2010
DOI: 10.1007/s10514-010-9200-5
|View full text |Cite
|
Sign up to set email alerts
|

A provably complete exploration strategy by constructing Voronoi diagrams

Abstract: We present novel exploration algorithms that enable the construction of Voronoi diagrams over unknown areas using a vehicle equipped with range sensors. The underlying control law uses range measurements to make the vehicle track Voronoi edges between obstacles. The exploration algorithms make decisions at vertices in the Voronoi diagram to expand the explored area until a complete Voronoi diagram is constructed in finite time. Our exploration algorithms are provably complete, and the convergence of the contro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 33 publications
(41 citation statements)
references
References 35 publications
0
41
0
Order By: Relevance
“…The obstacle boundaries are shown in thick red curves in Figure 7. We build the Voronoi edge (green circles in Figure 7) using the exploration algorithms in the study by Kim et al 44 Figure 8 shows the weight of each Voronoi edge. Each Voronoi edge has its associated number as depicted in Figure 7.…”
Section: Matlab Simulationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The obstacle boundaries are shown in thick red curves in Figure 7. We build the Voronoi edge (green circles in Figure 7) using the exploration algorithms in the study by Kim et al 44 Figure 8 shows the weight of each Voronoi edge. Each Voronoi edge has its associated number as depicted in Figure 7.…”
Section: Matlab Simulationsmentioning
confidence: 99%
“…Whenever g f visits Figure 7. We build the Voronoi edge (green circles) using the exploration algorithms in the study by Kim et al 44 Edge number a Voronoi vertex, the intruder moves along T i with unbounded speed to maximize its distance from g f . Since T i is a tree, the intruder must be captured in finite time.…”
Section: Matlab Simulationsmentioning
confidence: 99%
“…Note that both SCN algorithm in this article and the algorithm in Kim et al 6 do not require that a robot stores the adjacency matrix associated to all vertices. Our article extends Kim et al's 6 work to multi-robot exploration and networking by letting multiple robots construct the sensor network in a cooperative manner. The multi-robot networking strategy in Kim et al 5 requires that a robot stores the adjacency matrix associated to all vertices.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, wall following strategies are simple ways to collect segments of the movement space border, which are presented in [13]. [11] presents a trajectory-based exploration strategy by constructing Voronoi diagrams. This solution relies on the pervasively distributed obstacles in the exploration space.…”
Section: Related Workmentioning
confidence: 99%