Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Development of a Centralized Conflict Free Greedy Assignment Learning Spiking Neural Network for Solving a Perimeter Defense Problem
Department of Aerospace Engineering, Indian Institute of Science, Bengaluru, India.ORCID iD: 0000-0002-9292-4408
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Signals and Systems.ORCID iD: 0000-0002-6906-653X
Department of Aerospace Engineering, Indian Institute of Science, Bengaluru, India.ORCID iD: 0000-0001-6275-0921
Department of Aerospace Engineering, Indian Institute of Science, Bengaluru, India.ORCID iD: 0000-0002-6972-8775
2026 (English)In: Unmanned Systems, ISSN 2301-3850, E-ISSN 2301-3869, Vol. 14, no 2, p. 357-367Article in journal (Refereed) Published
Abstract [en]

In this paper, a Centralized Conflict-free Assignment Learning Spiking neural network (C2ALS) is formulated for solving a Perimeter Defense Problem (PDP). Here, the region between the perimeter and the sensing range of the defender is divided into two layers. The outermost layer, in which the defender can only sense the intruders, is termed the sensing layer. The layer closest to the perimeter in which the defenders can sense and capture the intruders is termed the capture layer. Both layers are further divided into angular segments with respect to the center of the area to be protected. The spatiotemporal movements of both the defenders and intruders in these segments are converted into spikes and given as input to a Spiking Neural Network (SNN). The SNN is trained in a supervised manner to learn the intruder capture assignments of a defender in terms of these segments. Here, the desired assignments required for training a defender are referred to as greedy assignments because while generating them, priority is given to those segments that are relatively closer to the defender’s actual location. Inhibitory connections are used in the SNN architecture to obtain assignments without conflicts. Detailed performance study results show that the proposed C2ALS approach outperforms the other existing centralized optimization-based solutions for PDP by a 17% increase in the success rates of capturing the intruders. Also, C2ALS is the first centralized spike-based learning solution for PDP, capable of generating conflict-free assignments while ensuring robust intruder assignments with minimal defender movement.

Place, publisher, year, edition, pages
World Scientific , 2026. Vol. 14, no 2, p. 357-367
Keywords [en]
Perimeter Defense Problem (PDP), Spiking Neural Network (SNN), Inhibitory connections, Greedy
National Category
Computer Systems Artificial Intelligence
Research subject
Robotics and Artificial Intelligence
Identifiers
URN: urn:nbn:se:ltu:diva-111928DOI: 10.1142/S2301385026500044ISI: 001428523900001Scopus ID: 2-s2.0-85219049496OAI: oai:DiVA.org:ltu-111928DiVA, id: diva2:1943307
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2026-03-06

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Velhal, Shridhar

Search in DiVA

By author/editor
Thousif, MohammedVelhal, ShridharSundaram, SureshSundararajan, Narasimhan
By organisation
Signals and Systems
In the same journal
Unmanned Systems
Computer SystemsArtificial Intelligence

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 51 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf