Robots learn by checking in on team members

June 13, 2018, King Abdullah University of Science and Technology
Robots learn by checking in on team members
Mohamed Abdelkader is one of the researchers that developed an algorithm that enables a team of unmanned aerial vehicles to work together in real time under a capture the flag scenario to intercept an attacker drone. Credit: © 2018 Kuat Telegenov

The software and hardware needed to coordinate a team of unmanned aerial vehicles (UAVs) that can communicate and work toward a common goal have recently been developed by KAUST researchers.

"Giving UAVs more autonomy makes them an even more valuable resource," says Mohamed Abdelkader, who worked on the project with his colleagues under the guidance of Jeff Shamma. "Monitoring the progress of a sent out on a specific task is far easier than remote-piloting one yourself. A team of drones that can communicate among themselves provides a tool that could be used widely, for example, to improve security or capture images simultaneously over a large area."

The researchers trialled a Capture the Flag game scenario, whereby a team of defender drones worked together within a defined area to intercept an intruder drone and prevent it from reaching a specific place. To give the game more authenticity, and to check if their algorithms would work under unpredictable conditions, the intruder drone was remote-piloted by a researcher.

Abdelkader and the team quickly dismissed the idea of having a central base station that the drones would communicate with. Instead, they custom-built UAVs and incorporated a lightweight, low-power computing and wi-fi module on each one so that they could talk to each other during flight.

"A centralized architecture takes significant computing power to receive and relay multiple signals, and it also has a potential single point of total failure—the ," explains Shamma. "Instead, we designed a distributed architecture in which the drones coordinate based on local information and peer-to-peer communications."

The team's aims to achieve an optimal level of peer-to-peer messaging—which needed to be not too much, not too little—and rapid reaction times, without too much heavy computation. This allows the algorithm to work effectively in real time while the drones are chasing an intruder.

"Each of our drones makes its own plan based on a forecast of optimistic views of their teammates' actions and pessimistic views of the opponent's actions," explains Abdelkader. "Since these forecasts may be inaccurate, each drone executes only a portion of its plan, then reassesses the situation before re-planning."

Their algorithm worked well in both indoor and outdoor arenas under different attack scenarios. Abdelkader hopes their software, which is now available as open-source, will provide the test bed for multiple applications. The KAUST team hope to enable the drones to work in larger, outdoor areas and to improve the software by incorporating adaptive machine-learning techniques.

Explore further: Emerging 5G networks – new opportunities for drone detection?

More information: Abdelkader, M., Lu, Y., Jaleel, H. & Shamma, J. Distributed real time control of multiple UAVs in adversarial environment: algorithm and flight testing results. IEEE International Conference on Robotics and Automation (ICRA) May 21-25, 2018, Brisbane, Australia, pp. 6659-6664.

Related Stories

Drones controlled with brain-computer interface

October 2, 2017

Single unmanned autonomous vehicles (UAVs) directed by joysticks, radio controllers, and mobile phones are already accomplishing a variety of useful tasks, such as aerial photography and security patrols. But using multiple ...

Dutch police use real eagles to counter drones

February 3, 2016

Dutch police are turning to a phalanx of winged predators to solve the problem of unauthorised drone flights in restricted areas such as airports and over crowds: eagles.

Recommended for you

Apple closing iPhone security gap used by law enforcement

June 14, 2018

Apple is closing a security gap that allowed outsiders to pry personal information from locked iPhones without a password, a change that will thwart law enforcement agencies that have been exploiting the vulnerability to ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.