InTech uses cookies to offer you the best online experience. By continuing to use our site, you agree to our Privacy Policy.

Technology » "Advanced Technologies", book edited by Kankesu Jayanthakumaran, ISBN 978-953-307-009-4, Published: October 1, 2009 under CC BY-NC-SA 3.0 license. © The Author(s).

Chapter 15

A Manipulator Control in an Environment with Unknown Static Obstacles

By Pavel Lopatin and Artyom Yegorov
DOI: 10.5772/8213

Article top


An example of a r-neighborhhod Y(qi).
Figure 1. An example of a r-neighborhhod Y(qi).
It should be possible to inscribe in the set Y(qi) a hyperball with the centre in the qi
							 and with a radius r > 0
Figure 2. It should be possible to inscribe in the set Y(qi) a hyperball with the centre in the qi and with a radius r > 0
An example of a r-neighborhood Y(qi) with the sets Q(qi) and Z(qi). The set Q(qi) is shown by a dark color. The points from the Y(qi) which do not constitute the Q(qi), belong to the Z(qi).
Figure 3. An example of a r-neighborhood Y(qi) with the sets Q(qi) and Z(qi). The set Q(qi) is shown by a dark color. The points from the Y(qi) which do not constitute the Q(qi), belong to the Z(qi).
The manipulator kinematic scheme.
Figure 4. The manipulator kinematic scheme.
Experimental set.
Figure 5. Experimental set.
The key steps of manipulator movement trajectory.
Figure 6. The key steps of manipulator movement trajectory.

A Manipulator Control in an Environment with Unknown Static Obstacles

Pavel Lopatin1 and Artyom Yegorov1

1. Introduction

In contemporary society robots and manipulators are used in different spheres of life. Robot should be as autonomous as possible and should effectively operate in a natural environment.

In the beginning of the robotic era, robots operated in a workspace which was free of obstacles. Later the works dedicated to the invention of algorithms for the control of robots in the presence of obstacles began to appear. There are algorithms which guarantee finding a trajectory in the presence of known obstacles, if such trajectory exists Canny, 1988, Collins, 1975, Donald, 1985. Some authors use the artificial potential methods (see, for example, Choset et al., 2005. In this method a robot is represented by a point, regions in the workspace that are to be avoided are modeled by repulsive potentials and the region to which the robot is to move is modeled by an attractive potential. In a general situation there is no guarantee that a collision-free path will always be found, if one exists Ahrikhencheikh & Sereig, 1994, Choset et al., 2005. There are different graph searching methods Choset et al., 2005, La Valle, 1999-2004 which find a trajectory avoiding obstacles (even an optimal one), if it exists. It is easier to use such methods in the case where we have full information about free and forbidden points before the beginning of the movement. A computer may then calculate a preliminary trajectory and after that the manipulator may execute this trajectory. But in case of unknown obstacles the manipulator has to investigate its environment and plan its trajectory alternately. Then the difficulty arises that the graph searching algorithms demand to carry out in a certain volume a breadth-first search, otherwise the reaching of the target point qT is not guaranteed Ilyin,1995. But during the breadth-first search the following situation often arises: suppose we have just finished considering the vertices adjacent to a vertex q and we have to consider vertices adjacent to a vertex q’ and the q and q’ are not adjacent. In order to consider vertices adjacent to the q’ the manipulator at first has to come to the q’. So we get a problem of the manipulator movement from q to q’. The necessity of searching and executing paths for multiple different q and q’ makes the total sum of the manipulator movements very big Ilyin,1995. In case we plan trajectory in known environment the computer simply switches its “attention” from q to q’, which are stored in the computer’s memory.

It is possible to outline the following representatives of the breadth-first approach: they are namely breadth-first searching algorithm, A* algorithm, best-first heuristic search, lazy PRM, dynamic programming La Valle, 1999-2004. The methods based on randomized potential field, Ariadne’s Clew algorithm, rapidly-exploring random trees La Valle, 1999-2004 have such feature that new vertices are generated randomly and therefore using these methods for the unknown environment leads to the same difficulties. The approaches based on cell decomposition, visibility (bitangent) graphs, Voronoi diagrams Choset et al., 2005, La Valle, 1999-2004 are reduced to alternate graph building and searching a path on it and have the above mentioned disadvantage connected with multiple mechanical movements.

