Cooperative Target Defense under Communication and Sensing Constraints Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2412.09939
We consider a variant of the target defense problems where a group of\ndefenders are tasked to simultaneously capture an intruder. The intruder's\nobjective is to reach a target without being simultaneously captured by the\ndefender team. Some of the defenders are sensing-limited and do not have any\ninformation regarding the intruder's position or velocity at any time. The\ndefenders may communicate with each other using a connected communication\ngraph. We propose a decentralized feedback strategy for the defenders, which\ntransforms the simultaneous capture problem into a unique nonlinear consensus\nproblem. We derive a sufficient condition for simultaneous capture in terms of\nthe agents' speeds, sensing, and communication capabilities. The proposed\ndecentralized controller is evaluated through extensive numerical simulations.\n
Related Topics
- Type
- preprint
- Landing Page
- http://arxiv.org/abs/2412.09939
- https://arxiv.org/pdf/2412.09939
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4405433087
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4405433087Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2412.09939Digital Object Identifier
- Title
-
Cooperative Target Defense under Communication and Sensing ConstraintsWork title
- Type
-
preprintOpenAlex work type
- Publication year
-
2024Year of publication
- Publication date
-
2024-12-13Full publication date if available
- Authors
-
Dilip Kumar Maity, Arman PourghorbanList of authors in order
- Landing page
-
https://arxiv.org/abs/2412.09939Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2412.09939Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2412.09939Direct OA link when available
- Concepts
-
Computer scienceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4405433087 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2412.09939 |
| ids.openalex | https://openalex.org/W4405433087 |
| fwci | 0.0 |
| type | preprint |
| title | Cooperative Target Defense under Communication and Sensing Constraints |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11498 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9560999870300293 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Security in Wireless Sensor Networks |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.44163891673088074 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.44163891673088074 |
| keywords[0].display_name | Computer science |
| language | |
| locations[0].id | pmh:oai:arXiv.org:2412.09939 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://arxiv.org/pdf/2412.09939 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2412.09939 |
| indexed_in | arxiv |
| authorships[0].author.id | https://openalex.org/A5042246095 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-4284-3578 |
| authorships[0].author.display_name | Dilip Kumar Maity |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Maity, Dipankar |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5084080781 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Arman Pourghorban |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Pourghorban, Arman |
| authorships[1].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2412.09939 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-24T00:00:00 |
| display_name | Cooperative Target Defense under Communication and Sensing Constraints |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11498 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9560999870300293 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Security in Wireless Sensor Networks |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | pmh:oai:arXiv.org:2412.09939 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2412.09939 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2412.09939 |
| primary_location.id | pmh:oai:arXiv.org:2412.09939 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://arxiv.org/pdf/2412.09939 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2412.09939 |
| publication_date | 2024-12-13 |
| publication_year | 2024 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 2, 10, 25, 61, 66, 79, 85 |
| abstract_inverted_index.We | 0, 64, 83 |
| abstract_inverted_index.an | 18 |
| abstract_inverted_index.at | 51 |
| abstract_inverted_index.by | 31 |
| abstract_inverted_index.do | 41 |
| abstract_inverted_index.in | 91 |
| abstract_inverted_index.is | 22, 103 |
| abstract_inverted_index.of | 4, 35 |
| abstract_inverted_index.or | 49 |
| abstract_inverted_index.to | 15, 23 |
| abstract_inverted_index.The | 20, 100 |
| abstract_inverted_index.and | 40, 97 |
| abstract_inverted_index.any | 52 |
| abstract_inverted_index.are | 13, 38 |
| abstract_inverted_index.for | 70, 88 |
| abstract_inverted_index.may | 55 |
| abstract_inverted_index.not | 42 |
| abstract_inverted_index.the | 5, 36, 46, 71, 74 |
| abstract_inverted_index.Some | 34 |
| abstract_inverted_index.each | 58 |
| abstract_inverted_index.have | 43 |
| abstract_inverted_index.into | 78 |
| abstract_inverted_index.with | 57 |
| abstract_inverted_index.being | 28 |
| abstract_inverted_index.group | 11 |
| abstract_inverted_index.other | 59 |
| abstract_inverted_index.reach | 24 |
| abstract_inverted_index.team. | 33 |
| abstract_inverted_index.terms | 92 |
| abstract_inverted_index.time. | 53 |
| abstract_inverted_index.using | 60 |
| abstract_inverted_index.where | 9 |
| abstract_inverted_index.derive | 84 |
| abstract_inverted_index.target | 6, 26 |
| abstract_inverted_index.tasked | 14 |
| abstract_inverted_index.unique | 80 |
| abstract_inverted_index.agents' | 94 |
| abstract_inverted_index.capture | 17, 76, 90 |
| abstract_inverted_index.defense | 7 |
| abstract_inverted_index.of\nthe | 93 |
| abstract_inverted_index.problem | 77 |
| abstract_inverted_index.propose | 65 |
| abstract_inverted_index.speeds, | 95 |
| abstract_inverted_index.through | 105 |
| abstract_inverted_index.variant | 3 |
| abstract_inverted_index.without | 27 |
| abstract_inverted_index.captured | 30 |
| abstract_inverted_index.consider | 1 |
| abstract_inverted_index.feedback | 68 |
| abstract_inverted_index.position | 48 |
| abstract_inverted_index.problems | 8 |
| abstract_inverted_index.sensing, | 96 |
| abstract_inverted_index.strategy | 69 |
| abstract_inverted_index.velocity | 50 |
| abstract_inverted_index.condition | 87 |
| abstract_inverted_index.connected | 62 |
| abstract_inverted_index.defenders | 37 |
| abstract_inverted_index.evaluated | 104 |
| abstract_inverted_index.extensive | 106 |
| abstract_inverted_index.intruder. | 19 |
| abstract_inverted_index.nonlinear | 81 |
| abstract_inverted_index.numerical | 107 |
| abstract_inverted_index.regarding | 45 |
| abstract_inverted_index.controller | 102 |
| abstract_inverted_index.defenders, | 72 |
| abstract_inverted_index.intruder's | 47 |
| abstract_inverted_index.sufficient | 86 |
| abstract_inverted_index.communicate | 56 |
| abstract_inverted_index.simultaneous | 75, 89 |
| abstract_inverted_index.capabilities. | 99 |
| abstract_inverted_index.communication | 98 |
| abstract_inverted_index.decentralized | 67 |
| abstract_inverted_index.of\ndefenders | 12 |
| abstract_inverted_index.the\ndefender | 32 |
| abstract_inverted_index.The\ndefenders | 54 |
| abstract_inverted_index.simulations.\n | 108 |
| abstract_inverted_index.simultaneously | 16, 29 |
| abstract_inverted_index.sensing-limited | 39 |
| abstract_inverted_index.any\ninformation | 44 |
| abstract_inverted_index.which\ntransforms | 73 |
| abstract_inverted_index.consensus\nproblem. | 82 |
| abstract_inverted_index.communication\ngraph. | 63 |
| abstract_inverted_index.intruder's\nobjective | 21 |
| abstract_inverted_index.proposed\ndecentralized | 101 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.314493 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |