Submit manuscript...
eISSN: 2574-8092

International Robotics & Automation Journal

Mini Review Volume 4 Issue 6

PEG and control application-a survey

Devanathan R,1 Lairenjam Obiroy Singh2

1Department of Electrical and Electronics Engineering, Hindustan Institute of Technology Science, India
2Department of Electronics and Communication Engineering, Hindustan Institute of Technology Science, India

Correspondence: Devanathan R, Department of Electrical and Electronics Engineering, Hindustan Institute of Technology Science, Chennai 603103, India

Received: April 14, 2018 | Published: December 14, 2018

Citation: Devanathan R, Singh LO. PEG and control application-a survey. Int Rob Auto J. 2018;4(6):419-421. DOI: 10.15406/iratj.2018.04.00158

Download PDF

Abstract

A brief survey of pursuit evasion game (PEG) which has wide applications in search and rescue operations both in the civil and the military operations is given in the paper. One possible application of PEG is indicated in some detail.

Keywords: pursuit evasion game, bio-inspired strategy, game theory, robotic control, maritime surveillance

Introduction

Pursuit- evasion game (PEG) is concerned with guiding one or more of a group of pursuers to catch one or more of a group of moving evaders. The problem has extensive applications, such as searching buildings for invaders, traffic control, military strategy, surgical operation etc. A lot of research has been carried out on this problem. Pursuit evasion contests have been studied extensively from a game- theoretic perspective in the context of differential games.1 In engineering, pursuit evasion games have received much attention particularly in the context of missile guidance and avoidance2 and aircraft pursuit and evasion. Also, in the civilian applications it has applications in robotics vehicular network and search and rescue chase, pursuing terrorists etc. Pursuit evasion behavior is widely observed in nature. It plays a critical role in predator foraging, prey survival, mating and territorial battles in several species.3 Winning strategies in pursuit evasion in nature have been studied.4 In view of the wide application of pursuit evasion problem, solution to this problem in terms of real time implementation in an actual application is a matter of great importance.

Wei et al.5 have studied pursuit evasion problem using an evolutionary approach. In particular, they studied three strategies namely classical, constant bearing and motion camouflage. They provided simulation and theoretical analysis to show that all the pursuit strategies converge to the motion camouflage strategy. This has been supported by empirical observation of the behavior of hoverflies, dragonflies and bats that apply this strategy. The three strategies have been tested on computer simulation under the assumption that the pursuer is moving with a greater velocity compared to the evader and that the evader is moving without any knowledge/ feedback of the pursuer movement. But in practice the more general case may be applicable such as either the pursuer/evader having higher velocity and the velocities not constant throughout the search. Also, the higher velocity agents may not be able to do a quick maneuver whereas the lower velocity agent may have the advantage of agile maneuverability. Also, the evader may have a visual feedback of the pursuer position and speed. So, in such cases, what is the winning strategy to be adapted by the pursuer? Also, in the pursuit evasion game situation mentioned earlier, if it is preferable to put robots instead of humans, the search strategies must be computed automatically for a mobile robot.

That brings us to consider the pursuit strategies as means of control. In as much as the motion camouflage appears to be a successful strategy favored by evolution, Obiroy and Devanathan6,7 extended the motion camouflage feedback laws given in3 to include integral and derivative control action. This extension is shown to dramatically improve the time and the distance to capture the evader for the first time.

Pursuit–evasion system

We model planar pursuit interactions using gyroscopically interacting particles, as in Wei, Justin and Krishnaprasad.5,8,9 The (unit speed) motion of the pursuer is described by

r ˙ p =  x p ,  x ˙ p = y p u p ,  y ˙ p =  x p u p MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qaceWGYbWdayaacaWaaSbaaKqbGeaapeGaamiCaaqcfa4daeqa a8qacqGH9aqpcaGGGcGaamiEa8aadaWgaaqcfasaa8qacaWGWbaaju aGpaqabaGaaiila8qacaGGGcGabmiEa8aagaGaamaaBaaajuaibaWd biaadchaaKqba+aabeaacqGH9aqppeGaamyEa8aadaWgaaqcfasaa8 qacaWGWbaajuaGpaqabaWdbiaadwhapaWaaSbaaKqbGeaapeGaamiC aaWdaeqaaKqbakaacYcapeGaaiiOaiqadMhapaGbaiaadaWgaaqcfa saa8qacaWGWbaajuaGpaqabaGaeyypa0JaeyOeI0YdbiaacckacaWG 4bWdamaaBaaajuaibaWdbiaadchaaKqba+aabeaapeGaamyDa8aada Wgaaqcfasaa8qacaWGWbaajuaGpaqabaaaaa@58FD@ (1)

