1. Introduction
In recent years, extensive research activity has been devoted to the telepresence and teleoperation of robotic manipulators and autonomous vehicles (drone, autonomous road vehicle, autonomous underwater vehicle) due to its vast applications in the Industry 4.0, telesurgery, military, space and underwater exploration, smart agriculture,etc. [Reference Hokayem and Spong1]–[Reference Yoshida and Namerikawa4]. In telerobotic scenarios, a human operator or an intelligent control unit controls the movement of a robot from some distance away using very often wireless links. From the control theoretical point of view, the main goals of telerobotic are twofolds: Reference tracking (teleoperation) and telepresence. Reference tracking means the tracking of a desired path designed by remote human operator/intelligent control unit; and telepresence means providing the states of remotely controlled robot for human operator/intelligent control unit in real time so that remote human operator/intelligent control unit is able to design a proper desired path/control command for the satisfactory remote reference tracking. In telerobotic applications, these two tasks are complicated since the communication medium contributes to the complexity of the problem by introducing delay, rate distortion, noise, fading, random packet dropout, etc. The focus on most of the telerobotic papers has been on the communication delay, for example, [Reference Nuno, Sarras and Basanez2]–[Reference Berestesky, Chopra and Spong11]. However, most of telerobotic systems particularly those that are used in the industrial environments are subject to other types of communication imperfections, such as limited transmitter power constraint/bit rate constraint, noise, fading, random packet dropout, and rate distortion. For example, in the problem of the teleoperation of a battery powered drone, which is becoming very popular due to its vast applications in transportation to remote locations, forestry, mining, agriculture, surveillance, search, and rescue missions, etc., the telerobotic system is subject to the limited power supply; and therefore, the transmission of information from drone to remote human operator is subject to the minimum transmission power constraint; and hence, it is subject to noise and limited bit rate constraint. This results in random packet dropout and rate distortion imperfections meaning that some of the packets sent by drone to remote human operator are erased at the receiver side; because they contain unrecoverable filliped bits. Also, as each real-valued measurement is represented by a small length packet (due to limited bit rate constraint), if the packet is recovered at the receiver, the real-valued measurement will be recovered with some quantization error at the receiver. Nevertheless, the remote control station, where human operator is located, can be supplied with high transmission power in this teleoperated system; and hence, the transmission of information from remote human operator/intelligent control unit to drone can be assumed almost without communication imperfections. This can be represented by the block diagram in Fig. 1.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig1.png?pub-status=live)
Figure 1. A basic block diagram for remote monitoring and control over the Internet.
Note that the compensation of the impacts of arbitrary transmission delay in the presence of random packet loss is on going research direction in the field of bilateral teleoperation systems. Some of the available papers addressing this problem in the context of teleoperated systems are [Reference Dolgov, Fischer and Hanebeck12]–[Reference Sun, Sun and Yang14]. Reference [Reference Dolgov, Fischer and Hanebeck12] is concerned with linear dynamic systems over a communication network subject to arbitrary time delay. It considers the packet loss as the infinite time delay. References [Reference Shah and Mehta13] and [Reference Sun, Sun and Yang14] are also concerned with linear dynamic systems over a communication network subject to arbitrary time delay and the packet loss. The packet loss in these papers is modeled by the real erasure channel. That is, the delayed sensor measurement is either successfully received (without quantization error) or erased. However, the transmission of measurements over a communication link is subject to unavoidable rate distortion due to the quantization of real-valued measurements to short length packets to be sent over a digital communication link. Hence, more suitable communication model for the transmission over a communication network is the packet erasure channel considered in this paper, which is described in Section 2. One of the early work on the teleoperation over the packet erasure channel is ref. [Reference Tatikonda and Mitter15]. This paper is concerned with linear dynamic systems. Reference [Reference Tatikonda and Mitter15] has motivates other works, such as refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17], which are concerned with nonlinear dynamic systems over the packet erasure channel.
We have shown in our paper [Reference Parsa and Farhadi16] that the aforementioned imperfections (the random packet dropout and the rate distortion) result in significant performance degradation. In ref. [Reference Parsa and Farhadi16], we presented a technique for remote monitoring and control of a quit general class of nonlinear dynamic systems in the presence of the random packet dropout and rate distortion without considering the impacts of actuators constraint. In the aforementioned paper, we used the linearization method to linearize the nonlinear dynamic system around the working points, and then for the linearized systems, we used one of the available techniques for linear networked control system. Other technique for remote monitoring and control of nonlinear dynamic systems subject to the random packet dropout can be found in ref. [Reference Parsa and Farhadi17]. In ref. [Reference Parsa and Farhadi17], we proposed a new technique, which directly involved nonlinear dynamics for the development of nonlinear teleoperated systems.
