Next Article in Journal
Accurate Estimation of Plant Water Content in Cotton Using UAV Multi-Source and Multi-Stage Data
Previous Article in Journal
Deep Reinforcement Learning-Enabled Trajectory and Bandwidth Allocation Optimization for UAV-Assisted Integrated Sensing and Covert Communication
Previous Article in Special Issue
Research on Multi-UAV Cooperative Dynamic Path Planning Algorithm Based on Conflict Search
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reactive Autonomous Ad Hoc Self-Organization of Homogeneous Teams of Unmanned Surface Vehicles for Sweep Coverage of a Passageway with an Obstacle Course

by
Petr Konovalov
1,*,†,
Alexey Matveev
1,2,3,† and
Kirill Gordievich
2,†
1
Mathematical Robotics Science Division, Sirius University, Olimpiyskiy Ave. b.1, Sirius City 354349, Russia
2
Department of Mathematics and Mechanics, Saint Petersburg University, Universitetskii 28, Petrodvoretz, St. Petersburg 198504, Russia
3
Institute for Problems in Mechanical Engineering, Russian Academy of Sciences, V.O., Bolshoj Prosp. 61, St. Petersburg 199178, Russia
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Drones 2025, 9(3), 161; https://doi.org/10.3390/drones9030161
Submission received: 22 November 2024 / Revised: 8 February 2025 / Accepted: 17 February 2025 / Published: 22 February 2025

Abstract

:
A team of unmanned surface vehicles (USVs) travels with a bounded speed in an unknown corridor-like scene containing obstacles. USVs should line up at the right angle with the corridor and evenly spread themselves out to form a densest barrier across the corridor, and this barrier should move along the corridor with a given speed. Collisions between the USVs and the corridor walls, other obstacles, and among themselves must be avoided. In the fractions of the scene containing obstacles, the line formation should be preserved, but the demand for an even distribution is inevitably relaxed. This evenness should be automatically restored after such a fraction is fully traversed. Any USV is aware of the corridor direction and measures the relative coordinates of the objects that lie within a given finite sensing distance. USVs do not know the corridor’s width and the team’s size, cannot distinguish between the team-mates and fill different roles, and do not use communication devices. A computationally cheap control law is presented that attains the posed objectives when being individually run at every USV. The robustness of this law to losses of teammates and admissions of newcomers is justified. Its performance is demonstrated by mathematically rigorous non-local convergence results, computer simulation tests, and experiments with real robots.

1. Introduction

Recently, formation control has advanced in a mature stage [1], with an ever increasing attention to the distributed control paradigm and the issue of sensorial and communication constraints. This shift of focus brings strong challenges, both algorithmic and analytical, and makes designs of control laws with rigorously justified non-local convergence a really difficult task [2].
The paper focuses on methods for the spatial self-arrangement of multiple silent mobile robots that are incapable of discerning among their peers, obtain limited sensor data on close objects, and cannot enact different roles and thus have nothing to do but individually run the same algorithm. The issue is, in fact, the generation of effective, coordinated, and cooperative action of the entire team from the separate, homogeneous, and elementary decision-making of each of its ill-informed members. In computer science, this goes hand in hand with the concept of behavior-oriented artificial intelligence [3].
The above multifaceted uniformity entails several benefits regarding cost, scalability, fault tolerance, flexibility, repair, and implementation, and is among the key topics studied under the umbrella of swarm robotics [4]. Meanwhile, that uniformity is problematically compatible with many popular approaches to decentralized formation-building control [2]. Among them, there are, e.g., methods using virtual rigid or flexible structures, either team-wide or local leaders/beacons, or designated data or command links between specially selected agents, as well as the assignment of diverse entities, like labels, tasks, goals, etc., to different team members.
The uniformity previously characterized is better consistent with behavior-based approaches [5], such as virtual forces or artificial potential methods. These often lack sufficient guarantees that the targeted formation does emerge, although exceptions are available among distributed consensus protocols [6,7] and related algorithms for formation control [8] or coverage [9] control.
This paper presents a distributed algorithm for the self-deployment of fully homogeneous robotic teams for efficient sweep coverage of an area [10]. The field of coverage control is becoming progressively important due to the growing application of robotic teams to monitoring or processing extended objects, either natural or human-made, and vast areas. In the meantime, the development of microelectronic technologies gives the practical possibility to use large-scale networks of inexpensive devices for executing such missions. Their examples include [11] automatic mine-sweeping, reconnaissance, maintenance inspection, search and rescue operations, finding the source of a pollutant, the monitoring of bush fires, environmental extremum seeking, and target seeking, to name just a few.
To effectively carry out such coverage missions, the team members should be put in appropriate, ideally optimal, locations; at a minimum, any point of the handled region should be shadowed by some member. For large teams, this may be a burdensome task when being performed by external means. Hence, the self-deployment of mobile elements is an appealing option: all and everyone should arrive at the targeted deployment autonomously and on their own. To this end, distributed navigation strategies are needed that merge the easiness of implementation, computational cheapness, and low consumption of resources with guarantees of convergence. Also, the strategy should be robust to failures and the additions of the robots, and should entrust all of them with identical roles, thus making them fully interchangeable. The satisfaction of these partly competing demands constitutes a real challenge in practice.
The paper treats the problem of not static, but dynamic coverage: this problem integrates the sweep and barrier coverage patterns [12]. Effective coverage of a priori unknown scene with a robotic team of an unknown size is handled. The coverage is troubled by unknown obstacles in the area, and so the appropriate positions of the robots in the scene cannot be pre-computed, but are to be built on-the-fly in a feedback fashion based on only very limited sensory information. The mission objectives include lining up the team across an unknown passageway (either natural or human-made, either physical or virtual), frontally moving the thus obtained straight row of the robots with a given speed, preserving the row formation even if the row is cut into pieces with an obstacle, and automatic self-distribution of the robots over the width of the current passage into the densest possible net-like barrier. (Similar requirements may arise when a regular linear formation of mobile robots has to go through a confined environment cluttered with obstacles.) All these should be achieved by a computationally cheap control rule that is common for all robots and is to be individually run on every of them.
This sort of coverage is important for various applications, including mine sweeping, the deployment of static sensor networks, ecological surveillance, sentry duty, rescue operations, and maintenance inspection, to name just a few. However, among the survey of papers on multi-robot self-organization for the sweep coverage of corridor-type scenes, the authors failed to come across one treating this issue in the presence of obstacles, in the face of the above uncertainties and limitations, and with the goal to keep a straight row formation and densest distribution over an unknown passage despite the obstacles. This paper partly fills these gaps.
Specifically, it handles the case of a polygonal corridor environment with finitely many polygonal obstacles, which are a priori unknown. There is a fully homogeneous team of speed-limited USVs, each modeled as a continuous-time integrator. Every USV senses the scene within a given finite distance and thus determines the relative positions of objects that are in direct line of sight. The USVs do not know the width of the corridor, cannot tell the difference between any two peers, cannot fill distinct roles, and do not use communication devices. The above “polygonal obstacles” may in fact be upper approximations of obstacles of more general nature with polygons.
The principal contributions of this paper are as follows. (A) The problem is solved for a fully homogeneous team of robots (in particular, without the shared numbering of them) and, moreover, in a practical situation where any robot has access to data about a peer not only if the latter is within a given “visibility range” but also if nothing obscures the view to it. (B) The proposed control rule is computationally inexpensive, partly since it is reactive: in real time, it directly converts the current observation into the control input in a reflex-like fashion. (C) The problem is solved with respect to an unknown corridor-like environment cluttered with unknown obstacles. (D) The straight-line cross-section formation of USVs and their succession in the formation are maintained even if the line formation is broken into mutually invisible pieces by obstacles. Furthermore, even spacing is automatically restored after the obstacle course is left behind. (E) The proposed control law excludes the collisions of the USVs with one another, the obstacles, and the corridor walls. (F) The situation of both losses and the additions of team members is elaborated; it is proven that, under the proposed control rule, the team automatically adapts to changes in its composition. (G) Mathematically rigorous guarantees of convergence and justification of the performance are provided. (H) The rule is proven to succeed even if there is no informational connectivity of the team at the start of the mission since it creates connectivity from nothing sooner or later. Also, the algorithm restores this connectivity after it happens to be broken due to either the dropouts of team members or the visibility-blocking effect from obstacles. (I) It is shown that whenever the tasks of even distribution across the corridor and obstacle avoidance are to be solved simultaneously, the complexity of the control system can be reduced by omitting (unlike the standard approach) a special obstacle avoidance module since its functions are automatically performed by the control module responsible for distributing the robots across the corridor. (J) Unlike most works dealing with corridor environments, we handle corridors with non-straight, polygonal walls. (K) The presented findings are based on the application of a complete set of general research techniques that include theoretical developments, computer simulation tests, and real-life experiments.
The property (B) is among the main targets of the reported design, bearing in mind applications to small and miniature robots, as well as the reservation of computational resources for basic, higher-level objectives of the mission. Whereas (I) clearly participates in (B), it is worth noting that the property (I) holds under certain circumstances (detailed in the body of the paper).
Regarding (H), we remark that, for the bulk of studies on distributed formation building methods based on local data, informational connectivity is a typical prerequisite for convergence; see, e.g., [6,13,14]. It is often merely postulated that this connectivity persists over the infinite time horizon in one form or another due to an unidentified reason. However, if data transfer is distance-dependent, execution of the main motion control law may endanger this assumption. In such a situation, some algorithms rely on initial connectivity and block the robots’ moves that cause the breakages of any existing data links; see, e.g., [15,16,17]. However, then the control goal may be unattainable (e.g., if the robots start in a tight cluster and so enjoy all-to-all visibility but have to spread over so vast an area that the distance between some robots inevitably exceeds the visibility range). Another approach preserves connectivity, while allowing the breakages of cautiously selected links [18,19,20]. The price for this is high computational and communication burdens, and the need for awareness of the global topology of data exchange. By contrast, the proposed algorithm creates informational connectivity from nothing, and does so at a minimal computational cost and based on only local data.
The body of this paper is organized as follows. Section 2 offers an overview of prior relevant research, whereas Section 3 states the problem. Section 4 presents the robots model and assumptions. Section 5 and Section 6 describe the preliminary stage of data processing and the proposed navigation law, respectively. The main theoretical results are given in Section 7. Section 8 and Section 9 report on the results of computer simulations and real-world tests, respectively. Section 10 offers conclusions. The proofs of the key results are given in Appendix A.

2. Related Work

The bulk of the literature on robotic coverage algorithms is devoted to path planning: how to build a path that passes close to any point from the area of interest; we refer the reader to [21,22,23] for recent surveys of this field. Also, an extensive body of research is concerned with the nodes’ placement and dispatch problems [24,25,26,27,28,29], where the main concern is to find out where, how many, and how nodes should be distributed. By and large, these lines of research focus on geometrical aspects of the problem, leaving the issues of self-spreading and motion control beyond elaboration.
There is also a body of research on reactive algorithms for robots’ self-distribution in coverage missions by using some sort of feedback control [23,30]. Some of these methods are stochastic, often attempt to copycat natural processes in biology, and are surpassed by the idea of the swarm intelligence [31]; see, e.g., [32,33] for representative samples. Another group consists of deterministic physicomimetic methods and draws much inspiration from the concepts of virtual forces, artificial potentials, and molecular equilibrium phenomena [23,30,34,35,36,37]. The third category is distinguished by its reliance on concepts and techniques of geometry [23,30,38]. The Voronoi tessellation is a popular tool here [29,39,40,41,42,43]. Another approach is based on the access of all robots to a common global geometric structure, like a regular grid ([9], Ch. 6) or cell decomposition [44].
For more details on the conceptual and taxonomic aspects of the area, we refer the reader to the specialized surveys, e.g., [23,30,38,45]. Overall, it mainly focuses on achieving the blanket or barrier coverage of a given structure [12], the objectives of which are critically different from forming an evenly spaced straight line formation moving in an unknown corridor. Many approaches are not at all aimed to build a regular formation, need a rather comprehensive knowledge of the environment or some pre-specified global structure (which may call for access to GPS), and necessitate a heavy computational burden. Also, rigorous guarantees of convergence are relatively rare, and the algorithm validation often comes to simulation tests and secondary theoretical facts.
Challenges of the robot’s autonomous navigation in corridor-like scenes have received substantial attention from the robotic community due to their own value and since they are common constituents of more complex environments; see, e.g., [46,47,48,49,50,51] and the literature therein. However, the respective literature largely deals with the case of a single robot, though exceptions also exist; see, e.g., [9,52,53,54]. In [9,52], an algorithm for the sweep coverage of a corridor with straight walls is presented and rigorously justified, postulating persistent informational connectivity of the team. Corridors with arbitrarily shaped walls are handled in [54], where a shared numbering of the teammates and steady designated information links between some of them are assumed (i.e., the team is not fully homogeneous), and forming a straight-line formation is not an objective. The homogeneity of the team is also violated in [53], as the algorithm employs role hierarchy among the robots. In all these works, corridors without obstacles were considered; in particular, the loss of sensorial contact and the breakage of informational connectivity because of obstacles were not addressed.
For navigation in the obstacle-free part of the corridor, we use some findings from [55]. However, they are critically insufficient to deal with obstacles, and the main focus of this paper is on the design and elaboration of respective additions to the algorithmic technology. Relative to a considerably simplified version of the scenario from this paper, some preliminary algorithmic ideas are reported (without proofs) in the conference publication [56]. As compared with it, the current text offers significant extensions regarding both the scenario and algorithm (which in fact essentially differs from that from [56]), as well as a fully renewed conceptualization of the both. In addition, this manuscript offers a complete and rigorous theoretical justification of the proposed algorithm and obtained results, discusses a whole number of extra issues (like robustness against changes in the team membership, etc.), and not only presents the results of new computer simulation studies but also logically completes the research with real-world experiments.

3. Sweep Coverage of a Corridor

We consider N point-wise planar USVs, enumerated by i = 1 , , N , which travel in an unknown planar corridor  C between two parallel straight lines. (Later on, corridors with non-straight walls will be addressed.) The USVs should ultimately go along the corridor with a common pre-specified speed v > 0 . Furthermore, they should find themselves on a common moving cross-section N oriented perpendicularly to the walls; see Figure 1. And lastly, they should evenly distribute themselves over N to form the densest net across the corridor.
The mission is troubled by unknown obstacles O 1 , , O K inside the corridor (see Figure 1). The USVs must not collide with the corridor walls, the obstacles, and one another. Hence, the even distribution across the entire width of the corridor is possible only in its obstacle-free part: even if the team approaches the obstacle course in the ideal order, this order is then inevitably violated. The navigation law must automatically restore that order after the obstacles have been left behind.
We consider point-wise USVs with simple integrator kinematics and a given speed bound v ¯ :
r ˙ i = v i , v i v ¯ .
The velocity vector v i = v i ( t ) R 2 is the control input. Every USV has its own local frame of reference. In this frame, it identifies the corridor orientation and the relative coordinates of the objects, including pieces of the obstacles and the walls of the corridor, if they are within a given finite visibility distance  R vis > 0 and the line of sight to them is not blocked. We assume that no USV can fully block the sight of the peers at any obstacle due to some reason, e.g., the superiority of the obstacles over the USVs in size or since USVs can “see” the obstacles at a height above the peers.
None of the USVs use communication devices and know the number N of team members or the width w of the corridor. The team is fully homogeneous: the USVs cannot tell the peers apart, there is no hierarchy among them, and they are unable to play distinct roles and must therefore be driven by a common control rule. So, the posed tasks are to be solved in an autonomous and distributed fashion.

