Cooperative Multi-UAV Collision Avoidance Based

1 downloads 0 Views 4MB Size Report
Jan 17, 2017 - Abstract: A critical requirement for unmanned aerial vehicles (UAV) is the collision avoidance (CA) capability to meet safety and flexibility issues ...
applied sciences Article

Cooperative Multi-UAV Collision Avoidance Based on Distributed Dynamic Optimization and Causal Analysis Mingrui Lao 1,2 and Jun Tang 1,3, * 1 2 3

*

Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China; [email protected] The School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, China Department of Telecommunication and System Engineering, Universitat Autònoma de Barcelona, Sabadell 08201, Spain Correspondence: [email protected]; Tel.: +34-688-113-447

Academic Editor: Josep M. Guerrero Received: 1 December 2016; Accepted: 12 January 2017; Published: 17 January 2017

Abstract: A critical requirement for unmanned aerial vehicles (UAV) is the collision avoidance (CA) capability to meet safety and flexibility issues in an environment of increasing air traffic densities. This paper proposes two efficient algorithms: conflict detection (CD) algorithm and conflict resolution (CR) algorithm. These two algorithms are the key components of the cooperative multi-UAV CA system. The CD sub-module analyzes the spatial-temporal information of four dimensional (4D) trajectory to detect potential collisions. The CR sub-module calculates the minimum deviation of the planned trajectory by an objective function integrated with track adjustment, distance, and time costs, taking into account the vehicle performance, state and separation constraints. Additionally, we extend the CR sub-module with causal analysis to generate all possible solution states in order to select the optimal strategy for a multi-threat scenario, considering the potential interactions among neighboring UAVs with a global scope of a cluster. Quantitative simulation experiments are conducted to validate the feasibility and scalability of the proposed CA system, as well as to test its efficiency with variable parameters. Keywords: collision avoidance; UAV; 4D trajectory; distributed dynamic optimization; casual analysis

1. Introduction Recently, the unmanned aerial vehicle (UAV) has received a wide range of urban, civilian and warfare applications [1]. It offers several extraordinary features, especially the acceptance of long-endurance and high-risk missions that could not be reasonably performed by manned aircraft. For any assignment, a common problem is that the UAVs may encounter each other. Consequently, an effective collision avoidance (CA) system is a prerequisite for free flight. There are several existing widely used or adequately evaluated CA systems for conventional aviation, and these can be applied on UAVs, such as the efficient Medium Term CA approach based on four-dimensional (4D) trajectories (trajectories defined in the three spatial dimensions together with a time-stamp) to resolve conflicts in a terminal maneuvering area (TMA) [2], the Traffic Alert and Collision Avoidance System (TCAS) equipped to issue advisories on how to maneuver vertically to prevent collisions [3], and the Airborne Separation Assurance System (ASAS) that enables the flight crew to maintain separation of an aircraft from one or more other aircraft and provides flight information concerning the surrounding traffic [4]. There are also several auxiliary systems that could provide the aircraft (or UAVs) with precise information about the state of the nearby traffic, such as the Automatic Dependent Surveillance Broadcast (ADS-B) system [5–7]. Appl. Sci. 2017, 7, 83; doi:10.3390/app7010083

www.mdpi.com/journal/applsci

Appl. Sci. 2017, 7, 83

2 of 14

In addition, an extensive and meticulous survey of various methodologies ranging from abstract concepts to prototype systems for avoiding collisions between UAVs has been summarized in [4]. Typical techniques applied to escort UAV safety include the Monte Carlo approach [8], geometric optimization model [9], symbiotic simulation [10], probabilistic approach [11], consensus [12], evolutionary algorithm [13,14], Kalman filter [15], Markov decision process [16], Dubins curve based algorithm [17], Predictive Control [18], reachable sets based methods [19], and so on. Each method has its own advantages and characteristics, and no matter which is employed, it aims to guarantee minimum separation between UAVs. However, some of the studies only focus on the two-UAV scenarios (not multiple vehicles). Furthermore, most of these methodologies could not support exploring the emergent dynamics between the generated trajectories and the surrounding traffic. Thus, there is a need to check the detailed states of the CA process with a global view to achieve the optimal strategy, while it is essential to understand the cause–effect relationship of each CA action and how the effects of a maneuver impact on the neighboring aircraft. Note that tight couplings between aircraft trajectories in dense scenarios (i.e., flocks applications) can deal with the propagation of non-controllable upstream and downstream maneuvers between trajectories. The overextended UAV usage of flock applications would lead to a higher number of threats, which could raise the risk of potential collisions. For simplicity, the CA problem is currently being discussed on UAVs (without pilot intervention) that are flying in a segregated airspace. In this paper, it is assumed that a group of cooperative UAVs, which are stabilized by the autopilot, are flying to their own destination and having to avoid collisions with other UAVs in an efficient real-time communication. Each vehicle is equipped with a trajectory control unit which relies on the CA algorithm that is used as a predictive control considering real-time data-link communication with surrounding traffic. In this research, we propose two efficient algorithms: conflict detection (CD) and conflict resolution (CR), which, as two sub-modules, constitute a novel CA system for multi-UAV. The main contributions of this paper are as follows:







This paper presents an innovative strategy, distributed dynamic optimization approach (DDOA), to provide alternative trajectories for each UAV, by adding some essential constraints (i.e., performance, cost and distance) to make the problem treatable while the feasible trajectory generation for multi-UAV is a non-deterministic polynomial (NP) problem. The novel causal analysis is developed to choose a preferred resolution trajectory, performing an analysis of scenario state space in order to explore the dynamic evolution and then determine all reachable states. By decomposing the complex scenario into several common clusters, the solution space is greatly reduced. Quantitative measurement experiments are carried out to validate the feasibility and scalability of the CA system for the free flight of multi-UAV. In addition, the average computation time does not grow exponentially as the airspace density increases.

To prevent mid-air collisions between UAVs, the proposed CA system has been developed to serve as the last-resort safety net, which is an on-board CDR system providing resolution advisories. This paper is organized as follows: Section 2 illustrates the CA system functional architecture; Section 3 presents the core algorithm of the CD and CR sub-modules; Section 4 achieves the simulation results using the proposed system; finally, conclusions and future work are summarized in Section 5. 2. The Proposed CA System Architecture The CA system should be supported by vigorous algorithms to increase the airspace capacity. Figure 1 illustrates the detailed fundamental processes of the complete CA system, in which the input is the 4D (three dimensions (3D) position + time) trajectory information belonging to each UAV; a high speed processor equipped with CD algorithm deals with the trajectories and obtains relevant information to predict whether a collision is going to occur in the future. If a potential collision is detected, DDOA computes the feasible solutions and causal analysis selects the optimal

95 96 95 96

Appl. Sci. 2017, 7, 83

3 of 14

Appl. 2016, 6,xFOR PEER

3 of 14

one. The control command is sent to the involved UAVs to resolve current threats and the states Appl. 2016, 3 of 14 one. The 6,xFOR controlPEER command is sent to the involved UAVs to resolve current threats and the states improve online. improve online. one. The control command is sent to the involved UAVs to resolve current threats and the states improve online.