In the algorithm presented in this article the vertices q and q’ are always neighbor vertices and it reduces the number of movements.

For a solution of our problem it is possible to use the approach based on automatic theorem proving Timofeev,1978, but this approach demands to consider large amount of variants and directions of the search and therefore the application of such approach is not effective Yefimov, 1988.

It is also known that the “depth-first” algorithms do not guarantee reaching of a goal Ilyin, 1995.

There is common difficulty for the methods for trajectory planning in the presence of known obstacles: it is very difficult to borrow full information about workspace of manipulator in advance and to represent this information in a form suitable for trajectory planning. Considering our algorithm one may see that there is no need for the control system to have full information about workspace in advance, manipulator will borrow necessary information by itself in limited quantities and in terms of generalized coordinates which is suitable for trajectory planning.

The attempts of creating algorithms for the robot control in presence of unknown obstacles were made. Most of them cover various two-dimensional cases Lumelsky, 2006.

In Chen et al., 2008, Ghosh et al., 2008, Masehian & Amin-Nasari, 2008, Rawlinson & Jarvis, 2008 different approaches for a robot control in a two-dimensional unknown environment are considered. In Chen et al., 2008, Rawlinson & Jarvis, 2008 the approaches are based on Voronoi diagrams, in Masehian & Amin-Nasari, 2008 a tabu search approach is presented. The approaches demand multiple robot movements. In Masehian & Amin-Nasari, 2008 obstacles should have polygonal form. An application of methods proposed in Chen et al., 2008, Ghosh et al., 2008, Masehian & Amin-Nasari, 2008, Rawlinson & Jarvis, 2008 to a n-link manipulator control in the unknown environment is not presented.

In Lumelsky, 2006 an algorithm for the control of manipulators in the presence of unknown obstacles in three-dimensional space is given. Though this algorithm guarantees reaching of a target position it has such a limitation that the manipulator should not have more than three degrees of freedom.

In Amosov et al., 1975, Kasatkin, 1979, Kussul & Fomenko, 1975 is described an application of semantic nets to the problem of robot control in unknown environment. The disadvantage of such approach is the preliminary teaching of the net, which simulates a planning system. The absence of formal algorithms for teaching makes impossible the teaching of a complex net, which should plan robot actions in an environment close to natural Ilyin, 1995.

In Yegenoglu et al., 1988 the n-dimensional case is considered. The algorithm is based on the solution of the system of nonlinear equations using Newton method and therefore in cannot guarantee the reaching of a target position.

In La Valle, 1999-2004 algorithms for moving a robot in the presence of uncertainty (including cases of unknown environment) are considered. The algorithms are based on the sequential decision theory. In general case the algorithms do not guarantee reaching the goal. In cases when the algorithms use searching on a graph the above mentioned difficulty arises connected with multiple mechanical movements.

In Lopatin, 2001, Lopatin & Yegorov, 2007 algorithms for a n-link manipulator movement amidst arbitrary static unknown obstacles were presented. Algorithms guarantee reaching the qT in a finite number of steps under condition that the qT is reachable. It was supposed that the manipulator’s sensor system may supply information about free and forbidden points either from a r-neighborhood of the manipulator’s configuration space point where the manipulator is currently situated Lopatin, 2001 or from r-neighborhoods of a finite number of points from the manipulator configuration space Lopatin, 2006, Lopatin & Yegorov, 2007. In both cases it was supposed that the r-neighborhood has a form of a hyperball with a radius r>0. In this work we consider more general form of the r-neighborhood.

2. Task formulation and algorithm

2.1. Preliminary Information

We will consider manipulators which consist of n rigid bodies (called links) connected in series by either revolute or sliding joints Shahinpoor, 1987. We must take into account that because of manipulator's constructive limitations the resulting trajectory q(t) must satisfy the set of inequalities


for every time moment, where a 1 is the vector of lower limitations on the values of generalized coordinates comprising q(t), and a 2 is the vector of higher limitations.

The points satisfying the inequalities (1) comprise a hyperparallelepiped X in the generalized coordinate space. We will consider all points in the generalized coordinate space which do not satisfy the inequalities (1) as forbidden.

