• DocumentCode
    1101428
  • Title

    Disambiguation Protocols Based on Risk Simulation

  • Author

    Fishkind, Donniell E. ; Priebe, Carey E. ; Giles, Kendall E. ; Smith, Leslie N. ; Aksakalli, Vural

  • Author_Institution
    Johns Hopkins Univ., Baltimore
  • Volume
    37
  • Issue
    5
  • fYear
    2007
  • Firstpage
    814
  • Lastpage
    823
  • Abstract
    Suppose there is a need to swiftly navigate through a spatial arrangement of possibly forbidden regions, with each region marked with the probability that it is, indeed, forbidden. In close proximity to any of these regions, you have the dynamic capability of disambiguating the region and learning for certain whether or not the region is forbidden - only in the latter case may you proceed through that region. The central issue is how to most effectively exploit this disambiguation capability to minimize the expected length of the traversal. Regions are never entered while they are possibly forbidden, and thus, no risk is ever actually incurred. Nonetheless, for the sole purpose of deciding where to disambiguate, it may be advantageous to simulate risk, temporarily pretending that possibly forbidden regions are riskily traversable, and each potential traversal is weighted with its level of undesirability, which is a function of its traversal length and traversal risk. In this paper, the simulated risk disambiguation protocol is introduced, which has you follow along a shortest traversal - in this undesirability sense - until an ambiguous region is about to be entered; at that location, a disambiguation is performed on this ambiguous region. (The process is then repeated from the current location, until the destination is reached.) We introduce the tangent arc graph as a means of simplifying the implementation of simulated risk disambiguation protocols, and we show how to efficiently implement the simulated risk disambiguation protocols that are based on linear undesirability functions. The effectiveness of these disambiguation protocols is illustrated with examples, including an example that involves mine countermeasures path planning.
  • Keywords
    graph theory; path planning; probability; protocols; set theory; disambiguation protocol; path planning; risk simulation; set theory; shortest traversal; tangent arc graph; traversal length; Computational modeling; Computer science; Laboratories; Mathematics; Navigation; Object detection; Path planning; Protocols; Statistics; Visualization; Canadian traveller problem; disambiguation protocol; probabilistic path planning; random disambiguation path; visibility graph;
  • fLanguage
    English
  • Journal_Title
    Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1083-4427
  • Type

    jour

  • DOI
    10.1109/TSMCA.2007.902634
  • Filename
    4292218