97 97 98 98 99 100 99 101 100 102 101 103 102 104 103 105 104 106 105 107 106 108 107 109 108 110 109 111 110 112 111 113 112 114 113 115 114 115

Figure 1. Functionalarchitecture architecture of of the the novel novel collision collision avoidance avoidance (CA) (CA) system. system. 1.Functional

Figure 1.FunctionalCA architecture of the novel collision avoidance (CA) system. The system consists consists of two two components: The core core of of the the operational operational CA system of components: • The CD module that analyzes the flight information depending on 4D trajectory has two The core of the operational CA system consists of two components: The CD module that analyzes the flight representation information depending 4Dinforming trajectory the has CR twomodule. different • different roles: generating the intuitionistic of threatson and • The CD module that analyzes the flight information depending on 4D trajectory has two roles:The generating the intuitionistic representation threats and informing CRstages: module. • CR module integrates CD and resolvesofthe detected conflicts inthe two DDOA different roles: generating the intuitionistic representation of threats and informing the CR module. aims to avoid collisions by generating alternative trajectories each UAV with a local optimization • The CR module integrates CD and resolves the detectedfor conflicts in two stages: DDOA aims to • The CR module integrates CD and resolves the detected conflicts in two stages: DDOA scope; causal analysis focuses on exploring the emergent the alternative avoid collisions by generating alternative trajectories for eachdynamics UAV with abetween local optimization scope; aims to avoid collisions by generating alternative trajectories for each UAV with a local optimization trajectories generated by DDOA and the rest involved trajectories. Based on the detected threats, the causal analysis focuses on exploring the emergent dynamics between the alternative trajectories scope; causal analysis focuses on exploring the emergent dynamics between the alternative CR should be informed with thethe geographical coordinates where theon collision would threats, occur, the generated by DDOA and rest involved trajectories. Based the detected thetime CR trajectories generated by DDOA and the rest involved trajectories. Based on the detected threats, the whenshould the collision wouldwith occur, the involved UAVs. Though CRcollision is a combinatorial problem in be informed theand geographical coordinates where the would occur, the time CR should be informed with the geographical coordinates where the collision would occur, the time exponential growth with the increasing number of UAVs, in our research several strategies such as when the collision would occur, and the involved UAVs. Though CR is a combinatorial problem in when the collision would occur, and the involved UAVs. Though CR is a combinatorial problem in setting constraints are needed narrow the solution spaceinprogressively to get the final optimal exponential growth with thetoincreasing number of UAVs, our research several strategies such as exponential growth with the increasing number of UAVs, in our research several strategies such as solution. Figure 2 conceptually The DDOA several setting constraints are neededillustrates to narrowthe thesolution solution procedure. space progressively to getgenerates the final optimal setting constraints are needed to narrow the solution space progressively to get the final optimal locally-optimal CA trajectories considering different constraints, e.g., the two UAVsgenerates should meet the solution. Figure 2 conceptually illustrates the solution procedure. The DDOA several solution. Figure 2 conceptually illustrates the solution procedure. The DDOA generates several performance requirements, satisfy considering the state equation, keep a e.g., safe the distance, etc. should This causal locally-optimal CA trajectories differentand constraints, two UAVs meet locally-optimal CA trajectories considering different constraints, e.g., the two UAVs should meet the analysis allows takingrequirements, into consideration possible solutions that ensure the completeness of the performance satisfy all thethe state equation, and keep a safe distance, etc. This causal performance requirements, satisfy the state equation, and keep a safe distance, etc. This causal the solution theninto reduces the spaceallonce again based on some constraints (e.g., analysisspace, allowsand taking consideration the possible solutions that specific ensure the completeness analysis allows taking into consideration all the possible solutions that ensure the completeness of the least cost). of the solution space, and then reduces the space once again based on some specific constraints the solution space, and then reduces the space once again based on some specific constraints (e.g., (e.g., the least cost). the least cost). Causal analysis with constraints Causal analysis with constraints Causal analysis

Optimal Solution Optimal Solution

DDOA Causal analysis with constraints DDOA with DDOA constraints DDOA

116 117 116

Figure 2.Step‐by‐step optimal process.

117 118 119 118 120 119 121 120 122 121 123 122 124 123 124 125

Figure 2. Step-by-step optimal Figure 2.Step‐by‐step optimal process. The hardware architecture of the novel CA system consists of the following major components: CA processor—performs airspace surveillance, intruder tracking, own UAV state tracking, conflict The hardware hardware architecture architecture of of the the novel CA CA system system consists consists of of the the following following major major components: components: The detection and conflict resolution, and novel it uses discrete status inputs of involved UAVs to control the CA processor—performs processor—performs airspace airspace surveillance, surveillance, intruder tracking, own UAV state tracking, tracking, conflict conflict CA intruder tracking, logic parameters that determine the protection volume around own ownUAV UAV;state State transmitter—is detection and conflict resolution, and it uses discrete status inputs of involved UAVs to control the detection and conflict resolution, and it usesbetween discrete UAVs status inputs involved UAVs to control the CA CA used to provide air-to-air data exchange so thatofcoordinated, complementary CA logic parameters that determine the protection volume around own UAV; State transmitter—is logic parameters determine protection volume around own UAV; State transmitter—is to trajectories can bethat issued when the required; Control unit—guarantees the multiple cooperativeused UAVs used to provide air-to-air data exchange between UAVs so that coordinated, complementary CA provide air-to-air data exchange between UAVs so that following the generated optimal trajectory to resolve thecoordinated, conflicts. complementary CA trajectories trajectories can be issued when required; Control unit—guarantees the multiple cooperative UAVs following the generated optimal trajectory to resolve the conflicts. 3. Core Algorithm Analysis

125

3. Core Algorithm Analysis

Appl. Sci. 2017, 7, 83

4 of 14

can be issued when required; Control unit—guarantees the multiple cooperative UAVs following the generated optimal trajectory to resolve the conflicts. 3. Core Algorithm Analysis 3.1. Representation of 4D Trajectory and Conflict Detection The continuous trajectory of UAV can be modeled as a sequence of discrete points (waypoints) expediently for computer processes. There is a direction between every two adjacent waypoints due to the velocity vector. The position of 3D and corresponding time—called spatial-temporal information—makes up the 4D trajectory of each UAV. For U AVi (i = 1, 2, ..., n), its dynamic characteristics can be described in a Cartesian coordinate system [20]. The region formed by x and y axes indicates the horizontal plane, and z stands for the altitude. 

 xti   pit =  yit , vit = zit dϕit dt

= ωti ,



dpit dt

   vix,t vit cos ϕit cos θti     =  viy,t  =  vit cos ϕit sin θti  vit sin ϕit viz,t

0 < θti < 2π,

− π2 ≤ ϕit ≤

(1)

π 2

The formula defines pit and vit , respectively, as the position and velocity of UAVi in 3D; let θti represent the course angle, the orientation of velocity vector vit in the x-y plane (measured from the x axis in counter-clockwise direction); let ϕit delegate the pitch angle, the orientation of velocity vector vit in the vertical plane (measured from the horizontal plane up as positive and down as negative); and ωti is the angular velocity. Considered simply, each UAV is supposed to keep its own velocity vi , i ∈ {1, 2, · · · , n} during regular flight. In the detection sub-module, the UAV that detects the conflict will read out the sensed data from sensor unit and check whether any intruder enters its safety zone. At each moment t, the relative distance between UAVi and nearby UAVj in the airspace can be simply calculated as: r ij Rt

=

j 2

j 2

j 2

( xti − xt ) + (yit − yt ) + (zit − zt )

(2)

In this research, the conflict detection logic can be defined as follows: if the current relative ij distance of the two UAVs is smaller than the Rcf ( Rt < Rc f ), and they have a trend to be closer, ij

i.e., when the value of Rt that is the relative distance between UAVi and nearby UAVj is getting smaller, the resolution maneuver fires regardless of whether the coming closest point of approach (CPA) [21] is in collision volume Rcl or not. Despite the fact that this way certainly may touch off several unnecessary resolution maneuvers, the collision risk is highly reduced since the situation in whichthe intruder suddenly changes its direction near the CPA is prevented. ij j Let pt = pit − pt be the distance vector in 3D space between UAVi and nearby UAVj at time t; ij

j

let vt = vit − vt be the relative velocity (closing speed) between the UAVs at time t. Distinctly, when ij

ij

the two UAVs are getting closer to each other (i.e., pt · vt > 0), a conflict is detected and it has to be ij

ij

resolved immediately; when the two UAVs are getting further apart (i.e., pt · vt < 0), there is no risk to deteriorate into a collision at all. 3.2. Conflict Resolution Algorithm This section focuses on the CR algorithm consisting of two subsections: DDOA and causal analysis. Different alternative trajectories for each involved UAV are generated by DDOA in a collision, and the globally optimal one is selected by causal analysis considering the follow-up effects.

