Hybrid Algorithm combining Genetic algorithms and CSP approach to plane an Optimized path for a Mobile Robot moving under Time Window
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The problems of optimization are considered as a type of a constraint satisfaction problem: COP (Constraint Optimization problem). In this frame goes our first works which are interested in the optimization of a reference trajectory of a mobile robot used for the surveillance (Surveyor Robot). Indeed, in the previous work we have focused on the minimization of the length of this trajectory by using the approach of the genetic algorithms. At the level of our present researches we shall add temporal windows to limit the time delayed in the passage between one surveyed site and the following one. The consideration of temporal aspects requires a modelling of problem with a satisfaction of constraints. So that, a hybridization of the algorithm of optimization already developed at the previous work by the approach of CSP (Constraint Satisfaction Problem), is indispensable for our case. The new algorithm which will be developed and feigned at this work is a genetic algorithm allowing minimizing the length of a trajectory crossed by a mobile robot of surveillance by respecting the time fixed to take during the passage through two successive sites.
Authors and Affiliations
Hayet Tlijani , Tlijani Hatem , Knani Jilani , M’sirdi NacerKouider
Attack Graph to Graph Database
Abstract: Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for fu...
Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks
Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are...
Security in E-Commerce
Abstract: Despite the all benefits of e-commerce, the transaction and online connections provide a great space for the abuse of technology, even the criminal acts.The organizations should find out a security system, tail...
Simulated Analysis and Enhancement of Blowfish Algorithm
Abstract: This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for e...
Nanobiosensors: Ideas And Variations
Biosensing has been one amongst the most popular topic attracting scientific minds since long back. It’s therefore as biological entities square measure terribly complicated and square measure directly related to the exi...