<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Control. Eng.</journal-id>
<journal-title>Frontiers in Control Engineering</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Control. Eng.</abbrev-journal-title>
<issn pub-type="epub">2673-6268</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1128597</article-id>
<article-id pub-id-type="doi">10.3389/fcteg.2023.1128597</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Control Engineering</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Competitive perimeter defense with a turret and a mobile vehicle</article-title>
<alt-title alt-title-type="left-running-head">Bajaj et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fcteg.2023.1128597">10.3389/fcteg.2023.1128597</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Bajaj</surname>
<given-names>Shivam</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1982214/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Bopardikar</surname>
<given-names>Shaunak D.</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2098600/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Moll</surname>
<given-names>Alexander Von</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1368649/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Torng</surname>
<given-names>Eric</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2148197/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Casbeer</surname>
<given-names>David W.</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>Electrical and Computer Engineering Department</institution>, <institution>Michigan State University</institution>, <addr-line>East Lansing</addr-line>, <addr-line>MI</addr-line>, <country>United States</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Control Science Center</institution>, <institution>Air Force Research Laboratory</institution>, <addr-line>Dayton</addr-line>, <addr-line>OH</addr-line>, <country>United States</country>
</aff>
<aff id="aff3">
<sup>3</sup>
<institution>Computer Science and Engineering Department</institution>, <institution>Michigan State University</institution>, <addr-line>East Lansing</addr-line>, <addr-line>MI</addr-line>, <country>United States</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1835831/overview">Douglas Guimar&#xe3;es Macharet</ext-link>, Federal University of Minas Gerais, Brazil</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2003035/overview">Rui Yan</ext-link>, University of Oxford, United Kingdom</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1106602/overview">Jonghoek Kim</ext-link>, Sungkyunkwan University, South Korea</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Shivam Bajaj, <email>bajajshi@msu.edu</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Networked Control, a section of the journal Frontiers in Control Engineering</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>27</day>
<month>02</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>4</volume>
<elocation-id>1128597</elocation-id>
<history>
<date date-type="received">
<day>20</day>
<month>12</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>01</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2023 Bajaj, Bopardikar, Moll, Torng and Casbeer.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Bajaj, Bopardikar, Moll, Torng and Casbeer</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>We consider perimeter defense problem in a planar conical environment with two cooperative heterogeneous defenders, i.e., a turret and a mobile vehicle, that seek to defend a concentric perimeter against mobile intruders. Arbitrary numbers of intruders are released at the circumference of the environment at arbitrary time instants and locations. Upon release, they move radially inwards with fixed speed towards the perimeter. The defenders are heterogeneous in terms of their motion and capture capabilities. Specifically, the turret has a finite engagement range and can only turn (clockwise or anti-clockwise) in the environment with fixed angular rate whereas, the vehicle has a finite capture radius and can move in any direction with unit speed. We present a competitive analysis approach to this perimeter defense problem by measuring the performance of multiple cooperative online algorithms for the defenders against arbitrary inputs, relative to an optimal offline algorithm that has information about the entire input sequence in advance. Specifically, we establish necessary conditions on the parameter space to guarantee finite competitiveness of any online algorithm. We then design and analyze four cooperative online algorithms and characterize parameter regimes in which they have finite competitive ratios. In particular, our first two algorithms are 1-competitive in specific parameter regimes, our third algorithm exhibits different competitive ratios in different regimes of problem parameters, and our fourth algorithm is 1.5-competitive in specific parameter regimes. Finally, we provide multiple numerical plots in the parameter space to reveal additional insights into the relative performance of our algorithms.</p>
</abstract>
<kwd-group>
<kwd>online optimization</kwd>
<kwd>perimeter defense</kwd>
<kwd>competitive ratio</kwd>
<kwd>pursuit evasion games</kwd>
<kwd>dynamic vehicle routing</kwd>
<kwd>cooperative agents</kwd>
</kwd-group>
<contract-sponsor id="cn001">Air Force Research Laboratory<named-content content-type="fundref-id">10.13039/100006602</named-content>
</contract-sponsor>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>With ever-expanding capabilities of Unmanned Aerial Vehicles (UAVs) and ground robots, collectively known as autonomous agents, it is now possible to deploy a team of autonomous agents for critical tasks such as surveillance (<xref ref-type="bibr" rid="B27">Ma&#x2019;sum et al., 2013</xref>; <xref ref-type="bibr" rid="B38">Tavakoli et al., 2012</xref>), exploration (<xref ref-type="bibr" rid="B18">Howard et al., 2006</xref>; <xref ref-type="bibr" rid="B21">Koveos et al., 2007</xref>), and patrolling (<xref ref-type="bibr" rid="B20">Kappel et al., 2020</xref>). Although homogeneous agents can be used in such applications, a team of heterogeneous autonomous agents can outperform homogeneous autonomous agents because of the different capabilities of the agents and thus, there has been a considerable interest in employing heterogeneous autonomous agents for such applications (<xref ref-type="bibr" rid="B34">Santos and Egerstedt, 2018</xref>; <xref ref-type="bibr" rid="B32">Ramachandran et al., 2019</xref>; <xref ref-type="bibr" rid="B31">Ramachandran et al., 2021</xref>). A critical application for such autonomous agents is defending a region (commonly known as perimeter) such as airports, wildlife habitats, or a military facility from intrusive UAVs or poachers (<xref ref-type="bibr" rid="B11">Casey, 2014</xref>; <xref ref-type="bibr" rid="B24">Lykou et al., 2020</xref>) motivating fundamental algorithmic research for perimeter defense applications using heterogeneous defenders.</p>
<p>In this work, we address a perimeter defense problem in a conical environment. The environment contains two heterogeneous defenders, namely a turret and a mobile vehicle, which seek to defend a perimeter by capturing mobile intruders. The intruders are released at the boundary of the environment and move radially inwards with fixed speed toward the perimeter. Defenders have access to intruder locations only after they are released in the environment. Further, the defenders have distinct motion and capture capability and thus, are heterogeneous in nature. Specifically, the vehicle, having a finite capture radius, moves with unit speed in the environment whereas the turret has a finite range and can only turn clockwise or anti-clockwise with a fixed angular rate. Jointly, the defenders aim to capture as many intruders as possible before they reach the perimeter. This is an <italic>online</italic> problem as the input, which consists of the total number of intruders, their release locations, as well as their release times, is gradually revealed over time to the defenders. Thus, we focus on the design and analysis of online algorithms to route the defenders. Aside from military applications, this work is also motivated by monitoring applications wherein a drone and a camera jointly monitor the crowd entering a stadium.</p>
<p>Introduced in (<xref ref-type="bibr" rid="B19">Isaacs, 1999</xref>) as a target guarding problem, perimeter defense problem is a variant of pursuit evasion problems in which the aim is to determine optimal policies for the pursuers (or vehicles) and evaders (or intruders) by formulating it as a differential game. Versions with multiple vehicles and intruders have been studied extensively as reach-avoid games (<xref ref-type="bibr" rid="B12">Chen et al., 2016</xref>; <xref ref-type="bibr" rid="B43">Yan et al., 2018</xref>; <xref ref-type="bibr" rid="B44">Yan et al., 2019</xref>) and border defense games (<xref ref-type="bibr" rid="B16">Garcia et al., 2019</xref>; <xref ref-type="bibr" rid="B15">Garcia et al., 2020</xref>) and generally focus on a classical approach which requires computing solutions to the Hamilton-Jacobi-Bellman-Isaacs equation. However, this approach, due to the curse of dimensionality, is applicable only for low dimensional state spaces and simple environments (<xref ref-type="bibr" rid="B26">Margellos and Lygeros, 2011</xref>). Another work (<xref ref-type="bibr" rid="B22">Lee et al., 2020</xref>) addresses a class of perimeter defense problems, called perimeter defense games, which require the defenders to be constrained on the perimeter. We refer the reader to (<xref ref-type="bibr" rid="B35">Shishika and Kumar, 2020</xref>) for a review of perimeter defense games. Other recent works include (<xref ref-type="bibr" rid="B17">Guerrero-Bonilla et al., 2021</xref>) and (<xref ref-type="bibr" rid="B23">Lee and Bakolas, 2021</xref>) which consider an approach based on control barrier function or a convex shaped perimeter, respectively. All of these works consider mobile agents or vehicles that can move in any direction in the environment. Recently, (<xref ref-type="bibr" rid="B2">Akilan and Fuchs, 2017</xref>) considered a turret as a defender and introduced a differential game between a turret and a mobile intruder with an instantaneous cost based on the angular separation between the two. A similar problem setup with the possibility of retreat was considered in (<xref ref-type="bibr" rid="B39">Von Moll and Fuchs, 2020</xref>; <xref ref-type="bibr" rid="B40">Von Moll and Fuchs, 2021</xref>). Further, (<xref ref-type="bibr" rid="B41">Von Moll et al., 2022a</xref>) and (<xref ref-type="bibr" rid="B42">Von Moll et al., 2022b</xref>) considered a scenario in which the turret seeks to align its angle to that of the intruders in order to neutralize an attacker. All of these works assume that some information about the intruders is known <italic>a priori</italic> and do not consider heterogeneous defenders.</p>
<p>Online problems which require that the route of the vehicle be re-planned as information is revealed gradually over time are known as dynamic vehicle routing problems (<xref ref-type="bibr" rid="B30">Psaraftis, 1988</xref>; <xref ref-type="bibr" rid="B8">Bertsimas and Van Ryzin, 1991</xref>; <xref ref-type="bibr" rid="B10">Bullo et al., 2011</xref>). In these problems, the input (also known as demands) is static and therefore, the problem is to find the shortest route through the demands in order to minimize (maximize) the cost (reward). Examples of such metrics would be the total service time or the number of inputs serviced. In perimeter defense scenarios, the input (intruders) are not static. Instead, they are moving towards a specified region, making this problem more challenging than the former. With the assumption that the arrival process of the intruders is stochastic (<xref ref-type="bibr" rid="B37">Smith et al., 2009</xref>; <xref ref-type="bibr" rid="B3">Bajaj and Bopardikar, 2019</xref>; <xref ref-type="bibr" rid="B25">Macharet et al., 2020</xref>), consider the perimeter defense problem, in a circular or rectangular environment, as a vehicle routing problem using a single defender or multiple but homogeneous defenders. Recently (<xref ref-type="bibr" rid="B1">Adler et al., 2022</xref>) considered a problem of perimeter defense wherein either all of the attackers are known to the defenders at time 0 or the attackers are generated (i) uniformly randomly or (ii) by an adversary and determine how fast each defender must be in order to defend the perimeter. Although, in this work we consider worst-case scenarios, which is equivalent to the intruders being generated by an adversary, the speed of the defenders is fixed and we focus on designing cooperative online algorithms for the defenders. Other related works that do not make any assumptions on the intruders are (<xref ref-type="bibr" rid="B28">McGee and Hedrick, 2006</xref>; <xref ref-type="bibr" rid="B14">Francos and Bruckstein, 2021</xref>). However in these works, the aim is to design <italic>must-win</italic> algorithms, i.e., algorithms that detect every intruder in an environment.</p>
<p>Most prior works on perimeter defense problems have only considered defenders with identical capabilities. Further, they have either focused on determining an optimal strategy for scenarios with either few intruders or intruders generated by a stochastic process. The optimal strategy approaches do not scale with an arbitrary number of intruders released online. While stochastic approaches yield important insights into the average-case performance of defense strategies, they do not account for the worst-case in which intruders may coordinate their arrival to overcome the defense.</p>
<p>This work considers a perimeter defense problem with two heterogeneous defenders and focuses on worst-case instances. In particular, we establish fundamental guarantees as well as design online algorithms and provide analytical bounds on their performance in the worst-case. To evaluate the performance of online algorithms in the worst-case when faced with arbitrarily many intruders, we adopt a <italic>competitive analysis</italic> perspective (<xref ref-type="bibr" rid="B36">Sleator and Tarjan, 1985</xref>) which has also been studied in robotic exploration (<xref ref-type="bibr" rid="B13">Deng and Mirzaian, 1996</xref>), searching (<xref ref-type="bibr" rid="B29">Ozsoyeller et al., 2013</xref>), and design of state-space controllers (<xref ref-type="bibr" rid="B33">Sabag et al., 2022</xref>). Under this paradigm, an online algorithm <inline-formula id="inf1">
<mml:math id="m1">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula>&#x2019;s performance is measured using the notion of <italic>competitive ratio</italic>: the ratio of the optimal (possibly non-causal) algorithm&#x2019;s performance and algorithm <inline-formula id="inf2">
<mml:math id="m2">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula>&#x2019;s performance for a worst-case input sequence for algorithm <inline-formula id="inf3">
<mml:math id="m3">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula>. An algorithm is <italic>c</italic>-competitive if its competitive ratio is no larger than <italic>c</italic>, which means its performance is guaranteed to be within a factor <italic>c</italic> of the optimal, for all input sequences.</p>
<p>Previously, we introduced the perimeter defense problem for a single defender in linear environments using competitive analysis (<xref ref-type="bibr" rid="B6">Bajaj et al., 2021</xref>). This was followed by (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022c</xref>), which are the conference version of this current paper and focused on the perimeter defense problem for a <italic>single vehicle</italic> and a <italic>single turret</italic> in conical environments, respectively. The main contributions of this work are as follows:</p>
<list list-type="simple">
<list-item>
<p>
<bold>&#x2022; Perimeter defense problem with heterogeneous defenders:</bold> We address a perimeter defense problem in a conical environment with two cooperative heterogeneous defenders, i.e., a vehicle and a turret, tasked to defend a perimeter. The vehicle has a finite capture radius and moves with unit speed, whereas the turret has a finite engagement range and turns in the environment with a fixed angular rate. We do not impose any assumption on the arrival process of the intruders. More precisely, an arbitrary number of intruders can be released in the environment at arbitrary locations and time instances. Upon release, the intruders move with fixed speed <italic>v</italic> towards the perimeter. Thus, the perimeter defense problem is characterized by six parameters: (i) angle <italic>&#x3b8;</italic> of the conical environment, (ii) the speed <italic>v</italic> of the intruders, (iii) the perimeter radius <italic>&#x3c1;</italic>, (iv) the engagement range of the turret <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, (v) the angular rate of the turret <italic>&#x3c9;</italic>, and (vi) the capture radius of the vehicle <italic>r</italic>
<sub>
<italic>c</italic>
</sub>.</p>
</list-item>
<list-item>
<p>
<bold>&#x2022; Necessary condition:</bold> We establish a necessary condition on the existence of any <italic>c</italic>-competitive algorithm for any finite <italic>c</italic>. This condition serves as a fundamental limit to this problem and identifies regimes for the six problem parameters in which this problem does not admit an effective online algorithm.</p>
</list-item>
<list-item>
<p>
<bold>&#x2022; Algorithm Design and Analysis:</bold> We design and analyze four classes of cooperative algorithms with provably finite competitive ratios under specific parameter regimes. Specifically, the first two cooperative algorithms are provably 1-competitive, the third cooperative algorithm exhibits a finite competitive ratio which depends on the problem parameters and finally, the fourth algorithm is 1.5-competitive.</p>
<p>Additionally, through multiple parameter regime plots, we shed light into the relative comparison and the effectiveness of our algorithms. We also provide a brief discussion on the time complexity of our algorithms and how this work can be extended to other models of the vehicle.</p>
<p>The paper is organized as follows. In <xref ref-type="sec" rid="s2">Section 2</xref>, we formally define the competitive ratio and our problem. <xref ref-type="sec" rid="s3">Section 3</xref> establishes the necessary conditions, <xref ref-type="sec" rid="s4">Section 4</xref> presents the algorithms and their analysis. <xref ref-type="sec" rid="s5">Section 5</xref> provides several numerical insights. Finally, <xref ref-type="sec" rid="s7">Section 7</xref> summarizes the paper and outlines future directions.</p>
</list-item>
</list>
</sec>
<sec id="s2">
<title>2 Problem formulation</title>
<p>Consider a planar conical environment (<xref ref-type="fig" rid="F1">Figure 1</xref>) described by <inline-formula id="inf4">
<mml:math id="m4">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mspace width="0.17em"/>
<mml:mo>:</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, where (<italic>y</italic>, <italic>&#x3b1;</italic>) denotes a location in polar coordinates. The environment has two endpoints, (1, <italic>&#x3b8;</italic>) and (1, &#x2212; <italic>&#x3b8;</italic>). The environment contains a concentric and coaxial region, <inline-formula id="inf5">
<mml:math id="m5">
<mml:mi mathvariant="script">R</mml:mi>
</mml:math>
</inline-formula>, described by a set of points (<italic>z</italic>, <italic>&#x3b1;</italic>) in polar coordinates, where 0 &#x3c; <italic>z</italic> &#x2264; <italic>&#x3c1;</italic> and <italic>&#x3b1;</italic> &#x2208; [&#x2212;<italic>&#x3b8;</italic>, <italic>&#x3b8;</italic>]. Mathematically, <inline-formula id="inf6">
<mml:math id="m6">
<mml:mi mathvariant="script">R</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>z</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mspace width="0.17em"/>
<mml:mo>:</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>z</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> for some <italic>&#x3c1;</italic> &#x2208; (0, 1). Analogous to the environment, <inline-formula id="inf7">
<mml:math id="m7">
<mml:mi mathvariant="script">R</mml:mi>
</mml:math>
</inline-formula>&#x2019;s endpoints are (<italic>&#x3c1;</italic>, <italic>&#x3b8;</italic>) and (<italic>&#x3c1;</italic>, &#x2212; <italic>&#x3b8;</italic>). Arbitrary numbers of intruders are released at the circumference of the environment, i.e., <italic>y</italic> &#x3d; 1, at arbitrary time instants. Upon release, each intruder moves radially inward with a fixed speed <italic>v</italic> &#x3e; 0<xref ref-type="fn" rid="fn2">
<sup>1</sup>
</xref> toward the perimeter <inline-formula id="inf8">
<mml:math id="m8">
<mml:mi>&#x2202;</mml:mi>
<mml:mi mathvariant="script">R</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mspace width="0.17em"/>
<mml:mo>:</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Mathematically, if the <italic>i</italic>th intruder is released at time <italic>t</italic>
<sub>
<italic>i</italic>
</sub>, then its location is represented by a constant angle <italic>&#x3b8;</italic>
<sub>
<italic>i</italic>
</sub> and its distance <inline-formula id="inf9">
<mml:math id="m9">
<mml:msubsup>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> from the origin satisfying <inline-formula id="inf10">
<mml:math id="m10">
<mml:msubsup>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>v</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">[</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">]</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Two defenders are employed to defend the perimeter, <inline-formula id="inf11">
<mml:math id="m11">
<mml:mi>&#x2202;</mml:mi>
<mml:mi mathvariant="script">R</mml:mi>
</mml:math>
</inline-formula> of the region <inline-formula id="inf12">
<mml:math id="m12">
<mml:mi mathvariant="script">R</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>: a turret located at the origin of <inline-formula id="inf13">
<mml:math id="m13">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and a vehicle, both with simple motion dynamics. The vehicle has a finite capture radius, <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3e; 0 and can either move with unit speed or remain stationary. The turret has a finite engagement range, <italic>r</italic>
<sub>
<italic>t</italic>
</sub> such that <italic>&#x3c1;</italic> &#x2264; <italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2264; 1, and can either turn clockwise or anti-clockwise with an angular speed of at most <italic>&#x3c9;</italic> or remain stationary. We consider that the vehicle&#x2019;s capture radius is sufficiently small, in particular, <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3c; min{<italic>&#x3c1;</italic>, <italic>&#x3c1;</italic>&#x2009;tan(<italic>&#x3b8;</italic>)}. Otherwise, this problem becomes trivial (refer to (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022c</xref>)).</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Problem Description. The vehicle is depicted by a blue dot and the blue circle around the vehicle depicts the capture circle. The direction of the vehicle is shown by the blue arrow. The yellow arrow depicts the turret (located at the origin of <inline-formula id="inf14">
<mml:math id="m14">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>) and the blue dashed curve denotes the engagement range of the turret. The green curve denotes the perimeter and the red dots denote the intruders. Note that the intruder that the turret is pointing to (black dashed line) is not captured unless it is within the engagement range of the turret (blue dashed curve).</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g001.tif"/>
</fig>
