Next Article in Journal
A Novel Method for Estimating Monocular Depth Using Cycle GAN and Segmentation
Next Article in Special Issue
Flight and Interaction Control of an Innovative Ducted Fan Aerial Manipulator
Previous Article in Journal
Latitude Determination and Error Analysis for Stationary SINS in Unknow-Position Condition
Previous Article in Special Issue
Mobility Control of Unmanned Aerial Vehicle as Communication Relay to Optimize Ground-to-Air Uplinks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Emerging Inter-Swarm Collaboration for Surveillance Using Pheromones and Evolutionary Techniques

1
SnT, University of Luxembourg, L-4364 Esch-sur-Alzette, Luxembourg
2
FSTM/DCS, University of Luxembourg, L-4364 Esch-sur-Alzette, Luxembourg
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(9), 2566; https://doi.org/10.3390/s20092566
Submission received: 3 April 2020 / Revised: 25 April 2020 / Accepted: 27 April 2020 / Published: 30 April 2020
(This article belongs to the Special Issue Unmanned Aerial Vehicle Control, Networks, System and Application)

Abstract

:
In this article, we propose a new mobility model, called Attractor Based Inter-Swarm collaborationS (ABISS), for improving the surveillance of restricted areas performed by unmanned autonomous vehicles. This approach uses different types of vehicles which explore an area of interest following unpredictable trajectories based on chaotic solutions of dynamic systems. Collaborations between vehicles are meant to cover some regions of the area which are unreachable by members of one swarm, e.g., unmanned ground vehicles on water surface, by using members of another swarm, e.g., unmanned aerial vehicles. Experimental results demonstrate that collaboration is not only possible but also emerges as part of the configurations calculated by a specially designed and parameterised evolutionary algorithm. Experiments were conducted on 12 different case studies including 30 scenarios each, observing an improvement in the total covered area up to 11%, when comparing ABISS with a non-collaborative approach.

1. Introduction

Unmanned Aerial Vehicles (UAV), also known as “drones”, have become commonplace devices in the 21st century. Their use ranges from toys to military devices, while their cost can vary from tens to millions of dollars. For example, the word drones appeared in more than 500 articles in the New York Times from January 2012 to May 2016 [1] and the number of published papers has increased from 544 in 2013 to more than 1593 in 2017 [2]. Nowadays, these vehicles present several advantages for the society even though there are many concerns about privacy and civil liberties [3].
Although drones are frequently related with defence activities and projects [4], unarmed drones may also be strategically relevant due to their great surveillance capabilities [5]. In fact, they are also used in many other activities such as cargo delivery [6], road traffic surveillance [7], fire fighting [8], and to herd a flock of birds away from an airport [9].
Besides UAVs (fixed wing or multi-rotors), there exists other types of unmanned autonomous vehicles, such as Unmanned Ground Vehicles (UGV). Each vehicle type has its own characteristics, e.g., the type of areas they are able to explore. For instance, UAVs are able to move freely in the air and fly over water surfaces, while UGVs can explore dense forest areas where UAVs are unable to adventure. Using one single device in such scenarios is not an option. Where the collective intelligence emerges is in homogeneous swarms composed of several unmanned vehicles moving in an autonomous and coordinated manner in the air, on the ground and in the sea, following a bio-inspired approach.
Animal collective motion can be observed in a wide range of biological systems, such as bacteria colonies, fish schools and bird flocks [10]. In many cases, a swarm of individuals is able to solve a complex problem which is intractable for a single individual. This swarm intelligence is frequently seen in research works involving robots as it increases the robustness of a system and facilitates the cooperation among individuals in the swarm [11].
One well-known way of collaboration is found in evolutionary game theory (EGT) where individuals compete and sometimes collaborate with each other following evolutionary strategies [12]. This behaviour, consisting in achieving a common good while seeking a personal reward, has been applied to solve several problems such as predicting infectious diseases with vaccination strategies [13], making military decisions [14], optimising packet relaying in wireless networks based on reciprocity [15] and, now, improving surveillance missions sharing pheromone trails.
Our proposal consists of a new mobility model, called ABISS, for homogeneous multi-swarms of autonomous unmanned vehicles of different types. By using ABISS, collaborations between swarms emerge after applying evolutionary bio-inspired techniques, with the common objective of improving area coverage while performing surveillance. This is a distributed intelligence system, in which, if some members fail, the rest of the swarm still carries on their surveillance task, increasing the robustness of the proposal.
The main contributions of this paper are:
  • A new mobility model (ABISS) is designed to be used by unmanned vehicle swarms as a cooperation strategy for mutual inter-swarm collaboration.
  • An Evolutionary Algorithm (EA) is specially designed and tuned for optimising the ABISS’ parameters to maximise the coverage of the area under surveillance.
The rest of this paper is organised as follows. In the next section, we review the state of the art related to our work. In Section 3, our proposal is discussed. The problem definition and its instances are described in Section 4. Section 5 presents our optimisation algorithm and its hyper-parameterisation. The discussion of the results is in Section 6. Finally, in Section 7, conclusions and future work are given.

2. Related Work

Several articles focus on swarm robotic problems [16,17]; we review some of them related to our bio-inspired approach. Some articles use pheromone-based models to control the movement of robots and vehicles. In [18], the authors introduced a collective autonomous system inspired by the thermotactic aggregation behaviour of honeybees. They studied this probabilistic system at a mesoscopic scale by limiting the sensing of their robots and observed a collective decision-making behaviour when locating energy sources. A coordination model using indirect communication performed by repulsive pheromone interactions is proposed in [19]. In that article, five strategies related to the next-cell selection are evaluated according to the performance of surveillance tasks. The proposed model is based on a two-dimensional Cellular Automata and the two testing environments are composed by seven and ten rooms, respectively. In [20], the authors proposed a bio-inspired algorithm which allows communication between robots using pheromones as collective memory. They tested their proposal in square scenarios made of 25 × 25 and 50 × 50 cells and reported it to be better than the other algorithms included in the comparison. A surveillance system using an environment virtually partitioned into balanced disjoint areas is presented in [21]. One robot capable of releasing and distinguishing its own pheromones from that of others is assigned to each area and restricted to it. The authors tested their proposal in two scenarios divided into rooms and identified two phases: dispersion and navigation confinement.
Other articles use evolutionary techniques and swarm intelligence algorithms applied to robots to achieve their goals. In [22], the authors used evolutionary robotics to synthesise a collegial decision making behaviour similar to the one displayed by cockroaches when selecting a resting shelter. They experimented using ARGoS [23], a simulator of swarm robotics systems, using an Artificial Neural Network (ANN) as controller and an EA for setting up its parameters. In [24], a combination of novelty search (an evolutionary process based on the promotion of phenotypic diversity) and NEAT (NeuroEvolution of Augmenting Topologies) is used to evolve neural controllers for homogeneous swarms of robots. The authors conducted their study in a simulator where the robots performed tasks of aggregation and sharing a recharging station.
A Self-aware Communication Strategy (SCS) for controlling the heading direction of a swarm of robots is proposed in [25]. The authors implemented a small group of informed agents which have to guide a large swarm in a stationary environment having different number of goals. They experimented with simulated and real robots to evaluate the ability of the swarm to follow the leaders when changing direction as well as the swarm’s cohesion. In [26], a Genetic Algorithm (GA) is proposed to optimise the parameters of a swarm of robots in order to improve the foraging of dispersed resources and mapping the environment. Those parameters define how ants, simulated by Agent-Based Models (ABM), travel from their nest, search and use site fidelity and pheromone communication. Then, the ABM was modified to model the swarm of robots, which was used in the simulations performed to show that pheromone-like communication improved foraging success.
In [27], a realistic simulation framework is presented and two decentralised control algorithms are applied to a group of autonomous quadcopters in a three-dimensional space. One is based on a simple self-propelled flocking and the other is a collective target tracking algorithm. By conducting a series of experiments, the authors showed the applicability of their proposal and its stability when using a repulsion force to avoid collisions and an alignment force to align the heading directions of neighbours. In [28], the authors studied two informative path planning problems motivated by the use of robots in precision agriculture. They introduced a new planning problem, which penalises the time spent in travelling and the time spent for obtaining measurements. UAVs were used to maximise the number of visited points, and, since they had limited autonomy, they could land on the only UGV in the system, to be carried between different points without expending battery.
These studies propose mobility strategies which do not include collaborations between swarms of different types of unmanned autonomous vehicles. Some of them use evolutionary robotics or communication using pheromones as we do. However, these articles use a different mobility model and the surveillance scenarios are different from the ones proposed in this paper. Our proposal focuses on the communication and collaboration between different swarms of vehicles using pheromones and attractors. It relies on a distributed intra-swarm mobility model [29], which generates unpredictable trajectories using a chaotic solution of a dynamical system [30], combined with pheromone repel mobility [31]. The new model we propose is fully parameterised to achieve better coverage results and these new parameters are calculated by using an EA, specially adapted to optimise the covered area and foster inter-swarm collaboration. This approach plus the combination of inter-swarm and intra-swarm mobility, to the best of our knowledge, has not been used before.

3. Attractor Based Inter-Swarm CollaborationS (ABISS)

In this article, we present a new mobility model called ABISS (Attractor Based Inter-Swarm collaborationS), to be used by swarms of unmanned vehicles, e.g., Unmanned Aerial Vehicles (UAV) and Unmanned Ground Vehicles (UGV). Having different swarms of robots allows exploring all the area under surveillance taking advantage of each swarm’s characteristics. For example, UAVs are able to watch lakes and ponds while UGVs can do it efficiently in dense forests (Figure 1). On the contrary, UGVs cannot access water surfaces and UAVs have many troubles flying among trees. We call these areas unreachable zones (UZ) by a given type of vehicle.
Our proposal aims to compensate the limitations of each swarm complementing the unpredictable trajectories generated at intra-swarm level with inter-swarm collaboration strategies using evolutionary techniques. These two main components of ABISS are used to efficiently cover all the area under surveillance.

3.1. Intra-Swarm Mobility

Each swarm is homogeneous, consisting of the same type of vehicles, which explore the area under surveillance following unpredictable trajectories. Since unpredictability is needed for avoiding interception, the CACOC (Chaotic Ant Colony Optimisation for Coverage) algorithm [29] is the foundation of our intra-swarm mobility model.
CACOC combines a Chaotic Rössler Mobility Model (CROMM) with pheromone repel mobility [31] to obtain an intra-swarm mobility model in which each vehicle chooses a direction depending on the pheromone trail that surrounds it. Chaotic mobility generates routes that are unpredictable for an external observer although the vehicles’ trajectories are still deterministic since they depend on the initial conditions of the chaotic system. This is extremely valuable in case there are telemetry issues, allowing the Ground Control Station (GCS) to predict where the vehicles are until communications are re-established. This is possible since the GCS (and only the GCS) knows the initial conditions currently selected for the mobility model. Different trajectories can be obtained by selecting other different initial conditions for the chaotic attractor (we called them scenarios of a case study, see Section 4.2). Those trajectories are still predictable for the GCS.
Algorithm 1 shows the pseudocode of CACOC where after setting the default current state the main loop begins. In this loop, the first return map ρ describing a chaotic system (chaotic attractor obtained by solving a system of differential equations, see [32,33]) is used to replace the random part of the mobility model, as it was proven to perform better [29]. If there are no pheromones in the neighbourhood, CROMM is used. CROMM is a purely chaotic model which decides the next move using an equally divided partition, so that if the first returned map value ρ is less than 1 3 , the vehicle will move to the right; if ρ is between 1 3 and 2 3 , the vehicle will move to the left; and it will move ahead otherwise [29].
If pheromones are detected, the amount of them on the right ( P R ) and left ( P L ) are calculated and used to decide the next movement direction, as shown in Table 1. The idea is moving away from the higher amount of pheromones detected [29], taking into account the value of ρ as a probability. By doing so, the vehicles tend to avoid revisiting the same area in a short period of time, exploring more interesting regions until it is time to come back (when the pheromones have evaporated) and recheck the places already visited. We improved CACOC as intra-swarm mobility model [34,35] and integrated it into ABISS by optimising its parameters to work with the inter-swarm mobility model.
Algorithm 1 Pseudocode of CACOC.
procedure CACOC
   c u r r e n t s t a t e “ahead”
  loop
    ρ next   value   in   first   return   map
   if no   pheromone   sensed   in   the   neighbourhood then
     c u r r e n t s t a t e C R O M M
   else
    if ρ < P R then
      c u r r e n t s t a t e “right”
    else if ρ < P R + P L then
      c u r r e n t s t a t e “left”
    else
      c u r r e n t s t a t e “ahead”
    end if
     move   according   to   the   c u r r e n t s t a t e
   end if
  end loop
end procedure

3.2. Inter-Swarm Mobility

In our proposal, vehicles of different types evolve in homogeneous swarms which interact with each other having a common objective of maximising the covered area (Figure 1). In scenarios where every vehicle can perform its duty without finding unreachable areas, the collaboration is given by the pheromone repel model (CACOC). However, when there are unreachable areas, a new extra virtual element is used to foster the collaboration between swarms. We called it attractor.
Attractors are specific for a given type of vehicles and are left behind when a vehicle finds an unreachable area, i.e., a UGV finds a water surface and leaves an attractor for UAVs. Following this example, when a UAV detects this attractor, it might decide to ignore it or, in turn, ignore the possible pheromone trails and head to the attractor. This decision also depends on the probabilistic model based on chaotic dynamic systems and the collaboration probability of the model. Since collaboration implies changing the vehicle’s original trajectory, which might sacrifice the global coverage, improving the local exploration of unreachable zones is seen by each vehicle as a reward. The collaboration willingness as well as the rest of parameters of the model are calculated and optimised by the proposed EA, described in Section 5.1.
The flow diagram of ABISS is shown in Figure 2. It is executed by each vehicle being part of this distributed system. At each step, a vehicle scans the environment in front of it looking for an attractor for its own type. If it finds one, a possible collaboration is taken into account according to the vehicle’s collaboration probability and the next value in the sequence of chaotic solutions, previously calculated (offline). If the vehicle decides to collaborate, it will move toward the attractor. If not, any pheromone trail found during the scanning will be taken into account to decide the next moving direction (intra-swarm). Attractors work as the opposite to pheromones which are repellents. While pheromones evaporate over time, attractors only disappear when a vehicle reaches them. The new parameter set used to modify the vehicles’ behaviour and efficiency is described in the next section.

