Controlling and Configuring Large UAV Teams Paul Scerri, Yang Xu, Jumpol Polvichai, Katia Sycara and Mike Lewis Carnegie Mellon University and University.

Slides:



Advertisements
Similar presentations
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
Advertisements

Programming Paradigms and languages
A component- and message-based architectural style for GUI software
Modeling Maze Navigation Consider the case of a stationary robot and a mobile robot moving towards a goal in a maze. We can model the utility of sharing.
GRASP University of Pennsylvania NRL logo? Autonomous Network of Aerial and Ground Vehicles Vijay Kumar GRASP Laboratory University of Pennsylvania Ron.
COORDINATION and NETWORKING of GROUPS OF MOBILE AUTONOMOUS AGENTS.
OASIS Reference Model for Service Oriented Architecture 1.0
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
AAMAS 2009, Budapest1 Analyzing the Performance of Randomized Information Sharing Prasanna Velagapudi, Katia Sycara and Paul Scerri Robotics Institute,
Context-based Information Sharing and Authorization in Mobile Ad Hoc Networks Incorporating QoS Constraints Sanjay Madria, Missouri University of Science.
Zach Ramaekers Computer Science University of Nebraska at Omaha Advisor: Dr. Raj Dasgupta 1.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Neural Networks Marco Loog.
1 University of Southern California Security in Multiagent Systems by Policy Randomization Praveen Paruchuri, Milind Tambe, Fernando Ordonez University.
A Free Market Architecture for Distributed Control of a Multirobot System The Robotics Institute Carnegie Mellon University M. Bernardine Dias Tony Stentz.
Integrating POMDP and RL for a Two Layer Simulated Robot Architecture Presented by Alp Sardağ.
RETSINA: A Distributed Multi-Agent Infrastructure for Information Gathering and Decision Support The Robotics Institute Carnegie Mellon University PI:
Multirobot Coordination in USAR Katia Sycara The Robotics Institute
Control of UAV Teams Paul Scerri & Katia Sycara Carnegie Mellon University Michael Lewis University of Pittsburgh P-LOCAAS Flight Test AC-130 Flank Support.
Composition Model and its code. bound:=bound+1.
Overview and Mathematics Bjoern Griesbach
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
An Intelligent Tutoring System (ITS) for Future Combat Systems (FCS) Robotic Vehicle Command I/ITSEC 2003 Presented by:Randy Jensen
A1A1 A4A4 A2A2 A3A3 Context-Specific Multiagent Coordination and Planning with Factored MDPs Carlos Guestrin Shobha Venkataraman Daphne Koller Stanford.
GaTAC: A Scalable and Realistic Testbed for Multiagent Decision Making Ekhlas Sonu, Prashant Doshi Dept. of Computer Science University of Georgia Athens,
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
Session 2a, 10th June 2008 ICT-MobileSummit 2008 Copyright E3 project, BUPT Autonomic Joint Session Admission Control using Reinforcement Learning.
Patterns and Reuse. Patterns Reuse of Analysis and Design.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
COBXXXX EXPERIMENTAL FRAMEWORK FOR EVALUATION OF GUIDANCE AND CONTROL ALGORITHMS FOR UAVS Sérgio Ronaldo Barros dos Santos,
Software Testing Reference: Software Engineering, Ian Sommerville, 6 th edition, Chapter 20.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Boundary Assertion in Behavior-Based Robotics Stephen Cohorn - Dept. of Math, Physics & Engineering, Tarleton State University Mentor: Dr. Mircea Agapie.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
1 S ystems Analysis Laboratory Helsinki University of Technology Flight Time Allocation Using Reinforcement Learning Ville Mattila and Kai Virtanen Systems.
Intelligent Agents RMIT Prof. Lin Padgham (leader) Ass. Prof. Michael Winikoff Ass. Prof James Harland Dr Lawrence Cavedon Dr Sebastian Sardina.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Top level learning Pass selection using TPOT-RL. DT receiver choice function DT is trained off-line in artificial situation DT used in a heuristic, hand-coded.
Integrated Framework for Decision Support in Planning OSU LAIR in collaboration with Richard Kaste and Mike Barnes (ARL) and Patricia McDermott (MAAD)
Riga Technical University Department of System Theory and Design Usage of Multi-Agent Paradigm in Multi-Robot Systems Integration Assistant professor Egons.
Algorithmic, Game-theoretic and Logical Foundations
1 Object Oriented Logic Programming as an Agent Building Infrastructure Oct 12, 2002 Copyright © 2002, Paul Tarau Paul Tarau University of North Texas.
1 Multiagent Teamwork: Analyzing the Optimality and Complexity of Key Theories and Models David V. Pynadath and Milind Tambe Information Sciences Institute.
Scaling Human Robot Teams Prasanna Velagapudi Paul Scerri Katia Sycara Mike Lewis Robotics Institute Carnegie Mellon University Pittsburgh, PA.
Self-Adaptive Embedded Technologies for Pervasive Computing Architectures Self-Adaptive Networked Entities Concept, Implementations,
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
The DEFACTO System: Training Incident Commanders Nathan Schurr Janusz Marecki, Milind Tambe, Nikhil Kasinadhuni, and J. P. Lewis University of Southern.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
2006 IEEE International Conference On Networking, Sensing and Control Empirical Study on the Effects of Synthetic Social Structures on Teams of Autonomous.
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
Multi-cellular paradigm The molecular level can support self- replication (and self- repair). But we also need cells that can be designed to fit the specific.
ML in the Routers: Learn from and Act on Network Traffic Bing ietf95, April
EXPERT SYSTEMS.
Intelligent Agents (Ch. 2)
CS b659: Intelligent Robotics
Ch > 28.4.
Programming Models for Distributed Application
The story of distributed constraint optimization in LA: Relaxed
Combatant Design and Fleet Mix Assessment and Optimisation using BAEFASIP Dstl/CP Chris Brett, Dstl, UK Dr Malcolm Courts, BAE Systems Maritime,
CASE − Cognitive Agents for Social Environments
R. W. Eberth Sanderling Research, Inc. 01 May 2007
Robot Intelligence Kevin Warwick.
Market-based Dynamic Task Allocation in Mobile Surveillance Systems
Self-Managed Systems: an Architectural Challenge
Presentation transcript:

Controlling and Configuring Large UAV Teams Paul Scerri, Yang Xu, Jumpol Polvichai, Katia Sycara and Mike Lewis Carnegie Mellon University and University of Pittsburgh

Context Aim to build large heterogeneous teams for complex tasks –Robots, agents, people –10,000s of actors Multiagent version of Belief Desire Intention approach to autonomous behavior –Builds on key abstraction of a Team Oriented Plan Defines the activities that must take place and interactions between those activities –Supported by extensive theoretical (logical) work Key algorithms are NP-complete or worse –Heuristics required for scalability

Specific Target Application: Wide Area Search Munitions (WASMs) Part munition, part unmanned aerial vehicle –Single use –Variety of sensors –Limited fuel supply, approximately 30 minutes –Communicate with each other, manned aircraft Concept of Operations (under development) –Small number of manned aircraft –Potentially other ground forces –100s of WASMs, performing a variety of missions Attack Search Battle damage assessment Decoys Communication relays Flight test planned September, 2005 –1 real and 3 simulated WASMs

Token-Based Coordination Token: self contained packet capable of being sent around team –Information content –Control content Local models –Team members use receipt of tokens to create local models of other team members What sorts of things are they/are they not working on? What sorts of things might they need to know? –Local models are used to improve the routing of future tokens Token “flows” implement coordination No brittle, non-scalable “message protocols”

Token Based Algorithms Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Token Based Algorithms Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings Information about environment passed around in tokens, when agent receives tokens matching plan pre-conditions plan is initiated Very high probability all applicable plans are initiated Liao et al, 2004

