Advertisement

Adaptive target tracking with a mixed team of static and mobile guards: deployment and activation strategies

  • Guillermo J. Laguna
  • Sourabh BhattacharyaEmail author
Article
  • 11 Downloads
Part of the following topical collections:
  1. Special Issue on Multi-Robot and Multi-Agent Systems

Abstract

This work explores a variation of the art gallery problem in which a team of static and mobile guards track a mobile intruder with unknown maximum speed. We consider the special case when the mobile guards are restricted to move along the diagonals of a polygonal environment. First, we present an algorithm to identify candidate vertices in a polygon at which either static guards can be placed or they can serve as an endpoint of the segment on which mobile guards move. Next, we present a technique to partition the environment based on the triangulation of the environment, and allocate guards to each partition to track the intruder. The allocation strategy leads to a classification of the mobile guards based on their task and coordination requirements. Finally, we present a strategy to activate/deactivate static guards based on the speed of the intruder. Simulation results are presented to validate the efficacy of the proposed techniques.

Keywords

Target tracking Mobile coverage Sensor networks 

Notes

Acknowledgements

This work was supported by the NSF Grant IIS-1816343.

References

  1. Aghajan, H., & Cavallaro, A. (2009). Multi-camera networks: Principles and applications. Cambridge: Academic Press.Google Scholar
  2. Baraniuk, R. G. (2011). More is less: Signal processing and the data deluge. Science, 331(6018), 717–719.CrossRefGoogle Scholar
  3. Başar, T., & Bernhard, P. (2008). H-infinity optimal control and related minimax design problems: A dynamic game approach. New York: Springer.zbMATHGoogle Scholar
  4. Berg, M., Cheong, O., Kreveld, M., & Overmars, M. (2008). Computational geometry: Algorithms and applications (3rd ed.). Santa Clara, CA: Springer.CrossRefzbMATHGoogle Scholar
  5. Bhattacharya, S., Baar, T., & Falcone, M. (2014). Numerical approximation for a visibility based pursuit-evasion game. In Proceedings of IEEE/RSJ international conference on intelligent robots and systems (pp. 68–75).Google Scholar
  6. Bhattacharya, S., & Hutchinson, S. (2010). On the existence of Nash equilibrium for a two-player pursuit-evasion game with visibility constraints. The International Journal of Robotics Research, 29(7), 831–839.CrossRefzbMATHGoogle Scholar
  7. Bhattacharya, S., & Hutchinson, S. (2011). A cell decomposition approach to visibility-based pursuit evasion among obstacles. The International Journal of Robotics Research, 30(14), 1709–1727.CrossRefGoogle Scholar
  8. Bhatti, S., & Xu, J. (2009). Survey of target tracking protocols using wireless sensor network. In Proceedings of fifth international conference on wireless and mobile communications (pp. 110–115).Google Scholar
  9. Chen, Y., Zhao, Q., Krishnamurthy, V., & Djonin, D. (2007). Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach. IEEE Transactions on Signal Processing, 55(5), 2294–2309.MathSciNetCrossRefzbMATHGoogle Scholar
  10. Chvatal, V. (1975). A combinatorial theorem in plane geometry. Journal of Combinatorial Theory Series B, 18, 39–41.MathSciNetCrossRefzbMATHGoogle Scholar
  11. Deng, J., Han, Y. S., Heinzelman, W. B., & Varshney, P. K. (2005). Scheduling sleeping nodes in high density cluster-based sensor networks. Mobile Networks and Applications, 10(6), 825–835.CrossRefGoogle Scholar
  12. Durocher, S., & Mehrabi, S. (2013). Guarding orthogonal art galleries using sliding cameras: Algorithmic and hardness results. In K. Chatterjee & J. Sgall (Eds.), Mathematical foundations of computer science 2013 (pp. 314–324). Berlin: Springer.CrossRefGoogle Scholar
  13. Hausman, K., Müller, J., Hariharan, A., Ayanian, N., & Sukhatme, G. S. (2015). Cooperative multi-robot control for target tracking with onboard sensing. The International Journal of Robotics Research, 34(13), 1660–1677.CrossRefGoogle Scholar
  14. He, Y., & Chong, E. K. (2006). Sensor scheduling for target tracking: A Monte Carlo sampling approach. Digital Signal Processing, 16(5), 533–545.CrossRefGoogle Scholar
  15. Hoffmann, F. (1990). On the rectilinear art gallery problem. In M. S. Paterson (Ed.), Automata, languages and programming: Proceedings of 17th international Colloquium Warwick University, England (pp. 717–728). Berlin: Springer.Google Scholar
