Next Article in Journal
Four-Dimensional Path Planning Methodology for Collaborative Robots Application in Industry 5.0
Previous Article in Journal
Analysis of Distributed Dynamic Loads Induced by the Own Mass of Manipulator Links and Their Visualization on Interactive 3D Computer Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Geometric Path Planning and Synchronization for Multiple Vehicles

by
Hongjun Yu
1,* and
Lanyong Zhang
2
1
Australian Centre for Field Robotics, The University of Sydney, Sydney, NSW 2006, Australia
2
College of Intelligent System Science and Engineering, Harbin Engineering University, Harbin 150009, China
*
Author to whom correspondence should be addressed.
Robotics 2025, 14(4), 47; https://doi.org/10.3390/robotics14040047
Submission received: 13 February 2025 / Revised: 31 March 2025 / Accepted: 9 April 2025 / Published: 11 April 2025
(This article belongs to the Topic New Trends in Robotics: Automation and Autonomous Systems)

Abstract

:
In known environments, vehicles plan paths to the target and take precautions to minimize risks. Due to limited dynamics, bounded turning radii, and unfavorable initial conditions, they may be momentarily exposed to threats. In this study, we propose multi-objective real-time optimization based on Dubins paths for multiple vehicles. They synchronize target arrival by reasonably changing speeds and selecting paths of similar lengths. The closer the threats are to the robots and the target, the more path options are available. Risk is reduced in path planning by minimizing the duration of exposure to threats. Vehicles strike a balance between exposure to threats and travel time to targets. We use a probability-based approach to reduce the computation burden and select satisfactory paths such that vehicles synchronize target arrival reasonably far away from threats. The performances of the proposed methods are verified in several simulation examples.

1. Introduction

With advancing technologies and a wide range of applications, multiple-vehicle systems research has attracted more and more attention in recent years. As vehicles move in space, they should avoid threats. Due to their design and limited power, they cannot move freely in space. Path planning is needed to find a safe path to reach the target. Such an approach takes the limited mobility of vehicles into account.
Path smoothness is important [1,2] for vehicles with limited turning radii. For those that need to turn to alter directions, the curvature of paths determines whether they can tightly follow the given paths [3,4,5]. Multiple-wheel vehicles can differentiate wheel speeds, and surface or aerial vehicles can flip rudders or fins such that the turning radii are controlled to follow given paths [6]. However, the above methods have not used curvature for advanced path planning. In this paper, we take a step further and use arcs and lines to represent paths. Vehicles can follow paths as soon as new paths are produced. By adjusting radii in real time, vehicles can obtain optimal paths with the multi-objective cost function.
Path planning is important in providing guidance, and vehicles should reach targets and minimize exposure to threats. Swarm intelligence is useful in handling optimization problems and searching for the global optimum, especially for path planning [7,8]. However, it is computationally demanding to process a large number of particles. This limitation weakens the system’s real-time response. In some applications, lingering or hovering consumes fuel, and data transmission is vulnerable to delay. Multi-drone path planners for multi-target search and connectivity were proposed in [9] with adaptive strategies that re-plan paths upon target detection. A team of resource-constrained robots were used in [10] to collect data and minimize estimation error covariance using informative path planning. The authors transformed the routing-constrained planning problem into a mixed integer program. We use path variations to gather the solution space and propose probability-based searching to find the optimal path that shortens overall path lengths, reduces exposure to threats, and synchronizes arrival at the target.
Vehicles need to avoid threats as they move towards targets. Safety constraints were used with fuzzy reasoning in [11], and techniques were implemented for real-time performance. Mobile obstacle estimation was considered in [12] so that the proposed approaches can tolerate disturbances and faults in modeling. Other existing results were published in similar situations and aim to deal with moving obstacles. This paper uses arcs and lines to link paths. The tangent lines are between discs. To some extent, they are robust against mobile targets and threats. As the paths are simple to calculate, vehicles can achieve real-time performance. Obstacles were regarded as hard constraints [13,14], and other researchers considered probabilistic boundaries [15] that take uncertainty into account. This paper considers threats as soft boundaries, inside which intrusions are allowed and require minimization.
Optimal paths are subject to criteria and changes in circumstances. Quality and fast retrieval of the solution are dependent on the search algorithm. The algorithm designs in [14] assumed convexity in paths and used a gradient of criteria function to guide searching. Some works use inequality for theoretical analysis to determine the convergence rate of searching. Constrained reinforcement learning with topological reachability analysis was studied in [16], achieving reductions in distance costs in automated driving experiments. The efficiency of the proposed approach was analyzed theoretically. Some searching algorithms for path planning are based on graph theory [17,18], and modifications occur for fast response and minimization of energy consumption. Multi-stage/multi-step optimization is useful in combining the strengths of different techniques [13]. A novel approach in motion planning was proposed in [19] for vehicles with curvature constraints by treating integrated resource costs as hard constraints. The probabilistic roadmap was used in pathfinding [20] to reduce the computation burden. In this paper, we integrate steer control and path planning so that multiple vehicles avoid threats and synchronize arrival at the target. We propose algorithms to calculate variations in path sequences and use probability-based searching to find the optimal path, which is usually used to provide real-time performance.
Dubins path planning is usually used for vehicles with limited maneuverability. Dubins path optimization was used in [21] to extend a consensus-based bundle algorithm via a distributed genetic algorithm, and its effectiveness was validated through simulations in dynamic reconnaissance scenarios. Path following was investigated in [22], and Dubins path planning was used to integrate the tasks of navigation, guidance, and control. The target-assignment problem was studied in [21] under a Dubins path; it extended the consensus algorithm to generate feasible flight paths. Improved robustness and efficiency were observed in Monte Carlo simulations. A novel approach in motion planning was proposed in [19] for vehicles with curvature constraints that treated integrated resource costs as hard constraints. The method ensured that the total resource cost along a vehicle’s path stayed within a predefined limit, which was especially valuable in high-risk applications like firefighting. In this paper, we incorporate Dubins paths in the simultaneous arrival problem and use probability-based searching to mitigate risk in the presence of non-trivial threats. We propose a consensus-based control strategy on speed and path lengths in real time for multiple Dubin vehicles, and the performance is robust regardless of initial locations and headings.
Recent advances in multi-agent collaborative path planning have introduced decentralized control strategies, real-time optimization techniques, and learning-based methods to overcome these challenges [18]. For example, Qin et al. [15] and Todorovic et al. [5] demonstrated that distributed consensus algorithms and adaptive optimization frameworks can enhance the coordination of heterogeneous agents, enabling improved synchronization even when facing dynamic obstacles. Similarly, Wu et al. [21] integrated assignment strategies with advanced path planning to better manage both threat avoidance and the synchronization of arrival times among agents. A digital-twin-assisted distributed federated reinforcement training framework was introduced in [23] that maintains high-fidelity mapping, improved vehicle efficiency, and reduced collisions and completion times. A blockchain-based distributed multi-agent reinforcement learning (DMARL) algorithm was proposed in [24] that modeled the system as Markov decision processes to jointly minimize travel time and computation latency, achieving proactive load balancing of both road infrastructures and MEC nodes. Despite these promising developments, several limitations remain. Many state-of-the-art methods incur substantial computational complexity and are sensitive to communication delays, which can compromise real-time threat avoidance and synchronization efficiency—especially in environments with rapidly changing conditions. In contrast, our proposed approach builds upon the classical Dubins framework by incorporating a probability-based real-time optimization strategy. This design adapts turning radii and path selection dynamically to minimize both overall path lengths and exposure to threats while also synchronizing arrival times across vehicles. Importantly, it achieves these objectives with lower computational overhead and improved robustness under limited communication, thereby addressing the key shortcomings of both classical and recent methods.
We consider that vehicles move in space amid threats, represented by Dubins paths. The smaller the turning radii are, the better mobility vehicles would gain and the less likely they would be exposed to threats. However, vehicles sometimes need to enlarge turning radii when moving around large threats. Algorithm design for path planning should not only take threat locations but also radii into account. The proposed approach can strike a balance among multiple objectives. The overall optimization objective is to reach the target simultaneously along the shortest path with minimal risk.
In this paper, we propose path planning for multiple vehicles to reach targets simultaneously. They have bounded heading speeds and lower-bounded turning radii. There are threats in space, and measures are taken to avoid exposure to threats. Vehicles need to move in the space amid the threats and reduce their presence inside the threat discs. The contributions of this paper are summarized as follows:
  • Multiple vehicles with limited turning radii are coordinated for the simultaneous arrival task in the face of multiple threats. The proposed algorithms focus on target pursuit and the simultaneous arrival problem. The results can be applied to multiple targets with asynchronous arrival at prescribed times;
  • Dubins paths are used as actions and a cost function is proposed to evaluate paths in terms of threat avoidance, minimization of path lengths, and simultaneous arrival;
  • Soft boundaries are used to describe threats, and momentary intersections are allowed. Collision avoidance can be achieved by reasonably placing weights in the cost function;
  • We use the probability-triggered real-time control strategy to reduce path differences, lower communication frequencies, and achieve real-time performance.
The rest of the paper starts with the problem description and preliminaries. Then, we continue with the path planning and define the cost function to evaluate certain paths. We further define the variations in paths and path sequences. Based on these definitions, we propose probability-based learning for path optimization. We propose speed control to enable simultaneous arrival, supported by a theoretical analysis. The proposed approaches are verified with some numerical examples. See Table 1 for a list of the symbols in this paper.

