Motion Planning Using a Memetic Evolution Algorithm for Swarm Robots
نویسندگان
چکیده
منابع مشابه
Motion Planning Using a Memetic Evolution Algorithm for Swarm Robots
A hierarchical memetic algorithm (MA) is proposed for the path planning and formation control of swarm robots. The proposed algorithm consists of a global path planner (GPP) and a local motion planner (LMP). The GPP plans a trajectory within the Voronoi diagram (VD) of the free space. An MA with a non‐random initial population plans a series of configu...
متن کاملMotion Planning of Swarm Robots Using Potential-based Genetic Algorithm
A potential-based genetic algorithm is proposed for the motion planning of robot swarms. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm plans a trajectory, which the robot swarm should follow, within a Voronoi diagram of the free space. The motion planning algorithm is a genetic algorithm based on artificial potential models. Th...
متن کاملPSO-Based Path Planning Algorithm for Humanoid Robots Considering Safety
In this paper we introduce an improvement in the path planning algorithm for the humanoid soccer playing robot which uses Ferguson splines and PSO (Particle Swarm Optimization). The objective of the algorithm is to find a path through other playing robots to the ball, which should be as short as possible and also safe enough. Ferguson splines create preliminary paths using random generated para...
متن کاملA Minimalist Flocking Algorithm for Swarm Robots
In this paper we describe a low-end and easy to implement flocking algorithm which was developed for very simple swarm robots and which works without communication, memory or global information. By adapting traditional flocking algorithms and eliminating the need for communication, we created an algorithm with emergent flocking properties. We analyse its potential of aggregating an initially sc...
متن کاملA Memetic Particle Swarm Optimization Algorithm for Network Vulnerability Analysis
As computer networks continue to grow, it becomes increasingly more important to automate the process of evaluating their vulnerability to attacks. Despite the best efforts of software architects and developers, network hosts inevitably contain a number of vulnerabilities. Hence, it is not feasible for a network administrator to remove all vulnerabilities present in the network hosts. Therefore...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Robotic Systems
سال: 2012
ISSN: 1729-8814,1729-8814
DOI: 10.5772/45669