{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:28:27Z","timestamp":1762522107611,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ccst.2017.8167809","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T23:28:21Z","timestamp":1512689301000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Complex safety study of intelligent multi-robot navigation in risk's environment"],"prefix":"10.1109","author":[{"given":"Chaima","family":"Bensaci","sequence":"first","affiliation":[]},{"given":"Youcef","family":"Zennir","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Pomorski","sequence":"additional","affiliation":[]},{"given":"El-Arkam","family":"Mechhoud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"6","article-title":"Autonomous Robot Path Planning Using Particle Swarm Optimization in Dynamic Environment with Mobile Obstacles & Multiple Target","author":"islam","year":"2014","journal-title":"Int'l Conf on Mechanical Industrial and Energy Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24728-6_28"},{"key":"ref12","first-page":"174","author":"xia","year":"2015","journal-title":"Intelligent Mobile Robot Learning in Autonomous Navigation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2014.6862345"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1311-129"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5772\/10528"},{"key":"ref4","first-page":"17","author":"pecuchet","year":"2012","journal-title":"Kinect for X-Box 360"},{"key":"ref3","first-page":"212","author":"guiochetg","year":"2003","journal-title":"Ma&#x00EE;trise de la s&#x00E9;curit&#x00E9; des syst&#x00E8;mes de La robotique de service Approche UML bas&#x00E9;e sur une Analyse du risque syst&#x00E8;me"},{"key":"ref6","first-page":"103","article-title":"Multi-Actors distributed control systems: Reinforcement signal by Shannon's Entropy","author":"zennir","year":"2012","journal-title":"The 24th European modeling & simulation on symposium (EMSS'12)"},{"key":"ref5","first-page":"126","author":"froquet","year":"2005","journal-title":"Contribution &#x00E0; l'analyse des risques Proposition d'une m&#x00E9;thode par sc&#x00E9;narios et capitalisation de la connaissance"},{"key":"ref8","first-page":"277","article-title":"Control of the trajectory of a hexapod robot based on distributed Q-learning","author":"zennir","year":"2004","journal-title":"IEEE International Symposium on Industrial Electronics"},{"key":"ref7","first-page":"301","article-title":"Obstacle Avoidance of mobile robot using PSO based Neuro Fuzzy Technique","volume":"2","author":"dutta","year":"2010","journal-title":"International Journal on Computer Science and Engineering (IJCSE'10)"},{"key":"ref2","first-page":"217","author":"mouad","year":"2014","journal-title":"Architecture de Contr&#x00F4;le\/Commande d&#x00E9;di&#x00E9;e aux syst&#x00E8;mes Distribu&#x00E9;s Autonomes application &#x00E0; une plate-forme multi-vehicules"},{"key":"ref1","first-page":"64","article-title":"Architecture logicielle et mat&#x00E9;rielle pour fusion tol&#x00E9;rantes au fautes pour syst&#x00E8;mes multi-robots sous ROS","author":"wehbi","year":"2015","journal-title":"Raport"},{"key":"ref9","first-page":"896","article-title":"Distributed reinforcement learning of a six-legged robot to walk","author":"zennir","year":"2003","journal-title":"4th International conference on control and automation IEEE Control chapter Singapore Montreal section"}],"event":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2017,10,23]]},"location":"Madrid","end":{"date-parts":[[2017,10,26]]}},"container-title":["2017 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8122075\/8167784\/08167809.pdf?arnumber=8167809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:15Z","timestamp":1516056435000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8167809\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccst.2017.8167809","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}