Intruder capture algorithms considering visible intruders
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Jonghoek | - |
dc.date.available | 2020-07-10T03:01:12Z | - |
dc.date.created | 2020-07-06 | - |
dc.date.issued | 2019-05-08 | - |
dc.identifier.issn | 1729-8814 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/1648 | - |
dc.description.abstract | In this article, we consider the problem of using multiple robots (searchers) to capture intruders in an environment. Assume that a robot can access the position of an intruder in real time, that is, an intruder is visible by a robot. We simplify the environment so that robots and worst-case intruders move along a weighted graph, which is a topological map of the environment. In such settings, a worst-case intruder is characterized by unbounded speed, complete awareness of searcher location and intent, and full knowledge of the search environment. The weight of an edge or a vertex in a weighted graph is a cost describing the clearing requirement of the edge or the vertex. This article provides non-monotone search algorithms to capture every visible intruder. Our algorithms are easy to implement, thus are suitable for practical robot applications. Based on the non-monotone search algorithms, we derive the minimum number of robots required to clear a weighted tree graph. Considering a general weighted graph, we derive bounds for the number of robots required. Finally, we present switching algorithms to improve the time efficiency of capturing intruders while not increasing the number of robots. We verify the effectiveness of our approach using MATLAB simulations. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SAGE PUBLICATIONS INC | - |
dc.subject | LINEAR-TIME ALGORITHM | - |
dc.subject | FEEDBACK VERTEX SET | - |
dc.subject | DISCRETE SEARCH | - |
dc.subject | GRAPHS | - |
dc.title | Intruder capture algorithms considering visible intruders | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Jonghoek | - |
dc.identifier.doi | 10.1177/1729881419846739 | - |
dc.identifier.scopusid | 2-s2.0-85065656091 | - |
dc.identifier.wosid | 000467611800001 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, v.16, no.3 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS | - |
dc.citation.title | INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS | - |
dc.citation.volume | 16 | - |
dc.citation.number | 3 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.relation.journalResearchArea | Robotics | - |
dc.relation.journalWebOfScienceCategory | Robotics | - |
dc.subject.keywordPlus | LINEAR-TIME ALGORITHM | - |
dc.subject.keywordPlus | FEEDBACK VERTEX SET | - |
dc.subject.keywordPlus | DISCRETE SEARCH | - |
dc.subject.keywordPlus | GRAPHS | - |
dc.subject.keywordAuthor | Weighted graph search | - |
dc.subject.keywordAuthor | graph clear | - |
dc.subject.keywordAuthor | visible intruder | - |
dc.subject.keywordAuthor | non-monotone search algorithm | - |
dc.subject.keywordAuthor | sensor network | - |
dc.subject.keywordAuthor | intruder capture | - |
dc.subject.keywordAuthor | operations research | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.