Formal Problem Statement

Unlike the USVs, we can use a right-handed absolute frame; its x axis goes in the targeted direction of motion parallel to the corridor walls in the middle of them; see Figure 1. Thus, the corridor walls are described by the equations y = ± w / 2 . For the convenience of exposition, the x and y directions are said to be horizontal and vertical, respectively.
The location of USV i at time t is denoted by r i ( t ) = [ x i ( t ) , y i ( t ) ] , and the polar angles are counted counterclockwise from the x axis.
To specify the problem, we introduce the symbol p j ( a ) for the point p with the abscissa x ( p ) = a and the ordinate y ( p ) = w / 2 + j w / ( N + 1 ) . It is easy to see that the points p 1 ( x ) , , p N ( x ) evenly partition the common cross-section of the corridor described by the equation x = a . The pursued navigation objective is in fact much disclosed in the following.
Definition 1.
The USVs are said to sweep the scene with a speed of v if the following holds true:
(i) 
Any USV i does not collide with the obstacles r i ( t ) O k k , t , the walls of the corridor | y i ( t ) | < w / 2 t , and the other USVs r i ( t ) r i ( t ) t , i i ;
(ii) 
There is x * and an enumeration of the USVs such that r i ( t ) p i ( v · t + x * ) t 0 i .
It is needed to design a control rule that is common for all USVs and, when being independently run on every one of them, ensures the property from Definition 1, starting from occasional, though more or less reasonable, initial positions.

4. Theoretical Assumptions About the Scenario

To introduce and even more to discuss the proposed navigation algorithm, we need to first highlight some assumed properties of the scene. To streamline the exposition, we embed this material into a complete description of the assumptions underlying our theoretical analysis.
Assumption 1.
The obstacles are disjoint polygons (not necessarily convex) and lie inside the corridor.
This does not impose significant limitations on the obstacles since first, what is handled as an “obstacle” in robotics research, is often an (upper) approximation of a real obstacle with polygonal areas and second, this approximation can be made as accurate as one wishes.
To proceed, some definitions are required. A ray (segment of a line) is said to be open if it does not contain its root (its end-points). An upward/downward ray is a vertical ray that propagates upwards/downwards. A set is said to be O k -free if it has no points in common with the obstacle O k .
Definition 2.
A upward/downward ray R is said to be forward critical for O k if the following holds:
(i) 
It is open and goes from the boundary O k of the obstacle O k ;
(ii) 
This ray is not O k -free;
(iii) 
To the left of R and arbitrarily close to it, there is an upward/downward ray that is O k -free.
In Figure 2, the green rays are not O-free and are not critical, the red ones are critical, and the blue rays are O-free and are not critical. Critical rays mark either forward vertical sides of the obstacle or entrances to its “deadlock caves” (a cave of O is defined as a connected component of the set of points p such that the rays issued from p both upwards and downwards, respectively, intersect O). The concepts of such a ray and cave are born from the idea to bypass the obstacle by means of constantly and simultaneously (1) following its boundary and (2) progressing down the corridor x ˙ > 0 . After arrival at a front vertical side, executing (2) would imply penetration into the obstacle and so is impossible. The attribute “deadlock” marks the caves such that the robots may enter but cannot leave them while following the instructions (1) and (2). Figure 2a illustrates a deadlock cave, which is entered while following the pink side of the obstacle and then cannot be left without violating (2). The caves in Figure 2b,c do not do any harm in this regard since they are not entered due to (2). When arriving at their entry points, like A in Figure 2b,c, the rule (1) brings about an instantaneous jump to point B and subsequently following another piece of the boundary to the right.
Assumption 2.
No obstacle has forward critical rays.
Example 1.
Any convex obstacle with a unique leftmost point meets Assumption 2.
Example 2.
We orient the boundary O of an obstacle O : = O j so that O is to the left when traveling over O , and consider the cycle C of the consecutively adjacent edges forming O . Let C be cut into two (non-cyclic) chains so that the edges from a common chain are consecutively concatenated, the polar angles of the edges from one of the chains are acute (less than π 2 in absolute value), and obtuse for the other chain. Then, Assumption 2 is true.
Assumption 2 rejects the obstacles like those in Figure 2a,c. Some of them can yet be put into the framework of Assumption 2 if every robot appropriately modifies its interpretation of the scene on the fly. Some hints of such a kind will be discussed in Section 7.8.
To state the last assumptions, a few more definitions are useful.
Definition 3.
A point p of the obstacle’s boundary O k is said to be (globally) lower/upper if p is the upper/lower end of a vertical open O k -free (ray) segment. The closure of any set of such points is said to be (globally) lower/upper.
Remark 1.
An lower/upper side of the polygon O k cannot be vertical. Conversely, any non-vertical side of the polygon O k is either lower or upper.
The union of all globally lower/upper sides of the obstacle O k is called its lower/upper fence  F k ; see Figure 3.
It is clear that the abscissas of different points of F k ± differ. We orient the lower/upper fence and any its segment in the direction of the abscissa ascending. Then, the polar angle of any such segment is acute. We treat the “upper” E + : = { p : y w / 2 } and “lower” E : = { p : y w / 2 } exterior of the corridor as obstacles with positively oriented boundaries. The fences of these obstacles are equal to the respective walls of the corridor.
Our final assumptions are concerned with the mission feasibility. First, the feedback from the distance gaps between the robots should not be lost under the targeted even deployment of the team across the corridor, which yields that w N + 1 R vis . Second, the requested speed v should match the capacity of the robots: v v ¯ . Moreover, the tactics of the boundary following may involve tracking parts of the upper or lower fences of obstacles. When doing so, the top speed of the robot’s abscissa is defined by the polar angle α of the currently tracked segment and is equal to v ¯ | cos α | . So, the demand for the value v of the horizontal speed is reasonable only if v v ¯ | cos α | .
By slightly enhancing these necessary conditions via < and introducing an upper bound α ¯ ( 0 , π 2 ) on the absolute values of the polar angles of the segments in all upper and lower fences, we arrive at our final assumption:
v < v ¯ cos α ¯ , w / ( N + 1 ) < R vis .

5. Navigation Algorithm: Preprocessing Sensory Data

This section opens with a description of the navigation algorithm by focusing on the employed technical geometrical computations. Every robot performs them individually and from its own measurements: it imaginarily modifies the visible parts of the obstacles and computes their features.
Endowing the obstacles with visors aims to avert an unlikely, though not impossible, head-on collision with the front vertex p min k of an obstacle O k (like in Figure 4a). To this end, the USV imaginarily affixes a short horizontal visor to p min k , as is shown in Figure 4b, and uses the so-obtained visored obstacle when computing the control input.
The rationale behind this hint stems from the wish to reduce the complexity of the control software and hardware by omitting specialized obstacle avoidance components. The idea is to show that an “inevitable” control module designed for distributing the robots across the corridor is able to largely guarantee collision avoidance by its own right. Because of its main concern, this module basically explores the scene vertically. Adding the visor entails that the USV starts reacting to any obstacle before actually reaching the area of its vertical shadows. By applying the routine machinery of receding from the vertically close peers (which is a necessary part of the above module) to the obstacle points (both true and imaginary), the USV finds itself either below or above the obstacle when that area is actually reached. As a result, head-on collisions are avoided.
Now, we delve into the details. For any USV, the skeleton S is the set of the currently visible pieces of the obstacles’ boundaries. A visible front cusp is a part of S that lies down the corridor with respect to the USV and looks like either of the following:
(A)
Two closed segments that go from a common point p down the corridor (see Figure 5a);
(B)
A single closed segment with an end-point p such that the USV “sees” no continuous extension of S to the other side of p (see the red part of Figure 5b).
The case (B) holds if the obstacle blocks the line of sight to one of its own sides adjacent to p , unlike the blue part of Figure 5b, where the block is due to another obstacle (this can be recognized by an instantaneous drop of the distance to the visible side along a ray which continuously rotates about the robot so that the point of reflection slides towards p ). In Figure 5b, the visible blue horizontal segment is not closed since point p * , being invisible, does not belong to it. Hence, this part is not a visible front cusp by definition. By the same reason, the “downstream” visible part from Figure 5c is not a visible front cusp since point p * does not belong to it: this point does not lie “downstream” of the USV and so belongs to neither the skeleton nor any its parts.
Whenever the USV finds cusps, it adds a straight horizontal visor V with a length of ϰ to every of them, as illustrated in Figure 4b. Here, ϰ > 0 is a free parameter. If the USV finds itself exactly on the visor V, it yet adjudges (at random) that it is either “above” or “below” it. In spite of everything, the USV sticks to this judgment while V remains visible: even if the USV happens to get to the other side of V, it vertically displaces the visor in its “mind” so to put itself at the displaced visor and then treats the scene accordingly. Then, the USV does not ”see” the peers that are imaginarily ”on the other side” of the straight line hosting the visor. Meanwhile, it may turn out that such a peer treats the USV at hands as “visible”. The points of the visors are simultaneously lower and upper, and so the visors become parts of both lower and upper fences.
The outcome of these speculative manipulations with the visor will be commented on in Remark 3.
Further geometrical definitions and preliminaries. Let E be a compact subset of the corridor. A point p is said to be in the x-scope of E if this point is vertically shadowed by E:
min r E x ( r ) x ( p ) max r E x ( r ) .
If, in addition p E , there is a vertical straight segment ( p , r ) such that r E and ( p , r ) E = . If this segment is above the point r , the point p is said to lie above E, and below it otherwise. Any point in the x scope of E lies either above, or below, or simultaneously above and below E.
Points p 1 and p 2 are said to be separated by the obstacle  O k if p i O k and p 1 , p 2 O k . For robot i and time t, the laterally visible obstacle point is a point p from the union O : = k O k of the obstacles such that the segment ( p , r i ( t ) ] is vertical, does not intersect O , and is less than R vis in length. There is no more than one (and, maybe, none) such point both above and below the USV.
Procedure of preprocessing sensory data. At any time t, any USV i builds the following.
The set N i ( t ) of visible peers: it consists of i and all peers j such that r j ( t ) r i ( t ) R vis and the view of j is blocked by no obstacle. Since i N i ( t ) , the number of elements # N i ( t ) 1 .
The set  N i , δ ( t ) : = { j N i ( t ) : | x i ( t ) x j ( t ) | δ }  of close peers. Here, δ > 0 is a parameter of the algorithm.
The set L i , δ ( t ) of essential lateral points that consists of r j ( t ) , j N i , δ ( t ) and the laterally visible obstacle points (if they exist). Let L i , δ ± ( t ) be the set of p L i , δ ( t ) such that ± y ( p ) y i ( t ) 0 .
The lateral free space is defined by the following formula:
d i , δ ± ( t ) : = min ( x , y ) L i , δ ± ( t ) ± ( y y i ) if L i , δ ± ( t ) , R vis otherwise .
The index ± tells us whether the space above + or below USV i is assessed.
To avert crashes with the obstacles, more scene features are to be taken into account.
Graph Γ i ( t ) of the close visible peers is based on free (nominally small) parameters γ x , γ y > 0 . This is the undirected graph with the set of nodes N i ( t ) , where j and j are linked if and only if
  • | x j ( t ) x j ( t ) | γ x and | y j ( t ) y j ( t ) | γ y ;
  • No obstacle separates USVs j and j ;
  • If some of them (say j) lie below/above a visor, then the ordinate of the other USV j is less/greater than that of this visor provided that USV j is to the left of USV j.
Straight-line graph G i ( t ) of the intimate peers is the union of the segments r j ( t ) , r i ( t ) over j’s from the connected component of Γ i ( t ) that contains i.
Upper/lower base B i ± ( t ) is the set of points p G i ( t ) with the following properties:
(B.1) 
Vertically below/above p USV i “identifies” an obstacle O k at a distance γ y ;
(B.2) 
If p = r j ( t ) , then the infinitesimal shift of p in the x direction does not increase the vertical distance from p to the obstacles (see Figure 6);
(B.3) 
If p S : = r j ( t ) , r j ( t ) for a link in G i ( t ) , then the infinitesimal plane-parallel shift of S in the x direction does not increase the vertical distance from S to the obstacles.
USV i is called the evader if either there exists a point p B i + ( t ) whose ordinate y ( p ) y i ( t ) or there exists a point p B i ( t ) whose ordinate y ( p ) y i ( t ) , and only one of these cases occurs. The main base is the base addressed in the case that does occur. The concept of evader is introduced to identify the case where USV should take special measures against obstacles since the idea to go straight ahead along the corridor runs the risk that either the USV at hands or its intimate peer may collide with the obstacles, or their intimacy may be destroyed by an obstacle.
Avoidance angle  α i ( t ) is built so that moving at this angle (to the x axis) creates no threat of collision with the obstacles in the near future; see Figure 7. It is defined based on a parameter α > 0 (to be specified later on) and the notation 𝒱 for the union of all visors:
α i ( t ) : = α if r i ( t ) 𝒱 , USV i is an evader and its main base is B i + ( t ) , or the USV is on a visor and thinks to be above it , α if r i ( t ) 𝒱 , i is an evader and its main base is B i ( t ) , or the USV is on a visor and thinks to be below it , 0 in all other cases .

6. Navigation Algorithm

This algorithm uses two real functions F ( · ) and G ( · ) with special properties illustrated in Figure 8. Both functions are continuous and piecewise continuously differentiable; they are to be preliminarily selected by the designer of the control system. The function F ( · ) is defined on R and is such that:
x F ( x ) > 0 x 0 , F ( 0 ± ) > 0 , F ¯ : = sup x R | F ( x ) | < , sup x R | F ( x ± ) | < .
The function G ( · ) is defined on the interval [ 0 , 2 R vis ] , is constant to the right of some point R G of this interval, and is such that
G ( L ± ) > 0 L [ 0 , R G ) , G ( L ) = G ¯ L [ R G , 2 R vis ] , G ( 0 ) = 0 .
Here, R G ( 0 , R vis ] and G ¯ > 0 are viewed as controller parameters. For example, the above requirements are met by F ( x ) = a λ * ( x / b ) , G ( L ) : = c L + d L [ 0 , R G ) , G ( L ) = c R G + d L [ R G , 2 R vis ] , where a , b , c > 0 ,   d 0 are parameters and λ * ( z ) = arctan ( z ) , z 1 + z 2 .
Control rule uses one more free parameter P > 0 . The control signal v i (i.e., the velocity vector) for USV i is defined in terms of its abscissa v i x and ordinate v i y :
v i x ( t ) : = v + 1 # N i ( t ) j N i ( t ) F [ x j ( t ) x i ( t ) ] ,
v i y ( t ) : = G [ d i , δ + ( t ) ] G [ d i , δ ( t ) ] + P tan α i ( t ) .
It is easy to see that only data currently accessible by USV i are used here.
Informally, Formula (7) is responsible for gathering the USVs on a common cross-section of the corridor and for driving them with the targeted x-speed v . The first two addends in the r.h.s. of (8) are in charge for evenly distributing the USVs across the corridor. The duty of the last addend is to take into account possible inclination of the obstacles (including the corridor walls, see Section 7.7) with respect to the horizontal direction when distributing USVs across the width of the passageway.
The offered control algorithm is discontinuous; the closed-loop solution is meant in the Filippov’s sense [57]. Since the controls are bounded, the solution is defined for all t 0 [57]. Its uniqueness is a more intricate issue. We do not come into its discussion and address all solutions.

7. Main Results

7.1. Preliminaries

To state and discuss the main results, we need to introduce some symbols and terms. The following notations will be used:
  • h ( E ) , length of the x-scope of the compact set E, i.e., h ( E ) : = max r E x ( r ) min r E x ( r ) ;
  • φ ( S ) ( π / 2 , π / 2 ) , polar angle of a non-vertical segment S oriented in the ascending direction of x;
  • S q ± q Q ± , collection of all globally upper/lower sides of all O k ’s (see Definition 3 and Figure 3).
Definition 4.
A side S of an obstacle O k is said to be friendly if the infinitesimal shift in the x direction brings any interior point of S to the free space. A friendly pair is a couple of adjacent friendly sides S 1 , S 2 that are both globally either upper or lower for the obstacle O k .
The side from Figure 6c is friendly, whereas those from Figure 6a,b are not friendly. In Figure 7, only the sides from the first and third pictures are friendly.
Finally, we put:
h min : = min min q Q + h ( S q + ) ; min q Q h ( S q ) ,
α ^ : = max max q Q + φ ( S q + ) ; max q Q φ ( S q ) ,
β min : = min all friendly pairs min | φ ( S 1 ) | ; | φ ( S 2 ) | ,
g min : = min k k dist O k ; O k .
Here, β min : = if there are no friendly pairs, and α ^ [ 0 , α ¯ ] , where α ¯ is taken from (2). Since all sides S q ± are not vertical by Remark 1, we infer that h min > 0 , α ^ ( 0 , π / 2 ) , and β min > 0 .

7.2. Key Theoretical Result

It refers to the constant v ¯ from (1), α ¯ , v , R vis from (2), α from (4), F ¯ from (5), R G , G ¯ from (6), P from (8), ϰ from Figure 4b, w from Figure 1, the number of the USVs N, and the parameters δ and γ x , γ y that define the quantity (3) and the graph Γ i ( t ) , respectively.
Theorem 1.
Let Assumptions 1 and 2 and Equations (2), (5), and (6) hold, and the parameters of the control law be chosen so that the following inequalities are true:
F ¯ < v , w N + 1 < R G < R vis , γ x tan α ¯ γ y ,
( v + F ¯ ) 2 + G ¯ + P tan α 2 v ¯ 2 ,
( v + F ¯ ) tan α ^ + G ¯ < P tan α ,
min { N γ y ; R vis } 2 + ϰ 2 < g min / 2 .
Suppose that, at the start of the mission, the USVs are placed first outside the caves of the obstacles and lie in a vertical strip whose width γ is such that
γ < h min , ϰ , γ x , δ , R vis 2 R G 2 ,
G [ γ tan α ¯ ] < [ v F ¯ ] tan β min ,
G ¯ + G [ γ tan α ^ ] < P tan α ,
min { N γ y ; R vis } 2 + ( ϰ + γ ) 2 < g min / 2 .
Suppose also that initially different USVs are separated by no visored obstacle and have distinct ordinates. Then, the following statements are true:
(i) 
The control v i ( t ) generated by the proposed navigation law always satisfies the inequality from (1), as is required;
(ii) 
The USVs sweep the scene with a speed of v , as defined in Definition 1;
(iii) 
Their x scatter ς ( t ) : = max i , j | x i ( t ) x j ( t ) | does not grow as time progresses;
(iv) 
Any USV moves along the corridor in the targeted direction: x ˙ i ( t ) > 0 for almost all t;
(v) 
The USVs travel at distinct distances from the corridor walls: y i ( t ) y j ( t ) i j , t 0 ;
(vi) 
The ordering of the USVs in the vertical direction does not change with time.
The proofs of this theorem and the subsequent Remarks 2–4 are given in Appendix A.

7.3. Discussion of the Key Theoretical Result

Due to (16), the visor’s length ϰ < g min 2 . So, the visored obstacles are disjoint by (12).
In light of the mission objective, the initial placement of the USVs into a vertical strip is a reasonable decision. In practice, its realization often looks like putting the USVs into nearly the same place; then, in addition, no two USVs are separated by an obstacle, just like it is required in Theorem 1.
All assumptions on the initial deployment are met if, when moving along a free part of the corridor in a nearly perfect order, the team meets an obstacle course, and at this very moment, we set the clock to zero and start our consideration. In this case, the objective is to go through the obstacle course, while maintaining the line-up structure, and to restore even spacing and the required speed along the corridor after the course is left behind. In this regard, (iii) in Theorem 1 guarantees that the previously achieved “accuracy” ς of “lining up” never degrades, even when going through the obstacle course. By (5) and (7), the speed v x deviates from the desired value v by at most F ¯ , an observation which can be used to bound the speed error via choosing F ( · ) . It is worth noting that as F ¯ decreases, neither of the affected requirements (13), (14), (15), and (18) from Theorem 1 is violated.
The statement (vi) means that, in the line formation, both the highest and lowest USVs retain their respective statuses. This may be of interest if there is a reason to use USVs with special roles or capabilities (e.g., those of the wall exploration or side-protection of the team) at these positions. Furthermore, no additions to the proposed control law are needed in scenarios where it is judicious to keep some special USVs hidden in the middle of the team, e.g., for protection purposes.
Theorem 1 sets forth achievable requirements. Indeed, the demands to R G from (13) can be satisfied due to the second inequality in (2). Inequality (16) can be met by picking small enough ϰ > 0 and γ y , after which the last inequality in (13) can be ensured by choosing γ x > 0 sufficiently small. By letting F ¯ 0 , G ¯ 0 , we make the first inequality in (13) true and reduce (14) and (15) to v ¯ 2 > v 2 + P 2 tan 2 α and v tan α ^ > P tan α , respectively. The system of the last two inequalities has a solution P , α if and only if
v ¯ 2 > v 2 + v 2 tan 2 α ^ = v 2 cos 2 α ^ ,
which is true by the first formula from (2) since α ^ < α ¯ . Hence, to meet (13)–(15), one can start with picking P and α so that P tan α v tan α ^ , P tan α < v tan α ^ , and then proceed by choosing F ¯ , G ¯ > 0 small enough. At the end, it remains to take the functions F ( · ) and G ( · ) that satisfy (5) and (6) with the just chosen parameters R G , F ¯ , and G ¯ .
We also note that (17)–(20) describe a non-empty set of γ ’s by (6), (13), (15), and (16). For example, this set contains all small enough γ ’s, but not necessarily only them.
Theorem 1 remains true if the corridor width w is replaced by its upper bound in (2) and (13), the angle α ^ by its known upper bound in (15) and (19), the angle β min by its known lower bound in (18), and the distances h min and g min by their lower bounds in (17) and (16), (20), respectively.
Theorem 1 does not limit the choice of the parameter δ > 0 . If δ > R vis , then δ does not affect the control and so can be neglected everywhere since then N i , δ ( t ) = N i ( t ) . The idea behind the use of δ stems from the fact that for δ < R vis , the set N i , δ ( t ) can be essentially smaller than N i ( t ) , which entails a reduction in the computational burden.
If, in violation of the assumptions of Theorem 1, y i ( 0 ) = y j ( 0 ) for some i j , then the objective is not achieved since y i ( t ) = y j ( t ) t 0 . (The team acts as one of a reduced size and this smaller team gains its aim.) This can be fixed by slightly altering the control law. However, we drop discussion the respective details since the easiest tactics is to ensure that y i ( 0 ) y j ( 0 ) i j via proper placement of USVs at the start of the mission. Moreover, that assumption is met with a probability of 1 if the USVs are dropped in the scene according to a continuous probability distribution.
In terms of z i ( t ) : = x i ( t ) v · t , the control law (7) takes the form of the nonlinear nearest neighbors rule [58], which is used to achieve a consensus on the value of z i among multiple agents:
z ˙ i = 1 # N i ( t ) j N i ( t ) F [ z j ( t ) z i ( t ) ] .
Its convergence needs certain connectivity of the information-flow graph G ( t ) (we recall that its nodes 1 , , N are associated with the agents, and nodes i and j are linked if and only if j N i ( t ) ). Most of consensus criteria merely assume that this graph enjoys a sort of connectivity for some reason, while leaving the reason an open issue. There are also studies on algorithms aimed at preserving the assumed initial connectivity; see, e.g., [15,16,17,18,19,20,59,60]. They are typically computationally expensive and rely on a fairly comprehensive knowledge of the scene.
On the contrary, the algorithm from this paper is computationally cheap and uses only local sensory information about the scene, whereas its convergence does not rely on the postulate of persistent connectivity or the assumption of the initial connectivity. The reason for its convergence is the proven fact that sooner or later the algorithm automatically gives birth to the connectivity.

7.4. Secondary Add-Ons to Theorem 1

Its assumptions are adopted throughout this section.
Remark 2.
After some time has elapsed, the discontinuities of the control law (7) and (8) are being bypassed.
This excludes sliding-mode phenomena and their associates.
Remark 3.
Whenever a USV is not at the front end of a visor V, the opinion of this USV on being above or below V corresponds to reality (and so the USV does not in fact displace V in its “mind”).
Now, we discuss the extension of the above findings to three special situations.

7.5. Dropout of Team Members

Suppose that, at a time t = t * , several USVs abandon the mission and the others start ignoring them. By applying Theorem 1 to t t * , with a particular attention to (iii) and (v) at t = t * , we see that the conclusion of Theorem 1 remains true for the remaining team if its size N * > w R G 1 1 (this keeps the second inequality in (13) true). With regard to the possibility of R G R vis , the claim to N * shapes into R vis > w / ( N * + 1 ) and means that the loss of several teammates does not break the sensorial connectivity of the team under its even distribution across the corridor.
Similarly, the team adapts to several successive dropouts if the final team size > w R G 1 1 .

7.6. Addition to the Team

We limit ourselves to a simple, though practical, scenario, where extra teammates (newcomers) are disembarked near some “old” ones (oldies). Let the newcomers appear at some time t * not in the caves of the obstacles and within a vertical strip that contains the oldies and has a small enough width γ add : (17)–(20) hold with γ : = γ add (and the updated team’s size in (20)). Theorem 1 implies that, for t t * , its statements (i)–(vi) (and Remark 3) are valid if at t = t * the ordinates of the newcomers are pairwise different and differ from those of the oldies, and the obstacles do not obstruct the lines of sight among the USVs (in fact, the last requirement can be relaxed; we omit the respective details since they are technically involved).

7.7. Non-Straight Corridors

The above findings nearly literally extend on more general corridors. The last sentence of the paragraph following Definition 3 hints at this possibility: since the upper and lower exteriors of the corridor are handled as obstacles, it suffices that these exteriors meet our requirements to the obstacles and the structure of the corridor makes the concepts of the corridor direction and its cross-section meaningful. These ideas are detailed in the following definition. To state it, we recall that a planar set is said to be polygonal if its boundary is contained in finitely many straight lines.
Definition 5.
A directed simplistic corridor is an area C such that there exists two polygonal sets E + , E and a directed straight line L with the following properties:
(i) 
The sets C , E + , E are simply connected and form a partition of R 2 ;
(ii) 
There are x and w > 0 such that, in a right-handed Cartesian frame whose abscissa axis is L, the parts of the sets C , E + , and E lying to the right of the abscissa x are described by the inequalities w / 2 y w / 2 , y > w / 2 , and y < w / 2 , respectively, along with x x ;
(iii) 
Assumption 2 is true for E + and E .
This definition is illustrated in Figure 9.
Remark 4.
Let the corridor C be simplistic. Suppose also that, in Section 7.2, all statements and formulas (including (9)–(12) and the definition of α ¯ from (2)) that refer to “obstacles” take into account E + and E . Then, Theorem 1 remains true.
The assumption of Theorem 1 on starting outside the caves can also be relaxed. We illustrate this in Section 8 by computer simulations, with omitting theoretical discussion since it is technically cumbersome.

7.8. Some Hints to Relax Assumption 2

Assumption 2 excludes the situations like those in Figure 2a,c. However, they sometimes can be reduced to a case where Assumption 2 is met. To this end, the USVs may imaginarily endow the obstacles with extra fictitious parts. The price for this is that in the opinion of the USVs, the free space shrinks.
Now, we outline the basic idea for two hints of this kind, leaving the elaboration of their details as a topic of further research. Every hint reduces the number of critical rays by one. If the obstacle has many such rays, their successive processing is recommended.
Adding a fictitious cusp to a vertical front side S of an obstacle is illustrated in Figure 10, where Δ > 0 is a free parameter and the cusp is depicted in green.
The case where the both sides adjacent to S go up the corridor is of no interest: this means that the USV is in a cave, which should have been prevented by properties of the scene and algorithmic hints. To build the fictitious cusp in a timely manner, the USV must have a full view of S whenever the cusp may affect the control. So, the length s of S and Δ should not be excessively large. Also, it is needed that the cusp points should be visible whenever they fall in the sensing range R vis , as it is given to the controller. Hence, the USV should “see” not only these points but also the entirety of S. To create such situation, the controller may be affectedly given a value of R vis that is lesser than the real one.
Filling up unacceptable caves is illustrated in Figure 11. In Figure 11b–d, Δ > 0 is a free parameter. Figure 11d addresses the case where the obstacle’s side that ought to support the cusp is too short to accommodate its entirety and so the cusp is cut at the respective end of this side. The horizontal mirror images of all pictures from Figure 11 should be also included in the list of illustrations. Like in the case of vertical front sides, the USV must have the full view of the gate to the cave whenever the cave affects the control. Meanwhile, more may be needed. For example, if different obstacles are not somehow discernable (e.g., do not vary in color), then the entire cave is welcome to be visible from its entrance to differentiate it from a passage between obstacles, unless counting on luck. In Figure 11, only the cave from Figure 11d has this property.