Token Based Algorithms Information about initiated plans shared in tokens Very high probability some agent gets to find out about any duplicate plans Liao et al, 2004 Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Token Based Algorithms Responsibility to perform a role encapsulated in token Only team member with token can perform role Team member must have capability > threshold to perform role Threshold calculated from estimates of likely role allocation outcome Okamoto, 2004 Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Token Based Algorithms Locally sensed information shared via token to get information to team members performing role effected by information Does not require sensing agent to know who needs information Xu et al, 2004 Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Token Based Algorithms Access to resource represented by token Only team member with token can use resource Team member must have need > threshold to keep resource Threshold changes dynamically as it moves around the team, seeing resource need Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Token Based Algorithms Uncertain sensor readings encapsulated in tokens and sent around the team Very high probability that at least one team member gets related sensor readings and fuses for higher confidence Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Token Based Algorithms Assumptions used to make decisions are attached to tokens resulting from that decision Very high probability agents with contradictory information see the assumptions and initiate checking process Plan instantiation Removal of duplicate plans Role allocation Information sharing Resource allocation Sensor fusion Recovering from faulty sensor readings

Layered Team Member Architecture Bottom: Local Reasoning Team member’s local actions are restricted by the tokens they have –E.g., without resource token, cannot use resource Middle: Coordination Reasoning Movement of tokens around the team implements the coordination –Flows of tokens –Local models inform token routing Top: Meta-reasoning Ensures token flows work effectively Token Local Routing Model Meta

Synergies Between Token Algorithms Overall performance depends on how well tokens are routed –Team members use local models to improve routing Observation: Execution of algorithms shares information that other algorithms can exploit –E.g., if role for strike near Pittsburgh was allocated to WASM X, then air space resources around Pittsburgh likely of interest to WASM X Implementation: Use all tokens to improve local models –E.g., role tokens change local models, resource tokens move according to local models Result: When all algorithms are working together the system actually performs better

Implementing Synergies - Example When receiving an role token from neighbor i –Probability of sending information token to i changed proportionally to similarity between “plan initiated” token and information token –Probability of sending resource token to i changed inverse proportionally to similarity between role and resource token

Meta-Reasoning for Token Flows Specific tokens are meta-reasoned about –Identify tokens that are not behaving as expected –Bring to human attention –Examples Tokens that “live” too long Tokens that travel too much –See Scerri et al, AIAA 2004 Overall flows can be controlled to optimize for specific criteria –By controlling the flows, we control how the coordination works

Neural Networks for Modeling and Controlling Token Flows Use a simple input/output feed-forward neural networks to represent a team performance model –Three-layer FFNN is capable of representing any arbitrary functions Extend to Dynamic Networks concept to cope with dynamic behaviors –This kind of network enlarges the capacity to deal with non- deterministic problem Learn the model with genetic algorithms methodology –Excellent for dealing with very huge and noisy training data set –Based on around 1,000,000 simulation runs

Configuring Algorithms with NN Offline –Change environment and algorithm parameters, observe expected performance Online –Use NN “in reverse” to find parameter settings for specific optimization criteria As environment changes As requirements change –Allows tradeoff between performance of all algorithms

Configuration Interface

Results: Token Based Coordination Total Reward Messages Fully IntegratedRandom

Results: Configuring Algorithms

Results: Online Control

Machinetta: Bringing it all Together Encapsulate token-based coordination approach into reusable software module –Called a proxy Proxies provide domain independent coordination algorithms –Do not provide domain specific communication and interface code –Available in the public domain Machinetta used to demonstrate coordination of up to 500 distributed, heterogeneous team members in several distinct domains –Demonstrates that token based coordination is feasible –Biggest teams developed to date?

Conclusions and Future Work Token-based coordination as a feasible alternative paradigm for large teams Additional layer over token flows gives high levels of control Future Work –Can we make more precise mathematical models? Markov chains?