We will have to move the manipulator from a start configuration q 0=(q 1 0, q 2 0, …, qn 0) to a target configuration qT =(q1 T , q 2 T , …, qn T ). In our case the manipulator will have to move amidst unknown obstacles. If in a configuration q the manipulator has at least one common point with any obstacle then the point q in the configuration space will be considered as forbidden. If the manipulator in q has no common points with any obstacle then the q will be considered as allowed.

So, in our problem a manipulator will be represented as a point which will have to move in the hyperparallelepiped (1) from q 0 to qT and the trajectory of this point should not intersect with the forbidden points.

2.2. Preliminary Consideratons

Let us make the following considerations:

  1. The disposition, shapes and dimensions of the obstacles do not change during the whole period of the manipulator movement. Their number may not increase.

  2. It is known in advance, that the target configuration is allowed and is reachable (that is, we know that in the generalized coordinates space it is possible to find a line connecting q 0 and qT , and this line will not intersect with any forbidden point).

  3. The manipulator has a sensor system which may supply information about r-neighborhoods of points qiX, i=0.1,…, N, where N – is a finite number, defined by the sensor system structure and methods of its using.

The r-neighborhood of a point q i is a set Y(qi) of points near qi (see Figure 1).


Figure 1.

An example of a r-neighborhhod Y(qi).

The Y(qi) has a shape of a hypercube. The qi is situated in the centre of the hypercube. The length of the hypercube’s edge may be arbitrary and is defined by the sensor system structure and methods of its using. All sets Y(qi), i=0,1,… should have the same size that is the length of an edge of a Y(qi) should be equal to the length of an edge of a Y(qj) for every i and j. The sides of a Y(qi), i=0,1,… should be parallel to the corresponding planes of the basic coordinate system of the generalized coordinate space. The sets Y(qi), i=0,1,… also should satisfy such condition that it should be possible to inscribe in the set Y(qi) a hyperball with the centre in the qi and with a radius r> 0 (see Figure 2). The part of the Y(qi) comprising the hyperball should be compact that is the part should not have any hole. So, all points of the hyperball should belong to the inner part of the Y(qi).

The words “the sensor system supplies information about the r-neighborhood of a point qi “ mean that the sensor system tells about every point from the Y(qi) whether this point is allowed or forbidden. The sensor system writes all forbidden points from the Y(qi) into a set Q(qi), and writes into a set Z(qi) all allowed points from the Y(qi). The sets Y(qi), Q(qi), Z(qi) may be written using one of such methods like using formulas, lists, tables and so on, but we suppose that we have such method. We will not consider the sensor system structure.


Figure 2.

It should be possible to inscribe in the set Y(qi) a hyperball with the centre in the qi and with a radius r > 0

An r-neighborhood of qi with the sets Z(qi) and Q(qi) may look as follows Figure 3. Note that the sets Z(qi) and Q(qi) may be not continuous.


Figure 3.

An example of a r-neighborhood Y(qi) with the sets Q(qi) and Z(qi). The set Q(qi) is shown by a dark color. The points from the Y(qi) which do not constitute the Q(qi), belong to the Z(qi).

The considerations 1)-3) cover a wide range of manipulators’ applications.

2.3. Algorithm for Manipulators’ Control in the Unknown Environment

We will denote the points where generation of a new trajectory occurs as qn, n=0, 1, 2,… We will call such points “trajectory changing points”. Before the algorithm work n=0 and qn= q0 .


STEP 1. The manipulator is in a point qn, n=0, 1, 2,…, and its sensor system supplies information about the r-neighborhood of the qn , and about the r-neighborhoods of points yj , j=0, 1, …, Nn, yjX for every j=0, 1, …, Nn, Nn – is a known finite number. yj, j=0, 1, …, Nn and the Nn are generally speaking different for every n and are told on every n to the sensor system before start of the sensor system functioning. So the sensor system supplies information about the Q(qn) and about the set


After that the manipulator generates in the configuration space a preliminary trajectory L(qn, qT). The L(qn, qT) should satisfy the following conditions: I) connect the qn and the qT ; II) no point from the L(qn, qT) coincides with any point from the sets i=0nQ(qi) and i=0nQSi , in other words the preliminary trajectory should not intersect with any known forbidden point; III) satisfy the conditions (1).

