1. Introduction
Recent years have witnessed an explosive growth of research studies on search from the perspective of mobile agent computing. One of the reasons is because one finds countless natural applications of search and exploration in distributed systems in order to facilitate information exchange between communicating entities. Moreover, there are also applications in numerous other computing areas such as data mining, web crawlers, monitoring and surveillance, just to mention a few.
Evacuation, which is the main theme of our present investigation, is related to search in that one is also interested in searching and exploring a domain in order to find a target. However evacuation usually involves many cooperating entities forming an ensemble or group all of whose members are searching simultaneously by exchanging information (according to a predefined communication model); and unlike search which typically involves only one agent, it is aiming to optimize the arrival time of the last entity in the ensemble. There are many factors that affect how linear search and evacuation problems are solved. Let us assume that the exit is located on a line at a distance d from the origin where the robot starts. The orientation represents the direction that the robot must proceed to reach the exit. The simplest case would be if a robot moving with unit speed knows the distance and the orientation and can thus reach the exit in time d. In this case, the competitive ratio will be the time needed by the robot to reach the exit, which is d, divided by the time needed by the adversary to head to the exit directly, which is d as well. Thus the competitive ratio will be 1. A more complicated case would be if the distance is known and the orientation is not known. As a worst case scenario, it may take the robot to find the exit since the robot may move d in the wrong direction and thus it will need to switch the direction and move back to reach the exit. The competitive ratio in this case is 3. The problem is even more complicated if both the distance and the orientation are not known. The robot starts at the origin and can move with speed 1. The robot needs to explore both directions in order to find the exit. The best way to achieve this goal is to select a direction and move distance 1. If the exit is not found, the robot will reverse direction and move double the previous distance up until the exit is found. The movement, which is repeated periodically, and which uses a sequence of positive distances that specifies the turning points, is called the Zig-Zag search algorithm. The competitive ratio for the Zig-Zag search algorithm is known to be 9 [1]. Most of the linear search and evacuation problems in the literature were studied using single or multiple robots. Introducing a tool such as a bike to aid the robots was not considered before in any previous work. The study of this paper is based on a new paradigm concerning two robots (also called hikers) aided by a bike and searching for an unknown exit placed somewhere on an infinite line. More specifically, in the “bike assisted evacuation” problem, the hikers and the bike all start at the origin and want to evacuate from an exit placed at an unknown distance and direction (either left or right from the origin) on the infinite line. Evacuation means that eventually both robots must find the exit by reaching its exact location (not necessarily at the same time) on the infinite line. The quality of an evacuation algorithm is measured by the time it takes the second hiker to find the exit, which is also referred to as evacuation time of the ensemble.
1.1. Model and Notation
To analyze the problem proposed, first we describe details concerning mobility and communication of the hikers and describe the role that the bike will play in improving the overall evacuation time.
Mobility and Trajectories.The infinite line is the search domain. It is bidirectional in that the hikers can move in either direction without this affecting their speeds. The hikers can stop at any time and wait as long as they wish, can walk with maximum speed 1 or may ride the bike with speed . An evacuation algorithm is a complete description of the trajectories traced by the two hikers either waiting, walking or riding the bike until they both find the exit. Throughout this paper we are interested in evacuation algorithms.
Sharing the bike. An interesting feature of our problem is the distinction between the hikers and the bike. On the one hand, the hikers are autonomous mobile agents that can move around on their own with speed 1 and communicate with each other. On the other hand, the bike is not autonomous and cannot move and/or communicate on its own and thus plays only the role of assistant in the search. The hiker using the bike has an advantage in that it can move with speed which is of course faster than its walking speed 1. However, in our model the bike is also a limited resource in that it can be used by only one hiker at a time. This creates an interesting trade off for the evacuation time. The hikers would want to ride the bike to find the exit earlier. However, if the bike is not shared the evacuation time may get worse as the hiker not using the bike may worsen the overall evacuation time. This also implies that the hiker riding the bike has an advantage in sharing the bike with the other hiker as this will ultimately improve the overall evacuation time.