The new industrial movement known as the Industry 4.0 or smart manufacturing [Reference Ustundag and Cevikcan18] is another major motivation for considering other types of communication imperfections and especially the random packet dropout and the rate distortion imperfection in telerobotic problems. The new industrial movement has started around 10 years ago and is still a concept; but it soon becomes a reality. It aims to integrate production facilities, supply chains, and service systems via the established information technology infrastructures, such as the Internet for the rapid decision-making resulting in increasing productivity. In the Industry 4.0-based manufacturing systems, each production facility, such as a robotic manipulator is equipped with at least one Industrial Internet of Things (IIoT) wireless communication module; and therefore, it can broadcast its sensor data to every corner of manufacturing factory and even outside manufacturing factory; while receiving high-level commands from distributed decision makers. Due to the high level of noise in the industrial environments and because such environments are very often crowded environments, this real-time remote monitoring and control is subject to severe random packet dropout and also limited bit rate constraint and hence rate distortion imperfection. Figure 2 illustrates a typical IIoT system for manufacturing industry.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig2.png?pub-status=live)
Figure 2. A typical IIoT system for the Industry 4.0. This figure was borrowed from ref. [Reference Jain19].
In this article, we focus on the problem of telepresence and teleoperation of the 2-degrees of freedom (DoF) robotic manipulators as shown by the block diagram of Fig. 1 over the packet erasure channel, which is an abstract model for the transmission via the Internet, WiFi, and Zigbee modules. In this basic block diagram, the communication from sensor to remote controller is subject to the random packet dropout and rate distortion imperfection. However, there is no communication imperfection in the reverse direction. This is the case, for example, where the decision maker is co-located with robotic manipulator; while sensor (e.g., a camera watching the movement of the end-effector of the manipulator) is geographically separated from the manipulator (dynamic system) and transmits the collected sensor data to remote controller via a WiFi wireless link for example. In this basic block diagram, there is a feedback acknowledgment from the receiver to transmitter. This feature is supported by the WiFi TCP/IP protocol and also many IIoT modules, such as Digi Xbee Pro. Note that in the aforementioned set up, long delayed packet is considered as the lost packet.
In this article, we apply the coding and control techniques developed in refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] for remote monitoring and control of robotic manipulators over the Internet, which is modeled by the packet erasure channel. The coding and control techniques of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] were developed for the telepresence and teleoperation of autonomous vehicles. However, in this article, we illustrate their applications for the telepresence and teleoperation of robotic manipulators by designing proper linear and nonlinear controllers over the packet erasure channel. In the block diagram of Fig. 1, the encoder by the knowledge of the decoder law and the controller law and the feedback acknowledgment can determine the control command,
$U_t$
, applied on the manipulator. Under the aforementioned setup, we implement our techniques presented in refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] to design proper encoder, decoder, and controller for the block diagram of Fig. 1 (described by a robotic manipulator) that result in a satisfactory telepresence and teleoperation in the presence of severe random packet dropout and rate distortion imperfection. Using extensive computer simulations, we illustrate the satisfactory performances of these techniques; and we compare their performances with each other for the remote monitoring and control of robotic manipulators. It is shown that both techniques result in a satisfactory performance provided the bound constraints for the applied torques on manipulator joints are satisfied.
As mentioned above, the focus on most of the telerobotic papers has been on the communication delay, for example, [Reference Nuno, Sarras and Basanez2]–[Reference Berestesky, Chopra and Spong11]; or the communication delay in the presence of the real erasure channel, for example, [Reference Dolgov, Fischer and Hanebeck12]–[Reference Sun, Sun and Yang14]. However, most of the telerobotic systems particularly those that are used in the industrial environments are subject to other types of communication imperfections, such as the random packet dropout and rate distortion imperfection; and this paper presents two suitable techniques for this type of telerobotic systems. This is one of the major contributions of this paper. The first technique presented in this paper requires frequent linearization of nonlinear dynamic of manipulator and the data transmission with different bit rates at different linearization zones. It also requires a large bit rate when the erasure probability of the communication channel is large. Nevertheless, the other technique presented in this paper does not require the frequent model update and it involves a fixed and relatively small bit rate; but it requires more powerful processors because it is computationally expensive. Therefore, depending on the situation we have two different available techniques for remote monitoring and control of robotic manipulators over the Internet. When the bit rate constraint is sever, the second technique is recommended. But, when there is sever computational constraint, the first technique is recommended. In summary, the major contributions of this paper are as follows:
-
• The presentation of a new linear controller and a new nonlinear controller for the tele-operation of the 2-DoF robotic manipulators over the Internet by considering the effects of unavoidable packet lost and rate distortion
-
• The illustration of the applicability of the coding techniques of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] for the tele-presence of robotic manipulators
-
• The presentation of a new technique for remote monitoring and control of the 2-DoF manipulators subject to sever bit rate constraint
-
• The presentation of a new technique for remote monitoring and control of the 2-DoF robotic manipulators subject to sever computational constraint
The paper is organized as follows. In Section 2, we briefly describe our coding and control techniques presented in refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17]; and we explain how they can be implemented to the 2-DoF robotic manipulator that we consider as the case study of the paper. In Section 3 using extensive computer simulations, we illustrate the satisfactory performances of these techniques for remote monitoring and control in the presence of severe communication imperfections. The paper is concluded in Section 4 by summarizing the main contributions of the paper and discussion on the future research directions.
