A Behavior-Based Architecture For Unmanned Aerial: Vehicles
A Behavior-Based Architecture For Unmanned Aerial: Vehicles
A Behavior-Based Architecture For Unmanned Aerial: Vehicles
Manusmipi received May 22.2004. This work was jointly supported by 11. BEHAVIOR-BASED ARCHITECTURE
the National High Technique Ro~am(2003AA118402).the National Key
Project for Basic Research of China (G2003cb312205), the National Sci- In traditional control, control signal are generated by a con-
a c e Foundation of china(60174018 , 60305008 , 60334020 , trol law as response to the feedback from the object or the envi-
90205008 ) ronment. A single rule is bold in the whole pmcess. In behav-
Miaobo Dong is with Graduate School ai Sheuzhen. Tsinghua Univer- ior-based architecturethe signal is created in terms ofbehaviors.
sity, S h a d e n , 518057, P.R.C.(phone: +86-755-26036870: e-mail The whole control process is conjunct by different periods of
mbdon&@l63,net)
Zengqi Sun is wih State Key Laboratory of lntelligat Technology and control functions -behaviors. The agency changes its behaviors
Systems, Tsioghua University, Belling 100084, P.R.C. (phone: in the pmcess, switching between multiple control rules and is
186-10-62788939;e-mail: szq-dfr~mail.tsinghua.educn)
150
i n d o n of behavior as plotted in fig. 2. A schema is con- recon&uation because there are situations necessary for user to
structed to illustrate the handling as shown at the underside. It's alter schemas dpmically. Users in the architectureplay multi-
a pattern work of behaviors and events. Behaviors of shifl and ple roles of an assistant operator, a momunder and a schema
avoiding are represented hy two nodes. The occ-ce of the maker. More detailed description will be given in later discuss
event and calling to the instant avoiding operation is represented about UAVs.
by a connection fonn shifl to avoiding. Another connection back User-agency cooperation relies on communication. For
represents the resuming of moving. It is oflen a p m of a h o l e long-range systems like UAV's, the lag and other drawbacks
schema, representing a common way of event disposal. An in- need to he considered. Reasonable way of cwperation is the
tegral schema for more complicated tasks and various events is user for discrete task assignment and the agency for real-time
much more complex. operation unless some critical matter arises and user pilot has
better confidence.
151
0 ready none lotakeoff height 1,2;1,6
1 move - .wsition
tareet 11 land oosition. orientation 1.3.4.7
.,_
2 accelerate acceleration I 12flyto target place 7,13,14
3 decelerate deceleration 13 avoid haghtof obstacle 4,6
4 liWdescend lift rate 14 detect target position 739
5 head to oricntatiodtaxget I5 recon target position 7,8,9,10,11,12
6 hover roll angle 16 shifl position 7,10,11,12
7 hack trajecto, 17 main none 0,15,16
8 photograph None
*que=
10 speckfir height B resched
takeoff Euspiciour
order taget
A re ched
isbed (3)
(4) I4 Evqicio" rare
La"
detect C dangcmvr
5
detect s ~ ~ p i ~ i o n s t a l g e t mtvn A
(dynamic reconfiguration)
152
W . USER INTERVENTION AND SCHEMA RECON- V. BEHAVIOR-BASED UAV SYSTEM
FIGURATION Two points are concluded for the UAV system. 1) Operation
As stated in section users are cooperative and multi- of the aerial vehicle is conducted hy an integral schema family
fold-functional part in the architecture. Cooperation between that consists of programs for tasks. 2) Users keep layered cwp-
users and the aircrafl in three layers are kept. eration with the vehicle.
In operation layer. the user plays d e of tele-pilot. Fig. 5 shows the diagram of a behavior-based UAV system,
when the aircraft drop into some serious situation such as an separated in two parts: ground part and onboard part. The
off n o d state that need expetienced manual plot to help out. ground part (station) includes users for different duties. The
The user takes charge of pilot in replacement of the autonomous onboard part includes any device on the aircraft. A family of
system instantly. Any way, it's a way of remote control. and the schemas is installed in the controller, conducting the running of
associativeproblem of communication need to be considered. the executor. The latter translated behavior into specific control
In schema layer. the use^ iostructs the nmning progress of function, interacting with sensor and actuator. The schema block
schema by sending command codes. These codes are treated as and the executor are key components ofthe controller.
events like any other environment events, triggning schema GROUND 1 ONBOARD
entering corresponding execuiion branches.
The user and the UAV cooperate in another higher layer -
beyond-schema layer. Schemas for UAV, which was built in the
onboard controller, need to he reconligured as some exceptive
situations arise. On this occasion, the user sends reconfiguration
codes to the flying aircraft and make online alteration on the
schema, to make it fitted for the new condition, for example,
inserting a new mission, canceling a scheduled task, simplifying
handling of some events. Oynamic alteration made on the
schema, is corresponding to revising opmtion on the schema
pattan like cutting, adding an event connection, removing,
inserting a new node of behavior or subschema
An instance is presented here to illustrate how reconligma-
tions are made on an original schema for several different con- Fig 5St"eoftheUAVsynem
ditions. Fig. 4 shows a schema for task of shifl with considera- The schema block follows the event-driven principle. It d e
tion of event of suspicious target. Four possible altmtions under tects environment events in the sensor input, which represents
different conditions are desnibed on the origind pattem. an extensive collection of measured information including the
1) The user directly pilots the aircraft aAer its takeoff and re- aircraA state, the state of device and any acquisition h m the
fum autonomous landing as the goal place is reached Any environment. A part of scheduled events defined as obtainment
events that occm in the flying, is disposed by manual pilot. of specific aircraft state, are judged if activated hy the sensor
2) In repeated executions, as the environment has been input as well. User instructions are treated as events as well as
known well and potential danger excluded, the aircratl ignore dehed in schemas, higgering corresponding execution
the warning of suspicious target to simplify the program and branches.
improve the efficiency. As (2) shows, the bandhg comections Users are effective multifold-functional part in the system. As
are pruned. briefly illmated here, they are classified into commander and
3) To employ a more cautious policy, the aircraft r e m base pilot for different duties. ?be commander interacts with the
without finther detection as any suspicious target arises. Acon- schema block, sending insauctions to the block to control the
nection fnmfly to to refumis added for the event of suspicious nmning progress, and sending reconfigurationcodes to alter the
target. schema if necessary. The pilot take remote manipulation of the
4) The user assigns an additional task - to detect a specific executor as manual operation is needed. when the commander
location in the mid-way. An execution branch is added triggered decides to insert a tele-pilot session, he sends an operation re-
hythe user order of assignment. quest to the schema block to pause the schema processing and
The pattern-like program provides an convenient way for sends a command to the pilot at the same time. So the pilot can
schema rewniiguration. take charge ofthe executor in replacement ofthe schema block.
when the pilot is end a notification is sent w resume the
schema block.
153
A C n V A ' l l n N l 1RT
I ITl3lFAMILY
154
tematiou Coiifcroiico of I(cibotics anti Autoniation. p p 271 1-2718,
Nice, France, May 1992.
R. A. Brooks. "A Robust Layered Contml System Cor Mobile Ilohot,"
IUUL .loun,al of Robotics aid Aiitoiiiatioii, Vol. IlA-2, i>p 14-23,
1986.
155