Bike Switching. An important aspect in our algorithms will be “bike switching”, by which we mean changing the rider of the bike. We will assume throughout the paper that bike switching between hikers is instantaneous and at no time cost. Note that the hikers may recognize the presence of the bike when they are at the same location as the bike. From now on, to facilitate our discussions we will refer to the hiker riding the bike as the biker, which may be either of the two hikers.
Communication. A designated point on the infinite line is the exit and can be recognized as such by any of the hikers when they are at the same location as the exit. The hikers may communicate throughout the execution of the algorithms. Two types of communication will be studied, namely wireless (also known as wifi) and face-to-face. In the former, the hikers can communicate instantaneously and at any distance, while in the latter only when they are at the same location and at the same time. The fact that a hiker is riding the bike does not diminish its ability to communicate. A typical communication exchange may involve, e.g., “exit is found”, “bike released”, “switch bike”, etc. Note that the hikers are endowed with pedometers and have computing abilities so that they can deduce the location of the other hiker and/or the bike from relevant communications exchanged and/or the protocols they execute.
Notation. Throughout the paper we will be using and to denote the two hikers and B to denote the bike. The hikers are equipped with pedometers and are identical in all their capabilities (locomotion and communication) and the subscripts in do not imply that the hikers have identifiers. The origin of the real line will be at the point on the x-axis and this will also be the starting location of the hikers and the bike. The adversary may place the exit at either of the points ±d, where will denote the unknown distance of the exit from the origin. In addition, will denote the speed that a biker can attain when riding the bike.
1.2. Related Work
The continuous infinite line is a widely-used search domain. It is in this particular domain that the first search problems in the literature were proposed in the seminal papers [2,3] with a focus on stochastic search models and their analysis. Influential research for deterministic search by a single robot in the infinite line was developed in the work of [1] by proving that searching for a target has competitive ratio equal to 9, and for randomized search on the star graph by [4].
Evacuation is a form of group search in which the robots need to cooperate so that they all find the exit. It arises as a natural problem on the infinite line for the case of robots with faults (crash and/or Byzantine). The two important papers are [5] for robots with crash faults and [6] for robots with Byzantine faults. The study of evacuation in distributed computing for a unit disk is also related and was initiated in the paper [7] for both the wireless and face-to-face models. The reader can find additional related work on the continuous search domain in the survey paper [8].
The addition of an immobile token to aid in the exploration has been considered in the context of the rendezvous problem on a ring [9]. An extension of this work to mobile tokens can be found in [10]. In both of these papers the token is passive and is merely being used as a marker for the presence of the most recent “visit” of another agent. Similarly, in [11] the authors consider searching for a non-adversarial, uncooperative agent, called bus, which is moving with constant speed along the perimeter of a cycle. A different related model was investigated in [12] in which during search a robot can encounter a point or a sequence of points enabling faster and faster movement and the main goal is to adopt the route which allows a robot to reach the destination as quickly as possible.
Two related papers are [13] and its followup journal version [14]. In the former paper the authors introduce evacuation on an infinite line in the F2F model for two robots having max speed 1 and prove that 9 is a tight bound for evacuation. In the followup paper [14] tight bounds are shown for two robots with different speeds in the F2F model. In their model the robots can vary their speed between the min and max value. However, unlike our model, the slower robot is never able to move at the speed of the faster robot. As a consequence in our model a “shared” bike has the effect of averaging the speeds and improving the overall evacuation time of the ensemble. The main idea considered in the present paper of bike assisted evacuation modelled as a passive agent that can enhance the robots’ evacuation time has not been considered in the relevant literature on search and evacuation before. (The present study is revised and updated from the first author’s MCS Thesis [15]. A preliminary study without proofs in [16]).
It is also worth mentioning a different line of research that has evolved in recent years, concerning bike sharing systems in complementing traditional public transportation to reduce traffic congestion and mitigate atmospheric pollution. As a consequence bike-sharing has grown explosively everywhere [17]. This has led to extensive technical literature on different aspects of the performance of bike based transportation systems. For example, Ref. [18] addresses uncertainty in resource availability, Ref. [19] considers bike utilization conflict, Ref. [20] studies system balance maintainance, Ref. [21] investigates the efficient operation of shared mobility systems, Ref. [22] studies balancing, and [23] proposes a spatio-temporal bicycle mobility model. Finally we mention the recent paper [24] which gives a polynomial time algorithm for the Bike Sharing problem that produces an arrival-time optimal schedule for bikers to travel across the interval.
1.3. Outline and Results of the Paper
Our main results in the Wireless model are presented in Section 3. We give three algorithms: in the first the robots move in opposite direction with max speed, in the second with a specially selected “optimal” speed, and in the third the hiker imitates the biker. Results on the Face-to-Face model are presented in Section 4. We give three algorithms: in the first algorithm the hiker pursues the biker, in the second the hiker and the biker use zig-zag algorithms with specially chosen expansion factors, and in the third the algorithm establishes a sequence of specially constructed meeting points near the exit. In either communication model we conclude that the optimal algorithm depends on the speed v of the bike which we also determine. Details of the results are in Table 1.
We also establish lower bounds in Section 5. The competitive ratio of the algorithms can be given by dividing by , where d is the distance of the exit from the origin (see Theorem 7). The main motivation of our current study on robot evacuation from an unknown target is to better understand the effect that communication models (F2F and Wireless) have on search and evacuation time for an autonomous mobile agent which is aided by another mobile agent (bike) which has limited mobility capabilities.
2. Preliminaries
In this section we remind the reader that the competitive ratio for the Zig-Zag search algorithm is known to be at most 9. A canonical Zig-Zag search algorithm is defined as follows (Algorithm 1):
Algorithm 1: Zig-Zag Algorithm |
The competitive ratio for Algorithm 1 is calculated as follows:
Every time the robot changes direction and moves twice the previous distance. Thus, if the exit is at distance d, then for some k. Hence the search time T will be calculated as follows:
Thus, the competitive ratio of this algorithm is . The lower bound proof can be found in [1].
3. Evacuation in the Wireless (WiFi) Model
In this section we provide our main algorithms in the wireless communication model. In this model the two hikers can communicate instantaneously at any distance. Three algorithms will be considered and analyzed their evacuation time depends on the maximum speed v of the biker.
3.1. Opposite Direction with Max Speed
In Algorithm 2, the hiker and the biker move in opposite directions with their maximum speed, assuming that the biker moves with speed v. The one which finds the exit first will communicate with the other to proceed to the exit. Moreover, if it is the biker that found the exit first it returns the bike to a suitable position and shares it with the hiker. Details of the algorithm are as follows.
Algorithm 2: (OppDirectionWithMaxSpeedWiFi) |
The evacuation time for Algorithm 2 in the WiFi model is at most
Without loss of generality assume the hiker moves in the leftward and the biker in the rightward direction both starting from the origin. There are two cases to consider depending on whether the hiker or the biker finds the exit first.
Case 1: The exit is found by the biker.
When the biker finds the exit, which is at distance d from the origin, it has spent time . The biker will communicate with the hiker, to come to the exit. Since the exit is found by the biker first, the biker can help the hiker by returning and dropping off the bike at some distance x away from the exit such that the hiker can pick it up and arrive to the exit at the same time as the other robot. It is easy to see that to find the distance x where the bike is dropped off, we need to solve the equation . This leads to the solution . Hence the hiker which is at distance when the biker reaches the exit, will need to reach the origin, in addition to to reach the exit. Therefore, the evacuation time will be .
Case 2: The exit is found by the hiker.
When the hiker finds the exit which is at distance d to the left of the origin, the biker will be at distance to the right of the origin. The hiker will communicate with the biker to come to the exit. The biker turns back and goes to the exit which takes additional time . It follows that the evacuation time in this case will be .
Therefore, by combining the two cases above, we conclude that the evacuation time for this algorithm will be . This completes the proof of Theorem 1. □
3.2. Opposite Direction with Optimal Speed
Unlike Algorithm 2 in which the hiker and biker use their maximum speed, in the next Algorithm 3 the biker will not use its maximum speed v. Instead it will move with a specially chosen speed u which is less than v. The hiker or the biker which finds the exit first will communicate with the other which will then move towards the exit with its maximum speed. It turns out that the modified algorithm performs better than the previous one and it is optimal up to a certain maximum speed v. Assuming that is the hiker and is the biker, the algorithm will be as follows.
Algorithm 3: (OppDirectionWithOptimalSpeedWiFi) |
The evacuation time for Algorithm 3 using the WiFi model is at most.
Assume that which is the hiker moves in the leftward direction and , which is the biker, moves in the rightward direction. There are two cases to consider depending on who reaches the exit first.
Case 1: Hiker reaches the exit first.
The time needed by to reach the exit is d. At this point will be at distance away from the origin since it is moving with speed u. As mentioned in the algorithm, will use its maximum speed v on the way back. Thus, it needs to reach the origin and it will need additional time to join and reach the exit. Therefore, the evacuation time in this case will be
Case 2: Biker reaches the exit first.
The time needed by to reach the exit is . As soon as reaches the exit, it will inform immediately. At this point in time, will be at distance on the other side of the origin since it is moving with unit speed. will go back distance x to drop off the bike for . The key point to find x is to have drop off the bike in a way that can pick it up and arrive at the same time as . We know from Algorithm 2 that will not use its maximum speed and will move with speed u only until it reaches the exit. The only reason for not using its maximum speed before reaching the exit is to avoid having and farther apart from each other since this will increase the overall evacuation time. Thus when goes back to drop off the bike, it will use its maximum speed v. Based on that we have the following equation.
whose solution is . Substituting x in order to calculate the evacuation time yields:In order to find the best evacuation time, we need to find the best value of u which makes the maximum of and minimized given that . This means that the objective is to minimize the following quantity
(1)
In order to find the solution for (1), we determine the point of intersection of the evacuation time plots for and . This will give the following:
The last equation will have two roots, and choosing the positive one gives the following solution for u:
In order to get the evacuation time T, we can substitute u in or , we get the following:
This completes the proof of Theorem 2. □
3.3. Slower Imitates Faster
In the next Algorithm 4 the robots perform a “doubling zig-zag” strategy with different parameters. The biker is using a doubling strategy to search for the exit and moves a distance during the k-th iteration. The hiker is also using a doubling strategy but since it is moving with unit speed it will try to stay as close as possible to the biker. This can be achieved by having the hiker move a distance during the k-th iteration, since moving any further will cause the hiker to be farther away from the biker during the -st iteration. Assuming that robot is the biker and robot is the hiker, the algorithm will be as follows.
Algorithm 4: (SlowerImitateFasterWiFi) |
The evacuation time for Algorithm 4 using the WiFi model is at most
In this algorithm the biker uses a doubling strategy with maximum speed v. The hiker will follow the biker but will move in each iteration instead of . The biker will reach the exit first then will communicate with the hiker to proceed to the exit. The biker will go back distance to drop off the bike so that the hiker can pick it up on its way to the exit. We will justify why biker needs to move after reaching the exit to leave the bike for hiker .
After biker reaches the exit, there is no benefit to stay at the exit with the bike since hiker which is moving with unit speed can benefit from the bike to reach the exit faster. The key to find the distance x which is the distance between the exit and the point where the bike is dropped off is to have biker , drop it off at a point such that when it goes back to the exit it will reach the exit at the same time as hiker . If we consider that d is the distance from the origin to the exit and x is the distance from the exit to the point where biker drops off the bike, then we have which leads to . This will guarantee that when the biker drops off the bike at distance x, it will reach the exit at the same time as the hiker. Hence we guarantee that the bike is not kept unnecessarily with the robot which reaches the exit first.
Assume that the exit is found during the kth iteration, then . We can calculate the evacuation time as follows:
This completes the proof of Theorem 3. □
Figure 1 depicts and compares the performance of the three algorithms presented for the WiFi model.
4. Evacuation in the Face-to-Face (F2F) Model
In this section we provide our main algorithms in the face-to-face communication model. Recall that in this model the hikers can exchange messages only if they occupy the same location at the same time.