Throughout certain conventions are used:
$| \cdot |$
denotes the absolute value,
$\| \cdot \|$
the Euclidean norm and
$V'$
denotes the transpose of vector/matrix
$V$
.
$A^{-1}$
and
$\lambda _{i}(A)$
denote the inverse and eigenvalues of a square matrix
$A$
, respectively. ’
$\doteq$
’ means ’by definition is equivalent to’ and
$Z^t\doteq (Z_1,Z_2,\ldots,Z_t)$
.
$\mathbb{R}$
and
$\mathbb{N}$
denote the sets of real numbers and natural numbers, respectively; and
$I$
is the identity matrix. Also,
$x^{(i)}$
denotes the
$i$
th element of the vector
$X$
and
$\underline{0}$
denotes the zero vector/matrix.
$\mathbb{N}^{+}\doteq \{0,1,2,3,\ldots \}$
and
$\mathbb{R}^+$
is the set of non-negative real numbers.
$B^{+}$
denotes the Pseudo inverse of the matrix
$B$
.
2. Coding and control techniques for reliable remote monitoring and control
In this section, we briefly describe the coding and control techniques proposed in refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] for remote monitoring and control subject to the random packet dropout and limited bit rate constraint and hence rate distortion imperfection. We also explain how they can be implemented to the robotic manipulator considered as the case study in this paper.
References [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] were concerned with almost sure asymptotic tracking of the state trajectory as well as reference tracking of nonlinear dynamic systems over the packet erasure channel with feedback acknowledgment, which is an abstract model for communication via the Internet, WiFi, and Zigbee modules (e.g., Digi XBee, Lora, Sigfox). Specifically, refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] were concerned with the block diagram of Fig. 1 described by the following nonlinear dynamic system and communication channel.
Dynamic system:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn1.png?pub-status=live)
where
$t\in \mathbb{N}^{+}$
is the time instant,
$F(X_{t},U_{t}) \in \mathbb{R}^n$
is a smooth vector nonlinear function,
$X_{t} \in \mathbb{R}^n$
is the vector of the states of the system,
$Y_{t} \in \mathbb{R}^n$
is the observation output vector (sensor data), and
$U_{t} \in \mathbb{R}^{m}$
is the control input vector. Note that the dynamic system (1) is a fully observable system as we assume
$Y_t=X_t$
. Throughout, it is assumed that the probability measure associated with the initial state
$X_{0}$
with components
$x^{(i)}_{0}$
,
$i = \{1, 2, \ldots, n\}$
, has bounded support. That is, for each
$i \in \{1, 2, \ldots, n\}$
there exists a compact set
$[\!-L^{(i)}_{0},L^{(i)}_{0}]\in \mathbb{R}$
such that
$\Pr (x^{(i)}_{0}\in [\!-L^{(i)}_{0},L^{(i)}_{0}])=1$
. Note that
$X_{0}$
is unknown for the remote decoder and controller.
Communication channel:
Communication channel between system and controller is a limited capacity erasure channel with feedback acknowledgment. It is a digital channel that transmits a packet of binary data in each channel use. The channel input and channel output alphabets are denoted by
$Z$
and
$\tilde{Z}$
, respectively; and
$Z_{t}$
denotes the channel input at time instant
$t \in \mathbb{N}^{+}$
, which is a packet of binary data with length
$R_t$
containing information bits. Let
$\tilde{Z}_t$
be the channel output and
$e$
denotes the erasure symbol. Then,
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn2.png?pub-status=live)
That is, this channel erases a transmitted packet with probability
$\alpha$
. Throughout, it is assumed that the erasure probability
$\alpha$
is known a priori.
In the channel considered in this paper, there is a feedback acknowledgment from the receiver to the transmitter. That is, if a transmission is successful, an acknowledgment bit is sent from receiver to transmitter indicating that the transmission has been successful. The packet erasure channel with feedback acknowledgment is an abstract model for the commonly used data transmission technologies, such as the Internet and WiFi.
The objective of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] was to design an encoder, decoder, and a controller that resulted in almost sure asymptotic tracking of the state trajectory as well as reference tracking of the system (1), as defined below. These are also the objectives of this paper. For the 2-DoF robotic manipulator considered as the case study in this paper, we refer to the almost sure asymptotic tracking of the state trajectory as the telepresence; and we refer to the almost sure asymptotic reference tracking as the teleoperation.
Definition 2.1. (Almost Sure Asymptotic Tracking of the State Trajectory): Consider the block diagram of Fig. 1 described by the nonlinear dynamic system (1) over the packet erasure channel, as described above. It is said that the state trajectory is almost sure asymptotically tracked if and only if there exist an encoder, decoder and a controller such that the following property holds:
$\Pr ( \lim _{t\rightarrow \infty }{\|X_{t}-\hat{X}_{t}\|} = 0) = 1$
.
Definition 2.2. (Almost Sure Asymptotic Reference Tracking): Consider the block diagram of Fig. 1 described by the nonlinear dynamic system (1) over the packet erasure channel, as described above. It is said that the system is almost sure asymptotically track the reference signal
${\mathcal R}_t \in \mathbb{R}^n$
if and only if there exist an encoder, decoder and a controller such that the following property holds:
$\Pr ( \lim _{t\rightarrow \infty }{\|X_{t}-{\mathcal R}_t\|} = 0) = 1$
.
