This document proposes a control method for a single-master multi-slave teleoperation system to control multiple cooperative mobile robots for multi-target missions. The control method includes a modified potential field-based leader-follower formation approach and a robot-target pairing method. The pairing method uses an auction algorithm to optimally pair robots to targets. The robots are split into subteams based on the pairings and each subteam autonomously approaches its paired target while avoiding obstacles. Simulation studies demonstrate the effectiveness of this control method for multi-target operations.
Measuring similarity between mobility models and real world motion trajectoriescsandit
Various mobility models have been proposed to represent the motion behaviour of mobile nodes
in the real world. Selection of the most similar mobility model to a given real world environment
is a challenging issue which has a significant impact on the quality of performance evaluation
of different network protocols. In this paper we propose a methodology for measurement of
similarity between mobility models used in mobile networks simulation and real world mobility
scenarios with different transportation modes. We explain our mobility metrics we have used for
analysis of motion behavior of mobile nodes and a pre-processing method which makes our
trajectories suitable for extraction and calculation of these metrics considering shape of the
road networks and GPS noise. Then we use a feature selection method to find the most
discriminative features which are able to distinguish between trajectories with different
transportation modes using a supervised learning and feature ranking method. Subsequently,
using our selected feature space we perform Fuzzy C-means Clustering to find the degree of
similarity between each of our mobility models and real world trajectories with different
transportation modes. Our methodology can be used to select the most similar mobility model
suitable for simulation of mobile network protocols (such as DTN and MANETs protocols) in a
particular real world area.
IRJET- Comprehensive Review on Modular Self-Reconfigurable Robot ArchitectureIRJET Journal
This document provides a comprehensive review of modular self-reconfigurable robot architecture. It discusses the hardware architecture of various modular robot systems, including chain-based systems like PolyBot and CONRO, and lattice-based systems like metamorphic robots, Crystalline modules, molecule robots, and EM-Cube. It reviews the design of individual modules, locomotion capabilities, reconfiguration methods, and control architectures for different modular robot platforms. The review aims to provide better understanding of modular self-reconfigurable robot technologies and help future research in this area.
EFFECTIVE REDIRECTING OF THE MOBILE ROBOT IN A MESSED ENVIRONMENT BASED ON TH...ijfls
The use of fuzzy logic in redirecting mobile robot is based on two sets of received information. First set is the instantaneous distance of the robot from the obstacle and second set is the instantaneous information of the robot's position. For this purpose, the fuzzy rules base consists of forty-two bases, which is extracted based on the robot's distance from obstacles, and the target position relative to the instantaneous orientation of the robot. In the structure of fuzzy systems, minimal inference engine are considered. Also, Extended Kalman filter is used for localization in a noisy environment. Accordingly, the inputs of the fuzzy systems are determined based on the estimation of the localization process, the information of the obstacles center and the target position. Also, the linear acceleration and instantaneous orientation of the mobile robot are determined by the desired fuzzy structures which are applied to its kinematic model.
EFFECTIVE REDIRECTING OF THE MOBILE ROBOT IN A MESSED ENVIRONMENT BASED ON TH...Wireilla
The use of fuzzy logic in redirecting mobile robot is based on two sets of received information. First set is
the instantaneous distance of the robot from the obstacle and second set is the instantaneous information of
the robot's position. For this purpose, the fuzzy rules base consists of forty-two bases, which is extracted
based on the robot's distance from obstacles, and the target position relative to the instantaneous
orientation of the robot. In the structure of fuzzy systems, minimal inference engine are considered. Also,
Extended Kalman filter is used for localization in a noisy environment. Accordingly, the inputs of the fuzzy
systems are determined based on the estimation of the localization process, the information of the obstacles
center and the target position. Also, the linear acceleration and instantaneous orientation of the mobile
robot are determined by the desired fuzzy structures which are applied to its kinematic model.
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET Journal
This document reviews various techniques for predicting pedestrian behavior for intelligent transportation systems. It discusses algorithms that aim to predict pedestrian motion around crossroads to avoid potential collisions with vehicles. The document summarizes several papers that propose different methods for pedestrian behavior prediction, including the use of LSTM neural networks, goal-directed planning with deep neural networks, analyzing pedestrian-vehicle interaction behavior, using CNNs for pedestrian detection and direction prediction, predicting pedestrian intention at night using infrared cameras and fuzzy automata, and memory-based and physical modeling approaches.
This chapter discusses how mobility can positively impact mobile ad hoc networks (MANETs) if properly managed. It begins by introducing common mobility models used to simulate node movement. It then discusses how mobility exists at the node, information, and user levels in MANETs. The chapter argues that mobility can improve routing capability by enabling temporary connections between nodes. It outlines two main approaches - uncontrolled schemes that rely on inherent random node movement, like epidemic routing, and controlled schemes that plan node movement to ferry messages, like message ferrying. Finally, it discusses additional ways mobility may increase network capacity, security, and information dissemination if accounted for in protocol design from the start.
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS.ijaia
This document summarizes a research paper that proposes using an artificial neural network to analyze the best route for automobile vehicles in traffic conditions. It presents a neural network architecture with 5 input parameters (distance, traffic volume, number of signals, road condition, travel time) and 5 output routes. The network is trained on 243 input combinations and tested on unseen data. Test results showed the network with backpropagation had 91.2% accuracy and lower error than without backpropagation. The research aims to help commuters optimize routes based on traffic parameters, though assumptions about static conditions limit realism. Future work will analyze more dynamic traffic flow conditions.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
Measuring similarity between mobility models and real world motion trajectoriescsandit
Various mobility models have been proposed to represent the motion behaviour of mobile nodes
in the real world. Selection of the most similar mobility model to a given real world environment
is a challenging issue which has a significant impact on the quality of performance evaluation
of different network protocols. In this paper we propose a methodology for measurement of
similarity between mobility models used in mobile networks simulation and real world mobility
scenarios with different transportation modes. We explain our mobility metrics we have used for
analysis of motion behavior of mobile nodes and a pre-processing method which makes our
trajectories suitable for extraction and calculation of these metrics considering shape of the
road networks and GPS noise. Then we use a feature selection method to find the most
discriminative features which are able to distinguish between trajectories with different
transportation modes using a supervised learning and feature ranking method. Subsequently,
using our selected feature space we perform Fuzzy C-means Clustering to find the degree of
similarity between each of our mobility models and real world trajectories with different
transportation modes. Our methodology can be used to select the most similar mobility model
suitable for simulation of mobile network protocols (such as DTN and MANETs protocols) in a
particular real world area.
IRJET- Comprehensive Review on Modular Self-Reconfigurable Robot ArchitectureIRJET Journal
This document provides a comprehensive review of modular self-reconfigurable robot architecture. It discusses the hardware architecture of various modular robot systems, including chain-based systems like PolyBot and CONRO, and lattice-based systems like metamorphic robots, Crystalline modules, molecule robots, and EM-Cube. It reviews the design of individual modules, locomotion capabilities, reconfiguration methods, and control architectures for different modular robot platforms. The review aims to provide better understanding of modular self-reconfigurable robot technologies and help future research in this area.
EFFECTIVE REDIRECTING OF THE MOBILE ROBOT IN A MESSED ENVIRONMENT BASED ON TH...ijfls
The use of fuzzy logic in redirecting mobile robot is based on two sets of received information. First set is the instantaneous distance of the robot from the obstacle and second set is the instantaneous information of the robot's position. For this purpose, the fuzzy rules base consists of forty-two bases, which is extracted based on the robot's distance from obstacles, and the target position relative to the instantaneous orientation of the robot. In the structure of fuzzy systems, minimal inference engine are considered. Also, Extended Kalman filter is used for localization in a noisy environment. Accordingly, the inputs of the fuzzy systems are determined based on the estimation of the localization process, the information of the obstacles center and the target position. Also, the linear acceleration and instantaneous orientation of the mobile robot are determined by the desired fuzzy structures which are applied to its kinematic model.
EFFECTIVE REDIRECTING OF THE MOBILE ROBOT IN A MESSED ENVIRONMENT BASED ON TH...Wireilla
The use of fuzzy logic in redirecting mobile robot is based on two sets of received information. First set is
the instantaneous distance of the robot from the obstacle and second set is the instantaneous information of
the robot's position. For this purpose, the fuzzy rules base consists of forty-two bases, which is extracted
based on the robot's distance from obstacles, and the target position relative to the instantaneous
orientation of the robot. In the structure of fuzzy systems, minimal inference engine are considered. Also,
Extended Kalman filter is used for localization in a noisy environment. Accordingly, the inputs of the fuzzy
systems are determined based on the estimation of the localization process, the information of the obstacles
center and the target position. Also, the linear acceleration and instantaneous orientation of the mobile
robot are determined by the desired fuzzy structures which are applied to its kinematic model.
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET Journal
This document reviews various techniques for predicting pedestrian behavior for intelligent transportation systems. It discusses algorithms that aim to predict pedestrian motion around crossroads to avoid potential collisions with vehicles. The document summarizes several papers that propose different methods for pedestrian behavior prediction, including the use of LSTM neural networks, goal-directed planning with deep neural networks, analyzing pedestrian-vehicle interaction behavior, using CNNs for pedestrian detection and direction prediction, predicting pedestrian intention at night using infrared cameras and fuzzy automata, and memory-based and physical modeling approaches.
This chapter discusses how mobility can positively impact mobile ad hoc networks (MANETs) if properly managed. It begins by introducing common mobility models used to simulate node movement. It then discusses how mobility exists at the node, information, and user levels in MANETs. The chapter argues that mobility can improve routing capability by enabling temporary connections between nodes. It outlines two main approaches - uncontrolled schemes that rely on inherent random node movement, like epidemic routing, and controlled schemes that plan node movement to ferry messages, like message ferrying. Finally, it discusses additional ways mobility may increase network capacity, security, and information dissemination if accounted for in protocol design from the start.
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS.ijaia
This document summarizes a research paper that proposes using an artificial neural network to analyze the best route for automobile vehicles in traffic conditions. It presents a neural network architecture with 5 input parameters (distance, traffic volume, number of signals, road condition, travel time) and 5 output routes. The network is trained on 243 input combinations and tested on unseen data. Test results showed the network with backpropagation had 91.2% accuracy and lower error than without backpropagation. The research aims to help commuters optimize routes based on traffic parameters, though assumptions about static conditions limit realism. Future work will analyze more dynamic traffic flow conditions.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
Synchronous mobile robots formation control is one of the most challenging and interesting fields
in robotics. The mobile robots communicate with each other through wireless communication to perform
similar movement. This study analyzed two mobile robots that can perform synchronous movement along
a shaped path. A square shape is set as a path for the mobile robot movements. The front robot being the
leading robot transmits the instruction of its movement to the robot b ehind it, acting as the following robot
through a wireless communication. The instruction sent by the leading robot is received by the following
robot through a program embedded in the leading robot microcontroller which then drives the following
robot to move and imitates the movement of the leading. The algorithm for the movement is tested on the
hardware and the results of the experiment are included to verify the effectiveness of the proposed
method.
Analysis of pavement management activities programming by particle swarm opti...IDES Editor
The document analyzes the use of particle swarm optimization (PSO) to program pavement maintenance activities at the network level for a pavement management system (PMS). PSO is shown to be effective at handling the highly constrained problem of programming pavement maintenance activities. The paper presents a novel model using PSO for PMS and determines the optimal rehabilitation activity and costs for a hypothetical road network consisting of 15 segments over 15 years. Numerical examples demonstrate the trade-offs between rehabilitation and maintenance costs under different cost functions. The results show that PSO is suitable for optimizing pavement management at the network level in PMS.
Improving Posture Accuracy of Non-Holonomic Mobile Robot System with Variable...TELKOMNIKA JOURNAL
This paper presents a method to decrease imprecision and inaccuracy that have the tendency to
influence the posture of non-holonomic mobile robot by using the adaptive tuning of universe of discourse.
As such, the primary objective of the study is to force the posture error of , , and towards
zero. Hence, for each step of tuning the fuzzy domain, about 20% of imprecision and inaccuracy had been
added automatically into the variable universe fuzzy, while the control input was bound via scaling gain.
Furthermore, the simulation results showed that the tuning of universe fuzzy parameters could increase
the performance of the system from the aspects of response time and error for steady state through better
control of inaccuracy. Besides, the domains of universe fuzzy input [-4,4] and output [0,6] exhibited good
performance in inching towards zero values as the steady state error was about 1% for x(t) position, 0.02%
for y(t) position, and 0.16% for θ(t) orientation, whereas the posture error in the given reference was about
0.0002% .
Autonomous Path Planning and Navigation of a Mobile Robot with Multi-Sensors ...CSCJournals
The mobile robot is applied widely and investigated deeply in industrial fields, meanwhile, mobile robot autonomous path planning and navigation algorithm is a hot research topic. In this paper, firstly mobile robot is introduced, the general path planning and navigation algorithms of the mobile robot are reviewed, then a fuzzy logic with filter smoothing is proposed based on the data from the laser scan sensor and GPS module, which is useful for mobile robot to find the best path to the destination automatically according to the position and size of the gaps between the obstacles in the dynamic environment, finally our designed mobile robot and corresponding Android APP are introduced, the path planning and navigation algorithms are tested on this mobile robot, the testing result shows that this algorithm is globally optimized, quickly responded, battery power and hardware cost saved compared with other algorithms, it is suitable for the mobile robot that is running on the embedded system and it can satisfy our design requirement.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...CSCJournals
Routing in Vehicular Adhoc Networks is a challenging task where the nodes themselves are vehicles. The mobility factors such as beacon intervals and vehicles with different velocities may cause inaccuracy in the identification of the vehicle's position. This in turn affects the performance of the position based routing protocols. Further, there is a need to evaluate through simulations performance of the position based routing protocol, especially in urban realistic scenarios for VANETs. The work in this paper evaluates the performance of Greedy Perimeter Stateless Routing protocol (GPSR) for VANETs which is a popular position based protocol especially for routing in MANETs. In order to evaluate realistic simulation environment bi-directional coupling of OMNET++/ INET Framework and SUMO is chosen for Nagarbhavi region in Bengaluru, India. The simulations are done for various scenarios realizing the impact of mobility parameters on routing using GPSR, and performance is measured in terms of packet delivery ratio and throughput.
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure CommunicationIOSR Journals
This document summarizes a research paper on using vehicle-to-infrastructure communication to avoid obstacles in vehicle-to-vehicle communication. The proposed model introduces infrastructure like base stations that vehicles can communicate with if a vehicle obstacle prevents direct vehicle-to-vehicle communication. When a vehicle moves out of range of other vehicles, it searches for the nearest base station to relay messages. The model analyzes factors like spacing between vehicles, vehicle speed and dimensions, infrastructure location, and uses a geocast routing protocol to transmit messages through vehicles and infrastructure. This approach provides an alternative communication method when vehicle obstacles block line-of-sight between vehicles.
Reconstruction of a Complete Dataset from an Incomplete Dataset by ARA (Attri...Waqas Tariq
Preprocessing is crucial steps used for variety of data warehousing and mining Real world data is noisy and can often suffer from corruptions or incomplete values that may impact the models created from the data. Accuracy of any mining algorithm greatly depends on the input data sets. Incomplete data sets have become almost ubiquitous in a wide variety of application domains. Common examples can be found in climate and image data sets, sensor data sets and medical data sets. The incompleteness in these data sets may arise from a number of factors: in some cases it may simply be a reflection of certain measurements not being available at the time; in others the information may be lost due to partial system failure; or it may simply be a result of users being unwilling to specify attributes due to privacy concerns. When a significant fraction of the entries are missing in all of the attributes, it becomes very difficult to perform any kind of reasonable extrapolation on the original data. For such cases, we introduce the novel idea of attribute weightage, in which we give weight to every attribute for prediction of the complete data set from incomplete data sets, on which the data mining algorithms can be directly applied. The attraction behind the idea of weights on attribute and finally averaging it. We demonstrate the effectiveness of the approach on a variety of real data sets. This paper describes a theory and implementation of a new filter ARA (Attribute Relation Analysis) to the WEKA workbench, for finding the complete dataset from an incomplete dataset.
Russia has a population of over 143 million people and is the largest country in the world by area at over 17 million square kilometers. It spans two continents of Europe and Asia and has over 1,100 cities. The capital and largest city is Moscow, followed by Saint Petersburg, Novosibirsk, Yekaterinburg, and Nizhniy Novgorod as the other largest cities. Russia has a variety of climates from very hot summer temperatures to very cold winter temperatures and is washed by seas and oceans on all sides.
This document discusses photo options for representing eating disorders in a campaign for an eating disorder charity. It analyzes several black and white photos that depict skinny girls in various poses and scenarios meant to convey the struggles of living with an eating disorder. The photos use gestures and expressions to symbolize feelings of not being skinny enough, constant battle against oneself, cry for help, and loss of control over the illness at its final stages.
Государство, которое предоставляет информацию гражданам, делится с ними и своей властью. Даже если немного... и неохотно :)
Discover open data developing and dynamics in Russian Federation from 2012 till 2016
El documento habla sobre las características clave de Web 2.0, incluyendo el compartir información, redes sociales, contenidos y aplicaciones, comunidades de usuarios, intercambio de información y colaboración a través de plataformas que facilitan la organización inteligente y el trabajo colaborativo entre usuarios.
Synchronous mobile robots formation control is one of the most challenging and interesting fields
in robotics. The mobile robots communicate with each other through wireless communication to perform
similar movement. This study analyzed two mobile robots that can perform synchronous movement along
a shaped path. A square shape is set as a path for the mobile robot movements. The front robot being the
leading robot transmits the instruction of its movement to the robot b ehind it, acting as the following robot
through a wireless communication. The instruction sent by the leading robot is received by the following
robot through a program embedded in the leading robot microcontroller which then drives the following
robot to move and imitates the movement of the leading. The algorithm for the movement is tested on the
hardware and the results of the experiment are included to verify the effectiveness of the proposed
method.
Analysis of pavement management activities programming by particle swarm opti...IDES Editor
The document analyzes the use of particle swarm optimization (PSO) to program pavement maintenance activities at the network level for a pavement management system (PMS). PSO is shown to be effective at handling the highly constrained problem of programming pavement maintenance activities. The paper presents a novel model using PSO for PMS and determines the optimal rehabilitation activity and costs for a hypothetical road network consisting of 15 segments over 15 years. Numerical examples demonstrate the trade-offs between rehabilitation and maintenance costs under different cost functions. The results show that PSO is suitable for optimizing pavement management at the network level in PMS.
Improving Posture Accuracy of Non-Holonomic Mobile Robot System with Variable...TELKOMNIKA JOURNAL
This paper presents a method to decrease imprecision and inaccuracy that have the tendency to
influence the posture of non-holonomic mobile robot by using the adaptive tuning of universe of discourse.
As such, the primary objective of the study is to force the posture error of , , and towards
zero. Hence, for each step of tuning the fuzzy domain, about 20% of imprecision and inaccuracy had been
added automatically into the variable universe fuzzy, while the control input was bound via scaling gain.
Furthermore, the simulation results showed that the tuning of universe fuzzy parameters could increase
the performance of the system from the aspects of response time and error for steady state through better
control of inaccuracy. Besides, the domains of universe fuzzy input [-4,4] and output [0,6] exhibited good
performance in inching towards zero values as the steady state error was about 1% for x(t) position, 0.02%
for y(t) position, and 0.16% for θ(t) orientation, whereas the posture error in the given reference was about
0.0002% .
Autonomous Path Planning and Navigation of a Mobile Robot with Multi-Sensors ...CSCJournals
The mobile robot is applied widely and investigated deeply in industrial fields, meanwhile, mobile robot autonomous path planning and navigation algorithm is a hot research topic. In this paper, firstly mobile robot is introduced, the general path planning and navigation algorithms of the mobile robot are reviewed, then a fuzzy logic with filter smoothing is proposed based on the data from the laser scan sensor and GPS module, which is useful for mobile robot to find the best path to the destination automatically according to the position and size of the gaps between the obstacles in the dynamic environment, finally our designed mobile robot and corresponding Android APP are introduced, the path planning and navigation algorithms are tested on this mobile robot, the testing result shows that this algorithm is globally optimized, quickly responded, battery power and hardware cost saved compared with other algorithms, it is suitable for the mobile robot that is running on the embedded system and it can satisfy our design requirement.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...CSCJournals
Routing in Vehicular Adhoc Networks is a challenging task where the nodes themselves are vehicles. The mobility factors such as beacon intervals and vehicles with different velocities may cause inaccuracy in the identification of the vehicle's position. This in turn affects the performance of the position based routing protocols. Further, there is a need to evaluate through simulations performance of the position based routing protocol, especially in urban realistic scenarios for VANETs. The work in this paper evaluates the performance of Greedy Perimeter Stateless Routing protocol (GPSR) for VANETs which is a popular position based protocol especially for routing in MANETs. In order to evaluate realistic simulation environment bi-directional coupling of OMNET++/ INET Framework and SUMO is chosen for Nagarbhavi region in Bengaluru, India. The simulations are done for various scenarios realizing the impact of mobility parameters on routing using GPSR, and performance is measured in terms of packet delivery ratio and throughput.
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure CommunicationIOSR Journals
This document summarizes a research paper on using vehicle-to-infrastructure communication to avoid obstacles in vehicle-to-vehicle communication. The proposed model introduces infrastructure like base stations that vehicles can communicate with if a vehicle obstacle prevents direct vehicle-to-vehicle communication. When a vehicle moves out of range of other vehicles, it searches for the nearest base station to relay messages. The model analyzes factors like spacing between vehicles, vehicle speed and dimensions, infrastructure location, and uses a geocast routing protocol to transmit messages through vehicles and infrastructure. This approach provides an alternative communication method when vehicle obstacles block line-of-sight between vehicles.
Reconstruction of a Complete Dataset from an Incomplete Dataset by ARA (Attri...Waqas Tariq
Preprocessing is crucial steps used for variety of data warehousing and mining Real world data is noisy and can often suffer from corruptions or incomplete values that may impact the models created from the data. Accuracy of any mining algorithm greatly depends on the input data sets. Incomplete data sets have become almost ubiquitous in a wide variety of application domains. Common examples can be found in climate and image data sets, sensor data sets and medical data sets. The incompleteness in these data sets may arise from a number of factors: in some cases it may simply be a reflection of certain measurements not being available at the time; in others the information may be lost due to partial system failure; or it may simply be a result of users being unwilling to specify attributes due to privacy concerns. When a significant fraction of the entries are missing in all of the attributes, it becomes very difficult to perform any kind of reasonable extrapolation on the original data. For such cases, we introduce the novel idea of attribute weightage, in which we give weight to every attribute for prediction of the complete data set from incomplete data sets, on which the data mining algorithms can be directly applied. The attraction behind the idea of weights on attribute and finally averaging it. We demonstrate the effectiveness of the approach on a variety of real data sets. This paper describes a theory and implementation of a new filter ARA (Attribute Relation Analysis) to the WEKA workbench, for finding the complete dataset from an incomplete dataset.
Russia has a population of over 143 million people and is the largest country in the world by area at over 17 million square kilometers. It spans two continents of Europe and Asia and has over 1,100 cities. The capital and largest city is Moscow, followed by Saint Petersburg, Novosibirsk, Yekaterinburg, and Nizhniy Novgorod as the other largest cities. Russia has a variety of climates from very hot summer temperatures to very cold winter temperatures and is washed by seas and oceans on all sides.
This document discusses photo options for representing eating disorders in a campaign for an eating disorder charity. It analyzes several black and white photos that depict skinny girls in various poses and scenarios meant to convey the struggles of living with an eating disorder. The photos use gestures and expressions to symbolize feelings of not being skinny enough, constant battle against oneself, cry for help, and loss of control over the illness at its final stages.
Государство, которое предоставляет информацию гражданам, делится с ними и своей властью. Даже если немного... и неохотно :)
Discover open data developing and dynamics in Russian Federation from 2012 till 2016
El documento habla sobre las características clave de Web 2.0, incluyendo el compartir información, redes sociales, contenidos y aplicaciones, comunidades de usuarios, intercambio de información y colaboración a través de plataformas que facilitan la organización inteligente y el trabajo colaborativo entre usuarios.
This document accompanies the YouTube video:
https://youtu.be/ttthb1pSdwo
The following topics are covered:
- the user interface of Scratch (stage, scripts area, sprites pane etc)
- block groups (events, control, sensing etc)
Intelligent Robotics Navigation System: Problems, Methods, and Algorithm IJECEIAES
This paper set out to supplement new studies with a brief and comprehensible review of the advanced development in the area of the navigation system, starting from a single robot, multi-robot, and swarm robots from a particular perspective by taking insights from these biological systems. The inspiration is taken from nature by observing the human and the social animal that is believed to be very beneficial for this purpose. The intelligent navigation system is developed based on an individual characteristic or a social animal biological structure. The discussion of this paper will focus on how simple agent’s structure utilizes flexible and potential outcomes in order to navigate in a productive and unorganized surrounding. The combination of the navigation system and biologically inspired approach has attracted considerable attention, which makes it an important research area in the intelligent robotic system. Overall, this paper explores the implementation, which is resulted from the simulation performed by the embodiment of robots operating in real environments.
This document summarizes a research paper about motion planning for multiple robots in a non-rectangular workspace. The paper aims to utilize advantages of both centralized and decentralized planning approaches to minimize limitations. Collision detection is performed by checking if new robot positions overlap with other robot areas. Path planning ensures robots avoid boundaries while reaching destinations. Simulation results show robots reaching targets over time. Adding robots or changing boundaries has minimal effect on planning time. The research is limited to geometric aspects rather than physical robot interaction dynamics.
A review of multi-agent mobile robot systems applicationsIJECEIAES
A multi-agent robot system (MARS) is one of the most important topics nowadays. The basic task of this system is based on distributive and cooperative work among agents (robots). It combines two important systems; multi-agent system (MAS) and multi-robots system (MRS). MARS has been used in many applications such as navigation, path planning detection systems, negotiation protocol, and cooperative control. Despite the wide applicability, many challenges still need to be solved in this system such as the communication links among agents, obstacle detection, power consumption, and collision avoidance. In this paper, a survey of the motivations, contributions, and limitations for the researchers in the MARS field is presented and illustrated. Therefore, this paper aims at introducing new study directions in the field of MARS.
AN APPROACH OF IR-BASED SHORT-RANGE CORRESPONDENCE SYSTEMS FOR SWARM ROBOT BA...ijaia
This paper exhibits a short-run correspondence method appropriate for swarm versatile robots application.
Infrared is utilized for transmitting and accepting information and obstruction location. The infrared
correspondence code based swarm signaling is utilized for an independent versatile robot communication
system in this research. A code based signaling system is developed for transmitting information between
different entities of robot. The reflected infrared sign is additionally utilized for separation estimation for
obstruction evasion. Investigation of robot demonstrates the possibility of utilizing infrared signs to get a
solid nearby correspondence between swarm portable robots. This paper exhibits a basic decentralized
control for swarm of self-collecting robots. Every robot in the code based swarm signaling is completely
self-governing and controlled utilizing a conduct based methodology with just infrared-based nearby
detecting and correspondences. The viability of the methodology has been checked with simulation, for a
set of swarm robots.
Comparison Between Genetic Fuzzy Methodology and Q-Learning for Collaborative...gerogepatton
A comparison between two machine learning approaches viz., Genetic Fuzzy Methodology and Q-learning,
is presented in this paper. The approaches are used to model controllers for a set of collaborative robots
that need to work together to bring an object to a target position. The robots are fixed and are attached to
the object through elastic cables. A major constraint considered in this problem is that the robots cannot
communicate with each other. This means that at any instant, each robot has no motion or control
information of the other robots and it can only pull or release its cable based only on the motion states of
the object. This decentralized control problem provides a good example to test the capabilities and
restrictions of these two machine learning approaches. The system is first trained using a set of training
scenarios and then applied to an extensive test set to check the generalization achieved by each method.
Comparison Between Genetic Fuzzy Methodology and Q-Learning for Collaborative...ijaia
A comparison between two machine learning approaches viz., Genetic Fuzzy Methodology and Q-learning, is presented in this paper. The approaches are used to model controllers for a set of collaborative robots that need to work together to bring an object to a target position. The robots are fixed and are attached to the object through elastic cables. A major constraint considered in this problem is that the robots cannot communicate with each other. This means that at any instant, each robot has no motion or control information of the other robots and it can only pull or release its cable based only on the motion states of the object. This decentralized control problem provides a good example to test the capabilities and restrictions of these two machine learning approaches. The system is first trained using a set of training scenarios and then applied to an extensive test set to check the generalization achieved by each method.
COMPARISON BETWEEN GENETIC FUZZY METHODOLOGY AND Q-LEARNING FOR COLLABORATIVE...ijaia
A comparison between two machine learning approaches viz., Genetic Fuzzy Methodology and Q-learning,
is presented in this paper. The approaches are used to model controllers for a set of collaborative robots
that need to work together to bring an object to a target position. The robots are fixed and are attached to
the object through elastic cables. A major constraint considered in this problem is that the robots cannot
communicate with each other. This means that at any instant, each robot has no motion or control
information of the other robots and it can only pull or release its cable based only on the motion states of
the object. This decentralized control problem provides a good example to test the capabilities and
restrictions of these two machine learning approaches. The system is first trained using a set of training
scenarios and then applied to an extensive test set to check the generalization achieved by each method.
Swarm robotics : Design and implementationIJECEIAES
This document summarizes the design and implementation of a swarm robotics system. The goal was to demonstrate swarming and herding behavior using simple robots. Cheap 8-bit microcontrollers were used as the brain for each autonomous robot in the swarm. The robots used infrared sensors to sense each other and limit switches to sense obstacles without direct communication. The design included the hardware components, circuit layout, and software algorithm to enable the robots to aggregate at a location from random starting points and move together as a group. Testing showed the robots could achieve semi-consistent swarming behavior through decentralized control guided by a simple artificial intelligence algorithm.
Impact of initialization of a modified particle swarm optimization on coopera...IJECEIAES
Swarm robotic is well known for its flexibility, scalability and robustness that make it suitable for solving many real-world problems. Source searching which is characterized by complex operation due to the spatial characteristic of the source intensity distribution, uncertain searching environments and rigid searching constraints is an example of application where swarm robotics can be applied. Particle swarm optimization (PSO) is one of the famous algorithms have been used for source searching where its effectiveness depends on several factors. Improper parameter selection may lead to a premature convergence and thus robots will fail (i.e., low success rate) to locate the source within the given searching constraints. Additionally, target overshooting and improper initialization strategies may lead to a nonoptimal (i.e., take longer time to converge) target searching. In this study, a modified PSO and three different initializations strategies (i.e., random, equidistant and centralized) were proposed. The findings shown that the proposed PSO model successfully reduce the target overshooting by choosing optimal PSO parameters and has better convergence rate and success rate compared to the benchmark algorithms. Additionally, the findings also indicate that the random initialization give better searching success compared to equidistant and centralize initialization.
A Multi-robot System Coordination Design and Analysis on Wall Follower Robot ...IJECEIAES
In this research, multi-robot formation can be established according to the environment or workspace. Group of robots will move sequently if there is no space for robots to stand side by side. Leader robot will be on the front of all robots and follow the right wall. On the other hand, robots will move side by side if there is a large space between them. Leader robot will be tracked the wall on its right side and follow on it while every follower moves side by side. The leader robot have to broadcast the information to all robots in the group in radius 9 meters. Nevertheless, every robot should be received information from leader robot to define their movements in the area. The error provided by fuzzy output process which is caused by read data from ultrasound sensor will drive to more time process. More sampling can reduce the error but it will drive more execution time. Furthermore, coordination time will need longer time and delay. Formation will not be establisehed if packet error happened in the communication process because robot will execute wrong command.
Swarm Intelligence for Logistics ControllingIRJET Journal
This document describes a proposed system using swarm robotics for logistics and warehouse management. The system would use a swarm of simple robots that communicate and coordinate their actions to complete tasks like transporting and arranging items in a warehouse efficiently. Each robot would have lifting and placement mechanisms and sensors for navigation and tracking. The robots would use local rules and decentralized control without a single leader to organize themselves and complete tasks reliably with flexibility to different environments and minimal human intervention. This approach aims to minimize costs, errors and increase efficiency over traditional manual warehouse operations.
This document summarizes a research paper that presents the design and implementation of a neural network controller for an autonomous robot using an FPGA (field programmable gate array). The neural network controller is implemented on the FPGA chip using a reference compensation technique for online learning. Simulation results show that the developed neural network hardware is able to successfully control the trajectory of an autonomous robot and balance it as a nonlinear model.
A Global Integrated Artificial Potential Field/Virtual Obstacles Path Plannin...IRJET Journal
This document presents a global path planning algorithm using an artificial potential field (APF) approach for multi-robot systems. A 3D potential map is created using simplified potential functions that account for attractive forces to goals and repulsive forces from obstacles. The local minima problem is handled using virtual obstacles. Simulations are conducted in MATLAB and V-REP to test controlling robots to follow paths generated from the 3D potential map in cluttered environments.
This document describes a new approach for behavioral control of swarm robots using implicit communication. The key aspects of the proposed algorithm are:
1) Robots can operate in either a centralized or decentralized mode. In centralized mode, one robot acts as the leader and others follow. In decentralized mode, each robot plans its path individually.
2) Robots can switch between these modes depending on obstacles. If an obstacle disrupts communication between the leader and follower, they switch to decentralized mode.
3) Robots are equipped with sensors like IR sensors for obstacle avoidance and an IR seeker to navigate toward a goal. RF transceivers enable implicit communication between robots.
4) The algorithm was implemented using
High-Speed Neural Network Controller for Autonomous Robot Navigation using FPGAiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Robot operating system based autonomous navigation platform with human robot ...TELKOMNIKA JOURNAL
In emerging technologies, indoor service robots are playing a vital role for people who are physically challenged and visually impaired. The service robots are efficient and beneficial for people to overcome the challenges faced during their regular chores. This paper proposes the implementation of autonomous navigation platforms with human-robot interaction which can be used in service robots to avoid the difficulties faced in daily activities. We used the robot operating system (ROS) framework for the implementation of algorithms used in auto navigation, speech processing and recognition, and object detection and recognition. A suitable robot model was designed and tested in the Gazebo environment to evaluate the algorithms. The confusion matrix that was created from 125 different cases points to the decent correctness of the model.
Hunting strategy for multi-robot based on wolf swarm algorithm and artificial...IJEECSIAES
The cooperation and coordination in multi-robot systems is a popular topic in the field of robotics and artificial intelligence, thanks to its important role in solving problems that are better solved by several robots compared to a single robot. Cooperative hunting is one of the important problems that exist in many areas such as military and industry, requiring cooperation between robots in order to accomplish the hunting process effectively. This paper proposed a cooperative hunting strategy for a multi-robot system based on wolf swarm algorithm (WSA) and artificial potential field (APF) in order to hunt by several robots a dynamic target whose behavior is unexpected. The formation of the robots within the multi-robot system contains three types of roles: the leader, the follower, and the antagonist. Each role is characterized by a different cognitive behavior. The robots arrive at the hunting point accurately and rapidly while avoiding static and dynamic obstacles through the artificial potential field algorithm to hunt the moving target. Simulation results are given in this paper to demonstrate the validity and the effectiveness of the proposed strategy.
Hunting strategy for multi-robot based on wolf swarm algorithm and artificial...nooriasukmaningtyas
The cooperation and coordination in multi-robot systems is a popular topic in the field of robotics and artificial intelligence, thanks to its important role in solving problems that are better solved by several robots compared to a single robot. Cooperative hunting is one of the important problems that exist in many areas such as military and industry, requiring cooperation between robots in order to accomplish the hunting process effectively. This paper proposed a cooperative hunting strategy for a multi-robot system based on wolf swarm algorithm (WSA) and artificial potential field (APF) in order to hunt by several robots a dynamic target whose behavior is unexpected. The formation of the robots within the multi-robot system contains three types of roles: the leader, the follower, and the antagonist. Each role is characterized by a different cognitive behavior. The robots arrive at the hunting point accurately and rapidly while avoiding static and dynamic obstacles through the artificial potential field algorithm to hunt the moving target. Simulation results are given in this paper to demonstrate the validity and the effectiveness of the proposed strategy.
Design of a controller for wheeled mobile robots based on automatic movement ...TELKOMNIKA JOURNAL
This document describes a controller for wheeled mobile robots that generates adaptive movement sequences based on an optimization algorithm. The controller codes movements using the ROS language from motion sets built by a genetic algorithm in a simulation environment. It uses a modified genetic algorithm with increased crossing operators and threshold-based selection of crossing and mutation to evolve robot movement parameter sets. The goal is to develop a controller that allows a robot to adaptively move between points in its environment based on sensory information without being limited to pre-defined or reactive movements.
A review article summarizes swarm robotics, including its key characteristics, behaviors inspired by nature, and applications. The article discusses simulating swarm behaviors and deploying them using robot hardware. It reviews the evolution of swarm robotics from early research to current applications and outlines future directions, with the goal of bridging theory and industrial practice.
Similar to Semi-Autonomous Control of a Multi-Agent Robotic System for Multi-Target Operations (20)
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
Widget is a kind of application provides a single service such as a map, news feed, simple clock, battery-life indicators, etc. This kind of interactive software object has been developed to facilitate user interface (UI) design. A user interface (UI) function may be implemented using different widgets with the same function. In this article, we present the widget as a platform that is generally used in various applications, such as in desktop, web browser, and mobile phone. We also describe a visual menu of Java Swing’s components that will be used to establish widget. It will assume that we have successfully compiled and run a program that uses Swing components.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
The Web is providing unprecedented access to information and interaction for people with disabilities. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the disabled Arab users and facilitates their lifelong learning as well. The proposed framework system provides the disabled Arab user with an easy means of access using their mother language so they don’t have to overcome the barrier of learning the target-spoken language. This framework is based on analyzing the web page meta-language, extracting its content and reformulating it in a suitable format for the disabled users. The basic objective of this framework is supporting the equal rights of the Arab disabled people for their access to the education and training with non disabled people. Key Words : Arabic Moon code, Arabic Sign Language, Deaf, Deaf-blind, E-learning Interactivity, Moon code, Web accessibility , Web framework , Web System, WWW.
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
The document proposes a new method for real-time blinking detection based on Gabor filters. It begins by reviewing existing methods and their limitations in dealing with noise, variations in eye shape, and blinking speed. The proposed method uses a Gabor filter to extract the top and bottom arcs of the eye from an image. It then measures the distance between these arcs and compares it to a threshold: a distance below the threshold indicates a closed eye, while a distance above indicates an open eye. The document claims this Gabor filter-based approach is robust to noise, variations in eye shape and blinking speed. It presents experimental results showing the method can accurately detect blinking across different users.
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
A method for computer input with human eyes-only using two Purkinje images which works in a real time basis without calibration is proposed. Experimental results shows that cornea curvature can be estimated by using two light sources derived Purkinje images so that no calibration for reducing person-to-person difference of cornea curvature. It is found that the proposed system allows usersf movements of 30 degrees in roll direction and 15 degrees in pitch direction utilizing detected face attitude which is derived from the face plane consisting three feature points on the face, two eyes and nose or mouth. Also it is found that the proposed system does work in a real time basis.
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
Mobile multimedia service is relatively new but has quickly dominated people¡¯s lives, especially among young people. To explain this popularity, this study applies and modifies the Technology Acceptance Model (TAM) to propose a research model and conduct an empirical study. The goal of study is to examine the role of Perceived Enjoyment (PE) and what determinants can contribute to PE in the context of using mobile multimedia service. The result indicates that PE is influencing on Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) and directly Behavior Intention (BI). Aesthetics and flow are key determinants to explain Perceived Enjoyment (PE) in mobile multimedia usage.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
The main aim of this paper is to build a system that is capable of detecting and recognizing the hand gesture in an image captured by using a camera. The system is built based on Altera’s FPGA DE2 board, which contains a Nios II soft core processor. Image processing techniques and a simple but effective algorithm are implemented to achieve this purpose. Image processing techniques are used to smooth the image in order to ease the subsequent processes in translating the hand sign signal. The algorithm is built for translating the numerical hand sign signal and the result are displayed on the seven segment display. Altera’s Quartus II, SOPC Builder and Nios II EDS software are used to construct the system. By using SOPC Builder, the related components on the DE2 board can be interconnected easily and orderly compared to traditional method that requires lengthy source code and time consuming. Quartus II is used to compile and download the design to the DE2 board. Then, under Nios II EDS, C programming language is used to code the hand sign translation algorithm. Being able to recognize the hand sign signal from images can helps human in controlling a robot and other applications which require only a simple set of instructions provided a CMOS sensor is included in the system.
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
A brain–computer interface (BCI) is a proficient result in the research field of human- computer synergy, where direct articulation between brain and an external device occurs resulting in augmenting, assisting and repairing human cognitive. Advanced works like generating brain-computer interface switch technologies for intermittent (or asynchronous) control in natural environments or developing brain-computer interface by Fuzzy logic Systems or by implementing wavelet theory to drive its efficacies are still going on and some useful results has also been found out. The requirements to develop this brain machine interface is also growing day by day i.e. like neuropsychological rehabilitation, emotion control, etc. An overview on the control theory and some advanced works on the field of brain machine interface are shown in this paper.
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
There is growing ageing phenomena with the rise of ageing population throughout the world. According to the World Health Organization (2002), the growing ageing population indicates 694 million, or 223% is expected for people aged 60 and over, since 1970 and 2025.The growth is especially significant in some advanced countries such as North America, Japan, Italy, Germany, United Kingdom and so forth. This growing older adult population has significantly impact the social-culture, lifestyle, healthcare system, economy, infrastructure and government policy of a nation. However, there are limited research studies on the perception and usage of a mobile phone and its service for senior citizens in a developing nation like Malaysia. This paper explores the relationship between mobile phones and senior citizens in Malaysia from the perspective of a developing country. We conducted an exploratory study using contextual interviews with 5 senior citizens of how they perceive their mobile phones. This paper reveals 4 interesting themes from this preliminary study, in addition to the findings of the desirable mobile requirements for local senior citizens with respect of health, safety and communication purposes. The findings of this study bring interesting insight to local telecommunication industries as a whole, and will also serve as groundwork for more in-depth study in the future.
Principles of Good Screen Design in WebsitesWaqas Tariq
Visual techniques for proper arrangement of the elements on the user screen have helped the designers to make the screen look good and attractive. Several visual techniques emphasize the arrangement and ordering of the screen elements based on particular criteria for best appearance of the screen. This paper investigates few significant visual techniques in various web user interfaces and showcases the results for better understanding and their presence.
This document discusses the progress of virtual teams in Albania. It provides context on virtual teams and how they differ from traditional teams in their reliance on technology for communication across distances. The document then examines the use of virtual teams in Albania, noting the growing infrastructure and technology usage that enables virtual collaboration. It highlights some virtual team examples in Albanian government and academic projects.
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
A paradox has been observed whereby web site usability is proven to be an essential element in a web site, yet at the same time there exist an abundance of web pages with poor usability. This discrepancy is the result of limitations that are currently preventing web developers in the commercial sector from producing usable web sites. In this paper we propose a framework whose objective is to alleviate this problem by automating certain aspects of the usability evaluation process. Mainstreaming comes as a result of automation, therefore enabling a non-expert in the field of usability to conduct the evaluation. This results in reducing the costs associated with such evaluation. Additionally, the framework allows the flexibility of adding, modifying or deleting guidelines without altering the code that references them since the guidelines and the code are two separate components. A comparison of the evaluation results carried out using the framework against published evaluations of web sites carried out by web site usability professionals reveals that the framework is able to automatically identify the majority of usability violations. Due to the consistency with which it evaluates, it identified additional guideline-related violations that were not identified by the human evaluators.
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
A robot arm utilized having meal support system based on computer input by human eyes only is proposed. The proposed system is developed for handicap/disabled persons as well as elderly persons and tested with able persons with several shapes and size of eyes under a variety of illumination conditions. The test results with normal persons show the proposed system does work well for selection of the desired foods and for retrieve the foods as appropriate as usersf requirements. It is found that the proposed system is 21% much faster than the manually controlled robotics.
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
In recent decades speech interactive systems have gained increasing importance. Performance of an ASR system mainly depends on the availability of large corpus of speech. The conventional method of building a large vocabulary speech recognizer for any language uses a top-down approach to speech. This approach requires large speech corpus with sentence or phoneme level transcription of the speech utterances. The transcriptions must also include different speech order so that the recognizer can build models for all the sounds present. But, for Telugu language, because of its complex nature, a very large, well annotated speech database is very difficult to build. It is very difficult, if not impossible, to cover all the words of any Indian language, where each word may have thousands and millions of word forms. A significant part of grammar that is handled by syntax in English (and other similar languages) is handled within morphology in Telugu. Phrases including several words (that is, tokens) in English would be mapped on to a single word in Telugu.Telugu language is phonetic in nature in addition to rich in morphology. That is why the speech technology developed for English cannot be applied to Telugu language. This paper highlights the work carried out in an attempt to build a voice enabled text editor with capability of automatic term suggestion. Main claim of the paper is the recognition enhancement process developed by us for suitability of highly inflecting, rich morphological languages. This method results in increased speech recognition accuracy with very much reduction in corpus size. It also adapts Telugu words to the database dynamically, resulting in growth of the corpus.
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
Word ambiguity removal is a task of removing ambiguity from a word, i.e. correct sense of word is identified from ambiguous sentences. This paper describes a model that uses Part of Speech tagger and three categories for word sense disambiguation (WSD). Human Computer Interaction is very needful to improve interactions between users and computers. For this, the Supervised and Unsupervised methods are combined. The WSD algorithm is used to find the efficient and accurate sense of a word based on domain information. The accuracy of this work is evaluated with the aim of finding best suitable domain of word. Keywords: Human Computer Interaction, Supervised Training, Unsupervised Learning, Word Ambiguity, Word sense disambiguation
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
From the existing research it has been observed that many techniques and methodologies are available for performing every step of Automatic Speech Recognition (ASR) system, but the performance (Minimization of Word Error Recognition-WER and Maximization of Word Accuracy Rate- WAR) of the methodology is not dependent on the only technique applied in that method. The research work indicates that, performance mainly depends on the category of the noise, the level of the noise and the variable size of the window, frame, frame overlap etc is considered in the existing methods. The main aim of the work presented in this paper is to use variable size of parameters like window size, frame size and frame overlap percentage to observe the performance of algorithms for various categories of noise with different levels and also train the system for all size of parameters and category of real world noisy environment to improve the performance of the speech recognition system. This paper presents the results of Signal-to-Noise Ratio (SNR) and Accuracy test by applying variable size of parameters. It is observed that, it is really very hard to evaluate test results and decide parameter size for ASR performance improvement for its resultant optimization. Hence, this study further suggests the feasible and optimum parameter size using Fuzzy Inference System (FIS) for enhancing resultant accuracy in adverse real world noisy environmental conditions. This work will be helpful to give discriminative training of ubiquitous ASR system for better Human Computer Interaction (HCI). Keywords: ASR Performance, ASR Parameters Optimization, Multi-Environmental Training, Fuzzy Inference System for ASR, ubiquitous ASR system, Human Computer Interaction (HCI)
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Semi-Autonomous Control of a Multi-Agent Robotic System for Multi-Target Operations
1. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 107
Semi-Autonomous Control of A Multi-Agent Robotic System for
Multi-Target Operations
Yushing Cheung ycheung@stevens.edu
Department of Mechanical Engineering,
Stevens Institute of Technology,
Hoboken, NJ 07030, USA
Jae H. Chung jchung3@stevens.edu
US Army RDECOM-ARDEC,
Building 95N,
Picatinny Arsenal, NJ 07806, USA
Abstract
Since multi-targets often occur in most applications, it is required that multi-robots are grouped to
work on multi-targets simultaneously. Therefore, this paper proposes a control method for a
single-master multi-slave (SMMS) teleoperator to control cooperative mobile multi-robots for a
multi-target mission. The major components of the proposed control method are the robot-target
pairing method and modified potential field based leader-follower formation.
The robot-target paring method is derived from the proven auction algorithm for a single target
and is extended for multi-robot multi-target cases, which optimizes effect-based robot-target
pairing based on heuristic and sensory data. The multi-robot multi-target pairing method can
produce a weighted attack guidance table (WAGT), which contains benefits of different robot-
target pairs. The robot-target pairing converges rapidly - as is the case for auction algorithms with
integer benefits.
Besides, as long as optimal robot-target pairs are obtained, a team is split into subteams formed
by paired robots regarding types and numbers of the robot-target pairs with the robot-target
pairing method. The subteams approach and then capture their own paired targets in the
modified potential field based leader-follower formation while avoiding sensed obstacles.
Simulation studies illustrate system efficacy with the proposed control method for multi-target
operations. Moreover, the paper is concluded with observations of enhanced system
performance.
Keywords: Teleoperation, Multi-target Operations, and Multi-agent Systems.
1. INTRODUCTION
Cooperative control of multi-agent robotic systems has been investigated in recent years [36, 47],
especially for tasks that cannot be handled by a single robot. It can improve dexterity of robots
and enlarge application fields of robots. Furthermore, Fox et. al. [19] have demonstrated that
multi-robots can localize themselves faster and more accurately if they exchange information
about their positions whenever they sense each other. Moreover, using several low-cost robots
introduces redundancy and therefore is more fault tolerant than having only one powerful and
expensive robot. Therefore, there have been many cooperative control methods, e.g. the
behavior based formation control, virtual structure approach, leader-follower approach, and
potential field based control method for multi-robot navigation and searching [2,12,26,29,42,43].
Balch and Arkin [2] presented behavior based formation control. The temporary distortion in a
formation was used to avoid obstacles. However, the system is not able to be analyzed in terms
of simple mathematic equations. Therefore, exact formation control of the system cannot be
guaranteed. Lalish et. al. [26] suggested the virtual structure approach by considering the robot
2. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 108
formation as a single virtual rigid structure. The behavior of the whole group is totally predictable,
and its formation is precisely maintained. However, a wider inter-robot communication is
necessary, which causes more communication delays. Desai et. al. [12] proposed a leader-
follower approach. One or more robots are designated as the leader(s) and responsible for
guiding the formation. The other robots are required to follow the leader(s) with predefined
clearances. This leader-follower approach has some benefits, e.g. its simplicity, modularity, and
reliability of the system and no need for heavy computation. However, the whole team is
potentially subjected to system malfunctions if the leader(s) break(s) down. In addition, there is a
risk that the followers get too close to each other while only keeping a constant leader-follower
distance without considering the follower-follower distances. Due to no interconnection between
the followers, the follower cannot distinguish between its team robots and obstacles. Therefore, if
the robot-robot distance that the robot needs to maintain in the team is different from the robot-
obstacle distance that the robot needs to keep from the obstacles, the follower may hit the other
robot or obstacle. Artificial potential functions have been extensively used for multi-robot
navigation and control [3,8,14,20,29,41,44]. The robots are attracted to the target while being
repulsed from the obstacles as if the robots and obstacles as positive ions and the target as a
negative ion were in potential fields.
By comparing those above mentioned approaches, the potential function based approaches
seemed to be useful tools from the view points of flexibility of configurations of robotic teams,
automatic avoidance of collisions of team robots, and stability of maintaining formations.
However, the multiple fields can sum to a vector with a zero magnitude. If the robot was being
attracted to a point behind the box canyon, the attractive vector would cancel the repulsive vector
and the robot would remain stationary because all forces would cancel out. This is called a local
minima problem [2,21,29,38,48].
Besides, all control methods discussed above for the robot cooperation are only for the fully
autonomous robots. Nonetheless, the unstructured nature of the worksite environments and the
limitations of the current sensors and computer decision-making technologies prohibit the use of
fully autonomous systems for the operations [1,17,18,22,27,28,37]. Therefore, it is required that
the human decision making be involved in the systems. Teleoperators, in which a human
operator is an integral part of the control, are established to integrate the human decisions to the
control loop of the systems. In order to minimize the required human resources and amplify the
human effort, a single-master multi-slave (SMMS) teleoperation is considered in this paper
[17,18, 22, 27, 28, 33,37].
Nevertheless, that a teleoperated robot may be of varying types with varying capabilities and
limitations places significant cognitive pressure on the operator. As has been demonstrated in
urban search and rescue activities [19], simply remotely operating a robotic system in a
challenging environment precludes significant secondary cognitive effort (such as scanning
rubble for survivors). The difficulties will be compounded when the human operator remotely
guides multiple robots in a rapidly evolving operational environment. Therefore, it is required that
some local robotic intelligence is added to the SMMS teleoperator to relieve human burden and
enhance the performance. Nonetheless, so far a few papers have discussed the semi-
autonomous SMMS teleoperation issues. Moreover, most of them were only focused on a single
target operation.
However, most applications [45,46] e.g. military operation, space exploration, rescue mission,
and etc, require a team of robots to form several subteams to capture multi-targets
simultaneously. Therefore, the robot-target pairing method is needed to identify a proper target
that can be captured by a suitable subteam of robots. Many different methods have been widely
applied in fully automatic coordinated multi-robotic systems [9,11,15,30,32,35,39]. Those
methods are a genetic or improved genetic [9,10,16,34], ant colony system [15,30], swarm
particle optimization (SPO) [11,32], market-based approaches [13,23,24,31], and auction or
decentralized cooperation auction [25,35,39]. Nonetheless, some of them [9,30,32] can have a
slow convergence to the global optimum when the others [13,39] have no ability to stably
3. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 109
converge to a global optimum. Hence, Bogdanowicz and Coleman et. al. [4] proposed a pairing
method for optimization of effect-based weapon-target pairing to decide a preferred weapon-
target combination by scanning a heuristic attack guidance table. Different from those previously
mentioned methods, it is a rule and function based method. Therefore, it can converge rapidly
and produce a suboptimal solution stably. Nonetheless, it is derived based on some heuristic data
that come from human experiences.
Due to the above mentioned problems, in this paper, the primary objective is to develop a control
method for a SMMS teleoperation system to cooperatively control mobile multi-robots for a multi-
target mission. Primary components of the proposed method are (1) modified potential field
based leader-follower formation and (2) robot-target pairings. During the operation, the human
operator only concentrates on teleoperating a team leader robot. All other team robots
autonomously make a formation with regard to its positions and velocities based on sensory
information. Therefore, the formation is able to be adapted by modifying their paths for obstacle
avoidance and target pursuit in the modified potential field based leader-follower formation. As
soon as the team is near the multi-targets, with the proposed robot-target pairing method, optimal
robot-target pairs are computed, and according to them, the team is autonomously split into
several subteams that are paired to appropriate targets. A subteam leader is selected based on
all robot functionalities and proximity to targets to lead each subteam. Each subteam leader is
able to guide all subteam robots to work on the paired targets when the subteam robots move
with respect its motion.
The rest of this paper is organized as follows. In Section 2, the control method that integrates the
primary components to capture multiple targets simultaneously with multiple subteams
independently for is proposed. This system with the proposed control method is aimed at relieving
human operator burden of teleoperating a robot team that is formed by several sub-teams in a
complex environment to handle multi-targets simultaneously. In Section 3, the conditional
transparency [5], i.e. the transparency if no human induced error is found, and effectiveness of
the task achievement of the SMMS teleoperation system with the proposed control method were
evaluated through simulation studies. Section 4 concludes this paper and shows future research
directions.
2. SEMI-AUTONOMOUS TELEOPERATION CONTROL METHOD FOR A
MULTI-ROBOTS-MULTI-TARGETS APPROACH
This paper proposes a control method for the semi-autonomous SMMS teleoperation to work on
a multi-target mission. The major components of the control method are (1) modified potential
field based leader-follower formation and (2) robot-target pairings. They are described in details in
the following. During robot navigation to targets, a team/subteam moves in (1) modified potential
field based leader-follower formation. Nonetheless, as long as the team is close enough to the
targets, it will be split into subteams that are paired to suitable targets with (2) robot-target pairing
method. Therefore, in the following, the two components are discussed and formulated in detail.
2.1 Modified Potential Field Based Leader-follower Formation
In order that the slave multi-robots can autonomously avoid the obstacles and keep a distance
from other neighboring robots simultaneously while tracking the target, the approach that the
most commonly has been used is potential field based formation control. Nonetheless, the
potential field based formation control has the local minima problem [29], which can hold the
robots in a specified formation while in motion. Therefore, the potential field based formation is
modified into the one with a prioritized bonding between slave neighboring robots in this paper.
The strength of the bonding between neighboring robots varies depending on which two robots
are connected.
For example, the bonding between neighboring team/subteam Leader and 1−Follower is the
strongest when the one between team/subteam nFollower− and Leader is the weakest if there
are n robots. Furthermore, as soon as the subteam is formed, only bonding between subteam
4. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 110
robots exists when the subteam followers move only with regard to their subteam leader. Thus,
the team/subteam formation becomes adaptive due to attraction to targets and repulsion from
obstacles. However, no team/subteam robot is left behind due to the robot-robot bonding with
different strengths, and no subteam robot movement is affected by other subteam/team robot
motion because of the elimination of the bonding between the subteam and irrelevant robots.
Besides, the team leader tracks the human commanded positions when the subteam leaders
follow the reference positions to capture the targets and avoid obstacles and neighboring robots.
In the potential field based leader-follower formation, all team/subteam follower paths are
generated by a sum of attraction, repulsion, and prioritized bonding. All team/subteam leader
paths are computed by a combination of the attraction and repulsion. In our discussion, we
assume that for Robot i , the control input,
i
iu generated by using the potential field based leader-
follower formation method are typically of the form.
i
b
i
r
i
a
i
i uuuu ++= (1)
where for Robot i ,
i
au is the control input caused by the attraction to the targets.
i
ru is the control
input caused by the repulsion from the obstacles.
i
bu is the control input caused by the robot-robot
bonding for the team/subteam followers.
i
bu can become zero for the team/subteam leaders. In
the following, the control inputs due to (1) the attraction to the targets, (2) repulsion from the
obstacles, and (3) bonding between robots are formulated and discussed.
2.1.1 Attraction to Targets
The control input
i
au in Eq (1) derived from the target potential functions for the robot is
formulated in Eq. (2).
Ti
i
a xu δϕ= (2)
where Txδ is the sensed distance between Robot i and the paired target. Robot i can be any
robot in a team or subteam. iϕ is a positive integer that becomes zero if the target is reached;
otherwise, it is larger than zero. As shown in Eq. (2), if Robot i is getting closer to the paired
target,
i
au is decreased. On the contrary, if it is leaving the paired target,
i
au is increased.
Therefore, it is attracted to the paired target all the time.
2.1.2 Repulsion from Obstacles
The control input
i
ru in Eq (1) derived from the obstacle potential functions is written in Eq. (3).
11 VbDku ee
i
r δδφ −−= (3)
where for Robot i , six
G
xV &2
0
1 ∂
−=δ , and 2
0
1 x
H
D ∂
−=δ . oxδ is the sensed robot-obstacle distance.
six is the position vector of Robot i . φ , G , H , ek , and eb are positive parameters. In Eq (3),
i
ru is increased when Robot i is heading toward obstacles. On the contrary,
i
ru is decreased
when it is steering away from the obstacles. Thus, it is repulsed from the obstacles all the time.
5. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 111
2.1.3 Bonding Between Robots
For team/subteam followers, the robot-robot bonding
i
bu in Eq. (1) is prioritized regarding the
roles of the neighboring robots and formulated in the following equation.