Where rp is the position of the pursuer, xp its velocity and yp is the acceleration of the pursuer. The motion of the evader (withspeed ʋ) is given by

r ˙ e = υ x e , x ˙ e =υ y e u e ,  y ˙ e =υ x e u e MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qaceWGYbWdayaacaWaaSbaaKqbGeaapeGaamyzaaWdaeqaaKqb akabg2da98qacaGGGcGaeqyXduNaamiEa8aadaWgaaqcfasaa8qaca WGLbaajuaGpaqabaGaaiila8qaceWG4bWdayaacaWaaSbaaKqbGeaa peGaamyzaaWdaeqaaKqbakabg2da98qacqaHfpqDcaWG5bWdamaaBa aajuaibaWdbiaadwgaaKqba+aabeaapeGaamyDa8aadaWgaaqcfasa a8qacaWGLbaapaqabaqcfaOaaiila8qacaGGGcGabmyEa8aagaGaam aaBaaajuaibaWdbiaadwgaa8aabeaajuaGcqGH9aqppeGaeyOeI0Ia eqyXduNaamiEa8aadaWgaaqcfasaa8qacaWGLbaapaqabaqcfa4dbi aadwhapaWaaSbaaKqbGeaapeGaamyzaaqcfa4daeqaaaaa@5BB2@ (2)

where re is the position, xe is the velocity and ye is the acceleration of the evader. The steering control of the evader, , is prescribed or controlled, and the steering control of the pursuer, u p MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacaqG1bWdamaaBaaajuaibaWdbiaabchaaKqba+aabeaaaaa@399B@ is given by a feedback law. We also define

r= r p r e MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacaWGYbGaaeypaiaadkhapaWaaSbaaKqbGeaapeGaamiCaaWd aeqaaKqbakabgkHiT8qacaWGYbWdamaaBaaajuaibaWdbiaadwgaa8 aabeaaaaa@3EAE@ (3)

Which is referred to as the ‘baseline’ between the pursuer and the evader?

Simulation is done by using P, PI, PID feedback control laws for motion camouflage strategy. Γ MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacqqHtoWraaa@380D@ is defined as the cost function and Γ' MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacaqGtoGaae4jaaaa@3868@ is obtained by rotating Γ MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacqqHtoWraaa@380D@ counter clockwise by π 2 MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qadaWcaaWdaeaapeGaeqiWdahapaqaa8qacaaIYaaaaaaa@396C@ radian.

P control: u p = μ 1 Γ' MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacaWG1bWdamaaBaaajuaibaWdbiaadchaaKqba+aabeaapeGa eyypa0JaeyOeI0IaeqiVd02aaSbaaKqbGeaacaaIXaaabeaajuaGca qGtoGaae4jaaaa@40B2@

PI control: u p = μ 1 Γ'- μ 2 Γ dt MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacaWG1bWdamaaBaaajuaibaWdbiaadchaaKqba+aabeaapeGa eyypa0JaeyOeI0IaeqiVd02aaSbaaKqbGeaacqGHXaqmaeqaaKqbak abfo5ahjaabEcacaqGTaGaeqiVd02aaSbaaKqbGeaacqGHYaGmaeqa aKqbakabgUIiYlqbfo5ah9aagaqba8qacaWGKbGaamiDaaaa@4AA7@

PID control: u p = μ 1 Γ'- μ 2 Γ dt μ 3 d dt Γ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaqcfaieaaaaaa aaa8qacaWG1bWdamaaBaaajuaibaWdbiaadchaaKqba+aabeaapeGa eyypa0JaeyOeI0IaeqiVd02aaSbaaKqbGeaacqGHXaqmaeqaaKqbak abfo5ahjaabEcacaqGTaGaeqiVd02aaSbaaKqbGeaacqGHYaGmaeqa aKqzGeGaey4kIiFcfaOafu4KdC0dayaafaWdbiaadsgacaWG0bGaey OeI0IaeqiVd02aaSbaaKqbGeaacqGHZaWmaeqaaKqbaoaalaaapaqa a8qacaWGKbaapaqaa8qacaWGKbGaamiDaaaacuqHtoWrpaGbauaaaa a@5444@

Figure 1 shows the effect of applying motion camouflage to a two particle system representing pursuer and evader in a two dimensional plane. Figure 1A shows the baseline between the pursuer and the evader (the line joining the pursuer and the evader at any given time) as the game proceeds with the camouflage feedback (proportional-P) law alone. Figure 1B shows the baseline variation corresponding to the case when integral (I) and derivative (D) feedback laws are applied in addition to the proportional (P) law based on camouflage strategy. Figure 1C, Figure 1D show the individual pursuer and evadertrajectoriesfor the cases P control alone and PID control respectively using camouflage strategy. Clearly the performance (in terms of shorter time for the pursuer to capture evader) is obtained with the PID control combined with the motion camouflage strategy compared to P-alone with the camouflage strategy.

Figure 1 Pursuit evasion considered as two particle system in a two dimensional plane.

Application of PEG

One of the possible applications of PEG is the protection and monitoring of marine assets. India has over 7500 km long coastline, Numerous Economic Exclusive Zones, nearly 1400 mostly uninhabited islands, ports (12 major and 200 non- major), industrial units, military installations, oil refineries, nuclear power plants, satellite and missile launching ranges at the coastline area. Surveillance of the possible menace in the vast 2million square kilometers and protection of these assets has been a huge challenge for the country especially after the Mumbai attack in 2008.

Marine Police, Indian Coast Guard and Indian Navy provide a three-tier coastal security ring all along our coast. The intelligence mechanism along the coastline is also streamlined using various opto-electronic sensors including various radar stations. In spite of these, one could consider the problem of a menace, for example, that a manned hostile boat may appear anywhere in the considered coastal area. Unmanned Surface Vehicle (USV) surveillance of the coastline could be a possible solution to solve the menace.10 The proposed solution will have two criteria first one is that there should be at least one USV to intercept the menace before it reaches the safety zone. It is required to find out the optimum number of USV and minimum time to react when menace does appear against any given area of asset to be protected. Further, additional interceptor boats can be sent both (manned and unmanned) if the threat is real. The second criterion is for minimizing the maximum intercepting time. The key point here is the selection of the interceptor having the lowest reaction time towards the menace location. Path planning methods will be used for maneuvering through the obstacle both static as well as dynamic. Obviously PEG theoretic concepts can play a key role in protecting the asset in the above application.

Acknowledgements

None.

Conflicts of interest

The author declares there are no conflicts of interest.

References

  1. Isaacs R. Differential Games. New York: Wiley; 1965.
  2. Savec P, Thakur A, Shah BC, et al. USV Trajectory Planning For Time Varying Motion Goals in an Environment with Obstacles. ASME 2012 International Engineering Technical Conferences (IDEC) and Computers and Information in Engineering conference(CIE). 2012;1297–1306.
  3. Steven LaValle M, Hinrichsen JE. Visibility-Based Pursuit-Evasion: The Case of Curved Environments. IEEE Transactions onRobotics and Automation. 2001;17(2):196–201.
  4. Darren Pais, Naomi Leonard E. Pursuit and Evasion: Evolutionary Dynamics and Collective Motion. AIAA Guidance, Navigation and Control Conf. 2010;1–14.
  5. Wei E, Justh EW, Krishnaprasad PS. Steering laws for Motion Camouflage. Proc R Soc A. 2006;462(3629–3643).
  6. Lairenjam Obiroy Singh, R Devanathan. Performance Improvement of Bio-Inspired strategies through Feedback laws. Advances in Intelligent Systems and Computing. 2017;735:143–156.
  7. Lairenjam Obiroy Singh, R Devanathan. Comparative Study of the Performance of Application of Bio-Inspired Strategies to Pursuit Evasion Game under Feedback Laws. 18th International Conference on Control, Automation and Systems (ICCAS 2018) accepted.
  8. E Wei, Justh EW, Krishnaprasad PS. Natural frames and interacting particles in three dimensions. 44th IEEE Conf. Decision and Control. 2005;2841–2846.
  9. Wei E, Justh EW, Krishnaprasad PS. Pursuit and an evolutionary game. Mathematical, Physical and Engineering Sciences. 2009;465:1539–1559.
  10. Jean Walrand, Polak E, Chung H. Harbor attack: A pursuit-evasion game. 49th Annual Allerton conference. 2011;1585–1591.
Creative Commons Attribution License

©2018 Devanathan, et al. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.