Remark 2.3. The above definitions for almost sure asymptotic tracking and reference tracking (for the case of
${\mathcal R}_t=0$
) were defined in ref. [Reference Tatikonda and Mitter15] and latter on they have been used by others, for example, [Reference Parsa and Farhadi16], [Reference Parsa and Farhadi17].
In the following, we briefly describe the coding and control techniques that we proposed in refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] for almost sure asymptotic tracking and reference tracking of the nonlinear dynamic system (1) over the packet erasure channel. We then explain how they can be implemented on robotic manipulators.
2.1. Coding and control techniques of ref. [Reference Parsa and Farhadi16]
The proposed coding technique in ref. [Reference Parsa and Farhadi16] is based on the linearization method [Reference Slotine and Li20]. By implementing this method, we presented an encoder, decoder, and a sufficient condition on the length of transmitted packets,
$R_t$
, at each linearization zone that guaranteed almost sure asymptotic state tracking of the family of the equivalent linear dynamic systems, which were resulted from the linearizing the nonlinear dynamic system (1). Note that as in each linearized zone we deal with a new linear dynamic system, the length of the transmitted packet is different in different linearized zones. Hence, we denote the length of transmitted packet in the linearized zone
$j$
by
$R_{[j]}$
. Having that, the proposed coding technique works as follows (for the simplicity of the presentation consider the scalar case).
At the time instant
$t = 0$
, we notice that
$X_0 \in [\!-L_0, L_0]$
, where the upper bound
$L_0$
is known for both encoder and decoder; and we fix the rate to be
$\bar{R}_{[0]}$
. Then, using the coding technique that will be described very shortly, the reconstruction of
$X_0$
denoted by
$\hat{\bar{X}}_{0}$
is obtained at the decoder. Due to the existence of the feedback acknowledgment, the encoder also reconstructs
$\hat{\bar{X}}_{0}$
. Then, at this time instant (
$t=0$
), the encoder and decoder linearize the nonlinear dynamic system at the working point (
$\hat{\bar{X}}_{0},U_0)$
,
$U_0=0$
, which results in a state space system matrix
$A_{[0]}$
and
$B_{[0]}$
for the equivalent linear model. Then, the encoder and decoder partition the interval
$[\!-L_0, L_0]$
into
$2^{R_{[0]}}$
equal sized, nonoverlapping subintervals and the center of each subinterval is chosen as the index of that interval (
$\gamma _0, \gamma _1,. . ., \gamma _{2^{R_{[0]}}-1}$
). Subsequently, the index of the subinterval that includes
$X_0$
(e.g.,
$\gamma _{j0}$
where
$j\ 0 \in \{0,1,\ldots,2^{R_{[0]}}-1\}$
) is encoded into
$R_{[0]}$
bits and transmitted to the decoder through the packet erasure channel. If the decoder receives this
$R_{[0]}$
bits successfully, it identifies the index of the subinterval where
$X_0$
lives in; and the value of this index is chosen as
$\hat{X}_0$
. Therefore, the decoding error for this case is bounded above by
$|X_0 - \hat{X}_0| \leq V_0 =\frac{L_0}{2^{R_{[0]}}}$
. But if erasure occurs, then
$\hat{X}_0 = 0$
; and therefore,
$|X_0 - \hat{X}_0| \leq V_0 = L_0$
. Hence, the decoding error can be represented as follows:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn3.png?pub-status=live)
Note that
$\hat{\bar{X}}_{0}$
is constructed similarly by implementing
$\bar{R}_{[0]}$
bits. The procedure for the reconstruction of
$\hat{\bar{X}}_{0}$
may be repeated several times until we have a successful transmission for the reconstruction of
$\hat{\bar{X}}_{0}$
. At the time instant
$t = 1$
, the encoder encodes
$X_1-A_{[0]}\hat{X}_0-B_{[0]}U_0$
. To encode this signal, the interval
$[\!-L_1, L_1]$
is calculated as follows:
$|X_1-A_{[0]}\hat{X}_0-B_{[0]}U_0|=|A_{[0]}X_0-A_{[0]}\hat{X}_0|=|A_{[0]}||X_0-\hat{X}_0|\leq |A_{[0]}|V_0=L_1.$
Then, the encoder and decoder partition the interval
$[\!-L_1, L_1]$
into
$2^{R_{[0]}}$
equal sized, nonoverlapping subintervals, and the center of each subinterval is chosen as the index of that interval. When the encoder observes the signal
$X_1-A_{[0]}\hat{X}_0-B_{[0]}U_0$
, the index of the subinterval that includes
$X_1-A_{[0]}\hat{X}_0-B_{[0]}U_0$
(e.g.,
$\gamma _{j1}$
where
$j1 \in \{0,1,\ldots,2^{R_{[0]}}-1\}$
) is encoded into
$R_{[0]}$
bits and transmitted to the decoder through the packet erasure channel. Subsequently, the decoder constructs
$\hat{X}_1$
as follows:
$ \hat{X}_1 =\gamma _{j1}+A_{[0]}\hat{X}_0+B_{[0]}U_0$