<p>Intruder <italic>i</italic>, located at <inline-formula id="inf15">
<mml:math id="m15">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, is said to be captured at time instant <italic>t</italic> if either one of the following holds:<list list-type="simple">
<list-item>
<p>&#x2022; intruder <italic>i</italic> is inside or on the capture circle of the mobile vehicle at time <italic>t</italic>, or</p>
</list-item>
<list-item>
<p>&#x2022; intruder <italic>i</italic> is at most <italic>r</italic>
<sub>
<italic>t</italic>
</sub> distance away from the origin and <italic>&#x3b3;</italic>
<sub>
<italic>t</italic>
</sub> &#x3d; <italic>&#x3b8;</italic>
<sub>
<italic>i</italic>
</sub> holds, where <italic>&#x3b3;</italic>
<sub>
<italic>t</italic>
</sub> denotes the heading of the turret at time instant <italic>t</italic>.</p>
</list-item>
</list>
</p>
<p>The intruder is said to be lost by the defenders if it reaches the perimeter without getting captured. The intruder is removed from <inline-formula id="inf16">
<mml:math id="m16">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> if it is either captured or lost. We assume that the turret and the vehicle neutralize an intruder instantaneously, i.e., they do not require any additional service time. This implies that the defenders do not need to stop to complete the capture of an intruder. We further assume that the turret can start and stop firing instantaneously. This implies that the turret does not neutralize the vehicle in case the turret&#x2019;s heading angle is the same as the vehicle&#x2019;s angular coordinate at a particular time instant.</p>
<p>A <italic>problem instance</italic> <inline-formula id="inf17">
<mml:math id="m17">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> is characterized by six parameters: (i) the speed of the intruders <italic>v</italic> &#x3e; 0, (ii) the perimeter radius 0 &#x3c; <italic>&#x3c1;</italic> &#x3c; 1, (iii) the angle 0 &#x3c; <italic>&#x3b8;</italic> &#x2264; <italic>&#x3c0;</italic> that defines the size of the environment as well as the perimeter, (iv) the capture radius of the vehicle 0 &#x3c; <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3c; min{<italic>&#x3c1;</italic>, <italic>&#x3c1;</italic>&#x2009;tan(<italic>&#x3b8;</italic>)}, (v) the angular speed of the turret <italic>&#x3c9;</italic> &#x3e; 0, and (vi) the range of the turret <italic>&#x3c1;</italic> &#x2264; <italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2264; 1. An input sequence <inline-formula id="inf18">
<mml:math id="m18">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> is a set of 3-tuples comprising: (i) an arbitrary time instant <italic>t</italic> &#x2264; <italic>T</italic>, where <italic>T</italic> denotes the final time instant, (ii) the number of intruders <italic>N</italic>(<italic>t</italic>) that are released at time instant <italic>t</italic>, and (iii) the release location (radius and angle) of each of the <italic>N</italic>(<italic>t</italic>) intruders. Formally, <inline-formula id="inf19">
<mml:math id="m19">
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>N</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, for any <italic>&#x3b1;</italic>
<sub>
<italic>l</italic>
</sub> &#x2208; [&#x2212;<italic>&#x3b8;</italic>, <italic>&#x3b8;</italic>], where 1 &#x2264; <italic>l</italic> &#x2264; <italic>N</italic>(<italic>t</italic>).</p>
<p>An <italic>online algorithm</italic> <inline-formula id="inf20">
<mml:math id="m20">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> assigns velocities with unit (resp. at most <italic>&#x3c9;</italic>) magnitude to the vehicle (resp. turret) at time <italic>t</italic> as a function of the input <inline-formula id="inf21">
<mml:math id="m21">
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2282;</mml:mo>
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> revealed until time <italic>t</italic>. An <italic>optimal offline algorithm</italic> is an algorithm which has complete information of the entire input sequence <inline-formula id="inf22">
<mml:math id="m22">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> <italic>a priori</italic> to assign velocities to the vehicle and the turret at any time <italic>t</italic>. The performance of an online algorithm as well as the optimal offline algorithm for a problem instance <inline-formula id="inf23">
<mml:math id="m23">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> is the total number of intruders captured by the vehicle and by the turret out of an input sequence <inline-formula id="inf24">
<mml:math id="m24">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>. Let <inline-formula id="inf25">
<mml:math id="m25">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf26">
<mml:math id="m26">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>) denote the performance of an online algorithm <inline-formula id="inf27">
<mml:math id="m27">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> (resp. optimal offline algorithm <inline-formula id="inf28">
<mml:math id="m28">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula>) on an input sequence <inline-formula id="inf29">
<mml:math id="m29">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>. Then, we define the competitive ratio as the following.</p>
<p>
<statement>
<p>Definition 1 (Competitive Ratio): <italic>Given a problem instance</italic> <inline-formula id="inf30">
<mml:math id="m30">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula>
<italic>, an input sequence</italic> <inline-formula id="inf31">
<mml:math id="m31">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>
<italic>, and an online deterministic algorithm</italic> <inline-formula id="inf32">
<mml:math id="m32">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula>
<italic>, the competitive ratio of</italic> <inline-formula id="inf33">
<mml:math id="m33">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> <italic>for the input sequence</italic> <inline-formula id="inf34">
<mml:math id="m34">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> <italic>is defined as</italic> <inline-formula id="inf35">
<mml:math id="m35">
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2254;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
</inline-formula>
<italic>, and the competitive ratio of</italic> <inline-formula id="inf36">
<mml:math id="m36">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> <italic>for the problem instance</italic> <inline-formula id="inf37">
<mml:math id="m37">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> <italic>is</italic> <inline-formula id="inf38">
<mml:math id="m38">
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>sup</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mspace width="0.3333em" class="nbsp"/>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<italic>. Finally, the competitive ratio for the problem instance</italic> <inline-formula id="inf39">
<mml:math id="m39">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> <italic>is</italic> <inline-formula id="inf40">
<mml:math id="m40">
<mml:mi>c</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>inf</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<italic>. An online algorithm is</italic> <italic>c</italic>
<italic>-competitive for the problem instance</italic> <inline-formula id="inf41">
<mml:math id="m41">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> <italic>if, for all input sequences</italic> <inline-formula id="inf42">
<mml:math id="m42">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>
<italic>,</italic> <inline-formula id="inf43">
<mml:math id="m43">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>c</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> <italic>holds, where</italic> <italic>c</italic> &#x2265; 1 <italic>and</italic> <inline-formula id="inf44">
<mml:math id="m44">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula> <italic>are fixed constants.</italic>
</p>
</statement>
</p>
<p>The constant <inline-formula id="inf45">
<mml:math id="m45">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> is sometimes used to account for the initial differences in the state of the online and the optimal offline algorithm and is generally insignificant for longer initial input sequences. In this work, we use the <italic>strict</italic> definition of competitive ratio, i.e., <inline-formula id="inf46">
<mml:math id="m46">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula>. More formally, we say that an online algorithm is <italic>c</italic>-competitive for the problem instance <inline-formula id="inf47">
<mml:math id="m47">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> if, for all input sequences <inline-formula id="inf48">
<mml:math id="m48">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf49">
<mml:math id="m49">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>c</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> holds. However, we will see later that all of our results also hold for <inline-formula id="inf50">
<mml:math id="m50">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula> as well. We refer (<xref ref-type="bibr" rid="B9">Borodin and El-Yaniv, 2005</xref>) for further details on the definition of <italic>c</italic>-competitive algorithms.</p>
<p>Competitive analysis falls under a general framework of Request-Answer games and thus, can be viewed as a game between an online player and an <italic>adversary</italic> (<xref ref-type="bibr" rid="B9">Borodin and El-Yaniv, 2005</xref>). An adversary is defined as a pair <inline-formula id="inf51">
<mml:math id="m51">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">Q</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf52">
<mml:math id="m52">
<mml:mi mathvariant="script">Q</mml:mi>
</mml:math>
</inline-formula> is the input component responsible for generating the input sequences <inline-formula id="inf53">
<mml:math id="m53">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> and <inline-formula id="inf54">
<mml:math id="m54">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> is an optimal offline algorithm which maximizes <inline-formula id="inf55">
<mml:math id="m55">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Thus, the adversary, with the information of the online algorithm, constructs a worst-case input sequence so as to maximize the competitive ratio, i.e., it minimizes the number of intruders captured by the online algorithm and simultaneously maximizes the number of intruders captured by an optimal offline algorithm. On the other hand, the online player operates an online algorithm on an input sequence created by the adversary. In this work, we restrict the choice of inputs <inline-formula id="inf56">
<mml:math id="m56">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> to those for which there exists an optimal offline algorithm <inline-formula id="inf57">
<mml:math id="m57">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> such that <inline-formula id="inf58">
<mml:math id="m58">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
</inline-formula>. Clearly, <inline-formula id="inf59">
<mml:math id="m59">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. However, if for some <inline-formula id="inf60">
<mml:math id="m60">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf61">
<mml:math id="m61">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula>, then we say that <inline-formula id="inf62">
<mml:math id="m62">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> is not <italic>c</italic>-competitive for any finite <italic>c</italic>. We now formally define the objective of this work.</p>
<p>
<bold>Problem Statement:</bold> <italic>Design online deterministic cooperative algorithms with</italic> <italic>finite competitive ratios for the defenders and establish fundamental guarantees on the existence of online algorithms with finite competitive ratio.</italic>
</p>
<p>We start by determining a fundamental limit on the existence of <italic>c</italic>-competitive algorithms followed by designing online cooperative algorithms.</p>
</sec>
<sec id="s3">
<title>3 Fundamental limits</title>
<p>We start by defining a <italic>partition</italic> of the environment. A partition of <inline-formula id="inf63">
<mml:math id="m63">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> is a collection of <italic>q</italic> &#x2265; 1 cones <inline-formula id="inf64">
<mml:math id="m64">
<mml:mi mathvariant="script">W</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> with disjoint interiors and whose union is <inline-formula id="inf65">
<mml:math id="m65">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Additionally, each cone is of unit radius having a finite positive angle and is concentric with the environment. We refer to a cone <italic>W</italic>
<sub>
<italic>m</italic>
</sub>, 1 &#x2264; <italic>i</italic> &#x2264; <italic>q</italic> as the <italic>m</italic>th dominance region. Further, an endpoint of a dominance region is defined analogously as the endpoints of the environment. Given any set of initial locations of the defenders with distinct angular coordinates, the environment <inline-formula id="inf66">
<mml:math id="m66">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> can be partitioned into two dominance regions such that each dominance region corresponds to a particular defender. We denote the portion of the perimeter contained in dominance region <italic>m</italic>, 1 &#x2264; <italic>m</italic> &#x2264; 2, as <italic>&#x2202;R</italic>
<sub>
<italic>m</italic>
</sub>. Without loss of generality, we assume that <inline-formula id="inf67">
<mml:math id="m67">
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">R</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf68">
<mml:math id="m68">
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">R</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>) corresponds to the leftmost (resp. rightmost) dominance region.</p>
<p>Let <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>) &#x3d; 2<italic>&#x3c9;</italic>(<italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b1;</italic>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>) &#x2b; <italic>&#x3b1;</italic> &#x2212; <italic>&#x3b8;</italic> and <italic>f</italic>
<sub>2</sub>(<italic>&#x3b1;</italic>) &#x3d; 0.5<italic>&#x3c9;</italic>(<italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b1;</italic>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>) &#x2b; <italic>&#x3b1;</italic> &#x2212; <italic>&#x3b8;</italic>. Let <inline-formula id="inf69">
<mml:math id="m69">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> denote the solution to the equation <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>) &#x3d; 0 and let <inline-formula id="inf70">
<mml:math id="m70">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> be the solution to the equation <italic>f</italic>
<sub>2</sub>(<italic>&#x3b1;</italic>) &#x3d; 0. Then, following result establishes a necessary condition on the existence of <italic>c</italic>-competitive algorithms.</p>
<p>
<statement>
<p>Theorem 3.1: (Necessary Condition for finite <inline-formula id="inf71">
<mml:math id="m71">
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>). <italic>Let</italic>
<disp-formula id="equ1">
<mml:math id="m72">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mtext mathvariant="italic">i</mml:mtext>
<mml:mtext mathvariant="italic">f</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
</disp-formula>and let<disp-formula id="equ2">
<mml:math id="m73">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mtext mathvariant="italic">i</mml:mtext>
<mml:mtext mathvariant="italic">f</mml:mtext>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
</disp-formula>
<italic>Then, for any problem instance</italic> <inline-formula id="inf72">
<mml:math id="m74">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> <italic>such that</italic> <italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b8;</italic>) &#x3e; <italic>r</italic>
<sub>
<italic>c</italic>
</sub> <italic>and</italic> <inline-formula id="inf73">
<mml:math id="m75">
<mml:mfrac>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3e;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> <italic>holds, there does not exist a</italic> <italic>c</italic>
<italic>-competitive algorithm for any finite</italic> <italic>c</italic>
<italic>.</italic>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_1">
<label>Proof</label>
<p>Recall from Definition 1 that any online algorithm <inline-formula id="inf74">
<mml:math id="m76">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> is <italic>c</italic>-competitive if the condition <inline-formula id="inf75">
<mml:math id="m77">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>c</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> holds for <italic>every</italic> input sequence <inline-formula id="inf76">
<mml:math id="m78">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>. Thus, the aim is to construct an input sequence <inline-formula id="inf77">
<mml:math id="m79">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> such that the condition <inline-formula id="inf78">
<mml:math id="m80">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>c</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> does not hold for any constant <italic>c</italic> &#x2265; 1 regardless of which online algorithm is used. The proof is in three parts. First, we construct an input sequence <inline-formula id="inf79">
<mml:math id="m81">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>. Then, we determine the best locations for the defenders against such an input sequence. Finally, we evaluate the performance of any online algorithm <inline-formula id="inf80">
<mml:math id="m82">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> on the input <inline-formula id="inf81">
<mml:math id="m83">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula> as well as the performance of the optimal offline algorithm <inline-formula id="inf82">
<mml:math id="m84">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> on the same input sequence <inline-formula id="inf83">
<mml:math id="m85">
<mml:mi mathvariant="script">I</mml:mi>
</mml:math>
</inline-formula>, to establish the result. Without loss of generality, we assume that both <inline-formula id="inf84">
<mml:math id="m86">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> and <inline-formula id="inf85">
<mml:math id="m87">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> have the vehicle at the origin at time instant 0 and the turret at angle <italic>&#x3b3;</italic>
<sub>0</sub> &#x3d; 0.</p>
<p>Let <inline-formula id="inf86">
<mml:math id="m88">
<mml:mi mathvariant="bold">I</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> denote a set of two input sequences. Each input sequence <inline-formula id="inf87">
<mml:math id="m89">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="bold">I</mml:mi>
</mml:math>
</inline-formula>, where <italic>l</italic> &#x2208; {1, 2}, differs in the location of the arrival of intruders. Both input sequences <inline-formula id="inf88">
<mml:math id="m90">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> and <inline-formula id="inf89">
<mml:math id="m91">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> start at time instant <inline-formula id="inf90">
<mml:math id="m92">
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and consists of a stream of intruders, i.e., a sequence of a single intruder arriving at location (1, <italic>&#x3b8;</italic>) at every time instant <inline-formula id="inf91">
<mml:math id="m93">
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>k</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="double-struck">N</mml:mi>
<mml:mo>&#x222a;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> until time instant <italic>t</italic>. The time instant <italic>t</italic> &#x2265; 0 corresponds to the time instant when either the vehicle or the turret, following any online algorithm <inline-formula id="inf92">
<mml:math id="m94">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula>, captures an intruder from the stream. A burst of <italic>c</italic> &#x2b; 1 intruders are then released at time instant <italic>t</italic>. The location where the burst of intruder arrives is different for each input sequence <inline-formula id="inf93">
<mml:math id="m95">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1,2</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Given the location of the turret and the vehicle at time instant <italic>t</italic>, there can be at most two dominance regions of the environment and thus, at most two locations where the burst of intruders can arrive. These locations have the same angular coordinate as the endpoints of each <italic>&#x2202;R</italic>
<sub>
<italic>m</italic>
</sub>, <italic>&#x2200;m</italic> &#x2208; {1, 2} excluding <italic>&#x3b8;</italic> and including &#x2212;<italic>&#x3b8;</italic>. Without loss of generality, the burst of intruders are released at location (1, &#x2212; <italic>&#x3b8;</italic>) for <inline-formula id="inf94">
<mml:math id="m96">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. Further, if the heading angle of the turret is the same as the angular coordinate of the vehicle at time <italic>t</italic>, i.e., <italic>&#x3b3;</italic>
<sub>
<italic>t</italic>
</sub> &#x3d; <italic>&#x3b8;</italic> and the vehicle&#x2019;s angular coordinate is <italic>&#x3b8;</italic> at time instant <italic>t</italic>, then the burst intruders arrive at (1, &#x2212; <italic>&#x3b8;</italic>) for both <inline-formula id="inf95">
<mml:math id="m97">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> and <inline-formula id="inf96">
<mml:math id="m98">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> (In this case, <inline-formula id="inf97">
<mml:math id="m99">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> is same as <inline-formula id="inf98">
<mml:math id="m100">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>).</p>
<p>If neither the vehicle nor the turret captures the stream intruder, the stream never ends and the result follows as the optimal offline algorithm <inline-formula id="inf99">
<mml:math id="m101">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> can have its vehicle move, at time instant 0, to location (<italic>&#x3c1;</italic>, <italic>&#x3b8;</italic>) and capture all stream intruders. Thus, in the remainder of the proof, we only consider online algorithms <inline-formula id="inf100">
<mml:math id="m102">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula> for which either the vehicle or the turret captures at least one stream intruder at time instant <italic>t</italic>. Since the stream intruders arrive every <inline-formula id="inf101">
<mml:math id="m103">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> time units apart and stops when an intruder from the stream is captured, it follows that no online algorithm can capture more than one intruder from the stream. Thus, we assume that the <italic>i</italic>th stream intruder was captured at time instant <italic>t</italic>, for some <inline-formula id="inf102">
<mml:math id="m104">
<mml:mi>i</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="double-struck">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2b;</mml:mo>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>, where <inline-formula id="inf103">
<mml:math id="m105">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="double-struck">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2b;</mml:mo>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> denotes the set of positive integers.</p>
