INTERCEPTING OR SURROUNDING A GROUP OF HOSTILE UAVS WITH A NET
20220380042 · 2022-12-01
Inventors
Cpc classification
G08G5/0095
PHYSICS
B64U2101/00
PERFORMING OPERATIONS; TRANSPORTING
B64D43/00
PERFORMING OPERATIONS; TRANSPORTING
B64C39/024
PERFORMING OPERATIONS; TRANSPORTING
G05D1/0027
PHYSICS
International classification
Abstract
The present disclosure addresses the problem of UAVs pursuing a swarm of target UAVs. The target UAVs are flying together as a flock that are initially modeled as a circle having a time-varying radius or an arbitrarily-shaped swarm that may change in size. Guidance of the pursuing UAVs is developed based on a collision cone framework, wherein the pursuing UAVs cooperatively steer the velocity vector of any point in their convex hull, to intercept the target. Also, the problem of capturing a swarm of intruder UAVs using a net manipulated by a team of defense UAVs is disclosed. The intruder UAV swarm may be stationary, in motion, and even maneuver. Collision cones in 3-dimensional space are used to determine the strategy used by the net carrying UAVs to maneuver or manipulate the net in space in order to capture the intruders.
Claims
1. A method of surrounding target unmanned aerial vehicles (UAVs), comprising: modeling the target UAVs as a circle having a radius R; determining accelerations of pursuing UAVs based on a collision cone framework; and using the accelerations determined by the collision cone framework to cooperatively steer the pursuing UAVs and subsequently surround the target.
2. The method of claim 1, further comprising enclosing the target UAVs within the convex hull of the pursuing UAVs.
3. The method of claim 1, further comprising: carrying, by the pursuing UAVs, a ropeline or a suspended net in an open-chain configuration; and orienting an open end of the ropeline or suspended net toward the target UAVs, wherein surrounding the target UAVs further includes the pursuing UAVs approaching the target UAVs at an appropriate orientation that corresponds with the open end of the ropeline or suspended net.
4. The method of claim 3, wherein the ropeline or suspended net is an open chain, the method further comprising: surrounding the target UAVs by rotating a formation of the pursuing UAVs to approach the target UAVs from a direction of an open end of the open chain.
5. The method of claim 1, wherein the size of the swarm of target UAVs varies with time, the method further comprising: adjusting inter-vehicle distances of the pursuing UAVs in correspondence with the size of the target UAV swarm; and enclosing the target UAVs within the convex hull of the pursuing UAVs.
6. The method of claim 1, further comprising cooperatively driving the velocity vector of any point that lies within the convex hull of the pursuing UAVs into the collision cone of the target UAVs to intercept the target UAVs.
7. The method of claim 1, wherein the target UAVs are moving in a two-dimensional plane.
8. The method of claim 1, further comprising observing the target UAVs to determine risk associated with the target UAVs.
9. The method of claim 1, wherein the collision cone framework uses collision cones to represent a collection of velocity vectors of the pursuing UAVs which leads to a collision with the target UAVs; and using the collision cones to specify accelerations for the pursuing UAVs to enable them to cooperatively steer the velocity vector of any chosen point that lies in the convex hull of the pursuing UAVs into the collision cone to the target to facilitate surrounding the target UAVs.
10. The method of claim 1, further comprising generalizing the circle as having a time-varying radius or as having an arbitrary shape that changes in size.
11. A method of capturing a swarm of target unmanned aerial vehicles (UAVs) by pursuing UAVs carrying a net, comprising: modeling the swarm of target UAVs as being enclosed in a sphere; determining, by the pursuing UAVs, a trajectory to intercept the sphere using a collision cone in 3-dimensional space; maneuvering the heading angle of the net into the collision cone by coordinated guidance of the pursuing UAVs; and maintaining the heading angle to stay inside the collision cone to intercept the intruder UAV swarm modeled within the sphere.
12. The method of claim 11, further comprising: modeling the swarm of target UAVs as a flock enclosed by a sphere; and determining the capturing as an interception between the net and the sphere.
13. The method of claim 11, further comprising engaging the target UAVs by the pursuing UAVs in two phases, wherein during the first phase, the pursuing UAVs move the net close to the swarm of target UAVs, and wherein during the second phase, the pursuing UAVs rotate the net to achieve a desired net angle.
14. The method of claim 13, further comprising rotating the net to orient the net such that the normal to the net is approximately parallel to the velocity vector of the intruder swarm, or any other desired angle.
15. The method of claim 13, further comprising altering the velocity headings and/or speed of the pursuing UAVs to rotate the net.
16. The method of claim 13, further comprising commencing the second phase when a time-to-go is less than a threshold time determined as a function of the resolution of cameras mounted on the pursuing UAVs.
17. The method of claim 13, further comprising commencing the second phase when a time-to-go is less than a threshold distance to the target UAVs.
18. The method of claim 11, further comprising: determining if the size of the swarm is larger than the net, and if so, intercepting a subset of the swarm of target UAVs by choosing an interception point on the net that lies close to the centroid of the net.
19. The method of claim 18, further comprising intercepting the subset of the target UAVs that lie within a sphere whose radius is less than or equal to the radius of the in-circle of the net.
20. The method of claim 11, further comprising intercepting elongated swarms which are modeled as being enclosed in a spheroid.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] The components in the drawings are not necessarily to scale relative to each other. Like reference numerals designate corresponding parts throughout the several views.
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037] The APPENDIX, comprising 25 pages and incorporated herein by reference as part of the disclosure of this application, shows simulation results based on the principles disclosed herein.
DETAILED DESCRIPTION
[0038] Cooperative Pursuit Guidance to Surround Intruder Swarms Using Collision Cones
[0039] With reference to
[0040] To address the three problems, a collision cone approach is disclosed herein. Collision cones represent a collection of velocity vectors of an object which leads to collision with another moving object. Guidance laws to avoid collision are then designed to pull the current velocity vector of the object outside the collision cone. As described herein, collision cones can be used to develop analytical guidance laws for cooperative pursuit being performed by a group of UAVs. Differently from the collision avoidance problem, these guidance laws specify accelerations, which when applied by the pursuing UAVs, enable them to cooperatively drive the velocity vector of any chosen point (that lies in the convex hull of the pursuing UAVs) into the collision cone to the target, thereby facilitating subsequent capture of the target.
[0041] Collision Cone Preliminaries
[0042] The present disclosure details how the concepts from collision cones can be used to design the cooperative pursuit guidance laws.
V.sub.θ=r{dot over (θ)}=V.sub.B sin(β-θ)—V.sub.A sin(α−θ) V.sub.r={dot over (r)}=V.sub.B cos(β-θ)−V.sub.A cos(α−θ) (1)
[0043] When A and B move with constant velocities, the miss-distance r.sub.m (which is the predicted distance between the point A and the center P of the circle at the instant of closest approach), is given by the following equation:
[0044] and the time at which the two objects are at their point of closest approach is given by:
[0045] When V.sub.r<0, the above expression leads to a positive value of t.sub.m. When V.sub.r>0, it leads to a negative value of t.sub.m, and this is to be interpreted as the time of closest approach if the trajectories of both the objects are projected backwards in time. Since the objects are moving with constant velocities, projection backwards implies that the trajectories of the objects before time t, are also straight lines.
[0046] One can see that if the miss distance r.sub.m is less than R, then the point object A is on a collision course with the circle B. Based on the above, one may define a miss-distance function y as follows:
[0047] If the two objects continue to move with constant velocities for all future time, then the predicted miss distance r.sub.m is equal to the actual miss distance, and therefore, the conditions y<0 and V.sub.r<0 are both necessary and sufficient conditions for one object to intercept the other object. When the two objects move with varying velocities, then the condition y<0, V.sub.r≤0 for all future time is a sufficient condition for interception.
[0048] The condition y<0, V.sub.r<0 can be represented by a cone in the relative velocity space, as follows:
R=(V.sub.θ,V.sub.r):y<0∩V.sub.r<0 (5)
[0049] This cone R is schematically depicted in
R.sub.α=α:y<0∩V.sub.r<0 (6)
[0050] The cone R.sub.α in physical space is shown in
[0051] Cooperative Pursuit Guidance Laws
[0052] Below is described details cooperative pursuit by a group of UAVs. Consider n UAVs A.sub.1, . . . , A.sub.n that are pursuing an intruder UAV swarm. The UAVs are all moving on a plane. We assume that the vehicles in the intruder swarm need to stay reasonably close together. The reason for this could be, for example, that the intruders seek to perform a coordinated attack on a protected area, or because the intruder UAVs are flying in a leader-follower configuration and the followers need to be close to the leader. Because of their need to stay close together, the intruder UAVs are moving as a flock. We furthermore assume that this flock of intruder UAVs lies within a circle of radius R. A scenario comprising five UAVs performing a cooperative pursuit of an intruder swarm bounded within a circle is illustrated in
[0053] Engagement Geometry Kinematics
[0054] Let {right arrow over (r)}.sub.1, . . . , {right arrow over (r)}.sub.n represent the position vectors of the pursuing UAVs, and V.sub.1, V.sub.n represent their respective velocity vectors. Let V.sub.B represent the velocity vector of the circle encompassing the intruder UAV swarm. Consider a virtual point X that lies in the convex hull of A.sub.1, . . . , A.sub.n, defined by:
{right arrow over (X)}=Σ.sub.1=1.sup.nλ.sub.i{right arrow over (r)}.sub.i,Σ.sub.i=1.sup.nλ.sub.i=1,λ.sub.i>0,i=1, . . . ,n (7)
[0055] An algorithm to compute (λ.sub.1, . . . , λ.sub.n) is discussed in Section D. The chosen (λ.sub.1, . . . , λ.sub.n) combination is then used to compute the velocity vector {right arrow over (V)}.sub.X of point X as follows:
{right arrow over (V)}.sub.X=λ.sub.1{right arrow over (V)}.sub.1+ . . . +λ.sub.n{right arrow over (V)}.sub.n (8)
[0056] Let V.sub.1, . . . , V.sub.n represent the speeds of A.sub.1, . . . , A.sub.n, and let the angles of the associated velocity vectors (with respect to a reference line) be α.sub.1, . . . , α.sub.n, respectively. Then,
[0057] The magnitude of {right arrow over (V)}.sub.X is then given by:
V.sub.X=(λ.sub.1V.sub.1 cos α.sub.1+ . . . +λ.sub.nV.sub.n cos α.sub.n).sup.2+(λ.sub.1V.sub.1 sin α.sub.1+ . . . +λ.sub.nV.sub.n sin α.sub.n).sup.2 (10)
[0058] The angle made by {right arrow over (V)}.sub.X with respect to the reference line is denoted by α.sub.X and is given by:
[0059] Let V.sub.B represent the speed of B, and let β denote the angle made by {right arrow over (V)}.sub.B with respect to the horizontal. Defining r.sub.X=XP, and θ.sub.X as the angular bearing of the line XP, the relative velocity components of B with respect to X are given by:
V.sub.θ,X=V.sub.B sin(β−θ.sub.X)−V.sub.X Sin(α.sub.X−θ.sub.X) V.sub.r,X=V.sub.B cos(β−θ.sub.X)−V.sub.X cos(α.sub.X−θ.sub.X) (12)
[0060] Let α.sub.1, . . . , α.sub.n represent the magnitudes of the applied accelerations of A.sub.1, . . . A.sub.n, and these are applied at angles δ.sub.i, . . . , δ.sub.n, respectively, with these angles measured with respect to a reference line. Then, the nonlinear state equations governing the kinematics between the point X and center P of the circle, represented in a polar coordinate frame, are as follows:
[0061] Note that Eqs. 17 and 18 above are obtained by differentiating Eqs. 10 and 11, respectively, with respect to time. In these equations, λ.sub.X and λ.sub.Y are defined as:
λ.sub.X=λ.sub.1V.sub.1 cos α.sub.1+ . . . +λ.sub.nV.sub.n cos α.sub.n (21)
λ.sub.Y=).sub.1V.sub.1 sin α.sub.1+ . . . +λ.sub.nV.sub.n sin α.sub.n (22)
[0062] Eqs 19 and 20 represent the lateral and longitudinal acceleration components, respectively, of the ith UAV. Eqs 13-20 thus govern the kinematics of the relative velocity between any point X residing in the convex hull of the pursuing UAVs A.sub.1, . . . , A.sub.n, and the center of the target circle B, when B is non-maneuvering, that is, B moves with constant velocity. The guidance problem is addressed in this section is to determine suitable accelerations of the pursuing UAVs so that they cooperatively steer the velocity vector of X, such that X intercepts the target circle.
[0063] Cooperative Pursuit Laws for Non-Maneuvering Target
[0064] Cooperative pursuit laws for the scenario when the target moves with constant velocity, i.e., it is non-maneuvering are determined below. From Eq 4, a collision cone function y.sub.X can be defined as follows:
[0065] The condition y.sub.X<0, V.sub.r,X<0 indicates that the current velocity vector of X, (that is, {right arrow over (V)}.sub.X) is such that X is on a path to intercept with the target circle B. If the initial conditions of the engagement are such that y.sub.X<0, V.sub.r,X<0 is not satisfied (See
Z=1/2(y.sub.X−w).sup.2 (24)
[0066] where, w is a reference value, which is chosen to satisfy −R.sup.2<w<0. Note that driving this Lyapunov function to zero is equivalent to driving the velocity vector of X into the collision cone to the target. Then, the derivative of the Lyapunov function (Eq. 24) is Ż=(y.sub.X-w){dot over (y)}.sub.X. where {dot over (y)}.sub.X is as follows:
[0067] Evaluating the above along the system trajectories given by Eqs. 13-20, and rearranging terms in the resulting equation leads to the following:
[0068] The control inputs may be defined as u.sub.α,i and u.sub.V,i, where u.sub.α,i≡{dot over (α)}.sub.i and u.sub.V,i≡{dot over (V)}.sub.i, represent the acceleration components governing the heading and speed change, respectively, of UAV A.sub.i. Here, u.sub.V,i represents the longitudinal acceleration and the lateral acceleration is computed from u.sub.α,i V.sub.i These control inputs may be determined so that they will force the Lyapunov function Z to follow the dynamics Ż=−KZ. Choosing the constant K to satisfy K>0 will render Ż to be negative definite, and Z to be globally exponentially stable. By substituting {dot over (V)}.sub.X from Eq. 17 and {dot over (α)}.sub.X from Eq. 18 into Eq. 26, it is evident that we can enforce Z to follow the dynamics Ż=−KZ, if the accelerations of the pursuing UAVs satisfy the equation:
λ.sub.1(N.sub.1αu.sub.α,1+N.sub.1vu.sub.V,1)+ . . . +λ.sub.n(N.sub.nau.sub.α,n+N.sub.nvu.sub.V,n)=−K(y.sub.X−w) (27)
[0069] where, N.sub.iα and N.sub.iv are as follows:
[0070] It is evident that Eq. 27 represents a single equation in 2n unknowns (u.sub.α,1, . . . , u.sub.α,n) and (u.sub.V,1, . . . , u.sub.V,n), which are the heading angle rates and longitudinal accelerations, respectively, of the pursuing UAVs. There are thus multiple combinations of the lateral and longitudinal accelerations of the pursuing UAVs that can satisfy. If the pursuing UAVs are capable of only changing their heading angles (that is, they always move with constant speed), then in order for X to intercept B, the equation governing the heading angle rates of the pursuing UAVs is obtained by setting u.sub.V1, . . . , u.sub.Vn in Eq. 27 to be identically zero. This leads to the following equation:
λ.sub.1N.sub.1αu.sub.α,1+ . . . +λ.sub.nN.sub.nau.sub.α,n=K(y.sub.X−w) (30)
[0071] In Eq. 27, K is a constant. If the initial conditions are such that V.sub.r,X<0, then we choose K>0 to ensure that the Lyapunov function Z decays to zero. Note that since we are enforcing Ż=−KZ, therefore Z will follow the dynamics Z(t)=Z(0)e.sup.−Kt, where Z(0) represents the initial value of the Lyapunov function. The decay in Z is thus exponential in nature. We now choose K such that Z decays to E (where E is a small number) within a time that is shorter than t.sub.m,X, which (from Eq. 3) is:
[0072] From the expression for Z(t), it can be seen that the requisite K that will achieve this is given by:
[0073] Thus, for a constant velocity target, when the initial conditions are such that V.sub.r,X<0, then if the control inputs of the pursuing UAVs satisfy Eq. 27, and K>0 is chosen as above, then X will intercept B.
[0074] The required sensor data is the target velocity, range and bearing to the target from each of the individual UAVs, as well as the radius of the target UAV circle. The radius R of the target UAV circle can be extracted from image data obtained from camera(s) mounted on the pursuing UAVs. Then, knowing R, the reference point w is chosen so as to satisfy −R.sup.2<w<0, in order to ensure interception.
[0075] To compute K from Eq. 32, Z(0) is needed and t.sub.m,X. Z(0) is computed from Eq. 24, and requires the use of y.sub.X(0). y.sub.X(0) is computed from Eq. 23, while t.sub.m,X is computed from Eq. 31, and these require the values of r.sub.X(0), V.sub.θ,X(0), V.sub.r,X(0). These are computed using Eqs. 7-12, in conjunction with the chosen values of (λ.sub.1, . . . ,λ.sub.n).
[0076] When the initial conditions are such that V.sub.r,X>0, then the velocity vector {right arrow over (V)}.sub.X first needs to be steered into the V.sub.r,X<0 region (See
[0077] Cooperative Pursuit Laws that Account for Target's Acceleration
[0078] In this section, the developed guidance law Eq. 27 is modified so that it explicitly accounts for the target's lateral acceleration a.sub.B. It is assumed that the target swarm maneuvers are such that its acceleration vector acts normal to its velocity vector, that is, the target may change its direction but otherwise moves with constant speed. When B has an acceleration of magnitude a.sub.B, then the time derivatives of the relative velocity components and the heading angle of B are as follows:
[0079] The kinematics of the engagement between then pursuing UAVs and the maneuvering target are given by Eqs. 13, 14, 17-20 and 33-35.
[0080] The quantity y.sub.X is, in general, a function that provides the predicted miss-distance. When all the pursuing UAVs A.sub.1, . . . , A.sub.n as well as the target B are not maneuvering, then y.sub.X is a constant in time, and is a function of the actual miss-distance. When B is maneuvering, the quantity y.sub.X represents a predicted miss-distance function and varies with time. At any time t.sub.1, y.sub.X(t.sub.1) represents a prediction of what the miss distance function would be if the target were to move with constant velocity for all future time t>t.sub.1. Eventually, this predicted miss-distance converges to the actual miss distance.
[0081] If we drive the Lyapunov function Z to zero, then we are essentially forcing this predicted miss-distance to the reference value w, at each instant in time. Since this predicted miss-distance only eventually converges to the actual miss-distance, therefore, for a maneuvering target, driving Z to zero represents a sufficient condition for X to intercept B.
[0082] Differentiating the Lyapunov function Eq. 24 along the trajectories of the system defined by Eqs. 13, 14, 17-20 and 33-35, ensures that Eq. 24 follows the dynamics Ż=−KZ, if the control inputs of the pursuing UAVs follow the equation:
[0083] In Eq. 36, if K is large enough to ensure that Z is driven to zero in time less than t.sub.m,X, then X is on a path to intercept B.
[0084] Assume that at t=0, all the pursuing UAVs are moving in a formation with identical velocities. Refer Eqs. 27 and 36. Each of these represent a single equation with 2n unknowns, and in each of them, one of the solutions corresponds to the case of equal lateral accelerations and equal longitudinal accelerations of the n pursuing UAVs. Employing this solution will cause the pursuing UAVs to move towards the target with no change in either their formation shape, or the formation orientation. On the other hand, when Eqs 27 and 26 are employed with unequal accelerations, then the formation shape and orientation will change as it approaches the target. In Section 4, we show how to obtain the particular solution of Eqs. 27 and 36 that will ensure that the formation approaches the target with an orientation change, while otherwise remaining rigid. In Section 5, we show how to obtain the particular solution of Eqs. 27 and 36 that will ensure that the formation performs an orientation change, as well as a change in the lengths of the formation edges.
[0085] Computation of λ.sub.1, . . . , λ.sub.n
[0086] The computation of the quantities (λ.sub.1, . . . , λ.sub.n) in Eq. 7 will now be introduced. From Caratheodory's Theorem, when n>3, then the representation of {right arrow over (X)} may not be unique in the sense that there can be more than one (λ.sub.1, . . . , λ.sub.n) tuple that corresponds to the same point {right arrow over (X)}. So in our case, we first choose the coordinates of point X at time t=0, and then take any (λ.sub.1, . . . , λ.sub.n) tuple that will correspond to that point X. Note that if we choose λ.sub.i=0 for any i, then that UAV does not participate in the guidance laws Eqs. 27 and 36, as a consequence of which the acceleration of that UAV cannot be computed from Eqs. 27 and 36. To ensure that this does not occur, we necessarily require that λ.sub.i>0, ∀i.
[0087] The chosen point X lies at the centroid of the convex hull, we then chose
There can be scenarios when it would be better to choose X to be a point different from the centroid of the convex hull.
[0088] The scenarios requiring unequal values of λ.sub.1 can be understood from the notion of the Chebyshev center. Here, a definition that the Chebyshev center is the center of the largest radius circle that can be inscribed within a polygon is adopted. If the Chebyshev center is not located at the centroid of the polygon formed by the pursuing UAVs, then unequal values of λ.sub.i will be required.
[0089] An algorithm to compute λ.sub.1, . . . , λ.sub.n is as follows. For a given {right arrow over (X)}, find λ.sub.1, . . . , λ.sub.n:
[0090] subject to constraints:
λ.sub.i>0,Σ.sub.i=1.sup.nλ.sub.i=1,Σ.sub.i=1.sup.nλ.sub.iA.sub.i=X (37)
[0091] Guidance Laws for Pursuing UAVs with a Ropeline (or Suspended Net)
[0092] In a scenario where the pursuing UAVs are carrying a ropeline (or suspended net) with which they wish to surround the target. The rope essentially forms an open chain as depicted in
[0093] Assuming that the sizes of the target circle and the polygon A.sub.1 . . . A.sub.n formed by the pursuing UAVs are such that (i) the open edge of the polygon is of length greater than the diameter of the circle, and (ii) the perimeter of the polygon is greater than the circumference of the circle B.
[0094] The problem addressed in this section is to develop guidance laws governing the longitudinal and lateral accelerations of then pursuing UAVs with which, the pursuing UAVs can simultaneously achieve the following: [0095] Objective a) Drive the velocity vector of any chosen point X in their convex hull into the collision cone to the target swarm B, [0096] Objective b) Rotate their formation appropriately so that they approach the target swarm along a direction that corresponds with the open end of the chain, and [0097] Objective c) Maintain the distances between the UAVs to be constant, that is, the formation to be rigid.
[0098] Objective a: To meet this objective, we determine the equation governing the longitudinal and lateral accelerations of the pursuing UAVs that will drive y.sub.X to a reference value w<0, since y.sub.X<0 corresponds to the physical scenario of the velocity vector of X being inside the collision cone to the target. For a maneuvering target, this objective is met if the control inputs of the pursuing UAVs satisfy Eq. 36. If the target is non-maneuvering, then Eq. 36 reduces to Eq. 27.
