• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tang Jie, Wen Zhonghua, Wang Quan, Huang Wei. Solving Strong Cyclic Planning in Nondeterministic Reversible Planning Domain[J]. Journal of Computer Research and Development, 2013, 50(9): 1970-1980.
Citation: Tang Jie, Wen Zhonghua, Wang Quan, Huang Wei. Solving Strong Cyclic Planning in Nondeterministic Reversible Planning Domain[J]. Journal of Computer Research and Development, 2013, 50(9): 1970-1980.

Solving Strong Cyclic Planning in Nondeterministic Reversible Planning Domain

More Information
  • Published Date: September 14, 2013
  • The execution of actions is deterministic under ideal conditions. But in the real world, many accidents cause uncertainty and make negative impact. In response to this status, a new nondeterministic planning model is established, and two constraints are added in nondeterministic planning: 1)The execution of all actions is reversible; 2)If an action is executed in accidents, it is only possible to deviate from the target states. A solution for strong cycle planning is proposed in the model. At the first step, the execution of all actions is supposed to occur in ideal situation. Then, planning subgraph is converted to planning subtree and seeking out reachability of each state in planning tree. And then, the accident situation that execution of actions cause is considered. If it cannot reach target state that action is executed by accident, this action is deleted and planning subgraph and planning subtree are updated, Finally, the algorithm solves strong cycle planning through traversal planning subgraph and planning subtree. Taking into account some accidents are unpredictable, the algorithm only updates the part of solution which is already invalid and needn't get repeatedly a solution. Experimental results show that the algorithm can quickly update planning solution and the problem is independent of the size.
  • Related Articles

    [1]Feng Chenjiao, Song Peng, Wang Zhiqiang, Liang Jiye. A Method on Long Tail Recommendation Based on Three-Factor Probabilistic Graphical Model[J]. Journal of Computer Research and Development, 2021, 58(9): 1975-1986. DOI: 10.7544/issn1000-1239.2021.20200377
    [2]Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke. Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268. DOI: 10.7544/issn1000-1239.2018.20180447
    [3]He Xiao, Ma Zhiyi, Shao Weizhong, Hu Changjun. A Graphical Modeling Language for Model Transformations[J]. Journal of Computer Research and Development, 2015, 52(9): 2145-2162. DOI: 10.7544/issn1000-1239.2015.20148187
    [4]Yang Hailu, Zhang Jianpei, and Yang Jing. Community-Based Bidirectional Feedback System for Hybrid Worm Containment in Mobile Internet[J]. Journal of Computer Research and Development, 2014, 51(2): 311-324.
    [5]Zhang Shuifa, Ding Huan, and Zhang Wensheng. Background Modeling and Object Ddetection Based on Two-Model[J]. Journal of Computer Research and Development, 2011, 48(11): 1983-1990.
    [6]Feng Chaosheng, Qin Zhiguang, Laurence Cuthbert, Laurissa Tokarchuk. Reactive Worms Propagation Modeling and Analysis in Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2010, 47(3): 500-507.
    [7]Wang Yuewu, Jing Jiwu, Xiang Ji, and Liu Qi. Contagion Worm Propagation Simulation and Analysis[J]. Journal of Computer Research and Development, 2008, 45(2): 207-216.
    [8]Zhou Hanxun, Zhao Hong. Modeling and Analysis of Active-Benign Worms and Hybrid-Benign Worms[J]. Journal of Computer Research and Development, 2007, 44(6): 958-964.
    [9]Chang Qun, Wang Xiaolong, Lin Yimeng, Daniel S. Yeung, Chen Qingcai. Reducing Gaussian Kernel's Local Risks by Global Kernel and Two-Stage Model Selection Based on Genetic Algorithms[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Wang Bailing, Fang Binxing, Yun Xiaochun, Zhang Hongli, Chen Bo, Liu Yixuan. A New Friendly Worm Propagation Strategy Based on Diffusing Balance Tree[J]. Journal of Computer Research and Development, 2006, 43(9): 1593-1602.

Catalog

    Article views (797) PDF downloads (687) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return