<p>We now determine the best locations, or equivalently the dominance regions of the environment, for the turret and the vehicle at time instant <italic>t</italic>. Note that the heading angle of the turret must not be equal to the angular coordinate of the vehicle at time instant <italic>t</italic>. This is because in such case, the burst arrives at (1, &#x2212; <italic>&#x3b8;</italic>) and thus, there always exist a location closer to angle &#x2212;<italic>&#x3b8;</italic> such that the vehicle or the turret can reach angular location &#x2212;<italic>&#x3b8;</italic> in less time. This implies that at time instant <italic>t</italic>, the environment consists of two dominance regions, each of which contains a defender. We denote the dominance region which contains the vehicle (resp. turret) as <italic>W</italic>
<sub>Veh</sub> (resp. <italic>W</italic>
<sub>Tur</sub>) and determine them in the following two cases. These two cases arise based on whether the vehicle or the turret captures the <italic>i</italic>th intruder, each of which is considered below.</p>
</statement>
</p>
<p>
<statement>
<p>
<bold>Case 1 (Vehicle captures the</bold> <bold>
<italic>i</italic>
</bold>
<bold>th intruder):</bold> Let 2<italic>&#x3b1;</italic>
<sub>1</sub> and 2<italic>&#x3b2;</italic>
<sub>1</sub> be the angles of <italic>W</italic>
<sub>Veh</sub> and <italic>W</italic>
<sub>Tur</sub>, respectively. The best location for the vehicle and the turret in this case can be summarized as follows. The vehicle must be located on the line joining the two endpoints of the perimeter within its <italic>W</italic>
<sub>Veh</sub> <inline-formula id="inf104">
<mml:math id="m106">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">R</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> only if 2<italic>&#x3b1;</italic>
<sub>1</sub> &#x3c; <italic>&#x3c0;</italic>. Otherwise, vehicle must be located on the line joining the origin to the location (1, <italic>&#x3b8;</italic>). In both cases, it must be at a distance <italic>r</italic> from location (<italic>&#x3c1;</italic>, <italic>&#x3b8;</italic>). The angle of the turret must be equal to the angle bisector of 2<italic>&#x3b2;</italic>
<sub>1</sub> (<xref ref-type="fig" rid="F2">Figure 2A</xref>). Finally, the time taken by the vehicle to reach the other endpoint of <inline-formula id="inf105">
<mml:math id="m107">
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">R</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> must be equal to the time taken by the turret to turn to the same angle corresponding to that location. This is denoted mathematically as<disp-formula id="e1">
<mml:math id="m108">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mn>2</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mtext>&#x2009;if&#x2009;</mml:mtext>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mn>2</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;otherwise</mml:mtext>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(1)</label>
</disp-formula>where by definition 2<italic>&#x3b8;</italic> &#x3d; 2<italic>&#x3b1;</italic>
<sub>1</sub> &#x2b; 2<italic>&#x3b2;</italic>
<sub>1</sub> and the time taken by the vehicle to capture intruders at the other endpoint of the perimeter contained in its dominance region is 2(<italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b1;</italic>
<sub>1</sub>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>) (resp. 2(<italic>&#x3c1;</italic> &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>)) when <inline-formula id="inf106">
<mml:math id="m109">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf107">
<mml:math id="m110">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>). As <inline-formula id="inf108">
<mml:math id="m111">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> only holds if <inline-formula id="inf109">
<mml:math id="m112">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, it follows that <inline-formula id="inf110">
<mml:math id="m113">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> if <inline-formula id="inf111">
<mml:math id="m114">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> holds. Otherwise, <inline-formula id="inf112">
<mml:math id="m115">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is determined by solving the equation <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>) &#x3d; 0, where <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>) &#x3d; 2<italic>&#x3c9;</italic>(<italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b1;</italic>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>) &#x2b; <italic>&#x3b1;</italic> &#x2212; <italic>&#x3b8;</italic> where <inline-formula id="inf113">
<mml:math id="m116">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c0;</mml:mi>
<mml:mo>/</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula>. We now show that the solution to <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>) &#x3d; 0 always exist if <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3c; <italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b8;</italic>).</p>
<p>Suppose that <italic>&#x3b1;</italic>
<sub>1</sub> &#x3d; <italic>&#x3f5;</italic>, where <italic>&#x3f5;</italic> &#x3e; 0 is a very small number. Then, <italic>f</italic>(<italic>&#x3f5;</italic>) &#x3d; 2<italic>&#x3c9;&#x3c1;</italic>&#x2009;sin(<italic>&#x3f5;</italic>) &#x2b; <italic>&#x3f5;</italic> &#x2212; <italic>&#x3b8;</italic> &#x2212; 2<italic>r</italic>
<sub>
<italic>c</italic>
</sub>
<italic>&#x3c9;</italic> &#x3c; 0. Now consider that <italic>&#x3b1;</italic>
<sub>1</sub> &#x3d; <italic>&#x3b8;</italic> &#x2212; <italic>&#x3f5;</italic> for the same <italic>&#x3f5;</italic>. Then, as <italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b8;</italic>) &#x3e; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, it follows that <italic>f</italic>
<sub>1</sub>(<italic>&#x3b8;</italic> &#x2212; <italic>&#x3f5;</italic>) &#x3d; 2<italic>&#x3c9;</italic>(<italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b8;</italic> &#x2212; <italic>&#x3f5;</italic>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>) &#x2212; <italic>&#x3f5;</italic> &#x3e; 0, for a sufficiently small <italic>&#x3f5;</italic>. This means that for a sufficiently small <italic>&#x3f5;</italic> &#x3e; 0, <italic>f</italic>
<sub>1</sub>(&#x22c5;) changes its sign in the interval [<italic>&#x3f5;</italic>, <italic>&#x3b8;</italic> &#x2212; <italic>&#x3f5;</italic>]. Thus, from Intermediate Value Theorem and using the fact that <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>
<sub>1</sub>) is continuous function of <italic>&#x3b1;</italic>
<sub>1</sub>, it follows that there must exist an <inline-formula id="inf114">
<mml:math id="m117">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> such that <inline-formula id="inf115">
<mml:math id="m118">
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula> if <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3c; <italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b8;</italic>). Further, since <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>) is a continuous function and its derivative is strictly increasing for <inline-formula id="inf116">
<mml:math id="m119">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula> and hence, there exists a unique <inline-formula id="inf117">
<mml:math id="m120">
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula> which satisfies <italic>f</italic>
<sub>1</sub>(<italic>&#x3b1;</italic>).</p>
</statement>
</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Depiction of the perimeter depicting the two cases under which one of the defenders captures the ith intruder. <bold>(A)</bold> Vehicle captures the <italic>i</italic>th intruder (Case 1). <bold>(B)</bold> Turret captures the <italic>i</italic>th intruder (Case 2).</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g002.tif"/>
</fig>
<p>
<statement>
<p>
<bold>Case 2 (Turret captures the</bold> <bold>
<italic>i</italic>
</bold>
<bold>th intruder):</bold> Similar to Case 1, let 2<italic>&#x3b1;</italic>
<sub>2</sub> and 2<italic>&#x3b2;</italic>
<sub>2</sub> be the angles of <italic>W</italic>
<sub>Veh</sub> and <italic>W</italic>
<sub>Tur</sub>, respectively (<xref ref-type="fig" rid="F2">Figure 2B</xref>). As the turret captures the stream intruder, it follows that <italic>&#x3b3;</italic>
<sub>
<italic>t</italic>
</sub> &#x3d; <italic>&#x3b8;</italic>. Further, the vehicle must be located at the midpoint of the line joining the two endpoints of the perimeter within its dominance region. Finally, the time taken by the vehicle to reach any endpoint of the perimeter must be equal to the time taken by the turret to turn to the same angle corresponding to that location. Mathematically, this yields<disp-formula id="e2">
<mml:math id="m121">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;if&#x2009;</mml:mtext>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;otherwise</mml:mtext>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(2)</label>
</disp-formula>where we used the fact that 2<italic>&#x3b8;</italic> &#x3d; 2<italic>&#x3b1;</italic>
<sub>2</sub> &#x2b; 2<italic>&#x3b2;</italic>
<sub>2</sub> and <italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b1;</italic>
<sub>2</sub>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub> (resp. (<italic>&#x3c1;</italic> &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>)) denotes the time taken by the vehicle to capture intruders at the other endpoint of the perimeter contained in its dominance region when <inline-formula id="inf118">
<mml:math id="m122">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf119">
<mml:math id="m123">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>). As <inline-formula id="inf120">
<mml:math id="m124">
<mml:mn>2</mml:mn>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> only holds if <inline-formula id="inf121">
<mml:math id="m125">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, it follows that <inline-formula id="inf122">
<mml:math id="m126">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> if <inline-formula id="inf123">
<mml:math id="m127">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> holds. Otherwise, <inline-formula id="inf124">
<mml:math id="m128">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is determined by solving the equation <italic>f</italic>
<sub>2</sub>(<italic>&#x3b1;</italic>) &#x3d; 0, where <italic>f</italic>
<sub>2</sub>(<italic>&#x3b1;</italic>) &#x3d; 0.5<italic>&#x3c9;</italic>(<italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b1;</italic>) &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>) &#x2b; <italic>&#x3b1;</italic> &#x2212; <italic>&#x3b8;</italic>. By following similar steps as in Case 1, it can be shown that a unique solution to <italic>f</italic>
<sub>2</sub>(<italic>&#x3b1;</italic>) &#x3d; 0 always exists if <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3c; <italic>&#x3c1;</italic>&#x2009;sin(<italic>&#x3b8;</italic>) and thus, has been omitted for brevity.</p>
<p>As <inline-formula id="inf125">
<mml:math id="m129">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> or equivalently <inline-formula id="inf126">
<mml:math id="m130">
<mml:mi>v</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> holds for <inline-formula id="inf127">
<mml:math id="m131">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3c;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, it follows that the vehicle cannot capture the burst intruders from <inline-formula id="inf128">
<mml:math id="m132">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> or <inline-formula id="inf129">
<mml:math id="m133">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. Further, as <inline-formula id="inf130">
<mml:math id="m134">
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> or <inline-formula id="inf131">
<mml:math id="m135">
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> holds at time instant <italic>t</italic>, it follows that the turret can also not capture the burst intruders from both <inline-formula id="inf132">
<mml:math id="m136">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> and <inline-formula id="inf133">
<mml:math id="m137">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. Therefore, the turret and the vehicle jointly captures at most one intruder from input instance <inline-formula id="inf134">
<mml:math id="m138">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> as well as <inline-formula id="inf135">
<mml:math id="m139">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. A similar conclusion holds when <inline-formula id="inf136">
<mml:math id="m140">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> or when <inline-formula id="inf137">
<mml:math id="m141">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>.</p>
<p>Thus, we have established that for any online algorithm <inline-formula id="inf138">
<mml:math id="m142">
<mml:mi mathvariant="script">A</mml:mi>
</mml:math>
</inline-formula>, the vehicle and the turret can jointly capture at most a single intruder from input instance <inline-formula id="inf139">
<mml:math id="m143">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>2</mml:mn>
</mml:math>
</inline-formula>. We now show that the optimal offline algorithm <inline-formula id="inf140">
<mml:math id="m144">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> captures all of the intruders on the input sequence <inline-formula id="inf141">
<mml:math id="m145">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>2</mml:mn>
</mml:math>
</inline-formula>.</p>
<p>Recall that <inline-formula id="inf142">
<mml:math id="m146">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> has complete information at time 0, of when, where, and how many intruders will arrive. Thus, at time 0, <inline-formula id="inf143">
<mml:math id="m147">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> moves its vehicle to location (<italic>&#x3c1;</italic>, <italic>&#x3b8;</italic>) and the turret to angle &#x2212;<italic>&#x3b8;</italic>. The defenders of <inline-formula id="inf144">
<mml:math id="m148">
<mml:mi mathvariant="script">O</mml:mi>
</mml:math>
</inline-formula> have sufficient time to reach these locations as the first intruder arrives at time instant <inline-formula id="inf145">
<mml:math id="m149">
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and thus, the capture of all <italic>i</italic> stream intruders as well as the burst intruders is guaranteed. Thus, <inline-formula id="inf146">
<mml:math id="m150">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>c</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
</inline-formula> and <inline-formula id="inf147">
<mml:math id="m151">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
</inline-formula> which yields that <inline-formula id="inf148">
<mml:math id="m152">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="script">P</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>c</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
</inline-formula>. As <italic>i</italic> &#x2b; <italic>c</italic> &#x2b; 1 &#x3e; <italic>c</italic> for any constant <italic>c</italic>, it follows that <inline-formula id="inf149">
<mml:math id="m153">
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">O</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>c</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="script">A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi mathvariant="script">I</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> does not hold for any <italic>c</italic>. This concludes the proof.</p>
</statement>
</p>
<p>
<statement>
<p>Remark 3.2: <italic>Since we do not impose any restriction on the number of intruders that can arrive in the environment, an adversary can repeat the input sequence designed in the proof of Theorem</italic> 3.1 <italic>any number of times. Thus, the lower bound derived in Theorem</italic> 3.1 <italic>holds asymptotically for when</italic> <inline-formula id="inf150">
<mml:math id="m154">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mo>&#x304;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula> <italic>in the definition of</italic> <italic>c</italic>
<italic>-competitive algorithms as well.</italic>
</p>
</statement>
</p>
<p>We now turn our attention to designing online algorithms and deriving upper bounds on their competitive ratios. In the next section, we design and analyze four online algorithms, each with a provably finite competitive ratio in a specified parameter regime.</p>
</sec>
<sec id="s4">
<title>4 Online algorithms</title>
<p>In this section, we design and analyze online algorithms and characterize the parameter space in which these algorithms have finite competitive ratios. The parameter space of all of our algorithms is characterized by two main quantities:<list list-type="simple">
<list-item>
<p>&#x2022; The time taken by the intruders to reach the perimeter in the worst-case and</p>
</list-item>
<list-item>
<p>&#x2022; the time taken by the defenders to complete their respective motions.</p>
</list-item>
</list>
</p>
<p>Intuitively, the parameter space is obtained by comparing the aforementioned quantities<xref ref-type="fn" rid="fn3">
<sup>2</sup>
</xref>. Since the time taken by the intruders is inversely proportional to <italic>v</italic>, the (<italic>v</italic>, <italic>&#x3c1;</italic>) parameter space of our algorithms can be increased by designing the algorithms such that the time taken by the defenders to complete their motions is the least. We characterize the time taken by the defenders to complete their respective motions as <italic>epochs</italic>, which is formally defined as follows.</p>
<p>An epoch <italic>k</italic> for an algorithm is defined as the time interval which begins when at least one of the two defenders moves from its initial position and ends when both defenders return back to their respective initial positions. We denote the time instant when an epoch <italic>k</italic> begins as <italic>k</italic>
<sub>
<italic>s</italic>
</sub>.</p>
<p>We now describe our first algorithm that has the best possible competitive ratio.</p>
<p>
<statement content-type="algorithm" id="Algorithm_1">
<label>Algorithm 1</label>
<p>Sweep within Dominance Region Algorithm<list list-type="simple">
<list-item>
<p>1 Turret is at angle &#x2212;<italic>&#x3b8;</italic>
</p>
</list-item>
<list-item>
<p>2 <bold>if</bold> <italic>&#x3b1;</italic> &#x3d; arctan(<inline-formula id="inf403">
<mml:math id="m403">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:math>
</inline-formula>) then</p>
</list-item>
<list-item>
<p>3 &#x2003;&#x2003;&#x2003;Vehicle is located at (<italic>&#x3c1;</italic>/cos(<italic>&#x3b1;</italic>) , <italic>&#x3b8;</italic> &#x2212; <italic>&#x3b1;</italic>)</p>
</list-item>
<list-item>
<p>4 &#x2003;&#x2003;&#x2003;<bold>for</bold> <italic>each epoch k</italic> <bold>do</bold>
</p>
</list-item>
<list-item>
<p>5 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Turn the turret clockwise to angle <italic>&#x3b8;</italic> &#x2212; 2<italic>&#x3b1;</italic>
</p>
</list-item>
<list-item>
<p>6 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Turn the turret anti-clockwise to angle &#x2212;<italic>&#x3b8;</italic>
</p>
</list-item>
<list-item>
<p>7 &#x2003;&#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>8 &#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>9 &#x2003;&#x2003;&#x2003;Vehicle is located at (<inline-formula id="inf404">
<mml:math id="m404">
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>, <italic>&#x3b8;</italic>)</p>
</list-item>
<list-item>
<p>10 &#x2003;&#x2003;&#x2003;<bold>for</bold> <italic>each epoch k</italic> <bold>do</bold>
</p>
</list-item>
<list-item>
<p>11 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Turn vehicle (resp. turret) anti-clockwise (resp. clockwise) until it reaches location (resp. angle) (<inline-formula id="inf405">
<mml:math id="m405">
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>, <italic>&#x3b8;</italic> &#x2212; 2<italic>&#x3b1;</italic>) (resp. <italic>&#x3b8;</italic> &#x2212; 2<italic>&#x3b1;</italic>)</p>
</list-item>
<list-item>
<p>12 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Turn vehicle (resp. turret) clockwise (resp. anti-clockwise) until it reaches location (resp. angle) (<inline-formula id="inf406">
<mml:math id="m406">
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>, <italic>&#x3b8;</italic>) (resp. &#x2212;<italic>&#x3b8;</italic>)</p>
</list-item>
<list-item>
<p>13 &#x2003;&#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>14 &#x2003;<bold>end</bold>
</p>
</list-item>
</list>
</p>
</statement>
</p>
<sec id="s4-1">
<title>4.1 Sweep within dominance region (SiR)</title>
<p>Algorithm SiR is an open-loop and memoryless algorithm in which we constrain the vehicle to move in an angular motion, i.e., either clockwise or anti-clockwise. This can be achieved by moving the vehicle with unit speed in the direction perpendicular to its position vector (see <xref ref-type="fig" rid="F3">Figure 3A</xref>). By doing so, we aim to understand the worst-case scenarios for heterogeneous defenders and gain insights into the effect of the heterogeneity that arises due to the capture range of the defenders, i.e., the capture circle and the engagement range of the turret. We say that a defender <italic>sweeps</italic> in its dominance region if it turns, from its starting location, either clockwise or anti-clockwise to a specified location and then turns back to its initial location. Algorithm SiR is formally defined in <xref ref-type="other" rid="Algorithm_1">Algorithm 1</xref> and is summarized as follows.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Partition (shown by the orange line) of the environment and the configuration of the defenders for the two cases of Algorithm SiR. <bold>(A)</bold> Configuration of the defenders for Algorithm SiR for Case 1 (<inline-formula id="inf400">
<mml:math id="m400">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>). The blue dot curve depicts the path taken by the vehicle for angular motion. <bold>(B)</bold> Configuration of the defenders for Algorithm SiR for Case 2 (<inline-formula id="inf401">
<mml:math id="m401">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>).</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g003.tif"/>
</fig>
<p>Algorithm SiR first partitions the environment <inline-formula id="inf151">
<mml:math id="m155">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> into two dominance regions and assigns a single defender to a dominance region. Let 2<italic>&#x3b1;</italic> denote the angle of <italic>W</italic>
<sub>Veh</sub>. Then, the vehicle takes exactly 4<italic>&#x3b1;z</italic>
<sub>
<italic>v</italic>
</sub> to sweep within its dominance region, where <italic>z</italic>
<sub>
<italic>v</italic>
</sub> denotes the radial location of the vehicle and will be determined shortly (see Case 1 below). Similarly, as the turret can only turn either clockwise or anti-clockwise with at most angular speed <italic>&#x3c9;</italic>, the turret takes exactly <inline-formula id="inf152">
<mml:math id="m156">
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> to sweep in its respective dominance region <italic>W</italic>
<sub>Tur</sub>. Observe that the environment must be partitioned such that the time taken by the defenders to complete their motion in their respective dominance region is equal. Otherwise, in the worst-case, all of the intruders will be concentrated in the dominance region of that defender that takes more time to sweep its dominance region. Mathematically, this means <inline-formula id="inf153">
<mml:math id="m157">
<mml:mn>4</mml:mn>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> must hold which yields that <inline-formula id="inf154">
<mml:math id="m158">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. Observe that as <italic>&#x3c9;</italic> &#x2192; <italic>&#x221e;</italic>, <italic>&#x3b1;</italic> &#x2192; 0. This means that the turret sweeps the entire environment, in time <inline-formula id="inf155">
<mml:math id="m159">
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, if <italic>&#x3c9;</italic> is sufficiently high. Recall that the (<italic>v</italic>, <italic>&#x3c1;</italic>) parameter space is characterized by the time taken by the defenders to complete their motion and can be improved by reducing the time taken by the turret, for high values of <italic>&#x3c9;</italic>. In case of very high <italic>&#x3c9;</italic>, this can be achieved by having the vehicle remain static at a specific location while the turret sweeps the remaining environment as opposed to the entire environment. This means that although angle <inline-formula id="inf156">
<mml:math id="m160">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> characterizes the vehicle&#x2019;s dominance region, there exists an angle <inline-formula id="inf157">
<mml:math id="m161">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:math>
</inline-formula> for some values of problem parameters for which we can obtain an improved parameter regime by assigning a dominance region of angle <inline-formula id="inf158">
<mml:math id="m162">
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> to the vehicle. Thus, in Algorithm SiR, there are two cases based on the values of the problem parameters. First, as described above, the defenders sweep the environment in their respective dominance regions and second, the vehicle remains static at a specific location while the turret sweeps its dominance region. In what follows, we determine the location at which the vehicle must remain static for the second case, followed by formally describing the two cases.</p>
<p>The vehicle&#x2019;s location must be such that its capture circle covers the perimeter contained in its dominance region entirely, ensuring that any intruder that arrives in that dominance region is guaranteed to be captured. To achieve this, the boundary of the dominance region assigned to the vehicle must be tangent to its capture circle (see <xref ref-type="fig" rid="F3">Figure 3B</xref>) which, through geometry, yields that <inline-formula id="inf159">
<mml:math id="m163">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> and the location for the vehicle as <inline-formula id="inf160">
<mml:math id="m164">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Therefore, the angle of the vehicle&#x2019;s dominance region is defined as <inline-formula id="inf161">
<mml:math id="m165">
<mml:mn>2</mml:mn>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf162">
<mml:math id="m166">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, and angle <italic>&#x3b1;</italic> determines if the vehicle sweeps in its dominance region or remains stationary. We first describe the motion of the turret followed by formally describing the motion of the vehicle in the two cases.</p>
<p>At time instant 0, the turret is at an angle &#x2212;<italic>&#x3b8;</italic>. The turret turns clockwise, with angular speed <italic>&#x3c9;</italic> towards angle <italic>&#x3b8;</italic> &#x2212; 2<italic>&#x3b1;</italic>. Upon reaching angle <italic>&#x3b8;</italic> &#x2212; 2<italic>&#x3b1;</italic>, the turret turns anti-clockwise towards angle &#x2212;<italic>&#x3b8;</italic>. Note that the turret takes exactly <inline-formula id="inf163">
<mml:math id="m167">
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> time to complete its motion in a particular epoch. We now describe the motion of the vehicle which can be summarized in two cases described as follows:</p>
<p>
<bold>Case 1</bold> <inline-formula id="inf164">
<mml:math id="m168">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<bold>:</bold> At time instant 0, the vehicle is located at (<italic>z</italic>
<sub>
<italic>v</italic>
</sub>, <italic>&#x3b8;</italic>), where <italic>z</italic>
<sub>
<italic>v</italic>
</sub> &#x3d; min{<italic>&#x3c1;</italic> &#x2b; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, 1 &#x2212; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>} and was determined in (7) and was proved to be optimal in (4). The vehicle then moves anti-clockwise with unit speed in the direction perpendicular to its position vector until it reaches the location (<italic>z</italic>
<sub>
<italic>v</italic>
</sub>, <italic>&#x3b8;</italic> &#x2212; 2<italic>&#x3b1;</italic>). Then, the vehicle moves clockwise, with direction perpendicular to its position vector, until it reaches location (<italic>z</italic>
<sub>
<italic>v</italic>
</sub>, <italic>&#x3b8;</italic>). Note that the vehicle takes exactly 4<italic>&#x3b1;z</italic>
<sub>
<italic>v</italic>
</sub> time to complete its motion in a particular epoch. Since <italic>&#x3b1;</italic> is chosen so that <inline-formula id="inf165">
<mml:math id="m169">
<mml:mn>4</mml:mn>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, the vehicle and the turret return to their respective initial locations at the same time instant, at which the next epoch begins.</p>
<p>
<bold>Case 2</bold> <inline-formula id="inf166">
<mml:math id="m170">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<bold>:</bold> At time instant 0, the vehicle is located at <inline-formula id="inf167">
<mml:math id="m171">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and remains stationary at this location for the entire duration. In this case, the next epoch begins once the turret turns back to angle &#x2212;<italic>&#x3b8;</italic>.</p>
<p>The following result characterizes the parameter regime in which Algorithm SiR is 1-competitive.</p>
<p>
<statement>
<p>Theorem 4.1: <italic>Algorithm SiR is 1-competitive for a set of problem parameters that satisfy</italic>
<disp-formula id="equ3">
<mml:math id="m172">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mtext mathvariant="italic">i</mml:mtext>
<mml:mtext mathvariant="italic">f</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3e;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
</disp-formula>
<italic>Otherwise, Algorithm SiR is not</italic> <italic>c</italic>
<italic>-competitive for any constant</italic> <italic>c</italic>
<italic>.</italic>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_2">
<label>Proof</label>
<p>Suppose that <inline-formula id="inf168">
<mml:math id="m173">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. At the start of any epoch <italic>k</italic>, i.e., at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, we assume that, in the worst-case, intruders <italic>i</italic>
<sub>1</sub> and <italic>i</italic>
<sub>2</sub> are located at (<italic>z</italic>
<sub>
<italic>v</italic>
</sub> &#x2b; <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x2b; &#x3f5;<sub>1</sub>, <italic>&#x3b8;</italic>) and (<italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2b; &#x3f5;<sub>2</sub>, &#x2212; <italic>&#x3b8;</italic>), respectively, where &#x3f5;<sub>1</sub> and &#x3f5;<sub>2</sub> are arbitrary small positive numbers (see <xref ref-type="fig" rid="F3">Figure 3A</xref>). To ensure that the vehicle (resp. turret) does not lose any intruder, we require that the time taken by the vehicle (resp. turret) to return to location (resp. angle) (<italic>z</italic>
<sub>
<italic>v</italic>
</sub>, <italic>&#x3b8;</italic>) (resp. &#x2212;<italic>&#x3b8;</italic>) must be less than the time taken by intruder <italic>i</italic>
<sub>1</sub> (resp. <italic>i</italic>
<sub>2</sub>) to reach the perimeter. Formally, <inline-formula id="inf169">
<mml:math id="m174">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3f5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> and <inline-formula id="inf170">
<mml:math id="m175">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3f5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> must hold. Given the first condition on <italic>v</italic>, these two conditions always hold, so any intruder that arrives in the environment is guaranteed to be captured.</p>
<p>If <inline-formula id="inf171">
<mml:math id="m176">
<mml:mi>v</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, then there exists an input instance with intruders arriving only at (1, &#x2212; <italic>&#x3b8;</italic>) such that these intruders are located at (<italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2b; <italic>&#x3f5;</italic>, &#x2212; <italic>&#x3b8;</italic>) at the time instant the turret turns from angle &#x2212;<italic>&#x3b8;</italic>. As <inline-formula id="inf172">
<mml:math id="m177">
<mml:mi>v</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> all of these intruders will be lost and thus, from Definition 1, Algorithm SiR will not be <italic>c</italic>-competitive.</p>
<p>Now consider that <inline-formula id="inf173">
<mml:math id="m178">
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. As the vehicle remains stationary in its dominance region and the location of the vehicle is such that no intruder that is released in that dominance region can reach the perimeter, we only focus on the turret. Assume that, in the worst-case, intruder <italic>i</italic>
<sub>1</sub> is located at (<italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2b; <italic>&#x3f5;</italic>, &#x2212; <italic>&#x3b8;</italic>) where <italic>&#x3f5;</italic> is an arbitrary small positive numbers. To ensure that the turret does not lose any intruder, we require that the time taken by the turret to return to angle &#x2212;<italic>&#x3b8;</italic> must be less than the time taken by intruder <italic>i</italic>
<sub>1</sub> to reach the perimeter. Given the second condition on <italic>v</italic>, i.e., <inline-formula id="inf174">
<mml:math id="m179">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> holds, it is ensured that intruder <italic>i</italic>
<sub>1</sub> will be captured. The proof for Algorithm SiR not being <italic>c</italic>-competitive when <inline-formula id="inf175">
<mml:math id="m180">
<mml:mi>v</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>arctan</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> is analogous to the previous case and has been omitted for brevity. This concludes the proof.</p>
</statement>
</p>
<p>Although Algorithm SiR is 1-competitive, note that for <italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x3d; <italic>&#x3c1;</italic>, the algorithm is not effective as Theorem 4.1 yields <italic>v</italic> &#x2264; 0. However, by allowing the vehicle to sweep the entire environment, it is still possible to capture all intruders for some small <italic>v</italic> &#x3e; 0. This is addressed in a similar algorithm below.</p>
</sec>
<sec id="s4-2">
<title>4.2 Sweep in conjunction (SiCon)</title>
<p>At time instant 0, the turret is at angle <italic>&#x3b8;</italic> and the vehicle is located at location (min{<italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2b; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, 1}, <italic>&#x3b8;</italic>). The idea is to move the two defenders together in angular motion. Thus, the vehicle moves anti-clockwise with unit speed in the direction perpendicular to its position vector until it reaches the location (min{<italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2b; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, 1}, &#x2212; <italic>&#x3b8;</italic>). Similarly, the turret turns anti-clockwise, in conjunction with the vehicle, to angle &#x2212;<italic>&#x3b8;</italic>. Upon reaching &#x2212;<italic>&#x3b8;</italic>, the vehicle and the turret move clockwise until they reach angle <italic>&#x3b8;</italic>. The defenders then begin the next epoch. As the two defenders move in conjunction, <inline-formula id="inf176">
<mml:math id="m181">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>&#x21d2;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> must hold. Thus, this algorithm is effective for <inline-formula id="inf177">
<mml:math id="m182">
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> by turning the turret exactly with angular speed <inline-formula id="inf178">
<mml:math id="m183">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>.</p>
<p>The following result establishes that Algorithm SiCon is 1-competitive for specific parameter regimes.</p>
<p>
<statement>
<p>Theorem 4.2: <italic>Algorithm SiCon is 1-competitive for a set of problem parameters which satisfy</italic> <inline-formula id="inf179">
<mml:math id="m184">
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> <italic>and</italic> <inline-formula id="inf180">
<mml:math id="m185">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>
<italic>. Otherwise, it is not</italic> <italic>c</italic>
<italic>-competitive for any constant</italic> <italic>c</italic>
<italic>.</italic>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_3">
<label>Proof</label>
<p>As the proof is analogous to the proof of Theorem 4.1, we only provide an outline of this proof for brevity. In the worst-case, an intruder requires exactly <inline-formula id="inf181">
<mml:math id="m186">
<mml:mfrac>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> time to reach the perimeter whereas, the defenders synchronously require 4<italic>&#x3b8;</italic>&#x2009;min{<italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2b; <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, 1} time to complete their motion in any epoch. Thus, as the time taken by the defenders must be at most the time taken by the intruders we obtain the competitive ratio. If the condition on <italic>v</italic> does not hold, then by constructing an input analogous to the input in the proof of Theorem 4.1, it can be shown that Algorithm SiCon is not <italic>c</italic>-competitive.</p>
</statement>
</p>
<p>
<statement>
<p>Remark 4.3: (Maneuvering Intruders). <italic>As the analysis of the fundamental limit (Theorem</italic> 3.1)<italic>, Algorithm SiR, and Algorithm SiCon are independent of the nature of motion of the intruders, the results of Theorem</italic> 3.1<italic>, Algorithm SiR, and Algorithm SiCon apply directly to the case of maneuvering or evading intruders.</italic>
</p>
</statement>
</p>
<p>Recall that in Algorithm SiR, the idea was to partition the environment and assign a single defender in each dominance region. By doing so, we obtain valuable insight into the parameter regime wherein we are guaranteed to capture all intruders. However, we refrain from designing such algorithms in this work due to the following two reasons. First, such an algorithm requires that ratio of intruders captured by a defender to the total number of intruders that arrived in that corresponding defender&#x2019;s dominance region is equal for both defenders. Otherwise, since the adversary has the information of the entire algorithm, it will release more intruders in the dominance region of the defender that has the lower ratio, which determines the competitive ratio of such an algorithm. Second, such algorithms are not cooperative and thus fall out of the scope of this paper. The objective of this work is to study how heterogeneous defenders can be used to improve the competitive ratio of a single defender. Thus, in the next algorithm, although we partition the environment, the defenders are not restricted to remain within their own dominance region.</p>
<p>
<statement content-type="algorithm" id="Algorithm_2">
<label>Algorithm 2</label>
<p>Split and Capture Algorithm<list list-type="simple">
<list-item>
<p>1 Turret is at angle 0</p>
</list-item>
<list-item>
<p>2 Vehicle is located at (<italic>x</italic>
<sub>
<italic>1</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>1</italic>
</sub>)</p>
</list-item>
<list-item>
<p>3 <bold>for</bold> <italic>each epoch k</italic> <bold>do</bold>
</p>
</list-item>
<list-item>
<p>4 &#x2003;&#x2003;Compute <inline-formula id="inf419">
<mml:math id="m419">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, <inline-formula id="inf420">
<mml:math id="m420">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, <inline-formula id="inf421">
<mml:math id="m421">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>
</p>
</list-item>
<list-item>
<p>5 &#x2003;&#x2003;<bold>if</bold> <inline-formula id="inf422">
<mml:math id="m422">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c; &#x2265; &#x7c;<inline-formula id="inf423">
<mml:math id="m423">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c; <bold>then</bold>
</p>
</list-item>
<list-item>
<p>6 &#x2003;&#x2003;&#x2003;&#x2003;Turn the turret clockwise to angle <italic>&#x3b8;</italic>
</p>
</list-item>
<list-item>
<p>7 &#x2003;&#x2003;&#x2003;&#x2003;Turn the turret back to angle 0</p>
</list-item>
<list-item>
<p>8 &#x2003;&#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>9 &#x2003;&#x2003;&#x2003;&#x2003;Turn the turret anti-clockwise to angle &#x2212;<italic>&#x3b8;</italic>
</p>
</list-item>
<list-item>
<p>10 &#x2003;&#x2003;&#x2003;&#x2003;Turn the turret back to angle 0</p>
</list-item>
<list-item>
<p>11 &#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>12 &#x2003;&#x2003;<bold>if</bold> <inline-formula id="inf424">
<mml:math id="m424">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> &#x2260; <italic>N</italic>
<sub>
<italic>i</italic>
</sub> <bold>then</bold>
</p>
</list-item>
<list-item>
<p>13 &#x2003;&#x2003;&#x2003;&#x2003;<bold>if</bold> &#x7c;<inline-formula id="inf425">
<mml:math id="m425">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="normal">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c; &#x2265; &#x7c;<inline-formula id="inf426">
<mml:math id="m426">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> <bold>then</bold>
</p>
</list-item>
<list-item>
<p>14 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Move vehicle to <inline-formula id="inf427">
<mml:math id="m427">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and then capture intruders in <inline-formula id="inf428">
<mml:math id="m428">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="normal">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
</p>
</list-item>
<list-item>
<p>15 &#x2003;&#x2003;&#x2003;&#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>16 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Keep vehicle at (<italic>x</italic>
<sub>
<italic>i</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>i</italic>
</sub>) and capture intruders in <italic>S</italic>
<sup>
<italic>j&#x2b;1</italic>
</sup>
<sub>
<italic>i</italic>
</sub>
</p>
</list-item>
<list-item>
<p>17 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Move vehicle to <inline-formula id="inf429">
<mml:math id="m429">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
</p>
</list-item>
<list-item>
<p>18 &#x2003;&#x2003;&#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>19 &#x2003;&#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>20 &#x2003;&#x2003;&#x2003;&#x2003;Keep vehicle at (<italic>x</italic>
<sub>
<italic>i</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>i</italic>
</sub>) and capture intruders in <inline-formula id="inf430">
<mml:math id="m430">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf431">
<mml:math id="m431">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
</p>
</list-item>
<list-item>
<p>21 &#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>22 <bold>end</bold>
</p>
</list-item>
</list>
</p>
</statement>
</p>
</sec>
<sec id="s4-3">
<title>4.3 Split and capture (Split)</title>
<p>The motivation for this algorithm is to utilize the vehicle&#x2019;s ability to move in any direction while the turret rotates either clockwise or anti-clockwise. Since the turret can only turn either clockwise or anti-clockwise, the idea is to first partition the environment into two-halves and turn the turret towards the side which has higher number of intruders. By doing so, we hope to capture at least half of the intruders by the turret, assuming they are sufficiently slow, that arrive in every epoch. Further, while the turret moves to capture intruders on one side, the vehicle moves to the other side to capture intruders, ensuring that the defenders jointly capture more than half of the intruders that arrive in the environment in every epoch. Algorithm Split is formally defined in <xref ref-type="other" rid="Algorithm_2">Algorithm 2</xref> and is summarized as follows where we first describe the motion of the turret in every epoch followed by that of the vehicle.</p>
<p>The heading angle of the turret is always <inline-formula id="inf182">
<mml:math id="m187">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula> at the start of every epoch <italic>k</italic>. To determine whether the turret turns clockwise or anti-clockwise at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, we first describe two sets <italic>P</italic>
<sub>left</sub> and <italic>P</italic>
<sub>right</sub>. These sets characterize a region on the left and right side of the <italic>y</italic>-axis, respectively, and are determined once at time instant 0.<disp-formula id="equ4">
<mml:math id="m188">
<mml:mtable class="align-star" columnalign="left">
<mml:mtr>
<mml:mtd columnalign="right">
<mml:msub>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mo>&#x2254;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>:</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="right">
<mml:msub>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mo>&#x2254;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>:</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="(" close="]">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
</disp-formula>
</p>
<p>Let <inline-formula id="inf183">
<mml:math id="m189">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf184">
<mml:math id="m190">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> denote the set of intruders contained in <italic>P</italic>
<sub>right</sub> and <italic>P</italic>
<sub>left</sub> (see <xref ref-type="fig" rid="F4">Figure 4A</xref>), respectively, at the start of an epoch <italic>k</italic> and let &#x7c;<italic>S</italic>&#x7c; denote the cardinality of a set <italic>S</italic> of intruders. Then, at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, the turret compares the total number of intruders in <inline-formula id="inf185">
<mml:math id="m191">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> to the total number of intruders in <inline-formula id="inf186">
<mml:math id="m192">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and turns in the direction of the set which has higher number of intruders. More formally, if <inline-formula id="inf187">
<mml:math id="m193">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x3c;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> holds at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, then the turret turns anti-clockwise towards angle &#x2212;<italic>&#x3b8;</italic>. Upon turning to angle &#x2212;<italic>&#x3b8;</italic>, the turret turns to angle 0. Otherwise, i.e., if <inline-formula id="inf188">
<mml:math id="m194">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> holds at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, then the turret turns clockwise towards angle <italic>&#x3b8;</italic>. Upon turning to angle <italic>&#x3b8;</italic>, the turret turns to angle 0. As the turret&#x2019;s dominance region is determined at the start of every epoch <italic>k</italic>, we denote the turret&#x2019;s dominance region as <inline-formula id="inf189">
<mml:math id="m195">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">T</mml:mi>
<mml:mi mathvariant="normal">u</mml:mi>
<mml:mi mathvariant="normal">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, and consequently, the other dominance region as the <italic>vehicle&#x2019;s dominance region</italic> denoted as <inline-formula id="inf190">
<mml:math id="m196">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">V</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. We now characterize the motion for the vehicle which builds upon the SNP algorithm designed in (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022</xref>).</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Description of Algorithm Split. The light grey dashed line denotes the splitting of the environment. The region between the yellow dashed curve and the yellow dot curve on the left (resp. right) side of the grey line denotes <inline-formula id="inf407">
<mml:math id="m407">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf408">
<mml:math id="m408">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>). The blue dashed straight lines denote the sectors (<inline-formula id="inf409">
<mml:math id="m409">
<mml:mi>N</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>3</mml:mn>
</mml:math>
</inline-formula>) of the environment and the black dashed curves denotes the three radial intervals of length <inline-formula id="inf410">
<mml:math id="m410">
<mml:mi>D</mml:mi>
<mml:mi>v</mml:mi>
</mml:math>
</inline-formula> each. The vehicle is located at <inline-formula id="inf411">
<mml:math id="m411">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. <bold>(A)</bold> Description of sets <inline-formula id="inf412">
<mml:math id="m412">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf413">
<mml:math id="m413">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. The grey dashed line denotes the splitting of the environment into two halves. The turret&#x27;s heading angle is <inline-formula id="inf414">
<mml:math id="m414">
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula> at time instant <inline-formula id="inf415">
<mml:math id="m415">
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. <bold>(B)</bold> Splitting the environment into <inline-formula id="inf416">
<mml:math id="m416">
<mml:mi>N</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>3</mml:mn>
</mml:math>
</inline-formula> sectors. The blue dashed circles denote the resting points for the vehicle. <bold>(C)</bold> Final representation of the environment for Algorithm Split. The black dashed curves denotes splitting of the environment radially corresponding to the three time intervals, each of length <inline-formula id="inf417">
<mml:math id="m417">
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula>. The vehicle is located at <inline-formula id="inf418">
<mml:math id="m418">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g004.tif"/>
</fig>
<p>Algorithm Split further divides the environment <inline-formula id="inf191">
<mml:math id="m197">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> into <inline-formula id="inf192">
<mml:math id="m198">
<mml:mi>N</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> sectors, where 2<italic>&#x3b8;</italic>
<sub>
<italic>s</italic>
</sub> &#x3d; 2&#x2009;arctan(<italic>r</italic>
<sub>
<italic>c</italic>
</sub>/<italic>&#x3c1;</italic>) denotes the angle of each sector (see <xref ref-type="fig" rid="F4">Figure 4B</xref>). The value 2&#x2009;arctan(<italic>r</italic>
<sub>
<italic>c</italic>
</sub>/<italic>&#x3c1;</italic>) of the angle of each of the sectors is to ensure that the portion of the perimeter in a sector can be completely contained in the capture circle of the vehicle. This can be achieved by positioning the vehicle at <italic>resting points</italic> (see <xref ref-type="fig" rid="F4">Figure 4B</xref>), which is a specific location in every sector and is formally defined as follows.</p>
<p>
<statement>
<p>Definition 2 (Resting points). <italic>Let</italic> <italic>N</italic>
<sub>
<italic>l</italic>
</sub> <italic>denote the</italic> <italic>l</italic>
<italic>th sector, for every</italic> <italic>l</italic> &#x2208; {1, <italic>&#x2026;</italic>, <italic>N</italic>} <italic>where</italic> <italic>N</italic>
<sub>1</sub> <italic>corresponds to the leftmost sector. Then, a resting point</italic> <inline-formula id="inf195">
<mml:math id="m201">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> <italic>for sector</italic> <italic>N</italic>
<sub>
<italic>l</italic>
</sub>
<italic>, is the location for the vehicle such that when positioned at</italic> (<italic>x</italic>
<sub>
<italic>l</italic>
</sub>, &#x3d5;<sub>
<italic>l</italic>
</sub>)<italic>, the portion of the perimeter inside sector</italic> <italic>N</italic>
<sub>
<italic>l</italic>
</sub> <italic>is contained completely within the capture circle of the vehicle. Mathematically, this is equivalent to</italic>
<disp-formula id="equ5">
<mml:math id="m202">
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>.</mml:mo>
</mml:math>
</disp-formula>
</p>
</statement>
</p>
<p>Now, let <italic>D</italic> denote the distance between the two resting points that are furthest apart in the environment (see <xref ref-type="fig" rid="F4">Figure 4B</xref>). Formally,<disp-formula id="e3">
<mml:math id="m203">
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mn>2</mml:mn>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mi>sin</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;if&#x2009;</mml:mtext>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mn>2</mml:mn>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;otherwise.</mml:mtext>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(3)</label>
</disp-formula>Observe that when <italic>N</italic> &#x3d; 1, <italic>D</italic> &#x3d; 0. This means that the vehicle captures all intruders that arrive in the environment by positioning itself to the unique resting point of the single sector.</p>
<p>Next, Algorithm Split radially divides the environment <inline-formula id="inf196">
<mml:math id="m204">
<mml:mi mathvariant="script">E</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> into three intervals of length <italic>Dv</italic>, corresponding to time intervals of time length <italic>D</italic> each (see <xref ref-type="fig" rid="F4">Figure 4C</xref>). Specifically, the <italic>j</italic>th time interval for any <italic>j</italic> &#x3e; 0 is defined as the time interval [(<italic>j</italic> &#x2212; 1)<italic>D</italic>, <italic>jD</italic>]. Note that this time interval is different than the epoch of the algorithm. Let <inline-formula id="inf197">
<mml:math id="m205">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> denote the set of intruders that are contained in the <italic>l</italic>th, <italic>l</italic> &#x2208; {1, <italic>&#x2026;</italic>, <italic>N</italic>}, sector and were released in the <italic>j</italic>th interval. Then, at the start of each epoch, the motion of the vehicle is based on the following two steps: First, select a sector with the maximum number of intruders. Second, determine if it is beneficial to switch over to that sector. These two steps are achieved by two simple comparisons; <bold>C1</bold> and <bold>C2</bold> detailed below.</p>
<p>Suppose that the vehicle is located at the resting point of sector <italic>N</italic>
<sub>
<italic>i</italic>
</sub> at the start of the <italic>j</italic>th epoch and let <inline-formula id="inf198">
<mml:math id="m206">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo>&#x303;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> denote the set of sectors in the vehicle&#x2019;s dominance region. Then, to specify the first comparison <bold>C1</bold>, we associate each sector <inline-formula id="inf199">
<mml:math id="m207">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo>&#x303;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> with the quantity<disp-formula id="equ6">
<mml:math id="m208">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x225c;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mtext>if&#x2009;</mml:mtext>
<mml:mi>l</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mtext>if&#x2009;</mml:mtext>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
</disp-formula>
</p>
<p>Note that <inline-formula id="inf200">
<mml:math id="m209">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is not defined for every sector in the environment. Instead, it is only defined for the sectors in <inline-formula id="inf201">
<mml:math id="m210">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">V</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, which may contain <italic>N</italic>
<sub>
<italic>i</italic>
</sub>. Then, as the outcome of <bold>C1</bold>, Algorithm Split selects the sector <inline-formula id="inf202">
<mml:math id="m211">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>, where <inline-formula id="inf203">
<mml:math id="m212">
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mspace width="0.17em"/>
<mml:mi mathvariant="normal">m</mml:mi>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo>&#x303;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mrow>
</mml:msub>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. In case there are multiple sectors with same number of intruders, then Algorithm Split breaks the tie as follows. If the tie includes the current sector <italic>N</italic>
<sub>
<italic>i</italic>
</sub> (which is only possible if <inline-formula id="inf204">
<mml:math id="m213">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo>&#x303;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> holds<xref ref-type="fn" rid="fn4">
<sup>3</sup>
</xref>), then Algorithm Split selects <italic>N</italic>
<sub>
<italic>i</italic>
</sub>. Otherwise, Algorithm Split selects the sector contained in <inline-formula id="inf205">
<mml:math id="m214">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo>&#x303;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> with the maximum number of intruders in the interval <italic>j</italic> &#x2b; 2, i.e., <inline-formula id="inf206">
<mml:math id="m215">
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mspace width="0.17em"/>
<mml:mi mathvariant="normal">m</mml:mi>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mrow>
</mml:msub>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, where <inline-formula id="inf207">
<mml:math id="m216">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="bold">N</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">&#x302;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> denotes the set of sectors that have the same number of intruders. If this results in another tie, then this second tie is resolved by selecting the sector with the least index. Let the sector chosen as the outcome of <bold>C1</bold> be <italic>N</italic>
<sub>
<italic>o</italic>
</sub>.</p>
<p>We now describe comparison <bold>C2</bold> jointly with the motion of the vehicle in the following two points:</p>
<list list-type="simple">
<list-item>
<p>&#x2022; If the sector chosen as the outcome of <bold>C1</bold> is <italic>N</italic>
<sub>
<italic>o</italic>
</sub>, <italic>o</italic> &#x2260; <italic>i</italic>, and the total number of intruders in the set <inline-formula id="inf208">
<mml:math id="m217">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>o</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is no less than the total number of intruders in <inline-formula id="inf209">
<mml:math id="m218">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, then Algorithm Split moves the vehicle to (<italic>x</italic>
<sub>
<italic>o</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>o</italic>
</sub>) arriving in at most <italic>D</italic> time units. Then the vehicle waits at that location to capture all intruders in <inline-formula id="inf210">
<mml:math id="m219">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>o</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. Otherwise, i.e., the total number of intruders in <inline-formula id="inf211">
<mml:math id="m220">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>o</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is less than <inline-formula id="inf212">
<mml:math id="m221">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, then the vehicle stays at (<italic>x</italic>
<sub>
<italic>i</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>i</italic>
</sub>) until it captures all of the intruders in <inline-formula id="inf213">
<mml:math id="m222">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and then moves to (<italic>x</italic>
<sub>
<italic>o</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>o</italic>
</sub>) arriving in at most <italic>D</italic> time units.</p>
</list-item>
<list-item>
<p>&#x2022; If the sector chosen is <italic>N</italic>
<sub>
<italic>i</italic>
</sub>, then the vehicle stays at its current location (<italic>x</italic>
<sub>
<italic>i</italic>
</sub>, <italic>&#x3d5;</italic>
<sub>
<italic>i</italic>
</sub>) for 2<italic>D</italic> time units capturing intruders in <inline-formula id="inf214">
<mml:math id="m223">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf215">
<mml:math id="m224">
<mml:msubsup>
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>.</p>
</list-item>
</list>
<p>Note that the vehicle takes at most 2<italic>D</italic> time units in every case above. The vehicle then re-evaluates after 2<italic>D</italic> time. At time instant 0, the turret&#x2019;s heading angle is 0 and the vehicle is located at (<italic>x</italic>
<sub>1</sub>, <italic>&#x3d5;</italic>
<sub>1</sub>). The first epoch begins when the first intruder arrives in the environment.</p>
<p>We now describe two key requirements for the algorithm. The first requirement is to ensure that the defenders start their individual motion in an epoch at the same time instant. Recall that the turret requires exactly <inline-formula id="inf216">
<mml:math id="m225">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> time to turn from its initial heading angle to either <italic>&#x3b8;</italic> or &#x2212;<italic>&#x3b8;</italic>, at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, and turn back to its initial heading angle. On the other hand, the vehicle requires 2<italic>D</italic> time units to capture intruders in at least one interval. Thus, to ensure that the defenders begin their motion at the same time instant, <inline-formula id="inf217">
<mml:math id="m226">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula> must hold, i.e., the speed of the turret must be at least <inline-formula id="inf218">
<mml:math id="m227">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. The second requirement is to ensure that the algorithm has a finite competitive ratio. This is achieved by ensuring that any intruder that was not accounted for comparison by the defenders (for instance intruders that are not in <inline-formula id="inf219">
<mml:math id="m228">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> or <inline-formula id="inf220">
<mml:math id="m229">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>) in an epoch <italic>k</italic>, are accounted in epoch <italic>k</italic> &#x2b; 1. Our next result formally characterizes this requirement for the turret.</p>
<p>
<statement>
<p>Lemma 4.4. <italic>Any intruder with radial coordinate greater than</italic> <inline-formula id="inf221">
<mml:math id="m230">
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">[</mml:mo>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">]</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> <italic>(resp.</italic> <inline-formula id="inf222">
<mml:math id="m231">
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="" close="]">
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> <italic>at time instant</italic> <italic>k</italic>
<sub>
<italic>s</italic>
</sub> <italic>will be contained in the set</italic> <inline-formula id="inf223">
<mml:math id="m232">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> <italic>(resp.</italic> <inline-formula id="inf224">
<mml:math id="m233">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
<italic>) at time instant</italic> (<italic>k</italic> &#x2b; 1)<sub>
<italic>s</italic>
</sub> <italic>if</italic> <inline-formula id="inf225">
<mml:math id="m234">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> <italic>holds.</italic>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_4">
<label>Proof</label>
<p>Without loss of generality, suppose that <inline-formula id="inf226">
<mml:math id="m235">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2264;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> holds at time instant <italic>k</italic>
<sub>
<italic>s</italic>
</sub>. Then, the total time taken by the turret to move towards <italic>&#x3b8;</italic> and turn back to angle 0 is <inline-formula id="inf227">
<mml:math id="m236">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. In order for any intruder <italic>i</italic> to not be captured in epoch <italic>k</italic>, in the worst-case, the intruder <italic>i</italic> must be located at (min{1, <italic>r</italic>
<sub>
<italic>t</italic>
</sub>} &#x2b; <italic>&#x3f5;</italic>, <italic>&#x3b8;</italic>), where <italic>&#x3f5;</italic> is a very small positive number, by the time the turret reaches angle <italic>&#x3b8;</italic>. Note that 1 &#x2b; <italic>&#x3f5;</italic> here means that the intruder is released after <italic>&#x3f5;</italic> time at location (1, <italic>&#x3b8;</italic>) after the turret&#x2019;s heading angle is <italic>&#x3b8;</italic>. Thus, in order to ensure that <italic>i</italic> can be captured in epoch <italic>k</italic> &#x2b; 1, the condition <inline-formula id="inf228">
<mml:math id="m237">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> must hold, where we used the fact that <italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x2264; 1 and <italic>&#x3f5;</italic> is a very small positive number. From the definition of <inline-formula id="inf229">
<mml:math id="m238">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, if the intruder <italic>i</italic> can be captured in epoch <italic>k</italic> &#x2b; 1, then it follows that the intruder <italic>i</italic> was contained in the set <inline-formula id="inf230">
<mml:math id="m239">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> at the start of epoch (<italic>k</italic> &#x2b; 1). This concludes the proof.</p>
</statement>
</p>
<p>The proof of Lemma 4.4 is established in the worst-case scenario which is that an intruder, with angular coordinate <italic>&#x3b8;</italic> (resp. &#x2212;<italic>&#x3b8;</italic>), is located just above the range of the turret at the time instant when the turret&#x2019;s heading angle is <italic>&#x3b8;</italic> (resp. &#x2212;<italic>&#x3b8;</italic>) in an epoch <italic>k</italic>. This is because in an epoch <italic>k</italic>, the angle <italic>&#x3b8;</italic> is the only heading angle that is visited by the turret once as the turret turns to all angles <inline-formula id="inf231">
<mml:math id="m240">
<mml:mi>&#x3b2;</mml:mi>
<mml:mspace width="0.3333em" class="nbsp"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf232">
<mml:math id="m241">
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula>) twice; once when the turret turns to angle <italic>&#x3b8;</italic> or &#x2212;<italic>&#x3b8;</italic> and second, when turret turns back to angle 0. This results in the following corollary, the proof of which is analogous to the proof of Lemma 4.4.</p>
<p>
<statement>
<p>Corollary 4.5: <italic>Suppose that the turret moves to capture intruders in</italic> <inline-formula id="inf233">
<mml:math id="m242">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> <italic>(resp.</italic> <inline-formula id="inf234">
<mml:math id="m243">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
<italic>) in epoch</italic> <italic>k</italic>
<italic>. Then, the intruders contained in</italic> <inline-formula id="inf235">
<mml:math id="m244">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> <italic>(resp.</italic> <inline-formula id="inf236">
<mml:math id="m245">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
<italic>) with radial coordinate strictly greater than</italic> <inline-formula id="inf237">
<mml:math id="m246">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> <italic>at time instant</italic> <italic>k</italic>
<sub>
<italic>s</italic>
</sub> <italic>will be considered for comparison at the start of epoch</italic> (<italic>k</italic> &#x2b; 1) <italic>if</italic> <inline-formula id="inf238">
<mml:math id="m247">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>
<italic>.</italic>
</p>
</statement>
</p>
<p>Recall that the adversary selects the release times and the locations of the intruders in our setup. Thus, with the information of the online algorithm, the adversary can release intruders such that all the intruders have their radial coordinates at most <inline-formula id="inf239">
<mml:math id="m248">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> and at angular location <italic>&#x3b8;</italic> of &#x2212;<italic>&#x3b8;</italic> at the start of every epoch <italic>k</italic>, which is considered to be the worst-case scenario. This ensures that if the turret selects to turn towards &#x2212;<italic>&#x3b8;</italic> (resp. <italic>&#x3b8;</italic>) at time <italic>k</italic>
<sub>
<italic>s</italic>
</sub>, then the turret cannot capture any intruder that was contained in <inline-formula id="inf240">
<mml:math id="m249">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf241">
<mml:math id="m250">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>) in epoch <italic>k</italic> &#x2b; 1. As the idea is to have the vehicle capture these intruders, we require that the intruders must be sufficiently slow. This is explained in greater detail as follows.</p>
<p>For the vehicle, the requirement is that the intruders take at least 3<italic>D</italic> time units to reach the perimeter. This is to ensure that the vehicle can account for intruders that are very close to the perimeter at the start of an epoch. From Corollary 4.5, as the intruders with radial location greater than <inline-formula id="inf242">
<mml:math id="m251">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> are counted for comparison in next epoch by the turret, we require that these intruders must also be counted by the vehicle in the next epoch. This yields that <inline-formula id="inf243">
<mml:math id="m252">
<mml:mn>3</mml:mn>
<mml:mi>D</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> which implies that either <inline-formula id="inf244">
<mml:math id="m253">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> or <inline-formula id="inf245">
<mml:math id="m254">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> must hold, where we used the fact that <inline-formula id="inf246">
<mml:math id="m255">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula>. Finally, as Lemma 4.4 requires that <inline-formula id="inf247">
<mml:math id="m256">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> must hold, the second requirement for Algorithm Split is that <inline-formula id="inf248">
<mml:math id="m257">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. We now establish the competitive ratio of Algorithm Split.</p>
<p>
<statement>
<p>Theorem 4.6: <italic>Let</italic> <italic>&#x3b8;</italic>
<sub>
<italic>s</italic>
</sub> &#x3d; arctan(<italic>r</italic>
<sub>
<italic>c</italic>
</sub>/<italic>&#x3c1;</italic>) <italic>and</italic> <inline-formula id="inf249">
<mml:math id="m258">
<mml:mi>N</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<italic>. Then, for any problem instance</italic> <inline-formula id="inf250">
<mml:math id="m259">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> <italic>with the turret&#x2019;s angular velocity</italic> <inline-formula id="inf251">
<mml:math id="m260">
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>
<italic>, where</italic> <italic>D</italic> <italic>is defined in equation</italic> 3<italic>, Algorithm Split is</italic> <inline-formula id="inf252">
<mml:math id="m261">
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x230a;</mml:mo>
<mml:mrow>
<mml:mn>0.5</mml:mn>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mo>&#x230b;</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>
<italic>-competitive if</italic> <inline-formula id="inf253">
<mml:math id="m262">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<italic>.</italic>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_5">
<label>Proof</label>
<p>First observe that although the turret can capture intruders from one-half of the environment, the vehicle only captures at most two intervals out of all intervals that are in <inline-formula id="inf254">
<mml:math id="m263">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">V</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> (the total number of intervals in <inline-formula id="inf255">
<mml:math id="m264">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">V</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> will be determined shortly). Thus, in the worst-case, the intruders are released in the environment such that there are as many intruders possible in the vehicle&#x2019;s dominance region. Since <inline-formula id="inf256">
<mml:math id="m265">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">V</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is selected based on <inline-formula id="inf257">
<mml:math id="m266">
<mml:msubsup>
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">T</mml:mi>
<mml:mi mathvariant="normal">u</mml:mi>
<mml:mi mathvariant="normal">r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, there cannot be more number of intruders in the vehicle&#x2019;s dominance region as than those in the turret&#x2019;s dominance region. This implies that there are equal number of intruders in each dominance region in every epoch in the worst-case. We now characterize the total number of intervals in the vehicle&#x2019;s dominance region.</p>
<p>If <italic>N</italic> is even then, the vehicle&#x2019;s dominance region contains <inline-formula id="inf258">
<mml:math id="m267">
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> sectors and <inline-formula id="inf259">
<mml:math id="m268">
<mml:mn>3</mml:mn>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> intervals due to the three intervals of length <italic>Dv</italic> each. Otherwise, the total number of intervals in the vehicle&#x2019;s dominance region is <inline-formula id="inf260">
<mml:math id="m269">
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. The explanation is as follows. Observe that, for odd <italic>N</italic>, the sector in the middle is contained in the turret&#x2019;s as well as the vehicle&#x2019;s dominance region. As the portion of the middle sector which is contained in the vehicle&#x2019;s dominance region may contain intruders and from the fact that the number of intervals must be an integer, we obtain that there are <inline-formula id="inf261">
<mml:math id="m270">
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> intervals in the vehicle&#x2019;s dominance region. Since the total number of intervals in the environment is 3<italic>N</italic>, this implies that the turret&#x2019;s dominance region has <inline-formula id="inf262">
<mml:math id="m271">
<mml:mn>3</mml:mn>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x230a;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x230b;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> intervals and not <inline-formula id="inf263">
<mml:math id="m272">
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> intervals as we already accounted for the portion of the middle sector contained in the turret&#x2019;s dominance region in the vehicle&#x2019;s dominance region by using the ceil function. Intuitively, this means that there is no benefit for the adversary to release intruders in the portion of the middle sector contained in the turret&#x2019;s dominance region as the turret captures all intruders in its dominance region in an epoch. Thus, the adversary can have all intruders in a single interval within the turret&#x2019;s dominance region and the number of intruders that the turret capture remain the same, which is not the case in the vehicle&#x2019;s dominance region. We now account for the number of intruders jointly captured by the defenders in any epoch <italic>k</italic>.</p>
<p>Since at the start of every epoch <italic>k</italic>, the turret selects a dominance region based on the number of intruders on either side of the turret, it follows that the turret captures at least half of the total number of intruders that arrive in epoch <italic>k</italic>. This means that the turret captures intruders in all <inline-formula id="inf264">
<mml:math id="m273">
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x230a;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x230b;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> intervals. The number of intruders captured by the vehicle in an epoch <italic>k</italic> is determined as follows. Recall that in Algorithm Split, the vehicle&#x2019;s motion is independent of the turret&#x2019;s motion. The only information exchange that is required is the dominance region selected by the turret at the start of each epoch, which governs the number of sectors that the vehicle must account intruders in. Hence, this part of the analysis of accounting the number of intruders captured by the vehicle is identical to the proof of Lemma IV.5 in (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022</xref>), so we only give an outline of the proof. From the fact that the vehicle&#x2019;s dominance region can have at most <inline-formula id="inf265">
<mml:math id="m274">
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x2308;</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>&#x2309;</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> intervals and by following similar steps as in proof of Lemma IV.5 from (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022</xref>), it follows that for every two consecutively captured intervals, the vehicle loses at most 3&#x2308;0.5&#xa0;<italic>N</italic>&#x2309; &#x2212; 3 intervals. Further, from Lemma 4.4 and by following similar steps as in the proof of Lemma IV.6 from (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022</xref>), it follows that every lost interval is accounted for by the captured intervals of the turret and the vehicle. Thus, we obtain that the turret and the vehicle jointly capture at least 2 &#x2b; 3&#x230a;0.5&#xa0;<italic>N</italic>&#x230b; intervals of intruders and lose at most 3&#x2308;0.5<italic>N</italic>&#x2309; &#x2212; 3 intruders in every epoch of Algorithm Split. Therefore, by assuming that there exists an optimal offline algorithm that can capture all 2 &#x2b; 3&#x230a;0.5&#xa0;<italic>N</italic>&#x230b; &#x2b; 3&#x2308;0.5<italic>N</italic>&#x2309; &#x2212; 3 &#x3d; 3<italic>N</italic> &#x2212; 1 intruder intervals in every epoch establishes that Algorithm Split is <inline-formula id="inf266">
<mml:math id="m275">
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mrow>
<mml:mo>&#x230a;</mml:mo>
<mml:mrow>
<mml:mn>0.5</mml:mn>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mo>&#x230b;</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>-competitive. This concludes the proof.</p>
</statement>
</p>
<p>Recall that the motion of the vehicle in Algorithm Split builds upon Algorithm SNP designed in (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022</xref>), which was shown to be <inline-formula id="inf267">
<mml:math id="m276">
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>-competitive. A major drawback of Algorithm SNP was that its competitive ratio increases linearly with the number of sectors <italic>N</italic>. The following remark highlights that Algorithm Split does not suffer from this drawback and is effective under the same parameter regime as Algorithm SNP.</p>
<p>
<statement content-type="algorithm" id="Algorithm_3">
<label>Algorithm 3</label>
<p>Partition and Capture Algorithm<list list-type="simple">
<list-item>
<p>1 Turret&#x2019;s heading angle is <italic>&#x3b8;</italic>/3.</p>
</list-item>
<list-item>
<p>2 Vehicle is located at (<italic>z</italic>
<sub>
<italic>v</italic>
</sub>, &#x2212;<italic>&#x3b8;</italic>/3).</p>
</list-item>
<list-item>
<p>3 <bold>for</bold> <italic>each epoch k</italic> &#x2265; 1 <bold>do</bold>
</p>
</list-item>
<list-item>
<p>4 &#x2003;&#x2003;Compute <inline-formula id="inf432">
<mml:math id="m432">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c;, &#x7c;<inline-formula id="inf433">
<mml:math id="m433">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c;, and &#x7c;<italic>I</italic>
<sup>
<italic>k</italic>
</sup>&#x7c;.</p>
</list-item>
<list-item>
<p>5 &#x2003;&#x2003;<bold>if</bold> &#x7c;<italic>I</italic>
<sup>
<italic>k</italic>
</sup>&#x7c; &#x2265; <inline-formula id="inf434">
<mml:math id="m434">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> and &#x7c;<italic>I</italic>
<sup>
<italic>k</italic>
</sup>&#x7c; &#x2265; <inline-formula id="inf435">
<mml:math id="m435">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> <italic>holds</italic> <bold>then</bold>
</p>
</list-item>
<list-item>
<p>6 &#x2003;&#x2003;&#x2003;&#x2003;<bold>if</bold> &#x7c;<inline-formula id="inf436">
<mml:math id="m436">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> &#x7c; &#x2265; &#x7c;<inline-formula id="inf437">
<mml:math id="m437">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c; <bold>then</bold>
</p>
</list-item>
<list-item>
<p>7 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Assign <inline-formula id="inf438">
<mml:math id="m438">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> to the vehicle and <italic>I</italic>
<sup>
<italic>k</italic>
</sup> to the turret.</p>
</list-item>
<list-item>
<p>8 &#x2003;&#x2003;&#x2003;&#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>9 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Assign <inline-formula id="inf439">
<mml:math id="m439">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> to the turret and <italic>I</italic>
<sup>
<italic>k</italic>
</sup> to the vehicle.</p>
</list-item>
<list-item>
<p>10 &#x2003;&#x2003;&#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>11 &#x2003;&#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>12 &#x2003;&#x2003;&#x2003;&#x2003;<bold>if</bold> &#x7c;<inline-formula id="inf440">
<mml:math id="m440">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c; &#x3c; &#x7c;<italic>I</italic>
<sup>
<italic>k</italic>
</sup>&#x7c; (resp. &#x7c;<inline-formula id="inf441">
<mml:math id="m441">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>&#x7c; &#x3c; &#x7c;<italic>I</italic>
<sup>
<italic>k</italic>
</sup>&#x7c;) <bold>then</bold>
</p>
</list-item>
<list-item>
<p>13 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Assign <italic>I</italic>
<sup>
<italic>k</italic>
</sup> to the vehicle (resp. turret).</p>
</list-item>
<list-item>
<p>14 &#x2003;&#x2003;&#x2003;&#x2003;<bold>else</bold>
</p>
</list-item>
<list-item>
<p>15 &#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;Assign <inline-formula id="inf442">
<mml:math id="m442">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> (resp. <inline-formula id="inf443">
<mml:math id="m443">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>) to the vehicle (resp. turret).</p>
</list-item>
<list-item>
<p>16 &#x2003;&#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>17 &#x2003;<bold>end</bold>
</p>
</list-item>
<list-item>
<p>18 &#x2003;Turn the defenders in an angular motion to the respective endpoint of the assigned set.</p>
</list-item>
<list-item>
<p>19 &#x2003;Turn the defenders back to the initial position.</p>
</list-item>
<list-item>
<p>20 <bold>end</bold>
</p>
</list-item>
</list>
</p>
</statement>
</p>
<p>
<statement>
<p>Remark 4.7 (Heterogeneity improves competitive ratio of Algorithm Split). <italic>The competitive ratio of Algorithm Split is at most 2, achieved when</italic> <italic>N</italic> &#x2192; <italic>&#x221e;</italic>
<italic>. Further, for</italic> <italic>r</italic>
<sub>
<italic>t</italic>
</sub> &#x3d; 1<italic>, the parameter regime that required by Algorithm Split</italic> <inline-formula id="inf268">
<mml:math id="m277">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<italic>) is the same as that of Algorithm SNP in (<xref ref-type="bibr" rid="B7">Bajaj et al., 2022</xref>).</italic>
</p>
</statement>
</p>
<p>Further note that if <italic>N</italic> is odd and <italic>N</italic> &#x2260; 1, then the competitive ratio of Algorithm Split is higher than that for <italic>N</italic> &#x2b; 1. This is because when <italic>N</italic> is odd, the adversary can exploit the fact that there are higher number of intervals that the vehicle can lose as compared to that in the turret&#x2019;s dominance region. Finally, for <italic>N</italic> &#x3d; 2, Algorithm Split is 1-competitive. The explanation is as follows. For <italic>N</italic> &#x3d; 2, the two sectors of the environment overlap the two dominance region. Thus, in this case, the turret captures all intruders in one dominance region while the vehicle remains stationary at the resting point of the second dominance region, ensuring that all intruders that are released in the environment are captured.</p>
<p>Given that the turret can only move clockwise or anti-clockwise and from the requirement that the defenders must start their motions at the same time instant, the parameter regime of Algorithm Split is primarily defined by the time taken by the turret to sweep its dominance region. This means that by reducing the time taken by the turret to complete its motion, it is possible to achieve an algorithm with higher parameter regime. This is exploited in our next algorithm which is provably 1.5-competitive.</p>
</sec>
<sec id="s4-4">
<title>4.4 Partition and capture (part)</title>
<p>Algorithm Part, formally defined in <xref ref-type="other" rid="Algorithm_3">Algorithm 3</xref>, partitions the environment into three equal dominance region, each of angle <inline-formula id="inf269">
<mml:math id="m278">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. We denote these dominance regions as <italic>W</italic>
<sub>1</sub>, <italic>W</italic>
<sub>2</sub>, and <italic>W</italic>
<sub>3</sub>, where <italic>W</italic>
<sub>1</sub> denotes the leftmost dominance region. The idea is to move the vehicle and the turret similar to the motion of the turret in Algorithm Split and capture all intruders from two out of the three total dominance region in each epoch. The dominance region are determined as follows.</p>
<p>At the start of every epoch <italic>k</italic>, the turret&#x2019;s heading angle, measured from the <italic>y</italic>-axis, is set to <inline-formula id="inf270">
<mml:math id="m279">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. Similar to Algorithm Split, we describe two sets for the turret that characterize specific regions in the two dominance regions that surround the turret, i.e., <italic>W</italic>
<sub>2</sub> and <italic>W</italic>
<sub>3</sub>. Intuitively, these sets corresponds to the locations in the environment that the turret can capture intruders at during its sweep motion.<disp-formula id="equ7">
<mml:math id="m280">
<mml:mtable class="align-star" columnalign="left">
<mml:mtr>
<mml:mtd columnalign="right">
<mml:msub>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mo>&#x2254;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>:</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="right">
<mml:msub>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mo>&#x2254;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>:</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
</disp-formula>Similarly, at the start of every epoch <italic>k</italic>, the vehicle is assumed to be located at <inline-formula id="inf271">
<mml:math id="m281">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, where the angle is measured from the <italic>y</italic>-axis and <italic>z</italic>
<sub>
<italic>v</italic>
</sub> is as defined for Algorithm SiR. Next, we define two sets that characterize a specific region in <italic>W</italic>
<sub>1</sub> and <italic>W</italic>
<sub>2</sub>, respectively.<disp-formula id="equ8">
<mml:math id="m282">
<mml:mtable class="align-star" columnalign="left">
<mml:mtr>
<mml:mtd columnalign="right">
<mml:msub>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mo>&#x2254;</mml:mo>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>:</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mo>}</mml:mo>
<mml:mspace width="0.3333em" class="nbsp"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>}</mml:mo>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="right">
<mml:msub>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2254;</mml:mo>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>:</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>v</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="0.3333em" class="nbsp"/>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>}</mml:mo>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
</disp-formula>Let <inline-formula id="inf272">
<mml:math id="m283">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, <inline-formula id="inf273">
<mml:math id="m284">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, and <inline-formula id="inf274">
<mml:math id="m285">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> denote the set of intruders contained in <italic>T</italic>
<sub>right</sub>, <italic>T</italic>
<sub>left</sub>, <italic>V</italic>
<sub>right</sub>, and <italic>V</italic>
<sub>left</sub>, respectively, at the start of an epoch <italic>k</italic>. Finally, denote <italic>I</italic>
<sup>
<italic>k</italic>
</sup> as the set of intruders contained in <inline-formula id="inf275">
<mml:math id="m286">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2229;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> (see <xref ref-type="fig" rid="F5">Figure 5</xref>).</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Description of Algorithm Part. The black dashed line denotes the partitioning of the environment, each of angle <inline-formula id="inf446">
<mml:math id="m446">
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. The region between the orange (resp. yellow) dashed curve and the orange (resp. yellow) dot curve on the left (resp. right) side of the vehicle (resp. turret) denotes the <italic>V</italic>
<sub>left</sub> (resp. <italic>T</italic>
<sub>right</sub>).</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g005.tif"/>
</fig>
<p>We now describe the motion of the defenders. The objective is to move the defenders such that intruders from any two sets out of <inline-formula id="inf276">
<mml:math id="m287">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, <inline-formula id="inf277">
<mml:math id="m288">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, and <italic>I</italic>
<sup>
<italic>k</italic>
</sup> are captured. This requires assigning the defenders to the sets containing maximum number of intruders, which can be summarized into two cases.</p>
<p>
<bold>Case 1:</bold> The set <italic>I</italic>
<sup>
<italic>k</italic>
</sup> contains maximum number of intruders, i.e., <inline-formula id="inf278">
<mml:math id="m289">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf279">
<mml:math id="m290">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> hold at the start of epoch <italic>k</italic>. This means that one of the defenders must be assigned to the set <italic>I</italic>
<sup>
<italic>k</italic>
</sup>. By determining which set has more intruders out of <inline-formula id="inf280">
<mml:math id="m291">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf281">
<mml:math id="m292">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, Algorithm Part performs an assignment of the sets to the defenders. Mathematically, if <inline-formula id="inf282">
<mml:math id="m293">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> and <inline-formula id="inf283">
<mml:math id="m294">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, then<list list-type="simple">
<list-item>
<p>&#x2022; If <inline-formula id="inf284">
<mml:math id="m295">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, then the vehicle is assigned the set <inline-formula id="inf285">
<mml:math id="m296">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and the turret is assigned the set <italic>I</italic>
<sup>
<italic>k</italic>
</sup>.</p>
</list-item>
<list-item>
<p>&#x2022; Otherwise, the vehicle is assigned the set <italic>I</italic>
<sup>
<italic>k</italic>
</sup> and the turret is assigned the set <inline-formula id="inf286">
<mml:math id="m297">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>.</p>
</list-item>
</list>
</p>
<p>
<bold>Case 2:</bold> <inline-formula id="inf287">
<mml:math id="m298">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x3c;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> or <inline-formula id="inf288">
<mml:math id="m299">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x3c;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> holds at the start of epoch <italic>k</italic>. This implies that at least one set out of <inline-formula id="inf289">
<mml:math id="m300">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf290">
<mml:math id="m301">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> has the maximum number of intruders out of the three <inline-formula id="inf291">
<mml:math id="m302">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula>, and <inline-formula id="inf292">
<mml:math id="m303">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> sets. Then, the sets are assigned as follows:<list list-type="simple">
<list-item>
<p>&#x2022; If <inline-formula id="inf293">
<mml:math id="m304">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x3c;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, then the vehicle is assigned the set <italic>I</italic>
<sup>
<italic>k</italic>
</sup>. Otherwise, the vehicle is assigned the set <inline-formula id="inf294">
<mml:math id="m305">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>.</p>
</list-item>
<list-item>
<p>&#x2022; Similarly, if <inline-formula id="inf295">
<mml:math id="m306">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x3c;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, then the turret is assigned the set <italic>I</italic>
<sup>
<italic>k</italic>
</sup>. Otherwise, the turret is assigned the set <inline-formula id="inf296">
<mml:math id="m307">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. Note that if the vehicle is already assigned set <italic>I</italic>
<sup>
<italic>k</italic>
</sup> then that means that <inline-formula id="inf297">
<mml:math id="m308">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x2265;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> holds. Given the condition in Case 2, this implies that <inline-formula id="inf298">
<mml:math id="m309">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>&#x3c;</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula> holds and the turret is assigned <inline-formula id="inf299">
<mml:math id="m310">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. Thus, in Case 2, both defenders are never assigned the set <italic>I</italic>
<sup>
<italic>k</italic>
</sup>.</p>
</list-item>
</list>
</p>
<p>Once the sets are assigned, the vehicle turns as follows. If the set assigned to the vehicle is <italic>I</italic>
<sup>
<italic>k</italic>
</sup>, then the vehicle moves clockwise with unit speed in the direction perpendicular to its position vector until it reaches location <inline-formula id="inf300">
<mml:math id="m311">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Upon reaching the location, the vehicle moves anti-clockwise with unit speed in the direction perpendicular to its position vector until it returns to location <inline-formula id="inf301">
<mml:math id="m312">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Otherwise (if the vehicle is assigned the set <inline-formula id="inf302">
<mml:math id="m313">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>), the vehicle moves anti-clockwise with unit speed in the direction perpendicular to its position vector until it reaches location (<italic>z</italic>
<sub>
<italic>v</italic>
</sub>, &#x2212; <italic>&#x3b8;</italic>). Upon reaching that location, the vehicle moves clockwise with unit speed in the direction perpendicular to its position vector until it returns to location <inline-formula id="inf303">
<mml:math id="m314">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>Before we describe the motion of the turret, we determine its angular speed to ensure that the defenders start an epoch at the same time instant. As we require that the defenders take the same amount of time to return to their starting locations in an epoch, we require that <inline-formula id="inf304">
<mml:math id="m315">
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x21d2;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, which means that the angular speed of the turret must be at least <inline-formula id="inf305">
<mml:math id="m316">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>.</p>
<p>We now describe the turret&#x2019;s motion in an epoch. Similar to the motion of the vehicle, if the set assigned to the turret is <italic>I</italic>
<sup>
<italic>k</italic>
</sup>, then the turret turns to angle <inline-formula id="inf306">
<mml:math id="m317">
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> and then turns back to the initial heading angle <inline-formula id="inf307">
<mml:math id="m318">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> with angular speed <inline-formula id="inf308">
<mml:math id="m319">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. Otherwise, the turret turns to angle <italic>&#x3b8;</italic> and then back to angle <inline-formula id="inf309">
<mml:math id="m320">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> with angular speed <inline-formula id="inf310">
<mml:math id="m321">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>.</p>
<p>Analogous to Lemma 4.4, we have the following lemma which ensures that any intruder that was not considered for comparison at the start of epoch <italic>k</italic> is considered for comparison at the start of epoch (<italic>k</italic> &#x2b; 1).</p>
<p>
<statement>
<p>Lemma 4: <italic>Any intruder which lies beyond the sets</italic> <inline-formula id="inf312">
<mml:math id="m323">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, <italic>and</italic> <inline-formula id="inf313">
<mml:math id="m324">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> <italic>at the start of epoch</italic> <italic>k</italic> <italic>will be contained in the sets</italic> <inline-formula id="inf314">
<mml:math id="m325">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>, <italic>and</italic> <inline-formula id="inf315">
<mml:math id="m326">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
<italic>, respectively, at the start of epoch</italic> (<italic>k</italic> &#x2b; 1) <italic>if</italic>
<disp-formula id="equ9">
<mml:math id="m327">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:math>
</disp-formula>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_6">
<label>Proof</label>
<p>The proof is analogous to the proof of Lemma 4.4 and has been omitted for brevity.</p>
</statement>
</p>
<p>
<statement>
<p>Corollary 4.9: <italic>Any intruder that lies beyond the set</italic> <italic>I</italic>
<sup>
<italic>k</italic>
</sup> <italic>at time instant</italic> <italic>k</italic>
<sub>
<italic>s</italic>
</sub> <italic>will be contained in the set</italic> <italic>I</italic>
<sup>
<italic>k</italic>&#x2b;1</sup>&#xa0;<italic>at the start of epoch</italic> (<italic>k</italic> &#x2b; 1) <italic>if the conditions of Lemma</italic> 4.8 <italic>hold.</italic>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_7">
<label>Proof</label>
<p>The proof directly follows from the fact that Lemma 4.8 holds for both the defenders and <italic>I</italic>
<sup>
<italic>k</italic>
</sup> represents the intersection of <inline-formula id="inf316">
<mml:math id="m328">
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf317">
<mml:math id="m329">
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<p>
<statement>
<p>Theorem 4.10: <italic>Algorithm Part is 1.5-competitive for any problem instance</italic> <inline-formula id="inf318">
<mml:math id="m330">
<mml:mi mathvariant="script">P</mml:mi>
</mml:math>
</inline-formula> <italic>with</italic> <inline-formula id="inf319">
<mml:math id="m331">
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> <italic>that satisfies</italic>
<disp-formula id="equ10">
<mml:math id="m332">
<mml:mi>v</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mi>&#x3b8;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:math>
</disp-formula>
</p>
</statement>
</p>
<p>
<statement content-type="proof" id="uProof_8">
<label>Proof</label>
<p>Observe that from Lemma 4.8 and Corollary 4.9, every intruder is accounted for and no intruder that is not considered for comparison in a particular epoch is lost under the condition on <italic>v</italic>. Now, from the definition of Algorithm Part, the defenders are assigned two sets out of the total three in every epoch. Further, the assignment is carried out in a way that the sets with maximum number of intruders are assigned to the defenders in every epoch. Assuming that there exists an optimal offline algorithm that captures all intruders from all three sets then, from Definition 1, competitive ratio of Algorithm Part is at most <inline-formula id="inf320">
<mml:math id="m333">
<mml:mfrac>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
</sec>
</sec>
<sec id="s5">
<title>5 Numerical observations</title>
<p>We now provide numerical visualization of the bounds derived in this work and emphasize on the (<italic>v</italic>, <italic>&#x3c1;</italic>) and (<italic>&#x3c9;</italic>, <italic>&#x3c1;</italic>) parameter regime. These plots allow the defenders to choose an appropriate online algorithm out of the four proposed, based on the values of the problem parameters.</p>
<sec id="s5-1">
<title>5.1 (<italic>&#x3c9;</italic>, <italic>&#x3c1;</italic>) Parameter regime</title>
<p>
<xref ref-type="fig" rid="F6">Figure 6</xref> shows the (<italic>&#x3c9;</italic>, <italic>&#x3c1;</italic>) parameter regime plot for fixed values of <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, <italic>&#x3b8;</italic>, and <italic>v</italic> and provides insights into the requirement of the angular speed <italic>&#x3c9;</italic> for different values of the <italic>&#x3c1;</italic>. Note that the markers represent a lower bound on the angular speed of the turret.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>
<inline-formula id="inf448">
<mml:math id="m448">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> plot for different values of <inline-formula id="inf447">
<mml:math id="m447">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>, and <inline-formula id="inf450">
<mml:math id="m450">
<mml:mi>v</mml:mi>
</mml:math>
</inline-formula>. Markers represent a lower bound on the turret&#x27;s angular speed. <bold>(A)</bold> <inline-formula id="inf449">
<mml:math id="m449">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> plot for <inline-formula id="inf452">
<mml:math id="m452">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.05</mml:mn>
</mml:math>
</inline-formula>, and <inline-formula id="inf451">
<mml:math id="m451">
<mml:mi>v</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:math>
</inline-formula>. <bold>(B)</bold> <inline-formula id="inf453">
<mml:math id="m453">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> plot for <inline-formula id="inf454">
<mml:math id="m454">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:math>
</inline-formula>, and <inline-formula id="inf445">
<mml:math id="m445">
<mml:mi>v</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.3</mml:mn>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g006.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F6">Figure 6A</xref>, the condition in Theorem 3.1 for the existence of <italic>c</italic>-competitive algorithms is represented by the green circles. For all values of 0.1 &#x2264; <italic>&#x3c1;</italic> &#x2264; 0.9, as the green circles are at <italic>&#x3c9;</italic> &#x3d; 0.1, it implies that there exists a <italic>c</italic>-competitive algorithm for all values of <italic>&#x3c9;</italic> &#x2265; 0.1 and the values of <italic>v</italic>, <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, and <italic>&#x3b8;</italic> selected for this figure. We now provide insights into the requirement on <italic>&#x3c9;</italic> for our algorithms. Algorithm SiR, represented by the yellow triangle, requires higher angular speed for the turret as the radius of the perimeter increases. However, Algorithm Split and Algorithm Part, represented by the red star and blue square respectively, require lower angular speed for the turret when the radius of the perimeter is sufficiently large. Although counter intuitive, this can be explained as follows. Recall that Algorithm Part and Algorithm Split require the two defenders to be synchronous and the vehicle moves with a fixed unit speed. As the perimeter size increases, the time taken by the vehicle to complete its motion increases, which in turn requires lower values of <italic>&#x3c9;</italic> to ensure synchronicity. Observe that for <italic>&#x3c1;</italic> &#x2265; 0.8, there are no markers for Algorithm Split. This is because for <italic>&#x3c1;</italic> &#x2265; 0.8 and the values of <italic>&#x3b8;</italic>, <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, and <italic>v</italic> considered for this figure, the condition defined for Algorithm Split in Theorem 4.6 is not satisfied for any 0 &#x3c; <italic>&#x3c9;</italic> &#x2264; 7, implying that Algorithm Split is not <italic>c</italic>-competitive. Analogous conclusions can be drawn for Algorithms SiCon (resp. Part), represented by orange diamond (resp. blue square), for values of <italic>&#x3c1;</italic> &#x2265; 0.6 (resp. <italic>&#x3c1;</italic> &#x2265; 0.9). Finally, note that Algorithm SiCon requires <italic>&#x3c9;</italic> &#x2265; 1 for all values of <italic>&#x3c1;</italic> &#x2264; 0.6. This is because in this algorithm, the turret is required to move with unit angular speed to maintain synchronicity with the vehicle.</p>
<p>Analogous observations can be drawn in <xref ref-type="fig" rid="F6">Figure 6B</xref>. For instance, when <italic>&#x3c1;</italic> &#x3d; 0.9 and <italic>&#x3c9;</italic> &#x2265; 1.5, there always exists a <italic>c</italic>-competitive algorithm with a finite constant <italic>c</italic>. Equivalently, there does not exist a <italic>c</italic>-competitive algorithm for <italic>&#x3c9;</italic> &#x3c; 1.5, <italic>&#x3c1;</italic> &#x3d; 0.9 and for the values of <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, <italic>&#x3b8;</italic>, and <italic>v</italic> selected. Similarly, as <italic>&#x3c1;</italic> increases, Algorithm SiR requires a faster turret whereas Algorithm Part and Algorithm Split can work with a slower turret to ensure synchronicity. Note that Algorithm Part and Split do not have markers beyond <italic>&#x3c1;</italic> &#x3d; 0.6 and <italic>&#x3c1;</italic> &#x3d; 0.5, respectively, which is lower than the values of <italic>&#x3c1;</italic> in <xref ref-type="fig" rid="F6">Figure 6A</xref>. This implies that, although the values of <italic>r</italic>
<sub>
<italic>c</italic>
</sub> are slightly higher than those in <xref ref-type="fig" rid="F6">Figure 6A</xref>, it is more difficult to capture intruders given the higher value of <italic>v</italic>. Finally, there are no markers for Algorithm SiCon as it is not <italic>c</italic>-competitive for the values of parameters selected for this figure.</p>
</sec>
<sec id="s5-2">
<title>5.2 (<italic>v</italic>, <italic>&#x3c1;</italic>) Parameter regime</title>
<p>
<xref ref-type="fig" rid="F7">Figure 7</xref> shows the (<italic>v</italic>, <italic>&#x3c1;</italic>) parameter regime for fixed values of <italic>&#x3b8;</italic>, <italic>r</italic>
<sub>
<italic>c</italic>
</sub>, and <italic>r</italic>
<sub>
<italic>t</italic>
</sub>. Since, Algorithms Split, Part, SiCon require fixed but different values of <italic>&#x3c9;</italic>, we set <inline-formula id="inf321">
<mml:math id="m334">
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo stretchy="false">}</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. Note that the value of <italic>&#x3c9;</italic> for this figure depends on the value of <italic>&#x3c1;</italic> as <italic>z</italic>
<sub>
<italic>v</italic>
</sub> is a function of <italic>&#x3c1;</italic>.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>
<inline-formula id="inf459">
<mml:math id="m459">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> plot for different values of <inline-formula id="inf460">
<mml:math id="m460">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> and <inline-formula id="inf461">
<mml:math id="m461">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. <bold>(A)</bold> <inline-formula id="inf462">
<mml:math id="m462">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> plot for <inline-formula id="inf463">
<mml:math id="m463">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.8</mml:mn>
</mml:math>
</inline-formula>, and <inline-formula id="inf464">
<mml:math id="m464">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.05</mml:mn>
</mml:math>
</inline-formula>. <bold>(B)</bold> <inline-formula id="inf467">
<mml:math id="m467">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> plot for <inline-formula id="inf468">
<mml:math id="m468">
<mml:mi>&#x3b8;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.6</mml:mn>
</mml:math>
</inline-formula>, and <inline-formula id="inf469">
<mml:math id="m469">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fcteg-04-1128597-g007.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F7">Figure 7A</xref> shows the (<italic>v</italic>, <italic>&#x3c1;</italic>) parameter regime plot with <italic>&#x3b8;</italic>, <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, and <italic>r</italic>
<sub>
<italic>c</italic>
</sub> set to <inline-formula id="inf322">
<mml:math id="m335">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mn>0.8</mml:mn>
</mml:math>
</inline-formula>, and 0.05, respectively. For any value of parameters <italic>&#x3c1;</italic> and <italic>v</italic>, for instance 0.7 and 1, respectively, that lie beyond the green curve, there does not exists a <italic>c</italic>-competitive algorithm. For any value of parameters <italic>&#x3c1;</italic> and <italic>v</italic> that lie below the yellow curve, Algorithm SiR is 1-competitive. Similarly, for any value of parameters <italic>&#x3c1;</italic> and <italic>v</italic> that lie below the blue curve, Algorithm Part is 1.5-competitive. Analogous observations can be made for Algorithm Sicon and Algorithm Split. Note that for parameter regime that lies below the yellow curve, Algorithm Part is not effective as there exists Algorithm SiR with a better competitive ratio. For instance, for <italic>&#x3c1;</italic> &#x3d; 0.2 and <italic>v</italic> &#x3d; 0.2, it is better to use Algorithm SiR as it has a lower competitive ratio. Observe that for very high values of <italic>&#x3c1;</italic>, Algorithm SiCon is the most effective as it has the highest parameter regime curve. Finally, the light red curve of Algorithm Split is divided into <italic>regions</italic> where each region corresponds to a specific competitiveness. An important characteristic for Algorithm Split is that it can be used to determine the tradeoff between the competitiveness and the desired parameter regime for a specific problem instance.</p>
<p>
<xref ref-type="fig" rid="F7">Figure 7B</xref> shows the (<italic>v</italic>, <italic>&#x3c1;</italic>) parameter regime plot with <italic>&#x3b8;</italic>, <italic>r</italic>
<sub>
<italic>t</italic>
</sub>, and <italic>r</italic>
<sub>
<italic>c</italic>
</sub> set to <inline-formula id="inf323">
<mml:math id="m336">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mn>0.6</mml:mn>
</mml:math>
</inline-formula>, and 0.1, respectively. Note that the green curve, which represents the curve for Theorem 3.1, is shifted slightly upwards as compared to in <xref ref-type="fig" rid="F7">Figure 7A</xref>. This follows from the two cases considered in the proof which is based on the capture capability of the defenders (vehicle is now more capable and Theorem 3.1 is independent of <italic>r</italic>
<sub>
<italic>t</italic>
</sub>). As the angle of the environment increases and the engagement range of the turret decreases, it is harder to capture intruders. This is visualized in <xref ref-type="fig" rid="F7">Figure 7B</xref> as the curves for all the algorithms have shifted downward compared to those in <xref ref-type="fig" rid="F7">Figure 7A</xref>. Finally, for values of <italic>&#x3c1;</italic> &#x3e; 0.3, Algorithm Part is more effective than Algorithm Split only if the competitive ratio of Algorithm Split is less than 1.5 for the chosen values of parameters. Similar to the curve of Algorithm Split, note that the curve for Algorithm SiR is also divided into regions. This is because of the different values of <italic>&#x3c9;</italic> for different perimeter sizes.</p>
</sec>
</sec>
<sec sec-type="discussion" id="s6">
<title>6 Discussion</title>
<p>In this section, we provide a brief discussion on the time complexity of our algorithms and how this work extends to different models of the vehicle. We start with the time complexity of our algorithms.</p>
<sec id="s6-1">
<title>6.1 Time complexity</title>
<p>We now establish the time complexity of each our algorithms and show that they can be implemented in real time if the information about the total number of intruders in every epoch is provided to the defenders.</p>
<p>Algorithm SiR and SiCon: Since Algorithm SiR and SiCon are open loop algorithms, the time complexity is <italic>O</italic> (1).</p>
<p>Algorithm Split: There are three quantities that must be computed at the start of every epoch of Algorithm Split, i.e., <inline-formula id="inf324">
<mml:math id="m337">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, and <inline-formula id="inf325">
<mml:math id="m338">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. Since <inline-formula id="inf326">
<mml:math id="m339">
<mml:msub>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula> is determined using a max() function over <italic>N</italic> sectors, its time complexity is <italic>O</italic>(<italic>N</italic>). Similarly, determining the sets <inline-formula id="inf327">
<mml:math id="m340">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf328">
<mml:math id="m341">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> also have a time complexity of <italic>O</italic>(<italic>n</italic>), where <italic>n</italic> is the number of intruders in an epoch. This yields that the time complexity of Algorithm Split is <italic>O</italic>(max{<italic>n</italic>, <italic>N</italic>}). Recall that <italic>N</italic> is finite as <italic>r</italic>
<sub>
<italic>c</italic>
</sub> &#x3e; 0. Thus, in the case when <italic>n</italic> &#x2192; <italic>&#x221e;</italic>, if the information about the number of intruders in <inline-formula id="inf329">
<mml:math id="m342">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> and <inline-formula id="inf330">
<mml:math id="m343">
<mml:msubsup>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is provided to the defenders (through some external sensors), then this algorithm can be implemented in real time.</p>
<p>Algorithm Part: Similar to Algorithm Split, Algorithm Part computes <inline-formula id="inf331">
<mml:math id="m344">
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">r</mml:mi>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi mathvariant="normal">g</mml:mi>
<mml:mi mathvariant="normal">h</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">e</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:math>
</inline-formula>, and &#x7c;<italic>I</italic>
<sup>
<italic>k</italic>
</sup>&#x7c; at the start of every epoch which yields that the time complexity of Algorithm Part is <italic>O</italic>(<italic>n</italic>). This requires that the information about the total number of intruders in each of these sets must be provided to the defenders, for <italic>n</italic> &#x2192; <italic>&#x221e;</italic>, to implement this algorithm in real time.</p>
</sec>
<sec id="s6-2">
<title>6.2 Different motion models for the vehicle</title>
<p>We now discuss how this work extends to different motion model of the vehicle.</p>
<p>Observe that the analysis in this work is based upon two quantities; first, the time taken by the intruders to reach the perimeter and second, the time taken by the defenders to complete the motion. This work can be extended to other models for the vehicle, for instance double integrator, by suitably modifying the time taken by the vehicle to complete its motion. By doing so, it may be that the parameter regimes may be lower than in <xref ref-type="fig" rid="F7">Figure 7</xref> but the bounds on the competitive ratios will remain the same. The reason that the parameter regimes will be lower is as follows. Note that the parameter regimes are characterized by the conditions determined for each of the algorithms. Essentially, these conditions are determined by requiring the intruders to be sufficiently slow such that they take more time to reach the perimeter than the time taken by the vehicle to complete its motion. For a different model of the vehicle, such as the Dubins model, the path and the time taken by the vehicle to complete its motion can be determined by suitably incorporating the turn radius. Precise dependence of the competitiveness of such realistic models will be a topic of a future investigation.</p>
</sec>
</sec>
<sec id="s7">
<title>7 Conclusions and future extensions</title>
<p>This work analyzed a perimeter defense problem in which two cooperative heterogeneous defenders, a mobile vehicle with finite capture range and a turret with finite engagement range, are tasked to defend a perimeter against mobile intruders that arrive in the environment. Our approach was based on a competitive analysis that first yielded a fundamental limit on the problem parameters for finite competitiveness of any online algorithm. We then designed and analyzed four algorithms and established sufficient conditions that guaranteed a finite competitive ratio for each algorithm under specific parameter regimes.</p>
<p>Apart from closing the gap between the curve that represents Theorem 3.1 and the curve that represents Algorithm Split, key future directions include multiple heterogeneous defender scenarios with energy constraints. Analyzing the problem with a weaker model of the adversary, realistic motion motions, maneuvering intruders, or with asymmetric information are also potential extensions.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s8">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s9">
<title>Author contributions</title>
<p>SB contributed towards the problem formulation, algorithm design, conceptual analysis, the results and preparing the manuscript. AVM contributed towards problem formulation and the literature review section. DWC contributed towards the problem formulation. SDB and ET contributed towards evaluating and improving the analysis and the presentation. All authors contributed equally towards reading and revising the manuscript and approving the submitted version.</p>
</sec>
<sec id="s10">
<title>Funding</title>
<p>This research was supported by the Aerospace Systems Technology Research and Assessment (ASTRA) Aerospace Technology Development and Testing (ATDT) program at AFRL under contract number FA865021D2602. Approved for public release: distribution unlimited, case number: AFRL-2022-6028.</p>
</sec>
<sec sec-type="COI-statement" id="s11">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s12">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<fn-group>
<fn id="fn2">
<label>1</label>
<p>As the speed of the intruders is normalized by the speed of the vehicle, we use the speed of intruders and speed ratio interchangeably.</p>
</fn>
<fn id="fn3">
<label>2</label>
<p>The time taken by the defenders must be at most the time taken by the intruders to reach the perimeter.</p>
</fn>
<fn id="fn4">
<label>3</label>
<p>This case arises when the Algorithm Split moves the turret in the same direction for at least two consecutive epochs.</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Adler</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Mickelin</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Ramachandran</surname>
<given-names>R. K.</given-names>
</name>
<name>
<surname>Sukhatme</surname>
<given-names>G. S.</given-names>
</name>
<name>
<surname>Karaman</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2022</year>). <source>The role of heterogeneity in autonomous perimeter defense problems</source>. <comment>
<italic>arXiv preprint arXiv:2202.10433</italic>
</comment>.</citation>
</ref>
<ref id="B2">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Akilan</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Fuchs</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2017</year>). &#x201c;<article-title>Zero-sum turret defense differential game with singular surfaces</article-title>,&#x201d; in <source>2017 IEEE conference on control Technology and applications (CCTA)</source>, <fpage>2041</fpage>&#x2013;<lpage>2048</lpage>. <pub-id pub-id-type="doi">10.1109/CCTA.2017.8062754</pub-id>
</citation>
</ref>
<ref id="B3">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bajaj</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Bopardikar</surname>
<given-names>S. D.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Dynamic boundary guarding against radially incoming targets</article-title>,&#x201d; in <source>2019 IEEE 58th conference on decision and control (CDC)</source> (<publisher-name>IEEE</publisher-name>), <fpage>4804</fpage>&#x2013;<lpage>4809</lpage>.</citation>
</ref>
<ref id="B4">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bajaj</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Bopardikar</surname>
<given-names>S. D.</given-names>
</name>
<name>
<surname>Torng</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Moll</surname>
<given-names>A. V.</given-names>
</name>
<name>
<surname>Casbeer</surname>
<given-names>D. W.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Competitive perimeter defense with multiple vehicles</article-title>. In <source>IEEE transactions on robotics</source>. <comment>Under Review</comment>.</citation>
</ref>
<ref id="B5">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bajaj</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Bopardikar</surname>
<given-names>S. D.</given-names>
</name>
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Torng</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Casbeer</surname>
<given-names>D. W.</given-names>
</name>
</person-group> (<year>2022</year>). &#x201c;<article-title>Perimeter defense using a turret with finite range and service times</article-title>,&#x201d; in <source>
<italic>2023 American control conference (ACC)</italic> (IEEE)</source>.</citation>
</ref>
<ref id="B6">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bajaj</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Torng</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Bopardikar</surname>
<given-names>S. D.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Competitive perimeter defense on a line</article-title>,&#x201d; in <source>2021 American control conference (ACC)</source> (<publisher-name>IEEE</publisher-name>), <fpage>3196</fpage>&#x2013;<lpage>3201</lpage>.</citation>
</ref>
<ref id="B7">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bajaj</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Torng</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Bopardikar</surname>
<given-names>S. D.</given-names>
</name>
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Weintraub</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Garcia</surname>
<given-names>E.</given-names>
</name>
<etal/>
</person-group> (<year>2022</year>). &#x201c;<article-title>Competitive perimeter defense of conical environments</article-title>,&#x201d; in <source>2022 IEEE 61st conference on decision and control (CDC) (IEEE)</source>, <fpage>6586</fpage>&#x2013;<lpage>6593</lpage>. <pub-id pub-id-type="doi">10.1109/CDC51059.2022.9993007</pub-id>
</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bertsimas</surname>
<given-names>D. J.</given-names>
</name>
<name>
<surname>Van Ryzin</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>1991</year>). <article-title>A stochastic and dynamic vehicle routing problem in the Euclidean plane</article-title>. <source>Operations Res.</source> <volume>39</volume>, <fpage>601</fpage>&#x2013;<lpage>615</lpage>. <pub-id pub-id-type="doi">10.1287/opre.39.4.601</pub-id>
</citation>
</ref>
<ref id="B9">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Borodin</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>El-Yaniv</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2005</year>). <source>Online computation and competitive analysis</source>. <publisher-name>Cambridge University Press</publisher-name>.</citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bullo</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Frazzoli</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Pavone</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Savla</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Smith</surname>
<given-names>S. L.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>Dynamic vehicle routing for robotic systems</article-title>. <source>Proc. IEEE</source> <volume>99</volume>, <fpage>1482</fpage>&#x2013;<lpage>1504</lpage>. <pub-id pub-id-type="doi">10.1109/jproc.2011.2158181</pub-id>
</citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Casey</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Drones bring fight and flight to battle against poachers</article-title>. <source>Sci. Am. (online)</source> <volume>20</volume>.</citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Tomlin</surname>
<given-names>C. J.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Multiplayer reach-avoid games via pairwise outcomes</article-title>. <source>IEEE Trans. Automatic Control</source> <volume>62</volume>, <fpage>1451</fpage>&#x2013;<lpage>1457</lpage>. <pub-id pub-id-type="doi">10.1109/tac.2016.2577619</pub-id>
</citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Deng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Mirzaian</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>1996</year>). <article-title>Competitive robot mapping with homogeneous markers</article-title>. <source>IEEE Trans. Robotics Automation</source> <volume>12</volume>, <fpage>532</fpage>&#x2013;<lpage>542</lpage>. <pub-id pub-id-type="doi">10.1109/70.508436</pub-id>
</citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Francos</surname>
<given-names>R. M.</given-names>
</name>
<name>
<surname>Bruckstein</surname>
<given-names>A. M.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Search for smart evaders with swarms of sweeping agents</article-title>. <source>IEEE Trans. Robotics</source> <volume>38</volume>, <fpage>1080</fpage>&#x2013;<lpage>1100</lpage>. <pub-id pub-id-type="doi">10.1109/tro.2021.3104253</pub-id>
</citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Garcia</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Casbeer</surname>
<given-names>D. W.</given-names>
</name>
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Pachter</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Multiple pursuer multiple evader differential games</article-title>. <source>IEEE Trans. Automatic Control</source> <volume>66</volume>, <fpage>2345</fpage>&#x2013;<lpage>2350</lpage>. <pub-id pub-id-type="doi">10.1109/tac.2020.3003840</pub-id>
</citation>
</ref>
<ref id="B16">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Garcia</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Casbeer</surname>
<given-names>D. W.</given-names>
</name>
<name>
<surname>Pachter</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Strategies for defending a coastline against multiple attackers</article-title>,&#x201d; in <source>2019 IEEE 58th conference on decision and control (CDC)</source> (<publisher-name>IEEE</publisher-name>), <fpage>7319</fpage>&#x2013;<lpage>7324</lpage>.</citation>
</ref>
<ref id="B17">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Guerrero-Bonilla</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Nieto-Granda</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Egerstedt</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Robust perimeter defense using control barrier functions</article-title>,&#x201d; in <source>2021 international symposium on multi-robot and multi-agent Systems (MRS)</source> (<publisher-name>IEEE</publisher-name>), <fpage>164</fpage>&#x2013;<lpage>172</lpage>.</citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Howard</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Parker</surname>
<given-names>L. E.</given-names>
</name>
<name>
<surname>Sukhatme</surname>
<given-names>G. S.</given-names>
</name>
</person-group> (<year>2006</year>). <article-title>Experiments with a large heterogeneous mobile robot team: Exploration, mapping, deployment and detection</article-title>. <source>Int. J. Robotics Res.</source> <volume>25</volume>, <fpage>431</fpage>&#x2013;<lpage>447</lpage>. <pub-id pub-id-type="doi">10.1177/0278364906065378</pub-id>
</citation>
</ref>
<ref id="B19">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Isaacs</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>1999</year>). <source>Differential games: A mathematical theory with applications to warfare and pursuit, control and optimization</source>. <publisher-name>Courier Corporation</publisher-name>.</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kappel</surname>
<given-names>K. S.</given-names>
</name>
<name>
<surname>Cabreira</surname>
<given-names>T. M.</given-names>
</name>
<name>
<surname>Marins</surname>
<given-names>J. L.</given-names>
</name>
<name>
<surname>de Brisolara</surname>
<given-names>L. B.</given-names>
</name>
<name>
<surname>Ferreira</surname>
<given-names>P. R.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Strategies for patrolling missions with multiple UAVs</article-title>. <source>J. Intelligent Robotic Syst.</source> <volume>99</volume>, <fpage>499</fpage>&#x2013;<lpage>515</lpage>. <pub-id pub-id-type="doi">10.1007/s10846-019-01090-2</pub-id>
</citation>
</ref>
<ref id="B21">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Koveos</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Panousopoulou</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Kolyvas</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Reppa</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Koutroumpas</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Tsoukalas</surname>
<given-names>A.</given-names>
</name>
<etal/>
</person-group> (<year>2007</year>). &#x201c;<article-title>An integrated power aware system for robotic-based lunar exploration</article-title>,&#x201d; in <source>2007 IEEE/RSJ international conference on intelligent robots and Systems</source> (<publisher-name>IEEE</publisher-name>), <fpage>827</fpage>&#x2013;<lpage>832</lpage>.</citation>
</ref>
<ref id="B22">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Lee</surname>
<given-names>E. S.</given-names>
</name>
<name>
<surname>Shishika</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>Perimeter-defense game between aerial defender and ground intruder</article-title>,&#x201d; in <source>2020 59th IEEE conference on decision and control (CDC)</source> (<publisher-name>IEEE</publisher-name>), <fpage>1530</fpage>&#x2013;<lpage>1536</lpage>.</citation>
</ref>
<ref id="B23">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Lee</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Bakolas</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Optimal strategies for guarding a compact and convex target set: A differential game approach</article-title>,&#x201d; in <source>2021 60th IEEE conference on decision and control (CDC)</source> (<publisher-name>IEEE</publisher-name>), <fpage>4320</fpage>&#x2013;<lpage>4325</lpage>.</citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lykou</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Moustakas</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Gritzalis</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Defending airports from uas: A survey on cyber-attacks and counter-drone sensing technologies</article-title>. <source>Sensors</source> <volume>20</volume>, <fpage>3537</fpage>. <pub-id pub-id-type="doi">10.3390/s20123537</pub-id>
</citation>
</ref>
<ref id="B25">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Macharet</surname>
<given-names>D. G.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>A. K.</given-names>
</name>
<name>
<surname>Shishika</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Pappas</surname>
<given-names>G. J.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>Adaptive partitioning for coordinated multi-agent perimeter defense</article-title>,&#x201d; in <source>2020 IEEE/RSJ international conference on intelligent robots and Systems (IROS)</source> (<publisher-name>IEEE</publisher-name>), <fpage>7971</fpage>&#x2013;<lpage>7977</lpage>.</citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Margellos</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Lygeros</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>Hamilton&#x2013;Jacobi formulation for reach&#x2013;avoid differential games</article-title>. <source>IEEE Trans. automatic control</source> <volume>56</volume>, <fpage>1849</fpage>&#x2013;<lpage>1861</lpage>. <pub-id pub-id-type="doi">10.1109/tac.2011.2105730</pub-id>
</citation>
</ref>
<ref id="B27">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Ma&#x2019;sum</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Arrofi</surname>
<given-names>M. K.</given-names>
</name>
<name>
<surname>Jati</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Arifin</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Kurniawan</surname>
<given-names>M. N.</given-names>
</name>
<name>
<surname>Mursanto</surname>
<given-names>P.</given-names>
</name>
<etal/>
</person-group> (<year>2013</year>). &#x201c;<article-title>Simulation of intelligent unmanned aerial vehicle (UAV) for military surveillance</article-title>,&#x201d; in <source>2013 international conference on advanced computer science and information Systems (ICACSIS)</source>, <fpage>161</fpage>&#x2013;<lpage>166</lpage>. <pub-id pub-id-type="doi">10.1109/ICACSIS.2013.6761569</pub-id>
</citation>
</ref>
<ref id="B28">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>McGee</surname>
<given-names>T. G.</given-names>
</name>
<name>
<surname>Hedrick</surname>
<given-names>J. K.</given-names>
</name>
</person-group> (<year>2006</year>). &#x201c;<article-title>Guaranteed strategies to search for mobile evaders in the plane</article-title>,&#x201d; in <source>2006 American control conference</source> (<publisher-name>IEEE</publisher-name>), <fpage>2819</fpage>&#x2013;<lpage>2824</lpage>.</citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ozsoyeller</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Beveridge</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Isler</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>Symmetric rendezvous search on the line with an unknown initial distance</article-title>. <source>IEEE Trans. Robotics</source> <volume>29</volume>, <fpage>1366</fpage>&#x2013;<lpage>1379</lpage>. <pub-id pub-id-type="doi">10.1109/tro.2013.2272252</pub-id>
</citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Psaraftis</surname>
<given-names>H. N.</given-names>
</name>
</person-group> (<year>1988</year>). <article-title>Dynamic vehicle routing problems</article-title>. <source>Veh. routing Methods Stud.</source> <volume>16</volume>, <fpage>223</fpage>&#x2013;<lpage>248</lpage>.</citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ramachandran</surname>
<given-names>R. K.</given-names>
</name>
<name>
<surname>Pierpaoli</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Egerstedt</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Sukhatme</surname>
<given-names>G. S.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Resilient monitoring in heterogeneous multi-robot systems through network reconfiguration</article-title>. <source>IEEE Trans. Robotics</source> <volume>38</volume>, <fpage>126</fpage>&#x2013;<lpage>138</lpage>. <pub-id pub-id-type="doi">10.1109/tro.2021.3128313</pub-id>
</citation>
</ref>
<ref id="B32">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Ramachandran</surname>
<given-names>R. K.</given-names>
</name>
<name>
<surname>Preiss</surname>
<given-names>J. A.</given-names>
</name>
<name>
<surname>Sukhatme</surname>
<given-names>G. S.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Resilience by reconfiguration: Exploiting heterogeneity in robot teams</article-title>,&#x201d; in <source>2019 IEEE/RSJ international conference on intelligent robots and Systems (IROS)</source> (<publisher-name>IEEE</publisher-name>), <fpage>6518</fpage>&#x2013;<lpage>6525</lpage>.</citation>
</ref>
<ref id="B33">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Sabag</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Lale</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hassibi</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2022</year>). &#x201c;<article-title>Competitive-ratio and regret-optimal control with general weights</article-title>,&#x201d; in <source>2022 IEEE 61st conference on decision and control (CDC) (IEEE)</source>, <fpage>4859</fpage>&#x2013;<lpage>4864</lpage>. <pub-id pub-id-type="doi">10.1109/CDC51059.2022.9993106</pub-id>
</citation>
</ref>
<ref id="B34">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Santos</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Egerstedt</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Coverage control for multi-robot teams with heterogeneous sensing capabilities using limited communications</article-title>,&#x201d; in <source>2018 IEEE/RSJ international conference on intelligent robots and Systems (IROS)</source> (<publisher-name>IEEE</publisher-name>), <fpage>5313</fpage>&#x2013;<lpage>5319</lpage>.</citation>
</ref>
<ref id="B35">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Shishika</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>A review of multi agent perimeter defense games</article-title>,&#x201d; in <source>International conference on decision and game theory for security</source> (<publisher-name>Springer</publisher-name>), <fpage>472</fpage>&#x2013;<lpage>485</lpage>.</citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sleator</surname>
<given-names>D. D.</given-names>
</name>
<name>
<surname>Tarjan</surname>
<given-names>R. E.</given-names>
</name>
</person-group> (<year>1985</year>). <article-title>Amortized efficiency of list update and paging rules</article-title>. <source>Commun. ACM</source> <volume>28</volume>, <fpage>202</fpage>&#x2013;<lpage>208</lpage>. <pub-id pub-id-type="doi">10.1145/2786.2793</pub-id>
</citation>
</ref>
<ref id="B37">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Smith</surname>
<given-names>S. L.</given-names>
</name>
<name>
<surname>Bopardikar</surname>
<given-names>S. D.</given-names>
</name>
<name>
<surname>Bullo</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2009</year>). &#x201c;<article-title>A dynamic boundary guarding problem with translating targets</article-title>,&#x201d; in <source>Decision and control, 2009 held jointly with the 2009 28th Chinese control conference. CDC/CCC 2009</source> (<publisher-name>IEEE</publisher-name>), <fpage>8543</fpage>&#x2013;<lpage>8548</lpage>.</citation>
</ref>
<ref id="B38">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tavakoli</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Cabrita</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Faria</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Marques</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>de Almeida</surname>
<given-names>A. T.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>Cooperative multi-agent mapping of three-dimensional structures for pipeline inspection applications</article-title>. <source>Int. J. Robotics Res.</source> <volume>31</volume>, <fpage>1489</fpage>&#x2013;<lpage>1503</lpage>. <pub-id pub-id-type="doi">10.1177/0278364912461536</pub-id>
</citation>
</ref>
<ref id="B39">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Fuchs</surname>
<given-names>Z. E.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>Optimal constrained retreat within the turret defense differential game</article-title>,&#x201d; in <source>2020 IEEE conference on control Technology and applications (CCTA)</source> (<publisher-name>IEEE</publisher-name>), <fpage>611</fpage>&#x2013;<lpage>618</lpage>.</citation>
</ref>
<ref id="B40">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Fuchs</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Turret lock-on in an engage or retreat game</article-title>,&#x201d; in <source>American Control Conference</source>. <publisher-name>IEEE</publisher-name>, <fpage>3188</fpage>&#x2013;<lpage>3195</lpage>. <pub-id pub-id-type="doi">10.23919/ACC50511.2021.9483106</pub-id>
</citation>
</ref>
<ref id="B41">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Pachter</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Shishika</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Fuchs</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Circular target defense differential games</article-title>. <source>Trans. Automatic Control</source> <volume>68</volume>. <pub-id pub-id-type="doi">10.1109/TAC.2022.3203357</pub-id>
</citation>
</ref>
<ref id="B42">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Von Moll</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Shishika</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Fuchs</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Dorothy</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Turret&#x2013;runner&#x2013;penetrator differential game with role selection</article-title>. <source>Trans. Aerosp. Electron. Syst.</source> <volume>58</volume>, <fpage>5687</fpage>&#x2013;<lpage>5702</lpage>. <pub-id pub-id-type="doi">10.1109/TAES.2022.3176599</pub-id>
</citation>
</ref>
<ref id="B43">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhong</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Reach-avoid games with two defenders and one attacker: An analytical approach</article-title>. <source>IEEE Trans. Cybern.</source> <volume>49</volume>, <fpage>1035</fpage>&#x2013;<lpage>1046</lpage>. <pub-id pub-id-type="doi">10.1109/tcyb.2018.2794769</pub-id>
</citation>
</ref>
<ref id="B44">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhong</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Task assignment for multiplayer reach&#x2013;avoid games in convex domains via analytical barriers</article-title>. <source>IEEE Trans. Robotics</source> <volume>36</volume>, <fpage>107</fpage>&#x2013;<lpage>124</lpage>. <pub-id pub-id-type="doi">10.1109/tro.2019.2935345</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>