The manipulator starts to follow the L(qn, qT). The algorithm goes to STEP 2.

STEP 2. While following the L(qn, qT) two results may happen:

a) the manipulator will not meet forbidden points unknown earlier and therefore will reach the qT . Upon the reaching of the qT the Algorithm terminates its work;

b) the manipulator will come to such a point (making at first operation n=n+1, let us define it qn, n=1,2,…), that the next point of the preliminary trajectory is forbidden. The Algorithm goes to STEP 1. End of Algorithm.

2.4. Theorem and Sequences

Theorem. If the manipulator moves according to the Algorithm it will reach the target configuration in a finite number of steps.


Suppose that the manipulator being in qn (n=0,1,…), generated a trajectory, leading to qT and began to follow this trajectory. If the manipulator does not meet obstacles it will reach the target configuration in a finite number of steps (because the length of the trajectory is finite). Therefore, the endlessness of the manipulator wandering may be caused only by the endless repeating of the situation described in the item b) of STEP 2 of the Algorithm and therefore the endless generating of new trajectories may be caused by the two reasons:
  1. the manipulator will infinitely return to the same point of the trajectory changing,

  2. the number of points where it is necessary to change trajectory will be infinite.

Let us prove that all points where the manipulator changes its trajectory will be different. Suppose that the manipulator changed a trajectory being in a point qs , and later it again changed a trajectory, being in a point qp , that is s<p. Let us show that qsqp . Suppose, at first, that, on the contrary, qs =qp . Then Q(qs)=Q(qp). When the manipulator was in qs , it generated a trajectory which did not intersect with the sets Q(qi), i=0, 1,..., s. When the manipulator reached the point qp , it discovered that it was necessary to change the trajectory that is this trajectory intersected with the set Q(qp). But Q(qp)=Q(qs) and Q(qs) was taken into account when this trajectory was generated. It means that the manipulator can not come to a point of the trajectory changing qp which will be equal to any other point of the trajectory changing and it means that all points where the manipulator changes its trajectory are different.

Now let us show that the number of such points is finite. Suppose that it is infinite. All points of a trajectory changing must satisfy the inequalities (1). It means, that the sequence of these points is bounded. According to the Boltsano-Weierstrass theorem it is possible to extract from this sequence a convergent subsequence qi, i=1,2,… According to the Cauchy property of the convergent sequences it is possible for any to find such a number s that all points qi, i>s will lie in an -neighborhood of qs . Let us take <r. Consider an arbitrary point qi of the trajectory changing lying in the -neighborhood of qs . As far as in the qi the manipulator had to change the trajectory, it means that that trajectory intersected with Q(qs) (because qi and its neighbor points belong to Q(qs )). From this fact it is possible to make the conclusion that the set Q(qs ) was not taken into account when that trajectory was generated. But such situation is impossible if we strictly follow the conditions of the algorithm. The situation when a trajectory changing point belongs to the -neighborhood of another trajectory changing point will necessarily appear if the number of the points where trajectory is changing is infinite. But we showed that such situation is impossible and it means that a number of the points where it is necessary to change trajectory will be finite.

2.4.3. The theorem is proved.

So, it was shown that the number of the preliminary trajectory changes is finite, that the number of calls of the STEP 1 will be finite. Therefore one may see that the problem of a n-link manipulator control in an unknown environment under the considerations mentioned above is reduced to a solution of a finite number of problems of a trajectory planning in the presence of the known forbidden states.

Sometimes it is necessary to explore the environment more intensively. The following sequences will be useful for such cases.

Sequence 1.

In a point qd, d=0,1,…, Ndn of the trajectory L(qn, qT ), n=0,1,…, where Ndn – a finite number not bigger than the number of points in the L(qn, qT ), the manipulator may do a retreat from the L(qn, qT ). The retreat is a sequence S of allowed points continiously following one after another. The S is different from the L(qn,qT) and satisfies the (1). The retreats may be done for the environment investigation. The number of steps on every retreat should be finite. The manipulator may investigate the environment on any step of a retreat and get information about the r-neighborhoods of points yi, i=0,1,2…, Ns1 , where yi, i=0,1,2…, Ns1 – arbitrary points from X and Ns1 – a finite number arbitrary for every step. The number Ns1 of points yi and their disposition is defined by the structure of the sensor system and methods of its using. After making a finite number of steps on a retreat the manipulator should return to the L(qn, qT ) exactly by the points made on the retreat. If on some step of a retreat it is discovered that further movement is impossible because of forbidden states’ presence the manipulator should return to the L(qn, qT ) exactly by the points of the retreat. After return to the L(qn, qT ) the manipulator continues movement according to the Algorithm. As a result we get a finite number of steps on all retreats which is added to the finite number of steps according to the Algorithm and in sum we get that qT will be reached in a finite number of steps.