, if
$M_1=\frac{1}{2^{R_{[0]}}}$
with the probability of
$\Pr (M_1=\frac{1}{2^{R_{[0]}}})= 1-\alpha$
; and
$\hat{X}_1 =A_{[0]}\hat{X}_0+B_{[0]}U_0$
, if
$M_1=1$
with the probability of
$\Pr (M_1=1)=\alpha$
. Therefore,
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn4.png?pub-status=live)
For the next step (
$t =2$
), if
$|E_1|\leq |E_0|$
, this procedure continues with the equivalent state space matrices
$A_{[0]}$
and
$B_{[0]}$
and the packet length
$R_{[0]}$
; but if
$|E_1| \gt |E_0|$
, then the encoder linearizes the nonlinear dynamic system at the new working point
$(\hat{X}_1,U_1)$
that results in the state space system matrices
$A_{[1]}$
and
$B_{[1]}$
of the equivalent linear model (i.e., the system (5) with
$j=1$
). The encoder by sending
$R_{[1]}\neq R_{[0]}$
bits through the packet erasure channel informs the decoder that a new linearization has been applied. Therefore, the decoder performs the same linearization; and the rest of the procedure continues with the new matrices
$A_{[1]}$
and
$B_{[1]}$
.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn5.png?pub-status=live)
By following a similar procedure, as described above, the sequence
$\hat{X}_0,\hat{X}_1,\hat{X}_0,\ldots$
are constructed at the decoder. The vector case (
$X_t\in \mathbb{R}^n$
) was treated similarly in ref. [Reference Parsa and Farhadi16]. It has been proved in ref. [Reference Parsa and Farhadi16] that if
${\triangle t}_j\doteq t_{j+1}-t_j$
(
$j \in N_+$
)s are sufficiently large and the packet lengths
$R_t=R_{[j]}$
(
$t\in [t_j,t_{j+1})$
) satisfy the following inequalities:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn6.png?pub-status=live)
then using the above coding technique we have almost sure asymptotic state tracking. Note that the first condition (i.e.,
${\triangle t}_j\doteq t_{j+1}-t_j$
for
$j \in{\mathbb{N}}_+$
is sufficiently large) is satisfied if the sampling period is small compared with the linearization period.
Now, for the nonlinear system (1) suppose that for each linearized equivalent system, there exists a matrix
$K_{[j]}$
such that the matrix
$A_{[j]}+B_{[j]}K_{[j]}$
is a stable matrix (e.g.,
$K_{[j]}=-B_{[j]}^{+}A_{[j]}$
, where
$B_{[j]}^{+}$
is the Pseudo inverse). Then, using the proposed coding technique and the controller
$U_t=K_{[j]}\hat{\tilde{X}}_t + W_{[j],t}$
where
$W_{[j],t}\doteq -B_{[j]}^{+}(A_{[j]}{\mathcal R}_t-{\mathcal R}_{t+1})$
and
$\hat{\tilde{X}}_t \doteq \hat{X}_t-{\mathcal R}_t$
for each linearized system, we have almost sure asymptotic reference tracking [Reference Parsa and Farhadi16].
Remark 2.4. The input to the family of the linearized systems (5) is the vector
$U_t$
, as given above, which involves
$\hat{X}_t$
.
$\hat{X}_t$
is the decoder output. And the encoder and decoder compensate the imperfections due to the transmission of system measurements over the packet erasure channel, which is an abstract model for the transmission over the Internet and WiFi communication links.
2.2. Coding and control techniques of ref. [Reference Parsa and Farhadi17]
The coding and control techniques of ref. [Reference Parsa and Farhadi17] work differently. The coding and control techniques of ref. [Reference Parsa and Farhadi17] are not based on the linearization method and throughout we transmit with a fixed rate
$R$
rather than a variable rate
$R_{[j]}$
. Reference [Reference Parsa and Farhadi17] assumes the nonlinear dynamic system
$F(X_t,U_t)$
is the control affine, that is,
$F(X_t,U_t)=F(X_t)+BU_t$
, where
$F(.)$
is a piece wise nondecreasing or nonincreasing function (see Fig. 3). The coding technique of ref. [Reference Parsa and Farhadi17] is similar to the coding technique of ref. [Reference Parsa and Farhadi16] for each linearized zone; except it considers the following dynamic
$X_{t+1}=F(X_t)+BU_t$
and instead of encoding
$\gamma _j$
it encodes
$\eta _j=F^{-1}(\gamma _j)$
. It has been proved in ref. [Reference Parsa and Farhadi17] that under some mild conditions on the transmission rate
$R$
, the proposed coding technique results in the almost sure asymptotic tracking of the state trajectory. It has been also proved that the control vector
$U_t=-B^{+}(F(\hat{X}_t)-{\mathcal R}_{t+1})$
results in the almost sure asymptotic reference tracking.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig3.png?pub-status=live)
Figure 3. Equal sized, nonoverlapping subintervals for encoding with rate
$R=2$
using the coding technique of ref. [Reference Parsa and Farhadi17].
