IEEE Conference on Decision and Control and European Control Conference 2011
DOI: 10.1109/cdc.2011.6160836
|View full text |Cite
|
Sign up to set email alerts
|

Intruder capturing game on a topological map assisted by information networks

Abstract: Intruder capturing games on a topological map of a workspace with obstacles are investigated. Assuming that a searcher can access the position of any intruder utilizing information networks, we provide theoretical upper bounds for the minimum number of searchers required to capture all intruders on a Voronoi graph. Intruder capturing algorithms are proposed and demonstrated through an online computer game.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Sensor networks can perform various autonomous tasks in dangerous and harsh environments. In the case where each sensor has mobility, sensor network can perform environmental monitoring [1][2][3], area coverage [4][5][6][7], formation control [8][9][10], target tracking [11,12], or intruder detection [13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Sensor networks can perform various autonomous tasks in dangerous and harsh environments. In the case where each sensor has mobility, sensor network can perform environmental monitoring [1][2][3], area coverage [4][5][6][7], formation control [8][9][10], target tracking [11,12], or intruder detection [13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Distributed network systems can be utilized to measure environmental conditions such as temperature, sound, pollution levels, humidity, wind, and so on. Once a distributed sensor network is built to fully cover a workspace, it can work for many tasks, such as workspace monitoring [1][2][3][4][5] or intruder detection [6]. For instance, an underwater sensor network can be used to detect the presence of an underwater vehicle.…”
Section: Introductionmentioning
confidence: 99%
“…There are many papers on multi-robot systems. 12 23 Multi-robot systems have various potential applications such as leader-based multi-robot herding, 24 sensor node deployment, 12,20,21,23,25 and collective transport of robots. 26 Zhang and Leonard 18 developed formation controllers to improve source seeking utilizing distributed sensors.…”
Section: Introductionmentioning
confidence: 99%