2. Problem Description and Preliminaries

In this paper, we investigate path planning for multiple vehicles with threats in space. We assume the occurrence of displacements regarding threats. There is occasional lightweight communication with others, and they make real-time decisions on path planning to reach the target and avoid exposure to threats. The vehicles are assumed to have a limited turning radius, which, for round/aerial vehicles, is usually determined by the steer/rudder angles. The shortest path will be made by joining circular arcs of maximum curvature and straight lines [25]. In this paper, the dynamics are ignored and we consider the turning radius a control input.

2.1. Basic Vehicle–Threat Interaction

At instant k, positions of vehicles are established by positioning and communication in local frames as x i ( k ) R 2 , n i 1 , the headings as e i ( k ) R 2 , e i ( k ) = 1 , the positions of the threats as y j R 2 , m j 1 , and the position of the target as z ( k ) R 2 . This information is either acquired by sensing, communication, or estimation. We use (1) to describe vehicle i.
x i ( k + 1 ) = x i ( k ) + R i ( k ) e i ( k ) · [ sin ( θ i ( k ) ) cos ( θ i ( k ) ) 1 1 sin ( θ i ( k ) ) sin ( θ i ( k ) ) ] , θ i ( k ) = v i ( k ) τ , e i ( k + 1 ) = e i ( k ) [ cos ( θ i ( k ) ) sin ( θ i ( k ) ) sin ( θ i ( k ) ) cos ( θ i ( k ) ) ] ,
where R ̲ R i ( k ) R is the turning radius of vehicle i at instant k and R ̲ > 0 is the lower bound of turning radius; v i ( k ) R , v ̲ v i ( k ) v ¯ is the heading speed of vehicle i at instant k; τ R + is the sampling interval. There are some threats in space, and any vehicle that is less than r j R + away from threat j is considered to be exposed to the threat. In this paper, we assume r j R ̲ for any j 1 , and, thus, vehicles can move along the edge of the threat discs.
Vehicles have lower-bounded turning radii, and, when they turn left or right, they move along steer circles on their left or right. Take vehicle 1 in Figure 1 as an example. There are two different paths, path 1 and path 2, to reach the target. For path 1, vehicle 1 takes a right turn around the right steer circle to reach the target; along path 2, it takes a left turn around the left steer circle. Given vehicle i, the centers s i ( k ) , s i + ( k ) of the left and right steer circles are given in (2) below, both of whose radii are R i ( k ) .
s i + ( k ) = x i ( k ) + R i ( k ) e i ( k ) [ 0 1 1 0 ] , s i ( k ) = x i ( k ) R i ( k ) e i ( k ) [ 0 1 1 0 ] .
Note that If there are no threats, vehicle i turns left or right until it follows a straight line to reach the target. If there are threats, vehicle i takes avoidance action and moves along arcs and tangent lines around and among steer circles and threat discs until it follows a straight line to reach the target.
Between two separated discs, there are four tangent lines; between two intersected discs, there are two tangent lines. A path is defined by the vehicle’s position, heading, turning radius, left/right turn at the start of the path, threats, and the clock/anti-clockwise directions. At instant k, there are a finite total amount of threat discs, steer circles, and targets such that we can use a set N i ( k ) in (3) of numbers below to denote a path.
N i ( k ) = { x i ( k ) , e i ( k ) , R i ( k ) } , { i 1 ( k ) , i 2 ( k ) , i 3 ( k ) } , { s i ( k ) , y 1 ( k ) , y 2 ( k ) , , z ( k ) } } , N ( k ) = { N 1 ( k ) , N 2 ( k ) , } ,
where the path starts by vehicle i moving clockwise, if i 1 ( k ) = 1 , or anti-clockwise, if i 1 ( k ) = 1 , around right steer circle s i ( k ) = s i + ( k ) or left steer circle s i ( k ) = s i ( k ) in (2). Then, vehicle i leaves s i ( k ) and moves towards threat y 1 ( k ) along a tangent line such that it moves around threat y 1 ( k ) in clockwise direction, if i 2 ( k ) = 1 , or in anti-clockwise direction, if i 2 ( k ) = 1 . Vehicle i reaches threats y 1 ( k ) , y 2 ( k ) , in chronological order in N i ( k ) until it arrives at target z ( k ) .
With the positions of threats and the target, vehicles can derive paths to the target. They have access to and can evaluate each other’s paths. As the probabilistic approach is adopted, vehicles plan paths of their own. As a result, the vehicles would update their paths separately and asynchronously. Given the path sequence N i ( k ) , we obtain the path P i ( k ) in (4) below consisting of some arcs and lines.
P i ( N i ( k ) ) = P i ( k ) = { p 1 ( k ) , p 2 ( k ) , p 3 ( k ) , } ,
where p j ( k ) , j 1 is an arc on steer circle s i ( k ) , and p j , j + 1 ( k ) is a tangent line between threat discs y j ( k ) and y j + 1 ( k ) . An arc p j ( k ) is defined by the center, radius, start point, end point, and clockwise/anti-clockwise direction at instant k. A tangent line p j , j + 1 ( k ) is defined by the start and end points at instant k.
Vehicles can appropriately select paths to reduce overall path lengths or the sum of path lengths inside threats. Take Figure 2 as an example. Given the threat discs in space, vehicle 1 can obtain different paths to reach the target. The picture has three paths, path 1, path 2, and path 3, from vehicle 1 to the target. Along path 1, vehicle 1 takes a left turn and moves around threat 4 to reach the target, and parts of this path lie inside threats 1, 3, and 5. Along paths 2 and 3, vehicle 1 turns right and goes around threats 2 or 6, 7, and 8 to reach the target. In comparison, path 3 has minimal intersection with threats, and path 2 has the shortest overall length with significantly reduced intersection with threats.
Note that, given N i ( k ) and P i ( k ) in (3) and (4), and that circles s i ( k ) and y 1 ( k ) , or y j ( k ) and y j + 1 ( k ) for any j, are separated, if i j ( k ) = i j + 1 ( k ) for any j, then P i ( k ) is always valid and not empty. Given N i ( k ) that circles s i ( k ) and y 1 ( k ) , or y j ( k ) and y j + 1 ( k ) for j 1 , are intersected, if there exists j 1 such that i j ( k ) i j + 1 ( k ) , then P i ( k ) is not valid and empty. Target z ( k ) along the path is considered a circle with a sufficiently small radius whose center is at z ( k ) . If vehicles move or the target changes position, P i ( k ) may become empty by N i ( k ) .