  16. Ho, Y., & Lee, R. (1964). A Bayesian approach to problems in stochastic estimation and control. IEEE Transactions on Automatic Control, 9(4), 333–339.MathSciNetCrossRefGoogle Scholar
  17. Howard, A., Mataric, M. J., & Sukhatme, G. S. (2002). Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. Distributed Autonomous Robotic Systems, 5, 299–308.CrossRefGoogle Scholar
  18. Isler, V., Kannan, S., & Khanna, S. (2004). Randomized pursuit-evasion with limited visibility. In Proceedings of ACM-SIAM symposium on discrete algorithms (SODA) (pp. 1053–1063).Google Scholar
  19. Jung, B., & Sukhatme, G. S. (2002). Tracking anonymous targets using a robotics sensor network. In AAAI spring symposium. AAAI Press.Google Scholar
  20. Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th annual international conference on mobile computing and networking, MobiCom ’04 (pp. 144–158). New York, NY: ACM.Google Scholar
  21. Laguna, G. J., & Bhattacharya, S. (2017). Hybrid system for target tracking in triangulation graphs. In Proceedings of IEEE international conference on robotics and automation (ICRA) (pp. 839–844).Google Scholar
  22. Laguna, G. J., Zou, R., & Bhattacharya, S. (2016). Target tracking on triangulation graphs. In Proceedings of IEEE/RSJ international conference on intelligent robots and systems (IROS) (pp. 460–465).Google Scholar
  23. LaValle, S., Lin, D., Guibas, L., Latombe, J. C., & Motwani, R. (1997). Finding an unpredictable target in a workspace with obstacles. In Proceedings of IEEE international conference on robotics and automation (vol. 1, pp. 737–742).Google Scholar
  24. Luke, S., Sullivan, K., Panait, L., & Balan, G. (2005). Tunably decentralized algorithms for cooperative target observation. In Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, AAMAS ’05 (pp. 911–917). New York, NY: ACM.Google Scholar
  25. Megiddo, N., Hakimi, S. L., Garey, M. R., Johnson, D. S., & Papadimitriou, C. H. (1981). The complexity of searching a graph. In 22nd Annual symposium on foundations of computer science (SFCS 1981) (pp. 376–385).Google Scholar
  26. Mehmetcik, E., & Ozguner, U. (2013). Centralized target tracking with propagation delayed measurements. In Proceedings of the 16th international conference on information fusion (pp. 820–826).Google Scholar
  27. Murrieta-Cid, R., Gonzalez, H., & Tovar, B. (2002). A reactive motion planner to maintain visibility of unpredictable targets. In Proceedings of IEEE international conference on robotics and automation (pp. 4242–4248).Google Scholar
  28. O’Rourke, J. (1983). Galleries need fewer mobile guards a variation on Chvátal’s theorem. Geometriae Dedicata, 14(3), 273–283.MathSciNetzbMATHGoogle Scholar
  29. O’Rourke, J. (1987). Art gallery theorems and algorithms. New York, NY: Oxford University Press.zbMATHGoogle Scholar
  30. Simon, G., Maróti, M., Lédeczi, A., Balogh, G., Kusy, B., Nádas, A., Pap, G., Sallai, J., & Frampton, K. (2004). Sensor network-based countersniper system. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04 (pp. 1–12). New York, NY: ACM.Google Scholar
  31. Suzuki, I., & Yamashita, M. (1992). Searching for a mobile intruder in a polygonal region. SIAM Journal on Computing, 21(5), 863–888.MathSciNetCrossRefzbMATHGoogle Scholar
  32. Theodoridis, T., & Hu, H. (2012). Toward intelligent security robots: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1219–1230.CrossRefGoogle Scholar
  33. Tian, D., & Georganas, N. D. (2002). A coverage-preserving node scheduling scheme for large wireless sensor networks. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications, WSNA ’02 (pp. 32–41). New York, NY: ACM.Google Scholar
  34. Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., et al. (2006). Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, 10(2), 18–25.CrossRefGoogle Scholar
  35. Williams, R. K., & Sukhatme, G. S. (2015). Observability in topology-constrained multi-robot target tracking. In Proceedings of IEEE international conference on robotics and automation (ICRA) (pp. 1795–1801).Google Scholar
  36. Zou, R., & Bhattacharya, S. (2015). Visibility based multi-agent surveillance strategies in decentralized network. In SPIE Defense + Security (pp. 94,640P–94,640P). International Society for Optics and Photonics.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Mechanical EngineeringIowa State UniversityAmesUSA
  2. 2.Department of Computer ScienceIowa State UniversityAmesUSA

Personalised recommendations