scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Pushing using compliance

15 May 2006-pp 2010-2016
TL;DR: This paper presents an approach based on the rapidly-exploring random tree (RRT) algorithm that, besides paths through the open space, exploits the power of compliance.
Abstract: This paper addresses the problem of maneuvering an object by pushing it through an environment with obstacles. Instead of only pushing the object through open spaces, we also allow it to use compliance, e.g. allowing it to slide along obstacle boundaries. The advantage of using compliance is twofold: compliance does not only extend the number of situations in which a push plan can be found, it also allows for simpler (i.e. less complicated) paths in many cases. Here, we present an approach based on the rapidly-exploring random tree (RRT) algorithm that, besides paths through the open space, exploits the power of compliance

Summary (4 min read)

1 Introduction

  • Over the years various techniques have been developed that address the problem of navigating through or interacting with a real or virtual world.
  • Objects can be manipulated in numerous ways, and each type of manipulation implies different constraints on the combined motion of manipulator and object.
  • Compliance has often been used to compensate for uncertainty, for example to solve the peg-in-hole problem.
  • Next, the pre-image is iteratively treated as a new goal until the initial robot configuration is within a pre-image.
  • While being pushed by the pusher, the object is allowed to slide along the boundary of the environment (compliant motion).

2 Preliminaries

  • In this paper it is assumed that P always keeps contact with O (see the conclusions for some remarks on this).
  • It is assumed that the friction between O and the supporting plane is large enough such that there is no motion of O after pushing ceases (quasi-static assumption).
  • At compliant position q ∈ Rroγi , the push range describes the continuous range of push positions that cause O to follow the same path (regardless of the push position being collision free).
  • Given a compliant configuration, the authors define the bounding obstacles (Fig. 6).
  • A hockey stick curve minimizes the distance needed to push O away from an obstacle.

3 Rapidly-exploring Random Trees

  • Many motion planning algorithms are based on the generation of collision-free samples.
  • Between these, connections are tried and a graph is formed that can be used to solve motion planning queries.
  • Retracting non-compliant samples to the obstacles [2] seems a straightforward solution.
  • After a random sample has been created, most algorithms try to connect it to already existing samples in the graph.
  • The authors will first briefly explain how the basic RRT algorithm works and then elaborate on how to adapt the RRT such that it is suited to solve their problem.

3.1 The basic RRT algorithm

  • The RRT is a single shot approach in which a tree is constructed that gradually improves resolution.
  • Here, the authors will use the bidirectional version of the RRT that grows two exploration trees:.
  • As the trees grow larger, the two trees are more likely to connect.
  • The advantage of the bidirectional version over the single directional version is that it is better at escaping local minima.
  • If c′c = cc, the two trees are connected and a solution is found.

3.2 Tailoring the RRT

  • The basic RRT algorithm is not suited for pushing problems since it does not incorporate the role of P .
  • If obstacles belong to the same compliant component, a path through compliant space may exist between them.
  • Because of the physics of pushing, pushing motions are irreversible.
  • As a result, the connections between vertices of the RRT are directed and the paths the local planner creates are only suited for motions in one direction.
  • If a compliant configuration is involved, the shortest distance between two configurations may however consist of a hockey stick curve.

4 Local Planner

  • It connects two configurations to each other, usually by trying a straight line path between them.
  • Also the authors need two versions of the local planner: a “forward” one (Algorithm 2) and a “reversed” one (Algorithm 3); both will be discussed.

4.1 Forward local planner

  • The authors will consider the various types of local paths necessary to create the local planner.
  • Suppose the nearest neighbor configuration cn resulting from line 5 of Algorithm 1 is non-compliant (Fig. 11a).
  • It is likely that this will fail because γi will probably impede the contact transit.
  • If this succeeds, the authors are certain that P now fits between O and γi.
  • Before the end of the hockey stick is reached, P may encounter another obstacle.