3.3. Model Parameters

We have defined a set of parameters to control how the vehicles move and how they react and collaborate. Since pheromones modify the vehicles’ movement, we have parameterised the percentage of pheromone evaporation ( τ d ) at each step (one second in our study) and the amount of pheromones left by each vehicle ( τ r ), as depicted in Figure 3a). Since vehicles are able to detect pheromones by scanning the area they have ahead, we have set two other parameters, namely scanning angle ( τ a ) and maximum detection distance ( τ m ), as shown in Figure 3b.
Additionally, four other parameters are used when there exist UZs in the area and the inter-swarm collaboration is possible. Concretely, when a vehicle is diverted because it was unable to enter a zone, e.g., a water surface, it leaves an attractor to require collaboration to members of other swarms. Then, when a vehicle in another swarm detects the attractor by scanning the area with an angle ( α a ) and depth ( α m ), it has to decide whether it is willing to collaborate or not, according to the collaboration probability ( π c ), as shown in Figure 3c. The pheromones left in UZs (when a vehicle is exploring them) are also subject to a decay rate ( τ d ), and the initial amount left by a vehicle is controlled by τ u .
Table 2 shows the parameters of our mobility model to be optimised by the proposed EA, in order to maximise the covered area. If we look at the third column, we can see that there are different types of parameters, which implies having a heterogeneous solution vector. When there are no unreachable zones, the solution vector consists of the first four parameters in Table 2, i.e.,  x = ( τ d , τ r , τ a , τ m ) . These are the new parameters we have defined for the intra-swarm model. When we optimise the more complex scenarios having unreachable zones, the solution vector contains all the parameters, including now the inter-swarm model, i.e.,  x = ( τ d , τ r , τ a , τ m , π c , α a , α m , τ u ) .

4. Problem Description

The problem we are addressing in this paper is the intelligent surveillance of a geographical area to detect possible intruders by maximising the area covered by a multi-swarm of vehicles. The next sections describe the objective function to be maximised, the problem instances used to test our proposal and the parameter sensitivity analysis.

4.1. Objective

In our model, the vehicles move by an environment composed by a lattice of 1 × 1-m 2 cells, following the rules of ABISS. Previous studies [36] have validated this cellular approach as a good representation of real scenarios involving actual drones. Since each vehicle has its own camera, we calculate the number of cells explored according to the detection zone of each vehicle (a 3 × 3-cell square centred on the vehicle). Having this in mind, the objective function consists in the maximisation of the number of explored cells with respect to the total amount of cells in the scenario. After configuring the vehicles, we evaluate each configuration as the percentage of the area visited during the simulation time (600 s). Concretely, for each case study (see Section 4.2), we calculate its fitness value (phenotype) for a vehicle configuration (genotype) given, as shown in Equation (1).
F ( x ) = 1 η i = 1 η # o f e x p l o r e d c e l l s ( x ) i # o f c e l l s i n t h e s c e n a r i o i , η = # o f s c e n a r i o s
The fitness function F is calculated for the solution vector x , by simulating η scenarios (30 in our case) to obtain the number of explored cells to be divided by the total number of cells in the scenario (it calculates the proportion of explored cells in each scenario i). We evaluate 30 different scenarios of each case study using the Monte Carlo method [37] to increase the robustness of the configuration found after the optimisation process. As we are maximising the explored area, the higher is the value of F ( x ) , the better.

4.2. Instances

We generated four map layouts to evaluate ABISS and compare it with the parameterised CACOC (our approach using inter-swarm collaborations vs. inter-swarm only mobility). The first layout does not include unreachable zones (UZ) and the other three have one zone of dense forest unreachable by UAVs and another zone consisting of a water surface unreachable by UGVs. These UZ areas represent 18% of the total area available in the maps. Furthermore, we wanted to test our proposal on two different map sizes, as well as use different numbers of vehicles to address several possible swarm configurations. Hence, we defined the 12 case studies shown in Table 3. The nomenclature used consists of the map dimensions and the number of vehicles, followed by the letter z if there are UZs in the map. Finally, the number next to z corresponds to the map’s layout.
As explained above, the trajectories followed by the vehicles depend on the chaotic solutions of a dynamical system. Consequently, these solutions are sensitive to the initial conditions. To take advantage of this characteristic, we defined 30 different scenarios (instances) of each case study (using 30 different initial conditions for the chaotic attractor), in which the vehicles will move using different trajectories. As a result, the covered area in each scenario is expected to be also different.
Figure 4a shows a full accessible map (100x100.4), while Figure 4b (100x100.4z1), Figure 4c (100x100.4z2), and Figure 4d (100x100.4z3) are maps having two unreachable zones, one by UAVs (green) and the other by UGVs (cyan).

4.3. Parameter Sensitivity Analysis

We performed a sensitivity analysis to identify which parameters (factors) are the most important in our novel model of intra-swarm mobility and inter-swarm collaboration when we measure the total area covered by vehicles.
We used the method proposed by Morris [38] which is based on computing incremental ratios for each system’s parameter that are then averaged to determine its importance. This method analyses the distribution of values by using trajectories of measurement points in the parameters’ space. As a result, the mean and standard deviation σ of the factor distribution are given. In our study, we used the revised mean called μ (the estimate of the mean of the distribution of the absolute values of the elementary effects), which can be used by itself to provide a reliable ranking [39]. Morris’ method presents low computation cost compared to others, especially in systems having high number of parameters as the one analysed here.
After the evaluation of 100 configurations of the model having four parameters (intra-swarm) and 180 of the one having eight parameters (intra-swarm plus inter-swarm), we obtained the values of σ and μ for each parameter, shown in Figure 5a,b, respectively. Note that each evaluation was performed on the 30 existing instances of 100x100.6z1, which amounts to 8400 evaluations in total.
It can be seen that the pheromone scan angle ( τ a ) and its evaporation rate ( τ d ) have the biggest influence over the system. Then, when collaborations are possible, its probability ( π c ) is also reported as an important parameter, as expected. Surprisingly, the scan depth and angle ( τ m and α m ) are less decisive, and the pheromone radius ( τ r ) turned out to have the least effect over our mobility model.

5. Optimisation Approach

In this section, we propose an Evolutionary Algorithm (EA) to optimise the parameters of ABISS to maximise the area explored by vehicles. After that, we address the parameterisation of our EA using an automatic method for algorithm configuration (irace).

5.1. Evolutionary Algorithm (EA)

Our EA is based on a Genetic Algorithm (GA) [40,41], which is an efficient method for solving combinatorial optimisation problems. Genetic Algorithms simulate processes present in evolution such as natural selection, gene recombination after reproduction, gene mutation and the dominance of the fittest individuals over the weaker ones. A typical GA consists of a population of μ individuals from which a subset is selected using a selection operator. Then, these individuals are recombined using a crossover operator to obtain a new set of λ individuals based on the original population. After that, a probabilistic mutation is applied introducing little modifications to the individuals’ chromosome. Finally, after evaluating the new offspring, the replacement operator selects the fittest to replace the former population. We have chosen an evolutionary bio-inspired approach for solving this difficult real problem which requires high evaluation times and has a huge search space that is very difficult to explore using exhaustive methods. Additionally, there is no analytic equation, thus traditional methods are not viable. Moreover, since we work with a population of individuals (instead of one solution at a time), the evaluation of each generation can be easily parallelised, noticeably reducing execution times. All these reasons as well as its low complexity operations make EA one of the best options for exploring the search space and solving our optimisation problem [42].
The pseudocode of our EA is shown in Algorithm 2. We designed a generational EA where λ = μ , i.e., the auxiliary population Q contains the same number of individuals as the population P. The parameters of EA (to be optimised in Section 5.2) are the number of individuals N i , the crossover probability P c and the mutation probability P m .
First, after initialising t and Q ( 0 ) , P ( 0 ) is generated by the Initialisation function. To increase the diversity of P ( 0 ) , we generated 100 μ individuals and selected the μ most different ones according to their entropy. Then, the main loop is executed while the TerminationCondition is not fulfilled (in our case, we stop after 100,000 evaluations). Inside the main loop, the Selection operator is applied to fill the working population Q ( t ) using Binary Tournament [43]. Next, the Crossover operator is applied and, after that, the Mutation operator modifies the new offspring slightly. These two operators, based on the Continuous Genetic Algorithm (CGA) presented in [44], are discussed below. Finally, after the Evaluation of Q ( t ) using the evaluation function (Equation (1)), the new population P ( t + 1 ) is obtained by applying the Replacement operator. To avoid population stagnation and preserve its diversity, instead of using elitism [40], we selected the best individual in Q ( t ) to replace the worst one in P ( t ) if it is better (it covers a bigger area), as proposed in [44].
Algorithm 2 Pseudocode of the Evolutionary Algorithm (EA).
procedure EA( N i , P c , P m )
   t
   Q ( 0 )            ▹ Q = auxiliary population
   P ( 0 ) I n i t i a l i s a t i o n ( N i )       ▹ P=population
  while not T e r m i n a t i o n C o n d i t i o n ( ) do
    Q ( t ) S e l e c t i o n ( P ( t ) )
    Q ( t ) C r o s s o v e r ( Q ( t ) , P c )
    Q ( t ) M u t a t i o n ( Q ( t ) , P m )
    E v a l u a t i o n ( Q ( t ) )
    P ( t + 1 ) R e p l a c e m e n t ( Q ( t ) , P ( t ) )
    t t + 1
  end while
end procedure

5.1.1. Crossover Operator

The pseudocode of the crossover operator is shown in Algorithm 3. It is based on the one presented in [44]. However, we adapted it to our heterogeneous solution vector so that it can work not only with real values but also with integer ones.
Algorithm 3 Pseudocode of the crossover operator.
function Crossover( Q , P c )
   Q
  for all { x , y } Q do           ▹ all the individuals in Q, taken in pairs
    x = x
    y = y
   if r n d ( ) < P c then                    ▹ crossover probability
     p r a n d I n t ( 1 , L )     ▹ crossing point p, L is the length of the solution vector
    for i p , L do                      ▹i goes from p to L
     if i s _ a n _ i n t _ p a r a m e t e r ( i ) then        ▹ type of the i-th parameter
       x [ i ] = y [ i ]
       y [ i ] = x [ i ]
     else
       M r a n d I n t ( 1 , 10 )
       Δ x x [ i ] / M
       Δ y y [ i ] / M
       x [ i ] = x [ i ] + Δ y Δ x
       y [ i ] = y [ i ] Δ y + Δ x
     end if
    end for
   end if
    Q Q { x , y }
  end for
  return Q
end function
First, two individuals x and y are taken from the population Q and copied to the destination x and y . If a generated random number is less than the crossover probability P c , the recombination process begins by selecting the crossing point using another random integer value (p), generated between one and the length of the solution vector L (four or eight). If the current position (i) corresponds to an integer parameter (it only takes integer values), the vectors’ values in position i are swapped. On the contrary, if it is a real-value parameter, the vectors’ values are modified according to another random integer value (M) by calculating Δ x and Δ y , as shown in Algorithm 3. This process is repeated for the rest of the individuals in the working population Q (taken in pairs) to obtain the new population Q .

5.1.2. Mutation Operator

The pseudocode of the mutation operator is shown in Algorithm 4. It is also based on the idea presented in [44] but in our implementation it has been adapted to our problem characteristics.
Algorithm 4 Pseudocode of the mutation operator.
function Mutation( Q , P m )
   Q
  for all { x } Q do             ▹ all the individuals in Q
    x x
   for i 1 , L do  ▹i goes from 1 to L (the length of the solution vector)
    if r n d ( ) < P m then            ▹ mutation probability
      M r a n d I n t ( 1 , 10 )
      Δ g e t D e l t a ( x [ i ] , M )
     if r n d ( ) < 0.5 then           ▹ increment/decrement
       Δ = 1 Δ
     end if
      x [ i ] x [ i ] + Δ
    end if
   end for
    Q Q { x }
  end for
  return Q
end function
First, each value of the individual x in Q is exposed to mutation according to the mutation probability P m . If a component of x is selected for mutation, a new M value is randomly calculated according to a uniform probability distribution. Then, the value of Δ is obtained according to Equation (2) taking into account the upper and lower bounds of the parameter associated to each component of x . Note that if the parameter being modified in x corresponds to an integer value, Δ is rounded before being added to the value of x [ i ] to preserve the correct parameter type. There also exists a reduction factor k (Equation (3)) which decreases exponentially the magnitude of the mutation (Figure 6), using the constant term γ (Equation (4)) so that, at the end of the optimisation process, k is equal to k m i n (0.10 in our study). This allows an initial exploration in the early stages of the algorithm and a later exploitation of the more promising areas of the search space. Finally, it is randomly decided (equally probable) to increase or decrease the current value of the parameter being mutated, and the new individual (now x ) is added to the new working population Q .
Δ = U p B d ( x [ i ] ) L o w B d ( x [ i ] ) M × k
k = e 1 t γ
γ = 1 t m a x ln k m i n

5.2. EA Parameter Optimisation

Usually, studies using optimisation algorithms include a parameter tuning stage with the objective of improving their performance and accuracy over the use of the default values. A manual tuning approach is frequently found in the literature but it depends on the previous experience of the researchers and their available resources. Consequently, it is frequently biased and incomplete.
In the present study, we opted to use the package irace [45] as an automatic method for algorithm configuration. Irace is an implementation of iterated racing procedure which uses Friedman’s non-parametric two-way analysis of variance by ranks [46]. We defined as the irace’s variables the parameters of the EA, i.e., the number of individuals ( N i ), crossover probability ( P c ), and mutation probability ( P m ). Then, we set the number of experiments (irace’s budget) to 500 and the confidence interval for the elimination test to 0.95. The best configurations obtained after the execution of irace are shown in Table 4 while Figure 7 shows the frequency in which each configuration of parameters was tested.
Besides the best configuration (20 individuals, P c = 0.92 and P m = 0.22 ), a reduced number of individuals (10), lower crossover probability and higher mutation rate were included in the top three best-rated candidates shown in Table 4. We believe that the best configuration performed better due to the fact that 20 individuals improved the sampling of the search space while avoiding a premature convergence of the EA. We also believe that 50 and 100 individuals required so many evaluations per generation (fixed number for all the configurations) that the EA was unable to progress in the search of solutions. Hence, the best configuration seems to be the most balanced solution between execution time and number of evaluations per generation.
The rest of parameters of EA are the maximum number of evaluations (100,000) and the analysis time (600 s). The former was restricted by the long evaluation times and the parallel simulation of 30 scenarios and the latter to take into account the average autonomy of UAVs.
The whole parameterisation was performed in parallel using 28 computing cores. The whole process took about 5.8 days of computing time. Note that, since the EA is a stochastic algorithm, irace had to perform several runs to evaluate each configuration with statistical confidence. The total number of performed runs was 500 and 76 different configurations were tested.

6. Experimental Results

Having performed the parameterisation of our EA, we used this algorithm to optimise ABISS to maximise area coverage and foster inter-swarm collaborations. We conducted a sanity check comparing our optimisation results against random search and, after that, an analysis of the results achieved were carried out taking into account other mobility models.

6.1. Random Search (RS)

We present in this section the Random Search (RS) algorithm to be compared with our EA as the chosen optimisation algorithm in terms of precision and efficiency.
We can see in Algorithm 5 the pseudocode of RS. This algorithm generates new configurations to be simulated and evaluated and keeps the best one found along the iterations. Depending on the case study, the solution vector would be composed of four or eight parameters.
Algorithm 5 Pseudocode of Random Search (RS).
procedure RS
   b e s t I n i t i a l i s a t i o n ( )
  while not T e r m i n a t i o n C o n d i t i o n ( ) do
    n e x t g e t R a n d o m C o n f i g u r a t i o n ( )  ▹ 4 or 8 parameters depending on the case study
   if F ( n e x t ) > F ( b e s t ) then
     b e s t n e x t             ▹ The b e s t configuration found so far, is updated
   end if
  end while
end procedure
First, an initial configuration is calculated and stored as the best configuration found. Then, using the same TerminationCondition as in EA (100,000 evaluations), new random configurations are generated, evaluated and compared against the best one found at that moment. If the new configuration happens to be better (greater fitness), it replaces the current best one (is assigned to b e s t ). This process continues until reaching the maximum number of evaluations (TerminationCondition). The results obtained using RS are discussed in the next section where they are also compared with EA.

