<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cellular automata-based model of group motion of agents with memory and related continuous model</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander V. Kuznetsov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>= T E</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Voronezh State University</institution>
          ,
          <addr-line>1 Universitetskaya pl., Voronezh, 394018</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>World = OWorld</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <fpage>223</fpage>
      <lpage>231</lpage>
      <abstract>
        <p>The paper describes the construction of the motion and interaction model for agents with memory. Agents move on the landscape consisting of squares with different passability. We briefly characterize the cellular automata-based model with one common to all agents layer corresponding to the landscape and many agent-specific layers corresponding to an agent's memory. Also, we develop methods for the random landscape generation and the simulation of a communication system. Finally, we study a connection between the discrete agent motion model and the continuous concentration law for the system of agents.</p>
      </abstract>
      <kwd-group>
        <kwd>cellular automaton</kwd>
        <kwd>motion model</kwd>
        <kwd>conflict model</kwd>
        <kwd>agent system</kwd>
        <kwd>random landscape generation</kwd>
        <kwd>landscape metrics</kwd>
        <kwd>concentration law</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction and definitions</title>
      <p>1/2
and characterizes landscape heterogeneity in whole.</p>
      <p>Definition 4. Total Edge Density (TED) of the landscape L is the ratio T E(L) to the total cell quantity N in the L</p>
    </sec>
    <sec id="sec-2">
      <title>2. Description of the automaton</title>
      <p>k
[ S Worldag .
ag=1</p>
      <sec id="sec-2-1">
        <title>2.1. Objective reality</title>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Subjective reality</title>
        <p>Let the objective reality layer OWorld consists of cells (i, j) ∈ Z2 with different impassability ui j. The value of ui j is the
number of discrete time units which is required to pass the square ωi j with coordinates (i, j). If ωi j is completely impassable then
put ui j = −1. Also cells can include the information about an agent in a cell, the agent’s destination square etc.</p>
        <p>The subjective reality layer consists of cells (i, j) so that each its cell (i, j) corresponds the cell (i, j) of the objective reality
layer. Cells of the subjective reality layer ag contain the information about the current position of the agent ag, about the history
of the ag motion and about the impassability of known to the agent ag cells.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. The automaton’s functioning</title>
        <sec id="sec-2-3-1">
          <title>Briefly describe the cellular automaton (CA) functioning. Let us denote</title>
          <p>
            D = {(−1, −1), (−1, 0), (
            <xref ref-type="bibr" rid="ref1">−1, 1</xref>
            ), (0, −1), (0, 0), (
            <xref ref-type="bibr" rid="ref1">0, 1</xref>
            ), (
            <xref ref-type="bibr" rid="ref1">1, −1</xref>
            ), (
            <xref ref-type="bibr" rid="ref1">1, 0</xref>
            ), (
            <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
            )}.
          </p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Definition 6. Let us call agent’s cellular route the sequence</title>
        <p>M = {(i1, j1), (i2, j2), . . . , (is, js)|(ik, jk) ∈ Z2, k = 1, s, (ik+1 − ik, jk+1 − jk) ∈ D, k = 1, s − 1},
such as the agent in the square ωi1, j1 will be sequentially move into squares ωi2, j2 , . . . , ωis, js . Denote the set of all cellular routes
starting in the cell with coordinates cA ∈ Z2 and ending in the cell with coordinates cB ∈ Z2 as M (cA; cB).</p>
        <sec id="sec-2-4-1">
          <title>Let us define a function</title>
        </sec>
        <sec id="sec-2-4-2">
          <title>Introduce the notation:</title>
          <p>θ(x) = 0, x &lt; 0,
1, x ≥ 0.</p>
          <p>
ψ3(u, Tmax) = u, u ≥ 0,</p>
          <p>Tmax, u &lt; 0.</p>
          <p>T˜h(M) = X kdi jkψ3(ui j, Tmax).
