Developing a Deterministic Patrolling Strategy for Security Agents Nicola Basilico, Nicola Gatti, Francesco Amigoni.

Slides:



Advertisements
Similar presentations
Constraint Satisfaction Problems
Advertisements

N. Basilico, N. Gatti, F. Amigoni DEI, Politecnico di Milano Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topology.
F. Amigoni, N. Basilico, N. Gatti DEI, Politecnico di Milano Finding the Optimal Strategies in Robotic Patrolling with Adversaries in Topologically-Represented.
Constraint Satisfaction Problems (Chapter 6). What is search for? Assumptions: single agent, deterministic, fully observable, discrete environment Search.
Constraint Satisfaction Problems
1 Constraint Satisfaction Problems A Quick Overview (based on AIMA book slides)
1 Finite Constraint Domains. 2 u Constraint satisfaction problems (CSP) u A backtracking solver u Node and arc consistency u Bounds consistency u Generalized.
PROBLEM SOLVING AND SEARCH
ICS-271:Notes 5: 1 Lecture 5: Constraint Satisfaction Problems ICS 271 Fall 2008.
Artificial Intelligence Constraint satisfaction problems Fall 2008 professor: Luigi Ceccaroni.
Game Theoretical Insights in Strategic Patrolling: Model and Analysis Nicola Gatti – DEI, Politecnico di Milano, Piazza Leonardo.
Constraint Optimization Presentation by Nathan Stender Chapter 13 of Constraint Processing by Rina Dechter 3/25/20131Constraint Optimization.
Review: Constraint Satisfaction Problems How is a CSP defined? How do we solve CSPs?
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Vehicle Routing & Scheduling: Part 1
Multi-agent Planning Amin Atrash. Papers Dynamic Planning for Multiple Mobile Robots –Barry L. Brummit, Anthony Stentz OBDD-based Universal Planning:
Los Angeles September 27, 2006 MOBICOM Localization in Sparse Networks using Sweeps D. K. Goldenberg P. Bihler M. Cao J. Fang B. D. O. Anderson.
4 Feb 2004CS Constraint Satisfaction1 Constraint Satisfaction Problems Chapter 5 Section 1 – 3.
CPSC 322, Lecture 12Slide 1 CSPs: Search and Arc Consistency Computer Science cpsc322, Lecture 12 (Textbook Chpt ) January, 29, 2010.
Constraint Satisfaction Problems
Agent-friendly aggregation 1 On agent-friendly aggregation in networks ATSN 2008 (at AAMAS 2008) Christian Sommer and Shinichi Honiden National Institute.
Jean-Charles REGIN Michel RUEHER ILOG Sophia Antipolis Université de Nice – Sophia Antipolis A global constraint combining.
Ant Colony Optimization Optimisation Methods. Overview.
1 Branch and Bound Searching Strategies 2 Branch-and-bound strategy 2 mechanisms: A mechanism to generate branches A mechanism to generate a bound so.
1 Bandwidth Allocation Planning in Communication Networks Christian Frei & Boi Faltings Globecom 1999 Ashok Janardhanan.
A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots Francesco Amigoni, Nicola Gatti, Antonio Ippedico.
Package Transportation Scheduling Albert Lee Robert Z. Lee.
Constraint Satisfaction Problems
