Fast Dual Control of Exploration and Exploitation for Autonomous Search of Hazardous Sources

Xuan Toa Tran, Wen Hua Chen, Guoqiang Tan

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

This paper presents a new control algorithm designed for addressing the challenges posed by autonomous search problems, where the true source location and environment remain unknown. Utilizing a novel reward function, we formulate a fast dual control approach within the realm of optimization. This approach attains an optimal balance between exploration and exploitation by navigating the searcher towards the estimated source target while maximizing the exploration capability of control actions. The proposed algorithm not only demonstrates excellent search performance but also exhibits a high level of computational efficiency, as evidenced by two numerical examples provided for illustration.

Original languageEnglish
Title of host publicationICIT 2024 - 2024 25th International Conference on Industrial Technology
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350340266
DOIs
Publication statusPublished - 2024
Event25th IEEE International Conference on Industrial Technology, ICIT 2024 - Bristol, United Kingdom
Duration: 25 Mar 202427 Mar 2024

Publication series

NameProceedings of the IEEE International Conference on Industrial Technology
ISSN (Print)2641-0184
ISSN (Electronic)2643-2978

Conference

Conference25th IEEE International Conference on Industrial Technology, ICIT 2024
Country/TerritoryUnited Kingdom
CityBristol
Period25/03/2427/03/24

Keywords

  • autonomous search
  • computational efficiency
  • dual control
  • exploration and exploitation
  • uncertainty

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Fast Dual Control of Exploration and Exploitation for Autonomous Search of Hazardous Sources'. Together they form a unique fingerprint.

Cite this