4.2 Reverse local planner

  • A straightforward solution would seem to use the same local planner and just reverse the endpoints (starting at qc and moving to c ′ n).
  • Because of the above considerations, the authors need a true reverse version of the local planner.
  • Therefore it makes no difference whether c′n is non-compliant (Fig. 11d) or compliant (Fig. 11e).
  • In that case, the algorithm ends successfully.
  • The third situation that can occur is that P collides with obstacle γi (Fig. 11g).

4.3 Geometric primitives

  • The task of the local planner is to verify if the random position qr can be reached from the nearest configuration cn = (qn, αn) in the tree or else report the first obstacle with which there will be a collision.
  • To solve this, the authors will transfer this problem to basic geometric problems.
  • Ray shooting considers the problem of determining the first intersection between a ray (a directed line segment) and a collection of obstacles.
  • Note that both the clockwise and counterclockwise contact transits for P need to be checked.
  • Because it is not essential to find the nearest neighbor configuration exactly and because their edges do not solely consist of straight lines (but also hockey stick curves), the authors can use an approximate solution.

5 Compliant exploration

  • If the local planner is not able to reach the random configuration qr but instead hits an obstacle γi at configuration cc, this collision point is used as a starting point for compliant exploration.
  • Compliant exploration is a procedure to capture the topological structure of the set of compliant configurations that can be reached starting at cc, i.e. the part of compliant space that can be reached.
  • The results of this exploration are compliant configurations that are added to Ts and Tg. Starting at cc, the authors initiate the compliant exploration in two directions: clockwise and counterclockwise; for one of these a preceding contact transit is necessary.
  • To capture the topology of compliant space and to distinguish between explored and not yet explored parts of compliant space, intervals are used (see Definition 2.4).
  • Therefore, v does not represent a single position, but rather the continuous subset [qcc , qe(Iγi)] of Iγi .

5.1 Forward compliant exploration

  • If the RRT algorithm generates a compliant configuration cc = (qcc, αcc) on obstacle γi, the corresponding interval Iγi is identified by determining the bounding obstacles.
  • The first case occurs if Iγi has not been encountered before.
  • If a new vertex v has been added to Ts, the authors check whether, at position qe(Iγi) the next interval can be reached (possibly after a contact transit).
  • Since P and O always maintain contact, there is at most one such interval and it will be associated to the same compliant component.

5.2 Reverse compliant exploration

  • Then c ′ c is the starting point for reverse compliant exploration.
  • Since the edges in Tg are directed to the goal position, the paths that result from compliant exploration need to be directed to c′c.
  • Stated differently, the authors want to know from which part of compliant space c′c is reachable.
  • Since reverse exploration is used, the reverse exploration direction is counter clockwise for the paths that are directed clockwise (and vice versa).
  • In contrast to forward exploration, using reverse exploration, two intervals may be reachable from Iγi .

5.3 Geometric Aspects

  • Compliant exploration is a purely geometric process.
  • The first can be found by calculating intersections between CS2ro+rp and CSrp. (b) An obstacle can also leave the push range.
  • Using the events in the order in which they are encountered, it is easy to determine the chain of intervals that are reachable from the compliant start position in both the forward and reverse exploration direction.
  • If O can be pushed completely around a single obstacle without any event occurring, an interval also ends.

6 Probabilistic completeness

  • The basic RRT algorithm (that only grows a tree from the start configuration) is known to be probabilistically complete [14].
  • The advantage of the bidirectional version of the RRT is that it helps escaping narrow passages.
  • Because of the random nature of the RRT every pushable path through non compliant space will eventually be found.
  • The above also means that every possible compliant configuration reachable from non compliant space will eventually be found, because a compliant section in a path is always preceded by a non-compliant section.
  • Also since eventually every vertex will be generated, every hockey stick curve will be considered, and thus all possibilities to leave a compliant section will be tried.

7 Experiments

  • The authors implemented their algorithm in Visual C++.
  • Using the events, the list of intervals for every obstacle was created.
  • With compliance, it is easy to reach the goal once a compliant configuration has been found.
  • Preprocessing takes about 0.007s after which queries can be executed in 0.004s on average.
  • After preprocessing which takes about 0.01s, their algorithm is able to find a path in 0.0005s on average as opposed to 0.01s for the RRT algorithm.

8 Conclusions

  • In this paper the authors have introduced a novel manipulation planning algorithm in which pushing is combined with compliant motions.
  • The resulting manipulation plans use compliance to extend the range of problems for which a solution can be created.
  • The authors used the RRT algorithm to provide a natural balance between the number of compliant and non-compliant path segments.
  • If the environment is preprocessed then, given a compliant configuration, it is easy to check to which interval that configuration belongs and thus what part of the compliant space is reachable from it using geometric operations.
  • Extending their algorithm by allowing these non-contact transits can be done by using existing motion planning techniques in which the pusher moves and the object is considered an obstacle.

Did you find this useful? Give us your feedback

Figures (20)

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: Two algorithms are presented to compute a push plan for the case that the object and robot are disks and the obstacles are non-intersecting line segments, where the robot must maintain contact with the object at all times, and produces a shortest path.
Abstract: Suppose we want to move a passive object along a given path, among obstacles in the plane, by pushing it with an active robot. We present two algorithms to compute a push plan for the case that the object and robot are disks and the obstacles are non-intersecting line segments. (When only the object's destination and not its full path is given these algorithms can still be used as subroutines in a larger algorithm to compute such a path.) The first algorithm assumes that the robot must maintain contact with the object at all times, and produces a shortest path. There are also situations, however, where the robot has no choice but to let go of the object occasionally. Our second algorithm handles such cases, but no longer guarantees that the produced path is the shortest possible.

14 citations


Cites methods from "Pushing using compliance"

  • ...[9, 11, 12] developed a probabilistically complete algorithm for this based on the Rapidly-exploring Random Trees path-planning algorithm [6]....

    [...]

Proceedings ArticleDOI
03 May 2010
TL;DR: Two algorithms are presented to compute a push plan for the case that the object and robot are disks and the obstacles are non-intersecting line segments, where the robot must maintain contact with the object at all times, and produces a shortest path.
Abstract: Suppose we want to move a passive object along a given path, among obstacles in the plane, by pushing it with an active robot. We present two algorithms to compute a push plan for the case that the object and robot are disks and the obstacles are non-intersecting line segments. The first algorithm assumes that the robot must maintain contact with the object at all times, and produces a shortest path. There are also situations, however, where the robot has no choice but to let go of the object occasionally. Our second algorithm handles such cases, but no longer guarantees that the produced path is the shortest possible.

9 citations


Cites methods from "Pushing using compliance"

  • ...[9, 11, 12] developed a probabilistically complete algorithm for this based on the Rapidly-exploring Random Trees path-planning algorithm [6]....

    [...]

Dissertation
01 Sep 2004
TL;DR: An algorithm is provided that is able to deal with unanticipated changes that occur in the environment while keeping the planning process efficient and is robust against sensor errors and therefore more suited to be used in practical problems.
Abstract: This thesis addresses path planning in changeable environments. In contrast to traditional path planning that deals with static environments, in changeable environments objects are allowed to change their configurations over time. In many cases, path planning algorithms must facilitate quick answers to queries in order to be useful. For example, an opponent in a training simulation needs to respond to the actions of the user without any significant delay. To achieve such performance, path planning methods usually use a preprocessing phase in which the environment is explored. As much computation time as possible is moved to this preprocessing phase such that at query time only little time is needed to solve an actual path planning query. This approach has led to many successful methods that are applicable to a broad range of problems. Because of the nature of preprocessing, existing methods have difficulty to cope with unanticipated changes that occur in the environment in a later stage. Often existing solutions are computationally expensive and may fail if no local solution exists. This thesis presents novel results for path planning in changeable environments. It is divided in three parts. The first part deals with the class of problems in which obstacles can change their configuration between the time the roadmap was created and the query. Examples of such obstacles are doors, chairs and boxes. We provide an algorithm that is able to deal with such changes in the environment while keeping the planning process efficient. The second part deals with environments in which robots have the ability to manipulate obstacles that block their path. Imagine, for example a simulation in which a firefighter commander is trained. The commander gives his (virtual) firefighters higher level commands (e.g. "walk around the building and enter it at the back"). For a realistic training, the firefighters should be able to move away obstacles that block their paths in order to, for example, clear the door. The algorithms in this part describe a novel way to deal with this type of problems by imitating human behavior. Finally, the third part deals with the problem of a robot pushing a disk in a polygonal environment. Pushing an object by a robot is often easier or more applicable than pulling since it does not involve grasping the object. A robot arm can push an object using a single finger while pulling involves more complicated behavior. Unfortunately in addition to the usual sensor errors, pushing is also sensitive to another type of uncertainty; if the object's center of mass is not exactly known then pushing an object leads to erratic behavior leading to unstable pushes. We provide solutions that are robust against sensor errors and therefore are more suited to be used in practical problems.

6 citations

Posted Content
TL;DR: This work proposes a method for planning motion for robots with actuation uncertainty that incorporates contact with the environment and the compliance of the robot to reliably perform manipulation tasks and shows that its policy adaptation is resilient to significant changes during execution.
Abstract: We propose a method for planning motion for robots with actuation uncertainty that incorporates contact with the environment and the compliance of the robot to reliably perform manipulation tasks. Our approach consists of two stages: (1) Generating partial policies using a sampling-based motion planner that uses particle-based models of uncertainty and simulation of contact and compliance; and (2) Resilient execution that updates the planned policies to account for unexpected behavior in execution which may arise from model or environment inaccuracy. We have tested our planner and policy execution in simulated SE(2) and SE(3) environments and Baxter robot. We show that our methods efficiently generate policies to perform manipulation tasks involving significant contact and compare against several simpler methods. Additionally, we show that our policy adaptation is resilient to significant changes during execution; e.g. adding a new obstacle to the environment.

3 citations


Cites background from "Pushing using compliance"

  • ...Samplingbased motion planning for compliant robots has been previously explored in [19], albeit limited to disc robots with simplified contact behavior....

    [...]

07 Jun 2017
TL;DR: This work focuses on two important areas of poorly controlled robotic manipulation: motion planning for deformable objects and in deformable environments; and manipulation with uncertainty, which incorporates contact with the environment and compliance of the robot to generate motion policies which are then adapted during execution to reflect actual robot behavior.
Abstract: A number of outstanding problems in robotic motion and manipulation involve tasks where degrees of freedom (DoF), be they part of the robot, an object being manipulated, or the surrounding environment, cannot be accurately controlled by the actuators of the robot alone. Rather, they are also controlled by physical properties or interactions – contact, robot dynamics, actuator behavior – that are influenced by the actuators of the robot. In particular, we focus on two important areas of poorly controlled robotic manipulation: motion planning for deformable objects and in deformable environments; and manipulation with uncertainty. Many everyday tasks we wish robots to perform, such as cooking and cleaning, require the robot to manipulate deformable objects. The limitations of real robotic actuators and sensors result in uncertainty that we must address to reliably perform fine manipulation. Notably, both areas share a common principle: contact, which is usually prohibited in motion planners, is not only sometimes unavoidable, but often necessary to accurately complete the task at hand. We make four contributions that enable robot manipulation in these poorly controlled tasks: First, an efficient discretized representation of elastic deformable objects and cost function that assess a “cost of deformation” for a specific configuration of a deformable object that enables deformable object manipulation tasks to be performed without physical simulation. Second, a method using active learning and inverse-optimal control to build these discretized representations from expert demonstrations. Third, a motion planner and policy-based execution approach to manipulation with uncertainty which incorporates contact with the environment and compliance of the robot to generate motion policies which are then adapted during execution to reflect actual robot behavior. Fourth, work towards the development of an efficient path quality metric for paths executed with actuation uncertainty that can be used inside a motion planner or trajectory optimizer.

1 citations


Cites background from "Pushing using compliance"

  • ...Sampling-based motion planning for compliant robots has been previously explored in [77], albeit limited to disc robots with simplified contact behavior....

    [...]