ISC 4322/6300 – GAM 4322 Artificial Intelligence Lecture 4 Constraint Satisfaction Problems Instructor: Alireza Tavakkoli September 17, 2009 University.
1 Constraint Satisfaction Problems Slides by Prof WELLING.
1.3 Modeling with exponentially many constr.  Some strong formulations (or even formulation itself) may involve exponentially many constraints (cutting.
Introduction to Job Shop Scheduling Problem Qianjun Xu Oct. 30, 2001.
Representing and Using Graphs
Constraint Satisfaction Problems Chapter 6. Review Agent, Environment, State Agent as search problem Uninformed search strategies Informed (heuristic.
Highway Risk Mitigation through Systems Engineering.
Chapter 5 Section 1 – 3 1.  Constraint Satisfaction Problems (CSP)  Backtracking search for CSPs  Local search for CSPs 2.
Stocs – A Stochastic CSP Solver Bella Dubrov IBM Haifa Research Lab © Copyright IBM.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Hande ÇAKIN IES 503 TERM PROJECT CONSTRAINT SATISFACTION PROBLEMS.
Chapter 5: Constraint Satisfaction ICS 171 Fall 2006.
CSCI 5582 Fall 2006 CSCI 5582 Artificial Intelligence Fall 2006 Jim Martin.
Resource Mapping and Scheduling for Heterogeneous Network Processor Systems Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinha, Arunabha Sen and Andrea.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Chapter 3 Algorithms Complexity Analysis Search and Flow Decomposition Algorithms.
Minimum Spanning Trees CS 146 Prof. Sin-Min Lee Regina Wang.
Quality of LP-based Approximations for Highly Combinatorial Problems Lucian Leahu and Carla Gomes Computer Science Department Cornell University.
Constraint Satisfaction Problems (Chapter 6)
CIRCUITS, PATHS, AND SCHEDULES Euler and Königsberg.
1 Constraint Satisfaction Problems Chapter 5 Section 1 – 3 Grand Challenge:
CHAPTER 5 SECTION 1 – 3 4 Feb 2004 CS Constraint Satisfaction 1 Constraint Satisfaction Problems.
Constraint Satisfaction Problems University of Berkeley, USA
A Theoretical Analysis of Multi-Agent Patrolling Strategies Patrolling = moving through a territory « visiting » areas The patrolling problem = given a.
1. 2 Outline of Ch 4 Best-first search Greedy best-first search A * search Heuristics Functions Local search algorithms Hill-climbing search Simulated.
NPC.
Chapter 5 Team Teaching AI (created by Dewi Liliana) PTIIK Constraint Satisfaction Problems.
IE 312 Review 1. The Process 2 Problem Model Conclusions Problem Formulation Analysis.
Highway Risk Mitigation through Systems Engineering.
Branch and Bound Searching Strategies
Consistency Methods for Temporal Reasoning
The minimum cost flow problem
CS 188: Artificial Intelligence
1.3 Modeling with exponentially many constr.
Constraint Satisfaction Problems
1.3 Modeling with exponentially many constr.
Integer Programming (정수계획법)
Constraint satisfaction problems
CS 8520: Artificial Intelligence
Constraint Satisfaction Problems
Constraint satisfaction problems
Presentation transcript:

Developing a Deterministic Patrolling Strategy for Security Agents Nicola Basilico, Nicola Gatti, Francesco Amigoni

N. Basilico, N. Gatti, F. Amigoni Scenario 2

N. Basilico, N. Gatti, F. Amigoni Strategic Patrolling Determination of an efficient strategy for the patroller agent A patrolling strategy determines how the patroller moves in the environment An efficient patrolling strategy minimizes the intrusion probability Usually, patrolling strategies use randomized movements [Agmon et al., ICRA2008] [Paruchuri et al., AAMAS2008] [Amigoni et al., IAT2008] [Basilico et al., AAMAS2009] Sometimes, a deterministic patrolling strategy (a fixed path) can prevent intrusions Problem: determine an efficient deterministic patrolling strategy for a security agent 3

N. Basilico, N. Gatti, F. Amigoni Problem Formulation: Environment The environment is represented as a weighted directed graph G = (V,A,w,d) V: vertexes are locations to patrol A: arcs are direct connections between adjacent locations w:A ➛ R: weights are temporal costs to traverse an arc d:V ➛ R: penetration times for vertexes time the intruder needs to penetrate the vertex time interval between two successive visits of the patroller to the vertex 4

N. Basilico, N. Gatti, F. Amigoni Problem Formulation: Agents The patroller agent moves between adjacent vertexes Movement between v and v’ requires a time w(v,v’) The patroller agent senses the presence of the intruder only in its current vertex The intruder can appear at any vertex at any time Once intruder appears at vertex v, it stays there for d(v) time 5

N. Basilico, N. Gatti, F. Amigoni Problem Formulation: Solution Sequence of vertexes: S(1), S(2), …, S(s) Time interval between visits to two vertexes S(j) and S(j’): Σ i=j, j+1…,j’-1 w(S(i),S(i+1)) A solution is a sequence of vertexes such that: 1. It is cyclical S(1) = S(s) 2. Every vertex is visited at least one time 3. When indefinitely repeating the sequence, the time interval between two successive visits to a vertex v is not larger than d(v) If a solution is found, no intrusion can occur A rational intruder will never attempt to enter When an intruder attempts to enter, it is always detected by the patroller The length s of the solution is part of the problem 6

N. Basilico, N. Gatti, F. Amigoni Related Works Visiting vertexes of graphs under temporal deadlines has been extensively studied Deadline travel salesman problems [Tsitsiklis, Networks 1992] Vehicle routing problems with time windows [Kolen et al., Operations Research 1987] Period routing problems [Christofides and Beasley, Networks 1984] … However, our problem has relative deadlines (“two successive visits to a vertex v”) and is a feasibility problem 7

N. Basilico, N. Gatti, F. Amigoni The Proposed Solving Algorithm (1) Idea: formulate the problem of finding a solution as a Constraint Satisfaction Problem (CSP) Variables: S(j) (their number is a priori unknown!) Domains: D(S(j)) = V (they will be restricted!) Constraints: 1. Cycle: S(1) = S(s) 2. Every vertex is visited at least one time 3. When indefinitely repeating the sequence, the time interval between two successive visits to a vertex v is not larger than d(v) Solution of the CSP: assignment of values to variables such that all the constraints are satisfied 8

N. Basilico, N. Gatti, F. Amigoni The Proposed Solving Algorithm (2) Our CSP is solved by a brute-force backtracking search Forward checking is used to reduce search complexity Forward checking eliminates from the domains the values that are not compatible with the current partial assignment 9 S(1)=v S(1)=v S(2)=v’ S(1)=v S(2)=v’ S(3)=? S(1)=v S(2)=v’’

N. Basilico, N. Gatti, F. Amigoni The Proposed Solving Algorithm: Example (1) 10 S(1)=01 S(1)=01 S(2)=02 S(1)=01 S(2)=02 S(3)=03 D(S(2)) = {02,05} D(S(3)) = {01,03,05} 05 is eliminated because: w(01,05)+w e (05,03)+w e (03,01) > d(03) > 14

N. Basilico, N. Gatti, F. Amigoni The Proposed Solving Algorithm: Example (2) 11 stopping criterion!backtracking

N. Basilico, N. Gatti, F. Amigoni Some Properties of the Proposed Solving Algorithm The algorithm is sound and complete If a solution exists, it is independent of the first vertex S(1) At least a solution (if one exists) has a temporal length not larger than max i ∊ V {d(v i )} Definition of a new stopping criterion With linear environments, if a solution exists, then the linear sequence is a solution Computational complexity is hard to characterize 12

N. Basilico, N. Gatti, F. Amigoni Experimental Results Randomly-generated graphs with n vertexes and m ∊ [n, (n-1)n] arcs 500 runs for each value of n Metrics: % of termination within 10 minutes Computational time (for terminated runs) 13

N. Basilico, N. Gatti, F. Amigoni Conclusions Method for finding deterministic patrolling strategies for security agents Method for finding a cyclic sequence of vertexes on a graph under temporal constraints Future works: More sophisticated stopping criteria for blocking search earlier Extending patroller’s sensing abilities beyond the current vertex Extension to multiagent settings 14

N. Basilico, N. Gatti, F. Amigoni Thank you! 15