Primal-Dual Asynchronous Particle Swarm Optimization (pdAPSO) Algorithm For Self-Organized Flocking of Swarm Robots
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 6
Abstract
Abstract: This paper proposed a hybrid PSO algorithm that combines the Primal-Dual method with APSO algorithm to address the problem of swarm robotics flocking motion. This algorithm combines the explorative ability of APSO with the exploitative capacity of the Primal Dual Interior Point Method. We hypothesize that the fusion of the two algorithms (APSO and Primal Dual) offers a robust prospect of preventing prematureconvergence of robots, and also make sure that the robots are not stuck in their local minimal. We did a comparison of the performances of the total iteration for pdAPSO, PSO, APSO and Primal Dual algorithms asthe robots flock from the centre of the search space to the various zones (z1, z2, z3, and z4). In three (3) out of the four (4) cases, the pdAPSO proves to be more effective for the flocking of the robots than the PSO, APSO and Primal Dual algorithms for the fifty (50) simulations that was done. The results of our simulation gives a clear evidence of the efficacy of the pdAPSO algorithms. The hybrid algorithm contributed to the field of swarm robotics by providing novel algorithm that possess a flocking capability attained under suitable parameter values that is relatively robust and produces effective self-organized flocking in constrained environments.
Authors and Affiliations
Emmanuel Gbenga Dada
lntrusion Detection System Using GA
Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firew...
Intrusion Detection Systems By Anamoly-Based Using Neural Network
To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some  ...
Secured Genetic Algorithm based image hiding technique with location number compression
Abstract: Data hiding involves hiding of information in a cover media to obtain the indistinguishable media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipien...
Neural Network For The Estimation Of Ammonia Concentration In Breath Of Kidney Dialysis Patients
Neural networks are an extremely powerful tool for data mining. They are especially useful in cases involving data classification where it is difficult to establish a pattern in the search space. In an era when &...
“Enhancing Iris Scanning Using Visual Cryptography”
Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic orbehavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secur...