6.2. Coverage Optimisation

The optimisation process consisted of 30 runs of the EA and RS on each case study (720 runs and 100,000 evaluations per run evaluating 30 scenarios simultaneously). The experiments were run in our simulation environment, and, at the end of the simulation, the fitness value for the configuration being evaluated was calculated, as explained in Section 4.1.
The results obtained are shown in Table 5 where it can be seen that EA has achieved the best coverage values in all the case studies and also presented the highest accuracy. RS has found the same maximum coverage value as EA in 50x50.4. However, this RS’s result is one outlier in the distribution of results that has been found by chance. This is also supported by the last column of Table 5, which contains the results of the Wilcoxon’s tests. It shows that the comparison’s results are statistically significant (p-value below 0.001). Moreover, in Figure 8, the distribution of the results of RS and our EA are shown. They visually confirm that the range of the values of EA corresponds to a higher area coverage than RS.
It may seem that the improvement of EA against RS (2.8% maximum) does not justify using a complex evolutionary algorithm for addressing our problem. However, we believe that, if we take into account that 2.8% represents 280 1 × 1-m 2 cells, the extra area covered justifies the effort. Additionally, EA turn out to be more precise than RS (smaller StDev), having converged to the same minimal value (probably the minimum) in the three first case studies.
All the experiments were performed doing parallel runs in the HPC facilities of the University of Luxembourg [47]. The total experimentation time was equivalent to 15,709 h (about 655 days).

6.3. Testing the Best Configuration

Having calculated the best combination of parameters for each case study, we tested it individually on each one of the 30 scenarios to obtain the results shown in Table 6. In addition to the parameter values, the total coverage obtained is also reported (mean, standard deviation and the best scenario). Note that the first four scenarios do not have unreachable zones. Consequently, no collaborations are required and the four last parameters are not needed by the mobility model.
We can observe that the average coverage is always above 60% (we analysed only the first 600 s) and that the more vehicles, the better, as expected. The small scenario (50 × 50) was explored up to 95.7%, while the big one (100 × 100) obtained a maximum 83.1% of coverage when using six vehicles (four UAVs and two UGVs).
Regarding the value of the parameters, pheromone decay ( τ d ) has always been equal to the minimum value (0.01, i.e., one unit per second) which shows the importance of the pheromone trails, and also the fact that we are not using recent coverage information in the fitness function. The pheromone radius ( τ r ) has taken always the maximum value (2) except for the last case study, confirming the importance of the vehicles’ trails, while the scan angle ( τ a ) and depth ( τ m ) have not shown a clear pattern of behaviour.
When collaboration was possible, its probability ( π c ) has usually been kept low, except in 100x100.4z3 where it is 0.55. This is an interesting result showing that this strategy was not always preferred every time an attractor was detected. Another evidence of that is the number of collaborations which has been also regulated by the attractor scan angle ( α a ) and depth ( α m ), although these do not have a big influence in the system, as shown by the parameter sensitivity study,
Evidence shows that vehicles decided to assist each other just what was strictly necessary to cover the corresponding UZs, since collaborating implies changing their original trajectory and heading to a detected attractor. In fact, in 100x100.6z3, despite having the same layout as 100x100.4z3, inter-swarm collaboration was not chosen as a good strategy by vehicles ( π c = 0.0 ).

6.4. ABISS vs. CACOC

Finally, we present in Table 7 a comparison between the system using only CACOC and when using ABISS, in the eight case studies having UZs. We report the total coverage and also the specific coverage of the UZs for each model. The UZ coverage was calculated taking into account only the cells included in the UZ, while for the total coverage, all the cells were used. Additionally, we include the coverage values for CACOC0, which is the initial mobility model presented in [29], not using the parameterisation proposed in our study. CACOC0 uses fixed parameters by design, i.e., τ d = 1.0 , τ r = 0 , τ a = 0 and τ m = 2 .
It can be seen that the parameterised CACOC always outperformed CACOC0 since in the former the vehicles were customised to each case study. Moreover, ABISS improved both coverage metrics (Total area and UZ) for almost all case studies. In 100x100.6z3, as mentioned above, the best result is achieved when not using collaboration between vehicles. We include the second best configuration, marked by asterisks, to show that the total coverage is only 0.1% lower when using collaborations. Note that this is not the best solution found by EA, hence the asterisks.
We have to remember here that the evaluation function takes into account only the total covered area without including the percentage of the UZs covered during the optimisation process. Consequently, our results show that the evolving configurations (population of individuals in the EA) have converged to solutions in which collaboration emerged as an extra reward for the swarm members trying to cover as much of the area as possible.

7. Conclusions

In this article, we propose a new mobility system for inter-swarm collaboration, called Attractor Based Inter-Swarm collaborationS (ABISS), to maximise the area covered by unmanned autonomous vehicles improving the surveillance of restricted zones. Vehicles in our system follow unpredictable trajectories based on chaotic solutions of dynamic systems, pheromone trails, and use attractors to request for collaborations where they have found an unreachable zone. We propose an evolutionary algorithm adapted to this problem and used it to optimise the ABISS’ parameters in 12 case studies (30 scenarios each) comprising different map sizes, number and type of unmanned vehicles, and layouts. As a result, we obtained different configurations, which improved the coverage of the surveillance area, promoting collaboration between swarms.
We observed in most of our scenarios an emerging collaboration between vehicles, e.g., UAVs exploring water surface where a UGV was unable to access. The evolution of the parameters of the system promoted this altruistic collaboration, in which a vehicle abandons its original trajectory to explore such an unreachable area. ABISS improved the coverage of entire areas by 5.3% on average (up to 11.1%), and the exploration of unreachable zones by 13.9% (up to 40.3%), with respect to CACOC (Chaotic Ant Colony Optimisation for Coverage). In one case study, the strategy chosen by vehicles did not lead to collaborations, showing that our algorithm is able to find the best solution even in these rare scenarios. This negligible difference in the total coverage of this case study (0.1%) is related to the location of the unreachable zones and the initial trajectories of the vehicles. If we compare ABISS with the basic CACOC0, which cannot be parameterised, the improvements in the coverage are even higher (17.6% on average and 65.8% in UZs).
Using ABISS as a real world application for surveillance will include an offline setup stage of about 48 h. It will consist of the optimisation of the vehicles’ parameters according to the characteristics of the surveillance area and the composition of the swarms, performed by EA. After this, further EA runs will not be necessary provided the area and the swarms’ components do not change. The use of different initial conditions for the chaotic attractor will provide diverse vehicles’ trajectories which are unpredictable for intruders but deterministic for the Ground Control Station.
As a matter of future work, we plan to evaluate our proposal on other scenarios, including also other types of vehicles such as Unmanned Maritime Vehicles (UMV), and also increase the realism of our approach adding a realistic communication layer to exchange data related to pheromones and attractors. Finally, we are also interested in testing this mobility system using real autonomous vehicles (quadcopters and rovers) having already taken some steps in that direction testing the proposed trajectories using actual UAVs as well as collaborating with the SIMMS project (SIMMS: Swarm Intelligent Mission systeMS—https://simms.gforge.uni.lu/).

Author Contributions

Conceptualisation, D.H.S.; methodology, D.H.S.; software, D.H.S.; validation, D.H.S. and G.D.; formal analysis, D.H.S.; writing—original draft preparation, D.H.S.; writing—review and editing, D.H.S., M.R.B. and G.D.; visualisation, D.H.S.; supervision, G.D. and P.B.; project administration, G.D. and P.B.; and funding acquisition, G.D. and P.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by the Office of Naval Research, grant number N62909-18-1-2176.

Acknowledgments

This work relates to Department of Navy award N62909-18-1-2176 issued by the Office of Naval Research. The United States Government has a royalty-free license throughout the world in all copyrightable material contained herein. This work is partially funded by the joint research programme UL/SnT-ILNAS on Digital Trust for Smart-ICT. The experiments presented in this paper were carried out using the HPC facilities of the University of Luxembourg [47]—see https://hpc.uni.lu.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fuhrmann, M.; Horowitz, M.C. Droning On: Explaining the Proliferation of Unmanned Aerial Vehicles. Int. Organ. 2017, 71, 397–418. [Google Scholar] [CrossRef]
  2. Chabot, D. Trends in drone research and applications as the Journal of Unmanned Vehicle Systems turns five. J. Unmanned Veh. Syst. 2018, 6, 6–15. [Google Scholar] [CrossRef] [Green Version]
  3. Finn, R.L.; Wright, D. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. Comput. Law Secur. Rev. 2012, 28, 184–194. [Google Scholar] [CrossRef]
  4. Bouvry, P.; Chaumette, S.; Danoy, G.; Guerrini, G.; Jurquet, G.; Kuwertz, A.; Müller, W.; Rosalie, M.; Sander, J. Using heterogeneous multilevel swarms of UAVs and high-level data fusion to support situation management in surveillance scenarios. In Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Baden-Baden, Germany, 19–21 September 2016; pp. 424–429. [Google Scholar] [CrossRef] [Green Version]
  5. McNeal, G.S. Drones and the Future of Aerial Surveillance. Georg. Wash. Law Rev. Arguendo 2016, 84, 354–416. [Google Scholar]
  6. Faust, A.; Palunko, I.; Cruz, P.; Fierro, R.; Tapia, L. Automated aerial suspended cargo delivery through reinforcement learning. Artif. Intell. 2017, 247, 381–398. [Google Scholar] [CrossRef] [Green Version]
  7. Kanistras, K.; Martins, G.; Rutherford, M.J.; Valavanis, K.P. Survey of Unmanned Aerial Vehicles (UAVs) for Traffic Monitoring. In Handbook of Unmanned Aerial Vehicles; Valavanis, K.P., Vachtsevanos, G.J., Eds.; Springer: Dordrecht, The Netherlands, 2015; pp. 2643–2666. [Google Scholar] [CrossRef]
  8. Harikumar, K.; Senthilnath, J.; Sundaram, S. Multi-UAV Oxyrrhis Marina-Inspired Search and Dynamic Formation Control for Forest Firefighting. IEEE Trans. Autom. Sci. Eng. 2019, 16, 863–873. [Google Scholar] [CrossRef]
  9. Paranjape, A.A.; Chung, S.J.; Kim, K.; Shim, D.H. Robotic Herding of a Flock of Birds Using an Unmanned Aerial Vehicle. IEEE Trans. Robot. 2018, 34, 901–915. [Google Scholar] [CrossRef] [Green Version]
  10. Vicsek, T.; Zafeiris, A. Collective motion. Phys. Rep. 2012, 517, 71–140. [Google Scholar] [CrossRef] [Green Version]
  11. Tan, Y.; Zheng, Z.-Y. Research Advance in Swarm Robotics. Def. Technol. 2013, 9, 18–39. [Google Scholar] [CrossRef] [Green Version]
  12. Weibull, J.W. Evolutionary Game Theory; MIT Press: Cambridge, MA, USA, 1997. [Google Scholar]
  13. Li, Q.; Li, M.; Lv, L.; Guo, C.; Lu, K. A new prediction model of infectious diseases with vaccination strategies based on evolutionary game theory. Chaos Solitons Fractals 2017, 104, 51–60. [Google Scholar] [CrossRef]
  14. Haywood, O.G., Jr. Military Decision and Game Theory. J. Oper. Res. Soc. Am. 1954, 2, 365–385. [Google Scholar] [CrossRef]
  15. Seredynski, M.; Bouvry, P. Analysing the development of cooperation in MANETs using evolutionary game theory. J. Supercomput. 2013, 63, 854–870. [Google Scholar] [CrossRef]
  16. Bayındır, L. A review of swarm robotics tasks. Neurocomputing 2016, 172, 292–321. [Google Scholar] [CrossRef]
  17. Chung, S.J.; Paranjape, A.A.; Dames, P.; Shen, S.; Kumar, V. A Survey on Aerial Swarm Robotics. IEEE Trans. Robot. 2018, 34, 837–855. [Google Scholar] [CrossRef] [Green Version]
  18. Kernbach, S.; Häbe, D.; Kernbach, O.; Thenius, R.; Radspieler, G.; Kimura, T.; Schmickl, T. Adaptive collective decision-making in limited robot swarms without communication. Int. J. Robot. Res. 2013, 32, 35–55. [Google Scholar] [CrossRef]
  19. Tinoco, C.R.; Oliveira, G.M.B. Pheromone Interactions in a Cellular Automata-Based Model for Surveillance Robots. In Cellular Automata; Mauri, G., El Yacoubi, S., Dennunzio, A., Nishinari, K., Manzoni, L., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 154–165. [Google Scholar] [CrossRef]
  20. Bontzorlos, T.; Sirakoulis, G.C. Bioinspired algorithm for area surveillance using autonomous robots. Int. J. Parallel, Emergent Distrib. Syst. 2017, 32, 368–385. [Google Scholar] [CrossRef]
  21. Calvo, R.; Constantino, A.A.; Figueiredo, M. Individual distinguishing pheromone in a multi-robot system for a Balanced Partitioned Surveillance task. In Proceedings of the 2016 International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada, 24–29 July 2016; pp. 4346–4353. [Google Scholar] [CrossRef]
  22. Francesca, G.; Brambilla, M.; Trianni, V.; Dorigo, M.; Birattari, M. Analysing an Evolved Robotic Behaviour Using a Biological Model of Collegial Decision Making. In From Animals to Animats 12; Ziemke, T., Balkenius, C., Hallam, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 381–390. [Google Scholar] [CrossRef]
  23. Pinciroli, C.; Trianni, V.; O’Grady, R.; Pini, G.; Brutschy, A.; Brambilla, M.; Mathews, N.; Ferrante, E.; Di Caro, G.; Ducatelle, F.; et al. ARGoS: A modular, multi-engine simulator for heterogeneous swarm robotics. In Proceedings of the 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA, USA, 25–30 September 2011; pp. 5027–5034. [Google Scholar] [CrossRef] [Green Version]
  24. Gomes, J.; Urbano, P.; Christensen, A.L. Evolution of swarm robotics systems with novelty search. Swarm Intell. 2013, 7, 115–144. [Google Scholar] [CrossRef] [Green Version]
  25. Ferrante, E.; Turgut, A.E.; Stranieri, A.; Pinciroli, C.; Birattari, M.; Dorigo, M. A self-adaptive communication strategy for flocking in stationary and non-stationary environments. Nat. Comput. 2014, 13, 225–245. [Google Scholar] [CrossRef] [Green Version]