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig4.png?pub-status=live)
Figure 4. The robotic manipulator considered as the case study of the paper.
2.3. Applications of the proposed techniques on two-link robotic manipulators
Now, we implement these coding and control techniques to the case study of the paper, which is a two-link robotic manipulator shown in Fig. 4. This type of manipulators are very common in manufacturing industries. Its dynamic is described by the following Eq. [Reference Slotine and Li20] (for the simplicity of the presentation, we drop the continuous time dependency index).
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqn7.png?pub-status=live)
where
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU1.png?pub-status=live)
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU2.png?pub-status=live)
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU3.png?pub-status=live)
where
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU4.png?pub-status=live)
and
$m_1$
is the mass of the fist arm,
$m_2$
is the mass of the second arm, and
$g$
is the earth gravity acceleration coefficient (i.e.,
$g=$
9.81).
In order to implement the coding and control techniques of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] to the above manipulator, it is required that we rewrite the above dynamic in the state space form. To do that, we define the following states:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU5.png?pub-status=live)
Subsequently, we have the following state space representation for the above manipulator:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU6.png?pub-status=live)
The measurement data from this robotic manipulator is the vector
$Y$
and the control commands is the vector
$U$
described as follows:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU7.png?pub-status=live)
Because the communication network is a digital channel, we need to sample the measurement data with a fixed period of
$T$
seconds and apply the control commands via the so called Zero Order Hold (ZOH) [Reference Ogata21] with the update period of
$T$
seconds. Hence, in the block diagram of Fig. 1 we should deal with the following equivalent discrete time dynamic system for the above manipulator for the implementation of the coding and control techniques of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17]. The following equivalent discrete time model is obtained by implementing the Euler’s approximation method [Reference Ogata21]:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU8.png?pub-status=live)
Hence, the matrices
$A_{[j]}$
and
$B_{[j]}$
for the
$j$
th linearized system to be used in the coding and control techniques of ref. [Reference Parsa and Farhadi16] are given by the following matrices.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU9.png?pub-status=live)
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU10.png?pub-status=live)
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU11.png?pub-status=live)
Following that a linear controller for each linearized zone in the form of
$U_{t}=-B^{+}_{[j]}A_{[j]}\hat{\tilde{X}}_t+W_{[j],t}$
,
$W_{[j],t}=-B^{+}_{[j]}(A_{[j]}{\mathcal R}_t-{\mathcal R}_{t+1})$
,
$\hat{\tilde{X}}_t=\hat{X}_t-{\mathcal R}_t$
is obtained for the teleoperation of the two-link manipulator.
Now, let
$X_t=\begin{pmatrix}x^{(1)}_t \cr x^{(2)}_t \cr x^{(3)}_t \cr x^{(4)}_t \end{pmatrix}$
,
$\hat{X}_t=\begin{pmatrix}\hat{x}^{(1)}_t \cr \hat{x}^{(2)}_t \cr \hat{x}^{(3)}_t \cr \hat{x}^{(4)}_t \end{pmatrix}$
(which is the decoder output),
$d_1=\bar{H}_{12} \bar{H}_{21}-\bar{H}_{11} \bar{H}_{22}$
and
$d_2=\bar{H}_{22} \bar{H}_{11}-\bar{H}_{21} \bar{H}_{12}$
, where
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU12.png?pub-status=live)
Let also
$F(X_t)=\begin{pmatrix} f^{(1)} \cr f^{(2)} \cr \bar{f}^{(3)} \cr \bar{f}^{(4)} \end{pmatrix}$
, where
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU13.png?pub-status=live)
Also, let
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU14.png?pub-status=live)
Then, the nonlinear controller equipped with the coding technique of ref. [Reference Parsa and Farhadi17] that results in the teleoperation of the two-link manipulator is given by
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU15.png?pub-status=live)
3. Simulation results
In this section, we evaluate the performances of the proposed coding and control techniques applied to the case study of the paper in the presence of severe communication imperfections, which are common in the industrial environments. For the simulation purposes, we choose the following parameters for the two-link manipulator of Fig. 4, which is the case study of the paper. These parameters were borrowed from ref. [Reference Chen, Zhang, Hu, Ni and Chen22]. Table I presents the parameters of the manipulator for the actual case (i.e., when its end-effector carries a predefined load) as well as the nominal case (i.e., when its end-effector does not carry any load). Note that the coding and control techniques are designed based on the nominal and actual dynamics following the status of the end-effector of the manipulator of the case study.
Table I. Actual and nominal parameters.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_tab1.png?pub-status=live)
Throughout this section, it is assumed that the torques, which are applied on the manipulator joints are subject to operational constraints. That is,
$|\tau _1| \leq 6.4 \,{\rm Nm}$
and
$|\tau _2| \leq 2.9 \,{\rm Nm}$
. Also, the rate of change of torques for
$T=0.01$
is limited up to 0.03
$\,{\rm Nm}$
(for
$T=0.1$
it is therefore limited up to 0.3
$\,{\rm Nm}$
). We also set
$L_0^{(1)}=\dfrac{\pi }{6}$
,
$L_0^{(2)}=\dfrac{\pi }{100}$
, and
$\dot{q}_1(0)=\dot{q}_2(0)=0$
(therefore,
$L_0^{(3)}=L_0^{(4)}=0$
). We also set
$X_0=\underline{0}$
for simulations. Moreover, for the coding and control techniques of ref. [Reference Parsa and Farhadi16], we set
$\bar{R}_{[0]}=22$
and for those of ref. [Reference Parsa and Farhadi17] we set
${\bar R}=6$
. Note that for the remote reference tracking,
$q_1$
,
$q_2$
,
$\dot{q}_1$
, and
$\dot{q}_2$
are sampled with the sample period of
$T$
seconds and transmitted to the remote controller.
3.1. The performance under the coding and control techniques of ref. [Reference Parsa and Farhadi16]
Under the above conditions, for the case of
$\alpha =0$
and
$T=0.01$
, we implement the aforementioned coding and control techniques of [Reference Parsa and Farhadi16] to track the reference signals for
$q_1$
, which is
$\frac{\pi }{8}$
, and
$q_2$
as shown in Fig. 5 by dashed trajectory. For the time interval of 0 to 15 s, the nominal dynamic is simulated and for the interval of 15 to 23.75 s the actual dynamic is simulated, then for the time interval of 23.75 to 32.5 the nominal dynamic is simulated and for the next time interval of 32.5 to 41.25 the actual dynamic is simulated and so on and so forth. That is, the manipulator frequently picks up a predefined object and moves it and then returns to pick up and move another similar object. When it carries this object, its dynamic is described by the actual dynamic and when it returns to pick up another similar object, its dynamic is the nominal dynamic. This is a typical scenario for the robotic manipulator of the case study as it very often moves a predefined load and after dropping this load, it returns to its initial position to pick up, move, and drop another similar load. Figure 5 also illustrates the trajectory for
$q_2$
taken by the manipulator (solid line). As it is clear from this figure, we have an excellent quality of the reference tracing. We have similar excellent quality of reference tracking for
$q_1$
. But, this excellent quality comes with a price. Figures 6 and 7 illustrate the required torques for this reference tracking. Due to the operational constrains, the robotic manipulator of the case study obviously is not able to execute these required torques; and what we get are the results reported in Figs. 8 and 9.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig5.png?pub-status=live)
Figure 5. The reference signal and the trajectory taken by the manipulator for
$q_2$
when the reference trajectory is nonsmooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig6.png?pub-status=live)
Figure 6. The required torque for joint 1 when reference trajectories are nonsmooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig7.png?pub-status=live)
Figure 7. The required torque for joint 2 when reference trajectories are nonsmooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig8.png?pub-status=live)
Figure 8. The reference signal and the trajectory taken by the manipulator for
$q_1$
subject to the the operational constraints when reference trajectories are nonsmooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig9.png?pub-status=live)
Figure 9. The reference signal and the trajectory taken by the manipulator for
$q_2$
subject to the operational constraints when reference trajectories are nonsmooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
Now, in order to satisfy the operational constrains, we implement the smooth version of the reference signals as they are shown in Figs. 10 and 11. Figures 12 and 13 illustrate the required torques for having this excellent quality of the reference tracking. As it is clear from these figures, by smoothing the reference signals, the upper bound constraints on torques are satisfied; but the rate constraints are not satisfied. Nevertheless, when these torques are applied by the manipulator to its joints by considering the rate and the upper bound constraints, we get a very similar result for the reference tracking as shown in Figs. 10 and 11 with the applied torques shown by Figs. 14 and 15. This indicates that our modified method, which is based on smoothing the reference signal results in a satisfactory performance. Note that whenever the value of the required torque passes the upper bound constraint, the upper bound is applied by the manipulator. Similarly, when the rate of change of torque passes its bound, the rate of change of torque is limited to the plus or the minus of the maximum allowable rate of change of torque (e.g.,
$\pm$
0.03 for
$T=0.01$
).
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig10.png?pub-status=live)
Figure 10. The smooth version of the reference signal and the trajectory taken by the manipulator for
$q_1$
when
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig11.png?pub-status=live)
Figure 11. The smooth version of the reference signal and the trajectory taken by the manipulator for
$q_2$
when
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig12.png?pub-status=live)
Figure 12. The required torque for joint 1 when reference trajectories are smooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig13.png?pub-status=live)
Figure 13. The required torque for joint 2 when reference trajectories are smooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig14.png?pub-status=live)
Figure 14. The applied torque on joint 1 by considering the operational constraints when reference trajectories are smooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig15.png?pub-status=live)
Figure 15. The applied torque on joint 2 by considering the operational constraints when reference trajectories are smooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi16] are used.