References
More filters
Book
01 Jan 1978
TL;DR: This report contains a description of the typical topics covered in a two-semester sequence in Numerical Analysis, and describes the accuracy, efficiency and robustness of these algorithms.
Abstract: Introduction. Mathematical approximations have been used since ancient times to estimate solutions, but with the rise of digital computing the field of numerical analysis has become a discipline in its own right. Numerical analysts develop and study algorithms that provide approximate solutions to various types of numerical problems, and they analyze the accuracy, efficiency and robustness of these algorithms. As technology becomes ever more essential for the study of mathematics, learning algorithms that provide approximate solutions to mathematical problems and understanding the accuracy of such approximations becomes increasingly important. This report contains a description of the typical topics covered in a two-semester sequence in Numerical Analysis.

7,315 citations

Journal ArticleDOI
TL;DR: The multidimensional binary search tree (or k-d tree) as a data structure for storage of information to be retrieved by associative searches is developed and it is shown to be quite efficient in its storage requirements.
Abstract: This paper develops the multidimensional binary search tree (or k-d tree, where k is the dimensionality of the search space) as a data structure for storage of information to be retrieved by associative searches. The k-d tree is defined and examples are given. It is shown to be quite efficient in its storage requirements. A significant advantage of this structure is that a single data structure can handle many types of queries very efficiently. Various utility algorithms are developed; their proven average running times in an n record file are: insertion, O(log n); deletion of the root, O(n(k-1)/k); deletion of a random node, O(log n); and optimization (guarantees logarithmic performance of searches), O(n log n). Search algorithms are given for partial match queries with t keys specified [proven maximum running time of O(n(k-t)/k)] and for nearest neighbor queries [empirically observed average running time of O(log n).] These performances far surpass the best currently known algorithms for these tasks. An algorithm is presented to handle any general intersection query. The main focus of this paper is theoretical. It is felt, however, that k-d trees could be quite useful in many applications, and examples of potential uses are given.

7,159 citations

MonographDOI
01 Jan 2006
TL;DR: This coherent and comprehensive book unifies material from several sources, including robotics, control theory, artificial intelligence, and algorithms, into planning under differential constraints that arise when automating the motions of virtually any mechanical system.
Abstract: Planning algorithms are impacting technical disciplines and industries around the world, including robotics, computer-aided design, manufacturing, computer graphics, aerospace applications, drug design, and protein folding. This coherent and comprehensive book unifies material from several sources, including robotics, control theory, artificial intelligence, and algorithms. The treatment is centered on robot motion planning but integrates material on planning in discrete spaces. A major part of the book is devoted to planning under uncertainty, including decision theory, Markov decision processes, and information spaces, which are the “configuration spaces” of all sensor-based planning problems. The last part of the book delves into planning under differential constraints that arise when automating the motions of virtually any mechanical system. Developed from courses taught by the author, the book is intended for students, engineers, and researchers in robotics, artificial intelligence, and control theory as well as computer graphics, algorithms, and computational biology.

6,340 citations

Book
01 Jan 2006

4,417 citations

Proceedings ArticleDOI
24 Apr 2000
TL;DR: A simple and efficient randomized algorithm is presented for solving single-query path planning problems in high-dimensional configuration spaces by incrementally building two rapidly-exploring random trees rooted at the start and the goal configurations.
Abstract: A simple and efficient randomized algorithm is presented for solving single-query path planning problems in high-dimensional configuration spaces. The method works by incrementally building two rapidly-exploring random trees (RRTs) rooted at the start and the goal configurations. The trees each explore space around them and also advance towards each other through, the use of a simple greedy heuristic. Although originally designed to plan motions for a human arm (modeled as a 7-DOF kinematic chain) for the automatic graphic animation of collision-free grasping and manipulation tasks, the algorithm has been successfully applied to a variety of path planning problems. Computed examples include generating collision-free motions for rigid objects in 2D and 3D, and collision-free manipulation motions for a 6-DOF PUMA arm in a 3D workspace. Some basic theoretical analysis is also presented.

3,102 citations


"Pushing using compliance" refers background in this paper

  • ...The results of this compliant exploration are added as configurations to the tree....

    [...]