( )siisij
i
b xrku δ−−= min (4)
where for ni ......1= and nj ......1= , ji ≠ , ijk is the positive parameter. The bonding strength
varies because of different roles of the neighboring robots bonding to each other. isr min is the
preferred distance that Robot i needs to keep from neighboring robots. sixδ is the sensed
distance between Robot i and other robots. Therefore, the team/subteam followers move with
regard to their team/subteam leader motion while keeping a predefined constant distance from
team/subteam leader with Eq. (4) All team/subteam robots can also get around the obstacles with
Eq. (3) and move toward the targets with Eq. (2)
2.2 Robot-target Pairing Method
The robot-target pairing method is sensor based and semi-distributed because all robots act
largely independently in terms of planning for themselves but are able to take into account team
resources by working on the tasks with other robots. It is more flexible than the centralized robot-
target pairing method [9,30,32] in that each individual robot can respond to different environment
stimulus independently relying on its local sensory information. In addition, it is also more robust
and reliable than the distributed robot-target pairing method [13,39] in that each robot also can
take advantage of sharing team resources to work with other team robots. In this paper, the team
leader not only takes human commands via a master robot but also works with the robot-target
pairing method as an auctioneer to send and show all bid data e.g. robot-target distances and
their base prices. The bid data are also online shared by all robots, team leader and followers. All
other robots, e.g. team followers, act as bidders to form a subteam by themselves in order to
maximize a sum of all follower bid values and bid on the targets when the corresponding task on
the targets is performed by the cooperation of the subteam. In the subteam, the bidder with the
maximum bid value is selected as a subteam leader. The subteam leader is responsible for
monitoring and coordinating all subteam member actions. According to the largest bid proposed
by the subteam, the auctioneer, the team leader, decides which subteam wins the bid with a
restriction that only one target is gained by every subteam per auction. If all subteam bid values
are smaller than the base price, or any team robot cannot compute its bid value due to insufficient
sensed data surrounding the targets, the auctioneer obtains the bid. If any subteam already
completes the task on the target, it will inform the auctioneer to cancel the bid. The proposed
robot-target pairing method is formulated and further discussed in the following.
2.2.1 Robot-target Pairing Formulation and Discussion
Consider such a scenario, in a two-dimensional and limited rectangular environment X with
Cn square cells, pn slave robots pursue en targets, for ep nn > . The set of the robots is denoted
by a matrix of [ ]pnaaaA .......21= where pna is a robot matrix of pn . Robot Capability Vector j
for Taskt is denoted by
t
jCˆ , pnj ≤≤1 and the set of targets is represented by a target matrix of
[ ]enTTTT .......21= where enT is a target matrix of en . The vector representing the capability
required to accomplish Taskt on TargetT is denoted by
T
tC , enT ≤≤1 . Agent TA ∪ denotes
robot teams and targets. For simplification, we assume that both space and time can be
quantized, therefore the environment can be regarded as a finite collection of cells, denoted by
]....2,1[ cc nX = .There exist some static obstacles with fixed sizes and regular shapes, and their
locations are determined by the mapping ,1,0: →cXm for ( ) 1, threshxMXx c ≥∈∀ indicates
6. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 112
that the cell x is occupied by obstacles. ( ) 2, threshxMXx c ≤∈∀ indicates that the cell x is
free, where 12 threshthresh < represents the threshold value between 0 and 1. Thus, each
robot has different capabilities to complete different tasks on different targets.
Robot capability - For Taskt and Robot j , the weighted capability vectors of Robot j can be
defined as
{ }[ ]Tt
ju
t
j
t
ju
t
j
t
j
T
j
t
j ccbbbdiagwC .......ˆ
121= (5)
where u is the maximum number of the vectors, each of which represents the individual
functionality. The set of robot matrices is rewritten into
=
rnn
r
r
vv
aa
aa
aa
A
....
...........
...
...
1
221
111
where vn , for pv nn ≤<0 ,
is the total number of the robots in the team, and r , for enr ≤<0 is the total number of the
tasks.
t
jkc is a capability vector for Functionality k and Task t .
T
jw is a positive integer such that
for TargetT and Robot j , the following is satisfied. If the robot is assigned to the target, 0=T
jw ;
otherwise, 1=T
jw . The uu × dimension diagonal matrix of
t
jub is used to estimate the
percentage of possibility of using the 1×u dimensional capability vector
t
jC to do Task t by
Robot j successfully. However, if Robot j does not have Capability
t
jkc , then
t
jub is 0. Each
robot matrix in A has weighted capability vectors, e.g. for Robot j and Task t , [ ]Tt
jjt Ca ˆ= .
Capability Required Executing Tasks on Targets
It is assumed that one target can be paired to two or more robots, but one robot can only be
paired to one target. The capability vector that is required to accomplish Task t on Target T is
defined as
{ } tu
T
tu
T
t
T
t CdiagC ββ ....1= (6)
where the uu × dimension diagonal matrix of
T
tuβ is used to describe the percentage of possibility
of using the 1×u dimension capability vector tuC with which the robot can finish Taskt on Target
T . [ ]T
tuttu ccC ......1= when the total number of the vectors of the functionalities is u . tuc is the
capability vector that is required to complete Task t with Functionality u . However, if Task t
cannot be done successfully by any robot with the capability tuC on TargetT , then
T
tuβ is 0.
Otherwise,
T
tuβ is 1.
Subteam Capability
The subteam is a combination of the multi-robots that work on Task t cooperatively. For Robot
j and Task t , ( ) tjtj eaU =, where te is one if Taskt is assigned; otherwise, it is zero, and ja is
defined in Eq. (1) for minmax aja ≥≥ , 1min ≥a , and pna ≤max where
( ) sp naan =+− 1/ minmax where sn is the total number of subteams, and maxa and mina are the
7. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 113
number of the first and last robots forming Subteam y , respectively. Subteam y is represented
by a matrix of
=
),(),(
)1,()1,(
maxmin
maxmin
........
...........................
......
rara
aa
y
UU
UU
D where r is the total number of tasks. Then, matrix
A denoting a robot team formed by subteams, one of which is represented by yD , is rewritten
into { }qy DDDA .........1= where q is the total number of the combinations of multi-robots
(robot subteams) in the team. For Robot j and Task t , if 0ˆ >t
jC , then
( )
t
jtj CQ ˆ
, = for 1≥≥ jnp (7)
where { }),(),1( ..... tnt p
QQQ = is a positive integer. Subteam y capability vector for Taskt is
defined as
∑
=
=
=
a
b
ba
yj
yj
tj
y
tyy QC ),(),:(
~
(8)
where ab yy − , ab yy ≥∀ , is the total number of the robots in Subteam y . ay is the first and
by is the last indices of the elements in the matrix of Q for Task t and Subteam y . Subteam y
is able to perform Taskt on TargetT if the condition,
y
tyy
T
t ba
CC ),:(
~
≤ , is satisfied. Robot j is
selected as a subteam leader when its magnitude of the capability vector
t
jCˆ is largest in the
same subteam. It is assumed that the subteam leader knows all capability information about its
subteam members.
2.2.2 Bidding Winner Determination
TABLE 1: Weighted Attack Guidance Table (WAGT)
In Table 1, nNm , is a positive integer weight for Subteam n to bid on Target N . If ( )
n
Nyy ba
C ,:
~
is
smaller than the base price which is a positive integer, or Target N has already been assigned to
Robot Subteam n , nNm , is 0. Otherwise, nNm , is 1. By arranging nNm , and
N
nB into Table 1,
called Weighted Attack Guidance Table (WAGT), each row of WAGT corresponds to a target and
Robot Subteam (1 to n ) when n is the total number of the subteams formed in the team. In
addition, each column of WAGT corresponds to a robot combination (Robot Subteam) that works
on Targets (1 to N ) when N is the total number of the targets. Therefore, there are the N rows
and n columns in WAGT. The scanning proceeds from the first to the last column. Hence, the
robot combination (Robot Subteam) specified in column i takes precedence over combination of
8. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 114
robots specified in column 1+i . For example, for Subteam n , Task t , and Target N , the bid
value is weighted as follows.
( )( )N
tn
N
t
n
tyy
N
n XCCB ba
−−= 1
~
),:( (9)
where
N
tnX is the positive integer weight for Subteam n to do Target N . If Task t is the most
preferred by Subteam n to be done on Target N when
N
nB is the maximum value of the
element in the matrix of ( )nNB ,
~
, then
N
tnX =0. Otherwise,
N
tnX =1. Therefore, based on the
given subteams, targets, tasks, WAGT, and optimization of the robot-target pairing that is
described below, the bidding winner determination is made.
The optimization of the robot-target pairing is formulated as follows. Given Subteam y , Targets
N , Taskst , and WAGT, an assignment of the subteam is found in such a format that WAGT is
produced, and its corresponding objective function in Eq.(10) is maximized within the given
constraints in Eqs. (11) and (12). Therefore, we can state the optimization problem as follows. For
Target N and Subteam n−1 as seen in Table 1, the objective function is
( ) ( )[ ]nN
N
nN
N
mBmBNObjFun ,1,1 ......)( = .
Maximize )(NObjFun (10)
Subject to
∑
=
=
≥
ny
y
yNm
1
, 0 (11)
( )∑
=
=
≥
ny
y
yNB
1
0,
~
(12)
where yNm , is defined in Table 1. Initially, all yNm , is equal to one if no subteam is assigned to
any target. However, if Subteam y is assigned to Target N , yNm , is equal to zero 0& ≠∀ Ny
. Hence, Subteam y that proposes the maximum affordable value )( , yN
N
y mB can win Target N
by solving Eqs (10) within the constraints Eqs. (11) and (12). By using the proposed robot-target
pairing method, the robot-target pairs are stored into the resulted matrix e.g. a subteam-target
pair matrix IJ and given WAGT. For instances, Subteam y is paired to Target N when
Subteam )1( +y is paired to Target 1+N . The subteam-target pair matrix, IJ is written as
[ ]1,.., += NNJI when the first and second columns of the IJ represent which target is
properly paired to Subteam y and 1+y , respectively. In order to make the system be able to
split its team into subteams to work on different targets simultaneously, the robot-target pairing
method can also generate reference positions rX to each subteam robot to move toward its
target point by transforming IJ based on WAGT.
2.3 SMMS Teleoperator With Modified Potential Field Based Leader-follower Formation
and Robot-target Pairing Methods
9. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 115
Figure 1 represents the overall architecture of the SMMS teleoperation system with the proposed
control methods. The master and slave subsystems in Figures 1(a) and 1(b), respectively, are
connected over the wireless internet. The difference from the system proposed in our papers [5]
is that the slave subteam is operated fully autonomously with the modified potential field based
leader-follower formation method when the team leader is teleoperated by a human operator.
(a) Master subsystem
(b) Slave subsystem (leader/follower)
FIGURE 1: Modified SMMS system
In order to simplify a problem, the robot is not supposed to move so fast that the nonlinear
coefficients of the robotic dynamic equation can be ignored. The proposed system shown in
Figure 1 can be formulated into the following equations of motion with integration of the modified
potential field based leader-follower formation and robot-target pairing methods.
10. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 116
Master robot:
0=++ mmmmmm eKeBeM &&& (13)
Slave roboti :
( ) i
b
i
r
i
asisisisisisi uuueKeBeM )1(1 λσ −−++=++ &&& (14)
where for Robot i ,
i
au ,
i
ru , and
i
bu are defined in Eq (1). hmm xxe −= , hx and mx are the
human commanded and master sensed position vectors, respectively.
( )( ) hidealmsisi xxxxe ′−+′−= σσ 1 , six is the position vector of the slave roboti . mx′ is the
transmitted master position vector. idealx′ is the reference position vector computed with respect
to mx′ before a subteam is formed or rX generated by transforming IJ resulting from Eqs (10)-
(12) based on WAGT after the subteam is formed. σ is the control parameters of Robot i .
When Robot i is selected as a team leader, σ is turned into one; otherwise, it becomes zero.
When Robot i is appointed as a subteam leader, λ becomes one; otherwise, λ is zero. mB is
the master adaptive impedance matrix. mM is the inertia matrix of the master robot. mK is the
control parameters for the linear diagonal master matrices. siM is the inertia matrices of the
slave robot i . siB is the slave impedance matrix. siK is the control parameters for the linear
diagonal slave matrices.
By using Eqs. (13) and (14), the motion of the SMMS systems can be understood and modeled.