4.1. Slower Pursues Faster
In the first Algorithm 5, we assume that the hiker will follow the biker. Since the biker is using a “doubling zig-zag” strategy, during any iteration, let us say the k-th one, the biker will reverse the direction after reaching and will meet the hiker at some point . At the meeting point the hiker will reverse its direction. We notice from this that the hiker is following a deterministic strategy specified through a sequence of points (to be defined later), where each represents the meeting point for the hiker and the biker during the k-th iteration. In other words, the biker will follow a doubling strategy with factor while the hiker will follow the sequence above. When the biker reaches the exit, it will go back a certain distance x, which will be determined later, to drop off the bike and then will return back walking toward the exit.
In the algorithm below we use the parameters , . Further, we assume that is the biker and is the hiker.
Algorithm 5: (SlowerPursueFasterF2F) |
The evacuation time for Algorithm 5 using the F2F model is at most
In order to find the sequence , we argue as follows. During the 1st iteration, in order to calculate , we know that the biker will move to reach the peak point and then will come back with speed v to reach point while the hiker will move with unit speed during the same time. Given that and , we have the following:
During the 2nd iteration we have the following:
Since , then for the kth iteration we have:
Replacing in the above equation gives
Similarly replacing gives
Recursing down to leads to the following calculation:
Assume that the exit is found during the kth iteration of the algorithm. Before writing down the evacuation time, let us find the distance x away from the exit, where the bike will be dropped off by the biker. We know that the biker and the hiker will meet at each entry of the sequence and eventually they will meet at .
Define to be the time needed by the biker to go to the exit from the point of intersection between the the biker and the hiker at then to return distance x to drop off the bike and subsequently go back to the exit. Thus can be defined as follows:
Define to be the time needed by the hiker to go from the point of intersection between the hiker and the biker at to the exit while picking up the bike on its way. Thus can be defined as follows:
The best thing that the biker can do is to drop off the bike and arrive at the same time to the exit with the hiker who will pick up the bike on its way. This can be achieved by having . In turn, this yields
Thus, the evacuation time T can be written as follows:
Replacing the value of x which was calculated above gives:
Now recall that , where and . Since and it is obvious that . Moreover, knowing that , the evacuation time T can be simplified as follows:
This completes the proof of Theorem 4. □
4.2. Slower Evacuation Close to Exit without Aid
In the second Algorithm 6, the biker uses a “doubling zig-zag” strategy with its maximum speed v, while the hiker will try to be as close as possible to the biker. In order to achieve that, the hiker will use a doubling strategy as well but will use its own “expansion” factor. The factor will be determined based on the fact that both the hiker and the biker should meet at a specific point during each iteration. These meeting points will form a sequence whose k-th element during iteration k is taken to be equal to . During the last iteration, when the biker finds the exit, the hiker will eventually reach the meeting point and will not find the biker there. This will let it know that it should keep going toward the exit. Assuming that initially is the biker and is the hiker, the algorithm will be as follows:
Algorithm 6: (SlowerEvacuationCloseToExitWithoutAidF2F) |
The evacuation time for Algorithm 6 using the F2F model is at most.
The biker is using a doubling strategy and is moving during each iteration k. The hiker will use a doubling strategy as well and it will follow the biker. In order to keep the hiker as close as possible to the biker, we must find the sequence that the hiker should follow. We assume that both the hiker and the biker meet at a certain point and that they are willing to meet at point at the same time without waiting for one another, taking into consideration that . The sequence can be calculated as follows:
We have the sequence given that where . Each of the hiker and the biker will use its own doubling strategy. During each iteration, they will meet on both sides at specific points which are elements of the above sequence. During the kth iteration, when the biker reaches the exit, it will move back distance x to drop off the bike such that the hiker can pick it up and reach the exit at the same time as itself. The distance x can be calculated as follows: Substituting this becomes Solving for x, the last equation yields . Assuming that and replacing x which was calculated above, the evacuation time T can be computed as follows:
This completes the proof of Theorem 5. □
4.3. Nearest Meeting to Exit
In order to reduce the evacuation time, it is more suitable for the biker to search for the exit while the hiker follows a “doubling zig-zag” strategy that will keep it as close as possible to the biker and will expedite its travel time to the exit during the last iteration of the evacuation algorithm. In order to achieve that, the purpose of the next algorithm will be to find this deterministic doubling strategy that the hiker should follow. Assuming that is the biker and is the hiker, Algorithm 7 will be as follows.