Appl. Sci. 2017, 7, 83

5 of 14

3.2.1. Distributed Dynamic Optimization Approach The UAVi trajectory is discrete and the sampling interval is ∆t. Therefore, in the m-th moment, the related position and pitch angle of UAVi are xi (m), yi (m), zi (m), ϕi (m), m ∈ N. The discrete kinematic model of UAVi is:     x i ( m + 1) xi (m) + vi cos( ϕi (m)) cos θi · ∆t  y (m + 1)   y (m) + v cos( ϕ (m)) sin θ · ∆t    i   i i i i (3)  =   z i ( m + 1)    zi (m) + vi (sin ϕi (m)) · ∆t ϕ i ( m + 1) ϕi (m) + ωti · ∆t In order to generate an amending trajectory for CA, it is better if each UAV could adjust its track as few times as possible, execute the trajectory as shorter as possible and reach the target point as soon as possible. Therefore, at time m, the objective function Oi (m) of UAVi comprises three aspects above: Oi (m) = w1 Ci (m) + w2 Di (m) + w3 Ti (m)

(4)

In this formula, w1 , w2 , w3 are the corresponding weight coefficients of the three indexes Ci (m), Di (m), Ti (m). Their values reflect different application contexts, e.g., w3 > w1 indicates that the controllers prefer shorter time to achieve the destination even if the fuel cost is higher. Before the computation, normalization processing is needed. The three indexes can be calculated using the following formulas. ( | ϕi (m) − ϕi (m − 1)| i f m ≥ 1 Ci (m) = (5) 0 if m = 0 where Ci (m) expresses the track adjustment cost of UAVi, which is defined as the change value of pitch angle. h i 2 2 2 1/2 Di (m) = k pi (m) − pid k2 = ( xi (m) − xid ) + (yi (m) − yid ) + (zi (m) − zid )

(6) T

where Di (m) indicates the distance from current location to its destination pid = ( xid , yid , zid ) . Ti (m) = m · ∆t + Di (m)/vi

(7)

where Ti (m) represents the total flight time of UAVi. Assume that there are N intervals from time m to the destination, thus the position and corresponding pitch angle sequences of UAVi in [m, m + N − 1] are respectively: ∆

Pi = [ pi (m), pi (m + 1), · · · , pi (m + r ), · · · , pi (m + N − 1)] T ∆

Ψi = [ ϕi (m), ϕi (m + 1), · · · , ϕi (m + r ), · · · , ϕi (m + N − 1)] T ∀r ∈ [0, N − 1]

(8)

The objective function for progressive optimization is: N −1

minOi (m + r ) = min(



(w1 Di (m + r ) + w2 Ti (m + r ) + w3 Ci (m + r )))

(9)

r =0

Note that it should meet the following constraints in the optimization process: " q( ϕi (m + r )) =

1 −1

#

" Ci (m + r ) −

B −A

#

"

=

1 −1

#

"

( ϕi (m + r ) − ϕi (m + r − 1)) −

B −A

#

≤0

(10)

Appl. 2016, 6, 83

6 of 14

 xi (m  r )  [ xi (m  r  1)  vi cos(i (m  r  1)) cos i  t ] 6 of 14  y (m  r )  [ y (m  r  1)  v cos( (m  r  1))sin   t ] i i i i i 0 ei ( pi (m  r ))   (11)  zi (m  r )  [ zi (m  r  1)  vi (sin i (m  r  1))  t ]      xi (m + r ) − [ xi (m + r − 1(m )+  rv)i cos i ((mϕi (rm) + r − 1)) cos θi · ∆t]  i  y (m +r ) − [y (m + r − 1 ) + v cos ( ϕi (m + r − 1)) sin θi · ∆t]   i i i (11) ei ( pi (m + r )) =  =0  di ( piz(im (m + )− [zi (rm))+rd− 1) + vi (sin + r− r ),r p r ) ϕi (pmj (m r ) 1))·0∆t] (12) j (m  0  pi (m 2 ϕi ( m + r ) − ϕi ( m + r ) In the above formulas, q(i (m  r ))  0 explains that the value change of UAVi pitch angle di ( pi (m + r ), p j (m + r )) = d0 − k pi (m + r ) − p j (m + r )k2 ≤ 0 (12) should be in the variation range of (A,B); ei ( pi (m  r ))  0 shows that the calculation of UAVi In the above formulas, q( ϕi (m + r )) ≤ 0 explains that the value change of UAVi pitch angle position and pitch angle at time m + r is based on the corresponding information at m + r − 1; should be in the variation range of (A,B); ei ( pi (m + r )) = 0 shows that the calculation of UAVi di ( pi (m  r ), p j (m  r ))  0 illustrates that the distance between UAVi and UAVj must not be shorter position and pitch angle at time m + r is based on the corresponding information at m + r − 1; the minimum d0. dthan ( p ( m + r ), p j (m +safe r )) distance ≤ 0 illustrates that the distance between UAVi and UAVj must not be shorter i i Integrating the objective function with constraints, the next waypoint ( pi (m  1), i (m  1)) can than the minimum safe distance d0 . be calculated based the current statewith the optimization ( pi (constraints, m), i (m)) . Repeating Integrating the on objective function the next waypoint ( pi (m +procedure, 1), ϕi (m + the 1)) can be calculated based on the current state ( p ( m ) , ϕ ( m )) . Repeating the optimization procedure, complete amending trajectory made up of a series of discrete waypoints is generated. i i the complete trajectory made up of a series of discrete waypoints is generated. Besides, amending the algorithm for generating CA waypoints is robust enough to resolve successive Besides, the algorithm for generating waypoints is robust enough in to resolve threats. threats. For example, if UAV1 encountersCA UAV2 and UAV3 seperately a short successive interval, the two For example, if UAV1 encounters UAV2 and UAV3 seperately in a short interval, the two threats threats could be resolved via a compositive CA trajectory withonly a distance constraint between could resolved via a compositive CA trajectory withonly a distance constraintminimum between UAV1 and UAV1 be and UAV3 added to the optimization calculation.This section calculates deviation UAV3 to the optimization section calculates minimum deviation of the planned of the added planned trajectory by an calculation.This objective function integrated with track adjustment, distance, and trajectory by an objective function integrated with track adjustment, distance, and time costs, taking time costs, taking into account the vehicle performance, state and separation constraints. into account the vehicle performance, state and separation constraints. 3.2.2. Causal Analysis 3.2.2. Causal Analysis The size (computational complexity) of the conflict resolution problem is typically very large, The size (computational complexity) of the resolution problem is typically large, which represents a real challenge to deal with theconflict exponential growth of the state space invery a realistic which represents a real challenge to deal with the exponential growth of the state space in a realistic environment containing dozens of UAVs. A highly efficient technique to reduce the problem size is environment containing dozens A highly efficient to reduce the problem sizeon is clustering [22]. The scenario can of beUAVs. decomposed into severaltechnique sets of independent clusters based clustering [22]. between The scenario can trajectories be decomposed into several setsThe of independent clusters based on the interaction planned for a period of time. partition principle is mainly in the interaction between planned trajectories for a period of time. The partition principle is mainly in view of the distances between the neighboring UAVs. These independent clusters can be processed view of theto distances between the neighboring UAVs. 3These clusters can be processed in in parallel significantly improve efficiency. Figure is theindependent concept illustration. parallel to significantly improve efficiency. Figure 3 is the concept illustration. Appl. Sci. 2017, 7, 83

U

UA V3

Tr 3

Cluster B UA T V1 r2 Tr 1 Tr1 1

r 11 1T UAV Tr1 UAV1

Cluster A Tr11

Tr1

UAV2

V2 A

T r2

Cluster C Solution for original situation Without clusters Solution for cluster B

UAV2 Tr2

Solution for cluster C

Tr21

UAV3 Tr3

Tr31

Solution for cluster A

Figure 3. Concept illustration of clustering. Figure 3. Concept illustration of clustering.