[0099] Objective b: In order to meet this objective, Eq. 36 is combined with additional conditions that will enable the formation to be oriented appropriately. Toward determining these additional conditions, we look at the kinematics of each of the lines A.sub.iA.sub.j. The states governing each line A.sub.iA.sub.j are represented by the quantities r.sub.ij, θ.sub.ij, V.sub.θ,ij and V.sub.r,ij. These quantities are schematically shown in
[0100] where, δ.sub.i and δ.sub.i represent the directions of the acceleration vectors of a.sub.i and a.sub.j, respectively. From Eq. 38, it is evident that when {right arrow over (a)}.sub.i={right arrow over (a)}.sub.j then the relative velocity component of A.sub.j with respect to A.sub.i is zero, that is, V.sub.r,ij=0, V.sub.θ,ij=0 and r.sub.ij is constant.
[0101] Now consider the two UAVs carrying the open ends of the rope. Without loss of generality, assume that these two UAVs are A.sub.1 and A.sub.n. Then, θ.sub.1n represents the angle made by the line A.sub.1A.sub.n. Let θ.sub.1n,d represent the desired orientation of this line. We define an error quantity e.sub.θ,1n=θ.sub.1n−θ.sub.1n,d, Differentiating e.sub.θ,1n twice, we get the following:
[0102] The quantity e.sub.θ,1n follows the dynamics ë.sub.θ,1n=−K.sub.1ė.sub.θ,1n−K.sub.2 e.sub.θ,1n, (where, K.sub.1>0 and K.sub.2>0 are constants). Such a choice ensures that e.sub.θ,1n follows stable dynamics and decays to zero. After substituting terms from Eq. 38, it is required that the accelerations of A.sub.1 and A.sub.n satisfy the following equation:
—a.sub.1 sin(δ.sub.1−θ.sub.1n)+a.sub.n sin(δ.sub.n−θ.sub.1n)=V.sub.θ,1n(2V.sub.r,1n/r.sub.1n−K.sub.1)−r.sub.1nK.sub.2(θ.sub.1n−θ.sub.1n,d)+r.sub.1nK.sub.1{dot over (θ)}.sub.1,nd (40)
[0103] The above equation can then be written in terms of the control inputs u.sub.α,1, u.sub.V,1, u.sub.α,n, u.sub.V,n as follows:
−u.sub.α,1V.sub.1 cos(α.sub.1−θ.sub.1n)−u.sub.V,1 sin(α.sub.1−θ.sub.1n)+u.sub.α,nV.sub.n cos(α.sub.n−θ.sub.1n)+u.sub.V,n sin(α.sub.n−θ.sub.1n)=V.sub.θ,1n(2V.sub.r,1n/r.sub.1n−K.sub.1)−r.sub.1nK.sub.2(θ.sub.1n−θ.sub.1n,d)+r.sub.1nK.sub.1{dot over (θ)}.sub.1,nd (41)
[0104] If the control inputs are applied such that (36) and (41) are satisfied, then the pursuing UAVs will be able to surround the target with the rope at the appropriate orientation. The reference value θ.sub.1n,d would be equal (or close) to
[0105] Objective c: This requirement dictates that the distances between the UAVs need to remain constant throughout the engagement. a n-sided polygon can be triangulated into n−2 distinct triangles. As an example, the pentagon A.sub.1A.sub.2A.sub.3A.sub.4A.sub.5 in
[0106] The distance between a UAV pair (A.sub.i,A.sub.j) can be kept constant if the accelerations of UAVs A.sub.i and A.sub.j are such that {dot over (V)}.sub.r,ij=0 (with the assumption that the initial conditions are such that V.sub.r,ij=0). From Eq. 38, {dot over (V)}.sub.r,ij=0 will hold, if the following condition is satisfied:
−a.sub.i cos(δ.sub.i−θ.sub.ij)+a.sub.j cos(δ.sub.j−θ.sub.ij)=V.sub.θ,ij.sup.2/r.sub.ij,∀(i,j)∈E (42)
[0107] The above equation can then be written in terms of the control inputs u.sub.α,i, u.sub.V,i, u.sub.α,j, u.sub.V,j as follows:
u.sub.V,i cos(α.sub.i−θ.sub.ij)−u.sub.α,iV.sub.i sin(α.sub.i−θ.sub.ij)−u.sub.V,j cos(α.sub.j−θ.sub.ij)+u.sub.α,jV.sub.j sin(α.sub.j−θ.sub.ij)=V.sub.θ,ij.sup.2/r.sub.ij,∀(i,j)∈E (43)
[0108] Eqs 27, 41 and 43 can now be combined and written in the following matrix form AU=Y:
[0109] where, we have used the shorthand notation that for every pair of adjacent UAVs i and j, s.sub.i≡sin (α.sub.i−θ.sub.ij), s.sub.j=sin(α.sub.j−θ.sub.ij) and c.sub.i=cos(α.sub.i−θ.sub.ij), c.sub.j=cos(α.sub.j−θ.sub.ij).
[0110] Eq 44 represents a total of 2n−1 equations with 2n unknowns. The 2n−1 equations comprise one equation that drives the collision cone function y.sub.X, 2n−3 equations that ensure that the inter-UAV distances are such that the formation remains rigid, and one equation that drives the orientation of the open end A.sub.1A.sub.n of the chain. The 2n unknowns correspond to the control inputs (longitudinal acceleration and heading angle rate) of each of the n UAVs. This thus represents an under-determined system of equations, with there being one more unknown than the number of equations. Solution of this linear system of equations leads to control inputs of the pursuing UAVs with which objectives (a)-(c) are simultaneously satisfied.
[0111] In general, an undetermined system of equations (that are consistent), have non-unique solutions. For the current system (Eq. 44), from the given sizes of the A and Y matrices, it can be determined that the general solution will lie along a line in the R.sup.2n control (U) space. A particular solution U.sub.1 can be found as U.sub.1=A.sup.+Y, where A.sup.+ is the Moore-Penrose pseudoinverse of A. The general solution is then obtained as U=U.sub.1+cN, where N is the null space of A, and c is a scalar.
[0112] it can sometimes happen that the accelerations lead to a trajectory that puts one of the n pursuing UAVs on a collision course with the target. The occurrence of such a collision can be predicted by defining functions y.sub.1, . . . , y.sub.n representing the miss distance functions of each of n pursuing UAVs to the target circle, similar to Eq. 4, along with the corresponding miss-times t.sub.m1, . . . , t.sub.mn, similar to Eq. 3. If it is determined that y.sub.1<0,V.sub.r,i<0,t.sub.mi<t.sub.m,X holds for some UAV A.sub.i, this means that UAV A.sub.i will collide with the target before X intercepts the target. This collision can be averted by rotating the formation appropriately, and this can be achieved by modifying the reference value θ.sub.1n,d used in Eq. 44. Collisions between the rope and the target circle can be detected and avoided by following a similar process.
[0113] Guidance Laws for Time-Varying Target Size
[0114] Below is described a scenario where the size of the target changes with time. This could happen, for example, when the vehicles in the intruder swarm spread apart during their flight. At the same time however, we have assumed at the outset that their mission requires them to remain as a flock (given that they are performing a coordinated attack or flying in a leader-follower configuration), and they cannot stray too far apart from one another. We incorporate the effect of such a size change by making the radius of the circle that bounds the target, to be a function of time, that is, R is now R(t). In this case, the pursuers not only need to surround the target, but they may also need to increase their inter-vehicle distances appropriately so that they can enclose the target within their convex hull.
[0115] It is assumed that the pursuing UAVs have the ability to vary the length of the rope to some extent. Such a length change can be achieved by means of a spinning reel deployment mechanism (similar to the mechanism used in a fishing rod) that is carried by each UAV. Then, in response to an increase in the size of the target, if the distance between a pair of UAVs needs to increase, those UAVs can extend the rope between them till it is of desired length. Similarly, if the distance between a pair of UAVs needs to decrease, those UAVs reel in the rope between them. since each UAV can carry only a finite amount of cable, the permissible change in the length of the rope is upper bounded. This is schematically depicted in
[0116] The problem addressed in this section is to develop guidance laws governing the longitudinal and lateral accelerations of then pursuing UAVs with which, the pursuing UAVs can simultaneously achieve the following: [0117] Objective a) Drive the velocity vector of any point X in their convex hull into the collision cone to the target swarm B, [0118] Objective b) Rotate their formation appropriately so that they approach the target swarm with the open end of the chain at a desired angle, and [0119] Objective c) Adjust the edges of their formation to desired values (and these desired values depend on the size of the target).
[0120] It is preferable to determine a radius R(t) of the smallest circle that bounds the intruder swarm. The desired values of the edges of the formation then need to be such that the perimeter of the polygon is larger than the circumference of this computed circle.
[0121] Objective a: This objective can be met if Eq. 27 is modified to account for the changing radius of the circle. Toward this end, Eq. 4 takes the following form:
[0122] The time derivative of y.sub.X is:
[0123] Note that
We differentiate the Lyapunov function Eq. 24 along the trajectories of the system defined by Eq. 13-20. After doing so, it is seen that that we can ensure Eq. 24 follows the dynamics Ż=−KZ, if the control inputs of the pursuing UAVs satisfy the following equation, which is the counterpart of Eq. 27:
λ.sub.1(N.sub.1αu.sub.α,1+N.sub.1vu.sub.V,1)+ . . . +λn(N.sub.nαu.sub.α,n+N.sub.nvu.sub.V,n)=−K(y.sub.X-w)+2R{dot over (R)} (47)
[0124] When the lateral acceleration a.sub.B of the maneuvering swarm is explicitly incorporated in the guidance law, we get the following equation that will ensure that Ż=−KZ continues to be satisfied even when the target maneuvers:
[0125] Objective b: This is met if the accelerations of A.sub.1 and A.sub.n satisfy Eq. 41.
[0126] Objective c: Consider UAVs A.sub.i, A.sub.j∈E that have an inter-UAV distance of r.sub.ij(t). Let r.sub.ij,d represent the desired inter-UAV distance between this pair of UAVs. We define an error quantity e.sub.r,ij=r.sub.ij−r.sub.ij,d. Differentiating e.sub.r,ij twice, we get the following:
ë.sub.r,ij={dot over (V)}.sub.r,ij−{umlaut over (r)}.sub.ij,d (49)
[0127] We enforce that the quantity e.sub.r,ij follows the dynamics ë.sub.r,ij=−K.sub.3ė.sub.r,ij−K.sub.4e.sub.r,ij, (where, K.sub.3>0 and K.sub.4>0 are constants). This choice of dynamics will ensure that e.sub.r,ij decays to zero. Then, substituting terms from Eq. 38, we eventually arrive at the following equation governing the accelerations of UAVs A.sub.i and A.sub.j:
−a.sub.i cos(δ.sub.i−θ.sub.ij)+a.sub.j cos(δ−θ.sub.ij)=—V.sub.θ,ij.sup.2/r.sub.ij−K.sub.3(V.sub.r,ij−{dot over (r)}.sub.ij,d)−K.sub.4(r.sub.ij−r.sub.ij,d),∀(i,j)∈E (50)
[0128] The above equation can then be written in terms of the control inputs u.sub.α,i, u.sub.V,i, u.sub.α,j, u.sub.V,j as follows:
u.sub.α,iV.sub.i sin(α.sub.i−θ.sub.ij)−u.sub.V,i cos(α.sub.i−θ.sub.ij)−u.sub.α,jV.sub.j sin(α.sub.j−θ.sub.ij)+u.sub.V,j cos(α.sub.j−θ.sub.ij)=−V.sub.θ,ij.sup.2/r.sub.ij−K.sub.3(V.sub.r,ij−r.sub.ij,d)−K.sub.4(r.sub.ij−r.sub.ij,d),∀(i,j)∈E (51)
[0129] Eqs. 47, 51 and 43 can now be combined and written in the following matrix form AU=B:
[0130] By solving the above matrix equation for the 2n unknowns u.sub.α,i, u.sub.V,i, i=1, . . . , n, we can determine the control inputs of the n pursuing UAVs that will simultaneously satisfy Objectives (a)-(c).