8. Computer Simulation Tests

8.1. Numerical Experiments

The experiments described in this subsection were implemented in a Jupyter Notebook using the Python programming language. For visualization and vector operations, the Pygame and NumPy libraries were used, respectively. The walls of the corridor were defined as graphs of functions of the abscissa x from Figure 1. The obstacles were described by two functions representing the “upper” and “lower” parts of their boundaries, respectively. The obstacles whose boundaries cannot be separated into such two parts (like the obstacles in Figure 11) were decomposed into sub-obstacles that allow this separation (in Figure 11, this decomposition is outlined by the little “seams” on the obstacles). The discretization of the continuous-time kinematic model of the robots (1) was performed using the Euler method; the discretization step equals the control update period τ shown in Table 1.
Apart from the validation of the proposed control laws (7) and (8), the goals of the simulation studies described in this subsection include the assessment of its applicability in circumstances outside the bounds imposed in the theoretical part of the paper. In particular, the tests involve erroneous position measurements, controller parameters that do not quite satisfy the assumptions of Theorem 1, scenes with non-polygonal and moving obstacles, obstacles with vertical front sides, and situations where robots start in the caves of the obstacles. Meanwhile, the employed kinematic model is close to the theoretical model (1). Testing the algorithm against the challenges from more complex dynamics and other imperfections of the real world is discussed in Section 8.2 and Section 9. Various validation means (numerical simulation, Gazebo simulation, real-life experiments) are applied independently, with the main objective to cover a wider range of scenarios.
The numerical values of the key parameters used in the tests from Section 8.1 are shown in Table 1. We employed a linear function G ( · ) with saturation at the threshold R G , Table 1 displays only its linear part, as well as the control update period τ . The parameters from Table 1 are not fully compliant with the assumptions of Theorem 1; this is done to show that the domain of practical convergence of the offered control law is wider than its region of convergence unveiled theoretically.
Position measurements were plagued with unbiased additive noises uniformly distributed within a radius of 0.01 m. This is a fairly big inaccuracy relative to the typical inter-USV distances of ≈0.3–1.0 m observed in our experiments: e.g., many present-day sensors ensure a precision of several mm in that range of measurements. The multimedia of all experiments are available at https://drive.google.com/drive/folders/1ngTYqiY1V-2-sEI6EjcMrFmMAEFSMWuM?usp=sharing (accessed on 16 February 2025).
In Figure 12, Figure 13, Figure 14, Figure 15, Figure 16, Figure 17, Figure 18 and Figure 19, the positions of the USVs and the orientations of their velocities are demonstrated with the triangles; the time step between the snapshots equals 0.4 s; the trajectories of the USVs are shown as blue lines, while the boundaries of the corridor and obstacles are shown as green lines. Except for the first snapshot, the robotic team clusters near a cross-section of the corridor, which makes the snapshots easily recognizable. These snapshots allow us to evaluate the speeds of the USVs.
In Figure 12, eleven USVs are tasked with performing a dense sweep of a corridor with slightly broken walls and three obstacles. Beginning from an initial patch of the corridor with a diameter of ≈1.5 m, the team accelerates to the desired speed, aligns across the corridor, and achieves an even self-distribution within about 4.0 s. This distribution remains stable until around 7.0 s, at which time the USVs encounter the first obstacle. While navigating through the obstacle course, the USVs maintain their “line-up” formation and targeted horizontal speed, in spite of the fact that USVs separated by obstacles lose information about one another. Meanwhile, the team dynamically breaks into subgroups, each utilizing different pathways through the obstacles. The number and composition of the subgroups change over time, following the sequence: {11} → {2, 9} → {2, 7, 2} → {2, 3, 4, 2} → {5, 4, 2} → {5, 6} → {11}. This progression involves both splitting and merging of subgroups. As shown in Figure 12, the USVs do not collide with the walls of the corridor, the obstacles, and one another. By approximately 30 s, the team re-establishes the “cross-section” formation and maintains the requested horizontal speed v , despite the disruptions caused by obstacles. Thus, the posed objective is attained with high accuracy.
The purpose of the experiment from Figure 13 is to test the hint of adding a fictitious cusp; this hint is illustrated in Figure 10a and aims to handle obstacles with a vertical front side. In the opinion of the controller, the sensing range of the robot was artificially reduced down to 65% of its true value. Starting their mission in a circle with a diameter of ≈1.5 m, the robots achieve the required speed and uniformly distribute themselves across the width of the corridor in ≈5.0 s, having traveled ≈5.0 m along the corridor. This uniform distribution is maintained until ≈15.0 s, when the robots encounter an obstacle with a vertical front side. To avoid a collision, the concerned robots independently expand the obstacle by adding an imaginary cusp to this side, as shown in Figure 10a, and move along the boundary of this cusp. After bypassing the obstacle, it takes ≈10 s to restore the formation. The results of this experiment do not significantly differ from those described above, and the control objective is again achieved with a good precision.
In the scenario from Figure 14, a group of eight robots has to pass through a corridor with oval obstacles. At the start of the mission, the robots do not have enough space and time to attain the required speed and even distribution over a cross-section of the corridor, so long as they almost immediately stumble upon the first band of three obstacles. It takes ≈10 s for them to overcome this band. Then, they once again do not have enough time and space to distribute themselves uniformly across the corridor, this is due to the second band of obstacles. Overcoming this band takes ≈10 s, after which the robots achieve uniform self-distribution across the corridor in ≈5 s, and then stably maintain the required formation, as confirmed by Figure 15. The interest in this experiment partly stems from the fact that the oval obstacles violate Assumption 1. However, the obtained results demonstrate that the algorithm is applicable to scenarios with non-polygonal obstacles and may attain the control objective with good exactness.
Figure 16 illustrates an experiment in which 11 robots should sweep a corridor with an obstacle that oscillates across the corridor. At t 3.0 s, the group lines up across the corridor and achieves a nearly even inter-robot spacing; in the meantime, the obstacle is displaced slightly downward. At t 7.8 s, the group begins to notice the obstacle, whereas the latter reaches its lowest position and starts changing direction. By t 11.2 s, the group splits into two subgroups: three robots “decide” to bypass the obstacle from below, and the rest of the team prefers to go above it; during the entire obstacle avoidance maneuver, the obstacle moves upward. As a result, the free space available to the upper group of eight robots becomes considerably constricted at t 13.6 s. At t 19.8 s, the group finishes bypassing the obstacle and merges into a single unit. Finally, at t 27.2 s, the group restores an uniform distribution across the corridor, thereby achieving the control objective. Thus, we observe that the mission is successfully accomplished even in the presence of a moving obstacle.
The experiment addressed by Figure 17 illustrates the remark from the last paragraph in Section 7.7: the algorithm maintains efficiency in situations where USVs start inside caves. Initially, twelve USVs are distributed in three groups out of four. Two of them start in the caves of the obstacles O 1 and O 2 , respectively, and the third group is launched in between O 1 and O 2 . In ≈2 s, a nearly perfect alignment across the corridor is achieved within each group, along with an approximately even distribution of each group over the width of the currently used “left-to-right passage” between the obstacles’ components. Meanwhile, the sensorial contact between the groups is blocked by the obstacles. As a result, there is no progress in narrowing the x gaps among the groups (these gaps are highlighted with dashed pink rectangles). At t 7 s, the “upper” and “middle” groups merge, and ≈2 s later, they appear to be close to a common moving cross-section of the corridor. Meanwhile, their alignment with the “lower” group G still remains at the nearly initial level and poor. This does not come as a surprise since that group is still out of the sensorial contact. At t 11 s, the united “upper” group splits into two subgroups G 1 and G 2 , which “decide” to bypass the obstacle O 3 from above and below, respectively. Initially, G 2 is out of contact with G (first because of the blocking effect of O 2 and then since the gap between G 2 and G exceeds the sensing distance). During this period, G 1 and G 2 retain a nearly perfect mutual alignment across the corridor, though they are separated with O 3 . The control law stimulates G 2 and G to reduce the gap between them. As a result, they come into contact and the resulting united group aligns across the corridor and achieves a nearly even self-distribution over the width of the employed passage at t 13.0 s. A side effect of these is that G 2 loses the alignment with G 1 . Only after the obstacle course is left behind (at t 19 s) and the gap between G 1 and the remainder of the team is reduced to below the sensing range (at t 21 s), the alignment of the entire team and its even self-distribution across the corridor is attained at t 25 s. Once more, we observe that the mission is carried out successfully and with a good accuracy.
The last two experiments test the capacity of the algorithm to cope with changes in the team membership. In the scenario from Figure 18, the team of 11 USVs loses 5 USVs in the middle of the corridor length. After this happens, the remaining six USVs run the control rule “as usual”, ignoring the missed peers. By Figure 18, the result successfully traverses the obstacle course and achieves optimal (for the downsized team) self-spreading across the corridor. In Figure 19, six USVs encounter five motionless red “newcomers”. As soon as a newcomer detects that a USV overtakes it (in projection onto the x axis), it starts running the control rule and so begins to move. At the “time of meeting”, obstacles block the line of sight between some USVs. As can be seen, this does not bring any trouble: the united team reasonably uses the available passages between the obstacles, eventually leaves the obstacle course behind, and achieves the optimal deployment across the corridor. Thus, the algorithm demonstrates robustness to changes in the team membership.

8.2. Gazebo Experiments

To test the control law against the challenges from the more complex dynamics of the robots, some experiments were carried out using the realistic 3D robotics simulator Gazebo 11 (https://gazebosim.org/home, accessed on 16 February 2025) and ROS 2 (https://www.ros.org/, accessed on 16 February 2025). This simulator provides high-quality physics engines for modeling the robot and environment and emulates realistic sensor readings.
Two-wheeled differential drive robots are used as the robotic platform. To model it, the DiffBot package https://github.com/ros-mobile-robots/diffbot (accessed on 16 February 2025) is employed; it has been slightly modified subject to the considered application scenarios. A two-level control system was designed to control each robot. The control law (7) and (8) acts at the higher level to generate the desired velocity vector. This vector is then fed into the lower-level control module, whose role is to generate control signals for the left and right wheels in order to achieve the desired velocity. This module is based on PD controllers and is developed using standard control system design methods.
Partly in order to better exhibit the region of the control law convergence and to examine its robustness against controller tuning errors, some parameters of the algorithm and scenario are altered in Section 8.2 as compared with Section 8.1.
The parameter values used in Gazebo simulation are reported in Table 2.
The results of a typical experiment are shown in Figure 20.
The robots achieve the required speed and uniform distribution across the corridor in just ≈1.0 s; see Figure 20b. The group of robots encounters the band of obstacles at ≈3.0 s, as seen in Figure 20b. While overcoming the band of obstacles, the number of subgroups changes over time as follows: (6) ↦ (3-3) ↦ (6) ↦ (3-2-1) ↦ (5-1) ↦ (3-2-1) ↦ (2-4) ↦ (6). Meanwhile, Figure 20c–f shows that, during the traversal of the obstacle band, the robots never collided with an obstacle; they also did not collide with each other or with the corridor walls throughout the experiment. Although the robots are noticeably disorganized upon exiting the obstacle band in Figure 20g, they quickly restore perfect order in Figure 20h. Thus, the experiment demonstrated that, for robots with more complex kinematics, the proposed control law is suitable as a high-level control module within a hierarchical two-level control system.
A video recording of the experiment is available at the following link: https://drive.google.com/drive/folders/1ngTYqiY1V-2-sEI6EjcMrFmMAEFSMWuM?usp=sharing (accessed on 16 February 2025).
The one in Figure 21a is mounted on the Rover 5 USV platform (https://www.sparkfun.com/products/retired/10336, accessed on 16 February 2025); the USV in Figure 21b is similar in architecture to the DiffBot (https://github.com/ros-mobile-robots/diffbot, accessed on 16 February 2025). Simple gearbox and motors are mounted on the wheeled chassis. Under a low stall torque situation, the acceleration of the chassis as a whole proved to be inappropriately small, presumably due to features of the employed simple gearbox. This entails a visible problems with the USV performance. To compensate for this effect, a special control loop is included in the above situation, which artificially increases the average current in the motor coil.

9. Results of Real-World Tests

These were performed using the two USVs shown in Figure 21.
Every USV is equipped with two (i.e., left and right) DC brush motors, and only the motors differ between the USVs. One of them employs the motor driver L298N, the other makes use of the Motor Shield (https://amperka.com/). The algorithm (7) and (8) is implemented onboard on the basis of a Raspberry Pi 4B+ computer running under Linux. The motors are driven with voltage pulse signals; their pulse amplitude is maximal. Meanwhile, the speed profile generated in accordance with (7) and (8) is converted into the pulse ratio for every motor by means of a simple low-level regulator. Thus, the two USVs are subjected to a common higher-level control rule, whose hardware implementation is different for them. As a result, the experiments somewhat examine the robustness of the rule (7) and (8) against such a difference. The basic parameters of the control law are taken from Table 1.
Each USV uses a range measuring scanning laser Slamtec RPLidar A1. It is mounted on the top of the USV in order to avoid blind spots. The Lidar readings are updated with a frequency of 10 Hz, and the motor control loop operates at a frequency of 50 Hz (this imbalance aids to smoothen the USVs’ path). The computer, motors, and Lidar are separately powered by their own batteries. This separation is partly motivated by the wish to avoid knocking down the work of the Lidar because of disturbances from the motor sharing the same power source. The control software was implemented in the Thonny programming environment using the Python programming language. The pyrplidar library was used to obtain data from the LiDAR, and the RPi.GPIO library was used for motor control. At the level of the software implementation of the basic control law, extra measures were taken to encourage the robots to align with the direction of the corridor.
The multimedia of four real-life experiments are available at https://drive.google.com/drive/folders/1pRoDqK7XrvcZExlk-PTmdw_nc3zVeTBt?usp=share_link (accessed on 16 February 2025).
In Figure 22, the USVs go through a corridor C with two obstacles made of corrugated white paper. Their initial deployment differs from the desired one. At t 4.0 s, they achieve a nearly even distribution over the width of the corridor but have not had enough time to equalize their coordinates along C . A little later, the wheeled USV starts bypassing obstacle 1 from the right, so that, at t 10.0 s, the USVs find themselves within a common passageway between obstacle 1 and the right side of C . At t 15.0 s, this obstacle is left behind, the USVs nearly line up across C , and are in the process of increasing the distances between themselves and to the right side of C , which is needed to achieve an even distribution across C . This process is interrupted when the line of sight between the USVs becomes blocked by obstacle 2. Then, the USVs do not “see” each other, and the control law has to drive each of them to the center of the employed passageway. This goal is achieved with good precision at t 18.0 s. After obstacle 2 is left behind, the progression towards the even distribution resumes. As a result, at t 32.0 s, the targeted formation is built with good accuracy; from this time forth, it is stably maintained.
These facts are confirmed by Figure 23, which exhibits (slightly post-processed) telemetry data from the two Lidars. In Figure 23, the blue and orange graphs display the distance from the USV to the nearest object (either a corridor wall, or an obstacle, or another USV) to the left and right, respectively, that is found in the narrow beam issued from the USV perpendicularly to the corridor direction. Though these data are somewhat damaged by experimental artifacts and brief disruptions in the regular operation of the distance evaluation system (which are manifested as short large spikes in the graphs), it confirms that, first, the USVs do not collide with each other, the corridor walls, and the obstacles and second, evenly distribute themselves across the width of the corridor (with the maximal positional error ≲4.0 cm) after the obstacle course is left behind. Thus, the control law copes with the mission and demonstrates a reasonable performance.
Overall, these and our other experiments (reported at the previously indicated site) demonstrated the robustness of the proposed control law against real-life non-idealities, including sensor noises, actuator errors, and mismatches between the theoretical model of the USV and its real-world kinematics and dynamics.

10. Conclusions and Future Work

A distributed and computationally cheap control rule was offered such that, when it is individually run by every USV from a team of an unknown size, the team autonomously organizes itself into the densest net-like straight barrier across an unknown corridor. This holds even if the corridor is partly cluttered with unknown polygonal obstacles. Moreover, the rule guarantees that, eventually, the barrier goes along the corridor with a pre-specified speed and in the given direction, and the USVs evenly distribute themselves across the width of the corridor in its obstacle-free parts. Furthermore, the straight cross-section formation of the robots is not broken in all parts of the corridor, including those cluttered with obstacles. The suggested control law uses only local sensory data within a finite distance. By directly converting the observations into control in a reflex-like fashion, this law demands minimal computational resources. Regarding the simplification of the control system architecture, it was demonstrated that, under certain circumstances, the task of obstacle avoidance can be entrusted to the control module responsible for distributing the robots across the width of the corridor. The proposed algorithm was shown to be robust against the dropouts of teammates and admissions of newcomers. It was also proven that its convergence does not rely on the postulate of persistent informational connectivity of the team or the assumption on the initial connectivity. Its convergence and performance were justified via mathematically rigorous non-local convergence results and were confirmed via intensive computer simulation tests and real-world experiments. This validation was performed and the applicability of the proposed approach was demonstrated for a whole variety of scenarios, including those outside the bounds of the theoretical analysis. In particular, the method works well in certain scenarios with moving or non-polygonal obstacles, and if USVs start in “caves” inside obstacles; also, it is somewhat robust against controller tuning errors.
The practical design of navigation laws often follows through a two-stage hierarchy, where control at the kinematic level generates a reference signal, which is then tracked by standard, more or less, controllers. The developments of this paper are attributed to the first stage and are, to a certain extent, about to set forth a sort of paradigm and provide a proof of concept. Implementation issues concerned with the second stage in a context somewhat similar in spirit to that from this paper are addressed in, e.g., [61,62].
Future work includes the elaboration of the details concerned with higher-order models of the USVs and relaxation of the assumptions about the obstacles. Our agenda also includes studies of scenarios where several barriers should be formed that consecutively follow one another with a given step. Extensions to 3D environments are also on the way.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/drones9030161/s1, Video S1: animation of the experiment from Figure 17; Video S2: animation of the experiment from Figure 19; Video S3: animation of the experiment from Figure 18; Video S4: animation of the experiment from Figure 22.

Author Contributions

P.K.: Conceptualization, software, validation, formal analysis, investigation, writing—original draft preparation. A.M.: Conceptualization, methodology, data curation, formal analysis, writing—review and editing, supervision, project administration, funding acquisition. K.G.: software, validation, visualization. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the grant of the state program of the “Sirius” Federal Territory “Scientific and technological development of the “Sirius” Federal Territory” (Agreement №18-03 date 9 October 2024).