2.2. Cost Function for Path Planning

After vehicles obtain multiple paths to the target, they select the best one with minimal exposure to threats and shorter overall lengths. Occasionally, parts of the paths lie inside the threat discs. They should be separately calculated. With a lower-bounded turning radius, the path from the vehicle to the target includes linking arcs and lines around and between threat discs. Lengths of paths from vehicles to the target are functions L of vehicle positions, headings, and turning radii. For vehicle i at instant k, set L i ( k ) of path lengths are calculated and given below.
L i ( P i ( N i ( k ) ) ) = L i ( k ) = { l 1 ( k ) , l 2 ( k ) , l 3 ( k ) , } .
Path lengths inside threats are considered as function T of paths L i ( k ) , threat positions and radii at instant k. The set T i ( k ) of path lengths inside threats at instant k is given below.
T ( L i ( P i ( N i ( k ) ) ) ) = T i ( k ) = { l 1 ( k ) , l 2 ( k ) , l 3 ( k ) } L i .
Thus, the overall path length L i ( k ) is given in (6) below.
L i ( k ) = l j ( k ) L i ( k ) l j ( k ) , L ( k ) = j = 1 n L j ( k ) .
The length sum T i ( k ) of paths inside the threat discs is given in (7) below.
T i ( k ) = l j ( k ) T i ( k ) l j ( k ) , T ( k ) = j = 1 n T j ( k ) .
Take Figure 2 as an example. In the presence of threats, path 1 can be further divided into 6 mini-paths; those that fall inside the threat discs are drawn as bold lines and arcs in Figure 2, and those that fall outside the threat discs are drawn as light lines and arcs.
The threats in space determine the vehicle paths inside them. The procedure to calculate the lengths is omitted. There are threats in space, resulting in many possible paths to the target. For simultaneous arrival tasks, vehicles select paths with similar overall path lengths. In other words, the goal is to minimize variance ϕ ( k ) given in (8) below.
ϕ ( k ) = n i = 1 ( L i ( k ) L ¯ ( k ) ) 2 , L ¯ ( k ) = 1 n n i = 1 L i ( k ) .
The suitable paths are found by striking a balance between minimizing overall path length L ( k ) , path variance ϕ ( k ) , and path length sum T ( k ) inside threat discs.
The turning radii of the vehicles are lower-bounded. They can change the radii to achieve better performance if there is a margin with the lower bound. Take Figure 3 as an example. For different turning radii, vehicle 1 can follow different paths to reach the target, and these paths yield different overall path lengths and lengths inside the threat discs. As is shown in the picture, the turning radii for the five paths are R i ( k ) = 1 , 2.25 , 3.5 , 4.75 , 6 , the overall path lengths are 22.3, 27.1, 32.4, 38, and 43.9, and the path lengths inside threats are 10, 9.1, 10.4, 6.1, and 1.5. It can be seen that the path becomes longer as the radius becomes larger and vice versa; the shortest and second shortest path length sum inside threat happens when R i ( k ) = 6 , 4.75 . Thus, vehicles can reduce exposure to threats by changing turning radii. For simultaneous arrival tasks, vehicles would change radii such that their overall path lengths gradually synchronize.

3. Main Methods

3.1. Path Planning and Cost Function

Vehicles’ actions are guided by their paths. We evaluate the cost of action by (9) below.
C ( N ( k ) ) = α T ( k ) + β L ( k ) + γ ϕ ( k ) ,
where α , β , γ > 0 are constant coefficients. Vehicles prefer an action obtained by (10) below.
N i * ( k ) = min N i ( k ) N i ( k ) C ( N ( k ) ) ,
where N i ( k ) is a set of path sequences that vehicle i has access to. Such a set can be received from other vehicles, or estimated by recently received path sequences.
Vehicles seek to reach the target with the shortest path length and minimal threat exposure. To reduce the path lengths, we should use larger β ; to avoid exposure to threats, we should use larger α . For simultaneous arrival tasks, vehicles should eliminate path length differences among them, and, for this purpose, we should enlarge γ . In cases where threats are scarcely distributed, we should use an α significantly larger than β and γ ; for satisfactory performance on simultaneous arrival, γ should be at least several times larger than β .
Vehicles may suffer low communication capacity, and the data transmission is occasionally interrupted in relevance to the size of the data packet. At instant k, M i ( k ) = { i 1 , i 2 , , i ϵ i ( k ) } is a set of vehicles that vehicle i is communicating with or has communicated with. With communication being considered, we use (11) below for vehicle i to evaluate paths.
C ( N M i ( k ) ( k ) ) = α j M i ( k ) T j ( k ) + β j M i ( k ) L j ( k ) ϵ i ( k ) + γ j M i ( k ) ( L j ( k ) L ¯ i ( k ) ) 2 ϵ i ( k ) , L ¯ i ( k ) = j L ¯ i ( k ) L j ( k ) ϵ i ( k ) ,
where N M i ( k ) ( k ) is a set of path sequences of vehicle i and other vehicles that vehicle i received. By (11), vehicles will take an action by (10) below.
N i * ( k ) = min N i ( k ) N i ( k ) C ( N M i ( k ) ( k ) ) .
The above-mentioned parameters, α   β , and γ , are important to system performance. They are assumed to be fixed throughout the operations, and it was proven effective in Section 4. A detailed sensitivity analysis is beneficial for future research.

Re-Calculate Path Length Inside Threat Discs

Vehicles make real-time decisions to select the appropriate paths, which are subject to change due to their evolving sub-optimality. The parts of the paths that are closer to the vehicles have a larger influence than those further away, especially for the sake of threat avoidance. By (5), we have T i ( k ) = { l 1 ( k ) , l 2 ( k ) , l 3 ( k ) } . We use ω ( l ) below to take this factor into account and re-calculate T i ( k ) .
l j ( k ) = t = 1 t = j 1 l t ( k ) t = 1 t = j l t ( k ) ω ( l ) l P i ( k ) d l P i ( k ) , f o r j 1 ,
where l P i ( k ) is path length along P i ( k ) from x i ( k ) and l 0 ( k ) = 0 . ω ( l ) has a decreasing value as l increases such that, the further away from vehicle i the path is, the less influential it is on vehicle i. Moreover, the path closer to the vehicle has a larger influence such that it would take more drastic actions to avoid imminent exposure to threats. An example of ω ( l ) is given in Figure 4.

3.2. Variations in Paths and Path Sequences

In the previous section, we proposed an algorithm of decision-making for selecting the best path. The quality of the solution is determined by N i ( k ) , which includes multiple variations in paths or path sequences. By definition in (3), the number of elements in N i ( k ) is subject to possible variations induced by positions of vehicles, turning radii, steer circle, threat discs, and the clockwise/anti-clockwise directions that vehicles go around. Specifically, we discuss three types of variations below.
Type I  
Given N i ( k ) , Y = { s i ( k ) , y 1 ( k ) , y 2 ( k ) , , z ( k ) } N i ( k ) and I = { i 1 ( k ) , i 2 ( k ) , i 3 ( k ) } N i ( k ) , we obtain new path sequences by altering members in Y below.
Case 1.
Remove a member in Y :
  • Step 1. Select and remove member y j ( k ) Y , j 1 .
  • Step 2. We have Y = { s i ( k ) , , y j 1 ( k ) , y j + 1 ( k ) , } .
  • Step 3. We obtain a new path sequence N i ( k ) = { { x i ( k ) , e i ( k ) , R i ( k ) } , I , Y } and path P i ( k ) = P ( N i ( k ) ) .
  • Note that z ( k ) cannot be removed because the vehicles are required to reach the target. As vehicle i has a bounded turning radius, s i ( k ) cannot be removed. But, it is allowed to alternate between s i + ( k ) and s i ( k ) when i 1 ( k ) alternates between 1 and −1.
Case 2.
Insert a member in Y :
  • Step 1. Any threat y Y can be inserted between y j ( k ) and y j + 1 ( k ) , y j ( k ) , y j + 1 ( k ) Y , j 1 after s i ( k ) and before z ( k ) .
  • Step 2. We have Y = { s i ( k ) , , y j ( k ) , y , y j + 1 ( k ) , } .
  • Step 3. We obtain a new path sequence N i ( k ) = { { x i ( k ) , e i ( k ) , R i ( k ) } , I , Y } and path P i ( k ) = P ( N i ( k ) ) .
  • Note that existing threats in Y shall not be re-inserted as the elements in Y should be mutually exclusive. Such insertion creates a redundant path that is immediately non-optimal.
Case 3.
Shuffle orders of members in Y :
  • Step 1. For y j 1 ( k ) , y j 2 ( k ) , . . . Y , we rearrange their places in Y .
  • Step 2. We have Y = { s i ( k ) , , y j 1 1 ( k ) , y j 2 ( k ) , y j 1 + 1 ( k ) , , y j 2 1 ( k ) , y j 1 ( k ) , y j 2 + 1 ( k ) , } if j 2 j 1 , or Y = { s i ( k ) , , y j 2 1 ( k ) , y j 1 ( k ) , y j 2 + 1 ( k ) , , y j 1 1 ( k ) , y j 2 ( k ) , y j 1 + 1 ( k ) , } if j 2 j 1 .
  • Step 3. We obtain a new path sequence N i ( k ) = { { x i ( k ) , e i ( k ) , R i ( k ) } , I , Y } and path P i ( k ) = P ( N i ( k ) ) .
  • Note that the rearranging can happen once or multiple times to obtain different new path sequences N i ( k ) and path P i ( k ) = P ( N i ( k ) ) . The more the rearranging happens, the more different the new path will be from P i ( k ) . Also, the orders of s i ( k ) and z ( k ) in Y should remain unchanged.
Case 4.
Reverse clockwise/anti-clockwise directions in Y :
  • Step 1. For members i j 1 ( k ) , i j 2 ( k ) I , we have i j 1 ( k ) = i j 1 ( k ) , i j 2 ( k ) = i j 2 ( k ) .
  • Step 2. We have I = { , i j 1 1 ( k ) , i j 1 ( k ) , i j 1 + 1 ( k ) , , i j 2 1 ( k ) , i j 2 ( k ) , i j 2 + 1 ( k ) , } if j 2 j 1 or I = { , i j 2 1 ( k ) , i j 2 ( k ) , i j 2 + 1 ( k ) , , i j 1 1 ( k ) , i j 1 ( k ) , i j 1 + 1 ( k ) , } if j 2 < j 1 .
  • Step 3. We obtain a new path sequence N i ( k ) = { { x i ( k ) , e i ( k ) , R i ( k ) } , I , Y } and path P i ( k ) = P ( N i ( k ) ) .
  • Note that the elements in I are either 1 or −1, where 1 represents the clockwise direction and −1 represents the anti-clockwise direction. We obtain a new path sequence by selecting one or multiple elements in I , reversing the signs by multiplying by −1 and re-grouping with the other elements in I . The more sign reversing happens, the more different the new path will be from P i ( k ) .
Type II 
Given N i ( k ) , we obtain new path sequence N i ( k ) = { { x i ( k ) , e i ( k ) , R i ( k ) } , I , Y } and path P i ( k ) = P ( N i ( k ) ) by changing turning radius of vehicle i below:
Case 5.
Enlarge R i ( k ) = R i ( k ) + δ ;
Case 6.
Reduce R i ( k ) = R i ( k ) δ ;
where δ > 0 is a constant small value, and it is used to change the turning radius. R i ( k ) is used to replace R i ( k ) in N i ( k ) and we obtain a new path sequence N i ( k ) = { { x i ( k ) , e i ( k ) , R i ( k ) } , I , Y } .
Type III
Given N i ( k ) , we obtain new path by changing the starting position:
Case 7.
Insert a path in front of P i ( k ) that is independent of N i ( k ) :
  • Step 1. By (13), vehicle i turns left or right as c = 1 or 1 , and, by (14), it moves straight forward, where we obtain two arcs p c and a line p 0 .
  • Step 2. We have x c ( k ) , e c ( k ) and x 0 ( k ) , e 0 ( k ) by (13) and (14).
  • Step 3. We obtain path sequences N i c ( k ) = { { x c ( k ) , e c ( k ) , R i ( k ) } , I , Y } and N i 0 ( k ) = { { x 0 ( k ) , e 0 ( k ) , R i ( k ) } , I , Y } , which are used to obtain P i c ( k ) = { p c } P ( N i c ( k ) ) and P i 0 ( k ) = { p 0 } P ( N i 0 ( k ) ) .
  • In contrast with the beginning of the path sequence N i ( k ) , vehicle i can turn right or left or move straight forward in the next sampling interval. Thus, without changing I and Y and being independent of the path sequence N i ( k ) , we insert arcs p c or line p 0 in the first place of path P i ( k ) and obtain new paths P i + 1 ( k ) , P i 0 ( k ) , P i 1 ( k ) .
    x i c ( k ) = x i ( k ) + R i ( k ) e i ( k ) · [ sin ( θ i c ( k ) ) cos ( θ i c ( k ) ) 1 1 sin ( θ i c ( k ) ) sin ( θ i c ( k ) ) ] ,
    e i c ( k ) = e i ( k ) [ cos ( θ i c ( k ) ) sin ( θ i c ( k ) ) sin ( θ i c ( k ) ) cos ( θ i c ( k ) ) ] , θ i c ( k ) = c · v i ( k ) τ ;
    x i 0 ( k ) = x i ( k ) + τ v i ( k ) e i ( k ) , e i 0 ( k ) = e i ( k ) .
The obtained new paths/path sequences above are included in set N i ( k ) , which is used in (10) or (12) to find the best path.
We have presented above the method to generate variable paths for later optimization. Note that our approach intentionally generates vehicle paths with smooth curvature transitions that are constrained to not exceed the vehicles’ maximum turning capacity. In other words, by design, the curvature changes in our planned paths always remain within the controllable range of the vehicles, ensuring full compatibility with their dynamic constraints.

3.3. Probability-Based Learning and Path Optimization

In the previous section, we propose cost functions in (9) and (11) to evaluate the quality of paths for vehicles and propose decision algorithms in (10) and (12) to find the locally optimal path. For vehicle i at instant k, the best path is found in set N i ( k ) , which is a variation in paths based on the current path sequence N i ( k ) . Three types and seven cases are considered in obtaining variations in N i ( k ) or P i ( k ) . One or multiple of these cases can be used, and, the more cases are used, the more different the obtained path P could potentially be from P i ( k ) . Different cases lead to various paths, and the quality of the solution can be improved by selecting preferable cases in search of the best path.
At instant k, we use P ( c a s e j ) to represent the possibility that vehicle i uses case j to obtain new path variation, and the possibility of using a total number n q of cases is P ( t o t a l c a s e s = n q ) . We use the flowchart in Figure 5 to automate the process. At each iteration, an optimal path sequence N i * ( k ) is found in N i ( k ) . Vehicle i will use N i ( k + 1 ) = N i * ( k ) to update and follow the optimal path until it reaches the target.
Vehicles are equipped with sensors and receivers to measure the distance and direction of the target and threats and receive the path lengths of others. M i ( k ) is a set of vehicles communicating/communicated with vehicle i at instant k. Due to the imperfection of receivers and transmitters and the existence of disturbances in space, M i ( k ) is not updated in real time. During intervals between delayed communications, vehicles need to estimate the progress of other vehicles along their paths.
Vehicles communicate with each other, and different cost values by (9) are obtained. It is important to choose vehicles to communicate with reasonably. In simultaneous arrival tasks, vehicles need to synchronize the path lengths. For vehicle i at instant k, it should communicate with those whose path lengths are closer to the mean length L ¯ i ( k ) of all accessible vehicles. It is reasonable to assume that, the closer the path length of a given vehicle is to the mean lengths, the more likely it will be communicated with.
At instant k and given vehicle i, we use P ( j ) to represent the possibility that vehicle i receives information (path and speed) from vehicle j and P ( total   receipts = n v ) to represent the possibility that there is a number n v of vehicles communicating with vehicle i. We have
P ( j ) = | L ¯ i ( k ) L j ( k ) | t 1 | L ¯ i ( k ) L t ( k ) | .
k j is the instant when vehicle i receives information from vehicle j; M i ( k ) is updated to include j, j M i ( k ) , k > k j .
At instant k, if vehicle i is not receiving path information from vehicles j, j M i ( k ) , it needs to estimate its current path by routing.

Update Path Sequence by Routing

Assume that, at instant k j , vehicle i receives path sequences N j ( k j ) and v j ( k j ) from vehicle j. At instant k, vehicle i has to estimate the path sequence for vehicle j. Vehicle i considers vehicle j’s speed to be v j ( k j ) . It has moved at such speed for ( k k j ) τ . For vehicle i, it is possible to assume that vehicle j has proceeded a distance l j ( k ) along path sequence N j ( k j ) .
l j ( k + 1 ) = l j ( k ) + v j ( k j ) τ , l j ( k j ) = 0 .
For vehicle i to obtain path of vehicle j, the distance l j ( k ) is removed from P j ( k j ) and the remaining path is P j ( k ) at instant k. It is considered by vehicle i to be the estimate of vehicle j’s current path to the target. For vehicle j, its actual path at instant k is probably different from such estimate by vehicle i because of speed change or variation and optimization of the path.
The paths of vehicles belonging to M i ( k ) are used by vehicle i to find its optimal path. We use the flowchart in Figure 6 to demonstrate the communication process. Vehicle i can acquire and keep track of path information with occasional communication. As a result of reduced communication frequency, computation burden is reduced and path estimation error is eliminated as soon as unbiased new data arrive. Thus, estimation error would not aggregate if communication were adequately frequent.

3.4. Speed Control and Theoretical Analysis

In this paper, we assume that vehicles can alter their speeds. For simultaneous arrival tasks, vehicles use path planning to reduce the differences in their path lengths. For those with shorter path lengths, they should slow down, and, for those with longer paths, they should speed up. By reasonably altering speeds, multiple vehicles can reach the target simultaneously. For vehicle i, the path length dynamics are given in (16) and the controller is given in (17) below.
L i ( k + 1 ) = L i ( k ) τ v i ( k ) ,
v i ( k + 1 ) = v i ( k ) + K τ ( L i ( k ) L ¯ ( k ) v i ( k ) ) ,
where, at instant k, L ¯ ( k ) is the mean path length and v i ( k ) is the speed.
The system is stable if | 1 K τ | < 1 .
Proof. 
By (16) and (17), stability and convergence are determined by the value of K, and, below, we analyze the conditions for stability and identify factors prescribing convergence rate.
By (16), we have (18)
L ¯ ( k + 1 ) = L ¯ ( k ) τ v ¯ ( k ) , v ¯ ( k ) = j = 1 n v j ( k ) n .
By (17), we have
v ¯ ( k + 1 ) = v ¯ ( k ) + K τ ( 1 v ¯ ( k ) ) , v ¯ ( k + 1 ) = ( 1 K τ ) v ¯ ( k ) + K τ , v ¯ ( k + 1 ) K τ 2 K τ = ( 1 K τ ) ( v ¯ ( k ) K τ 2 K τ ) .
It follows that
v ¯ ( 2 ) K τ 2 K τ = ( 1 K τ ) ( v ¯ ( 1 ) K τ 2 K τ ) , v ¯ ( 3 ) K τ 2 K τ = ( 1 K τ ) ( v ¯ ( 2 ) K τ 2 K τ ) , v ¯ ( k ) K τ 2 K τ = ( 1 K τ ) ( v ¯ ( k 1 ) K τ 2 K τ ) .
Assume v ¯ ( 1 ) = 1 , and then we have (19).
v ¯ ( k ) = K τ 2 K τ + ( 1 K τ ) k 1 ( v ¯ ( 1 ) K τ 2 K τ ) .
If | 1 K τ | 1 , then v ¯ ( k ) k K τ 2 K τ . If | 1 K τ | > 1 , then v ¯ ( k ) k ± . The convergence rate is determined by 1 K τ , and, the larger K is, the faster v ¯ ( k ) will reach steady state. □
Stability is the basic requirement of the system. The fastest and slowest speeds are bounded if the average speed is bounded. The vehicles are proceeding towards the target, and it matters how long it takes them to reach consensus on speeds. Ideally, consensus on speeds and path lengths should be reached before the vehicles arrive at the target, which is determined by convergence based on further research. Differences in vehicle dynamics significantly affect their capacity for synchronization. In our study, vehicles use a controller to adjust speeds and path optimization to alter turning radii, the latter of which effectively renders the vehicles heterogeneous.
Vehicles will achieve consensus on vehicle speeds if the system is stable.
Proof. 
Assume that we have v ¯ ( 1 ) K τ 2 K τ . As long as the system is stable by 0 1 K τ 1 , then, by (19), we have v ¯ ( k ) for k 1 and k = 1 v ¯ ( k ) τ is unbounded. By definition, we have
n L ¯ ( k ) = i = n i = 1 L i ( k ) = L 1 ( k ) + + max 1 i n L i ( k ) + + L n ( k ) .
As L i ( k ) 0 for any i, then we have
n L ¯ ( k ) max 1 i n L i ( k ) , L ¯ ( k ) max 1 i n L i ( k ) n .
As L ¯ ( k ) 0 , we have
L ¯ ( k ) max 1 i n L i ( k ) n 0 .
There are a finite number of vehicles, and n is upper-bounded. We have
max 1 i n L i ( k ) 0 .
For any vehicle i, L i ( k ) max 1 i n L i ( k ) . As max 1 i n L i ( k ) 0 , then we have L i ( k ) 0 .
Vehicles always move towards the target. Then, we have v i ( k ) 0 for any i. Speeds of vehicles are both upper-bounded and lower-bounded, and the lower bound is larger than K τ 2 K τ . As a result, there exists vehicle i such that K τ 2 K τ v i ( k ) v ¯ ( k ) . Then, we have v i ( k ) K τ 2 K τ by v ¯ ( k ) K τ 2 K τ and v ¯ ( k ) K τ 2 K τ .
There are m vehicles whose speeds are faster than v ¯ ( k ) , and vehicle i is the slowest among these vehicles. We have
n v ¯ ( k ) = i = n i = 1 v i ( k ) , v ¯ ( k ) v i ( k ) v ¯ ( k ) L i ( k ) + m v i ( k ) n .
Thus, we have
v i ( k ) v ¯ ( k ) L i ( k ) + m v i ( k ) n K τ 2 K τ as k .
Therefore, v i ( k ) K τ 2 K τ as k . The same is true for other vehicles whose speeds are faster than the average. In summary, fast and slow vehicles will reach consensus on speeds, and we have v i ( k ) K τ 2 K τ for k . □
By (16), the convergence of path lengths is determined by vehicles’ speeds. As v i ( k ) ’s convergence rate is determined by 1 K τ , we can expect simultaneous arrival by L i ( k ) approaching zero as long as the longest path length descends adequately quickly and the shortest path length descends sufficiently slowly. Since the lower and upper bounds of vehicles’ speeds exist, simultaneous arrival may not always happen. Sufficient convergence conditions for speed control are difficult to obtain. The convergence is directly impacted by the overall path lengths of all the vehicles, a product of the multi-robot path optimization process. Such a process is significantly uncertain due to asynchronous optimization parameters, communication constraints, and uncertain locations of risks in the environment. This issue is open to future research.

4. Numerical Examples

In this section, we use some simulations to test the performance of the proposed approaches. The experiments were conducted on a Mac mini 2023 with a multi-core processor, although our implementation was restricted to single-core processing using MATLAB 2023a. The vehicles have limited turning radii, and, at instant k, we have 0.5 R i ( k ) R ¯ i for any 1 i n . At instant 0, R ¯ i ( 0 ) is given below.
{ R ¯ i ( 0 ) } = { 2 , 3 , 1 , 3 , 3 , 1 , 2 , 2 , 2 , 3 , 3 , 3.5 , 2 , 3 , 1 , 2 } ,
where R ¯ 1 ( 0 ) = 2 , R ¯ 2 ( 0 ) = 3 , R ¯ 3 ( 0 ) = 1 , …, in order. The initial positions of vehicles are given below.
{ x i ( 0 ) } = { [ 0 0 ] , [ 1 0 ] , [ 0 1 ] , [ 1 1 ] , [ 1 1 ] , [ 0 1 ] , [ 1 0 ] , [ 1 1 ] , [ 1 1 ] , [ 2 1 ] , [ 2 0 ] , [ 2 1 ] , [ 2 2 ] , [ 1 2 ] , [ 0 2 ] , [ 1 2 } ] , }
where x 1 ( 0 ) = [ 0 0 ] , x 2 ( 0 ) = [ 1 0 ] , …, in order. The initial headings of the vehicles are given below.
{ e i ( 0 ) } = { [ 0.998 0.059 ] , [ 0.999 0.022 ] , [ 0.341 0.94 ] , [ 0.484 0.875 ] , [ 0.067 0.998 ] , [ 0.471 0.882 ] , [ 0.026 1 ] , [ 0.985 0.171 ] , [ 0.585 0.811 ] , [ 0.127 0.992 ] , [ 0.583 0.812 ] , [ 0.506 0.862 } , [ 0.162 0.987 ] , [ 0.438 0.899 ] , [ 0.915 0.402 ] , [ 0.316 0.949 ] ] , }
where e 1 ( 0 ) = [ 0.998 0.059 ] , e 2 ( 0 ) = [ 0.999 0.022 ] , …, in order. The positions of the threats and the threat radii are given below.
{ y i } = { [ 1.5 0 ] , [ 6.5 4 ] , [ 7 2 ] , [ 12 2 ] , [ 3 4 ] , [ 5 2 ] , [ 0 7 ] , [ 7 10 ] , [ 13 10 ] } , { r j } = { 2 , 1.75 , 1.8 , 1.6 , 2 , 1.5 , 2 , 2 , 1.6 } ,
where y 1 = [ 1.5 0 ] , y 2 = [ 6.5 4 ] , …, in order and r 1 = 2 , r 2 = 1.75 , …, in order. The position of the target is z = [ 12 6 ] .
The sampling interval is τ = 0.1 , and, for cost function, we have α = 10 5 , β = 3 and γ = 1 . Note that we have used a 0.1 s sampling interval to demonstrate the real-time performances. Shorter intervals and more frequent updates would help to synchronize speeds and paths in a shorter time. On the other hand, longer sampling intervals would lead to less frequent updates and failure in simultaneous arrival. This issue is omitted in this study and will be open to future research.
We use ω ( l ) to recalculate the path lengths inside threats, and the curve is given in Figure 4. It can be seen that the curve starts high at l = 0 , and this helps vehicles prone to threat avoidance actions when they are imminent. The curve descends fast as l increases, and this helps vehicles underplay threats far away as they pose fewer risks. Note that the simulations in this section are run on a MacBook Pro 2014 Mid model. When the graphical output is disabled, it typically takes 30 ms or less than 0.1 s to complete the computation in each iteration.
The paths are given in Figure 7, Figure 8 and Figure 9, where there are no communication constraints, and Figure 10, Figure 11 and Figure 12, where there are communication constraints. The threats are shaded, and the target is labeled in the figures. The initial positions of vehicles 1, 2, …, 6 are inside threat discs and those of vehicles 7, 8, …, 16 are outside threat discs. We infer the initial headings of vehicles from the tangent arrows at the initial positions of the vehicles. The vehicles reasonably avoid threats, and they eventually reach the target. The paths are smooth in general. There are few differences between paths under different settings for communication constraints.
Groups of 4, 10, and 16 vehicles are free to communicate in tasks for simultaneous arrival at the target. The initial positions are { x 1 ( 0 ) , x 2 ( 0 ) , x 3 ( 0 ) , x 4 ( 0 ) } , { x 1 ( 0 ) , x 2 ( 0 ) , , x 10 ( 0 ) } , and { x 1 ( 0 ) , x 2 ( 0 ) , , x 16 ( 0 ) } , the initial headings are { e 1 ( 0 ) , e 2 ( 0 ) , e 3 ( 0 ) , e 4 ( 0 ) } , { e 1 ( 0 ) , e 2 ( 0 ) , , e 10 ( 0 ) } , and { e 1 ( 0 ) , e 2 ( 0 ) , , e 16 ( 0 ) } , and the turning radii are { R 1 ( 0 ) , R 2 ( 0 ) , R 3 ( 0 ) , R 4 ( 0 ) } , { R 1 ( 0 ) , R 2 ( 0 ) , , R 10 ( 0 ) } , and { R 1 ( 0 ) , R 2 ( 0 ) , , e 16 ( 0 ) } . The simulations are divided into two settings, one of which involves communication constraints, the other having none. If there are no communication constraints, every vehicle can communicate with all the rest of the vehicles every τ . If there are such constraints, vehicles communicate with one of the other vehicles every 10 τ .
The curves of path lengths and number of vehicles are given in Figure 13, Figure 14 and Figure 15, where there are no communication constraints, and Figure 16, Figure 17 and Figure 18, where there are communication constraints. The curves of path lengths are drawn on a log scale. The overall path lengths reduce steadily, indicating that the vehicles are approaching the target. The path lengths inside threats are also reduced and become zero before the vehicles reach the target. This shows that path-planning algorithms are successful in threat avoidance. The curves of path length inside threats do not indicate the actual track of vehicles inside threats. Take Figure 16 as an example. Around t = 13 s in the simulation, the curve of path length inside threats jumps from zero to non-zero. However, if we observe Figure 12, the path length inside threats should be zero.
After a vehicle has reached the target, it will be removed from the group and the number of vehicles will decrease by one. The curves of some vehicles are unchanged throughout most of the simulation and drop to zero as vehicles arrive at the target. This means that the vehicles disappear roughly at the same time. Some vehicles reach the target earlier than others. Then, there is a premature drop that can be observed in Figure 13. At the same time, there is a disturbance in the curves of path lengths. Moreover, due to communication constraints, path updates are less frequent. As a result, disturbances on path length curves in Figure 16, Figure 17 and Figure 18 last longer than those in Figure 13, Figure 14 and Figure 15.
The curves of vehicle speeds are given in Figure 19, Figure 20 and Figure 21, where there are no communication constraints, and Figure 22, Figure 23 and Figure 24, where there are communication constraints. Of all the curves, it is observed that the average speed of all vehicles oscillates around 1. This is because the initial speeds of all vehicles are v i ( 0 ) = 1 for any i 1 . Ideally, the average speed will remain at 1 throughout the simulations. In practice, average speed oscillations are incurred by erroneous estimation of the average speed from delayed communication and the received paths from other vehicles. This explains why, under communication constraints, the curves in Figure 22, Figure 23 and Figure 24 are smoother than those in Figure 19, Figure 20 and Figure 21, where there are no communication constraints and the frequent path updates lead to frequent speed adjustments by (17).
The length differences among vehicle paths are the main causes of the speed spikes. They are often observed at the beginning of the simulations when the path difference is most significant or vehicles are taking threat-avoiding actions and underplaying path synchronization. Spikes in speed happen when there is a sudden change in path length. For example, speed oscillations start from t = 9 s in Figure 19. This happens because a shorter path is found. We can reduce speed oscillation by overplaying the priority for path synchronization.

5. Conclusions

In this paper, we propose an algorithm design for path planning and synchronization for multiple vehicles in the presence of threats. We formulate a cost function to strike a trade-off among path length minimization, threat avoidance, and path length synchronization. Certain Dubins path types and usage cases are considered, which can vary the possible path sequences. A probability-based algorithm is proposed to find the optimal communication frequency and minimal cost function. Vehicles can reach the target simultaneously using real-time commands, while speed and turning radii are controlled within the limit. The performance of the proposed approaches is verified in several simulation examples.
There are several limitations to this study. For example, we consider that targets and threats are static. However, the proposed approaches apply to mobile targets and threats, but this is not the focus of the discussion in this paper. Moreover, they would struggle in threat-dense environments, and pathfinding would be slow and lose real-time responses. For future work, we will investigate a methodology to improve performance when the space is filled with uncertain or dynamic objects. We will look into algorithm designs and change the cost function design to enable vehicles to memorize and learn to handle complicated tasks.

Author Contributions

Conceptualization, methodology, validation, original draft preparation, H.Y.; formal analysis, review and editing, H.Y. and L.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Science Foundation of China, grant number 62203133.

Data Availability Statement

Research data will be available upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chu, X.; Hu, Q.; Zhang, J. Path Planning and Collision Avoidance for A Multi-Arm Space Maneuverable Robot. IEEE Trans. Aerosp. Electron. Syst. 2017, 54, 217–232. [Google Scholar] [CrossRef]
  2. Chen, Y.; Cai, Y.; Zheng, J.; Thalmann, D. Accurate and Efficient Approximation of Clothoids Using Bezier Curves for Path Planning. IEEE Trans. Robot. 2017, 33, 1242–1247. [Google Scholar] [CrossRef]
  3. Bucolo, M.; Buscarino, A.; Famoso, C.; Fortuna, L.; Frasca, M. Control of Imperfect Dynamical Systems. Nonlinear Dyn. 2019, 98, 2989–2999. [Google Scholar] [CrossRef]
  4. Silva, V.; Siebra, C.; Subramanian, A. Intersections Management for Autonomous Vehicles: A Heuristic Approach. J. Heuristics 2022, 28, 1–21. [Google Scholar]
  5. Todorovic, M.; Aldakkhelallah, A.; Simic, M. Managing Transitions to Autonomous and Electric Vehicles: Scientometric and Bibliometric Review. World Electr. Veh. J. 2023, 14, 314. [Google Scholar] [CrossRef]
  6. Wang, J.; Wu, Z.; Yan, S.; Tan, M.; Yu, J. Real-Time Path Planning and Following of a Gliding Robotic Dolphin Within a Hierarchical Framework. IEEE Trans. Veh. Technol. 2021, 70, 3243–3255. [Google Scholar]
  7. Kannadasan, K.; Edla, D.R.; Kongara, M.C.; Kuppili, V. M-Curves Path Planning Model for Mobile Anchor Node and Localization of Sensor Nodes Using Dolphin Swarm Algorithm. Wirel. Netw. 2020, 26, 2769–2783. [Google Scholar]
  8. Hayat, S.; Yanmaz, E.; Bettstetter, C.; Brown, T.X. Multi-Objective Drone Path Planning for Search and Rescue with Quality-of-Service Requirements. Auton. Robot. 2020, 44, 1183–1198. [Google Scholar]
  9. Yanmaz, E.; Balanji, H.; Güven, İ. Dynamic Multi-UAV Path Planning for Multi-Target Search and Connectivity. IEEE Trans. Veh. Technol. 2024, 73, 10516–10528. [Google Scholar] [CrossRef]
  10. Dutta, S.; Wilde, N.; Smith, S. Informative Path Planning for Active Regression With Gaussian Processes via Sparse Optimization. IEEE Trans. Robot. 2025, 41, 2184–2199. [Google Scholar] [CrossRef]
  11. Sun, P.; Yu, Z. Tracking Control for A Cushion Robot Based on Fuzzy Path Planning with Safe Angular Velocity. IEEE/CAA J. Autom. Sin. 2017, 4, 610–619. [Google Scholar] [CrossRef]
  12. Wang, Z.; Zlatanova, S.; van Oosterom, P. Path Planning for First Responders in the Presence of Moving Obstacles with Uncertain Boundaries. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2163–2173. [Google Scholar] [CrossRef]
  13. Jian, Z.; Zhang, S.; Chen, S.; Nan, Z.; Zheng, N. A Global-Local Coupling Two-Stage Path Planning Method for Mobile Robots. IEEE Robot. Autom. Lett. 2021, 6, 5349–5356. [Google Scholar] [CrossRef]
  14. Yu, H.; Liu, Y.; Liang, L. Stochastic Control and Time Scheduling for Irregular Robots. J. Frankl. Inst. 2021, 358, 3678–3700. [Google Scholar] [CrossRef]
  15. Wang, S.; Qin, F.; Tong, Y.; Shang, X.; Zhang, Z. Probabilistic Boundary-Guided Point Cloud Primitive Segmentation Network. IEEE Trans. Instrum. Meas. 2023, 72, 1–13. [Google Scholar] [CrossRef]
  16. Gu, S.; Chen, G.; Zhang, L.; Hou, J.; Hu, Y.; Knoll, A. Constrained Reinforcement Learning for Vehicle Motion Planning with Topological Reachability Analysis. Robotics 2022, 11, 81. [Google Scholar] [CrossRef]
  17. Yu, H.; Lim, C.C.; Hunjet, R.; Shi, P. Flocking and Topology Manipulation Based on Space Partitioning. Robot. Auton. Syst. 2020, 124, 103328. [Google Scholar] [CrossRef]
  18. Qin, H.; Shao, S.; Wang, T.; Yu, X.; Jiang, Y.; Cao, Z. Review of Autonomous Path Planning Algorithms for Mobile Robots. Drones 2023, 7, 211. [Google Scholar] [CrossRef]
  19. Manyam, S.; Casbeer, D.; Taylor, C. Hybrid Theta: Motion Planning for Dubins Vehicles With Integral Constraints. IEEE Robot. Autom. Lett. 2025, 10, 1497–1504. [Google Scholar] [CrossRef]
  20. Fu, J.; Sun, G.; Liu, J.; Yao, W.; Wu, L. On Hierarchical Multi-UAV Dubins Traveling Salesman Problem Paths in a Complex Obstacle Environment. IEEE Trans. Cybern. 2024, 54, 123–135. [Google Scholar] [CrossRef]
  21. Wu, W.; Xu, J.; Sun, Y. Integrate Assignment of Multiple Heterogeneous Unmanned Aerial Vehicles Performing Dynamic Disaster Inspection and Validation Task With Dubins Path. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 4018–4032. [Google Scholar] [CrossRef]
  22. Yang, X.; Zhu, X.; Liu, W.; Ye, H.; Xue, W.; Yan, C.; Xu, W. A Hybrid Autonomous Recovery Scheme for AUV Based Dubins Path and Non-Singular Terminal Sliding Mode Control Method. IEEE Access 2022, 10, 61265–61276. [Google Scholar] [CrossRef]
  23. Tang, L.; Dai, J.; Cheng, Z.; Zhang, H.; Chen, Q. A Digital Twins-Assisted Multi-Autonomous Vehicle Distributed Collaborative Path Planning Algorithm With Fidelity Guarantee. IEEE Trans. Intell. Transp. Syst. 2024, 25, 19904–19916. [Google Scholar] [CrossRef]
  24. Chang, H.; Liu, Y.; Sheng, Z. Distributed Multi-Agent Reinforcement Learning for Collaborative Path Planning and Scheduling in Blockchain-Based Cognitive Internet of Vehicles. IEEE Trans. Veh. Technol. 2024, 73, 6301–6317. [Google Scholar] [CrossRef]
  25. Dubins, L.E. On Curves of Minimal Length with A Constraint on Average Curvature, and with Prescribed Initial and Terminal Positions and Tangents. Am. J. Math. 1957, 79, 497–516. [Google Scholar] [CrossRef]
Figure 1. Vehicle 1 follows paths to reach the target.
Figure 1. Vehicle 1 follows paths to reach the target.
Robotics 14 00047 g001
Figure 2. Optional paths from vehicle 1 to the target.
Figure 2. Optional paths from vehicle 1 to the target.
Robotics 14 00047 g002
Figure 3. Vehicle 1 with different turning radii.
Figure 3. Vehicle 1 with different turning radii.
Robotics 14 00047 g003
Figure 4. Curve of ω ( l ) .
Figure 4. Curve of ω ( l ) .
Robotics 14 00047 g004
Figure 5. Flowchart for path variation and optimization.
Figure 5. Flowchart for path variation and optimization.
Robotics 14 00047 g005
Figure 6. Flowchart for updating paths by communication and routing.
Figure 6. Flowchart for updating paths by communication and routing.
Robotics 14 00047 g006
Figure 7. Paths of 4 vehicles without communication constraints.
Figure 7. Paths of 4 vehicles without communication constraints.
Robotics 14 00047 g007
Figure 8. Paths of 10 vehicles without communication constraints.
Figure 8. Paths of 10 vehicles without communication constraints.
Robotics 14 00047 g008
Figure 9. Paths of 16 vehicles without communication constraints.
Figure 9. Paths of 16 vehicles without communication constraints.
Robotics 14 00047 g009
Figure 10. Paths of 4 vehicles with communication constraints.
Figure 10. Paths of 4 vehicles with communication constraints.
Robotics 14 00047 g010
Figure 11. Paths of 10 vehicles with communication constraints.
Figure 11. Paths of 10 vehicles with communication constraints.
Robotics 14 00047 g011
Figure 12. Paths of 16 vehicles with communication constraints.
Figure 12. Paths of 16 vehicles with communication constraints.
Robotics 14 00047 g012
Figure 13. Curves of path lengths of 4 vehicles and number of vehicles over time without communication constraints.
Figure 13. Curves of path lengths of 4 vehicles and number of vehicles over time without communication constraints.
Robotics 14 00047 g013
Figure 14. Curves of path lengths of 10 vehicles and number of vehicles over time without communication constraints.
Figure 14. Curves of path lengths of 10 vehicles and number of vehicles over time without communication constraints.
Robotics 14 00047 g014
Figure 15. Curves of path lengths of 16 vehicles and number of vehicles over time without communication constraints.
Figure 15. Curves of path lengths of 16 vehicles and number of vehicles over time without communication constraints.
Robotics 14 00047 g015
Figure 16. Curves of path lengths of 16 vehicles and number of vehicles over time with communication constraints.
Figure 16. Curves of path lengths of 16 vehicles and number of vehicles over time with communication constraints.
Robotics 14 00047 g016
Figure 17. Curves of path lengths over time with communication constraints.
Figure 17. Curves of path lengths over time with communication constraints.
Robotics 14 00047 g017
Figure 18. Curves of path lengths over time with communication constraints.
Figure 18. Curves of path lengths over time with communication constraints.
Robotics 14 00047 g018
Figure 19. Curves of speeds of 4 vehicles over time without communication constraints.
Figure 19. Curves of speeds of 4 vehicles over time without communication constraints.
Robotics 14 00047 g019
Figure 20. Curves of speeds of 10 vehicles over time without communication constraints.
Figure 20. Curves of speeds of 10 vehicles over time without communication constraints.
Robotics 14 00047 g020
Figure 21. Curves of speeds of 16 vehicles over time without communication constraints.
Figure 21. Curves of speeds of 16 vehicles over time without communication constraints.
Robotics 14 00047 g021
Figure 22. Curves of speeds of 4 vehicles over time with communication constraints.
Figure 22. Curves of speeds of 4 vehicles over time with communication constraints.
Robotics 14 00047 g022
Figure 23. Curves of speeds of 10 vehicles over time with communication constraints.
Figure 23. Curves of speeds of 10 vehicles over time with communication constraints.
Robotics 14 00047 g023
Figure 24. Curves of speeds of 16 vehicles over time with communication constraints.
Figure 24. Curves of speeds of 16 vehicles over time with communication constraints.
Robotics 14 00047 g024
Table 1. List of symbols.
Table 1. List of symbols.
SymbolsDescriptionSymbolsDescription
x i ( k ) Vehicle position e i ( k ) Vehicle heading
y j Threat position r j Threat radius
z ( k ) Target position R ̲ Turning radius lower bound
R i ( k ) Vehicle turning radius v i ( k ) Vehicle speed
v ̲ Vehicle speed lower bound v ¯ Vehicle speed upper bound
τ Sampling interval s i ( k ) / s i + ( k ) Left and right steer circles
N i ( k ) Path sequence P i ( k ) Path
L i ( k ) Path length T i ( k ) Path lengths inside threats
L ( k ) Overall path length ϕ ( k ) Path variance
T ( k ) Path length sum inside threat C ( N ( k ) ) Cost of path
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, H.; Zhang, L. Geometric Path Planning and Synchronization for Multiple Vehicles. Robotics 2025, 14, 47. https://doi.org/10.3390/robotics14040047

AMA Style

Yu H, Zhang L. Geometric Path Planning and Synchronization for Multiple Vehicles. Robotics. 2025; 14(4):47. https://doi.org/10.3390/robotics14040047

Chicago/Turabian Style

Yu, Hongjun, and Lanyong Zhang. 2025. "Geometric Path Planning and Synchronization for Multiple Vehicles" Robotics 14, no. 4: 47. https://doi.org/10.3390/robotics14040047

APA Style

Yu, H., & Zhang, L. (2025). Geometric Path Planning and Synchronization for Multiple Vehicles. Robotics, 14(4), 47. https://doi.org/10.3390/robotics14040047

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop