Ds* Heuristic Approach using ‘Safety Distance’ for Agent Path Planning
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : The efficiency in path planning algorithms is a crucial issue in mobile agents. For an artificial agent, observation from environment, navigational behavior and learning methods over occupancy grid maps are tools for effective path planning. The path generated by the conventional D* algorithm may lead to collision with the obstacles in real-time scenario and this issue is addressed by Ds* which uses `safety distance’ phenomena, based on weighted cost function. The factors of distance and safety are considered simultaneously in the cost function, thereby demonstrated efficiency in path planning. An analysis on goal-directed navigation tasks in mazes using Ds* heuristic approach is carried out and the efficiency is evaluated based on two parameters - Path length and Execution time.
Authors and Affiliations
Kiran K Ravulakollu , Shailashree K Sheshadri
Decision Making and Autonomic Computing
Autonomic Computing refers to the self-managing characteristics of distributed computing resources, adapting to unpredictable changes while hiding intrinsic complexity to operators and users. An autonomic system...
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Abstract : In this paper a pose invariant face recognition using neuro-fuzzy approach is proposed. Hereadaptive neuro fuzzy interface system (ANFIS) classifier is used as neuro-fuzzy approach for pose invariant fac...
Advanced Lightweight BFT Process ForTrustworthy Management inWeb Services Computing System
Abstract: The project entitled as “Trustworthy Coordination of Web Services Atomic Transactions”. The consumer will enter their customer id and PIN for accessing their account details. They can view all the account...
Virtual Watermarking for Color images
This work proposes a virtual watermarking technique for colored images. In the proposed work, sender uses two images one is cover image and other is secret image. Let us consider the secret image to be embedded as...
An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one...