  26. Hecker, J.P.; Letendre, K.; Stolleis, K.; Washington, D.; Moses, M.E. Formica ex Machina: Ant Swarm Foraging from Physical to Virtual and Back Again. In Swarm Intelligence; Dorigo, M., Birattari, M., Blum, C., Christensen, A.L., Engelbrecht, A.P., Groß, R., Stützle, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 252–259. [Google Scholar] [CrossRef]
  27. Virágh, C.; Vásárhelyi, G.; Tarcai, N.; Szörényi, T.; Somorjai, G.; Nepusz, T.; Vicsek, T. Flocking algorithm for autonomous flying robots. Bioinspir. Biomimetics 2014, 9, 025012. [Google Scholar] [CrossRef] [Green Version]
  28. Tokekar, P.; Hook, J.V.; Mulla, D.; Isler, V. Sensor Planning for a Symbiotic UAV and UGV System for Precision Agriculture. IEEE Trans. Robot. 2016, 32, 1498–1511. [Google Scholar] [CrossRef]
  29. Rosalie, M.; Danoy, G.; Chaumette, S.; Bouvry, P. Chaos-enhanced mobility models for multilevel swarms of UAVs. Swarm Evol. Comput. 2018, 41, 36–48. [Google Scholar] [CrossRef] [Green Version]
  30. Zang, X.; Iqbal, S.; Zhu, Y.; Liu, X.; Zhao, J. Applications of Chaotic Dynamics in Robotics. Int. J. Adv. Robot. Syst. 2016, 13, 60. [Google Scholar] [CrossRef] [Green Version]
  31. Kuiper, E.; Nadjm-Tehrani, S. Mobility Models for UAV Group Reconnaissance Applications. In Proceedings of the 2006 International Conference on Wireless and Mobile Communications (ICWMC’06), Bucharest, Romania, 29–31 July 2006; p. 33. [Google Scholar] [CrossRef]
  32. Gilmore, R.; Lefranc, M. The Topology of Chaos: Alice in Stretch and Squeezeland, 2nd ed.; Wiley-VCH: Weinheim, Germany, 2012. [Google Scholar]
  33. Rosalie, M.; Letellier, C. Systematic template extraction from chaotic attractors: II. Genus-one attractors with multiple unimodal folding mechanisms. J. Phys. A: Math. Theor. 2015, 48, 235101. [Google Scholar] [CrossRef] [Green Version]
  34. Stolfi, D.H.; Brust, M.R.; Danoy, G.; Bouvry, P. A Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV Swarms. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar] [CrossRef]
  35. Stolfi, D.H.; Brust, M.R.; Danoy, G.; Bouvry, P. Optimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection. In Optimization and Learning; Dorronsoro, B., Ruiz, P., de la Torre, J.C., Urda, D., Talbi, E.G., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 37–48. [Google Scholar] [CrossRef]
  36. Dentler, J.; Rosalie, M.; Danoy, G.; Bouvry, P.; Kannan, S.; Olivares-Méndez, M.A.; Voos, H. Collision Avoidance Effects on the Mobility of a UAV Swarm Using Chaotic Ant Colony with Model Predictive Control. J. Intell. Robot. Syst. 2019, 93, 227–243. [Google Scholar] [CrossRef] [Green Version]
  37. Metropolis, N.; Ulam, S. The Monte Carlo Method. J. Am. Stat. Assoc. 1949, 44, 335–341. [Google Scholar] [CrossRef]
  38. Morris, M.D. Factorial Sampling Plans for Preliminary Computational Experiments. Technometrics 1991, 33, 161–174. [Google Scholar] [CrossRef]
  39. Campolongo, F.; Cariboni, J.; Saltelli, A. An effective screening design for sensitivity analysis of large models. Environ. Model. Softw. 2007, 22, 1509–1518. [Google Scholar] [CrossRef]
  40. Goldberg, D.E. Genetic Algorithms in Search, Optimization and Machine Learning, 1st ed.; Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 1989. [Google Scholar]
  41. Holland, J.H. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence; MIT Press: Cambridge, MA, USA, 1992. [Google Scholar]
  42. Boussaïd, I.; Lepagnot, J.; Siarry, P. A survey on optimization metaheuristics. Inf. Sci. 2013, 237, 82–117. [Google Scholar] [CrossRef]
  43. Goldberg, D.E.; Deb, K. A Comparative Analysis of Selection Schemes Used in Genetic Algorithms. Found. Genet. Algorithms 1991, 1, 69–93. [Google Scholar] [CrossRef] [Green Version]
  44. Chelouah, R.; Siarry, P. Continuous genetic algorithm designed for the global optimization of multimodal functions. J. Heuristics 2000, 6, 191–213. [Google Scholar] [CrossRef]
  45. López-Ibáñez, M.; Dubois-Lacoste, J.; Pérez Cáceres, L.; Birattari, M.; Stützle, T. The irace package: Iterated racing for automatic algorithm configuration. Oper. Res. Perspect. 2016, 3, 43–58. [Google Scholar] [CrossRef]
  46. Sheskin, D.J. Handbook of Parametric and Nonparametric Statistical Procedures; CRC Press: Boca Raton, FL, USA, 2003. [Google Scholar]
  47. Varrette, S.; Bouvry, P.; Cartiaux, H.; Georgatos, F. Management of an academic HPC cluster: The UL experience. In Proceedings of the 2014 International Conference on High Performance Computing & Simulation (HPCS), Bologna, Italy, 21–25 July 2014; IEEE: Bologna, Italy, 2014; pp. 959–967. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Attractor Based Inter-Swarm collaborationS (ABISS). In this example, a UAV swarm explores a water surface that UGVs cannot access.
Figure 1. Attractor Based Inter-Swarm collaborationS (ABISS). In this example, a UAV swarm explores a water surface that UGVs cannot access.
Sensors 20 02566 g001
Figure 2. Flow diagram of ABISS using attractors, chaotic solutions and pheromones. The parameters affecting each operation are listed next to them.
Figure 2. Flow diagram of ABISS using attractors, chaotic solutions and pheromones. The parameters affecting each operation are listed next to them.
Sensors 20 02566 g002
Figure 3. Parameters of ABISS. The UAV has to decide whether to go to explore the water surface where the UGV has left an attractor because it could not enter.
Figure 3. Parameters of ABISS. The UAV has to decide whether to go to explore the water surface where the UGV has left an attractor because it could not enter.
Sensors 20 02566 g003
Figure 4. Case studies without (a) and with square unreachable zones (bd). In these examples, there are four vehicles placed at their starting position in the centre of the map.
Figure 4. Case studies without (a) and with square unreachable zones (bd). In these examples, there are four vehicles placed at their starting position in the centre of the map.
Sensors 20 02566 g004
Figure 5. Parameter sensitivity study ( σ and μ ) for the model using four and eight parameters to modify the behaviour and performance of ABISS.
Figure 5. Parameter sensitivity study ( σ and μ ) for the model using four and eight parameters to modify the behaviour and performance of ABISS.
Sensors 20 02566 g005
Figure 6. Evolution of the values of k during the execution of the EA.
Figure 6. Evolution of the values of k during the execution of the EA.
Sensors 20 02566 g006
Figure 7. Frequency of the tests performed during the irace run for: the number of individuals (a); crossover probability (b); and mutation probability (c).
Figure 7. Frequency of the tests performed during the irace run for: the number of individuals (a); crossover probability (b); and mutation probability (c).