The is decomposed into several clustersclusters with treatable sizes withsizes few trajectories. The original originalproblem problem is decomposed into several with treatable with few Thus, the overall solution is a combination of conflict-free solutions obtained by a causal trajectories. Thus, the overall solution is a combination of conflict-free solutions obtained by analysis a causal for thesefor regional clusters.clusters. The core idea ofidea the of causal analysis is to explore the state space of the analysis these regional The core the causal analysis is to explore the state space of CA scenario to achieve the optimal resolution. It utilizes the alternative trajectories and relevant cost the CA scenario to achieve the optimal resolution. It utilizes the alternative trajectories and relevant

cost generated by the DDOA, which includes the track adjustment, distance, and time costs.

Appl. Sci. 2017, 7, 83 Appl. 2016, 6, 83 Appl. 2016, 6, 83

7 of 14 7 of 14 7 of 14

generated DDOA, which includes the track adjustment, and time costs.amendment Therefore, Therefore, by forthe n UAVs involved in the same scenario, the total distance, cost of the trajectories Therefore, for n UAVs involved in the same scenario, the total cost of the trajectories amendment for n UAVs involved in the same scenario, the total cost of the trajectories amendment can be defined as: can be defined as: can be defined as: n Nn−N1 1

n N 1 Cost   C(im (m rr)) + D mm+r )r) T m  r) CostCost =∑ CC Di i(((m +ii ((T i (m+ ∑    r)  D  r)  T mi (mr )+ r ) i i 1 r  0 i

(13) (13) (13)

i =1 ir= 1 0r  0

The process state could be described by a specific four-tuple: The process state could be described by a specific four-tuple: four-tuple:

  •  •  •   •

conflict , cost ,(active UAV ),(resolution trajectories) (14) , cost(,(active active U UAV ))} conflict (14) f lict, cost, AV),( ), (resolution resolution trajectories trajectories (14) {con An instance state a = {2,1,(1,2,3),(11,111,31,32)} is used to explain the tuple. An instance state a = {2,1,(1,2,3),(11,111,31,32)} is used to explain the tuple. An instance state a = {2,1,(1,2,3),(11,111,31,32)} is used to explain the tuple. Conflict: indicates the threat that will be resolved (conflict 2 is active in state a). Conflict: indicates the threat that will be resolved (conflict 2 is active in state a). Conflict: indicates threat that willfor bethe resolved (conflict 2 is active in state a). Accumulated cost:the Cost summation respective resolution trajectories (cost = 1 in state a). Accumulated cost: Cost summation for the respective resolution trajectories (cost = 1 in state a). Accumulated Cost summation for the respective (cost =among 1 in state a). Active UAVs:cost: is a processed tuple and represents allresolution the UAVstrajectories in this scenario, them Active UAVs: is a processed tuple and represents all the UAVs in this scenario, among them the active one would be underlined (UAV1 and UAV3 are active to have conflict 2 in state a). Active UAVs: is a processed tuple and represents all the UAVs in this scenario, among them the the active one would be underlined (UAV1 and UAV3 are active to have conflict 2 in state a). Activeone resolution toand store solution trajectories and the2 active active would betrajectories: underlined used (UAV1 UAV3 are active to have conflict in stateresolution a). Active resolution trajectories: used to store solution trajectories and the active resolution trajectories are represented with underlines to resolve the active collision (111, 31 or 32 can be Active resolution trajectories: to store solutionthe trajectories and the active trajectories are represented withused underlines to resolve active collision (111, 31 orresolution 32 can be used to resolve conflict 2 in state a). Here the number is composed with the aircraft trajectories are represented underlines to resolve the active (111, 31 or can be used to resolve conflict 2 with in state a). Here the number is collision composed with the32aircraft identification i and amending strategy descend/climb (1/2). used to resolve conflict 2 in state a). Here the number is composed with the aircraft identification identification i and amending strategy descend/climb (1/2). iThe andcausal amending strategycan descend/climb (1/2). exploration be summarized with the following steps in Figure 4: The causal exploration can be summarized with the following steps in Figure 4: The causal exploration can be summarized with the following steps in Figure 4: yes yes

DDOA

Generate Active DDOA Generate solution Active conflict solution trajectory conflict trajectory

Produce Produce Process Process state state

Create a Create a branch branch

Update Update cost and cost and active active conflict conflict

Active Active conflict conflict

no no

Select Select optimal optimal solution solution

Figure 4. Causal exploration flow chart. Figure 4. Causal Causal exploration flow chart.

As an explanatory case, Figure 5 illustrates the whole feasible solutions of a case scenario, and As an explanatory case, 5 illustrates thethe whole feasible solutions of a of case scenario, and As explanatory case,Figure Figure illustrates whole feasible solutions a case Figure 6an shows its reachability tree. 5Using the causal exploration algorithm, there are scenario, six final Figure 6 shows its reachability tree. Using the causal exploration algorithm, there are six final and Figure 6 shows reachability tree.Evidently, Using thestate causal algorithm, there final process states as theits feasible solutions. d isexploration preferred to be utilized thanare thesixothers process states as the feasible solutions. Evidently, state d is preferred to be utilized than the others process states as the feasible due to the minimum cost. solutions. Evidently, state d is preferred to be utilized than the others due due tominimum the minimum to the cost.cost. Tr2 Tr2 1 C= =1 Tr11 C Tr11 Tr2 Tr2

Tr3 Tr3

Tr2 Tr2

Tr1 Tr1

(a) (a)

(f) Total Cost=1.5 (f) Total Cost=1.5 Tr31 C= 1 Tr31 C= 1

(g) (g) (c) (c) Tr3 Tr3

Total Cost=1.5 Total Cost=1.5

Tr2 Tr2 1 C= =1 Tr11 C Tr11

Tr1 Tr1

C= 1 C= 1(d)

C=1C.5=1.5

Tr1 Tr1

Tr3 Tr3

Tr3 Tr3

Tr11

Tr21 Tr21 Tr22 Tr22

Tr2 Tr2 1 C= =1 Tr11 C

(b) (b) Tr3 Tr3

.5 .5 =1 1 C C=

Tr12 Tr12

Tr2 Tr2 1.5 C= .5 1 Tr111C= Tr111

Tr3 Tr3

(d)

Total Cost=1 Total Cost=1

(e) Total Cost=1.5 (e) Total Cost=1.5

Figure 5. The feasible solutions. Figure 5. The feasible solutions.