Data Availability Statement

Data are contained within the article and Supplementary Materials.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
USVUnmanned surface vehicle
a.a.“for almost all”
Conventions and notations
Positive anglescounted counterclockwise
: = “is defined to be”, “is used to denote”
“segment of a line”its part between two points
“segment”“segment of a straight line”
[ a , b ] segment bridging the points a , b
( a , b ] [ a , b ] minus a
[ a , b ) [ a , b ] minus b
( a , b ) [ a , b ] minus a and b
# A number of elements in the set A
sgn ( a ) signum function, sgn ( 0 ) : = 0
O boundary of the set O
x ( p ) , y ( p ) coordinates of point p
empty set
C handled corridor
wwidth of the corridor
Nnumber of the robots
O k kth obstacle
r i location of robot i
x i , y i coordinates of robot i
v i velocity vector of robot i
v ¯ upper bound on the robot’s speeds
v desired speed
R vis sensing distance
F k ± upper/lower fences of obstacle O k
α ¯ upper bound on the polar angles of the segments in upper and lower fences
ϰ , δ , γ x , γ y , α , P , R G , G ¯ , F ¯ controller parameters
F ( · ) , G ( · ) functions used to build the controller

Appendix A. Proof of Theorem 1 and Remarks 2, 3, and 4

We study the motion of the team driven by the proposed control law. The assumptions of Theorem 1 are adopted throughout the appendix. Furthermore, the x distance is the distance between the abscissas of two points; the y distance is defined likewise.
Lemma A1.
The statement (i) of Theorem 1 is true.
Proof. 
By (4), | α i ( t ) | α and so tan α i ( t ) tan α . By invoking (5) and (7), we see that v i x ( t ) v + F ¯ . Simultaneously, (6) and (8) imply that v i y ( t ) G ¯ + P tan α . The proof is completed by (14). □
To state the next lemma, we put v x : = v F ¯ and note that v x > 0 thanks to (13).
Lemma A2.
The statements (iii) and (iv) of Theorem 1 are true. Moreover, x ˙ i ( t ) v x a.a. t.
Proof. 
(iii) We start with invoking the notation z i ( t ) : = x i ( t ) v · t from (22). By virtue of the Danskin’s theorem [63], the function M ( t ) : = max i z i ( t ) is absolutely continuous and M ˙ ( t ) = z ˙ i t 0 ( t ) a.a. t, where i t 0 is a maximizer for max i z i ( t ) . By (7) and the definition of the Filippov’s solution [57], z ˙ i t 0 ( t ) lies in the convex hull of the values that are the limits of
1 | N i t 0 ( t ) | j N i t 0 ( t ) F [ z j ( t ) z i t 0 ( t ) ]
as the perturbed system’s state { r i ( t ) } i = 1 N goes to the true one, respecting certain restrictions. However, they cannot influence the limit values of the addends, which are exactly as shown in (A1) and are nonpositive by (5). Hence, M ˙ ( t ) = z ˙ i t 0 ( t ) 0 a.a. t and M ( t ) is a non-increasing function. Likewise, m ( t ) : = min i z i ( t ) is a non-decreasing function. It remains to note that ς ( t ) = max i , j | z i ( t ) z j ( t ) | = M ( t ) m ( t ) .
(iv) By (5), the second addend in (7) does not exceed F ¯ in absolute value. It remains to invoke the first inequality from (13). □
Corollary A1.
| x i ( t ) x j ( t ) | < γ t 0 , i , j , where γ is taken from Theorem 1.
Lemma A3.
If USV i is on a visor V at time τ, then for t τ , t > τ , it is outside V and is actually on the side of V that was downloaded at random into its “mind” at t = τ .
Proof. 
Let USV i “think” that it is below V at t = τ ; the opposite case is handled likewise. Then, d i , δ + ( τ + ) = 0 and α i ( t ) : = α t < τ , t τ due to (3) and (4). It remains to invoke (6) and (8) and observe that
lim ¯ t τ v i y ( t ) = lim ¯ t τ [ G [ d i , δ + ( t ) ] G [ d i , δ ( t ) ] 0 + P tan α i ( t ) ] G ( 0 ) P tan α = ( 6 ) P tan α < 0 .
Lemma A4.
Let [ 0 , τ ) be a time interval during which the USV i does not collide with the obstacles: r i ( t ) O k k . Then, the following statements hold:
(i) 
For t [ 0 , τ ] , USV i is not in the caves of any obstacle O k ;
(ii) 
If there is a point of an obstacle O k that lies above (below) r i ( t ) , the closest p i ± ( t ) of such points belongs to the lower (upper) fence of O k .
Proof. 
(i) Suppose that (i) is untrue. Since USV i is initially outside the caves by the assumptions of Theorem 1, there is time ϑ ( 0 , τ ] and an obstacle O k such that r i ( ϑ ) is in a cave of O k , whereas r i ( t ) is not in its caves for t [ 0 , ϑ ) . By invoking the definition of the cave, we see that the ray R + [ r i ( t ) ] does not intersect O k for t [ 0 , ϑ ) , t ϑ , or the same is true for the ray R [ r i ( t ) ] . We focus on the first situation, and the second one is treated likewise. We vertically extend R + [ r i ( t ) ] down from r i ( t ) until hitting O k at some point h ( t ) and thus obtain an O k -free upward ray R + ( t ) . Since r i ( ϑ ) is in a cave, both rays R ± [ r i ( ϑ ) ] intersect O k . Hence, the ray R + [ h ( ϑ ) ] is not O k -free, whereas arbitrarily close to it, there is the upward ray R + ( t ) that is O k -free and also lies to the left of R by Lemma A2 (in the part addressing iv) of Theorem 1). By Definition 2, this means that the ray R + [ h ( ϑ ) ] is forward critical for O k , in violation of Assumption 2. This contradiction completes the proof of (i).
(ii) This is immediate from (i) and Definition 3. □
A right cape of the obstacle O k is a pair of its sides s 1 , s 2 with a common point p such that they lie to the left of p (see Figure A1).
Figure A1. Right capes and feasible options for two non-empty bases.
Figure A1. Right capes and feasible options for two non-empty bases.
Drones 09 00161 g0a1
Lemma A5.
The following statements hold:
(i) 
No more than one obstacle affects the bases B i ( t ) and B i + ( t ) of USV i.
(ii) 
No more than one base is not empty.
Proof. 
(i) An obstacle influences base building only if vertically below/above its point p there is an edge of the graph G i ( t ) at a distance γ y . By the definition of G i ( t ) , the y distance from r i ( t ) to p does not exceed min { N γ y , R vis } ; the x distance does not exceed γ by Corollary A1. By taking into account the imaginary visor, we infer that the x distance to the true obstacle does not exceed ϰ + γ . Overall, the Euclidian distance between p and r i ( t ) does not exceed g , where g is the l.h.s. of (20). If building the bases of USV i is affected by different obstacles, the distance between them is, therefore, not greater than 2 g , in violation of (20). This completes the proof of (i).
(ii) Suppose that B i + ( t ) and B i ( t ) , and pick p ± B i ± ( t ) . Vertically below/above p ± , there is a point of O k ± , where k + = k = : k by (i). Due to Corollary A1 and (17), (1) the x scope of G i ( t ) fully covers the x scope of no side of the polygon O k , and (2) if r i ( t ) lies on the left to a visor of O k , any node of Γ i ( t ) to the right of r i ( t ) is in the x scope of the visor. Due to (i) in Lemma A4 and the definition of G i ( t ) , there exist two sides s 1 and s 2 of O k such that they form a right cape, and p + is vertically above s 1 , whereas p is below s 2 ; also, [ p ± , r i ( t ) ] O k = ; see Figure A1.
Based on Figure A1, it is easy to see that, in any case, either (B.3) or (B.2) in the definition of the base (given in Section 5) is violated either for p + or for p . This contradiction completes the proof. □
The left end of the visor is called its tip. The visored obstacle deprived of the visor’s tips is said to be blunt.
Lemma A6.
The USVs do not hit the blunt obstacles.
Figure A2. Three ways to hit an obstacle: hitting an obstacle’s side with (a) a positive slope, (b) zero slope, (c) negative slope.
Figure A2. Three ways to hit an obstacle: hitting an obstacle’s side with (a) a positive slope, (b) zero slope, (c) negative slope.
Drones 09 00161 g0a2
Proof. 
Let T be the set of times t > 0 when the USVs and the blunt obstacles have no points in common. By Lemma A3, the set T is non-empty and open, and its leftmost connected component has the form ( 0 , τ ) , where τ > 0 . We have to show that τ = .
Suppose that τ < and limit our attention to t < τ , t τ . With the aid of Lemma A3, we infer that, for such t’s, the USVs are outside the visored obstacles, and there are robot i and obstacle O k such that r i ( τ ) is in the blunt obstacle O k , and r i ( t ) is either (1) always below O k or (2) always above O k . We focus on (1), and case (2) is handled likewise. It is easy to see that there exists a side S of O k such that r i ( τ ) S and r i ( t ) is below S; see Figure A2. Let p ( t ) stand for the point of S that is vertically above r i ( t ) . We put 𝒳 ( t ) : = x [ p ( t ) ] , 𝒴 ( t ) : = y [ p ( t ) ] , z ( t ) : = 𝒴 ( t ) y i ( t ) and examine the cases from Figure A2 separately.
The cases (a,b) from Figure A2. Then, x i ( t ) = 𝒳 ( t ) , 𝒴 ( t ) = 𝒳 ( t ) tan α + const , d i , δ + ( t ) z ( t ) , and due to (4) and Lemma A5, α i ( t ) 0 t < τ , t τ . Hence,
{ t k } k = 1 : z ( t k ) > 0 , t k < τ , t k τ , z ( τ ) = 0 ; z ˙ ( t ) = v i x ( t ) tan α v i y ( t ) ( 5 ) , ( 7 ) ( v + F ¯ ) tan α v i y ( t ) = ( 8 ) ( v + F ¯ ) tan α G [ d i , δ + ( t ) ] + G [ d i , δ ( t ) ] 0 P tan α i ( t ) 0
( v + F ¯ ) tan α G [ d i , δ + ( t ) ] G [ z ( t ) ] .
Since z ( t k ) > 0 , [64] (Th. 4.1, Ch. 3) guarantees that z ( t ) is greater than the solution z 0 ( t ) 0 of the ODE z ˙ 0 ( t ) = G [ z 0 ( t ) ] for t τ , t τ . Then, z ( τ ) is also greater than 0 = z 0 ( τ ) , in violation of (A2). This contradiction completes the proof in cases (a) and (b).
The case (c) from Figure A2. In this case, robot i is an evader and α i ( t ) = α by (4) and Lemma A5. Due to (10) and Lemma A4,
z ˙ ( t ) = v i x ( t ) tan α v i y ( t ) ( 5 ) , ( 7 ) ( v + F ¯ ) tan α ^ v i y ( t ) = ( 8 ) ( v + F ¯ ) tan α ^ G [ d i , δ + ( t ) ] + G [ d i , δ ( t ) ] 0 P tan α i ( t ) ( v + F ¯ ) tan α ^ G [ d i , δ + ( t ) ] + P tan α ( 15 ) G [ z ( t ) ] t < τ , t τ .
The proof is completed like in cases (a) and (b). □
Corollary A2.
The USVs do not collide with the real obstacles and the corridor walls.
By the assumptions of Theorem 1, the USVs start outside the caves. Then, (i) in Lemma A4 yields the following.
Corollary A3.
The USVs do not visit the caves.
By invoking Lemma A3 and A2, we also come to the following two conclusions, respectively.
Corollary A4.
Remark 3 is true.
Corollary A5.
The times when USV i is in the x scope of any obstacle O k form a finite interval (maybe, empty). During this interval, USV i is either always above O k or always below O k .
For any USVs i j , we put S i , j ( t ) : = r i ( t ) , r j ( t ) . A time τ is said to be touching for the pair ( i , j ) and the obstacle O k if S i , j ( τ ) O k , and arbitrarily close to τ there exists t < τ such that S i , j ( t ) and O k have no common points.
Lemma A7.
Let τ be a touching time for the pair ( i , j ) of robots and the obstacle O k .
Then, the following statements are true:
(i) 
Either one and only one of the locations r i ( τ ) , r j ( τ ) lies in the x scope of the obstacle O k , or the both lie there and are vertically aligned x i ( τ ) = x j ( τ ) ;
(ii) 
Any p S i , j ( τ ) O k is either the left end of a visor or a right cape (see Figure A3e–g);
Figure A3. Feasible options at a touching time τ : (a) the x-scopes of the sides s 1 and s 2 do not overlap, the slopes of the sides are opposite in sign, (b) the x-scopes of the sides do not overlap, the slopes of the sides are nonnegative, (c) the x-scopes of the sides do not overlap, the slopes of the sides are negative, (d,e) the x-scopes of the sides overlap, (f,g) the point p is the tip of a visor.
Figure A3. Feasible options at a touching time τ : (a) the x-scopes of the sides s 1 and s 2 do not overlap, the slopes of the sides are opposite in sign, (b) the x-scopes of the sides do not overlap, the slopes of the sides are nonnegative, (c) the x-scopes of the sides do not overlap, the slopes of the sides are negative, (d,e) the x-scopes of the sides overlap, (f,g) the point p is the tip of a visor.
Drones 09 00161 g0a3
Proof. 
We start by noting that the interior of O k does not intersect with S i j ( τ ) , and the locations r i ( τ ) and r j ( τ ) do not belong to the blunt obstacle O k by Lemma A6. So, Corollary A1 and (17) imply that the intersection S i , j ( τ ) O k contains a single point p , which is a vertex of the polygon O k . Let s 1 and s 2 be the sides of O k adjacent to p . By taking into account (17) and Lemma A2, we see that the cases feasible at t = τ are either those featured in Figure A3 or their mirror reflections with respect to the horizontal line. We focus on the first group of the cases; the second group is handled likewise.
We invoke α ¯ from (2) and the notation φ ( S ) introduced in the beginning of Section 7, and first focus on the cases (a–d) from Figure A3. By Lemmas A4 and A6 and Figure A3, | β | < α ¯ for β : = φ [ S ( τ ) ] . So, Corollary A1 yields that
| y i ( τ ) y j ( τ ) | | x i ( τ ) x j ( τ ) | tan | β | < γ tan α ¯ γ y
by (17) and the last inequality from (13). Hence, for t < τ , t τ , nodes i and j are linked in in the graphs Γ i ( t ) and Γ j ( t ) , and S i j ( t ) G i ( t ) G j ( t ) . Also, Lemma A5 and (4) imply that α i ( t ) = α j ( t ) = α in the cases (a), (b), (d), whereas α i ( t ) = α j ( t ) = 0 in the case (c).
In Figure A3, the side s 1 lies on the straight line described by y = x tan α + c with some c. Also, p = θ i r i ( τ ) + θ j r j ( τ ) , where θ i > 0 , θ j > 0 , θ i + θ j = 1 . We put p ( t ) = θ i r i ( t ) + θ j r j ( t ) , x ( t ) : = x [ p ( t ) ] , y ( t ) : = y [ p ( t ) ] , z ( t ) : = y ( t ) x ( t ) tan α + c . Then, (A2) holds and
x ˙ = θ i v i x + θ i v j x v x by Lemma A 2 , v + F ¯ by   ( 5 )   and   ( 7 ) ;
In the cases (a), (b), and (d), we have
z ˙ = y ˙ x ˙ tan α y ˙ ( v + F ¯ ) tan α ^ = ( 8 ) ( v + F ¯ ) tan α ^ + q = i , j θ q G [ d q , δ + ( t ) ] 0 G [ d q , δ ( t ) ] + P tan α ( 6 ) ( v + F ¯ ) tan α ^ + q = i , j θ q G ¯ + P tan α t τ ( v + F ¯ ) tan α ^ G ¯ + P tan α > ( 15 ) 0 ,
in violation of (A2). This shows that (a,b,d) do not occur.
In the case (c) from Figure A3, the sides s 1 and s 2 form a forward pair and so α ¯ α i β min by (11) and the definition of α ¯ from (2). Hence, | φ S ( τ ) | α ¯ , and then (3), (17) and Corollary A1 entail that d q , δ ( τ ) γ tan α ¯ for q = i , j . Hence,
z ˙ y ˙ + x ˙ tan α 1 Lemma A 2 y ˙ + v x tan β min = ( 8 ) v x tan β min + q = i , j θ q G [ d q , δ + ( t ) ] 0 G [ d q , δ ( t ) ] ( 6 ) v x tan β min q = i , j θ q G [ d q , δ ( t ) ] lim ̲ t τ z ˙ ( t ) v x tan β min G [ γ tan α ¯ ] > ( 18 ) 0 .
Like in cases (a,b,d), we thus see that (c) does not hold.
In all other cases (e–g) from Figure A3, the statements (i) and (ii) are trivially true. □
Lemma A8.
If an obstacle O k separates USVs i and j, they cannot be both above O k and cannot be both below O k .
Proof. 
Suppose to the contrary that there is time t * such that the obstacle O k separates r i ( t * ) and r j ( t * ) , whereas USVs i and j are either both above O k or both below O k . The set T of times t 0 for which O k does not separate r i ( t ) and r j ( t ) contains 0 (by the assumptions of Theorem 1), and the time τ : = sup { t T : t < t * } is touching. Due to Lemmas A2 and A7, some of the cases (e–g) from Figure A3 (or its horizontal mirror refection) hold at t = τ (maybe, with i j ). Among them, the case (e) from Figure A3 does not occur: otherwise, the forward USV would not be in the x scope of the obstacle O k at t = t * by Lemma A2.
Suppose that τ = t * . Since the locations r i ( t * ) and r j ( t * ) are in the x scope of O k , at t = t * , the segment S i , j ( t ) : = [ r i ( t ) , r j ( t ) ] is vertical in Figure A3f,g. So, one of the USVs i , j is above O k and the other is below O k at t = t * , in violation of the definition of t * . Hence, τ < t * .
As t runs from τ towards t * , the forward USV from Figure A3f,g keeps its position with respect to O k (below/above) unchanged thanks to Corollary A5. Due to Corollary A1 and the inequality γ < ϰ from (17), no later than this USV leaves the x scope of the visor, the other USV enters this scope. Let θ be the time when this occurs. Then, τ < θ t * , and at t = θ , the “other” USV is on the other side of the visor since S i , j ( t ) O k t [ τ , θ ] . By Corollary A5, it remains on the other side of O k until t * , in violation of the definition of t * . This contradiction completes the proof. □
By the assumption of Theorem 1, the USVs can be enumerated so that, at t = 0 ,
y 1 ( t ) < < y N ( t ) .
Lemma A9.
Inequalities (A4) hold for any t > 0 .
Figure A4. Options feasible at time τ when the ordinates of two USVs become equal: (a) Point p - sc lies below the obstacle and φ ( s ) > 0 , (b) point p - sc lies below the obstacle and φ ( s ) < 0 , (c) point p - sc lies to the right of the x scope of the obstacle.
Figure A4. Options feasible at time τ when the ordinates of two USVs become equal: (a) Point p - sc lies below the obstacle and φ ( s ) > 0 , (b) point p - sc lies below the obstacle and φ ( s ) < 0 , (c) point p - sc lies to the right of the x scope of the obstacle.
Drones 09 00161 g0a4
Proof. 
Suppose that the conclusion of the lemma fails to be true. Let ( 0 , τ ) be the leftmost connected component of the set T : = { t > 0 : ( A 4 ) holds } . Then, τ ( 0 , ) and there are 1 j < j + N and y R such that
y j ( τ ) = y j J : = { j = j , , j + } , y j 1 ( τ ) < y j ( τ ) if j > 1 , y j + ( τ ) < y j + + 1 ( τ ) if j + < N .
We put j : = j + 1 , z ( t ) : = y j ( t ) y j ( t ) . By (17) and Corollary A1,
| x j ( t ) x j ( t ) | < γ γ x , | y j ( t ) y j ( t ) | < γ y whenever t < τ , t τ .
Also, (A2) still holds. Now, we consider separately several cases.
(1) The segment S ( t ) : = r j ( t ) , r j ( t ) intersects a blunt obstacle O k at t = τ . By Lemma A5, the respective obstacle is unique. Among the locations r j ( τ ) and r j ( τ ) , there is at least one p sc that lies (strictly) inside the x scope of O k , as follows from (17). We focus on the case where p sc is above O k ; the opposite case is handled likewise. By Lemma A8, the other p - sc of the above two locations is not above O k . Since the segment S ( τ ) is horizontal by (A5) and does not exceed γ in length by Lemma A2, whereas γ is less than the length of the visor by (17), the abscissa x ( p - sc ) cannot lie to the left of the x scope of O k . Thus, either p - sc lies below the obstacle O k or to the right of its x-scope. We shall handle these two cases separately.
(1.a) Point p - sc lies below O k . By the assumptions of Theorem 1, S ( 0 ) O k = . Due to Lemma A7 and (e–g) in Figure A3, at the time when the segment S ( t ) touches O k for the first time, either USV j is above O k or USV j is below O k . With regard to Corollary A5, it follows that p - sc = r j ( τ ) lies below O k and p sc = r j ( τ ) lies above O k . Let s be the side of O k that contains the point p such that the segment ( p , r j ( τ ) ] is vertical and does not intersect O k . Depending on whether the polar angle φ ( s ) of s is non-negative or negative, the situations featured in Figure A4a,b, respectively, occur.
Case from Figure A4a. Like in the proof of Lemma A7, we see that for t < τ , t τ , USV j is an evader and α j ( t ) = α , α j ( t ) = 0 . Also, (10) and Corollary A1 imply that lim ¯ t τ d j , δ ( t ) γ tan α ^ . So for t < τ , t τ , the following relations hold:
z ˙ ( t ) = v j y ( t ) v j y ( t ) = ( 8 ) G [ d j , δ + ( t ) ] G [ d j , δ ( t ) ] G [ d j , δ + ( t ) ] + G [ d j , δ ( t ) ] + P tan α j ( t ) ( 6 ) G [ d j , δ ( t ) ] G ¯ + P tan α lim ̲ t τ z ˙ ( t ) P tan α G ¯ G [ γ tan α ^ ] > ( 19 ) 0 ,
in violation of (A2). So the case from Figure A4a does not hold.
Case from Figure A4b. Like in the previous case, we see that, for t < τ , t τ , USV j is an evader and α j ( t ) = α , whereas α j ( t ) = 0 . Also, lim ¯ t τ d j , δ + ( t ) γ tan α ^ . The proof is completed as before and results in the conclusion that the case from Figure A4b does not hold.
Hence, the overall case (1.a) does not occur.
(1.b) Point p - sc lies to the right of the x scope of O k . Let T be the set of times t [ 0 , τ ) for which the obstacle O k does not separate USVs i and j. Then, 0 T by the assumptions of Theorem 1, the set T is open in [ 0 , τ ) , and T [ 0 , τ ) . So, the leftmost connected component of T has the form [ 0 , θ ) , where θ ( 0 , τ ) is a touching time for ( i , j ) and O k . Due to Lemmas A2, A7, and (e–g) in Figure A3, at t θ , t < θ the USV j with the greater ordinate cannot be below O k . By Corollary A5 and Lemma A8, it cannot dive below O k while traveling through the x scope of O k . Thus, we see that p sc = r j ( τ ) and p - sc = r j ( τ ) ; see Figure A4c. By arguing like in the situation from Figure A4a, we arrive at the conclusion that the case (1.b) and so the overall case (1) do not occur.
Now, we pass on to consider the remaining option.
(2) Segment S ( τ ) does not intersect the blunt obstacles. Since this segment is horizontal, it is also disjoint with the visored obstacles. The USVs j and j are in direct sight of each other and
S ( t ) G j ( t ) , G j ( t ) , d j , δ ( t ) z ( t ) , d j , δ + ( t ) z ( t ) ,
whereas (A2) holds. Once again, we examine the feasible cases separately.
(2.a) α j ( t ) α j ( t ) t < τ , t τ . Then,
z ˙ ( t ) = v j y ( t ) v j y ( t ) = ( 8 ) G [ d j , δ + ( t ) ] 0 G [ d j , δ ( t ) ] G [ d j , δ + ( t ) ] + G [ d j , δ ( t ) ] 0 + P tan α j ( t ) P tan α j ( t ) ( 6 ) 2 G [ z ( t ) ] .
Then, the arguments stated just after (A3) result in contradiction to (A2) and show that the situation (2.a) does not occur.
(2.b) It follows that some of the following options holds:
(b.1) 
τ T + ¯ , where T + : = t < τ : α j ( t ) = α , α j ( t ) 0 ;
(b.2) 
τ T ¯ for T : = t < τ : α j ( t ) 0 , α j ( t ) = α .
(b.1) By (4) and Lemma A5, a unique obstacle affects building any nonzero angle among α j ( t ) , α j ( t ) . By shrinking T + , we arrive at a situation where, for all t T + , the angle α j ( t ) assumes a common value α j 0 , a common obstacle O k influences α j ( t ) , and if α j < 0 , a common obstacle does the same for α j ( t ) . If α j < 0 , the arguments from the proof of i) in Lemma A5 show that the distance from any USV j , j to a point of the related obstacle does not exceed the l.h.s. of (20). Then, (20) implies that both angles are triggered by a common obstacle O k .
Let t T + . Then, USV j is an evader with the main base B j + ( t ) . By (4) with i : = j , there is a node j * in the connected component C j ( t ) j of the graph Γ j ( t ) such that y j * ( t ) y j ( t ) , a side s of O k can be found vertically below a point p S : = [ r j ( t ) , r j * ( t ) ] at a distance γ y , and the plane-parallel infinitesimal shift of the segment S and point p in the x direction does not increase the vertical distance from S to O k and from p to s. So the polar angle φ ( s ) of the side s is positive. If all nodes from C j ( t ) are in direct view of USV j , then G j ( t ) G j ( t ) . This and Lemma A5 imply that USV j is also an evader with the main base B j + ( t ) , in violation of (4) and (b.1). It follows that there is a node j C j ( t ) invisible by USV j . Then, necessarily, y j ( t ) < y j ( t ) and so j < j < j .
By Corollary A1, the abscissas x j ( t ) , x j ( t ) , x ( p ) , and x j ( t ) lie in an interval that is less than γ in length. So, (17) implies that x j ( t ) cannot lie on the left to or in the x scope of a visor of O k . By taking into account the first inequality from (17), we infer that r j ( t ) lies above O k .
By the assumptions of Theorem 1, O k does not separate USVs j and j initially. The time when O k starts separating them is touching for ( j , j ) and O k , and does not exceed t. Let θ stand for the maximum touching time that does not exceed t. By Lemma A7, the situation from Figure A3g,f holds for τ : = θ . In Figure A3g,f, i = j and j = j so long as j < j implies that y j ( θ ) < y j ( θ ) . As time goes from θ to t, the segment bridging the locations of USVs j and j constantly intersects O k . Hence, USV j is below O k at the first time when it finds itself in the x scope of O k . By Corollary A5, USV j remains below O k until t, in violation of the foregoing.
As a result, we see that the case (b.1) does not hold.
(b.2) Similarly, we see that this case also does not occur.
Thus, assuming that the failure of the lemma leads to a contradiction in any case, this completes the proof. □
Now, we introduce x R such that the associated concluding part of the corridor C + : = { r C : x x } is free from the obstacles. The foregoing implies the following.
Corollary A6.
The team safely goes through the obstacle course, then enters the concluding part C + of the corridor, and goes inside C + afterwards.
From now on, we consider the respective part of the team’s motion and assign t = 0 to its beginning. We put y 0 ( t ) : = w / 2 , y N + 1 ( t ) : = w / 2 t 0 , and
d i ( t ) : = y i + 1 ( t ) y i ( t ) i = 0 , , N .
Lemma A10.
The following function does not decrease:
μ ( t ) : = min min i = 0 , , N d i ( t ) ; γ y .
Proof. 
By the Danskin theorem [63], the function μ ( · ) is absolutely continuous, and for almost all t,
μ ˙ ( t ) = 0 if min i = 0 , , N d i ( t ) γ y , d ˙ i t 0 ( t ) otherwise ,
where i t 0 is a minimizer for min i d i ( t ) . It suffices to show that μ ˙ ( t ) 0 a.a. t. In the first case from (A7), this is clear. Let the second case hold. We consider three possible options separately.
i 0 ( t ) = 1 , , N 1 . Then, γ y > μ ( t ) = y i 0 ( t ) + 1 ( t ) y i 0 ( t ) ( t ) . Since i = 0 N d i ( t ) = w , we infer that μ ( t ) w N + 1 . Hence, r i 0 ( t ) + 1 ( t ) r i 0 ( t ) ( t ) < R vis due to (13), the last inequality from (17), and Corollary A1. So G i 0 ( t ) ( t ) = G i 0 ( t ) + 1 ( t ) , α i 0 ( t ) ( t ) = α i 0 ( t ) + 1 ( t ) , and
μ ˙ ( t ) = d ˙ i t 0 ( t ) = ( A 6 ) y ˙ i 0 ( t ) + 1 ( t ) y ˙ i 0 ( t ) ( t ) = ( 8 ) G [ d i 0 ( t ) + 1 , δ + ( t ) ] G [ d i 0 ( t ) + 1 , δ ( t ) ] G [ d i 0 ( t ) , δ + ( t ) ] + G [ d i 0 ( t ) , δ ( t ) ] .
Here d i 0 ( t ) + 1 , δ ( t ) = d i 0 ( t ) , δ + ( t ) = d i 0 ( t ) ( t ) = μ ( t ) by (3) since r i 0 ( t ) + 1 ( t ) r i 0 ( t ) ( t ) < R vis . Also, d i 0 ( t ) + 1 , δ + ( t ) μ ( t ) and d i 0 ( t ) , δ ( t ) μ ( t ) by (3). Overall, μ ˙ ( t ) 0 by (6).
i 0 ( t ) = 0 . Likewise, μ ( t ) = y 1 ( t ) y 0 ( t ) = | y 1 ( t ) + w / 2 | . Due to (12) and (20), the angle α 1 ( t ) cannot be influenced by the upper wall of the corridor since USV 1 is close | y 1 ( t ) + w / 2 | < γ y to the lower wall. Hence, α 1 ( t ) 0 and
μ ˙ ( t ) = d ˙ 0 ( t ) = ( A 6 ) y ˙ 1 ( t ) ( 8 ) G [ d 1 , δ + ( t ) ] G [ d 1 , δ ( t ) ] = G [ d 1 , δ + ( t ) ] G [ μ ( t ) ] 0 .
i 0 ( t ) = N . Similar arguments show that μ ˙ ( t ) 0 . □
By putting ζ : = μ ( 0 ) > 0 , we arrive at the following.
Corollary A7.
y i + 1 ( t ) y i ( t ) ζ > 0 t , i .
Lemma A11.
The derivatives d ˙ i ( t ) are bounded: there exists a constant c > 0 such that,
| d ˙ i ( t ) | c for any i = 0 , , N and a . a . t .
Proof. 
For i = 1 , , N 1 , we have d i + 1 , δ ( t ) = d i , δ + ( t ) ,
d ˙ i ( t ) = ( A 6 ) y ˙ i + 1 ( t ) y ˙ i ( t ) = ( 8 ) G [ d i + 1 , δ + ( t ) ] G [ d i + 1 , δ ( t ) ] + P tan α i + 1 ( t ) G [ d i , δ + ( t ) ] + G [ d i , δ ( t ) ] P tan α i ( t ) = G [ d i + 1 , δ + ( t ) ] 2 G [ d i , δ + ( t ) ] + G [ d i , δ ( t ) ] + P [ tan α i + 1 ( t ) tan α i ( t ) ] = = ( 6 ) , ( 4 ) | d ˙ i ( t ) | c : = 4 G ¯ + 2 P tan α .
For i = 0 , we have
d ˙ i ( t ) = ( A 6 ) y ˙ 1 ( t ) = ( 8 ) G [ d 1 , δ + ( t ) ] G [ d 1 , δ ( t ) ] + P tan α 1 ( t ) = = ( 6 ) , ( 4 ) | d ˙ i ( t ) | c .
The case i = N is considered likewise. □
We consider the function Y ( t ) : = [ y 0 ( t ) , , y N + 1 ( t ) ] and recall that its ω-limit point is the limit lim j Y ( t j ) born by an unbounded sequence t 1 < t 2 < < t j j . Since the components y j ( t ) of Y ( t ) are bounded | y j ( t ) | w / 2 t 0 , the collection Y of all ω -limit points is a compact non-empty set. The elements Y = [ y 1 , , y N ] of this collection are called the limit deployments. By Corollary A7, y 0 = w / 2 < y 1 < < y N + 1 = w / 2 .
Lemma A12.
The following inequality holds for any limit deployment Y :
w N + 1 d i ( Y ) : = y i + 1 y i i = 0 , , N .
Proof. 
First of all, we introduce the continuous mapping
Y Y m ( Y ) : = min i = 0 , , N d i ( Y ) R .
Suppose to the contrary to the conclusion of the lemma that (A12) fails to be true for some limit deployment Y * Y . Then, the minimum of the function m ( · ) over the compact set Y is less than w / ( N + 1 ) . Let Y ¯ = [ y ¯ 0 , , y ¯ N + 1 ] Y be a respective minimizer. By (A13), m ( Y ¯ ) = d i ( Y ¯ ) for some i, but not for all i’s since
i = 0 N d i ( Y ¯ ) = w .
By noting that m ( Y ¯ ) < w / ( N + 1 ) , we infer that there exists i for which either
w N + 1 > d i ( Y ¯ ) = m ( Y ¯ ) , m ( Y ¯ ) < d i + 1 ( Y ¯ )
or min w N + 1 , d i ( Y ¯ ) > d i + 1 ( Y ¯ ) = m ( Y ¯ ) .
By definition, the limit deployment Y ¯ is born by some “parent-sequence” t 1 < t 2 < < t j j . By thinning this sequence, if necessary, we ensure that t k + 1 t k + 1 k . Furthermore,
y j ( t k ) y ¯ j d j ( t k ) k d j ( Y ¯ ) j .
Case (A15). In this case, the following inequality holds if κ > 0 is small enough
m ( Y ¯ ) < min d i + 1 ( Y ¯ ) 5 κ ; w N + 1 3 κ .
Furthermore, the symbol χ ( k ) (maybe, with indices) is used to denote k-dependent quantities that converge to zero as k . Borrowing c from Lemma A11, we see that, for ε min { κ / c ; 1 } and t [ t k ε , t k ] , the following holds:
d i ( t ) d i ( t k ) + | d i ( t ) d i ( t k ) | d i ( t k ) + c | t t k | d i ( t k ) + c ε = = = = ( A 15 ) , ( A 17 ) m ( Y ¯ ) + c ε + χ i ( k ) k m * : = m ( Y ¯ ) + 2 κ < w N + 1 κ < w N + 1 = = = = = = = = = = = = = ( 3 ) , ( 17 ) , ( A 4 ) , ( A 6 ) , Corollary A 1 d i ( t ) = d i , δ + ( t ) ; d i + 1 ( t ) d i + 1 ( t k ) | d i + 1 ( t ) d i + 1 ( t k ) | d i + 1 ( t k ) c | t t k | d i + 1 ( Y ¯ ) + χ i + 1 ( k ) c ε k d i + 1 ( Y ¯ ) 2 κ m * + κ = = = = = = = = = = = = = = = = = = = = = = = m * + κ < w N + 1 , ( 3 ) , ( 17 ) , ( A 4 ) , ( A 6 ) , Corollary A 1 d i + 1 , δ + ( t ) m * + κ ; j N 2 d j ( t ) d j ( t k ) | d j ( t ) d j ( t k ) | d j ( t k ) c ε = = = = = = = = = = ( A 17 ) , d j ( Y ¯ ) m ( Y ¯ ) Δ j ( t ) m ( Y ¯ ) + χ j ( k ) c ε .
Suppose first that i 1 . If α i + 1 ( t ) = α , the graph G i + 1 ( t ) contains a node j i + 1 at a distance γ y from the upper wall of the corridor. This distance upper estimates d j ( t ) , where d j ( t ) > d i ( t ) by the foregoing. Hence, Δ i ( t ) < γ y and so G i + 1 ( t ) G i ( t ) and α i ( t ) = α . Similarly, α i ( t ) = α α i + 1 ( t ) = α . It follows that, in any case, α i + 1 ( t ) α i ( t ) and so
t [ t k ε , t k ] d ˙ i ( t ) ( A 10 ) G [ d i + 1 , δ + ( t ) ] 2 G [ d i , δ + ( t ) ] + G [ d i , δ ( t ) ] ( 6 ) , k G [ m ( Y ¯ ) + 3 κ ] 2 G [ m ( Y ¯ ) + c ε + χ i ( k ) ] + G [ d i 1 , δ + ( t ) ] G [ m ( Y ¯ ) + 3 κ ] 2 G [ m ( Y ¯ ) + c ε + χ i ( k ) ] + G [ m ( Y ¯ ) + χ i 1 ( k ) c ε ] lim ̲ k inf t [ t k ε , t k ] d ˙ i ( t ) G [ m ( Y ¯ ) + 3 κ ] 2 G [ m ( Y ¯ ) + c ε ] + G [ m ( Y ¯ ) c ε ] ε 0 g : = G [ m ( Y ¯ ) + 3 κ ] G [ m ( Y ¯ ) ] > ( 6 ) , ( 13 ) , ( A 18 ) 0 .
So, by properly reducing ε (if necessary), one can guarantee that Δ ˙ i ( t ) g / 2 for all t [ t k ε , t k ] and large enough k. Therefore,
d i ( t k ε ) = d i ( t k ) t k ε t k d ˙ i ( t ) d t d i ( t k ) g ε / 2 .
The bounded sequence { Y ( t k ε ) } k = 1 has a convergent subsequence. Its limit Y ε is a limited deployment for which the related quantity (A13) is less than the value taken by this quantity at the deployment Y ¯ : this holds due to (A17) (where t k t k ε and Y ¯ Y ε ) and (A19). However, this contradicts the definition of Y ¯ as the minimizer of (A13). This contradiction completes the proof if i 1 .
In the case (A15), it remains to examine the situation where i = 0 . Then, for any t [ t k ε , t k ] , we have
d ˙ i ( t ) ( A 11 ) G [ d 0 , δ + ( t ) ] G [ d 0 , δ ( t ) ] = G [ d 0 , δ + ( t ) ] G [ d 1 , δ + ( t ) ] ( 6 ) , k G [ m ( Y ¯ ) + 3 κ ] G [ m ( Y ¯ ) + c ε + χ 1 ( k ) ]
Hence,
lim ̲ k inf t [ t k ε , t k ] d ˙ i ( t ) G [ m ( Y ¯ ) + 3 κ ] G [ m ( Y ¯ ) + c ε ] δ 0 g * : = G [ m ( Y ¯ ) + 3 κ ] G [ m ( Y ¯ ) ] > ( 6 ) , ( 13 ) , ( A 18 ) 0 .
The proof is completed like in the case where i 1 .
Case (A16) is handled likewise, by systematically replacing the intervals of the form [ t k ε , t k ] by [ t k , t k + ε ] and picking a convergent subsequence from the sequence { Y ( t k + ε ) } k = 1 . □
By using (A12) and (A14), we arrive at the following.
Corollary A8.
The following equality is true for any limit deployment: Y ,
d i ( Y ) = w N + 1 i = 0 , , N .
Lemma A13.
For any i = 1 , , N ,
y i ( t ) w / 2 + i w / ( N + 1 ) as t .
Proof. 
By (A12) and (A20), any limit deployment Y = [ y 0 , , y N + 1 ] satisfies the following equations:
y i = w / 2 + i w / ( N + 1 ) i = 1 , , N .
Let us consider an ω -limit point y ¯ of the mapping y i ( · ) . Then, there exists an unboundedly increasing time-sequence { t k } such that y ¯ = lim k y i ( t k ) . Furthermore, we note that the bounded sequence { Y ( t k ) } k = 1 has a convergent subsequence. Its limit is a limit deployment whose ith entry is equal to y ¯ . Hence, y ¯ = w / 2 + i w / ( N + 1 ) and we see that all ω -limit points of the bounded function y i ( · ) are the same and equal w / 2 + i w / ( N + 1 ) . This implies (A21) [64] (Ch. VII, Corollary 1.1) and completes the proof. □
Corollary A1, Lemma A13, (13), and the last inequality from (17) imply the following.
Corollary A9.
For all sufficiently large t, the graph G ( t ) introduced just after (22) is connected; moreover, its nodes i and i + 1 are connected with an edge for any i = 1 , , N 1 .
Proof of Theorem 1. 
Corollary A9 and (5), (22) imply that there is x * for which z i ( t ) x * i as t [58,65]. This, Definition 1, Corollary A2, Lemma A9, and (A21) ensure (ii) in Theorem 1. Its statements (i) and (iii,iv) hold by Lemma A1 and A2, respectively. The statement (v) holds by Lemma A9; the statement (vi) is immediate from (v). □
Remark 3 is justified by Corollary A4.
Proof of Remark 2. 
The discontinuities could hold either due to the effects of the obstacles or in a situation where r i r j = R vis or | x i x j | = δ for some i , j . However, this cannot occur for all sufficiently large times due to ii) of Theorem 1, Definition 1, the second inequality in (13), Lemma A2, and Corollary A6. □
Proof of Remark 4. 
This proof is performed via the inspection of the proof of Theorem 1 and observing that all arguments remain valid. Starting from Corollary A6, it is important that a concluding part C + : = { r C : x x } is bounded by two parallel straight lines by (ii) in Definition 5. □

References

  1. Xing, T.; Liu, Y.; Chen, L. Survey of robot formation control methods. Acad. J. Sci. Technol. 2022, 4, 58–61. [Google Scholar] [CrossRef]
  2. Oh, K.; Park, M.; Ahn, H. A survey of multi-agent formation control. Automatica 2015, 53, 424–440. [Google Scholar] [CrossRef]
  3. Werger, B. Cooperation without deliberation: A minimal behavior-based approach to multi-robot teams. Artif. Intell. 1999, 110, 293–320. [Google Scholar] [CrossRef]
  4. Abdelli, A.; Amamra, A.; Yachir, A. Swarm Robotics: A Survey. In Advances in Computing Systems and Applications; Senouci, M., Boulahia, S., Benatia, M., Eds.; Springer: Cham, Switzerland, 2022; pp. 153–164. [Google Scholar]
  5. Xu, D.; Zhang, X.; Zhu, Z.; Chen, C.; Yang, P. Behavior-Based Formation Control of Swarm Robots. Math. Probl. Eng. 2014, 2014, 205759. [Google Scholar] [CrossRef]
  6. Ren, W.; Beard, R. Distributed Consensus in Multi-Vehicle Cooperative Control: Theory and Applications; Springer: London, UK, 2008. [Google Scholar]
  7. Li, Y.; Tan, C. A survey of the consensus for multi-agent systems. Syst. Sci. Control. Eng. 2019, 7, 468–482. [Google Scholar] [CrossRef]
  8. Maghenem, M.; Loria, A.; Nuno, E.; Panteley, E. Consensus-based formation control of networked nonholonomic vehicles with delayed communications. IEEE Trans. Autom. Control. 2021, 66, 2242–2249. [Google Scholar] [CrossRef]
  9. Savkin, A.; Cheng, T.; Xi, Z.; Javed, F.; Matveev, A.; Nguyen, H. Decentralized Coverage Control Problems for Mobile Robotic Sensor and Actuator Networks; Wiley and IEEE Press: Hoboken, NJ, USA, 2015. [Google Scholar]
  10. Wu, W.; Zhang, Z.; Lee, W.; Du, D. Sweep-Coverage. In Optimal Coverage in Wireless Sensor Networks; Springer Optimization and Its Applications; Springer: Berlin/Heidelberg, Germany, 2020; Volume 261, pp. 183–192. [Google Scholar]
  11. Huang, H.; Savkin, A.; Ding, M.; Huang, C. Mobile robots in wireless sensor networks: A survey on tasks. Comput. Netw. 2019, 148, 1–19. [Google Scholar] [CrossRef]
  12. Gage, D. Command control for many-robot systems. In Proceedings of the the 19th Annual AUVS Technical Symposium, Hunstville, AL, USA, 22–24 June 1992; Volume 4, pp. 22–24. [Google Scholar]
  13. Ding, L.; Han, Q.; Ge, X.; Zhang, X. An overview of recent advances in event-triggered consensus of multiagent systems. IEEE Trans. Cybern. 2018, 48, 1110–1123. [Google Scholar] [CrossRef]
  14. Wen, G.; Yu, X.; Yu, W.; Lu, J. Coordination and control of complex network systems with switching topologies: A Survey. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6342–6357. [Google Scholar] [CrossRef]
  15. Ji, M.; Egerstedt, M. Distributed coordination control of multiagent systems while preserving connectedness. IEEE Trans. Robot. 2007, 23, 693–703. [Google Scholar] [CrossRef]
  16. Dimarogonas, D.; Kyriakopoulos, K. Connectedness preserving distributed swarm aggregation for multiple kinematic robots. IEEE Trans. Robot. 2008, 24, 1213–1223. [Google Scholar] [CrossRef]
  17. Yang, Y.; Shi, Y.; Constantinescu, D. Connectivity-preserving synchronization of time delay Euler–Lagrange networks with bounded actuation. IEEE Trans. Cybern. 2019, 51, 3469–3482. [Google Scholar] [CrossRef] [PubMed]
  18. Zavlanos, M.; Pappas, G. Distributed connectivity control of mobile networks. IEEE Trans. Robot. 2008, 24, 1416–1428. [Google Scholar] [CrossRef]
  19. Kan, Z.; Navaravong, L.; Shea, J.; Pasiliao, E.; Dixon, W. Graph matching-based formation reconfiguration of networked agents with connectivity maintenance. IEEE Trans. Control. Netw. Syst. 2015, 2, 24–35. [Google Scholar] [CrossRef]
  20. Poonawala, H.; Spong, M. Preserving strong connectivity in directed proximity graphs. IEEE Trans. Autom. Control. 2017, 62, 4392–4404. [Google Scholar] [CrossRef]
  21. Lin, H.; Huang, Y. Collaborative complete coverage and path planning for multi-robot exploration. Sensors 2021, 11, 3709. [Google Scholar] [CrossRef]
  22. Ni, J.; Gu, Y.; Tang, G.; Ke, C.; Gu, Y. Cooperative coverage path planning for multi-mobile robots based on improved K-means clustering and deep reinforcement learning. Electronics 2024, 13, 944. [Google Scholar] [CrossRef]
  23. Muhsen, D.; Sadiq, A.; Raheem, F. A survey on swarm robotics for area coverage problem. Algorithms 2024, 17, 3. [Google Scholar] [CrossRef]
  24. Heo, N.; Varshney, P. Energy-efficient deployment of intelligent mobile sensor networks. IEEE Trans. Syst. Man Cybern. Part A 2005, 35, 78–92. [Google Scholar] [CrossRef]
  25. Chao, H.; Chen, Y.; Ren, W. A study of grouping effect on mobile actuator sensor networks for distributed feedback control of diffusion process using central Voronoi tessellations. Int. J. Robot. Res. 2006, 11, 185–190. [Google Scholar]
  26. Wang, Y.; Tseng, Y. Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage. IEEE Trans. Parallel Distrributed Syst. 2008, 19, 1280–1294. [Google Scholar] [CrossRef]
  27. Deif, D.; Gadallah, Y. Classification of wireless sensor networks deployment techniques. IEEE Commun. Surv. Tutor. 2014, 16, 834–855. [Google Scholar] [CrossRef]
  28. Chang, C.; Chin, Y.; Chen, C.; Chang, C. Impasse-aware node placement mechanism for wireless sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 1225–1237. [Google Scholar] [CrossRef]
  29. Zhou, M.; Li, J.; Wang, C.; Wang, J.; Wang, L. Applications of Voronoi diagrams in multi-robot coverage: A Review. J. Mar. Sci. Eng. 2024, 12, 1022. [Google Scholar] [CrossRef]
  30. Sadeghi, M.; Shahrabi, A.; Ghoreyshi, S.; Alfouzan, F. Distributed node deployment algorithms in mobile wireless sensor networks: Survey and challenges. ACM Trans. Sens. Netw. 2023, 19, 91. [Google Scholar]
  31. Houssein, E.; Saad, M.; Djenouri, Y.; Hu, G.; Ali, A.; Shabah, H. Metaheuristic algorithms and their applications in wireless sensor networks: Review, open issues, and challenges. Clust. Comput. 2024, 27, 13643–13673. [Google Scholar] [CrossRef]
  32. Wei, C.; Ji, Z.; Cai, B. Particle swarm optimization for cooperative multi-robot task allocation: A multi-objective approach. IEEE Robot. Autom. Lett. 2020, 5, 2530–2537. [Google Scholar] [CrossRef]
  33. Rossides, G.; Metcalfe, B.; Hunter, A. Particle swarm optimization—An adaptation for the control of robotic swarms. Robotics 2021, 10, 58. [Google Scholar] [CrossRef]
  34. Spears, W.; Spears, D.; Heil, R.; Kerr, W.; Hettiarachchi, S. An overview of physicomimetics. In Proceedings of the International Workshop on Swarm Robotics, Santa Monica, CA, USA, 17 July 2004; Şahin, E., Spears, W.M., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 84–97. [Google Scholar]
  35. Schwager, M.; Rus, D.; Slotine, J. Decentralized, adaptive coverage control for networked robots. Int. J. Robot. Res. 2009, 28, 357–375. [Google Scholar] [CrossRef]
  36. Razafindralambo, T.; Simplot-Ryl, D. Connectivity preservation and coverage schemes for wireless sensor networks. IEEE Trans. Autom. Control. 2011, 56, 6819–6820. [Google Scholar] [CrossRef]
  37. Rout, M.; Roy, R. Self-deployment of randomly scattered mobile sensors to achieve barrier coverage. IEEE Sens. J. 2016, 16, 6819–6820. [Google Scholar] [CrossRef]
  38. Chowdhury, T.J.; Elkin, C.; Devabhaktuni, V.; Rawat, D.B.; Oluoch, J. Advances on localization techniques for wireless sensor networks: A survey. Comput. Netw. 2016, 110, 284–305. [Google Scholar] [CrossRef]
  39. Bartolini, N.; Ciavarella, S.; Silvestri, S.; Porta, T.L. On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment. IEEE Trans. Mob. Comput. 2016, 15, 3114–3128. [Google Scholar] [CrossRef]
  40. Mahboubi, H.; Aghdam, A. Distributed deployment algorithms for coverage improvement in a network of wireless mobile sensors: Relocation by virtual force. IEEE Trans. Control. Netw. Syst. 2017, 4, 736–748. [Google Scholar] [CrossRef]
  41. Zhou, D.; Wang, Z.; Bandyopadhyay, S.; Schwager, M. Fast, on-line collision avoidance for dynamic vehicles using buffered Voronoi cells. IEEE Robot. Autom. Lett. 2017, 2, 1047–1054. [Google Scholar] [CrossRef]
  42. Elmokadem, T.; Savkin, A. Computationally-efficient distributed algorithms of navigation of teams of autonomous UAVs for 3D coverage and flocking. Drones 2021, 5, 124. [Google Scholar] [CrossRef]
  43. Eledlebi, K.; Ruta, D.; Hildmann, H.; Saffre, F.; Al Hammadi, Y.; Isakovic, A.F. Coverage and energy analysis of mobile sensor nodes in obstructed noisy indoor environment: A Voronoi-approach. IEEE Trans. Mob. Comput. 2022, 21, 2745–2760. [Google Scholar] [CrossRef]
  44. Bartolini, N.; Calamoneri, T.; Ciavarella, S.; La Porta, T.; Silvestri, S. Autonomous mobile sensor placement in complex environments. ACM Trans. Auton. Adapt. Syst. 2017, 12, 7. [Google Scholar] [CrossRef]
  45. Priyadarshi, R.; Gupta, B.; Anurag, A. Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues. J. Supercomput. 2022, 76, 7333–7373. [Google Scholar] [CrossRef]
  46. Zhou, Z.; Chen, T.; Wu, D.; Yu, C. Corridor navigation and obstacle distance estimation for monocular vision mobile robots. Int. J. Digit. Content Technol. Its Appl. 2011, 5, 192–202. [Google Scholar]
  47. Keshavan, J.; Gremillion, G.; Alvarez-Escobar, H.; Humbert, J. Autonomous vision-based navigation of a quadrotor in corridor-like environments. Int. J. Micro Air Veh. 2015, 7, 111–123. [Google Scholar] [CrossRef]
  48. Gupta, S.; Sangeeta, R.; Mishra, R.; Singal, G.; Badal, T.; Garg, D. Corridor segmentation for automatic robot navigation in indoor environment using edge devices. Comput. Netw. 2020, 178, 107374. [Google Scholar] [CrossRef]
  49. Pang, Y.; Zhou, L.; Lin, B.; Lv, G.; Zhang, C. Generation of navigation networks for corridor spaces based on indoor visibility map. Int. J. Geogr. Inf. Sci. 2020, 34, 177–201. [Google Scholar] [CrossRef]
  50. Padhy, R.; Ahmad, S.; Verma, S.; Bakshi, S.; Sa, P. Localization of unmanned aerial vehicles in corridor environments using deep learning. In Proceedings of the the 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 9423–9428. [Google Scholar]
  51. Aneesh, P.; Singh, R.; Dash, R. Autonomous UAV navigation in indoor corridor environments by a depth estimator based on a deep neural network. In Proceedings of the the 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 24–28 June 2024; pp. 1–5. [Google Scholar]
  52. Cheng, T.; Savkin, A. Decentralized control for mobile robotic sensor network self-deployment: Barrier and sweep coverage problems. Robotica 2011, 29, 283–294. [Google Scholar] [CrossRef]
  53. Chen, C.; Liu, S.; Zhong, C.; Zhang, B. Multiple robot formation control strategy in corridor environments. In Proceedings of the the 33rd Chinese Control Conference, Nanjing, China, 28–30 July 2014; pp. 8507–8512. [Google Scholar]
  54. Shi, M.; Qin, K.; Liu, J. Cooperative multi-agent sweep coverage control for unknown areas of irregular shape. IET Control. Theory Appl. 2018, 12, 1983–1994. [Google Scholar] [CrossRef]
  55. Matveev, A.; Konovalov, P. Distributed reactive motion control for dense cooperative sweep coverage of corridor environments by swarms of non-holonomic robots. Int. J. Control. 2023, 96, 554–567. [Google Scholar] [CrossRef]
  56. Matveev, A.; Konovalov, P.; Gordievich, K.; Gusev, S. Distributed reactive navigation of robotic teams for sweep coverage of a corridor environment with an obstacle course. In Proceedings of the the 7th International Conference on Robotics and Automation Engineering (ICRAE), Singapore, 18–20 November 2022; pp. 210–214. [Google Scholar]
  57. Filippov, A. Differential Equations with Discontinuous Righthand Sides; Kluwer Academic Publishers: Dordrecht, The Netherlands, 1988. [Google Scholar]
  58. Lin, Z.; Francis, B.; Maggiore, M. State agreement for continuous-time coupled nonlinear systems. SIAM J. Control. Optim. 2007, 46, 288–307. [Google Scholar] [CrossRef]
  59. Zavlanos, M.; Egerstedt, M.; Pappas, G. Graph-theoretic connectivity control of mobile robot networks. Proc. IEEE 2011, 99, 1525–1540. [Google Scholar] [CrossRef]
  60. Kan, Z.; Dani, A.; Shea, J.; Dixon, W. Network connectivity preserving formation stabilization and obstacle avoidance via a decentralized controller. IEEE Trans. Autom. Control. 2012, 57, 1827–1832. [Google Scholar] [CrossRef]
  61. Matveev, A.; Wang, C.; Savkin, A. Real-time navigation of mobile robots in problems of border patrolling and avoiding collisions with moving and deforming obstacles. Robot. Auton. Syst. 2012, 60, 769–788. [Google Scholar] [CrossRef]
  62. Matveev, A.; Hoy, M.; Katupitiyac, J.; Savkin, A. Nonlinear sliding mode control of an unmanned agricultural tractor in the presence of sliding and control saturation. Robot. Auton. Syst. 2013, 61, 973–987. [Google Scholar] [CrossRef]
  63. Danskin, J. The theory of min-max, with applications. SIAM J. Appl. Math. 1966, 14, 641–644. [Google Scholar] [CrossRef]
  64. Hartman, P. Ordinary Differential Equations, 2nd ed.; Birkhäuzer: Boston, MA, USA, 1982. [Google Scholar]
  65. Matveev, A.; Novinitsyn, I.; Proskurnikov, A. Stability of continuous-time consensus algorithms for switching networks with bidirectional interaction. In Proceedings of the 2013 European Control Conference, Zurich, Switzerland, 17–19 July 2013; pp. 1872–1877. [Google Scholar]
Figure 1. Sweep coverage of a corridor with an obstacle course.
Figure 1. Sweep coverage of a corridor with an obstacle course.
Drones 09 00161 g001
Figure 2. Critical (red) and non-critical (other colors) downward rays. (a,c) Obstacle with critical (red) ray; (b) Obstacle without critical (red) rays.
Figure 2. Critical (red) and non-critical (other colors) downward rays. (a,c) Obstacle with critical (red) ray; (b) Obstacle without critical (red) rays.
Drones 09 00161 g002
Figure 3. Lower and upper fences.
Figure 3. Lower and upper fences.
Drones 09 00161 g003
Figure 4. Artificial visor of an obstacle: (a) Unlikely situation; and (b) Artificial visor.
Figure 4. Artificial visor of an obstacle: (a) Unlikely situation; and (b) Artificial visor.
Drones 09 00161 g004
Figure 5. Angles that are (red) and are not (blue) visible front cusps. (a) The case (A) of visible front cusps; (b) The case (B) of visible front cusps and the example of not closed visible part; (c) The example of not closed “downstream” visible part.
Figure 5. Angles that are (red) and are not (blue) visible front cusps. (a) The case (A) of visible front cusps; (b) The case (B) of visible front cusps and the example of not closed visible part; (c) The example of not closed “downstream” visible part.
Drones 09 00161 g005
Figure 6. (a,b) A base point p and (c) a non-base point.
Figure 6. (a,b) A base point p and (c) a non-base point.
Drones 09 00161 g006
Figure 7. Basic idea behind the avoidance angle α i ( t ) .
Figure 7. Basic idea behind the avoidance angle α i ( t ) .
Drones 09 00161 g007
Figure 8. Two functions needed to build the navigation law.
Figure 8. Two functions needed to build the navigation law.
Drones 09 00161 g008
Figure 9. Non-straight simplistic corridors.
Figure 9. Non-straight simplistic corridors.
Drones 09 00161 g009
Figure 10. Adding a fictitious cusp in front.
Figure 10. Adding a fictitious cusp in front.
Drones 09 00161 g010
Figure 11. Filling up an unacceptable cave. (ac) Various examples of obstacles with caves that can fully accommodate the cusp; (d) The case where the obstacle’s side that ought to support the cusp is too short to accommodate its entirety and so the cusp is cut.
Figure 11. Filling up an unacceptable cave. (ac) Various examples of obstacles with caves that can fully accommodate the cusp; (d) The case where the obstacle’s side that ought to support the cusp is too short to accommodate its entirety and so the cusp is cut.
Drones 09 00161 g011
Figure 12. Eight USVs traverse an obstacle course. (a) USVs trajectories with snapshots in the corridor with obstacles; and (b) Graph of the distances to the vertically closest object above and below USVs.
Figure 12. Eight USVs traverse an obstacle course. (a) USVs trajectories with snapshots in the corridor with obstacles; and (b) Graph of the distances to the vertically closest object above and below USVs.
Drones 09 00161 g012
Figure 13. Eight robots, one obstacle with a vertical front side.
Figure 13. Eight robots, one obstacle with a vertical front side.
Drones 09 00161 g013
Figure 14. Eight robots, scenario with oval obstacles.
Figure 14. Eight robots, scenario with oval obstacles.
Drones 09 00161 g014
Figure 15. Graph of the lateral distance to the nearest upper/lower object d i , δ ± ( t ) .
Figure 15. Graph of the lateral distance to the nearest upper/lower object d i , δ ± ( t ) .
Drones 09 00161 g015
Figure 16. Scenario with a moving obstacle.
Figure 16. Scenario with a moving obstacle.
Drones 09 00161 g016
Figure 17. Starting in caves, twelve USVs.
Figure 17. Starting in caves, twelve USVs.
Drones 09 00161 g017
Figure 18. A team of eleven USVs unexpectedly loses five ones.
Figure 18. A team of eleven USVs unexpectedly loses five ones.
Drones 09 00161 g018
Figure 19. Five USVs join a team of six ones.
Figure 19. Five USVs join a team of six ones.
Drones 09 00161 g019
Figure 20. Six differential drive robots passing through a band of five obstacles.
Figure 20. Six differential drive robots passing through a band of five obstacles.
Drones 09 00161 g020
Figure 21. Laboratorial USV with (a) crawler and (b) wheeled chassis.
Figure 21. Laboratorial USV with (a) crawler and (b) wheeled chassis.
Drones 09 00161 g021
Figure 22. Two USVs go through a corridor with two obstacles.
Figure 22. Two USVs go through a corridor with two obstacles.
Drones 09 00161 g022
Figure 23. Telemetry data for (a) crawled and (b) wheeled USVs.
Figure 23. Telemetry data for (a) crawled and (b) wheeled USVs.
Drones 09 00161 g023
Table 1. Numerical values used in the computer simulation tests.
Table 1. Numerical values used in the computer simulation tests.
v ¯ = 6.0 m/s R vis = 1.5 m v = 1.0 m/s
P = 2.0 m/s δ = R vis / 2 α = π / 4
F ( x ) = 7.8 x 1 + x 2 R G = R vis G ( d ) = 0.78 · d 1/s
γ x = R vis / 4 γ y = R vis / 2 τ = 20 ms
Table 2. Numerical values used for simulations with Gazebo.
Table 2. Numerical values used for simulations with Gazebo.
v ¯ = 1.5 m/s R vis = 4.0 m v = 0.3 m/s
P = 2.0 m/s δ = 3.4   m α = π /4 rad
F ( x ) = 0.5 x 1 + x 2 R G = R vis G ( d ) = 0.1 · d 1/s
γ x = R vis / 4 γ y = R vis / 2 τ = 200 ms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Konovalov, P.; Matveev, A.; Gordievich, K. Reactive Autonomous Ad Hoc Self-Organization of Homogeneous Teams of Unmanned Surface Vehicles for Sweep Coverage of a Passageway with an Obstacle Course. Drones 2025, 9, 161. https://doi.org/10.3390/drones9030161

AMA Style

Konovalov P, Matveev A, Gordievich K. Reactive Autonomous Ad Hoc Self-Organization of Homogeneous Teams of Unmanned Surface Vehicles for Sweep Coverage of a Passageway with an Obstacle Course. Drones. 2025; 9(3):161. https://doi.org/10.3390/drones9030161

Chicago/Turabian Style

Konovalov, Petr, Alexey Matveev, and Kirill Gordievich. 2025. "Reactive Autonomous Ad Hoc Self-Organization of Homogeneous Teams of Unmanned Surface Vehicles for Sweep Coverage of a Passageway with an Obstacle Course" Drones 9, no. 3: 161. https://doi.org/10.3390/drones9030161

APA Style

Konovalov, P., Matveev, A., & Gordievich, K. (2025). Reactive Autonomous Ad Hoc Self-Organization of Homogeneous Teams of Unmanned Surface Vehicles for Sweep Coverage of a Passageway with an Obstacle Course. Drones, 9(3), 161. https://doi.org/10.3390/drones9030161

Article Metrics

Back to TopTop