If cell impassability does not change over time, then it is not necessary to consider the routes containing impassable cells. However,
if the impassable cell can become passable, these routes should be taken into account. To do this, define the functional
We call weight of the route M for the agent ag the following:
Λ(M; α, β, γ, Tmax) = αT˜h(M) + β X θ( fi j) + γ X visi j(ag),</p>
          <p>The agent in the square ωi j each discrete time tick tries to find locally optimal (in a neighborhood Vo(i, j) with radius o) route
Mo such that Λ(Mo; α, β, γ, Tmax) → min and go through this route. Therefore, the agent’s route at whole constructs from locally
optimal subroutes.</p>
          <p>Agent ag can apply previously described approach for route searching in undiscovered by this agent areas, i.e. in consisting
of cells ωi j with visi j(ag) = 0. More standard approaches to optimum route search, for example, Dijkstra’s algorithm, can be used
in areas composed of cells already visited. However, the use of standard methods of searching for an optimal route is limited to a
rate of landscape change over time. It is possible that information about the visited cells become outdated (parameter timei j(ag) is
used for determining the actuality of information), or even impassibility of the cells would change directly during the process of
passing the route selected as the globally optimal.</p>
          <p>Thus, depending on the speed of the landscape changes, it is necessary to find a compromise between the approach “Reacting”,
which evaluates the current situation immediately near of the agent and the approach “Planning”, in which searched globally
optimal trajectory. For example, it is pointless to set the radius o of the neighborhood Vo(i, j), in which agent searches locally
optimal route more than the number of ticks during which the landscape has remained unchanged.</p>
          <p>The example of the described cellular automaton is depicted on the fig. 1. Increasing of the impassability at the mentioned
figure is indicated with a darker tone, crosses “×” in the layer S World mark already visited cells, marks “?” correspond to cells
whose status is unknown.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Function of obstacles</title>
      <p>Turn to the continuous formulation of obstacle avoidance problem to construct transfer function for our CA. The agent moves
in the domain Ω with changing over time obstacles from the point A to the point B with route r(t), t ∈ [0, T ] in the shortest time T .</p>
      <sec id="sec-3-1">
        <title>This problem has the form</title>
        <p>hold, define that square ωi j on the state in moment kτ ∈ [0, T ] is crossable in non-diagonal direction in ui j(k) ticks.</p>
        <p>Moreover, it is possible to go to the integer values of the ui j(k) by discarding the fractional part and taking u˜i j(k) = [ui j(k)].
We associate with the agent in the square ωi, j value errci j of the cumulative discrete time error. Also we associate with the square
ωi j error value erri j = {ui j(k)}. When an agent starts to cross the next square ωi′ j′ , the value errci′ j′ increments on the erri′ j′ , sets
errci j = 0 and if errci′ j′ &gt; 1 then agent passes one tick independently from the value of the function of obstacles in the square ωi′ j′
and sets errci′ j′ = errci′ j′ − 1.</p>
        <p>Let</p>
        <p>T : M (cA; cB) → R
the functional of time which is required to going through cellular route.</p>
        <p>
          If values of the ui j do not change in a time of the movement from the point A to the point B, then the problem (
          <xref ref-type="bibr" rid="ref1">1</xref>
          )–(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) can be
represented as discrete problem
        </p>
        <p>kr˙(t)k = v(t, r(t)),
r(0) = A, r(T ) = B,</p>
        <p>T → min .
th =</p>
        <p>h
max(i, j)∈Ih,k∈Tτ vikj(h, τ)</p>
        <p>.
ui j(k) =</p>
        <p>h
thvikj(h, τ)
=
max(i, j)∈Ih,k∈Tτ vikj(h, τ)
vikj(h, τ)
We will call further the function v : [0, T ] × Ω → R as “function of obstacles”. Divide the segment [0, T ] onto the k subsegments
with length τ &gt; 0, domain Ω onto squares ωi j with numbers (i, j) ∈ Z2 and the length of a side h. Approximate at each moment of
time kτ ∈ [0, T ] on the square ωi j function v(kτ, ·) with the constant function vikj(h, τ).</p>
      </sec>
      <sec id="sec-3-2">
        <title>Go to the discrete time for the model simplifying. Let</title>
      </sec>
      <sec id="sec-3-3">
        <title>If relations</title>
      </sec>
      <sec id="sec-3-4">
        <title>It is clear that possible to minimize functional</title>
        <p>T (M) = th X kdi jkui j → min .</p>
        <p>Th(M) = X kdi jkui j → min</p>
        <p>
          |r(l(t)) − rh(lh(t))| ≤ (h √2 + τ)(ek∇(t,x,y)vkC([0,T]×Ω)K − 1) + h √2,
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
where l, lh are parameterizations of routes, h is the length of the square ωi j side, τ is the length of the time tick, K &gt; 0 is the
constant depending on a class of routes considered.
        </p>
        <p>Definition 7. Define the obstacle which is exists in the moment t ∈ [0, T ] as simply connected set Obst ⊂ Ω such that any
robst ∈ Obst is the point of a local minimum of the function of obstacles v(t, ·) and exists r0 ∈ Ω such that v(t, r0) &gt; v(t, robst).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. The model of a communication system and conflict</title>
      <sec id="sec-4-1">
        <title>Definition 8. Let us define communication graph as follows</title>
        <p>Γ(t) = (Ag, Comm, ϕ(t), M(t)),
where Comm is the set of channels, ϕ(t) : Ag × Comm → {0, 1} is the incidence function, M(t) : Comm → Rn is the markup
function in the moment of time t ∈ [0, NT ]. The M gives the features vector of the channel comm ∈ Comm. This features can be
channel bandwidth, radio frequency, etc.</p>
        <p>Let’s introduce a communication graph connected with the motion model. This means that should be given the function pag :
[0, NT ] × Ag → Z2 which maps agent’s coordinates to an agent in each moment t ∈ [0, T ]. Also, it means that M(t) and ϕ(t)
depend on properties of cells in which incident agents are currently placed and on properties of cells between of them. Therefore,
connections between agents in the Γ can break and establish depending on the agents’ speed and landscape type.</p>
        <p>Suppose that each agent ag ∈ Ag has an own signal exchange timetable. It is possibly also to define specific signals like
“enemy detecting”, “grouping”, etc. We can study various traffic models depending on the agents’ timetables, motion speed, and
the landscape type.</p>
        <p>Finally, we can define “requirements graph” Π and state that communication graph Γ(t) should be similar with Π in some
metric each moment of time. Such graph Π can be viewed as a fuzzy set of communication graphs, as an abstract container or as
a generator of the stream of communication graphs.</p>
        <p>Also, we developed the conflict model combined with the motion and communication model similar to described in the work
[6] and its computer simulation “Bokohod.” Agents emerge different kinds of tactics and exchange signals without any external
control.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Computational experiment</title>
      <p>Previously the author had developed the algorithm of the landscape generation with the given configuration entropy. This
algorithm constructs the vector of numbers of cells in each class V = (N1, . . . , Nl) by the given entropy S as follows:</p>
      <sec id="sec-5-1">
        <title>S t e p 1. Solve the equation</title>
        <p>β(1 − βl) − (1 − β)lβl</p>
        <p>S = − (1 − β)(1 − βl)
S t e p 2. Use the found solution 0 ≤ β ≤ 1 and equation
ln β + ln 1 − βl ,</p>
        <p>1 − β
N1 = N
1 − β
1 − βl
to find N1,</p>
        <p>S t e p 3. Compose the vector V0 = (N1, βN1, . . . , βl−1N1),</p>
        <p>S t e p 4. Round the components of the V0 up to integers and obtain the vector V1 in this way. It is necessary to make rounding
such that the sum of all components of V1 would be equal to N.</p>
        <p>We generate landscape such as the discrete function of the obstacles u : Z2 → Z would have local maxima strictly in Nobst =
Vl = βl−1N1 cells. The author thinks that this method gives more natural-like landscapes as it makes “generally passable” area
with some hardly passable subareas. As it known from [5] we can make very different landscapes with the same configuration
entropy. By this reason, we will use the special, CA-based way of the filling landscape with cells of different classes. This method
guarantees slow, near linear increasing of the TED at the increasing of the entropy.</p>
        <p>Examples of obtained landscapes are shown on the fig. 2, (a,b). Sample dependencies of the configuration entropy, TED, and</p>
      </sec>
      <sec id="sec-5-2">
        <title>Nobst are shown on the fig. 3.</title>
        <p>We set l = 9, n = m = 48, o = 6, choose Nobst ∈ {5} ∪ {10i|i = 1, 25} ∪ {255}. Generate landscape for the each Nobst value and
perform the following experiment1. Let an agent moves from the cell ω11 to the cell ωnn 100 times according to the previously
described algorithm. Next, we compute the time which is required for the experiment completion T biok and the time of the moving
from the ω11 to the ωnn by linear straight route Ttiup. Then we calculate the mean value and standard deviation of the win of time
for all of this series:</p>
        <p>win = 510 Xi5=01 TTbtiiuopk .</p>
        <p>1The raw data and the data processing program for all experiments are stored at https://www.researchgate.net/publication/316747096_The_
experimental_data_for_group_motion_of_agents_with_memory_with_the_program_in_Wolfram_Language.
(a) S = 1.6, Nobst = 14
(b) S = 1.8, Nobst = 33
u(x, t) = u0 ( erf (ξ1(S ; x, t)) − erf (ξ2(S ; x, t))),</p>
        <p>2
ξ1(S ; x, t) =</p>
        <p>+ b1(S ; x),
a(S ; x)</p>
        <p>√t
ξ2(S ; x, t) =
a(S ; x)
√t</p>
        <p>+ sgn (48 − x)b2(S ; x),</p>
        <p>It was found that the mean value of the win in transit time win and the configuration entropy of the landscape S are correlated
with a correlation coefficient 0.959556 (see fig. 4). The win and the TED of the landscape are correlated with a correlation
coefficient 0.964763. The orange line in the figure corresponds to the curve y = (S (Nobst) + 1) ln 9; the brown line corresponds to
the curve</p>
        <p>y = 0.922178 + 0.539383T ED(Nobst),
where S (Nobst) and T ED(Nobst) are the entropy and the total edge density’s mean value of the landscape with Nobst obstacles.</p>
      </sec>
      <sec id="sec-5-3">
        <title>Vertical bars correspond to the standard deviation of the win of time.</title>
        <p>Let’s study the dependence of the average number of agents on time moment and position on a landscape. We generate 150
random landscapes with the given entropy by the algorithm mentioned above. The group formed from u0 = 48 agents moves
from the one side of the squared landscape to the opposite one. Compute dependence of the average (through all landscapes
generated) number of agents u at the xth line of a landscape on the discrete time t, x = 1, xmax, xmax = 48. Thus, we find that
this dependence is determined, mainly, not by the particular kind of landscape, but by the landscape configuration entropy S . We
found the dependence in the form
where
sgn (x) = 1, x &gt; 0,</p>
        <p>−1, x ≤ 0.
u(x, t) = u20 erf 2xa−√l1t − erf 2xa−√l2t .</p>
        <p>a(S ; x) = a1(S )x + a2(S ),
b1(S ; x) = b11(S ) √x + b12(S ) +
b13(S )</p>
        <p>x3/2 ,
b2(S ; x) = b11(S ) √x + b22(S ).</p>
        <p>This form of ξ1 and ξ2 parameters was assumed by the analogy with the problem of heat propagation along a rod with a thermal
diffusivity a heated on its segment [l1, l2] to the temperature u0. This problem has (see, for example, [7]) solution</p>
      </sec>
      <sec id="sec-5-4">
        <title>Let us assume that</title>
        <p>These functions allow to approximate u = u(x, t) with the coefficient of determination r2 &gt; 0.97, the mean absolute error MAE &lt;
0.1251, and the median absolute error MedAE &lt; 0.04366 with every value of the entropy S . Experimental and approximated
values of u are shown on the fig. 5. For example, when Nobst = 20 (S = 1.67909)
u(x, t) = 24 erf −2.04693x√−t 1.03949 + 4.6x63/4238</p>
        <p>− erf −2.04693x√−t 1.03949 + 1.08597 √x + sgn (48 − x)0.845118 .</p>
        <p>
          Next, we try to find a problem for a partial differential equation which can have a solution in the form (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ). Naturally, we can
assume that this equation is
the initial condition is
and the asymptotic condition is
        </p>
        <p>Let us denote
∂u ∂2u ∂u
∂t = C1 ∂x2 + C2 ∂x ,
u(x, 0) = u0δ(x − 1),
δ(x) = 1, x = 0,
0, x , 0,

lim(x, t) = u0θ(x − xmax),
t→∞
θ(x) = 1, x ≥ 0.</p>
        <p>0, x &lt; 0,
</p>
        <p>U1(x, t) = e
U2(x, t) = e</p>
        <p>− a(S√;tx) +b22(S )+b11(S ) √x