Total Cost=2 Total Cost=2

Tr32 Tr32

C=1.5 C=1.5 (h) Total Cost=2.5 (h) Total Cost=2.5

Appl. Sci. 2017, 7, 83 Appl. 2016, 6, 83

8 of 14 8 of 14 (a) {1,0,(1,2,3),(11,12,21,22)}

(b) (c) {2,1,(1,2,3),(11,111,31,32)} {0,1.5,(1,2,3),12}

(d) {0,1,(1,2,3),21}

(e) {0,1.5,(1,2,3),22}

(f) (g) (h) {0,1.5,(1,2,3),111}{0,2,(1,2,3),(11,31)}{0,2.5,(1,2,3),(11,32)}

Figure Figure 6. 6. The CA reachability reachability tree. tree.

4. Simulation and Results 4. this section, section, we we carry carry out out simulation simulation experiments to evaluate the efficacy of of the the proposed proposed In this the CA CA system. system. The computational results represent collision-free maneuvers maneuvers for for algorithms for the multiple UAVs UAVsthat thatare aremodeled modeledwith withdetailed detaileddynamics. dynamics. multiple 4.1. 4.1. A Case Scenario To our simulation experiments areare performed on Toverify verifythe thefeasibility feasibilityofofthe theproposed proposedalgorithms, algorithms, our simulation experiments performed aonmanually generated scenario of five (with (with the corresponding trajectories Tr1, Tr2,Tr1, Tr3,Tr2, Tr4 and a manually generated scenario ofUAVs five UAVs the corresponding trajectories Tr3, Tr5), illustrated in Figurein 7. Figure This scenario the following characteristics: Tr4 and Tr5), illustrated 7. This includes scenario includes the following characteristics:

(1) It fairly complex complex scenario scenario with with multiple multiple UAVs. UAVs. Indeed, three trajectories, trajectories, (1) It is is aa fairly Indeed, among among the the first first three Tr1 imposes sequent threats to both Tr2 and Tr3; moreover, an encounter emerges between Tr4 Tr1 imposes sequent threats to both Tr2 and Tr3; moreover, an encounter emerges between Tr4 and Tr5, which further increases the complexity of the scenario. and Tr5, which further increases the complexity of the scenario. (2) It domino effect) between neighboring threats. For (2) It involves involves the theinterrelationship interrelationship(also (alsocalled called domino effect) between neighboring threats. instance, a new secondary threat between UAV3 and UAV5 may emerge in the process of For instance, a new secondary threat between UAV3 and UAV5 may emerge in the process resolving their respective previous threat. of resolving their respective previous threat. (3) It resolvessuccessive successivethreats threats a compositive CA trajectory, i.e.,is UAV1 is todetected to (3) It resolves via via a compositive CA trajectory, i.e., UAV1 detected encounter encounter UAV2 and UAV3 separately in a short continuous time period and the two UAV2 and UAV3 separately in a short continuous time period and the two successive conflicts successive conflictsoverall can berather considered overall rather than one by one. can be considered than one by one. Appl. 2016, 6, 83above In the

9 of 14 scenario, each UAV is assumed to be heading towards its own target position along the straight line. Simulations start with the initial information about the position and velocity of the UAVs in a scenario. For the local area, the UAV states have been treated as broadcast information with efficient real-time communication. The assumptions and the parameter setup values are given in Table 1. The proposed algorithms are coded in C++ and the simulation is performed on an EliteBook laptop with a processor Intel i5 of 2.6 GHz and 4 GB of RAM.

Table 1.The assumptions of parameters and unmanned aerial vehicle (UAV) properties

Rcf (km) 1.2

Rcl (m) 100

Velocity (m/s) 30

Δt (s) 1

A (rad) −1.047

B (rad) 1.047

w1  w2  w3 Figure Five-UAV scenario with the generated generated optimal optimal resolution. resolution. Figure 7. 7. the Five-UAV the In this causal analysis, cost ofscenario variouswith feasible CA trajectories assists the decision making of solution selection. After executing the proposed CA system, the optimal strategy, that Tr1 The entirety of the reachable states of this multi‐UAV scenario are displayed in Figure 8. From synthetically amends upward UAV5 climbs, to is implemented. In the above scenario, eachand UAV is assumed be heading towards its own target position along the proposed multi‐threat resolution point of view, solo UAV1 climbs (Tr11) or UAV2 descends the straight line. Simulations start with the initial information about the position and velocity of the (Tr21) to resolve the first threat (see state a). However there would generate a secondary threat with UAVs in a scenario. For the local area, the UAV states have been treated as broadcast information Tr3 if trajectory Tr11 is applied (see state b). Then UAV1 could climb again and a composite CA with efficient real-time communication. The assumptions and the parameter setup values are given in trajectory (Tr111) is generated (see state d). Meanwhile, UAV3 could descend (Tr31) to resolve the new encounter (see state e). For resolving the threat between UAV4 and UAV5, UAV4 amends downward (Tr41) or UAV5 turns upward (Tr51). In state d, there would be no domino effect between the neighboring UAVs (see state h and state i), while a new threat would appear between the descending UAV3 and climbing UAV5 (see state k) and have to be resolved through the

Appl. Sci. 2016, 6, 837, 83 Appl. 2017,

9 of 14

Table 1. The proposed algorithms are coded in C++ and the simulation is performed on an EliteBook laptop with a processor Intel i5 of 2.6 GHz and 4 GB of RAM. Table 1. The assumptions of parameters and unmanned aerial vehicle (UAV) properties. Rcf (km)

Rcl (m)

1.2

100

Velocity (m/s)

∆t (s)

30 1 w1 = w2 = w3

A (rad)

B (rad)

−1.047

1.047

In this causal analysis, the cost of various feasible CA trajectories assists the decision making of Figure 7. Five-UAV scenario with generated optimal strategy, resolution.that Tr1 synthetically solution selection. After executing the proposed CAthe system, the optimal amends upward and UAV5 climbs, is implemented. The entirety of the reachable states of this multi‐UAV scenario are displayed in Figure 8. From The entirety of the reachable states of this multi-UAV scenario are displayed in Figure 8. the proposed multi‐threat resolution point of view, solo UAV1 climbs (Tr11) or UAV2 descends From the proposed multi-threat resolution point of view, solo UAV1 climbs (Tr11) or UAV2 descends (Tr21) to resolve the first threat (see state a). However there would generate a secondary threat with (Tr21) to resolve the first threat (see state a). However there would generate a secondary threat with Tr3 Tr3 if trajectory Tr11 is applied (see state b). Then UAV1 could climb again and a composite CA if trajectory Tr11 is applied (see state b). Then UAV1 could climb again and a composite CA trajectory trajectory (Tr111) is generated (see state d). Meanwhile, UAV3 could descend (Tr31) to resolve the (Tr111) is generated (see state d). Meanwhile, UAV3 could descend (Tr31) to resolve the new encounter new encounter (see state e). For resolving the threat between UAV4 and UAV5, UAV4 amends (see state e). For resolving the threat between UAV4 and UAV5, UAV4 amends downward (Tr41) or downward (Tr41) or UAV5 turns upward (Tr51). In state d, there would be no domino effect UAV5 turns upward (Tr51). In state d, there would be no domino effect between the neighboring between the neighboring UAVs (see state h and state i), while a new threat would appear between UAVs (see state h and state i), while a new threat would appear between the descending UAV3 and the descending UAV3 and climbing UAV5 (see state k) and have to be resolved through the climbing UAV5 (see state k) and have to be resolved through the following heading change (see state p following heading change (see state p and state q). and state q).

Figure 8. The reachability tree of this multi-UAV multi-UAV scenario. scenario.