Algorithm 7: (EvacuatingWithBikeF2F) |
The evacuation time for Algorithm 7 using the F2F model is upper bounded by
Let us consider the sequence: , where . The purpose is to find the best value of r which is the factor related to the doubling strategy that the hiker follows. Definitely the best meeting point would be the peak point reached by the hiker during each iteration, since it will be the closest to the exit. Assume that both the hiker and the biker meet at some point during the iteration and they are willing to meet during the k-th iteration without waiting for one another, then we have:
and after substitutingIn turn, this implies
Similarly we have . Consider , then we can deduce that . Substituting gives . So we conclude that the hiker will use doubling strategy and will follow the sequence . Assume that is the biker which moves with speed v and is the hiker which moves with unit speed. Consider where . Definitely will reach the exit before . Since the exit is at distance e from the meeting point, then from that point on, needs time to reach the exit. During this time, will be at distance e on the other side of the meeting point. Therefore, when reaches the exit, will be at distance away from the exit. The distance z that hiker moves from the point where reaches the exit till the point it meets will be as follows:
Therefore, when biker reaches hiker to inform it about the exit, will be far from the exit by a distance . Now it is required to find at what distance y away from the exit should biker drop off the bike so that hiker can pick it up and proceed to the exit and reach it at the same time as . After we find out the distance y, we will go back to create the algorithm for the two hikers with a bike model. In order to find out the distance y we have the following:
The evacuation time T can be calculated as follows:
Since , replacing in the above equation gives the following:
There are two cases to consider here:
Case 1: .
Since and we have that
Case 2: .
Since and we conclude that
This completes the proof of Theorem 6. □
Figure 2 depicts and compares the performance of the three algorithms presented for the face-to-face model.
5. Lower Bounds
In this section we establish lower bounds on the competitive ratio in the WiFi and F2F models. Using bike sharing, first we prove a tight bound on the evacuation time when the robots know in which direction from the origin the exit is. Note that Theorem 7 can readily be used to compute the competitive ratio of the algorithms presented in Section 3 and Section 4.
If the direction of the exit is known to the robots then evacuation time is and this is optimal.
Consider the algorithm whereby robot rides the bike for a distance x, releases the bike at x and continues by walking the remaining distance , while robot walks for a distance x, picks up the bike at x and rides it for the remaining distance . Note that robot reaches the exit at time , while robot reaches the exit at time . For the two robots to arrive at the same time it is required that , which solves for . Hence, the algorithm ensures that the two robots evacuate in time .
Next we prove that the evacuation time above is optimal. If the robots never share the bike then the evacuation time will be d, which is also the arrival time of the slowest robot. So we may assume the robots share the bike. Let be the termination time for robot in an optimal algorithm. Let be the distance that robot rides the bike. Without loss of generality let be the robot that fetches the bike from the origin. Clearly, this takes time . Therefore . Similarly, for robot we have that . It follows that
where in the last inequality we used the fact that , since by assumption only one robot can ride the bike at a time. This completes the proof of Theorem 7. □Using Theorem 7 we can prove the following result.
The evacuation time of any algorithm in either the WiFi or F2F model is bounded from below by
Assume the two robots are starting at the origin and that the exit is placed at one of the two locations which are unknown to the robots. Lets call the points endpoints of the interval . Without loss of generality assume that is the first endpoint visited by a robot.There are two cases to consider depending on who is visiting this endpoint first.
Case 1: The biker visits first.
To arrive at the endpoint the biker has already spent time at least since he travels with speed v. At the time the biker arrives at the hiker may be located either in the subinterval or in the subinterval . There are two subcases to consider depending on which of the two subintervals the hiker is located
If the hiker is located in the interval then the adversary places the exit at in which case by Theorem 7 the evacuation time will be at least .
