107
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A supervisory control policy over an acoustic communication network

, &
Pages 946-958 | Received 10 Jun 2014, Accepted 06 Nov 2014, Published online: 16 Dec 2014
 

Abstract

This paper presents a supervisory multi-agent control policy over an acoustic communication network subject to imperfections (packet dropout and transmission delay) for localisation of an underwater flow source (e.g., source of chemical pollution, fresh water, etc.) with an unknown location at the bottom of the ocean. A two-loop control policy combined with a coding strategy for reliable communication is presented to perform the above task. A simulator is developed and used to evaluate the trade-offs between quality of communication, transmission delay and control for a fleet of autonomous underwater vehicles supervised over a noisy acoustic communication network by an autonomous surface vessel. It is illustrated that without compensation of the effects of severe random packet dropout, localisation of an unknown underwater flow source is not possible for the condition simulated just by implementing a two-loop control policy. But a two-loop control policy combined with a strategy for reliable communication locates the unknown location of flow source.

Acknowledgements

The authors thank Lara Brinon Arranz, Alexandre Seuret, Sebastien Varrier, Alain Kibangou, Julien Minet, and colleagues from Ifremer (Jan Opderbecke and Romain Piasco) for many helpful technical discussions. The authors also thank their industrial partner Ifremer (French institute for ocean research) for information on its AsterX autonomous underwater vehicles.

Notes

1. French institute for ocean research. This institute performs underwater operations for ocean science purposes.

2. For each AUV, a local control loop implements a feedback linearisation technique that replaces the vehicle nonlinear dynamics with a pseudo linear dynamics. Then, H controllers are used to compensate the effects of model inaccuracy and perturbations, including marine perturbations, and force the vehicle parameters r˙i and φi˙ to follow the desired set points viei) and ui, respectively (Varrier, Citation2010).

3. That is, AUVs are uniformly distributed along a circumference by 2πn radians each.

4. The speed of underwater sound waves is typically vs =1500 m/s, and therefore, if the distance between AUVi and the ASV is di, then Tdi = di/vs second.

5. To exchange information (measurements, control commands, etc.) between vehicles with negligible distortion, long packets of data are used. Note that distortion is due to the quantisation of information.

6. Currently, TDMA scheme is the only commercially available technique for underwater multiple accessing without collision.

7. When the formation is perfect, i.e., it is circular, dv = 2R0. But, as the formation may be disturbed during search mission due to perturbations, etc., dv is chosen to be 3R0.

8. To model a typical underwater search mission, the parameters used in simulations, such as the description for concentration flow intensity, v0, R0, etc., were chosen following several technical discussions with our colleagues from Ifremer who have many years of practical experience in operational exploration with AUVs.

9. For this case, after the centre of formation enters into the ball with centre c* and radius r0, the centre of formation shortly exits the ball.

10. For this case, after the centre of formation enters into the ball with centre c* and radius r0, the centre of formation shortly exits the ball.

11. For each M, the empirical value of mission time (empirical Ttotal) is the average of the mission time obtained from simulations.

Additional information

Funding

This work is supported by the FeedNetBack European project [grant agreement number 223866].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.