Hostname: page-component-8448b6f56d-wq2xx Total loading time: 0 Render date: 2024-04-15T22:43:19.046Z Has data issue: false hasContentIssue false

New visibility-based path-planning approach for covert robotic navigation

Published online by Cambridge University Press:  08 August 2006

Mohamed S. Marzouqi
Affiliation:
Intelligent Robotics Research Centre, Australian Research Council Centre for Perceptive and Intelligent Machines in Complex Environments, Monash University, VIC 3800, Australia
Ray A. Jarvis
Affiliation:
Intelligent Robotics Research Centre, Australian Research Council Centre for Perceptive and Intelligent Machines in Complex Environments, Monash University, VIC 3800, Australia

Abstract

A new promising approach for visibility-sensitive path-planning problems is presented. The paper focuses on covert navigation where a mobile robot needs to plan a stealthy path to approach a designated destination in a cluttered environment. The aim is to minimize the robot's exposure to hostile sentries within the same environment. The approach can be adapted to work with different levels of initial knowledge the robot may have about both the environment map and the sentries' locations. The approach depends on estimating a cost value at each free-space location that presents the risk of being seen by any sentry. Based on the distance transform algorithm methodology, the minimum visibility–distance cost to a goal is calculated at each cell in the grid-based environment map. Moving along the steepest descent trajectory from any starting point generates an optimal covert path to a goal. The approach has been evaluated with both simulated and physical experiments. A number of test cases are presented. In each case, a path with considerable covertness, compared to a short path to the same destination, is generated. In addition to covert navigation, the approach is introduced briefly as a potential solution for other visibility-based path-planning problems.

Type
Article
Copyright
2006 Cambridge University Press

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)