If the hiker is located in the interval then the adversary places the exit at in which case again by Theorem 7 the evacuation time will be at least .
Therefore regardless of the position of the hiker the evacuation time in this case is at least .
Case 2: The hiker visits first.
To arrive at the endpoint the hiker has already spent time d since he travels with speed v. As before, the adversary will place the exit at the other endpoint . Unaided from the bike the hiker will take additional time to arrive at the exit which is located at . However, in the wireless model the hiker can announce the exit has been found and therefore the two robots can share the bike to arrive at the exit . In view of Theorem 7 this takes additional time at least . Hence, in this case a lower bound on the evacuation time is .
Combining the two cases completes the proof of Theorem 8. □
6. Conclusions
We proposed several evacuation algorithms in the wireless and face-to-face models. For each communication model we presented three algorithms which take advantage of the existence of the bike, a limited resource which can increase the search speed of the system of two robots. The resulting trajectories of the robots are specially designed so as to share the bike and ultimately reduce the overall evacuation time. We also discussed lower bounds.
The problem investigated is of theoretical nature and helps illuminate the trade offs between communication, and search time in search with mobile agents. Our study gives rise to several challenging open problems. For two robots, one could consider the problem when the speed of the bike depends on the hiker riding it. The case of multiple hikers and multiple bikes (not necessarily the same number) has never been investigated before. Additionally, one could also consider the case of faulty robots (crash or Byzantine). It would also be interesting to investigate other search domains such as stars and cycles or robots with reduced and/or enhanced capabilities.
Author Contributions
Conceptualization, K.J. and E.K.; methodology, K.J. and E.K.; resources, K.J. and E.K.; data curation, K.J. and E.K.; writing—original draft preparation, K.J. and E.K.; writing—review and editing, K.J. and E.K.; supervision, K.J. and E.K.; project administration, K.J. and E.K.; funding acquisition, K.J. and E.K. All authors have read and agreed to the published version of the manuscript.
Funding
Research of the second author was supported in part by NSERC Discovery grant.
Institutional Review Board Statement
Not applicanle.
Informed Consent Statement
Not applicanle.
Data Availability Statement
Data sharing not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figures and Table
Figure 1. Graph for the three algorithms using the wi-fi model. On high speed, the evacuation time for Algorithm 4 converges to d2 versus 2d and d for Algorithms 2 and 3, respectively.
Figure 2. Graph for the three algorithms using the face-to-face model. On high speed, the evacuation time for Algorithm 7 converges to d2. The same is for Algorithm 6 versus d for Algorithm 5.
Main algorithms presented in the paper in the WiFi (top three) and Face-to-Face (F2F) (bottom three) models, the theorem where the analysis, and their corresponding evacuation time as a function of the bike’s speed v, where .
Algorithm | Theorem | Evacuation Time |
---|---|---|
Algorithm 2 (WiFi) | Theorem 1 | |
Algorithm 3 (WiFi) | Theorem 2 | |
Algorithm 4 (WiFi) | Theorem 3 | |
Algorithm 5 (F2F) | Theorem 4 | |
Algorithm 6 (F2F) | Theorem 5 | |
Algorithm 7 (F2F) | Theorem 6 | if |
if |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Two robots and a bike are initially placed at the origin of an infinite line. The robots are modelled as autonomous mobile agents whose communication capabilities are either in the wireless or face-to-face model, while the bike neither can move nor communicate on its own. Thus, the bike is not autonomous but rather requires one of the robots to ride it. An exit is placed on the line at distance d from the origin; the distance and direction of the exit from the origin is unknown to the robots. Only one robot may ride the bike at a time and the goal is to evacuate from the exit in the minimum time possible as measured by the time it takes the last robot to exit. The robots can maintain a constant walking speed of 1, but when riding the bike they can maintain a constant speed
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 School of Computer Science, Carleton University, Ottawa, ON K1S 5B6, Canada;
2 School of Computer Science, Carleton University, Ottawa, ON K1S 5B6, Canada;