On the the other other branch, branch, the the first first threat threat is is resolved resolved by by the the amendment amendment of (see state state c), c), and and two two On of Tr2 Tr2 (see options are considered to solve the encounter between UAV1 and UAV3 (see state f and state g). In options are considered to solve the encounter between UAV1 and UAV3 (see state f and state g). In state state the collision between and UAV5 be avoided directly without domino effect (seel f, the f, collision between UAV4UAV4 and UAV5 could could be avoided directly without domino effect (see state state l and state m). However in state g, a new threat (see state n) would appear between the and state m). However in state g, a new threat (see state n) would appear between the descending descending UAV3 and climbing UAV5be and it could resolved by one of the involved UAV3 and climbing UAV5 and it could resolved bybe one of the involved trajectories (see trajectories state r and (see state r and state s). state s). Since the the cost costcriterion criterionisistaken taken into consideration in the decision-making process, is clear Since into consideration in the decision-making process, it is it clear that that state i (UAV1 climbs twice for the sequent threats with UAV2 and UAV3, and UAV5 amends state i (UAV1 climbs twice for the sequent threats with UAV2 and UAV3, and UAV5 amends upward upward to avoid thewith collision with UAV4) is the bestfeasible one ofscenarios. the feasible amended to avoid the collision UAV4) is the best one of the Thescenarios. amendedThe trajectories of trajectories of UAV1 and UAV5are represented in Figure 7. UAV1 and UAV5are represented in Figure 7.

Table 2. UAV1 and UAV5 modified trajectories.

Time

ID

Appl. Sci. 2017, 7, 83

Amended Trajectory X (m) Y (m) Z (m)

Time

ID

Amended Trajectory X (m) Y (m) Z (m)

10 of 14

17:17:48 UAV 1 370.43 510.68 669.57 UAV 1 593.19 733.44 721.53 17:18:10 17:17:50 UAV 1 387.85 528.10 686.68 UAV 5 628.79 779.87 572.48 Table 2 summarizes406.44 the amended of UAV1 and UAV5 (for the sake of simplicity, 17:17:52 564.10 waypoints 701.14 UAV 1 UAV 1 614.07 754.32 716.18 17:18:12 the data are recorded every two seconds). UAV1 starts to change its headings at 17:17:48 and returns 17:17:54 UAV 1 425.92 566.17 713.00 UAV 5 614.12 754.47 578.76 to the original trajectories at 17:18:18, while UAV5 starts at 17:18:04 and ends at 17:18:24. 17:17:56 UAV 1 446.44 586.69 720.60 UAV 1 633.94 774.19 705.67 17:18:14 17:17:58 UAV 1 467.54 UAV 5 599.14 728.52 580.34 Table597.79 2. UAV1 723.66 and UAV5 modified trajectories. 17:18:00 UAV 1 17:18:02ID UAV 1 Time

488.67 628.92 721.03 Amended Trajectory 509.24 649.50 713.75

X (m)

UAV 1 529.85 17:17:48 U AV1 370.43 17:18:04 668.57 UAV 5387.85 17:17:50 U AV1 550.95 17:17:52 U AV1UAV 1 406.44 17:18:06 17:17:54 U AV1 425.92 UAV 5 656.73

Y (m)

Z (m)

17:18:16 Time

UAV 1 UAV ID5

651.64 791.89 689.14 584.16Amended 702.58 Trajectory 578.76 X (m)

Y (m)

Z (m)

670.10 510.68 848.77 528.10

720.90 669.57 532.96 686.68

17:18:18

691.20 564.10 566.17 828.26

723.99 701.14 713.00 551.38

17:18:20 17:18:12 17:18:22

UAV 1 667.72 807.97 669.57 U AV1 593.19 733.44 721.53 UAV 5 569.50 U AV5 628.79 677.18 779.87572.48572.48 UAV 5 555.03 U AV1 614.07 652.12 754.32564.58716.18 U AV5 614.12 754.47 541.56 628.78 551.38578.76 UAV 5

17:17:56 U AV1UAV 1 446.44 572.14 586.69 712.39 17:18:08 17:17:58 U AV1 467.54 597.79 643.26 804.93

720.60 725.25 723.66 564.58

17:18:24

U AV1 633.94 608.28 774.19532.96705.67 UAV 5 529.72

UAV 5

17:18:10

17:18:14

U AV5

599.14

728.52

17:18:00 U AV1 488.67 628.92 721.03 U AV1 651.64 791.89 17:18:16 17:18:02 U AV1 509.24 649.50 713.75 U AV5 584.16 702.58 Figure 9 depicts the relative distance of each pair of UAVs that are involved in a AV1 figure, 529.85 U AV1 region 667.72of each 807.97 threat. FromUthis we can670.10 see that 720.90 the minimum separation UAV 17:18:04 17:18:18 U AV5 848.77 effect 532.96 U AV5 569.50 677.18 intruded upon, thanks 668.57 to the favorable attained by the CA algorithm.

580.34 689.14 578.76 detected

is669.57 never 572.48

U AV1 550.95 691.20 723.99 of 17:18:20 AV5 that 555.03 652.12 564.58 Figure 10 illustrates the pitch angle profiles UAV1 andUUAV5 amending their headings U AV5 656.73 828.26 551.38 17:18:22 U AV5 541.56 628.78 for the avoidance of corresponding threats in this scenario. At 17:17:48, UAV1 follows the 551.38 control U AV1 572.14 712.39 725.25 17:18:24 U AV5 529.72 608.28 532.96 input that changes its pitch angle from 0 to 0.71 and climbs subsequently. At 17:17:58, UAV1 and 17:18:08 AV5 and 643.26 804.93 564.58 UAV2 reach UCPA UAV1 begins to return to its original path. However, UAV1 climbs again at 17:18:02 because of the encounter with UAV3. At 17:18:18, UAV1 recoveries its course when both the Figure 9 depicts the relative distance of each pair of UAVs that are involved a detected threat. involved threats are resolved. And meanwhile, the neighboring collision betweeninUAV4 and UAV5 is From avoided this figure, via thewe upward can seeamendment that the minimum of UAV5. separation Using this region CA of advisory, each UAV there is never is no intruded domino effect upon, between sub-scenarios. thanks tothe thetwo favorable effect attained by the CA algorithm. 17:18:06

Figure Figure 9. 9. Relative Relative distance. distance.

Figure 10 illustrates the pitch angle profiles of UAV1 and UAV5 that amending their headings for the avoidance of corresponding threats in this scenario. At 17:17:48, UAV1 follows the control input that changes its pitch angle from 0 to 0.71 and climbs subsequently. At 17:17:58, UAV1 and UAV2 reach CPA and UAV1 begins to return to its original path. However, UAV1 climbs again at 17:18:02 because of the encounter with UAV3. At 17:18:18, UAV1 recoveries its course when both the involved threats are resolved. And meanwhile, the neighboring collision between UAV4 and UAV5 is avoided via the upward amendment of UAV5. Using this CA advisory, there is no domino effect between the two sub-scenarios.

Appl. Sci. 2017, 7, 83 Appl. 2016, 6, 83

11 of 14 11 of 14

Figure Figure10. 10.Pitch Pitchangle angleprofile profileof ofboth bothUAVs. UAVs.

4.2. Further Investigation 4.2. Further Investigation In this section, we conduct additional experiments to test the scalability of the proposed In this section, we conduct additional experiments to test the scalability of the proposed algorithms. algorithms. In [23], scalability is defined as the ability of an algorithm, system, or model to deal In [23], scalability is defined as the ability of an algorithm, system, or model to deal with increasing with increasing numbers of missions at a reasonable cost, or its ability to be effectively enlarged to numbers of missions at a reasonable cost, or its ability to be effectively enlarged to commensurate commensurate that growth. that growth. In practical applications, we may encounter different settings of UAVs, which depend on In practical applications, we may encounter different settings of UAVs, which depend on different different values of densities, variable Rcf and sense range. For instance, with the increase of values of densities, variable Rcf and sense range. For instance, with the increase of applications such applications such as surveillance in which various UAVs owning different capabilities and as surveillance in which various UAVs owning different capabilities and properties would cooperate properties would cooperate and compete for a certain target, it is expected that the airspace traffic and compete for a certain target, it is expected that the airspace traffic density will grow considerably density will grow considerably in certain reduced areas during short time periods. Since the CA in certain reduced areas during short time periods. Since the CA system is applied independently to system is applied independently to each cluster, the increasing UAV number in the whole airspace each cluster, the increasing UAV number in the whole airspace may improve the encounter possibility, may improve the encounter possibility, thereby raising the number of clusters, rather than the thereby raising the number of clusters, rather than the number of UAVs involved in a specific cluster. number of UAVs involved in a specific cluster. To validate the scalability, we use the computation time as a parameter to record the performance To validate the scalability, we use the computation time as a parameter to record the of the proposed CA system in handling different-density scenarios. Based on the simulation results in performance of the proposed CA system in handling different-density scenarios. Based on the Table 3, the average computation time (over 100 runs of random flight tests) for low density (20 UAVs), simulation results in Table 3, the average computation time (over 100 runs of random flight tests) medium density (60 UAVs), and high density (100 UAVs) traffic do not grow exponentially as the for low density (20 UAVs), medium density (60 UAVs), and high density (100 UAVs) traffic do not airspace density increases, attributing the high scalability to the independent clusters, which can be grow exponentially as the airspace density increases, attributing the high scalability to the frequently processed. independent clusters, which can be frequently processed. Table 3. Time taken in different densities. Table 3.Time taken in different densities UAVNumber Number UAV 2020 6060 100 100

Computation Time (s) (s) Computation Time 0.92 0.92 5.28 5.28 17.62

17.62

In addition, addition, several with varying values of tuning parameters Rcf and In severalextensive extensivesimulations simulations with varying values of tuning parameters Rcfsense and range range (SR) are constructed to observe the performance in terms of The CA maneuvers sense (SR) are constructed to observe the performance in efficiency. terms of efficiency. The CA should be optimal UAVs at can theirarrive respective destination minimum possible time. maneuvers should so be that optimal socan thatarrive UAVs at their respectiveindestination in minimum e e Define ti time. as theDefine expectant flight (not toflight maketime any deviation of the planned trajectory) tri as possible the time expectant (not to make any deviation of the and planned ti as the realistic flight time (fully follow the CA maneuvers) of U AVi (i = 1, 2, .., n), and the efficiency is trajectory) and tir as the realistic flight time (fully follow the CA maneuvers) of UAVi(i  1, 2,.., n) , given as [24]: and the efficiency is given as [24]: 1 n te E f f iciency = ∑ e ri (15) 1n in=1ti ti Efficiency   r (15) n i 1 ti

Figure 11 depicts the simulation results of efficiency with variable parameters. We could conclude the following:

Appl. Sci. 2017, 7, 83

12 of 14

Figure 11 depicts the simulation results of efficiency with variable parameters. We could conclude the following: Appl. 83 • 2016, The6,efficiency

of 14 is decreasing as the Rcf value increases, because extensive conflict volume12leads to more threats that would be detected by the CD algorithm, thus more waypoints have to be • The efficiency is decreasing as the Rcf value increases, because extensive conflict volume amended to avoid potential collisions resulting in the higher realistic flight time. leads to more threats that would be detected by the CD algorithm, thus more waypoints have to be • Compared to SR = 9 km, the efficiency is lower when SR is equal to three kilometers with the amended to avoid potential collisions resulting in the higher realistic flight time. same Rcf , because the restricting sensor range may ignore the neighboring threats that could • Compared to SR = 9 km, the efficiency is lower when SR is equal to three kilometers with be synthetically resolved, and lately detect the intruder UAV, causing the number of amended the same Rcf, because the restricting sensor range may ignore the neighboring threats that could be waypoints to be higher. synthetically resolved, and lately detect the intruder UAV, causing the number of amended • With the same parameters of Rcf and sense range, high efficiency is obtained if the complete CR waypoints to be higher. algorithm including the causal analysis is utilized rather than only the DDOA. With the positive • With the same parameters of Rcf and sense range, high efficiency is obtained if the impact of causal analysis, the average increment of efficiency is respectively 2.83% and 3.47% complete CR algorithm including the causal analysis is utilized rather than only the DDOA. With for SR = 9 km and SR = 3 km. Consequently, the causal analysis is effective for the selection of the positive impact of causal analysis, the average increment of efficiency is respectively 2.83% and 3.47% optimal resolution trajectory. for SR = 9 km and SR = 3 km. Consequently, the causal analysis is effective for the selection of optimal resolution trajectory.

Figure Figure11. 11.Variation Variationof ofefficiency efficiency with with RRcfcfand andsense senserange rangefor forthe thetraffic trafficdensity densityof of20 20UAVs. UAVs.

5. 5.Conclusions Conclusions This twotwo efficient algorithms: CD algorithm and CR algorithm, which This paper paperhas haspresented presented efficient algorithms: CD algorithm and CR algorithm, constitute a novel CA system for multiple cooperative UAVs aiming to detect and resolve threats by which constitute a novel CA system for multiple cooperative UAVs aiming to detect and resolve generating an optimalan trajectory an overall minimum cost in 3Dcost airspace. The CD module threats by generating optimal with trajectory with an overall minimum in 3D airspace. The CD analyzes the spatial-temporal information composing a set of discrete 4D trajectories generate the module analyzes the spatial-temporal information composing a set of discrete 4Dtotrajectories to intuitionistic representation of detected conflicts. The CR algorithm integrates with the CD portion generate the intuitionistic representation of detected conflicts. The CR algorithm integrates with the and solves the through causal The DDOA provides new CD portion and detected solves thethreats detected threatsDDOA throughand DDOA andanalysis. causal analysis. The DDOA provides feasible alternative trajectories for each UAV involved in an encounter with a local optimization new feasible alternative trajectories for each UAV involved in an encounter with a local optimization scope, scope, and and itit generates generates alternative alternative avoiding avoiding trajectories trajectories by by an an objective objective function function (integrating (integrating track track adjustment, cost, distance, and time) in consideration of several constraints (i.e., performance, adjustment, cost, distance, and time) in consideration of several constraints (i.e., performance,state, state, and distance). The causal analysis explores the emergent dynamics between the alternative and distance). The causal analysis explores the emergent dynamics between the alternative trajectories trajectories generated by DDOA and the surrounding It hasadvantages numerous advantages such the as generated by DDOA and the surrounding traffic. It hastraffic. numerous such as splitting splitting the scenario to separate clusters, reducing the size of solution space, and exploring the scenario to separate clusters, reducing the size of solution space, and exploring the global optimal global optimal Based on the quantitative simulation results, proposed CA validated system has solution. Basedsolution. on the quantitative simulation results, the proposed CAthe system has been to been validated to be feasible and effective in resolving conflicts for multiple UAVs and high be feasible and effective in resolving conflicts for multiple UAVs and has high scalability forhas different scalability for different trafficdecreases densities;asthe decreases as the value of volume traffic densities; the efficiency theefficiency value of conflict volume increases, andconflict increases as the increases, and increases as the sense range increases; the causal analysis is effective for the selection sense range increases; the causal analysis is effective for the selection of an optimal resolution trajectory. of an optimal resolution trajectory. Future research will be dedicated to: (1) using a heuristic-based algorithm to improve our proposed approach, which could tackle the collision avoidance problem of more UAVs in high-density scenarios, while it also may require more computation time; (2) making a comprehensive review of the existing best performing methods that consider UAV factors and

Appl. Sci. 2017, 7, 83

13 of 14

Future research will be dedicated to: (1) using a heuristic-based algorithm to improve our proposed approach, which could tackle the collision avoidance problem of more UAVs in high-density scenarios, while it also may require more computation time; (2) making a comprehensive review of the existing best performing methods that consider UAV factors and integrating them to our system in order to improve its performance; (3) considering several disturbances (e.g., wind) to improve the current system logic in order to hold the complex field situations; (4) integrating UAVs into(manned) general aviation to operate in a non-segregated airspace. Acknowledgments: The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China (71601181), the Military Scientific Research Project (162017160500A21XXX), and the State Key Laboratory of Management and Control for Complex Systems-Open Project (20160109). Author Contributions: Mingrui Lao and Jun Tang designed the distributed dynamic optimization approach and causal analysis, conducted the simulations of the core algorithms and co-wrote the initial manuscript. Besides, Jun Tang helped improve the system design and put forward several construction suggestions. The final manuscript was read and approved by all authors. Conflicts of Interest: The authors declare no conflict of interest.