The team moves toward a region full of multi-targets in the modified potential field based leader-
follower formation when only team leader is teleoperated by the human operator via the master
robot and followers autonomously move with regard to its motion. When the team is close to the
targets, it can be split into subteams paired to targets with the robot-target pairing method by
solving Eqs (10) within the constraints in Eqs (11) and (12). The robot-target matrix IJ is
computed based on WAGT and transformed into the reference positions for the subteam robots
to approach and capture the paired targets. During navigation to the paired targets, the subteams
automatically move in the modified potential field based leader-follower formation again. In the
formation, all subteam followers move with regard to their subteam leader's motion while the
subteam leader approaches a target point computed from IJ . All subteam robots including the
leader and followers can avoid obstacles while maintaining a formation. After the paired target is
reached, a task, e.g. target capture, is performed by the paired subteam robots.
In the following section, the SMMS teleoperator modeled in Eqs (13) and (14) is simulated for a
further study on enhancement of the performance in terms of conditional transparency [5] and
task effectiveness.
3. SIMULATION STUDIES
In order to qualify and highlight the enhanced SMMS teleoperator performance, the scenario was
that the SMMS system in Figure 2 with the one in [6,7] in Sim (1) and the proposed control
methods in Sim (2)were properly simulated. Furthermore, Sim(1) and (2) were also subjected to
the time-varying communication delay as shown in Figure 3. Results from Sim (1) and (2) are
generated and compared to quantify and qualify the improvement of the performance in terms of
conditional transparency [5] and task effectiveness. The simulation data from Sim (2) are
discussed with findings from the research [9,13,32,39] to explicitly show advancement of
convergence to an optimal solution to identify an appropriate subteam robot-target pair. The Sim
(1) and (2) were set up in Table 2.
11. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 117
Human
Operator
Master
Positions
Master & Slave Positions
FIGURE 2: SMMS teleoperation simulation setup
FIGURE 3: Time delays in simulations
TABLE 2: SMMS simulations for a multi-target mission
In simulations, the time dependent communication delay was simulated in Figure 3. The
maximum communication delay of 0.1 second was chosen in the simulations because for the
earth application, there is a critical value, beyond which the system tends to become unstable
12. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 118
[40]. In the simulations, as shown in Figure 2, the master robot was a joystick connected to a
laptop that read human operator motion commands. It was able to transmit human commands to
a virtual slave robot model over the simulated TCP/IP internet. The virtual slave robots in Figure
2(b) including a team leader, subteam leaders, and followers were modeled in Matlab software
and able to track the transmitted master and reference positions and velocities to execute the
assigned tasks on the assigned targets. The slave robots also locally sensed the environments
and then sent back the sensory information to the master robot. In the simulations, the slave
robots were simulated as seven holonomic mobile platforms, each of which has two active
wheels, and they formed a slave team. In addition, all of them did not have grippers. Moreover,
there were six virtual static obstacles and two virtual targets in a virtual environment as shown in
Figure 2. All target and robot positions were assumed to be known in the simulations, but
obstacle positions were uncertain. The obstacles and targets were modeled as mass-spring-
damper systems [40] in the following equations.
Targets:
TTTTTTT FxKxBxM =++ &&& (15)
Obstacles:
ooooooo FxKxBxM =++ &&& (16)
where TM and oM are the inertia matrices of the targets and obstacles, respectively. TB and
oB are the damping coefficients of the targets and obstacles, respectively. TK and oK are the
stiffness coefficients of the targets and obstacles, respectively. Tx and ox are the position
vectors of the targets and the obstacles, respectively. The seven slave robots were run to
approach two targets, Target A (TA) and B (TB), while getting around the seven static obstacles.
All targets, TA and TB, were static. The simple task, object capture, was performed by the slave
robots simultaneously. Each of the targets was captured by at least three mobile robots. TA and
TB were fixed on the ground. They were being captured while being encircled by the slave robots.
The simulations, Sim (1) and Sim (2), as shown in Table 2, were set up with the following
parameters. The desired safety distance between two robots was set to 3 m. The minimum
distance between a robot and an obstacle was set to 5 m. Six circular objects with the radii of 5 m
were used as obstacles in each simulation. In the simulations, the six circular obstacles, Ob1,
Ob2, Ob3, Ob4, Ob5, and Ob6, were situated at (30, 60), (50, 40), (70, 20), (70,-20), (50,-40),
and (30,-60), respectively. Another two circular objects with the radii of 5 m were also used as
targets in each simulation. Two targets, TA and TB, were situated at (90, 30) and (90, -30),
respectively, as shown in Figure 4 and 7. The seven slave robots, R1, 2, 3, 4, 5, 6, and 7, were
initially located at (0, 15), (0, 10), (0, 5), (0, 0), (0, -5), (0, -10), and (0, -15), respectively. Only two
directions parallel to the ground were considered in the simulations. Each slave robot was
represented by a circular object with a radius of 1 m in the simulations. The master and slave
positions were simulated in a computer with Matlab and divided by 10, respectively. In the
simulations, the following parameters were used:
mM = 3 kg, mB = 6 Ns/m, mK =6 N/m, siM = 30 kg, siB = 1.0 Ns/m, siK = 60 N/m, TM =
60 kg, TB = 0.0 Ns/m, TK = 800 N/m, oM = 6000 kg, oB = 0.0 Ns/m, oK = 1000 N/m, G =
H = 1, ek = 100, eb = 60, minir = 5, minsr = 5, iϕ = φ = 10000, and ijk = )/1/1(50000 ji +
In the simulations, no friction, gravity, and air resistance were assumed in the virtual environment.
The position errors are me and sie . The simulations, Sim (1) and (2), as listed in Table 2 were
conducted by the same human operator for consistency. All slave robots were programmed to
move at an average speed of 0.1 m/s in the virtual environment in order to evaluate the
effectiveness of the proposed systems by measuring the length of time taken to complete a task.
13. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 119
3.1 Simulation - Sim(1)
In Sim (1), the seven robots formed a team teleoperated by a human operator via the master
robot. The human operator remotely controlled the team leader, R4, to reach TA, and all other
slave robots, R1-3 and R5-7, were coordinated with R4 to surround TA to capture it. After the TA
was captured, the human operator commanded R4 to move to TB while other robots, R1-3 and
R5-7, were also moving with regard to R4 motion to approach TB. During the team navigations to
catch TA and TB in Figure 4, all team robots were able to avoid the obstacles, Ob1-6, while they
kept a constant distance from each other. As long as R4 was telecontrolled by the human
operator to get to TB, R1-3 and R5-7 encircled and captured it.
In Figures 5 and 6, position errors sie of the team leader and followers were presented,
respectively. The position errors varied from 2.5 to 0 (m), which was caused by the time-varying
communication delays. However, a position error average, 0.65 (m), was still acceptable because
the team leader robot (R4) teleoperated by the human operator moved slowly when the follower
robots (R1-3, 5-7) moved with regard to R4 positions. All targets were captured in 1350 seconds.
FIGURE 4: Sim(1) - Actual Path Trajectories
FIGURE 5: Sim(1) - Slave Positions Errors in the x-direction
14. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 120
FIGURE 6: Sim(1) - Slave Positions Errors in the y-direction
3.2 Simulation - Sim(2)
In Sim (2), the task, object capture for two targets, TA and TB, was executed by the subteams
formed by the seven mobile robots. The seven robots, R1-7, could form 35 types of Robot
Combos (Subteams (Sub1-35)) as shown in Table 3.
TABLE 3: Robot combinations (robot subteams)
With the robot-target pairing method in Eqs (1) – (12), WAGT was generated. Subteams (Sub1 -
35) and their bids for the task were found for TA and TB in Table 4. Their bids were calculated in
Eq. (9) as an inverse of the sum of robot-target distances in a subteam minus the base price
when the base price for the task was 10. The reason was that in order to start with the tasks, the
robots needed to maintain at least 10(m) from a target to capture it. The bids ( )ba TT , in Table 4
were written where aT was the bid values calculated for TA when bT was the bid values
calculated for TB.
15. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 121
TABLE 4: Weighted Attack Guidance Table (WAGT) for Target A & B
As shown in Figure 7, only R4 was teleoperated by the human operator when all R1-3 and R5-7
automatically formed two subteams, (R1-3 and R5-7 combos) to capture TA and TB
simultaneously in 625 seconds, respectively. However, R4 was not engaged in any task, which
could reduce the time delay effect on the task achievements. All tasks were done by the two
subteams, Sub1 and Sub35, fully autonomously. The position errors were from 0 to 0.12 (m) in
Figures 8 and 9, and a position error average was 0.05 (m).
FIGURE 7: Sim(2) - Actual Path Trajectories
16. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 122
FIGURE 8: Sim(2) - Slave Positions Errors in the x-direction
FIGURE 9: Sim(2) - Slave Positions Errors in the y-direction
3.3 Discussions on Results
TABLE 5: Performance comparison for robot-target pairing methods
By comparing those errors in Figures 8 and 9 and 5 and 6, the performance of the system in Sim
(2) was better than that in Sim (1) when the simulations showed that in Sim (2), the task was
finished more quickly, and the position errors were smaller. The reasons were (1) the amount of
information transmitted over the time-varying links between the master and slave subsystems
became less in Sim(2) than Sim(1) when only autonomous local slave robots in Sim (2) handled
the task, but the teleoperated robot, the team leader, acted as a supervisor to monitor other robot
17. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 123
operations. (2) Forming the subteams could save all seven robots from visiting all targets to
complete the task because the seven robots were split into three robots in a subteam to perform
the task on different targets simultaneously as shown in Figure 7. By taking advantage of the task
planning independently done by each subteam, the task completion was more effective when the
operation time was decreased to 625 seconds in Sim(2) from 1350 seconds in Sim(1) in Figures
9 and 6, respectively, since the average speeds of the robots were equivalent during the
simulations.
Besides, in the simulations, we implemented different pairing methods in Table 5 to the scenario
mentioned above. As shown in the table, those pairing methods were run to compute various
subteam-target pairs in different durations of time so called the execution time. In comparison
with the data from other findings [9,13,32,39], the convergence rates with swarm particle
optimization (SPO), auction based, and proposed pairing methods [32,39] were faster than those
with the market and genetic methods [9,13] by 20-30 second execution time because the
algorithms for SPO, auction based, and the proposed pairing methods are simpler. However, the
algorithms for the SPO and auction based methods [32,39] are rigid; hence, they are
inappropriate for target capturing if an obstacle is not known beforehand, but in fact, most of the
working environments in engineering applications are uncertain. Therefore, only the proposed
pairing method in Sim (2) can present the relatively fast and stable convergence to get robot-
target pairs because of its simple algorithm. In addition, due to its flexibility, it is also applicable to
target capturing even if no apriori knowledge about obstacles is available since no obstacle data
is required to solve Eqs (1) – (12).
4. CONCLUSION & FUTURE WORK
The proposed control methods are developed for the SMMS mobile teleoperations to work on
multi-targets and improve the performance in terms of the effectiveness of the task achievement
and the system transparency as seen from the simulation results. In the simulations, the time
required to complete the task by the slave robots was reduced from 1350 seconds in Sim (1) to
625 seconds in Sim (2). With the proposed robot-target pairing method, the robots made
subteams that autonomously worked on paired targets in the modified potential field leader-
follower formation, which makes the SMMS system be capable of handling multi-targets
simultaneously in a short time. Moreover, by comparing the proposed robot-target pairing method
to the others in [9,30,32,39], it is so simple that a relatively fast convergence rate to obtain an
optimal solution (proper robot-target pairs) is achieved. Besides, the results also showed that the
smaller position errors in Sim(2) than those in Sim(1) represents the transparency enhancement.
The reason is the effect on the robotic system due to the time-varying communication delays is
reduced because during the operation, with the proposed control methods, all slave robots except
a team leader become completely autonomous. The team leader is the only robot teleoperated by
the human operator in a team but not engaged in any task when the time-varying delays mostly
happen over the long distance wireless communication between the master and slave team
leader robots [28,27]. Therefore, it was shown that in Sim (2), task efficiency and conditional
transparency were improved despite the fact that the system was subjected to the time-varying
communication delay. Moreover, the slave robots with the proposed control methods can avoid
obstacles and track and then capture targets when (1) the modified potential field based leader-
follower formation and (2) the robot-target pairing method take effect. Nonetheless, the robot-
target pairing method could only generate a suboptimal solution in general since it is based on
some heuristic data that come from human experiences.