Sequence 2.

The manipulator also may, being in a point q of a preliminary trajectory or retreat, get information about Q(q) and, maybe, about Q(yi) i=0,1,2,…, Ns2, where yi, i=0,1,2,…, Ns2 – arbitrary points from X, and Ns2 – a finite number. After that operations n:=n+1 and qn=q should be done and the manipulator may generate a new trajectory L(qn, qT) satisfying the conditions I-III of STEP 1 of the Algorithm and begin to move along the new L(qn,qT) according to the Algorithm. Let us call such action “refuse from a preliminary trajectory” that is it is such action when despite the qT has not been reached a new trajectory leading to the qT is generated and the manipulator begins to follow the new trajectory. It is possible to make only a finite number of refuses. Then the finite number of steps on refuses will be added to the finite number of steps according to the Algorithm and in sum we get that the qT will be reached in a finite number of steps.

3. Using the polynomial approximation algorithm as a subroutine in the exact algorithm

3.1. Reducing the Algorithm to a finite number of calls of a subroutine for a trajectory planning in known environment

Every time when the manipulator generates a new trajectory according to the STEP 1 of the Algorithm, two cases may happen: either the manipulator will not meet an obstacle and therefore it will reach the qT in a finite number of steps (because the length of the trajectory is finite) or the manipulator will meet an unknown obstacle and will have to plan a new trajectory. Therefore, in the Algorithm the problem of a manipulator control in the presence of unknown obstacles is reduced to the solution of a finite number of tasks of trajectory planning in the presence of known forbidden states. In other words, the Algorithm will make a finite number of calls of a subroutine which will solve the problem stated in STEP 1. In the rest of the article we will call this subroutine the SUBROUTINE. We took the polynomial approximation algorithm as algorithm for the SUBROUTINE.

3.2. Polynomial approximation algorithm

Denote the components of vector-function q(t) as q1, q2, …, qn. Write down the restrictions using new variables:

qj(0) =q0jqj(1) =qTjj= 1 2 n   
qLjqj(t) qHjj= 1 2 n   

Specify the obstacles by hyperspheres with centers (qp m1, qp m2, …, qp mn) and radius r = Δq / 2 ∙ 1.1, where qp mi correspond to the components of vectors pm, m = 1, 2, …, M, q is step of configuration space discretization. The value of the radius r is chosen so that if two obstacles are located on neighbor nodes of the grid and their centers differ only in one component, the corresponding hyperspheres intersect. Otherwise the hyperspheres don’t intersect. Then the requirement of obstacles avoiding trajectory can be written as follow:


The left part of this inequality is squared distance between the trajectory point at moment t and the center of the m-th obstacle. We will search the trajectory in the form of polynomials of some order s:


Here cji are unknown coefficients. Substitute t = 0 and t = 1 in (5):

qj(0) =cj0+cj1 0 +cj2 02+  +cjs 0s=cj0
qj(1) =cj0+cj1 1 +cj2 12+  +cjs 1s=cj0 +i=1scji j = 1 2 n

Taking into account requirements (2):

i=1scji=qTjq0j= 1 2 n         

Divide duration [0; 1] into K+1 pieces by K intermediate points t1, t2, …, tK. Then the requirements (3) and (4) will be as follow:


Thus, it is necessary to find such coefficients cji (j = 1, 2, …, n, i = 1, 2, …, s) which satisfy the system of equations (6), (7) and inequalities (8). Obviously, the coefficients cj0 are easily found from the equations (6). Express the coefficients cjs from the equations (7):


Substitute cj0 and cjs in (8):