− a(S√;tx) +b11(S ) √x+b12(S )+ bx133/(2S)
2</p>
        <p>MathematicalModeling/A.V.Kuznetsov</p>
        <p>
          Compute from the (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) that when x ∈ (1, xmax)
∂∂ut(x, t) = u0(U1(x, t) − U2(x, t))(a1(S)x + a2(S)),
        </p>
        <p>
          2 √πt3
∂∂ux(x, t) = −
u0 x2(U1(x, t) − U2(x, t)) 2a1(S) √x + b11(S) √t + 3b13(S) √tU2(x, t)
2 √πtx5
,
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
∂2u u0
∂x2 (x, t) = 4 √πt3/2x13/2 b13(S) √tU2(x, t)x3 4 4a1(S)2x2 + 6a1(S)a2(S)x + 7a1(S)b11(S) √tx3 + 3a2(S)b11(S) √tx +
+ 24a1(S)b12(S) √tx + t 10b11(S)2x + 12b11(S)b12(S) √x + 15 + 8a1(S)2 √tx13(b22(S)U1(x, t) − b12(S)U2(x, t))−
− 6b13(S)2tU2(x, t)x −a1(S)x3/2 + 3a2(S) √x + b11(S) √tx + 3b12(S) √tx + 8a1(S)b11(S)tx6(b22(S)U1(x, t) − b12(S)U2(x, t))+
+10a1(S)b11(S)2tU1(x, t)x13/2 −10a1(S)b11(S)2tU2(x, t)x13/2 +2b22(S)b11(S)2t3/2U1(x, t)x11/2 −2b11(S)2b12(S)t3/2U2(x, t)x11/2−
− 18b13(S)3t3/2U2(x, t) + (U1(x, t) − U2(x, t)) 8a1(S)3x15/2 + 8a1(S)2a2(S)x13/2 + 8a1(S)b11(S) √tx6(2a1(S)x + a2(S))+
        </p>
      </sec>
      <sec id="sec-5-5">
        <title>Solve (7), (8) with respect to U1, U2. Substitute into (6) values found and obtain</title>
        <p>C1(x, t) = QP11((√√xx,, √√tt)), C2(x, t) = QP22((√√xx,, √√tt)),
where</p>
        <p>Q1( √x, √t) = −3b11(S)tx2 4a1(S)2x13/2(b12(S)−b22(S))−2b13(S)x3 2a1(S)x(a1(S)x+a2(S))−2a1(S) √tx(b22(S)−2b12(S))+t +
+ b13(S)2 a1(S) √tx5 + 3a2(S) √tx3 + 3b12(S)tx3/2 + 3b13(S)3t + a1(S) 8a1(S)2 √tx9(b22(S) − b12(S))+
+ b13(S) 4a1(S) a1(S) √tx15 + 3a2(S) √tx13 − 12a1(S)tx13/2(b22(S) − 2b12(S)) + 15t3/2x11/2 −
− 6b13(S)2tx4 −a1(S)x + 3a2(S) + 3b12(S) √t − 18b13(S)3t3/2x5/2 + 3b11(S)2t3/2x4 b13(S) 3a1(S)x5/2 + a2(S)x3/2−
− (b22(S) − 2b12(S)) √tx3 + 2a1(S)x4(b22(S) − b12(S)) − b13(S)2 √t + b11(S)3t2x6 x3/2(b22(S) − b12(S)) + 2b13(S) ,
+ 2a2(S)b11(S)2tx11/2 + 2b11(S)3t3/2x6 + b11(S)t3/2x5 . (8)
3rdInternationalconference“InformationTechnologyandNanotechnology2017”
Q2( √x, √t) = 2 t −3b11(S )tx2 4a1(S )2 x13/2(b12(S ) − b22(S )) − 2b13(S )x3 2a1(S )x(a1(S )x + a2(S ))−
√</p>
        <p>√ √
− 2a1(S ) √tx(b22(S ) − 2b12(S )) + t + b13(S )2 a1(S ) tx5 + 3a2(S ) tx3 + 3b12(S )tx3/2 + 3b13(S )3t +
√ √
+ a1(S ) 8a1(S )2 √tx9(b22(S ) − b12(S )) + b13(S ) 4a1(S ) a1(S ) tx15 + 3a2(S ) tx13 −
− 12a1(S )tx13/2(b22(S ) − 2b12(S )) + 15t3/2 x11/2 − 6b13(S )2tx4 −a1(S )x + 3a2(S ) + 3b12(S ) √t − 18b13(S )3t3/2 x5/2 +
+ 3b11(S )2t3/2 x4 b13(S ) 3a1(S )x5/2 + a2(S )x3/2 − (b22(S ) − 2b12(S )) √tx3 + 2a1(S )x4(b22(S ) − b12(S )) − b13(S )2 √t +
+ b11(S )3t2 x6 x3/2(b22(S ) − b12(S )) + 2b13(S ) ,
√
P1( √x, √t) = −3b13(S ) tx13(a1(S )x + a2(S )),
√ √
P2( √x, √t) = x5/2(a1(S )x + a2(S )) −b13(S ) 4 4a1(S )2 x5 + 6a1(S )a2(S )x4 + 7a1(S )b11(S ) tx9 + 3a2(S )b11(S ) tx7 +
√ √
+24a1(S )b12(S ) √tx4+tx3 10b11(S )2 x+12b11(S )b12(S ) √x+15 +6b13(S )2 −a1(S ) tx5+3a2(S ) tx3+b11(S )tx2+3b12(S )tx3/2 −
√ 2
− 2x11/2(b22(S ) − b12(S )) 2a1(S ) √x + b11(S ) t + 18b13(S )3t .</p>
        <p>The form of coefficients a1(S ), a2(S ), b11(S ), b12(S ), b13(S ), b22(S ) depends on the landscape generation way. If we generate
landscape as described before then we can approximate these parameters as follows
where
Results of such approximation are shown into the fig. 6, x = xmax = 48.</p>
        <p>a(S ) = α(S )a(20),
