Developing a Deterministic Patrolling Strategy for Security Agents
Developing autonomous systems that patrol environments for detecting intruders is a topic of increasing relevance in security applications. An important aspect of these systems is the patrolling strategy; namely, the determination of where to move in order to conveniently detect intrusions. While a...
Saved in:
| Published in: | Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02 Vol. 2; pp. 565 - 572 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Washington, DC, USA
IEEE Computer Society
15.09.2009
IEEE |
| Series: | ACM Conferences |
| Subjects: | |
| ISBN: | 0769538010, 9780769538013 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Developing autonomous systems that patrol environments for detecting intruders is a topic of increasing relevance in security applications. An important aspect of these systems is the patrolling strategy; namely, the determination of where to move in order to conveniently detect intrusions. While a large part of patrolling strategies proposed so far adopt some kind of random movements, deterministic strategies can be useful in some situations of interest. In this paper, we propose an approach to find a deterministic strategy that allows the patrolling agent to always detect an intruder that attempts to enter an environment. The problem is formulated as the determination of a cyclic path that visits, under temporal constraints, all the vertexes of a graph representing the environment. We propose a solving algorithm, study its properties, and experimentally evaluate it. |
|---|---|
| ISBN: | 0769538010 9780769538013 |
| DOI: | 10.1109/WI-IAT.2009.212 |

