Abstract
This work explores a variation of the art gallery problem in which a team of static and mobile guards track a mobile intruder with unknown maximum speed. We consider the special case when the mobile guards are restricted to move along the diagonals of a polygonal environment. First, we present an algorithm to identify candidate vertices in a polygon at which either static guards can be placed or they can serve as an endpoint of the segment on which mobile guards move. Next, we present a technique to partition the environment based on the triangulation of the environment, and allocate guards to each partition to track the intruder. The allocation strategy leads to a classification of the mobile guards based on their task and coordination requirements. Finally, we present a strategy to activate/deactivate static guards based on the speed of the intruder. Simulation results are presented to validate the efficacy of the proposed techniques.
Similar content being viewed by others
Notes
In a triangulation graph all the faces are triangles.
A triangulation graph G is said to be dominated by a set of vertices\(S_c\) if at least one vertex of each triangle in T(G) is a vertex in \(S_c\).
A triangulation graph G is said to be dominated by a set of diagonals\(S_h\) if at least one vertex of each triangle in T(G) is an endpoint of a diagonal in \(S_h\).
A diagonal is said to be incident to a vertex if the vertex is an endpoint of the diagonal.
We say that a guard \(g_k \in S_g\backslash \{g_i\}\) is a neighbor of \(g_i\) if \(T(i) \cap T(k) \ne \emptyset \).
References
Aghajan, H., & Cavallaro, A. (2009). Multi-camera networks: Principles and applications. Cambridge: Academic Press.
Baraniuk, R. G. (2011). More is less: Signal processing and the data deluge. Science, 331(6018), 717–719.
Başar, T., & Bernhard, P. (2008). H-infinity optimal control and related minimax design problems: A dynamic game approach. New York: Springer.
Berg, M., Cheong, O., Kreveld, M., & Overmars, M. (2008). Computational geometry: Algorithms and applications (3rd ed.). Santa Clara, CA: Springer.
Bhattacharya, S., Baar, T., & Falcone, M. (2014). Numerical approximation for a visibility based pursuit-evasion game. In Proceedings of IEEE/RSJ international conference on intelligent robots and systems (pp. 68–75).
Bhattacharya, S., & Hutchinson, S. (2010). On the existence of Nash equilibrium for a two-player pursuit-evasion game with visibility constraints. The International Journal of Robotics Research, 29(7), 831–839.
Bhattacharya, S., & Hutchinson, S. (2011). A cell decomposition approach to visibility-based pursuit evasion among obstacles. The International Journal of Robotics Research, 30(14), 1709–1727.
Bhatti, S., & Xu, J. (2009). Survey of target tracking protocols using wireless sensor network. In Proceedings of fifth international conference on wireless and mobile communications (pp. 110–115).
Chen, Y., Zhao, Q., Krishnamurthy, V., & Djonin, D. (2007). Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach. IEEE Transactions on Signal Processing, 55(5), 2294–2309.
Chvatal, V. (1975). A combinatorial theorem in plane geometry. Journal of Combinatorial Theory Series B, 18, 39–41.
Deng, J., Han, Y. S., Heinzelman, W. B., & Varshney, P. K. (2005). Scheduling sleeping nodes in high density cluster-based sensor networks. Mobile Networks and Applications, 10(6), 825–835.
Durocher, S., & Mehrabi, S. (2013). Guarding orthogonal art galleries using sliding cameras: Algorithmic and hardness results. In K. Chatterjee & J. Sgall (Eds.), Mathematical foundations of computer science 2013 (pp. 314–324). Berlin: Springer.
Hausman, K., Müller, J., Hariharan, A., Ayanian, N., & Sukhatme, G. S. (2015). Cooperative multi-robot control for target tracking with onboard sensing. The International Journal of Robotics Research, 34(13), 1660–1677.
He, Y., & Chong, E. K. (2006). Sensor scheduling for target tracking: A Monte Carlo sampling approach. Digital Signal Processing, 16(5), 533–545.
Hoffmann, F. (1990). On the rectilinear art gallery problem. In M. S. Paterson (Ed.), Automata, languages and programming: Proceedings of 17th international Colloquium Warwick University, England (pp. 717–728). Berlin: Springer.
Ho, Y., & Lee, R. (1964). A Bayesian approach to problems in stochastic estimation and control. IEEE Transactions on Automatic Control, 9(4), 333–339.
Howard, A., Mataric, M. J., & Sukhatme, G. S. (2002). Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. Distributed Autonomous Robotic Systems, 5, 299–308.
Isler, V., Kannan, S., & Khanna, S. (2004). Randomized pursuit-evasion with limited visibility. In Proceedings of ACM-SIAM symposium on discrete algorithms (SODA) (pp. 1053–1063).
Jung, B., & Sukhatme, G. S. (2002). Tracking anonymous targets using a robotics sensor network. In AAAI spring symposium. AAAI Press.
Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th annual international conference on mobile computing and networking, MobiCom ’04 (pp. 144–158). New York, NY: ACM.
Laguna, G. J., & Bhattacharya, S. (2017). Hybrid system for target tracking in triangulation graphs. In Proceedings of IEEE international conference on robotics and automation (ICRA) (pp. 839–844).
Laguna, G. J., Zou, R., & Bhattacharya, S. (2016). Target tracking on triangulation graphs. In Proceedings of IEEE/RSJ international conference on intelligent robots and systems (IROS) (pp. 460–465).
LaValle, S., Lin, D., Guibas, L., Latombe, J. C., & Motwani, R. (1997). Finding an unpredictable target in a workspace with obstacles. In Proceedings of IEEE international conference on robotics and automation (vol. 1, pp. 737–742).
Luke, S., Sullivan, K., Panait, L., & Balan, G. (2005). Tunably decentralized algorithms for cooperative target observation. In Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, AAMAS ’05 (pp. 911–917). New York, NY: ACM.
Megiddo, N., Hakimi, S. L., Garey, M. R., Johnson, D. S., & Papadimitriou, C. H. (1981). The complexity of searching a graph. In 22nd Annual symposium on foundations of computer science (SFCS 1981) (pp. 376–385).
Mehmetcik, E., & Ozguner, U. (2013). Centralized target tracking with propagation delayed measurements. In Proceedings of the 16th international conference on information fusion (pp. 820–826).
Murrieta-Cid, R., Gonzalez, H., & Tovar, B. (2002). A reactive motion planner to maintain visibility of unpredictable targets. In Proceedings of IEEE international conference on robotics and automation (pp. 4242–4248).
O’Rourke, J. (1983). Galleries need fewer mobile guards a variation on Chvátal’s theorem. Geometriae Dedicata, 14(3), 273–283.
O’Rourke, J. (1987). Art gallery theorems and algorithms. New York, NY: Oxford University Press.
Simon, G., Maróti, M., Lédeczi, A., Balogh, G., Kusy, B., Nádas, A., Pap, G., Sallai, J., & Frampton, K. (2004). Sensor network-based countersniper system. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04 (pp. 1–12). New York, NY: ACM.
Suzuki, I., & Yamashita, M. (1992). Searching for a mobile intruder in a polygonal region. SIAM Journal on Computing, 21(5), 863–888.
Theodoridis, T., & Hu, H. (2012). Toward intelligent security robots: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1219–1230.
Tian, D., & Georganas, N. D. (2002). A coverage-preserving node scheduling scheme for large wireless sensor networks. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications, WSNA ’02 (pp. 32–41). New York, NY: ACM.
Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., et al. (2006). Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, 10(2), 18–25.
Williams, R. K., & Sukhatme, G. S. (2015). Observability in topology-constrained multi-robot target tracking. In Proceedings of IEEE international conference on robotics and automation (ICRA) (pp. 1795–1801).
Zou, R., & Bhattacharya, S. (2015). Visibility based multi-agent surveillance strategies in decentralized network. In SPIE Defense + Security (pp. 94,640P–94,640P). International Society for Optics and Photonics.
Acknowledgements
This work was supported by the NSF Grant IIS-1816343.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This is one of the several papers published in Autonomous Robots comprising the Special Issue on Multi-Robot and Multi-Agent Systems.
Rights and permissions
About this article
Cite this article
Laguna, G.J., Bhattacharya, S. Adaptive target tracking with a mixed team of static and mobile guards: deployment and activation strategies. Auton Robot 44, 691–703 (2020). https://doi.org/10.1007/s10514-019-09833-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10514-019-09833-8