b1(S ; x) = β1(S )b1(20; x),
b2(S ; x) = β2(S )b2(20; x),</p>
        <sec id="sec-5-5-1">
          <title>Nobst(S )</title>
          <p>10
α(S ) = 0.000344002
+ 1.00018,</p>
          <p>MAE &lt; 0.001,</p>
          <p>
            Note that we obtain different results by different landscape generation procedures. The general form of the function u will be
still described by the (
            <xref ref-type="bibr" rid="ref5">5</xref>
            ), but exact values of parameters can be entirely different. For example, it is possible to place squares of
different classes on the uniformly random way (fig. 2c). The comparison of functions u for a uniformly random landscape (right)
and for landscape generated in the previously described way (left) are depicted on the fig. 7.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>We obtained dependence of the win of movement by the proposed algorithm on the landscape’s configuration entropy for some
types of landscapes. The immediately following result may be a comparison of a model of the conflict based on the proposed
cellular automaton with the result of solution of the corresponding Osipov-Lanchester equations. Also, we compare models of the
“diffusion” of agents into a given sub-area based on the cellular automaton with the solution of the corresponding reaction-diffusion
type equation. Finally, we can simulate the sharing of the subjective reality layers between agents. In this case, one agent will use
the information about the area, received from other agents and will transmit such information to other agents itself. The algorithm
described in the article can be applied to the mobile robot equipped with a transport base, navigation equipment (compass, GPS
receiver, etc.), a sensor allowing to determine the impassibility of the terrain and the deciding unit, including memory.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>A model of the joint motion of agents with a three-level hierarchy based on a cellular automaton</article-title>
          [Text] / A.V. Kuznetsov //
          <source>Computational mathematics and mathematical physics. - 2017</source>
          . - Vol.
          <volume>57</volume>
          , no. 2. - P.
          <fpage>340</fpage>
          -
          <lpage>349</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2R]eKfuezrneentsocve,sA. Adaptive hierarchical system of the communication, control and decision support [Text] / A</article-title>
          .V. Kuznetsov // RLNC-2016. -Vol.
          <volume>1</volume>
          . -Voronezh
          <string-name>
            <surname>: NPF SAKVOEE</surname>
            <given-names>LLC</given-names>
          </string-name>
          ,
          <year>2016</year>
          . - P.
          <fpage>269</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] [1M]
          <string-name>
            <surname>Kauliznneettssokvi</surname>
            ,iA,
            <given-names>G.A.</given-names>
          </string-name>
          <string-name>
            <surname>Gm</surname>
          </string-name>
          .
          <article-title>oAdeplopflithceatjoioinnt mooftcioenllouflaagrenatustwoimthaattahrfeoer-lemveoldheielrianrgchtyhbeasmedootnioanceollfualargaruotoumpaotofnp</article-title>
          .