[0131] Guidance Laws for Arbitrarily-Shaped Intruder Swarms
[0132] The guidance laws developed in the preceding sections assumed that the shape of the intruder swarm is bounded within a circle. In cases where the intruder swarm has a somewhat elongated shape, then the circular approximation can represent an over-approximation to the shape of the swarm, and this can be therefore inadequate. In this section, we show how the guidance laws can be modified when the shape of the intruder swarm is arbitrary.
[0133] By way of background, the following is a result on the collision cone between a point and an arbitrarily shaped object with reference to
[0134] In the above equations, ψ represents the angle subtended at A by the tangent lines AT.sub.1 and AT.sub.2 to B. T.sub.1AT.sub.2 represents the conical hull of B, relative to A, and ψ thus represents the angle of this conical hull. When there exist more than two tangent lines to B, then AT.sub.1 and AT.sub.2 represent the pair of tangents that are such that B is completely contained within the sector T.sub.1AT.sub.2. Note that since B is moving, the conical hull is distinct from the collision cone, which is an entity computed in the relative velocity space. The quantity θ.sub.b represents the angle made by the angular bisector of T.sub.1AT.sub.2 with the horizontal. V.sub.θ and V.sub.r are the relative velocity components that are respectively normal to, and along, a line from A that passes through a reference point in B. Note that when the arbitrary shape is replaced by a circle, (and the reference point P is the center of this circle), then
Substituting these in Eqs. 53 and 54. these reduce to Eq. 4, and V.sub.r, respectively.
[0135] Now consider the engagement geometry between n pursuing UAVs carrying a stretchable ropeline and an arbitrarily shaped swarm, as shown in
[0136] Substituting V.sub.X from Eq. 17 and {dot over (α)}.sub.X from Eq. 18 in the above equation, it is evident that we can enforce the Lyapunov function Z to follow the dynamics Ż=−KZ, if the quantities u.sub.α,1, u.sub.V,1, . . . , u.sub.α,n, u.sub.V,n of the pursuing UAVs satisfy the equation:
[0137] where, N.sub.iα, i=1, . . . , n is as in Eq. 28, and N.sub.iv, i=1, . . . , n is as in Eq. 29.
[0138] Eq 56 thus represents a generalization of Eq. 27 to the general case of arbitrarily shaped swarms. This equation can be combined with Eq. 41 and Eq. 43 to reorient the formation and lead to a matrix equation along the lines of Eq. 44. Similarly, Eq. 56 can be combined with Eqs. 41 and 51 to reorient the formation as well as change the inter-UAV distances and lead to a matrix equation along the lines of Eq. 44. In the latter case, the reference lengths r.sub.ij,d of the formation edges need to be such that the perimeter of the polygon formed by the pursuing UAVs is greater than the perimeter of the swarm.
[0139] Thus, as described herein, the present disclosure teaches solutions to the problem of n UAVs needing to pursue, and subsequently surround, a swarm of hostile UAVs (flying as a flock) that has intruded into a protected airspace. The development of analytical cooperative pursuit guidance laws that will meet the objective of the pursuing UAVs, is addressed. These cooperative pursuit guidance laws are developed based on a collision cone framework. Using this framework, analytical cooperative pursuit guidance laws that enable the n UAVs to enclose the intruder swarm within their convex hull are developed, for scenarios where the intruder swarm is enclosed in a bounding circle, and the circle may change size with time. In subsequent variants of this problem, the pursuing UAVs are assumed to be carrying a dragnet in an open-chain configuration, and the collision cone-based guidance laws are further developed to enable the UAVs to re-orient their formation appropriately (so that they approach the target from the open end of this chain), and also adjust their inter-vehicle distances appropriately (so that they are able to surround the target even as the target increases in size). These guidance laws are then generalized to the case when the intruder swarm is arbitrarily shaped. Simulations demonstrate the efficacy of the cooperative guidance laws.
[0140] Collision Cone-Based Net Capture of a Swarm of UAVs
[0141] Below addresses the problem of capturing a swarm of intruder UAVs, using a net manipulated by a team of defense UAVs. The intruder UAV swarm may be stationary, in motion, and even maneuver. The concept of collision cones in 3-dimensional space is used to determine the strategy used by the net carrying UAVs to maneuver or manipulate the net in space in order to capture the intruders. The manipulation of the net involves guiding the net to pursue the intruders and orienting it in space appropriately so as to maximize the effectiveness of capture. The net manipulation strategy is derived from the concept of collision cones defined in a relative velocity framework, and analytical expressions of nonlinear guidance laws are obtained. Simulations are presented to demonstrate the efficacy of these guidance laws.
[0142] Nomenclature
[0143] The following nomenclature is used hereinbelow.
TABLE-US-00001 ϕ Azimuth angle of position vector θ Elevation angle of position vector ψ Azimuth angle of velocity vector γ Elevation angle of velocity vector β Azimuth angle of acceleration vector α Elevation angle of acceleration vector a Acceleration magnitude V.sub.r, V.sub.θ, V Relative velocity components V speed R Radius of sphere
indicates data missing or illegible when filed
[0144] Introduction
[0145] The problem of a team of UAVs capturing a swarm of intruder UAVs with a net is disclosed hereinbelow. This class of net capture applications, in which a net carried by one or more UAVs, is used to capture a UAV intruding into a guarded airspace, has received considerable recent attention from researchers working on drone technologies due to the obvious need to protect the airspace from a proliferation of unauthorized drones. A related (but distinct) problem is that of net recovery, in which a UAV approaching a landing site (which could be an unprepared runway or a ship deck), is made to land on a net. Most net recovery problems involve a guidance algorithm that guides the UAV to a particular point on the net, with the net being fixed on the ground or on a stationary or moving platform. These methods may be termed as passive when the net carrying platform is either stationary or mobile, but does not maneuver to aid the landing operation, and it is the landing UAV that uses a guidance algorithm to modulate its trajectory in order to land on the recovery net. On the other hand, the net capture algorithms are active methods in which the net-carrying platform maneuvers itself to capture the intruder UAVs, which may themselves be maneuvering. Some of the net recovery methods can also be termed as active in the sense that the net is maneuvered in such a way as to bring it in the path of the landing UAV, thereby aiding the landing operation.
[0146] Given the rapid pace of advance in UAV technologies, it appears that UAV swarms will soon become common in many applications and may sometimes pose a threat for other vehicles in their airspace. In the present disclosure, we consider an interception problem in which three UAVs carrying a net actively attempt to trap a swarm of intruder UAVs. The capturing UAVs are assumed to be capable of flying at speeds higher than the intruder UAVs which, in turn, may maneuver in space. The problem is to decide how the UAVs need to manipulate, as well as orient the net in order to ensure that the net intercepts the intruder UAVs. In the guidance literature, interception problems have been addressed in the context of a missile intercepting an intruder aircraft. However, the problem there is formulated as an interceptor (modeled as a point), trying to intercept a target (which is also a point). In fact much of the guidance laws in the literature (PN being one of them) are based on the idea of guiding a point to intercept a target which may or not maneuver. In the present disclosure, we do not consider the problem as that of guiding a point but rather that of guiding multiple points (UAVs) together. Such a coordinated guidance is required in order to ensure that the net-carrying UAVs achieve the simultaneous objectives of target interception as well as appropriate net orientation.
[0147] To solve this problem, we use the notion of collision cones which are primarily used for collision detection and avoidance. The collision cone is a cone of velocity vectors of an arbitrarily shaped object in motion which lead to collision with another arbitrarily shaped object moving in space. Initially, the collision cones were defined for objects moving on a plane and then extended to 3-D space. The concept was later extended to define what is known as a safe passage cone which was used to maneuver vehicles through narrow orifices.
[0148] Apart from the novelty of using the collision cone approach for the net capture problem, there are several other differences that the present disclosure has with similar problems addressed in the literature. We consider a swarm of intruder UAVs flying as a flock. We do not consider any restriction on their trajectory, which may be a straight line or a curved trajectory. We model the intruder UAV flock as being enclosed inside a sphere, and formulate the problem as one of interception between the net and the sphere, with the net at a desired orientation. The kinematics-based guidance laws are developed in a relative velocity framework, and thus the kinematic effect of the wind acting on the vehicles are implicitly accounted for in the analysis. As far as dynamic effects are concerned, we assume that the drones are robust enough to take care of the disturbances caused by the wind and the net.
[0149] Problem Formulation and Solution Approach
[0150] With reference to
[0151] Net carrying UAVs: In the present disclosure, we assume that the net-carrying UAVs are of a fixed-wing type. There are several scenarios where fixed-wing UAVs have advantages over quadcopters for this application: Fixed-wing UAVs generally have speeds that are higher than quadrotors [fwing], have longer flight times and longer ranges, as well as the ability to carry heavier payloads. Also, it is often desirable that the intruder is intercepted by the net-carrying UAVs some safe distance away from the protected area, and for such operations the longer flight range of fixed-wing UAVs offers benefits.
[0152] Since fixed wing UAVs always need to fly at speeds above a certain threshold in order to generate lift, therefore the permissible speed variation for such UAVs is somewhat small. When the net carrying UAVs move with equal velocities, the formation is rigid. However, with equal velocities, these UAVs cannot rotate or orient the net in space. In the present disclosure, we assume that while the speeds of the net carrying UAVs are all equal (and constant in time), the velocity headings of these UAVs can be different from one another. This difference in velocity headings can be used to rotate the net whenever required.
[0153] if the UAVs are very light and/or the net is very heavy, then the UAVs may not be robust to disturbances caused by the net. We assume that the UAVs and the net are so chosen that the drone controller is robust to these disturbances.
[0154] Intruder Swarm: We assume that the vehicles in the intruder swarm need to stay reasonably close to each other. This could be either because the swarm is in a leader-follower configuration and the followers need to stay close to the leader, or because the swarm has an objective to carry out a coordinated attack on a specific point in a protected area, and in order to increase the effectiveness of this attack, they need to stay close together.
[0155] We also assume that while the adversaries are trying to perform such a focused attack on a target, they do not have the intelligence to simultaneously detect that they themselves are being attacked. This thus belongs to a class of scenarios wherein the adversaries have been given a predefined trajectory (possibly computed off-line) to their target, and as they fly towards their target, they do not have the sensors to detect a threat. Therefore, the adversaries do not have the ability to take reactive, evasive action to avoid being intercepted by the net, or the ability to re-compute their trajectory to the target, based on sensor data. This is close to the technology level of present day drones. Smart drones working in swarms and capable of detecting an attacker and taking evasive maneuvers is still a futuristic concept. We also assume that the target of the adversaries, as well as their intended trajectory to the target, is unknown to the net-carrying UAVs.
[0156] The intruder swarm need not remain confined to a sphere of constant radius, and the geometry of the swarm can indeed be arbitrary. Our approach then can be used to intercept as many vehicles as possible. Algorithms like the circumcenter algorithm [circumcenter] can be employed to determine the center and radius of the smallest sphere that will bound a chosen subset of vehicles in the intruder swarm, and the net-carrying UAVs will then attempt to intercept this sphere.
[0157] Guidance Objectives: We define a point X on the net as a weighted centroid of the three UAVs. The guidance objective is to maneuver the net so as to close the distance between X and B with the additional requirement that the net approaches B at a certain angle, where the angle may be defined with respect to the current direction of motion of B. This is similar to the impact angle requirement in the interceptor guidance literature, but with the important difference that the net itself needs to maintain a pre-specified angle with respect to the motion of the point X. The impact angle and the net angle are illustrated in
[0158] Phases of engagement: The engagement comprises two phases. During the initial phase of the engagement, the objective is primarily to get the net sufficiently close to the intruder swarm. Subsequently, when the time-to-go becomes smaller than a threshold, we begin to rotate the net, in order to achieve a desired net angle. The reasons for which we rotate the net only during the latter phase of the engagement are the following: (i) The purpose of net rotation is to orient the net such that it's normal is roughly parallel to the velocity vector of the intruder swarm. If the intruder swarm performs continual maneuvers, then doing net orientations early (in response to these maneuvers) can lead to unnecessary wastage of control effort by the net-carrying UAVs. (ii) The interceptor seeker range is also relevant here, since the UAV sensors tracking the intruder swarm may be less effective at larger distances and more effective at closer distances. So it makes sense to first guide the UAVs to get close to the intruder UAV and then do the orientation maneuver when its sensors are able to track the intruder trajectory better.
