信息网络安全 ›› 2023, Vol. 23 ›› Issue (11): 58-68.doi: 10.3969/j.issn.1671-1122.2023.11.007
收稿日期:
2023-07-08
出版日期:
2023-11-10
发布日期:
2023-11-10
通讯作者:
许浩 作者简介:
姚昌华(1983—),男,重庆,教授,博士,主要研究方向为智能无人集群和机器学习|许浩(1996—),男,江苏,硕士研究生,主要研究方向为智能无人集群|付澍(1985—),男,贵州,副教授,博士,主要研究方向为智能无人集群|刘鑫(1983—),男,江西,副教授,博士,主要研究方向为机器学习、智能算法和协同决策
基金资助:
YAO Changhua1, XU Hao1(), FU Shu2, LIU Xin3
Received:
2023-07-08
Online:
2023-11-10
Published:
2023-11-10
摘要:
针对多智能体在无先验知识的未知环境中进行自主协同探索任务优化问题,文章构建了多智能体协同探索未知环境的优化模型,并提出了一种基于障碍物边界点过滤(Multiple Agent Obstacle Frontier Point Filter,MAOFPF)的多智能体协同探索算法。该算法综合考虑边界点与障碍物相对分布情况,探索边界点过滤的距离阈值,进而优化多智能体探索任务选择和资源分配。仿真结果表明,在不同场景下,文章所提算法能够有效过滤边界点的干扰数据,保证系统的平稳运行,与原算法相比,系统抗扰动能力和泛化能力更高,地图覆盖率增长速度更快,平均效率提升了25.22%。
中图分类号:
姚昌华, 许浩, 付澍, 刘鑫. 基于边界点过滤的多智能体快速协同探索算法[J]. 信息网络安全, 2023, 23(11): 58-68.
YAO Changhua, XU Hao, FU Shu, LIU Xin. Fast Multi-Agent Collaborative Exploration Algorithm Based on Boundary Point Filtering[J]. Netinfo Security, 2023, 23(11): 58-68.
[1] | YIN Rui, SHEN Yineng, ZHU Huawei, et al. Time-Critical Tasks Implementation in MEC Based Multi-Robot Cooperation Systems[J]. China Communications, 2022, 19(4): 199-215. |
[2] | XIE Jun, LYU Haonan, ZHU Zeya. Research on the Method of Multi-Robots Autonomous Collaborative Map Construction in Unknown Environment[C]// ACM. Proceedings of the 2020 the 4th International Conference on Innovation in Artificial Intelligence (ICIAI 2020). New York: ACM, 2020: 229-235. |
[3] |
LIU Jie, LYU Yong, YUAN Yuan, et al. An Efficient Robot Exploration Method Based on Heuristics Biased Sampling[J]. IEEE Transactions on Industrial Electronics, 2023, 70(7): 7102-7112.
doi: 10.1109/TIE.2022.3203762 URL |
[4] |
PALACIOS-GASOS J M, TARDIOLI D, MONTIJANO E, et al. Equitable Persistent Coverage of Non-Convex Environments with Graph-Based Planning[J]. International Journal of Robotics Research, 2019, 38 (14): 1674-1694.
doi: 10.1177/0278364919882082 URL |
[5] | YU Tianyou, DENG Baosong, YAO Wen, et al. Market-Based Robots Cooperative Exploration in Unknown Indoor Environment[C]// IEEE. IEEE International Conference on Unmanned Systems (ICUS). New York: IEEE, 2021: 414-419. |
[6] | MARTIN B, EFSTATHIOS B. Greedy Decentralized Auction-Based Task Allocation for Multi-Agent Systems[J]. IFAC-PapersOnLine, 2021, 54(20): 675-680. |
[7] | ZHENG Shujian, ZHAO Wenjie. A Consensus-Based Joint Optimization Algorithm for Multi-Agent Collaborative Dynamic Task Allocation[C]// ACM. 4th International Conference on Robotics. New York: ACM, 2023, 1213-1219. |
[8] | BURGARD W, MOORS M, STACHNISS C, et al. Coordinated Multi-Robot Exploration[J]. Transactions on Robotics, 2005, 21(3): 376-386. |
[9] | DENG Liyuan, GONG Wei, LI Li. Multi-Robot Exploration in Unknown Environments via Multi-Agent Deep Reinforcement Learning[C]// IEEE. 2022 China Automation Congress (CAC). New York: IEEE, 2022: 6898-6902. |
[10] | CHEN Jianping, WANG Jianbin, XIAO Qijun, et al. A Multi-Robot Task Allocation Method Based on Multi-Objective Optimization[C]// IEEE. 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV). New York: IEEE, 2018: 1868-1873. |
[11] |
ZHONG Ping, CHEN Bolei, LU Siyi, et al. Information-Driven Fast Marching Autonomous Exploration with Aerial Robots[J]. IEEE Robotics and Automation Letters, 2022, 7(2): 810-817.
doi: 10.1109/LRA.2021.3131754 URL |
[12] |
CAO Junjie, WANG Yujie, LIU Yong, et al. Multi-Robot Learning Dynamic Obstacle Avoidance in Formation with Information-Directed Exploration[J]. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6(6): 1357-1367.