          <source>Ceoomplpeut[aTtioenxatl]m/aGth.eGm.atMicsaalnindemtsakthieim,Matic.Eal.pShytesipcsan20ts1o7;v5/7</source>
          /(2C):
          <fpage>o3m40p</fpage>
          -
          <lpage>u3t4a9t</lpage>
          .
          <source>ional [2M]KauthzneemtsoavtiAcs. AadnadptMiveahthieeramrcahtiiccaalslyPsthemysoicfsth.e2c0o0m4m.uVniocla.ti4on4,,cnoont.ro1l1a.nd-dPe.ci1si9o9n2su-p1p9o9rt6.V.oronezh : NPF SAKVOEE LLC</source>
          ,
          <year>2016</year>
          ;
          <volume>1</volume>
          :
          <fpage>269</fpage>
          -
          <lpage>277</lpage>
          . [3]
          <string-name>
            <surname>Malinetskii</surname>
            <given-names>GG</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepantsov</surname>
            <given-names>ME</given-names>
          </string-name>
          .
          <article-title>Application of cellular automata for modeling the motion of a group of people</article-title>
          .
          <source>Computational Mathematics and Mathematical Physics</source>
          <year>2004</year>
          ;
          <volume>44</volume>
          (
          <issue>11</issue>
          ):
          <fpage>1992</fpage>
          -
          <lpage>1996</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>[4] [4S]cShcuhummaannnn,A.APa.yPoacyeollufflacrealultuomlaartaaauntdomrefaletxaivaengda mreefls.eJx.iCveelluglaarmAeusto[mTaetaxt2]01/4A;9n(d4)</source>
          r:
          <fpage>e2w87S</fpage>
          -
          <lpage>3c1h3u</lpage>
          .mann // J. Cellular Automata.
          <year>2014</year>
          . Vol.
          <volume>9</volume>
          , no. 4. - pp.
          <fpage>287</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] [5C]
          <article-title>uCsuhshmmaann,SSA</article-title>
          ..
          <source>CAa.lcCulaalticnugltahteincogntfhigeurcatoionnfiagleunrtarotipoynoaflaelanntdrsocpapyeomfoasalica.nLdasncdascpaepemEocoslaoigcy[2T0e1x6;t]31/(3S)</source>
          a:
          <fpage>m48u1</fpage>
          -
          <lpage>e4l8A9</lpage>
          ..UCRuLs:hhmttpa:/n/dx//.dLoia.
          <source>onrdg/s1c0a.1p0e07E/sc1o0l9o8g0-y0</source>
          .
          <fpage>1</fpage>
          -5-
          <fpage>0320051</fpage>
          -
          <lpage>26</lpage>
          .. - Vol.
          <volume>31</volume>
          , no. 3. [6-]
          <fpage>Ilach4in8s1k</fpage>
          -
          <lpage>iA48</lpage>
          .
          <year>A9</year>
          .rtificialRWLar:: hMtutltipag:e/n/t-dBxas.
          <source>eddoSiim.uolartigon/o1f0C.o1m0b0at7./Sisn1ga0p9or8e0</source>
          :
          <article-title>-W0o1rl5d-S0ci3en0ti5fi-c 2Pu</article-title>
          .
          <source>blishing Company</source>
          ,
          <year>2004</year>
          ; 747 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] [7I]laTcPikh.hionnsokvi,AAN,.
          <article-title>SAa-mrtaiUfirsckiiiaAlAW</article-title>
          .
          <source>aErq:uMatiounlstioafgMenatth-eBmaastiecdalSPhimysuiclsa. tNioewn YoforCk:oDmovbeartP[uTbelixcat]tio/nAs,n1d99re0w;80I0lapc.hinski</source>
          . -Singapore : World Scientific Publishing Company,
          <year>2004</year>
          . - 747 p.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Tikhonov</surname>
            <given-names>A.N.</given-names>
          </string-name>
          <string-name>
            <surname>Equations</surname>
            of Mathematical Physics [Text] /
            <given-names>A.N.</given-names>
          </string-name>
          <string-name>
            <surname>Tikhonov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          <string-name>
            <surname>Samarskii</surname>
          </string-name>
          . - New York : Dover Publications,
          <year>1990</year>
          . - 800 p.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>