[0159] The threshold value of the time-to-go at which to start rotating the net, will be a function of the resolution of the cameras mounted on the UAVs. This threshold value can be set based on the appropriate distance to the target, at which the camera's resolution is adequate for switching to the net rotation phase.
[0160] When we desire a point object moving with constant speed to intercept another point object moving with constant velocity, there is typically a single (at most, two) heading angle(s) of the former that will lead to collision with the latter. On the other hand, when we desire a finite-sized object (such as a net) to intercept with another finite-sized object (such as a sphere), there is a range (or more precisely, a cone) of heading angles of the net, with which such an interception can be achieved. We refer to this cone as the collision cone. By maneuvering the heading angle of the net into the collision cone, and ensuring that the heading angle stays inside this cone, it can be ensured that the net intercepts the intruder UAV swarm. The UAVs use the accelerations a.sub.Ai, i=1, 2, 3, to orient the net and carry it along a trajectory that leads to interception of the intruder UAV swarm.
[0161] Let {right arrow over (r)}.sub.A1, {right arrow over (r)}.sub.A2, {right arrow over (r)}.sub.A3 represent the position vectors of A.sub.1, A.sub.2, and A.sub.3, respectively (with respect to some inertial reference frame). Then, any point X on the plane A.sub.1A.sub.2A.sub.3 can be represented as a convex combination of these three vectors as follows:
{right arrow over (r)}.sub.X=λ.sub.1{right arrow over (r)}.sub.A1+λ.sub.2{right arrow over (r)}.sub.A2+λ.sub.3{right arrow over (r)}.sub.A3,λ.sub.1+λ.sub.2+λ.sub.3=1,λ.sub.1,λ.sub.2,λ.sub.3≥0 (1-1)
[0162] The weighted centroid X of the triangle A.sub.1A.sub.2A.sub.3, has a velocity {right arrow over (V)}.sub.X:
i. {right arrow over (V)}.sub.X=λ.sub.1{right arrow over (V)}.sub.A1+λ.sub.2{right arrow over (V)}.sub.A2+λ.sub.3{right arrow over (V)}.sub.A3 (1-2)
[0163] where, the components of {right arrow over (V)}.sub.X are as follows:
[0164] From (1-3), the magnitude of {right arrow over (V)}.sub.X is as follows:
[0165] The azimuth and elevation angles of {right arrow over (V)}.sub.X are denoted by ψ.sub.X and γ.sub.X, respectively, and are given by:
[0166] In the remainder of the paper, for ease of notation, we will drop the subscript X in the terms {right arrow over (V)}.sub.X, V.sub.X, ψ.sub.X and γ.sub.X, except when necessary. Therefore, in the sequel, the terms {right arrow over (V)}, V, ψ and γ are all to be interpreted as quantities associated with the interception point X.
[0167] The orientation of the net is defined by the normal to the plane A.sub.1A.sub.2A.sub.3, denoted by {circumflex over (n)}. Then, defining {right arrow over (r)}.sub.21={right arrow over (r)}.sub.A2−{right arrow over (r)}.sub.A1 and {right arrow over (r)}.sub.31={right arrow over (r)}.sub.A3−{right arrow over (r)}.sub.A1, we can write {circumflex over (n)} as the normal to the plane that contains these vectors, as follows:
[0168] Let F represent the center of the sphere enclosing the swarm of intruder UAVs moving with speed V.sub.B, at an azimuth-elevation angle pair (ψ.sub.B, γ.sub.B). Consider the line XF. Defining r=XF, and (ϕ, θ) as the azimuth-bearing angle pair of XF, the relative velocity components of F with respect to X are:
V.sub.ϕ=V.sub.B cos γ.sub.B sin(ψ.sub.B−ϕ)−V sin γ sin(ψ−ϕ) (1-7)
V.sub.θ=V.sub.B{−cos γ.sub.B sin θ cos(ψ.sub.B−ϕ)+sin γ.sub.B cos θ}−V{−cos γ sin θ cos(ψ−ϕ)+sin γ cos θ} (1-8)
V.sub.r=V.sub.B{cos γ.sub.B cos θ cos(ψ.sub.B−ϕ)+sin γ.sub.B sin θ}−V{cos γ cos θ(ψ−ϕ)+sin γ sin θ} (1-9)
[0169] where, V.sub.r is the relative velocity component along XF, and V.sub.ϕ and V.sub.θ represent relative velocity components orthogonal to XF. These quantities are defined as follows:
{dot over (r)}=V.sub.r,ϕ=V.sub.ϕ/(r cos θ),{dot over (θ)}=V.sub.θ/r (1-10)
[0170] The derivatives of these relative velocity components are:
{dot over (V)}ϕ=−ϕ(V.sub.r cos θ−V.sub.θ sin θ)−{dot over (V)} cos γ sin(ψ−ϕ)+V sin γ{dot over (γ)}sin(ψ−ϕ)−V cos γψ cos(ψ−ϕ) (1-11)
{dot over (V)}.sub.θ=−{dot over (θ)}V.sub.r−ϕV.sub.ϕ sin θ−{dot over (V)}[cos γ sin θ cos(ψ−ϕ)+sin γ cos θ]−V[−{dot over (γ)}sin γ sin θ cos(ψ−ϕ)−cos γ sin θ{dot over (ψ)}sin(ψ−ϕ)+{dot over (γ)}cos γ cos θ] (1-12)
{dot over (V)}.sub.r={dot over (θ)}V.sub.θ+{dot over (ϕ)}V.sub.ϕ cos θ−{dot over (V)}[cos γ cos θ cos(ψ−ϕ)+sin γ sin θ]−V[−{dot over (γ)}sin γ cos θ cos(ψ−ϕ)−cos γ cos θ{dot over (ψ)}sin(ψ−ϕ)+{dot over (γ)}cos γ sin θ] (1-13)
[0171] Eqs (1-11)-(1-13) are valid with the assumption that B moves with a constant velocity, that is, {dot over (V)}.sub.B=0, {dot over (ψ)}.sub.B=0, {dot over (γ)}.sub.B=0. The guidance laws for capture are initially designed in Section 3.C with this constant velocity assumption. We subsequently relax this assumption in Section 3.F. From (1-11)-(1-13), it is evident that the derivatives of the relative velocity components vary with the quantities {dot over (V)}, {dot over (γ)}, {dot over (ψ)}, which govern the acceleration of the weighted centroid X of the net. These derivatives are as follows.
[0172] In (1-14)-(1-16), for the sake of brevity, we have used ψ.sub.i and γ.sub.i for ψ.sub.Ai and γ.sub.Ai, respectively. It is seen from the above that {dot over (V)}, {dot over (γ)}, and {dot over (ψ)} depend linearly on {dot over (γ)}Ai and {dot over (ψ)}.sub.Ai, which are the velocity heading angle rates for A.sub.1, A.sub.2 and A.sub.3. They evolve as follows:
{dot over (γ)}.sub.Ai=a.sub.Ai[cos α.sub.Ai sin γ.sub.Ai cos(β.sub.Ai−ψ.sub.Ai)−cos γ.sub.Ai sin α.sub.Ai]/V.sub.A, (1-17)
{dot over (ψ)}.sub.Ai=−a.sub.Ai cos α.sub.Ai sin(β.sub.Ai−ψ.sub.Ai)/(V.sub.A cos γ.sub.Ai) (1-18)
[0173] where, (β.sub.Ai, α.sub.Ai) are the azimuth-elevation angle pair of the acceleration vector {right arrow over (a)}.sub.Ai. Eqs (1-10)-(1-18) thus represent the kinematic state equations for the engagement between the net and the threat UAV sphere B. Additionally, after substitution of (1-18) in (1-14)-(1-16), the equations corresponding to (1-14), (1-15) and (1-16) are seen to be linear functions of a.sub.A1, a.sub.A2, a.sub.A3 and can be written in the following form:
[0174] where, the expressions for G.sub.i,H.sub.i,J.sub.i,i=1,2,3 are lengthy (and therefore not presented here), but can be readily inferred from (1-14)-(1-16).
[0175] Guidance Laws for Net Capture
[0176] In the following we will show how the concepts from collision cones can be used to design the net capture guidance law.
[0177] Point Object and a Sphere Moving in 3-D
[0178] When a point object and a sphere of radius R are moving with constant velocities, the miss-distance r.sub.m (which is the predicted distance between the point and the center of the sphere at the instant of closest approach), is given by the following equation:
r.sub.m.sup.2=r.sup.2(V.sub.ϕ.sup.2+V.sub.θ.sup.2)/(V.sub.ϕ.sup.2+V.sub.r.sup.2+V.sub.θ.sup.2) (1-20)
[0179] and the time of closest approach is given by:
t.sub.m=(−rV.sub.r)/(V.sub.ϕ.sup.2+V.sub.r.sup.2+V.sub.θ.sup.2) (1-21)
[0180] When V.sub.r<0, the above expression leads to a positive value of t.sub.m. When V.sub.r>0, it leads to a negative value of t.sub.m, which can be interpreted as the time of closest approach if the trajectories of both the objects are projected backwards in time.
[0181] If the miss distance r.sub.m is less than R, then the point object is on a collision course with the sphere. Based on this, one may define a miss-distance function y as follows [ref2]:
[0182] If the two objects move with constant velocities, then the predicted miss distance is equal to the actual miss distance, and therefore, the condition y<0 and V.sub.r<0 are both necessary and sufficient conditions for one object to intercept the other object. When the two objects move with varying velocities, then the condition y<0,V.sub.r<0 for all future time is a sufficient condition for interception.
[0183] In the 3-D physical space, we can construct a surface defined by the set of heading angles of {right arrow over (V)} that satisfy y=0, that is, (ψ,γ):y=0. This surface is shown in
[0184] Collision Conditions Between the Net A.sub.1A.sub.2A.sub.3 and the Sphere B
[0185] Eq (1-22) can now be used to represent the miss distance from any point on the net A.sub.1A.sub.2A.sub.3 to the sphere, as follows. As stated in (1-1), any point X on the net can be written as a convex combination of {right arrow over (r)}.sub.A1, {right arrow over (r)}.sub.A2 and {right arrow over (r)}.sub.A3. Therefore, the vector r from any point X on the net to the center of the sphere B is:
{right arrow over (r)}={right arrow over (r)}.sub.B−(λ.sub.1{right arrow over (r)}.sub.A1+λ.sub.2{right arrow over (r)}.sub.A2+λ.sub.3{right arrow over (r)}.sub.A3) (1-23)
[0186] where, {right arrow over (r)}.sub.B is the position vector of the center of B. Similarly, the relative velocity vector of the center of the sphere with respect to X on the net is given by:
{right arrow over (V)}.sub.REL={right arrow over (V)}.sub.B−(λ.sub.1{right arrow over ({dot over (r)})}.sub.A1+λ.sub.2{right arrow over ({dot over (r)})}.sub.A2+λ.sub.3{right arrow over ({dot over (r)})}.sub.A3) (1-24)
[0187] Then, {right arrow over (V)}.sub.REL can be resolved into components V.sub.r, V.sub.ϕ, and V.sub.θ, where V.sub.r=<{right arrow over (V)}.sub.REL,{circumflex over (r)}> is the relative velocity component along the unit vector {circumflex over (r)} that corresponds to (1-23), while V.sub.ϕ, and V.sub.θ are the two mutually orthogonal components of V.sub.REL that are also orthogonal to {circumflex over (r)}.
[0188] We can then state the following. The net is on a collision course with B if there exists a (λ.sub.1,λ.sub.2,λ.sub.3) with Σ.sub.i=1.sup.3λ.sub.i=1,λ.sub.i≥0, such that:
[0189] is satisfied. Since each point on the net is parametrized by (λ.sub.1,λ.sub.2,λ.sub.3), we can use (1-25) to write the miss distance function from each point on the net to the sphere as y(λ.sub.1,λ.sub.2,λ.sub.3). Along similar lines, we can also write V.sub.r associated with each point on the net as a function V.sub.r(λ.sub.1,λ.sub.2,λ.sub.3). The collision cone between the net A.sub.1A.sub.2A.sub.3 and the sphere B can be defined in the (ψ,γ) space as:
CC.sub.NB={(ψ,γ):y(λ.sub.1,λ.sub.2,λ.sub.3)<0 and V.sub.r(λ.sub.1,λ.sub.2,λ.sub.3)<0,∀λ.sub.i≥0,Σ.sub.i=1.sup.3λ.sub.i=1} (1-26)
[0190]
[0191] As an illustrative example, assume that the three UAVs A.sub.1, A.sub.2, A.sub.3 are at a distance 10 m apart from each other and they are moving with a speed of 5 m/sec. The intruder swarm is moving with a speed of 2.3 m/sec and a heading angle given by ψ=45 deg, γ=20 deg. The initial positions of the net-carrying UAVs are (0,0,8.7), (−5,0,0) and (5,0,0), respectively, while that of the center of the intruder sphere is (30,0,4.3). Assuming identical heading angles of the UAVs A.sub.1, A.sub.2, A.sub.3, the collision cone CC.sub.NB from the net to the intruder sphere (computed from (1-26)), is depicted on a (ψ,γ) plane as shown in
[0192]
[0193] Intercept point on the net: The interception point on the net needs to be chosen such that the net hits the entire intruder swarm (or at least most of it). While there will be many engagement scenarios where the ideal interception point on the net is located close to its center, there can also be other scenarios where this is not necessarily the case. For example, consider the scenario when the net triangle is isosceles (with its two equal sides being significantly longer than the third side), and the intruder swarm is arranged in a somewhat linear configuration, with the length of this configuration being greater than the longest side of the net. If we now choose the center of the net as the intercept point, then the entire swarm cannot be intercepted by the net. It would be better to choose the intercept point closer to the longer side of the net, so as to intercept as many intruder UAVs as possible. This is shown in
[0194] Intercept point on the sphere: In many engagements, the ideal interception point on the sphere is located close to the center of the sphere. However, there can also be scenarios where the radius of the bounding sphere on the intruder swarm is larger than the size of the net, and moreover, the intruders are not uniformly distributed inside this bounding sphere. In such cases, we choose an intercept point on the intruder sphere that lies in the denser part of the swarm (where the denser part basically contains more vehicles). This will enable the interception of more vehicles in the swarm. This is shown in
[0195] Different intercept points on the sphere also lead to different impact angles. This is illustrated in
[0196] Intercepting a subset of the intruder swarm: As mentioned earlier, if the size of the swarm is larger than the net, we then attempt to intercept a subset of the swarm. If we choose an interception point on the net that lies close to the centroid of the net, then the net will be able to intercept those vehicles in the swarm that lie within a sphere whose radius is less than (or equal to) the radius of the in-circle of the net. If there are members of the intruder swarm outside this sphere, then those intruders can potentially escape â€″ however our approach ensures that we have intercepted at least some of the intruding vehicles. For a given geometry of the intruder swarm, the larger the size of the net, the larger the radius of the sphere of intruders that can be intercepted. Refer to
[0197] Acceleration Magnitude for Capture
[0198] In this section, we determine guidance laws for the three net carrying UAVs so as to enable them to intercept the swarm of threat UAVs enclosed in a sphere. The guidance laws are initially designed with an assumption that B moves with a constant velocity, that is, {dot over (V)}.sub.B=0, {dot over (ψ)}B=0, {dot over (γ)}B=0. In a subsequent section, we will relax this assumption. Define a function Z as follows:
Z=(1/2)(y−w).sup.2 (1-27)
[0199] where, w≤0 is a specified reference value, which may be time-varying. having an arbitrary w<0 provides us the flexibility to choose different interception points on the sphere. By determining a.sub.Ai, i=1,2,3 which will make Ż negative definite, interception of the swarm of threat UAVs B can be guaranteed.
[0200] Theorem 1: Let UAV A.sub.1 have an acceleration a.sub.Ai whose magnitude is given by:
N.sub.1a.sub.A1+N.sub.2a.sub.A2+N.sub.3a.sub.A3=−K(y−w) (1-28)
[0201] where, N.sub.i, i=1,2,3, is given in (1-34). Then, the error function Z in (1-27) is globally asymptotically stable almost everywhere.
[0202] Proof: Ż=(y−w)({dot over (y)}−{dot over (w)}), where the time derivative of y(t) is as follows:
[0203] Evaluating (1-29) along the system trajectories defined by (1-10)-(1-18), we get:
[0204] which can be written in a compact form as follows:
[0205] where, Y.sub.1, Y.sub.2 and Y.sub.3 are the expressions within the square brackets in (1-30), and the partial derivatives of y are as follows:
[0206] Substituting for {dot over (γ)}, {dot over (ψ)} and {dot over (V)} from (1-19), we can rewrite (1-31) in the form:
[0207] The elements in the row matrix of (1-33) have a specific structure, and this is used to define N.sub.i,i=1,2,3 as follows:
N.sub.i=Y.sub.1G.sub.i+Y.sub.2H.sub.iV+Y.sub.3J.sub.iV cos γ (1-34)
[0208] Then, by substituting (1-28) in the time derivative of the error function Z in (1-27), we get the equation Ż=−KZ, which is the dynamics of the error function, and Z is globally asymptotically negative definite “almost everywhere” in the state space.
[0209] for the choice of control given in (1-28) when N.sub.i=0 occurs at some time t=t.sub.1, there is a singularity in the sense that a.sub.Ai becomes undefined, and this means that at that instant in time, application of any finite acceleration a.sub.Ai does not influence Ż, and does not drive y toward w. This can happen under the following scenarios: (a) At t=t.sub.1, the a.sub.Ai vector becomes parallel to the V.sub.Ri vector (where, {dot over (V)}.sub.Ri≡{dot over (V)}.sub.B−{dot over (V)}.sub.Ai is the velocity of B with respect to A.sub.1), (b) At t=t.sub.1, the aiming point of V.sub.Ai passes through the center of B. When either (a) or (b) occur, we simply allow a.sub.Ai to hit its saturation limit at t=t.sub.1. Since we have chosen the direction of a.sub.Ai such that it always acts normal to V.sub.Ai, this causes the velocity vector V.sub.Ai to continue to rotate at t=t.sub.1. This drives N.sub.i away from zero, which in turn causes a.sub.Ai to revert to generating a finite acceleration. At the isolated instant t=t.sub.1, the error function Z does not follow the equation Ż=−KZ, and for this reason, we have the caveat that Z is globally asymptotically stable “almost everywhere”. [ ]
[0210] Remark 1: We observe that there can be multiple (a.sub.A1, a.sub.A2, a.sub.A3) combinations that satisfy (1-28). During the phase of the engagement when we do not want the net to rotate, we require that the acceleration vectors of A.sub.1, A.sub.2 and A.sub.3 all be identical. In the non-rotating phase, the UAVs A.sub.1, A.sub.2, A.sub.3 have N.sub.1=N.sub.2=N.sub.3 and therefore, it can be ensured that they all have equal accelerations, if we use:
a.sub.Ai=−K(y−w)/(3N.sub.i),i=1,2,3 (1-35)
[0211] During the phases of the engagement when we do want the net to rotate, we employ unequal accelerations. During those phases, we do not use the individual acceleration magnitudes given in (1-35), but continue to use the cumulative acceleration magnitude given in (1-28). This is elaborated in more detail in Section 4, where we discuss aspects of net rotation.
[0212] Remark 2: If K in (1-28) satisfies the condition
K>(1/t.sub.m)In(Z(0)/ϵ) (1-36)
[0213] then Z will decay to a quantity ϵ in time t<t.sub.m, where t.sub.m is given in (1-21).
[0214] Remark 3: With K>0, the guidance acceleration (1-28) will drive the error function Z to zero. If the initial velocity heading angles (ψ,γ) lie in the V.sub.r<0 region, K satisfies (1-36), and the intruder swarm moves with constant velocity, then it is guaranteed that the net will intercept the intruder swarm. However, when the initial velocity heading angles lie in the V.sub.r>0 region (See
[0215] Direction of Acceleration Vector
[0216] N.sub.i in (1-34) depends on G.sub.i, H.sub.i and J.sub.i, which in turn are functions of (β.sub.Ai,α.sub.Ai) which represent the direction of the acceleration vector of A.sub.i. We next choose the appropriate direction of the acceleration vector a.sub.Ai, i=1,2,3, to enable capture. Towards this end, we impose the following conditions on the direction of the acceleration vector for each vehicle: (a) The unit acceleration vector â.sub.Ai always acts normal to the unit velocity vector {circumflex over (V)}.sub.Ai, and (b) The acceleration vector â.sub.Ai lies on the plane containing the line XF and {circumflex over (V)}.sub.Ai.
[0217] To satisfy (a), we require <â.sub.A1, {circumflex over (V)}.sub.Ai≥0, which simplifies to:
cos γ.sub.Ai cos α.sub.Ai cos(ψ.sub.Ai−β.sub.Ai)+sin γ.sub.Ai sin α.sub.Ai=0 (1-37)
[0218] When cos γ.sub.Ai≠0 and cos α≠0, (1-37) can be written as:
cos(ψ.sub.Ai−β.sub.Ai)+tan γ.sub.Ai tan α.sub.Ai=0(1-38)
[0219] For (b), we first define a plane that contains XF and {circumflex over (V)}.sub.Ai. The unit normal to this plane is computed as:
{circumflex over (n)}.sub.i=({circumflex over (V)}.sub.Ai×{right arrow over (X)}F)/|XF| (1-39)
[0220] To satisfy (b), we need that <{circumflex over (n)}.sub.i,â.sub.Ai≥0 which, after some algebraic manipulations, simplifies to:
S.sub.Ai cos α.sub.Ai cos β.sub.Ai+
[0221] where, S.sub.Ai,
S.sub.Ai=cos γ.sub.Ai sin ψ.sub.Ai sin θ−sin γ.sub.Ai cos θ sin ϕ
[0222] When cos α.sub.Ai≠0, (1-40) can be written as:
S.sub.Ai cos β.sub.Ai+
[0223] Solving Eqs. (1-38) and (1-42) for α.sub.Ai and β.sub.Ai, we get
cot.sup.2α.sub.Ai=tan.sup.2γ.sub.Ai+D.sub.Ai.sup.2 (1-43)
β.sub.Ai=ψ.sub.Ai−π+cos.sup.−1[tan γ.sub.Ai tan α.sub.Ai] (1-44)
[0224] where,
[0225] In the special case when D.sub.Ai=0, (1-43) and (1-44) reduce to
[0226] Robustness of the Guidance Law to Acceleration of Intruder Swarm
[0227] The guidance law (1-28) was derived with an assumption that the intruder swarm moves with constant velocity in a straight line. In this section we quantify the robustness of (1-28) when the sphere B moves with a curvilinear trajectory, that is, B is maneuvering. Note that although B is maneuvering, this maneuver is not for the purpose of evading the net, but rather to reach its intended goal by following a pre-specified curvilinear trajectory.
