Intruder capture algorithms considering visible intruders

In this article, we consider the problem of using multiple robots (searchers) to capture intruders in an environment. Assume that a robot can access the position of an intruder in real time, that is, an intruder is visible by a robot. We simplify the environment so that robots and worst-case intrude...

Full description

Bibliographic Details
Main Author: Jonghoek Kim
Format: Article
Language:English
Published: SAGE Publishing 2019-05-01
Series:International Journal of Advanced Robotic Systems
Online Access:https://doi.org/10.1177/1729881419846739
id doaj-01a151408da940bbb33b901c506f6e0c
record_format Article
spelling doaj-01a151408da940bbb33b901c506f6e0c2020-11-25T03:43:31ZengSAGE PublishingInternational Journal of Advanced Robotic Systems1729-88142019-05-011610.1177/1729881419846739Intruder capture algorithms considering visible intrudersJonghoek KimIn this article, we consider the problem of using multiple robots (searchers) to capture intruders in an environment. Assume that a robot can access the position of an intruder in real time, that is, an intruder is visible by a robot. We simplify the environment so that robots and worst-case intruders move along a weighted graph, which is a topological map of the environment. In such settings, a worst-case intruder is characterized by unbounded speed, complete awareness of searcher location and intent, and full knowledge of the search environment. The weight of an edge or a vertex in a weighted graph is a cost describing the clearing requirement of the edge or the vertex. This article provides non-monotone search algorithms to capture every visible intruder. Our algorithms are easy to implement, thus are suitable for practical robot applications. Based on the non-monotone search algorithms, we derive the minimum number of robots required to clear a weighted tree graph. Considering a general weighted graph, we derive bounds for the number of robots required. Finally, we present switching algorithms to improve the time efficiency of capturing intruders while not increasing the number of robots. We verify the effectiveness of our approach using MATLAB simulations.https://doi.org/10.1177/1729881419846739
collection DOAJ
language English
format Article
sources DOAJ
author Jonghoek Kim
spellingShingle Jonghoek Kim
Intruder capture algorithms considering visible intruders
International Journal of Advanced Robotic Systems
author_facet Jonghoek Kim
author_sort Jonghoek Kim
title Intruder capture algorithms considering visible intruders
title_short Intruder capture algorithms considering visible intruders
title_full Intruder capture algorithms considering visible intruders
title_fullStr Intruder capture algorithms considering visible intruders
title_full_unstemmed Intruder capture algorithms considering visible intruders
title_sort intruder capture algorithms considering visible intruders
publisher SAGE Publishing
series International Journal of Advanced Robotic Systems
issn 1729-8814
publishDate 2019-05-01
description In this article, we consider the problem of using multiple robots (searchers) to capture intruders in an environment. Assume that a robot can access the position of an intruder in real time, that is, an intruder is visible by a robot. We simplify the environment so that robots and worst-case intruders move along a weighted graph, which is a topological map of the environment. In such settings, a worst-case intruder is characterized by unbounded speed, complete awareness of searcher location and intent, and full knowledge of the search environment. The weight of an edge or a vertex in a weighted graph is a cost describing the clearing requirement of the edge or the vertex. This article provides non-monotone search algorithms to capture every visible intruder. Our algorithms are easy to implement, thus are suitable for practical robot applications. Based on the non-monotone search algorithms, we derive the minimum number of robots required to clear a weighted tree graph. Considering a general weighted graph, we derive bounds for the number of robots required. Finally, we present switching algorithms to improve the time efficiency of capturing intruders while not increasing the number of robots. We verify the effectiveness of our approach using MATLAB simulations.
url https://doi.org/10.1177/1729881419846739
work_keys_str_mv AT jonghoekkim intrudercapturealgorithmsconsideringvisibleintruders
_version_ 1724519371666096128