Thus, it is necessary to solve the system of (M + 2n) K nonlinear inequalities. This problem can be replaced by the problem of optimization of some function F(C):


where C is vector of coefficients (c1,1, c1,2, …, с1,s-1, c2,1, c2,2, …, с2,s-1,…, cn,1, cn,2, …, cn,s-1), E(C) is measure of restrictions violation, P(C) is estimated probability that trajectory not intersects with unknown obstacles. Let’s define function F(C). First, introduce function defining the trajectory point for the vector of coefficients C at the moment t:


The following functions correspond to the inequalities of the system (8), they show the violation of upper and lower bounds and the intersection with the obstacles of trajectory at the moment t:


Because of using of the operator I, the items in the above functions are negative only if corresponding restrictions are violated. The more violation of the restriction, the more the value of the function. If particular restriction is not violated, the corresponding function element is zero. In any case, values of functions can’t be positive. Join all restrictions into single function (taking into account all discrete moments except t = 0 and t = 1):


Thus, E(C) takes negative values if at least one restriction is violated and becomes zero otherwise, that is if the vector C satisfies all the inequalities of the system (9). The function P(C) was introduced to make possible comparison of trajectories which not violate the restrictions. Assume p(d) = e-2d is probability that there is an unknown obstacle in some point, where d is distance between this point and the nearest known obstacle. Then P(C)=m=1M*p(D(COm)) , where {O1, O2, …, OM*} is set of obstacles along which the trajectory lies, D(CO)=minkj=1n(Lj(Ctk)Oj)2r2 is distance between the trajectory C and the obstacle O. A trajectory lies along an obstacle O if such point of trajectory L(tk) exists as an obstacle O is nearest among all obstacles for this point. Usage of function P(C) would promote the algorithm to produce trajectories which lie far from unknown obstacles. Since function F(C) is multiextremal, the genetic algorithm is used to find the desired vector.

3.3. Optimization of the restriction function using genetic algorithm

Genetic algorithm is based on collective training process inside the population of individuals, each representing search space point. In our case search space is space of vectors C. Encoding of vector in the individual is made as follows. Each vector component is assigned the interval of values possessed by this component. The interval is divided into a quantity of discrete points. Thus, each vector component value is associated with corresponding point index. The sequence of these indexes made up the individual. The algorithm scheme:

  1. Generate an initial population randomly. The size of population is N.

  2. Calculate fitness values of the individuals.

  3. Select individuals to the intermediate population.

  4. With probability PC perform crossover of two individuals randomly chosen from the intermediate population and put it into new population; and with probability 1 – PC perform reproduction – copy the individual randomly chosen from intermediate population to new population.

  5. If size of new population is less than N, go to Step 4.

  6. With given mutation probability PM invert each bit of each individual from new population.

  7. If required number of generations is not reached go to Step 2.

The fitness function matches F(C). On the third step the tournament selection is used: during the selection the N tournaments are carried out among m randomly chosen individuals (m is called tournament size). In every tournament the best individual is chosen to be put into the new population. On the fourth step the arithmetical crossover is used. The components of offspring are calculated as arithmetic mean of corresponding components of two parents.

3.4. Quantization of the path

After the polynomials coefficients specifying the route are found, it’s necessary to get the sequence of route discrete points q0, q1, …, qT. The first point (q0) is obtained from the initial values. The rest of points can be found using the following algorithm:

  1. t = 0; i = 0.

  2. tH = 1.

  3. t*=t+tH2
  4. Find the point q* with coordinates (q*1, q*2, …, q*n) in whose neighborhood the trajectory is lying at the moment t*: qj*Δq2qj(t*)qj*+Δq2j=1n¯

  5. If q* equals to qi, then t = t*, go to Step 3.

  6. If q* is not a neighbor of qi, then tH = t*, go to Step 3.

  7. If q* is not forbidden, then go to Step 9.

  8. If qjiΔqqj(t*)qji+Δqj=1n¯ where qij are the coordinates of qi, then t = t*, otherwise tH = t*, go to Step 3.
  9. i = i + 1; qi = q*.