[0228] When B has an acceleration of magnitude a.sub.B, which acts at an azimuth-elevation angle pair (β.sub.B, α.sub.B), then the time derivatives of the relative velocity components and the heading angles of B are:
{dot over (V)}ϕ=f.sub.ϕ+a.sub.B cos α.sub.B sin(β.sub.B−ϕ) (1-46)
{dot over (V)}.sub.θ=f.sub.θ−a.sub.B[cos α.sub.B sin θ cos(β.sub.B−ϕ)−sin α.sub.B cos θ] (1-47)
{dot over (V)}.sub.r=f.sub.r+a.sub.B[cos α.sub.B cos θ cos(β.sub.B−ϕ)+sin α.sub.B sin θ] (1-48)
{dot over (γ)}.sub.B=−a.sub.B[cos α.sub.B sin γ.sub.B cos(β.sub.B−ψ.sub.B)−cos ψ.sub.B sin α.sub.B]/V.sub.B (1-49)
{dot over (ψ)}.sub.B=a.sub.B cos α.sub.B sin(β.sub.B−ψ.sub.B)/V.sub.B cos γ.sub.B (1-50)
where, f.sub.ϕ, f.sub.θ, and f.sub.r are the expressions on the right hand sides of (1-11)-(1-13), respectively. We assume that the intruder swarm maneuvers such that its acceleration vector acts normal to its velocity vector, that is, the intruder swarm may change its direction but moves with constant speed. We point out that the quantity y in (1-25) is, in general, a function that provides the predicted miss-distance. When all the UAVs A.sub.1, A.sub.2, A.sub.3, and B are not maneuvering, then y is a constant in time, and is a function of the actual miss-distance. When B moves with constant velocity, the designed guidance law (1-28), with K greater than the threshold in (1-36), ensures that the actual miss-distance also goes to zero.
[0229] When B is maneuvering, the quantity y represents a predicted miss-distance function and varies with time. At any time t.sub.1, y(t.sub.1) represents a prediction of what the miss distance function would be if the intruder swarm were to move with constant velocity for all future time t>t.sub.1.
[0230] Theorem 2: Let UAV A.sub.i have an acceleration a.sub.Ai given by (1-28), (1-43), (1-44) and
[0231] B be a maneuvering swarm. Then, if K is large enough to ensure that the following inequality is satisfied:
[0232] then, the error function (1-27) is globally stable almost everywhere, and is upper bounded by Z.sub.SS, where
Z.sub.SS=a.sub.B.sup.2c.sub.max.sup.2/K.sup.2 (1-52)
[0233] Proof: Substitute the acceleration equation (1-28) in the time derivative of the error function (1-27) evaluated along the trajectories of the system defined by (1-10),(1-46)-(1-50), (1-14)-(1-18). The error function then evolves according to the following equation:
[0234] It is evident that in (1-53), the influence of a.sub.B is that of a vanishing perturbation, that is, when Z=0, a.sub.B does not influence the dynamics of Z(t). When Z≠0, (1-53) provides a condition on the relative values of the gain K and a.sub.B with which Ż can remain negative definite. If the engagement geometry is such that the second term in the right hand side of (1-53) is always negative, then Z will asymptotically decay to zero at a rate which would be faster than if the target was not maneuvering.
[0235] If this term is not negative, then Z attains a steady state value. An upper-bound to this steady state value is obtained by setting Ż=0 in (1-53) and solving for Z, which will yield (1-52), where c.sub.max corresponds to the maximum value of the quantity inside the square brackets in (1-53). The reasons for the caveat “almost everywhere” are similar to those outlined in the proof of Theorem 1.
[0236] A characterization of the value of c.sub.max is obtained as follows. From (1-53), the quantity c is defined as:
[0237] the following identities are true:
[0238] This can be shown as follows. Consider (1-55). Let
−sin
−cos
−cos
[0239] Substituting the expression for cos
sin
[0240] Similarly, substituting the expression for sin
cos
[0241] It is then evident that (1-60)-(1-62) are satisfied simultaneously only for the cases: (i) sin(
[0242] By virtue of the above, (1-54) leads to the following inequality:
[0243] Substituting the partial derivatives of y from (1-32) in the above, we get:
[0244] Multiplying and dividing the right hand side of the above equation by V.sub.B.sup.4, we get:
where, {tilde over (V)}.sub.ϕ≡V.sub.ϕ/V.sub.B, {tilde over (V)}.sub.θ≡V.sub.θ/V.sub.B and {tilde over (V)}.sub.r≡V.sub.r/V.sub.B represent non-dimensional quantities. The above equation is then written in a compact form as:
[0245] where, ν=V/V.sub.B represents the ratio of the speed of the weighted centroid X of the net to the target speed.
[0246] From (1-52), we can obtain an upper bound to the predicted miss distance function as:
Y.sub.b=√{square root over (2)}a.sub.Bc.sub.max/K+W (1-67)
[0247] From the above, we can determine an upper bound on the predicted miss-distance between the center of the sphere B and the point X on the net as follows:
r.sub.m,b=[√{square root over (2)}a.sub.Bc.sub.max/K+R.sup.2+w].sup.1/2 (1-68)
[0248] Incorporating Intruder UAV Acceleration
[0249] In this section, we modify the proposed guidance law (1-28) so that it explicitly accounts for the intruder swarm's acceleration. We state the following theorem:
[0250] Theorem 3: Let the intruder swarm maneuver with an acceleration vector a.sub.B that is normal to its velocity vector {right arrow over (V)}.sub.B. Let UAVs A.sub.i, i=1,2,3 have acceleration magnitudes a.sub.Ai,i=1,2,3, that satisfy the equation:
[0251] with K>0, and whose direction is given by (1-43) and (1-44). Then, the error function (1-27) is globally asymptotically stable almost everywhere.
[0252] Proof: Substitute the acceleration equation (1-69) in the time derivative of the error function (1-27) evaluated along the trajectories of the system defined by (1-10), (1-46)-(1-50), (1-14)-(1-18). This will make the error function Z follow the dynamics Ż=−KZ. The rest of the proof then follows. The reasons for the caveat “almost everywhere” are similar to those outlined in the proof of Theorem 1.
[0253] Remark 4: From (1-69), the counterpart of (1-35) can be determined to be the following:
[0254] We now make the following statement similar to that made for (1-35). Eq (1-70) will ensure that the acceleration magnitudes of A.sub.1, A.sub.2 and A.sub.3 are all equal and these magnitudes can be used during the non-rotating phase of the engagement. During the phase of the engagement when the net needs to be rotated, we will employ unequal acceleration magnitudes for A.sub.1, A.sub.2 and A.sub.3, but still ensure that the sum of these acceleration magnitudes satisfies (1-69). This is discussed in Section 4.
[0255] Remark 5: Consider scenarios where the acceleration magnitude of B is not precisely known to the net-carrying UAVs, but the maximum possible acceleration of B is known. Let a.sub.B,max represent the maximum acceleration of B. Then, we can replace a.sub.B in (1-70) with sgn(a.sub.B)|a.sub.B,max|. Using arguments similar to those given in [anderson], it can be proved that such a modified guidance law will still ensure that the net intercepts the intruder swarm.
[0256] Remark 6: the assumption on constant speed of the intruder swarm is used only for the derivation of the guidance law. In practice, the intruder UAVs within the sphere may have relative motion with respect to one another. In scenarios when the speed V.sub.B of the center of the sphere changes with time, we can employ a piecewise-constant (in time) approximation to V.sub.B, and use this in the guidance law.
[0257] Net Capture on a Two-dimensional Plane
[0258] It is instructive to look at the two-dimensional version of the capture equations developed thus far. This will make it easier to follow the subsequent discussion in Section 4 about net rotation. Refer
[0259] and, from (1-26), the collision cone between the net and B can be defined as:
CC.sub.NB=γ:y(λ.sub.1,λ.sub.2)<θ and V.sub.r(λ.sub.1,λ.sub.2)<0,∀λ.sub.i≥0,Σ.sub.i=1.sup.2λ.sub.i=1 (1-72)
[0260] The equation governing the accelerations of the two UAVs with which interception (of the point X on the net), with the intruder UAV circle is achieved (when B does not maneuver) is as follows:
N.sub.1a.sub.A1+N.sub.2a.sub.A2=−K(y−w) (1-73)
[0261] where, N.sub.1 and N.sub.2 are obtained from the 2-D version of (1-34). When B is maneuvering with an acceleration magnitude a.sub.B, capture can be ensured if the acceleration magnitudes satisfy the following equation (which is the 2-D counterpart of (1-69)):
[0262] where, α.sub.B is the angle at which the acceleration of B is applied, and
In the scenario when the magnitude of a.sub.B is not known, but only the sign of a.sub.B and |a.sub.B,max| is known, interception is achieved if we replace a.sub.B in (1-74) with sgn(a.sub.B)|a.sub.B,max|.
[0263] Orienting the Net
[0264] The discussion thus far pertains to the phase of the engagement when the net does not need to rotate. In order to meet requirements on the net angle (See
[0265] At this point, we recall that a standing assumption in the present disclosure is that the UAVs A.sub.1, A.sub.2 and A.sub.3 are of fixed-wing type and move with constant speeds throughout the engagement. For each UAV, the acceleration vector acts normal to the velocity vector. Therefore, a side-effect of applying differential accelerations to rotate the net is that these will cause an ensuing change in the distance between the net-carrying UAVs, and this in turn can lead to stretching (or compression) of one or more sides of the net. In Section IV.D, we discuss strategies by which such a stretching/compression of the net can be averted. Our objective now is to characterize the interplay between the application of these differential accelerations and the subsequent change in orientation as well as the distance between the net-carrying UAVs. For ease of description, we will first consider the 2-D case depicted in
[0266] Orienting the Net in 2-D
[0267] Refer
where, α.sub.A1 and α.sub.A2 are the directions of the acceleration vectors of a.sub.A1 and a.sub.A2, respectively, and are taken as
Let Γ represent the angle made by the normal {circumflex over (n)} to the line A.sub.1A.sub.2, with the horizontal. From
By differentiating Γ twice, we get:
[0268] From the first and last equations in (1-75), we obtain the equation for the length of the net as:
{umlaut over (r)}.sub.21=(V.sub.θ,21.sup.2)/r.sub.21+sin(γ.sub.A1-θ.sub.21)a.sub.A1-sin(γ.sub.A2-θ.sub.21)a.sub.A2 (1-77)
[0269] Eqs (1-76) and (1-77) demonstrate the influence of {right arrow over (a)}.sub.A1 and {right arrow over (a)}.sub.A2 on the net orientation angle Γ and the distance r.sub.21. In these equations, if a {right arrow over (a)}.sub.A1={right arrow over (a)}.sub.A2=0, then the two ends A.sub.1 and A.sub.2 both move along straight lines and the net orientation and length remains unchanged. If {right arrow over (a)}.sub.A1={right arrow over (a)}.sub.A2≠0, then A.sub.1 and A.sub.2 both move along identical arcs and again, Γ and r.sub.21 remain unchanged. When {right arrow over (a)}.sub.A1≠{right arrow over (a)}.sub.A2, the ensuing differential acceleration will cause the net to rotate as illustrated subsequently.
[0270] We provide below an analytical solution for Γ(t) and r.sub.21(t), when the input accelerations a.sub.A1 and a.sub.A2 are piecewise-constant in time. Refer
[0271] Here, A.sub.1A.sub.2 (represented by {right arrow over (L)}) is the net at time t=t.sub.1 while A.sub.1′A.sub.2′ (represented by {right arrow over (L)}′) is the net at time t=t.sub.2. Thus, |{right arrow over (L)}|=r.sub.21(t.sub.1) and |{right arrow over (L)}′|=r.sub.21(t.sub.2). Similarly, ∠{right arrow over (L)}=θ.sub.21(t.sub.1) and ∠{right arrow over (L)}′=θ.sub.21(t.sub.2). During the time interval t∈[t.sub.1, t.sub.2], A.sub.1 moves along the arc of a circle of radius
while A.sub.2 moves along the arc of another circle of radius
Since both A.sub.1 and A.sub.2 move with identical speed V.sub.A, therefore the arc lengths A.sub.1A.sub.1′, and A.sub.2A.sub.2′ are equal. From
and
are rotation matrices representing rotations by angles δ.sub.1 and δ.sub.2, respectively, about axes normal to the plane of the paper. We can see that
[0272] Substituting
we obtain
then becomes:
[0273] After substituting R.sub.δ.sub.