Sensors 20 02566 g007
Figure 8. Box plots showing the distribution of values (30 runs) of EA and RS after optimising the proposed 12 case studies. As we are maximising area coverage, the higher the better.
Figure 8. Box plots showing the distribution of values (30 runs) of EA and RS after optimising the proposed 12 case studies. As we are maximising area coverage, the higher the better.
Sensors 20 02566 g008
Table 1. Pheromone action table.
Table 1. Pheromone action table.
Probability of Action:LeftAheadRight
P L = t o t a l l e f t 2 × t o t a l P A = t o t a l a h e a d 2 × t o t a l P R = t o t a l r i g h t 2 × t o t a l
Table 2. Parameters of ABISS to be optimised.
Table 2. Parameters of ABISS to be optimised.
ParameterSymbolTypeUnitsRange
Intra-Swarm
Pheromone decay τ d real%[0.01–0.20]
Pheromone radius τ r integercells[0–2]
Pheromone scan angle τ a realradians[0.00– π 4 ]
Pheromone scan depth τ m integercells[1–10]
Inter-Swarm
Collaboration probability π c real[0.00–1.00]
Attractor scan angle α a realradians[0.00– π 4 ]
Attractor scan depth α m integercells[1–20]
Pheromone in unreachable area τ u real%[0.00–1.00]
Table 3. Characteristics of the 12 case studies (four without UZs and eight having two UZs).
Table 3. Characteristics of the 12 case studies (four without UZs and eight having two UZs).
Case StudySize# UZ# UAV# UGV
50x50.250 × 50011
50x50.450 × 50022
100x100.4100 × 100022
100x100.6100 × 100042
50x50.2z150 × 502 (15 × 15)11
50x50.4z150 × 502 (15 × 15)22
100x100.4z1100 × 1002 (30 × 30)22
100x100.4z2100 × 1002 (30 × 30)22
100x100.4z3100 × 1002 (30 × 30)22
100x100.6z1100 × 1002 (30 × 30)42
100x100.6z2100 × 1002 (30 × 30)42
100x100.6z3100 × 1002 (30 × 30)42
Table 4. The three best parameter configurations of EA. The configuration chosen is in bold.
Table 4. The three best parameter configurations of EA. The configuration chosen is in bold.
Ranking# IndividualsPcPmMean Fitness
1st200.920.220.8020
2nd100.100.370.7994
3rd100.110.360.7984
Table 5. Results of the optimisation process performed by EA and RS and the Wilcoxon p-value of each statistical test. We report the fitness values obtained from 30 runs of each algorithm on the 12 case studies (four without UZs and eight having two UZs) comprising 30 instances (scenarios) each (720 optimisation runs in total). Best fitness values are in bold.
Table 5. Results of the optimisation process performed by EA and RS and the Wilcoxon p-value of each statistical test. We report the fitness values obtained from 30 runs of each algorithm on the 12 case studies (four without UZs and eight having two UZs) comprising 30 instances (scenarios) each (720 optimisation runs in total). Best fitness values are in bold.
Case StudyFitness Values (30 runs)Wilcoxon p-Value
RSEA
MeanStDevMaxMeanStDevMax
50x50.20.8442.80 × 10 3 0.8470.8510.00 × 10 0 0.8510.000
50x50.40.9441.43 × 10 3 0.9470.9470.00 × 10 0 0.9470.000
100x100.40.6075.24 × 10 3 0.6130.6350.00 × 10 0 0.6350.000
100x100.60.7557.08 × 10 3 0.7660.7752.64 × 10 4 0.7750.000
50x50.2z10.8225.01 × 10 3 0.8290.8402.80 × 10 3 0.8460.000
50x50.4z10.9312.41 × 10 3 0.9360.9411.14 × 10 3 0.9440.000
100x100.4z10.6073.65 × 10 3 0.6190.6223.12 × 10 3 0.6290.000
100x100.4z20.5993.69 × 10 3 0.6060.6193.54 × 10 3 0.6290.000
100x100.4z30.5964.09 × 10 3 0.6050.6122.22 × 10 3 0.6180.000
100x100.6z10.7424.43 × 10 3 0.7560.7572.55 × 10 3 0.7610.000
100x100.6z20.7395.87 × 10 3 0.7500.7582.95 × 10 3 0.7640.000
100x100.6z30.7325.41 × 10 3 0.7450.7483.40 × 10 3 0.7540.000
Table 6. Best configuration for each case study (parameters) followed by the mean, standard deviation and best coverage obtained when testing them in the 30 corresponding scenarios.
Table 6. Best configuration for each case study (parameters) followed by the mean, standard deviation and best coverage obtained when testing them in the 30 corresponding scenarios.
Case Study τ d τ r τ a τ m π c α a α m τ u Coverage (%)
MeanStDevBest
50x50.20.0120.26585.12.890.3
50x50.40.0120.23494.70.895.7
100x100.40.0120.22863.53.169.2
100x100.60.0120.38777.52.982.0
50x50.2z10.0120.3640.210.08180.5984.64.289.8
50x50.4z10.0120.1540.350.06180.6794.41.095.6
100x100.4z10.0120.15100.220.1970.8862.92.667.8
100x100.4z20.0120.3480.240.0370.7662.92.767.1
100x100.4z30.0120.3260.550.17110.7561.83.467.4
100x100.6z10.0120.3560.350.2870.2676.13.280.7
100x100.6z20.0120.3570.330.3630.7976.42.783.1
100x100.6z30.0110.3770.000.06160.8275.42.680.6
Table 7. Comparison between the coverage values obtained by the non-collaborative approaches (CACOC0 and CACOC) and ABISS in case studies having unreachable zones (mean of 30 scenarios). The improvements achieved by ABISS with respect to CACOC0 and CACOC are also reported. The second best configuration values are indicated by asterisks. The best results are in bold.
Table 7. Comparison between the coverage values obtained by the non-collaborative approaches (CACOC0 and CACOC) and ABISS in case studies having unreachable zones (mean of 30 scenarios). The improvements achieved by ABISS with respect to CACOC0 and CACOC are also reported. The second best configuration values are indicated by asterisks. The best results are in bold.
Case StudyCoverages (%)
CACOC0CACOCABISS
TotalUZTotalUZTotalImprovement vs.UZImprovement vs.
CACOC0CACOCCACOC0CACOC
50x50.2z176.450.580.458.184.6+10.7%+ 5.2%70.1+38.8%+ 20.7%
50x50.4z189.970.993.083.994.4+ 5.0%+ 1.5%88.8+25.2%+5.8%
100x100.4z151.212.959.836.662.9+ 22.9%+ 5.2%39.6+ 207.0%+ 8.2%
100x100.4z247.838.356.657.262.9+ 31.6%+ 11.1%67.1+ 75.2%+ 17.3%
100x100.4z350.424.657.236.761.8+ 22.6%+ 8.0%51.5+ 109.3%+ 40.3%
100x100.6z164.025.771.941.076.1+ 18.9%+ 5.8%55.4+ 115.6%+ 35.1%
100x100.6z262.248.570.171.876.4+ 22.8%+ 9.0%77.3+ 59.4%+ 7.7%
100x100.6z363.739.675.467.4* 75.3+ 18.2%−0.1%* 65.8+ 66.2%−2.4%
Mean:63.238.970.656.674.317.6%5.3%64.565.8%13.9%

Share and Cite

MDPI and ACS Style

Stolfi, D.H.; Brust, M.R.; Danoy, G.; Bouvry, P. Emerging Inter-Swarm Collaboration for Surveillance Using Pheromones and Evolutionary Techniques. Sensors 2020, 20, 2566. https://doi.org/10.3390/s20092566

AMA Style

Stolfi DH, Brust MR, Danoy G, Bouvry P. Emerging Inter-Swarm Collaboration for Surveillance Using Pheromones and Evolutionary Techniques. Sensors. 2020; 20(9):2566. https://doi.org/10.3390/s20092566

Chicago/Turabian Style

Stolfi, Daniel H., Matthias R. Brust, Grégoire Danoy, and Pascal Bouvry. 2020. "Emerging Inter-Swarm Collaboration for Surveillance Using Pheromones and Evolutionary Techniques" Sensors 20, no. 9: 2566. https://doi.org/10.3390/s20092566

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop