2018 AIAA Guidance, Navigation, and Control Conference 2018
DOI: 10.2514/6.2018-2107
|View full text |Cite
|
Sign up to set email alerts
|

Pursuit-Evasion Problems Involving Two Pursuers and One Evader

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
(12 reference statements)
0
5
0
Order By: Relevance
“…The agents' initial positions were randomly generated by a 2-variant normal distribution. Furthermore, to estimate the solution of HJI equations (i.e., ( 5) and ( 7)), FPK equations (i.e., (6) and ( 8)), and optimal control input (i.e., (13)), 2 critic NNs, 2 mass NNs, and an actor NN are constructed. Additionally, a random noise is injected to the control input from 0s to 50s to increase the NN approximators' exploration.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The agents' initial positions were randomly generated by a 2-variant normal distribution. Furthermore, to estimate the solution of HJI equations (i.e., ( 5) and ( 7)), FPK equations (i.e., (6) and ( 8)), and optimal control input (i.e., (13)), 2 critic NNs, 2 mass NNs, and an actor NN are constructed. Additionally, a random noise is injected to the control input from 0s to 50s to increase the NN approximators' exploration.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Recently, some of the researches explored a novel type of pursuit-evasion problem for multiple pursuers and evaders due to the enormous gain from the larger population of agents. For instance, [6] studied the pursue evasion problem with two pursuers and one evader; [7] used multiple pursuers, i.e. unmanned aircraft systems (UAS), to capture the ground vehicle.…”
Section: Introductionmentioning
confidence: 99%
“…In Figure 5, we can point out the attacker-winning cases of Figure 4 (b), (c), (f), for which ρ x a t eventually reaches R Ω S = 10. Noticeably for Figures 5 (b) and (c), ∆ρ x a t |u d DM ≥ ∆ρ x a t |u d P P as in (29). Take (b) for example.…”
Section: Algorithm 1 Attacker Behaviorsmentioning
confidence: 94%
“…Typical and popular strategies utilized in PE games are Constant Bearing (CB), Line of Sight (LoS), and PP guidance laws [28]. Constant Bearing assumes the knowledge of the attacker's instantaneous velocity as well as its position [29], whereas the defender only has access to the noisy observation of the attacker in our problem. Consequently, CB is not suitable to apply to our problem.…”
Section: A Baseline: Pure Pursuit Strategymentioning
confidence: 99%
See 1 more Smart Citation