[0274] where, μ.sub.1≡γ.sub.A1−θ.sub.21(t.sub.1), μ.sub.2≡γ.sub.A2−θ.sub.21(t.sub.1), and μ≡μ.sub.1−μ.sub.2. From (1-79), the change in the net orientation Δθ.sub.L=∠L′−∠L is found to be:
[0275] Consider that we have a constraint on the change in the distance between A.sub.1 and A.sub.2, and the maximum permissible change is r.sub.max, that is, |{right arrow over (L)}′|−|{right arrow over (L)}|≤r.sub.max. Applying this to (1-80), we can infer that for a given μ.sub.i, μ.sub.2, V.sub.A and L, there will be a range of (a.sub.A1, a.sub.A2, ΔT) combinations that will ensure that ΔL remains less than r.sub.max. Using (1-80) and (1-81), we can construct contour plots of ΔL and Δθ.sub.L for different (a.sub.A1, a.sub.A2, ΔT) combinations.
[0276] The plots shown in
[0277] The plots in
[0278] We point out that (1-78)-(1-81) assumed the scenario in
[0279] Applying (1-82) to (1-80), we get the expression for ΔL (when a.sub.A1=0), as follows:
[0280] Similarly, the change in the orientation of the net can be obtained from (1-81) as follows:
[0281] Eqs (1-83) and (1-84) are thus special cases of (1-80) and (1-81), respectively.
[0282] To achieve interception with simultaneous net orientation, we employ (1-74), (1-80) and (1-81) as follows. During the initial phase of the engagement, the objective is to get the net sufficiently close to the intruder swarm, and toward this end, we use a.sub.A1=a.sub.A2 and employ (1-74) to determine a.sub.A1 and a.sub.A2. When the time-to-go becomes smaller than a threshold, we then begin to rotate the net. During this terminal phase, we simultaneously solve (1-74), (1-80) and (1-81), to determine the right combination of a.sub.A1, a.sub.A2 and ΔT by which interception with a desired net orientation can be achieved, while at the same time, keeping the change in the distance between A.sub.1 and A.sub.2 less than r.sub.max In determining a suitable solution, there is also the added flexibility, if required, of choosing a different interception point w on the sphere, and/or a different interception point λ.sub.i, i=1,2,3 on the net.
[0283] Orienting the Net in 3-D
[0284] We now examine orienting the net in 3-D (schematically represented in
[0285] where, ij=21 or 31. When {right arrow over (a)}.sub.Ai={right arrow over (a)}.sub.Aj, the relative velocity components between UAVs A.sub.i and A.sub.j will be zero, that is, V.sub.r,ij=0, V.sub.ϕ,ij=0, V.sub.θ,ij=0, and r.sub.ij is a constant. When {right arrow over (a)}.sub.Ai≠{right arrow over (a)}.sub.Aj (for any j≠i) for some time interval, the ensuing change in the orientation of the net, as well as the change in the length of the sides of the triangle A.sub.1A.sub.2A.sub.3 can be determined by an analysis of (1-85).
[0286] The orientation of the net is given by the normal {circumflex over (n)} defined in (1-6). Differentiating (1-6) with respect to time, we obtain:
[0287] from which, it is evident that the first derivative of the unit normal does not contain any acceleration related terms. We therefore compute the second derivative of the unit normal which, after some rearranging of terms, has the following form:
[0288] The application of acceleration(s) influences the terms {dot over (V)}.sub.r,21, {dot over (V)}.sub.r,31, {right arrow over ({umlaut over (r)})}.sub.21 and {right arrow over ({umlaut over (r)})}.sub.31 in (1-87). Substituting these acceleration-related terms from (1-85) in the above equation, we obtain the following:
[0289] In (1-88), for the sake of brevity, we have used a.sub.1, β.sub.i and α.sub.1 to represent a.sub.Ai, β.sub.Ai and α.sub.Ai, respectively. Eq (1-88) demonstrates the influence of differential accelerations on the dynamics of the normal vector {circumflex over (n)}. When {right arrow over (a)}.sub.A1={right arrow over (a)}.sub.A2={right arrow over (a)}.sub.A3=0, the ends A.sub.1, A.sub.2, A.sub.3 of the net all move along straight lines and the net orientation remains unchanged. When {right arrow over (a)}.sub.A1={right arrow over (a)}.sub.A2={right arrow over (a)}.sub.A3≠0, the ends A.sub.1, A.sub.2, A.sub.3 of the net move along arcs of identical radius of curvature, and again, the net orientation remains unchanged. When the acceleration vectors are not all equal, this will cause the net to rotate. For example, if a.sub.A1=a.sub.A3≠ a.sub.A2, then the net will rotate about the line A.sub.1A.sub.3. The side A.sub.1A.sub.3 will remain unchanged in length and orientation, while the sides A.sub.1A.sub.2 and A.sub.2A.sub.3 will experience changes.
[0290] Consider that differential acceleration is applied for a time interval [t.sub.1, t.sub.2] during the engagement. Then, the vector corresponding to {right arrow over (r)}.sub.21(t.sub.2) can be obtained from (1-79) as follows:
[0291] Here, R.sub.δ.sub.
about an axis û.sub.1, and R.sub.δ.sub.
[0292] Substituting (1-90) in (1-89), we can write {right arrow over (r)}.sub.21(t.sub.2) in terms of a.sub.A1, a.sub.A2 and ΔT. In a similar fashion, we can write {right arrow over (r)}.sub.31(t.sub.2) in terms of a.sub.A1, a.sub.A3 and ΔT, as well as {right arrow over (r)}.sub.32(t.sub.2) in terms of a.sub.A2, a.sub.A3 and ΔT. The new length of A.sub.1A.sub.2, that is, |{right arrow over (r)}.sub.21(t.sub.2)|−|{right arrow over (r)}.sub.21 (t.sub.i)| is obtained from (1-89). The new lengths A.sub.1A.sub.3 and A.sub.2A.sub.3 are similarly obtained. Then, similar to (1-6), we can write the orientation {circumflex over (n)}.sub.2 of the normal to the plane A.sub.1A.sub.2A.sub.3, at time t.sub.2 as:
[0293] Guidance for interception along with simultaneous net orientation in 3-D is achieved as follows. By a simultaneous solution of (1-91) with (1-69), and the length constraint equations, |{right arrow over (r)}.sub.21(t.sub.2)|−|{right arrow over (r)}.sub.21(t.sub.1)|≤r.sub.max and |{right arrow over (r)}.sub.32(t.sub.2)|−|{right arrow over (r)}.sub.32(t.sub.1)|≤r.sub.max, we can determine the appropriate values of a.sub.A1, a.sub.A2, a.sub.A3 and ΔT that will ensure interception with net rotation is achieved, with the constraint on the change in length of each of the sides of the triangle A.sub.1A.sub.2A.sub.3 being satisfied. The discussions given in Section IV.B for the 2-D case carry over here as well.
[0294] Implementation
[0295] In the preceding subsection, we addressed the scenarios where the net needs to rotate, and a by-product of this rotation is that the distance between the UAVs may change, and this can cause the net to stretch (or compress). The actual stretching and compression of the net can pose challenges in a real system of a triangular net being carried by three UAVs. The challenge arises mainly from the need to design a mechanism for fixing the net to the UAVs such that (a) the net does not hinder the operation of the UAVs (b) the material of the net should be able to withstand the stretching and (c) the compression of the net should not make the net sag substantially such that it hinders the motion of the UAV and capture of the intruder swarm.
[0296] While a mechanism to attach the net to the UAV and selection of the material of the net are substantial challenges in their own right, these are beyond the scope of the present disclosure. We discuss below a few ideas on how net stretching/compression can be avoided during a net rotation maneuver.
[0297] We assume that the net is attached to each UAV using cables that can be wound up or extended, using a spinning reel deployment mechanism (much like that in a fishing rod) carried by the UAV, as schematically shown in
[0298] Since each UAV can carry only a finite length of cable, there needs to be a bound imposed on the change in the distance between each pair of UAVs and this bound is imposed by the term r.sub.max in the preceding subsections. It also becomes important to choose the value of λ.sub.i in (1-1) appropriately so that the interception point lies on the net. We recall that in (1-1), we chose the interception point as a convex combination of the UAV positions, with λ.sub.1∈[0,1],i=1,2,3. With the scheme of
[0299] An implementation of the guidance laws will also need to include addressing the state estimation problem, in order to determine the target motion on the basis of sensor measurements, as well as the relative motion of the net-carrying UAVs.
[0300] Generalization to Spheroidal Bounding Surfaces
[0301] The development in the preceding sections assumed that the vehicles in the intruder swarm have been enclosed in a virtual sphere. In scenarios where the intruder vehicles are moving as a flock with a somewhat elongated shape, then bounding them with a sphere and choosing an intercept point inside this sphere might not always lead to the best results. In such cases, it would be advantageous to bound the swarm with a shape that is less conservative than a sphere. One possibility is to construct a virtual spheroid enclosing the swarm—and then use the net to intercept this spheroid. Such an engagement is schematically depicted in
[0302] The collision cone associated with a spheroid has been determined. In particular, it was demonstrated that the expressions for miss-distance and the time of closest approach between a point and a spheroid both moving with constant velocities, can be used to compute quantities
[0303] where, a is the semi-major axis of the spheroid and V.sub.rk,V.sub.ϕk,V.sub.θk, k=1,2 represent the relative velocity components of the foci k of the spheroid with respect to the point. Based on this, we state the following: If the point and the spheroid move with constant velocities, then the conditions
[0304] For this engagement, we can determine the counterpart to Theorem 1 as follows. Define an error function similar to (1-27) with y replaced by
[0305] Evaluating (1-29) along the system trajectories, we get:
which can be written in a compact form identical to the right hand side of (1-31), with Y.sub.1, Y.sub.2 and Y.sub.3 now representing the expressions within the square brackets in (1-95). With these new definitions of Y.sub.1, Y.sub.2 and Y.sub.3, N.sub.i has the same form as given in (1-34). After replacing y with
and a corresponding value of c.sub.max can be determined by following a series of steps similar to (1-54)-(1-66). Finally, Theorem 3 is also valid for this new engagement with (1-69) replaced by the following equation:
[0306] The above results represent a generalization of that presented in Section 3 as follows. When the two foci of the spheroid coincide, the spheroid becomes a sphere, and we have r.sub.1=r.sub.2, V.sub.θ1=V.sub.θ2, V.sub.ϕ1=V.sub.ϕ2, V.sub.r1=V.sub.r2, a=R. Then, the conditions
[0307] Thus, the problem of three UAVs carrying a net with the objective of capturing an intruder UAV swarm is addressed, using a collision cone approach. Depending on its geometry, the intruder UAV swarm is enclosed in either a virtual sphere, or a virtual spheroid. The collision cone approach is used to determine analytical guidance laws for the net-carrying UAVs, for both maneuvering and non-maneuvering intruder UAV swarms. Simulation results are presented to validate the theory. The method can also be extended to the scenario of n UAVs carrying an arbitrarily-shaped net, after making appropriate modifications in the equations.
[0308] It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the presently disclosed subject matter, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the presently disclosed subject matter. In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. One or more programs may implement or utilize the processes described in connection with the presently disclosed subject matter, e.g., through the use of an application programming interface (API), reusable controls, or the like. Such programs may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language and it may be combined with hardware implementations.
[0309] Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.