Prototyping and Simulation of Robot Group Intelligence using Kohonen Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract:Intelligent agents such as robots can form ad hoc networks and replace human being in many dangerous scenarios such as a complicated disaster relief site. This project prototypes and builds a computer simulator to simulate robot kinetics,unsupervised learning using Kohonen networks, as well as group intelligence when an ad hoc network is formed.Each robot is modeled using an object with a simple set of attributes and methods that define its internal states and possible actions it may take under certain circumstances. As the result, simple, reliable, and affordable robots can be deployed to form the network. The simulator simulates a group of robots as an unsupervised learning unit and tests the learning results underscenarios with different complexities. The simulation results show that a group of robots could demonstrate highly collaborative behavior on a complex terrain. This study could potentiallyprovide a software simulation platform for testing individual and group capability of robotsbefore the design process and manufacturing of robots. Therefore, results of the project have the potential to reduce the cost and improve the efficiency of robot design and building.
Authors and Affiliations
Zhijun Wang, Reza Mirdamadi, and Qing Wang
Color Based Image Retrieval System
Advances in the data storage and image acquisition technologies have enabled the creation of large datasets. It is necessary to develop appropriate information systems to efficiently manage these collections. T...
Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback
A Distributed denial of service (DDoS) attack is a most popular and crucial attack in the internet. Its motive is to make a network resource unavailable to the legitimate users. Botnets are commonly the engine...
A Survey on Secure Key Policy Attribute-Based Encryption Policy for Data Sharing Among Dynamic Groups in the Cloud
Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration...
Robot Car for Exploring Dangerous environments controlled by Bluetooth
Car controlling one of the projects that get a lot of attention in this days. There are many challenges generated during implementation of system especially when the car connected with number of sensors and that mean the...
Copyright protection scheme based on visual Cryptography: AReview
Abstract: Management of digital images via internet and e-business has witnessed tremendous growth in lastdecades, resulting in vulnerability to copyright infringement, Manipulation and attacks. This paper reviewss...