time t=t2. Thus, |{right arrow over (L)}|=r21(t1) and |{right arrow over (L)}′|=r21(t2). Similarly, ∠{right arrow over (L)}=θ21(t1) and ∠{right arrow over (L)}′=θ21(t2). During the time interval t∈[t1, t2], A1 moves along the arc of a circle of radius
while A2 moves along the arc of another circle of radius
Since both A1 and A2 move with identical speed VA, therefore the arc lengths A1A1′, and A2A2′ are equal. From
and
are rotation matrices representing rotations by angles δ1 and δ2, respectively, about axes normal to the plane of the paper. We can see that
Substituting
we obtain
then becomes:
After substituting Rδ
where, μ1≡γA1−θ21(t1), μ2≡γA2−θ21(t1), and μ≡μ1−μ2. From (1-79), the change in the net orientation ΔθL=∠L′−∠L is found to be:
Consider that we have a constraint on the change in the distance between A1 and A2, and the maximum permissible change is rmax, that is, |{right arrow over (L)}′|−|{right arrow over (L)}|≤rmax. Applying this to (1-80), we can infer that for a given μi, μ2, VA and L, there will be a range of (aA1, aA2, ΔT) combinations that will ensure that ΔL remains less than rmax. Using (1-80) and (1-81), we can construct contour plots of ΔL and ΔθL for different (aA1, aA2, ΔT) combinations.
The plots shown in
The plots in
We point out that (1-78)-(1-81) assumed the scenario in
Applying (1-82) to (1-80), we get the expression for ΔL (when aA1=0), as follows:
Similarly, the change in the orientation of the net can be obtained from (1-81) as follows:
Eqs (1-83) and (1-84) are thus special cases of (1-80) and (1-81), respectively.
To achieve interception with simultaneous net orientation, we employ (1-74), (1-80) and (1-81) as follows. During the initial phase of the engagement, the objective is to get the net sufficiently close to the intruder swarm, and toward this end, we use aA1=aA2 and employ (1-74) to determine aA1 and aA2. When the time-to-go becomes smaller than a threshold, we then begin to rotate the net. During this terminal phase, we simultaneously solve (1-74), (1-80) and (1-81), to determine the right combination of aA1, aA2 and ΔT by which interception with a desired net orientation can be achieved, while at the same time, keeping the change in the distance between A1 and A2 less than rmax In determining a suitable solution, there is also the added flexibility, if required, of choosing a different interception point w on the sphere, and/or a different interception point λi, i=1,2,3 on the net.
Orienting the Net in 3-D
We now examine orienting the net in 3-D (schematically represented in
where, ij=21 or 31. When {right arrow over (a)}Ai={right arrow over (a)}Aj, the relative velocity components between UAVs Ai and Aj will be zero, that is, Vr,ij=0, Vϕ,ij=0, Vθ,ij=0, and rij is a constant. When {right arrow over (a)}Ai≠{right arrow over (a)}Aj (for any j≠i) for some time interval, the ensuing change in the orientation of the net, as well as the change in the length of the sides of the triangle A1A2A3 can be determined by an analysis of (1-85).
The orientation of the net is given by the normal {circumflex over (n)} defined in (1-6). Differentiating (1-6) with respect to time, we obtain:
from which, it is evident that the first derivative of the unit normal does not contain any acceleration related terms. We therefore compute the second derivative of the unit normal which, after some rearranging of terms, has the following form:
The application of acceleration(s) influences the terms {dot over (V)}r,21, {dot over (V)}r,31, {right arrow over ({umlaut over (r)})}21 and {right arrow over ({umlaut over (r)})}31 in (1-87). Substituting these acceleration-related terms from (1-85) in the above equation, we obtain the following:
In (1-88), for the sake of brevity, we have used a1, βi and α1 to represent aAi, βAi and αAi, respectively. Eq (1-88) demonstrates the influence of differential accelerations on the dynamics of the normal vector {circumflex over (n)}. When {right arrow over (a)}A1={right arrow over (a)}A2={right arrow over (a)}A3=0, the ends A1, A2, A3 of the net all move along straight lines and the net orientation remains unchanged. When {right arrow over (a)}A1={right arrow over (a)}A2={right arrow over (a)}A3≠0, the ends A1, A2, A3 of the net move along arcs of identical radius of curvature, and again, the net orientation remains unchanged. When the acceleration vectors are not all equal, this will cause the net to rotate. For example, if aA1=aA3≠ aA2, then the net will rotate about the line A1A3. The side A1A3 will remain unchanged in length and orientation, while the sides A1A2 and A2A3 will experience changes.
Consider that differential acceleration is applied for a time interval [t1, t2] during the engagement. Then, the vector corresponding to {right arrow over (r)}21(t2) can be obtained from (1-79) as follows:
Here, Rδ
about an axis û1, and Rδ
Substituting (1-90) in (1-89), we can write {right arrow over (r)}21(t2) in terms of aA1, aA2 and ΔT. In a similar fashion, we can write {right arrow over (r)}31(t2) in terms of aA1, aA3 and ΔT, as well as {right arrow over (r)}32(t2) in terms of aA2, aA3 and ΔT. The new length of A1A2, that is, |{right arrow over (r)}21(t2)|−|{right arrow over (r)}21 (ti)| is obtained from (1-89). The new lengths A1A3 and A2A3 are similarly obtained. Then, similar to (1-6), we can write the orientation {circumflex over (n)}2 of the normal to the plane A1A2A3, at time t2 as:
Guidance for interception along with simultaneous net orientation in 3-D is achieved as follows. By a simultaneous solution of (1-91) with (1-69), and the length constraint equations, |{right arrow over (r)}21(t2)|−|{right arrow over (r)}21(t1)|≤rmax and |{right arrow over (r)}32(t2)|−|{right arrow over (r)}32(t1)|≤rmax, we can determine the appropriate values of aA1, aA2, aA3 and ΔT that will ensure interception with net rotation is achieved, with the constraint on the change in length of each of the sides of the triangle A1A2A3 being satisfied. The discussions given in Section IV.B for the 2-D case carry over here as well.
Implementation
In the preceding subsection, we addressed the scenarios where the net needs to rotate, and a by-product of this rotation is that the distance between the UAVs may change, and this can cause the net to stretch (or compress). The actual stretching and compression of the net can pose challenges in a real system of a triangular net being carried by three UAVs. The challenge arises mainly from the need to design a mechanism for fixing the net to the UAVs such that (a) the net does not hinder the operation of the UAVs (b) the material of the net should be able to withstand the stretching and (c) the compression of the net should not make the net sag substantially such that it hinders the motion of the UAV and capture of the intruder swarm.
While a mechanism to attach the net to the UAV and selection of the material of the net are substantial challenges in their own right, these are beyond the scope of the present disclosure. We discuss below a few ideas on how net stretching/compression can be avoided during a net rotation maneuver.
We assume that the net is attached to each UAV using cables that can be wound up or extended, using a spinning reel deployment mechanism (much like that in a fishing rod) carried by the UAV, as schematically shown in
Since each UAV can carry only a finite length of cable, there needs to be a bound imposed on the change in the distance between each pair of UAVs and this bound is imposed by the term rmax in the preceding subsections. It also becomes important to choose the value of λi in (1-1) appropriately so that the interception point lies on the net. We recall that in (1-1), we chose the interception point as a convex combination of the UAV positions, with λ1∈[0,1],i=1,2,3. With the scheme of
An implementation of the guidance laws will also need to include addressing the state estimation problem, in order to determine the target motion on the basis of sensor measurements, as well as the relative motion of the net-carrying UAVs.
Generalization to Spheroidal Bounding Surfaces
The development in the preceding sections assumed that the vehicles in the intruder swarm have been enclosed in a virtual sphere. In scenarios where the intruder vehicles are moving as a flock with a somewhat elongated shape, then bounding them with a sphere and choosing an intercept point inside this sphere might not always lead to the best results. In such cases, it would be advantageous to bound the swarm with a shape that is less conservative than a sphere. One possibility is to construct a virtual spheroid enclosing the swarm—and then use the net to intercept this spheroid. Such an engagement is schematically depicted in
The collision cone associated with a spheroid has been determined. In particular, it was demonstrated that the expressions for miss-distance and the time of closest approach between a point and a spheroid both moving with constant velocities, can be used to compute quantities
where, a is the semi-major axis of the spheroid and Vrk,Vϕk,Vθk, k=1,2 represent the relative velocity components of the foci k of the spheroid with respect to the point. Based on this, we state the following: If the point and the spheroid move with constant velocities, then the conditions
For this engagement, we can determine the counterpart to Theorem 1 as follows. Define an error function similar to (1-27) with y replaced by
Evaluating (1-29) along the system trajectories, we get:
which can be written in a compact form identical to the right hand side of (1-31), with Y1, Y2 and Y3 now representing the expressions within the square brackets in (1-95). With these new definitions of Y1, Y2 and Y3, Ni has the same form as given in (1-34). After replacing y with
and a corresponding value of cmax can be determined by following a series of steps similar to (1-54)-(1-66). Finally, Theorem 3 is also valid for this new engagement with (1-69) replaced by the following equation:
The above results represent a generalization of that presented in Section 3 as follows. When the two foci of the spheroid coincide, the spheroid becomes a sphere, and we have r1=r2, Vθ1=Vθ2, Vϕ1=Vϕ2, Vr1=Vr2, a=R. Then, the conditions
Thus, the problem of three UAVs carrying a net with the objective of capturing an intruder UAV swarm is addressed, using a collision cone approach. Depending on its geometry, the intruder UAV swarm is enclosed in either a virtual sphere, or a virtual spheroid. The collision cone approach is used to determine analytical guidance laws for the net-carrying UAVs, for both maneuvering and non-maneuvering intruder UAV swarms. Simulation results are presented to validate the theory. The method can also be extended to the scenario of n UAVs carrying an arbitrarily-shaped net, after making appropriate modifications in the equations.
It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the presently disclosed subject matter, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the presently disclosed subject matter. In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. One or more programs may implement or utilize the processes described in connection with the presently disclosed subject matter, e.g., through the use of an application programming interface (API), reusable controls, or the like. Such programs may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language and it may be combined with hardware implementations.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
This invention was made with government support under grant number U.S. Pat. No. 1,851,817 awarded by the National Science Foundation. The government has certain rights in the invention.