Now, we evaluate the telepresence and teleoperation performances in the presence of severe random packet dropout with the erasure probability of
$\alpha \in [0,1)$
. That is, when sensor data is not received at the destination with the probability of
$\alpha .100$
$\%$
. For the fair comparison, we define the following Root Sum Square Error (RSSE) criterion [Reference Parsa and Farhadi17]:
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_eqnU16.png?pub-status=live)
For the case of
$T=0.01$
seconds and
$\alpha =0$
(Fig. 10 to Fig. 15),
$RSSE=0.0568$
(without considering the operational constraints) and
$RSSE^*=1.5921$
(by considering the operational constraints). For the other cases, the
$RSSE$
s are reported in Table II. Table II indicates that even for the extremely severe communication imperfections, the quality of the reference tracking is as excellent as the case of
$\alpha =0$
. Nevertheless, this comes with a price for the severe cases. While for very small
$\alpha$
, the length of transmitted packets is 4 or 5 bits, for
$\alpha =0.99$
, this number is 20 or 21 bits.
Table II.
$RSSE$
s for
$T=0.01$
when the coding and control techniques of [Reference Parsa and Farhadi16] are used.
$RSSE$
: Without considering the operational constraints.
$RSSE^*$
: By considering the operational constraints.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_tab2.png?pub-status=live)
It is desirable to increase the sampling period to increase the life time of the processors and also be able to use cheaper processors. Nevertheless, it has been shown in ref. [Reference Parsa and Farhadi16] for autonomous vehicles that by increasing the sampling period the quality of the reference tracking is getting worse. This is a direct consequence of the stability requirement of switching systems as discussed in ref. [Reference Parsa and Farhadi16]. For the case of
$\alpha =0.5$
, the effects of different sampling periods in
$RSSE$
are reported in Table III. From Table III, it is clear that by increasing the sampling period, the quality of the reference tracking is getting worse, as it is expected.
Table III. RSSE for
$\alpha =0.5$
when the coding and control techniques of [Reference Parsa and Farhadi16] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_tab3.png?pub-status=live)
3.2. The performance of the coding and control techniques of ref. [Reference Parsa and Farhadi17]
Computer simulation illustrates that the coding and control techniques of [Reference Parsa and Farhadi17] for the reference trajectories, as shown in Figs. 10 and 11, are not able to satisfy the bound constraints on torques. Therefore, throughout this section, we focus on the reference trajectories as shown in Fig. 16 for
$q_2$
and
$\dfrac{\pi }{2}$
for
$q_1$
. Figures 17 and 18 illustrate the applied torques on manipulator joints for tracking these reference trajectories. Note that the coding and control techniques of ref. [Reference Parsa and Farhadi17] cannot satisfy the bound constraints on torques for the reference trajectories as shown in Figs. 10 and 11; and the coding and control techniques of ref. [Reference Parsa and Farhadi16] cannot also satisfy the bound constraints on torques for the reference trajectories as shown above.
Tables IV and V are the counterparts of Tables II and III for the above reference trajectories when different
$\alpha$
s and sample periods are implemented.
Table IV.
$RSSE$
s for
$T=0.01$
when the coding and control techniques of [Reference Parsa and Farhadi17] are used.
$RSSE$
: Without considering the operational constraints.
$RSSE^*$
: By considering the operational constraints.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_tab4.png?pub-status=live)
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig16.png?pub-status=live)
Figure 16. The smooth version of the reference signal and the trajectory taken by the manipulator for
$q_2$
when
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi17] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig17.png?pub-status=live)
Figure 17. The applied torque on joint 1 by considering the operational constraints when reference trajectories are smooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi17] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_fig18.png?pub-status=live)
Figure 18. The applied torque on joint 2 by considering the operational constraints when reference trajectories are smooth,
$\alpha =0$
,
$T=0.01$
, and the coding and control techniques of ref. [Reference Parsa and Farhadi17] are used.
Table V. RSSE for
$\alpha =0.5$
when the coding and control techniques of [Reference Parsa and Farhadi17] are used.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20221108170611445-0459:S0263574722001035:S0263574722001035_tab5.png?pub-status=live)
4. Conclusion and future research direction
In this article, we illustrated the applications of the coding and control techniques of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] in the telepresence and teleoperation of the 2-DoF robotic manipulators over the packet erasure channel. It has been illustrated that these techniques result in satisfactory performances even in the presence of sever communication imperfections provided the bound constraints on applied torques is satisfied. The techniques presented in ref. [Reference Parsa and Farhadi16] provides a slightly better tracking performance compared to the other technique presented in ref. [Reference Parsa and Farhadi17]; but it requires frequent model updates, higher bit rate, and variable bit rate.
The coding techniques of refs. [Reference Parsa and Farhadi16] and [Reference Parsa and Farhadi17] can be combined with other nonlinear controller techniques, such as the technique presented in ref. [Reference Dixon, de Queiroz, Zhang and Dawson26] developed for controlling robotic manipulators subject to the bounded torque constraint in order to achieve better telepresence and teleoperation performance. This is left for future investigation.
Authors’ contributions
Mr. Hokmi and Mr. Haghi were Dr. Farhadi’s BSc students. They developed computer codes under Dr. Farhadi close supervision for the theoretical developments presented by Dr. Farhadi in other journal articles. Then, they performed computer simulations. Dr. Farhadi wrote and revised the paper.
Financial support
None.
Conflict of interests
None.
Ethical considerations
None.