Collaboration Strategy Simulation of Multi-Agents for Pursuit-Evasion in Wireless Sensor Networks

Article Preview

Abstract:

In this study, we used Cricket equipments based on wireless sensor networks to study the pursuit-evasion strategy of multi-robots in a continuous map. In order to improve the efficiency, two new pursuit-evasion strategies were proposed. To meet the need of a continuous map, a greedy algorithm was utilized to deal with boundary problem when a pursuer or an evader was near the field boundary. The statistical results show the converging-attack pursuit strategy outperforms in pursuing the evader with different escaping strategies, such as randomly moving, active escaping strategy and vector-wards escaping strategy. The vector-wards escaping strategy is also effective in delaying the capture of evaders.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2238-2242

Citation:

Online since:

August 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Thrun, W. Burgard and D. Fox: Machine Learning & Autonomous Robots Vol. 31 (1998), pp.1-13.

Google Scholar

[2] S. Roumeliotis and G. Bekey: Proc. of IEEE ICRA (2000), pp.2958-2965.

Google Scholar

[3] P. Stone and M. Veloso: Autonomous Robots Vol. 8, (2000), pp.345-383.

Google Scholar

[4] Timofeev, F. Kolushev and A. Bogdanov: Int. Joint Conference on Neural Networks Vol. 6, (1999), pp.4115-4118.

Google Scholar

[5] A Stroupe, M. Martin and T. Balch: Proc. IEEE Conf. on Robotics and Automation (2001), pp.1092-1098.

Google Scholar

[6] H. Kitano, M. Asada, I. Noda and H. Matsubara: IEEE Robotics and Automation Magazine Vol. 5, (1998), pp.30-36.

Google Scholar

[7] M. Asada, E. Uchibe and K. Hosoda: Articial Intelligence Vol. 110, (1999), pp.275-292.

Google Scholar

[8] B. Sinopoli, C. Sharp, L. Schenato, S. Schaffert and S. S. Sastry: Proceedings of the IEEE Vol. 91, (2003), pp.1235-1246.

DOI: 10.1109/jproc.2003.814926

Google Scholar

[9] P. Zhuang, Y. Shang and H. Shi: Proceedings for ICPS: 2006 International Conference on Pervasive Services, (2006), pp.235-238.

Google Scholar

[10] J. Kim, R. Vidal, H. Shim, O. Shakernia, and S. Sastry: Proc. of 40th IEEE Conf. on Decision and Control, (2001), pp.634-639.

Google Scholar

[11] R. Vidal, O. Shakernia, H. J. Kim, D. H. Shim and S. Sastry: IEEE Transactions on Robotics and Automation, Vol. 18, (2002), pp.662-669.

DOI: 10.1109/tra.2002.804040

Google Scholar

[12] K.H. Low, W.K. Leow and M.H. Ang: IEEE Trans on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol. 36, (2006), pp.315-326.

Google Scholar

[13] L.X. Guo, Q.Y. Huang, H.L. Xie, J.L. Li and Z.W. Wang: Applied Mechanics and Materials Vols. 16-19 (2009), pp.1133-1137.

Google Scholar

[14] L.X. Guo, L.P. Zhao and Y.M. Zhang: Proceedings of Information Technology & Environmental System Sciences, (2008), pp.796-801.

Google Scholar

[15] L.X. Guo and M.Y. Zhao: Journal of Materials Processing Technology, Vol. 129, (2002), pp.539-544.

Google Scholar