Therefore, our future work will be to further evaluate the performance of the MRMTMT pairing
method and the performance and quality of the robot-target pair solutions. In addition, we will look
into the proposed control method for a SMMS system working in very complex tasks and
environments, e.g. a task that may require identification of positions and types of the uncertain
targets in an unknown area. We will install the proposed control methods into SMMS system
hardware for further experimental validation based on comparative studies on the results from
experiments and simulations to emphasize the expected good performance achievement
although the real time delays may vary irregularly.
18. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 124
5. REFERENCES
[1] K. R. Baghaei and A. Agah. “task allocation methodologies for multi-robot systems”,
Technical Report ITTC-FY2003-TR-20272-01, 2003.
[2] T. Balch and R.C. Arkin. “behavior-based formation control for multirobot teams”, Robotics
and Automation, IEEE transactions, 14(6):926-939, 1998.
[3] L. Barnes, W. Alvis, M.A. Fields, K. Valavanis, and W. Moreno. “heterogeneous swarm
formation control using bivariate normal functions to generate potential fields”, Distributed
Intelligent Systems: Collective Intelligence and Its Applications, 2006. DIS 2006, IEEE
Workshop, pages 85-94, 2006.
[4] Z. R. Bogdanowicz and N.P. Coleman. “new algorithm for optimization of effect-based
weapon-target pairings”, International Conference Scientific Computing CSC 08, 2008.
[5] Y. Cheung. “Adaptive semi-autonomous teleoperation of a mutli-agent robotic system”, PhD
thesis, Stevens Institute of Technology, 2009.
[6] Y. Cheung and J. Chung. “cooperative control of a multi-arm system using semi-autonomous
telemanipuation and adaptive impedance”, 14
th
IEEE International Conference on
Advanced Robotics (ICAR), 2009.
[7] Y. Cheung, J.H. Chung, and N. Coleman, “semi-autonomous formation control of a single-
master multi-slave teleoperation system”, IEEE Symposium on Computational Intelligence
in Control and Automation, 2009.
[8] S. Cifuentes, J.M. Giron-Sierra, and J.F. Jimenez, “robot formation control based on a multi-
potential approach”, Control Automation and Systems (ICCAS), 2010 International
Conference, pages 1982-1987, 2010.
[9] L. Delin, S. Chunlin, W. Biao, and W. Wenhai, “air combat decision-making for cooperative
multiple target attack using heuristic adaptive genetic algorithm”, Machine Learning and
Cybernetics, Proceeding of 2005 International Conference, (1)473-478, 2005.
[10] L. Delin, D. Haibin, W. Shunxiang, and L. Maoqing, “research on air combat decision-making
for cooperative multiple target attack using heuristic ant colony algorithm”, ACTA
AERONAUTICA ET ASTRONAUTICA SINICA, 27(6) pages 1166-1170, 2006.
[11] L. Delin, Y. Zhong, D. Haibin, W. Zaigui, and S. Chunlin, “heuristic particle swarm
optimization algorithm for air combat decision-making on CMTA”, Transactions of Nanjing
University of Aeronautics and Astonautics, 23(1) pages. 20-26, 2006.
[12] J.P. Desai, J.P. Ostrowski, and V. Kumar, “modeling and control of formations of non-
holonomic mobile robots”, Robotics and Autonmation, IEEE Transactions, 17(6) pages.
905-908, 2001.
[13] M.B. Dias, R.M. Zlot, N. Kalra, and A. Stentz, “market-based multirobot coordination: a
survey and analysis”, Proceedings of the IEEE, 94(7) pages. 1257-1270, 2006.
[14] K.D. Do, “formation control of mobile agents using local potential functions”, American
Control Conference, 2006.
19. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 125
[15] M. Eghbali and M.A. Sharbafi, “multi-agent routing to multi-targets via ant colony”,
Computer and Automation Engineering (ICCAE), 2010 the 2nd
International Conference,
(1)pages. 587-591, 2010.
[16] P.G. Espejo, S. Ventura, and F. Herrera, “a survey on the application of genetic
programming to classification”, Systems, Man., and Cyberetics, Part C: Applications and
Reviews, IEEE Transactions, 40(2), pages. 121-144, 2010.
[17] I. Farkhatdinov and J.H. Ryu, “teleoperation of multi-robot and multi-property systems”,
Industrial Informatics, INDIN 2008, 6th
IEEE International Conference, pages 1453-1458,
2008.
[18] T. Fong, C. Thorpe, and C. Baur, “multi-robot remote driving with collaborative control”,
Industrial Electronics, IEEE Transactions, 50(4) pages. 699-704, 2003.
[19] D. Fox, W.Burgard, H. Kruppa, and S. Thrun, “collaborative multi-robot localization”, In
Proceedings of the German Conference on Artificial Intelligence and the 21st
Symposium
on Pattern Recognition, 1999.
[20] S.S. Ge, C.H. Fua, and W.M. Liew, “swarm formations using the general formation potential
function”, Robotics, Automation, and Mechatronics, 2004 IEEE Conference, (2) pages. 655-
660, 2004.
[21] J.P. Graciano, “a simple navigation algorithm with no local minima”, Advanced Robotics,
ICAR 2005, Proceedings, 12
th
International Conference, pages 640-646, 2005.
[22] K. Hashtrudi-Zaad and S.E. Salcudean, “adaptive transparent impedance reflecting
teleoperation”, Proceeding of the 1996 IEEE International Conference on Robotics and
Automation, 1996.
[23] B. Kaleci, O. Parlaktuna, M. Ozkan, and G. Kirlik, “market-based task allocation by using
assignment problem”, Systems, Man, and Cybernetics (SMC), 2010, IEEE International
Conference, pages 135-141, 2010.
[24] M.T. Khan, T. Imanuel, and C.W. DeSilva, “autonomous market-based multi-robot
cooperation”, Intelligent and Advanced Systems (ICIAS), 2010 International Conference,
pages 1-6, 2010.
[25] W. Kim, D.S. Cho, and H.J. Kim, “sequential multi-agent task assignment using auction
algorithm based on d*lite”, Control Automation and Systems (ICCAS), 2010 International
Conference, page 938-942, 2010.
[26] E. Lalish, K.A. Morgansen, and T. Tsukamaki, “formation tracking control using virtual
structures and deconfliction”, Decision and Control, 2006, 45th
IEEE Conference, pages
5699-5705, 2006.
[27] D. Lee, O. Martinez-Palafox, and M.W. Spong, “bilateral teleoperation of multiple
cooperative robots over delayed communication networks: Theory”, Robotics and
Automation, ICRA, Proceedings of the IEEE International Conference, 2005.
[28] D. Lee and M.W. Spong, “bilateral teleoperation of multiple cooperative robots over delayed
communication networks: Application”, Robotics and Automation, ICRA Proceedings of the
2005 IEEE International Conference, 2005.
[29] H.K. Lee, M.H. Shin, and M.J. Chung, “adaptive controller of master-slave systems for
transparent teleoperation”, ICAR 1997, pages 14-23, 1997.
20. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 126
[30] Z.J. Lee, C.Y. Lee, and S.F. Su, “an immunity-based ant colony optimization algorithm for
solving weapon target assignment problem”, Applied Soft Computing Journal, 2(1) pages.
39-47, 2002.
[31] C.S. Lim, R. Mamat, and T. Braunl, “market-based approach for multi-team robot
cooperation”, Autonomous Robots and Agents, 2009, ICARA 2009, 4th
International
Conference, pages 62-67, 2009.
[32] B. Liu, Z. Qin, R. Wang, Y.B. Gao, and L.P. Shao, “a hybrid heuristic particle swarm
optimization for coordinated multi-target assignment”, Industrial Electronics and
Applications, ICIEA, 4th
IEEE Conference, pages 1929-1934, 2009.
[33] J. Liu, L. Shun, T. Chen, X. Huang, and C. Zhao, “competitive multi-robot teleoperation”,
Robotics and Automation, 2005, ICRA 2005, Proceedings of the 2005 IEEE International
Conference, pages 75-80, 1993.
[34] K.F. Man, F.S. Tang, and S. Kwong, ”genetic algorithms: concepts and applications in
engineering designs”, Industrial Electronics, IEEE Transactions, 43(5) pages. 519-534,
1996.
[35] S. Monteiro and E. Bicho, “robots allocation and leader-follower pairs”, Robotics and
Automation, ICRA, IEEE International Conference, pages 3769-3775, 2008.
[36] J. Ota, N. Miyata, T. Arai, E. Yoshida, D. Kurabatashi, and J. Sasaki, “transferring and
regrasping a large object by cooperation of multiple mobile robots”, Human Robot
Interaction and Cooperative Robots, Proceedings of IEEE/RSJ International Conference,
1995.
[37] H. Park, Y.A. Lim, A. Pervez, B.C. Lee, S.G. Lee, and J. Ryu, “teleoperation of a multi-
purpose robot over the internet using augumented reality”, Control, Automation, and
Systems, 2007, ICCAS 2007, International Conference, pages 2456-2461, 2007.
[38] M.G. Park and M.C. Lee, “real-time path planning in unknown environment and a virtual hill
concept to escape local minima”, Industrial Electronics Society, 2004, IECON 2004, 30
th
Annual Conference of IEEE, (3) pages.2223 – 2228, 2004.
[39] A. Pongpunwattana and R. Rysdyk, “real-time planning for multiple autonomous vehicles in
dynamic uncertain environments”, Journal of Aerospace Computing, Information, and
Communication, 1(12) pages. 580-604, 2004.
[40] J.H. Ryu, D.S. Kwon, and B. Hannaford, “stable teleoperation with time-domain passivity
control”, Robotics and Automation, IEEE Transactions, 20(2) pages. 365-373, 2004.
[41] C. Sabattini, C. Secchi, and C. Fantuzzi, “potential based control strategy for arbitrary
shape formations of mobile robots”, Intelligent Robots and Systems, 2009, IROS 2009,
IEEE/RSJ International Conference, pages 3762-3767, 2009.
[42] T. Suzuki, T. Sekine, T. Fujii, H. Asama, and I. Endo, “cooperative formation among multiple
mobile robot teleoperation in inspection task”, Decision and Control 2000, Proceedings of
the 39th
IEEE Conference, 1(12-15), pages. 358-363, 2000.
[43] H. Tan, Q. Liao, and J. Zhang, “an improved algorithm of multiple robot cooperation in
obstacle existing environment”, Robotics and Biomimetics, 2007, ROBIO 2007, pages
1001-1006, 2007.
21. Y. Cheung & J.H. Chung
International Journal of Robotics and Automation (IJRA), Volume (2) : Issue (2) : 2011 127
[44] L.M. Wachter and L.E. Ray, “stability of potential function formation control with
communication and processing delay”, American Control Conference, 2009, ACC 2009,
pages 2997-3004, 2009.
[45] Z. Wang, M.N. Admadabadi, E. Nakano, and T. Takahashi, “a multiple robot system for
cooperative object transportation with various requirements on task performing”, Robotics
and Automation, 1999, Proceedings of 1999 IEEE International Conference, 2(10-15)
pages 1226-1233, 1999.
[46] H. Yamaguchi, “a distributed motion coordination strategy for multiple nonholonomic mobile
robots in cooperative hunting operations”, Decision and Control, 2002, Proceedings of the
41st
IEEE Conference, 3(10-13) pages 2984-2991, 2002.
[47] Y. Yamamoto and S. Fukuda, “trajectory planning of multiple mobile manipulators with
collision avoidance capability”, Proceedings of ICRA 2002 IEEE International Conference,
2002.
[48] Z. Yao and K. Gupta, “distributed strategies for local minima escape in motion planning for
mobile networks”, Robot Communication and Coordination, 2009, ROBO-COMM 2009,
Second International Conference, pages 1-7, 2009.