Abbreviations The following abbreviations are used in this manuscript: 3D 4D ADS-B ASAS CA CD CPA CR DDOA NP TCAS TMA UAV

Three dimensional Four dimensional Automatic Dependent Surveillance Broadcast Airborne Separation Assurance System Collision avoidance Conflict detection Closet point of approach Conflict resolution Distributed dynamic optimization approach Non-deterministic polynomial Traffic Alert and Collision Avoidance System Terminal Maneuvering Area Unmanned aerial vehicle

References 1.

2.

3.

4. 5.

6.

7.

Borra-Serrano, I.; Peña, J.M.; Torres-Sánchez, J.; Mesas-Carrascosa, F.J.; López-Granados, F. Spatial Quality Evaluation of Resampled Unmanned Aerial Vehicle-Imagery for Weed Mapping. Sensors 2015, 15, 19688–19708. [CrossRef] [PubMed] Ruiz, S.; Piera, M.A.; Del Pozo, I. A medium term conflict detection and resolution system for terminal maneuvering area based on spatial data structures and 4D trajectories. Transp. Res. C Emerg. Technol. 2013, 26, 396–417. [CrossRef] Netjasov, F.; Vidosavljevic, A.; Tosic, V.; Everdij, M.H.; Blom, H.A. Development, validation and application of stochastically and dynamically coloured Petri net model of ACAS operations for safety assessment purposes. Transp. Res. C Emerg. Technol. 2013, 33, 167–195. [CrossRef] Brooker, P. Airborne Separation Assurance Systems: Towards a work programme to prove safety. Saf. Sci. 2004, 42, 723–754. [CrossRef] Lai, C.P.; Ren, Y.J.; Lin, C. ADS-B based collision avoidance radar for unmanned aerial vehicles. In Proceedings of the IEEE MTT-S International Microwave Symposium Digest, Boston, MA, USA, 7–9 June 2009; pp. 85–88. Lin, Y.; Saripalli, S. Sense and avoid for Unmanned Aerial Vehicles using ADS-B. In Proceedings of the 2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA, USA, 26–30 May 2015; pp. 6402–6407. BaraldiSesso, D.; Vismari, L.F.; Camargo, J.B. An approach to assess the safety of ADS-B based unmanned aerial systems. In Proceedings of the 2014 International Conference on Unmanned Aircraft Systems (ICUAS), Orlando, FL, USA, 27–30 May 2014; pp. 669–676.

Appl. Sci. 2017, 7, 83

8. 9. 10. 11. 12. 13. 14.

15. 16. 17.

18.

19.

20.

21. 22. 23.

24.

14 of 14

Wolf, T.B.; Kochenderfer, M.J. Aircraft collision avoidance using Monte Carlo real-time belief space search. J. Intell. Rob. Syst. 2011, 64, 277–298. [CrossRef] Tang, J.; Fan, L.; Lao, S. Collision Avoidance for Multi-UAV Based on Geometric Optimization Model in 3D Airspace. Arabian J. Sci. Eng. 2014, 39, 8409–8416. [CrossRef] Holt, J.; Biaz, S.; Yilmaz, L.; Aji, C.A. A symbiotic simulation architecture for evaluating UAVs collision avoidance techniques. J. Simul. 2014, 8, 64–75. [CrossRef] Prandini, M.; Hu, J.; Lygeros, J.; Sastry, S. A Probabilistic Approach to Aircraft Conflict Detection. IEEE Trans. Intell. Transp. Syst. 2000, 1, 99–220. [CrossRef] Manathara, J.G.; Ghose, D. Rendezvous of multiple UAVs with collision avoidance using consensus. J. Aerosp. Eng. 2011, 25, 480–489. [CrossRef] Mujumdar, A.; Padhi, R. Reactive Collision Avoidance of Using Nonlinear Geometric and Differential Geometric Guidance. J. Guid. Control Dyn. 2011, 34, 303–311. [CrossRef] Nikolos, I.K.; Valavanis, K.P.; Tsourveloudis, N.C.; Kostaras, A.N. Evolutionary algorithm based offline/online path planner for UAV navigation. IEEE Trans. Syst. Man Cybern. B 2003, 33, 898–912. [CrossRef] [PubMed] Luo, C.; McClean, S.I.; Parr, G.; Teacy, L.; De Nardi, R. UAV position estimation and collision avoidance using the extended Kalman filter. IEEE Trans. Veh. Technol. 2013, 62, 2749–2762. [CrossRef] Ragi, S.; Chong, E.K. UAV path planning in a dynamic environment via partially observable markov decision process. IEEE Trans. Aerosp. Electron. Syst. 2013, 49, 2397–2412. [CrossRef] Lin, Y.; Saripalli, S. Path planning using 3D Dubins Curve for Unmanned Aerial Vehicles. In Proceedings of the 2014 International Conference on Unmanned Aircraft Systems (ICUAS), Orlando, FL, USA, 27–30 May 2014; pp. 296–304. Shim, D.H.; Sastry, S. An Evasive Maneuvering Algorithm for UAVs in See-and-Avoid Situations. In Proceedings of the 2007 American Control Conference, New York, NY, USA, 11–13 July 2007; pp. 3886–3891. Lin, Y.; Saripalli, S. Collision avoidance for UAVs using reachable sets. In Proceedings of the 2015 International Conference on Unmanned Aircraft Systems (ICUAS), Denver, CO, USA, 9–12 June 2015; pp. 226–235. Netjasov, F.; Vidosavljevic, A.; Tosic, V.; Everdij, M.H.C.; Blom, H.A.P. Stochastically and dynamically coloured Petri net model of ACAS operations. In Proceedings of the 4th International Conference on Research in Air Transportation (ICRAT), Budapest, Hungary, 1–4 June 2010; pp. 449–456. Kochenderfer, M.J.; Holland, J.E.; Chryssanthacopoulos, J.P. Next-generation airborne collision avoidance system. Lincoln Lab. J. 2012, 19, 17–33. Ruiz, S.; Piera, M.A.; Nosedal, J.; Ranieri, A. Strategic de-confliction in the presence of a large number of 4D trajectories using a causal modeling approach. Transp. Res. C Emerg. Technol. 2014, 39, 129–147. [CrossRef] Ross, A.M.; Rhodes, D.H.; Hastings, D.E. Defining changeability: Reconciling flexibility, adaptability, scalability, modifiability, and robustness for maintaining system lifecycle value. J. Syst. Eng. 2008, 11, 246–262. [CrossRef] George, J.; Ghose, D. A reactive inverse PN algorithm for collision avoidance among multiple unmanned aerial vehicles. In Proceedings of the 2009 American Control Conference, St. Louis, MO, USA, 10–12 June 2009; pp. 3890–3895. © 2017 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).