  10. If qi = qT, then the algorithm is finished, otherwise go to Step 2.

4. Experimental results

Consider the following experimental set Figure 5. It is necessary to move a seven-link manipulator Figure 4 from the start configuration q0 = (1.57; 1.57; 0; 4.71; 0; 4.71; 0) to the target configuration qT = (4.71; 1.57; 0; 0; 0; 0; 0). There are the following limitations on the generalized coordinates: 0 ≤ qi(t) ≤ 6.28, i = 1,2,…,7. The lengths of links are 10. There are four cuboid obstacles in the working area. Each obstacle is described by six values: the length, width, height and the coordinates of the origins attached to the obstacles in the basic coordinate system Table 1.

The parameters of algorithms are as follow:

  1. Polynomial order s: 10.

  2. Number of time pieces K: 100.

  3. Polynomials coefficients precision: 10-5.

  4. Population size N: 20.

  5. Number of generations: 20.

  6. Probability of crossover PC: 0,5.

  7. Probability of mutation PM: 0,1.

  8. Tournament size m: 5.

The working time of the Algorithm depending on different number_of_discretes is given in the Table 2. The q is calculated as the difference between upper and lower bounds of q(t) (that is 6.28) divided on the number_of_discretes. The working time is a sum of three elements: trajectory search time, time to check whether trajectory intersects with unknown obstacles, manipulator moving time (12 per second).


Figure 4.

The manipulator kinematic scheme.


Figure 5.

Experimental set.


Table 1.

The characteristics of obstacles.

Obstaclesnumber_of_ discretesWorking time, seconds
1, 24058
1, 2, 34083
1, 2, 3, 440233

Table 2.

Experimental results.

The tests were made on the processor AMD Athlon XP 1800+ (1533 MHz). During experiments the value Nn in the Algorithm was equal to 0 for every n. The key steps of manipulator trajectory for the last test case (with four obstacles) are shown on the Figure 6.

One may see that the software based on our Algorithm moved the 7-link manipulator to the target configuration in 58-1169 seconds. In case of using breadth-first or A* algorithms La Valle, 1999-2004 we have to discretize the configuration space and therefore we get mn points of the configuration space, where m is a number of points for certain level of discretization, n is the configuration space dimensionality. The working time of such algorithms may approximate to billions of seconds.

It is possible to outline the following criteria which should be satisfied by an algorithm for SUBROUTINE: a)it should be applicable to the n-dimensional case; b) it should guarantee finding a path in the presence of known forbidden states; c) in case of new call of STEP 1 minimum work for finding path in the presence of known forbidden states should be done.

Using of cell decomposition and bitangent graphs algorithms La Valle, 1999-2004 as algorithms for SUBROUTINE of our Algorithm looks promising.

5. Conclusion

An algorithm for a n-link manipulator movement amidst arbitrary unknown static obstacles was presented. Given a theorem stating that if the manipulator moves according to the algorithm it will reach a target configuration qT in a finite number of steps under condition that the qT is reachable. Given proof of the theorem. It was shown that the problem of the manipulator control in the unknown environment may be reduced to a solution of a finite number of problems for the manipulator control in known environment. Given the sequences from the theorem which may facilitate reaching the qT. We also introduced the results of computer simulation of a 7- link manipulator movement in the unknown environment based on our Algorithm and compared results with some other algorithms.


Figure 6.

The key steps of manipulator movement trajectory.


1 - C. Ahrikhencheikh, A. Seireg, 1994Optimized-MotionPlanning.TheoryAnd.ImplementationJohn.WileySons Inc,
2 - N.M. Amosov, , A.M. Kasatkina, , L.M. Kasatkina, 1975, “Aktivnye semanticheskiye seti v robotakh s avtonomnym upravleniyem (Active semantic nets in robots with autonomous control)”, Trudy IV Mezhdunarodnoy obyedinennoy konferencii po iskustvennomu intellectu. M.: AN SSSR, 9 11 20 (in Russian).
3 - J. Canny, 1988, “The Complexity of Robot Motion Planning”, The MIT Press, Cambridge, Massachusetts,.
4 - C. Chen, H. X. Li, D. Dong, 2008Hybrid“.Controlfor.RobotNavigation. A hierarchical Q-learning algorithm”, IEEE Robotics & Automation Magazine, 15 №2, June, 37 47 .
5 - H. Choset, et al. 2005Principles“.ofRobot.Motion Theory, Algorithms and Implementations”, A Bradford Book. The MIT Press.
6 - G.E. Collins, 1975, “Quantifier Elimination for Real Closed Fields by Cylindrical Algebraic Decomposition”, Lecture Notes in Computer Science, 33 33 135 183 , Springer-Verlag, New York,.
7 - B. R. Donald, , 1985 “On Motion Planning with Six Degrees of Freedom: Solving the Intrsection Problems in Configuration Space”, Proceedings of the IEEE International Conference on Robotics and Automation ().
8 - S. K. Ghosh, J. W. Burdick, A. Bhattacharya, S. Sarkar, Online“.Algorithmswith.Visibility. Discrete, 2008 Exploring Unknown Polygonal Environments”, IEEE Robotics & Automotion Magazine. 15 15 №2, June. 67 76 .
9 - V. A. Ilyin, 1995Intellektualnye“.RobotyTeoriya. I.Algoritmy.IntelligentRobots.TheoryAlgorithms)”Krasnoyarsk. S. A. A.Press (in Russian).
10 - A. M. Kasatkin, 1979predstavlenii“. O.znaniyv.sistemahiskustvennogo.intellectarobotov. .Onknowledge.representationin.artificialintelligence.systemsof.robots)”Kibernetika. №2, 57 65 (in Russian).
11 - E. M. Kussul, V. D. Fomenko, 1975Maket“.avtonomnogotransportnogo.robotaT. A. I. R. . A.Modelof.anautonomous.transportrobot. T. A. I.R)”Voprosy.teoriiavtomatov.robotovI. C. V. M. Kiyev, 60 68 (in Russian).
12 - S.M. LaValle, 1999-2004, “Planning Algorithms”,. Available: http:// planning
13 - P. K. Lopatin, 2001Algorithm“.ofa.manipulatormovement.amidstunknown”.Proceedingsof. 10 10th International Conference on Advanced Robotics (ICAR 2001), August 22-25, , Hotel Mercure Buda, Budapest, Hungary- 327 331 .
14 - P. K. Lopatin, 2006Algorithm“.upravlenia.dinamicheskimisistemami. v.neizvestnoystaticheskoy.srede.Algorithmfor.DynamicSystems’.Controlin.anUnknown.StaticEnvironment)”. Herald of The Siberian state aerospace university named after academician M.F.Reshetnev / ed. prof. G.P.Belyakov; SibSAU. 411 Krasnoyarsk. 28 32 ,. (in Russian).
15 - P. K. Lopatin, A. S. Yegorov, , “Using the Polynomial Approximation Algorithm in the Algorithm2 for Manipulator’s Control in an Unknown Environment”, International Journal of Applied Mathematics and Computer Sciences, Volume 4, Number 4, pp.190-195.
16 - V. Lumelsky, , 2006 "Sensing, Intelligence, Motion: How Robots and Humans Move in an Unstructured World”, John Wiley & Sons,.
17 - E. Masehian, M. R. Amin-Nasari, 2008Sensor-Based“.RobotMotion.Planning Amin-Nasari, “Sensor-Based Robot Motion Planning. A Tabu Search Approach”, IEEE Robotics & Automation Magazine. 15 152 №2, June, 48 57 .
18 - D. Rawlinson, R. Jarvis, 2008Ways“.toTell.RobotsWhere.toGo. Directing autonomous robots using topological instructions”, IEEE Robotics & Automation Magazine. 15 №2, June, 27 36 .
19 - M. Shahinpoor, 1987Robot“. A.EngineeringTextbook”.HarperRowPublishers.New York,
20 - A.V. Timofeev, , 1978 “Roboty i Iskusstvennyi Intellekt (Robots and Artificial Intelligence)”, M.: Nauka, (in Russian).
21 - Ye I. Yefimov, 1988 “.Problemaperebora. v.iskusstvennomintellekte. .Thesearch.problemin.artificialintelligence)”.IzvA. AN SSSR. Tehnicheskaya Kibernetika. №2, 127 128 .
22 - F. Yegenoglu, A. M. Erkmen, H. E. Stephanou, 1988On-line.PathPlanning.UnderUncertainty.Proc 27 IEEE Conf. Decis. And Contr., Austin, Austin, Tex., Dec.7-9, 1988. 2 1075 1079 , New York (N.Y.),.