doi: 10.1109/TETCI.2021.3127925 URL |
[13] |
LAU B P L, ONG B J Y, LOH L K Y, et al. Multi-AGV’s Temporal Memory-Based RRT Exploration in Unknown Environment[J]. IEEE Robotics and Automation Letters, 2022, 7(4): 9256-9263.
doi: 10.1109/LRA.2022.3190628 URL |
[14] | UMARI H, MUKHOPADHYAY S. Autonomous Robotic Exploration Based on Multiple Rapidly-Exploring Randomized Trees[C]// IEEE. 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). New York: IEEE, 2017: 1396-1402. |
[15] | LI Xiaoqiang, QIU Lei, AZIZ S, et al. Control Method of UAV Based on RRT for Target Tracking in Cluttered Environment[C]// IEEE. 2017 7th International Conference on Power Electronics Systems and Applications-Smart Mobility, Power Transfer &Security (PESA). New York: IEEE, 2017: 1-4. |
[16] | CHEN Yuzhu, JIA Qingzhong, ZHAO Yong. Rough Waypoint Extraction Algorithm Based on Mean Shift Clustering Saliency Analysis[C]// IEEE. 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). New York: IEEE, 2020: 1345-1349. |
[17] | JIN Yikang. Multi-Robot Exploration and Path Planning Algorithms of Mobile Robots[D]. Xi’an: Xidian University, 2020. |
金毅康. 移动机器人多机探索与路径规划算法研究[D]. 西安: 西安电子科技大学, 2020. | |
[18] | KUMAR NT S, GAWANDE M, BABU M N P, et al. Mobile Robot Terrain Mapping for Path Planning Using Karto Slam and Gmapping Technique[C]// IEEE. 2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT). New York: IEEE, 2022: 1-4. |
[19] | HESS W, KOHLER D, RAPP H, et al. Real-Time Loop Closure in 2D LIDAR SLAM[C]// IEEE. International Conference on Robotics and Automation. New York: IEEE, 2016: 1271-1278. |
[20] | HORNER J. Map-Merging for Multi-Robot System[EB/OL]. (2016-06-16)[2023-07-01]. https://is.cuni.cz/webapps/zzp/detail/174125/. |
[1] | 姚远, 樊昭杉, 王青, 陶源. 基于多元时序特征的恶意域名检测方法[J]. 信息网络安全, 2023, 23(11): 1-8. |
[2] | 李思聪, 王坚, 宋亚飞, 黄玮. 基于BiTCN-DLP的恶意代码分类方法[J]. 信息网络安全, 2023, 23(11): 104-117. |
[3] | 郇鑫焘, 缪凯焘, 陈稳, 吴畅帆. 基于自主舍弃与校准的鲁棒物联网设备无线密钥生成方法[J]. 信息网络安全, 2023, 23(11): 17-26. |
[4] | 孙永奇, 宋泽文, 朱卫国, 赵思聪. 基于安全多方计算的图像分类方法[J]. 信息网络安全, 2023, 23(11): 27-37. |
[5] | 宋丽华, 张津威, 张少勇. 基于博弈论对手建模的物联网SSH自适应蜜罐策略[J]. 信息网络安全, 2023, 23(11): 38-47. |
[6] | 许盛伟, 邓烨, 刘昌赫, 谭莉. 一种基于国密算法的音视频选择性加密方案[J]. 信息网络安全, 2023, 23(11): 48-57. |
[7] | 刘高扬, 吴伟玲, 张锦升, 王琛. 多模态对比学习中的靶向投毒攻击[J]. 信息网络安全, 2023, 23(11): 69-83. |
[8] | 黄恺杰, 王剑, 陈炯峄. 一种基于大语言模型的SQL注入攻击检测方法[J]. 信息网络安全, 2023, 23(11): 84-93. |
[9] | 陈立全, 薛雨欣, 江英华, 朱雅晴. 基于国密SM2算法的证书透明日志系统设计[J]. 信息网络安全, 2023, 23(11): 9-16. |
[10] | 廖丽云, 张伯雷, 吴礼发. 基于代价敏感学习的物联网异常检测模型[J]. 信息网络安全, 2023, 23(11): 94-103. |
[11] | 王智, 张浩, 顾建军. SDN网络中基于联合熵与多重聚类的DDoS攻击检测[J]. 信息网络安全, 2023, 23(10): 1-7. |
[12] | 张玉臣, 李亮辉, 马辰阳, 周洪伟. 一种融合变量的日志异常检测方法[J]. 信息网络安全, 2023, 23(10): 16-20. |
[13] | 仝鑫, 金波, 王斌君, 翟晗名. 融合对抗增强和多任务优化的恶意短信检测方法[J]. 信息网络安全, 2023, 23(10): 21-30. |
[14] | 朱怡昕, 苗张旺, 甘静鸿, 马存庆. 基于细粒度访问控制的勒索软件防御系统设计[J]. 信息网络安全, 2023, 23(10): 31-38. |
[15] | 张璐, 屠晨阳, 苗张旺, 甘静鸿. 位置信息端云可信传输方案设计[J]. 信息网络安全, 2023, 23(10): 39-47. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||