# Mobile Lazy Guards: The Art Gallery Problem

Superior Essays
Mobile Lazy Guards

Kailan Patel
Nottingham Trent University
N0672831
December 10, 2017

ABSTRACT
The Art Gallery problem is well known in computational geometry and a real life problem is the Lazy Guard Problem; “Given a polygon, choose a minimum number of stations (points) in the polygon such that a mobile guard that visits all stations will guard the entire polygon.” [1] Furthermore, a polygon that can be guarded with an X number of stations is said to be lazy X guardable.

Keywords: Lazy Guards, Simple Lazy Guards, Mobile Guards, Stations, Piecewise Linear Chain.

Introduction
The Lazy guard problem involves mobile guards and was first introduced by Paul Colly, Henk Meijer and David Rappaport. It is another variation to the Art Gallery
For example, as seen in the second polygon (see Figure 2.) this polygon requires 3 stations. We assume that the guards will start and finish at the same point and they will want to minimise the distance they walk, therefore the guard will pick the shortest route to get from one station to another covering all stations ABCA (the short lazy guard problem). However, with three points, the order in which each station is visited makes a difference. For example, the guard is unable to go from ACABAC, as this will mean not all points on the polygon P are visible at all times. For polygons only containing one or two stations, the ordering will not make a …show more content…
Lemma 2: “If a polygon is guardable using k stations, it can also be guarded with k stations located on the boundary of P.” [2]

Definition 2: A piecewise linear chain is a connected series of lines ending on itself that is formed by a sequence of straight-line segment.

Proof:
The guard's polygon is a piecewise linear chain, extend the end segments of the chain until they reach the edge of the polygon. The stations have to be moved to where the chain reaches the edge of the polygon, which includes the original guard’s problem therefore any point P on the polygon can be guarded.

Figure 3

Theorem 3: “Any simple polygon which is lazy guardable may be guarded with the same number of stations placed on the boundary of the polygon.” [1]

Lemma 4: “A simple polygon is lazy k guardable (with k 2) if and only if it admits a choice of k end points so as to form a k-street.” [1]

Lemma 5: “The chain C (s, t) is weakly visible from C (s, t) if and only if C (s, t) does not contain a clockwise or counter-clockwise component.”

## Related Documents

• Superior Essays

This algorithm takes the security parameter σ as input to create the following parameters: q as a large prime, two groups G_1,G_2 of order q and a bilinear map e ̂:G_1×G_1→ G_2,g is a random generator of G_1, e is random element of Z_q^* and one cryptographic hash Functions H:〖{0,1}〗^*⟶G_1. FilEncrypt: To protect data privacy and undesired accesses, the file collection F should be encrypted before outsourcing them onto remote servers which are not within their trusted domains. To do so, S encrypts each file F_i∈F using a standard symmetric encryption algorithm(AES). Each file F_i comprising of an unique identifier 〖ID〗_i∈〖{0,1}〗^n. To protect the file identifiers 〖ID〗_i, S encrypts this 〖DI〗_i also with AES encryption technique, such technique assurances that if the same file identifier is encrypted multiple times, it will create different ciphertexts but all decrypted to the same value.…

• 2042 Words
• 8 Pages
Superior Essays
• Superior Essays

Energy only transfers from one thing to another, but do not add or minus from the physical universe. As a result, only a thing can own energy can cause the transfer of energy: either it receive energy from others, or give energy to others. However, nonphysical beings do not have energy. Therefore nonphysical cannot transfer energy. Therefore, because causally influencing physical events requires transformation of energy, and nonphysical being cannot transfer energy, nonphysical beings cannot causally influence physical events.…

• 772 Words
• 4 Pages
Superior Essays
• Improved Essays

There are two ways to expound a SOM. Since, the whole weight vectors of a neighborhood nodes move in a same direction, SOM form a map that all close to each other and separating them is impossible. Therefore, we use U-Matrix method to visualize differences in this study. STEPS SUMMARY: 1. In first step we was modeling and analyzing some square shaped structure with ABAQUS and used results to solve finite-element partial differential equation adaptive to structural analysis.…

• 1393 Words
• 6 Pages
Improved Essays
• Great Essays

The most effective method to HIRE A MOUSE EXTERMINATOR Mice are an issue that all mortgage holders need to manage sooner or later. Be that as it may, regardless of the possibility that you aren't certain in the event that you have an irritation issue, it's best to get your home assessed by an exterminator. Exterminators will have the capacity to see the indications of a rat pervasion before you will, and can stop the issue ideal in its tracks. Not just do rodents show a conceivable issue with the outside structure of your home, they are likewise harbingers of ailment and can convey littler bugs, similar to bugs and ticks. Since rats and mice can conceive an offspring so rapidly, one mouse can transform into 40 in only a month.…

• 1069 Words
• 5 Pages
Great Essays
• Improved Essays

Eighth, specific leadership issue is the organization does not address or hold public forums to gauge homeland security concerns with current and future products, services, and operations.(Fisher,2013). The first specific strategic planning issue is the organization may not have any strategic plans in place for homeland security, and this type of issue hurts the organization overall structure for homeland security. The second specific strategic planning issue is that there is not a vision in place that shows specific strategic objectives to executed a plan for homeland security issues in this organization. The third specific strategic planning issue is there are some key factors not being considered in homeland security strategic plan like a problem in its corporate intranet system or a problem with transportation. The fourth specific strategic planning issue is problems with transportation can mess with shipping and receiving goods and services and hurt supply chain needs.…

• 842 Words
• 4 Pages
Improved Essays
• Superior Essays

and replaces them with less effective and apt words. This also results in lots of thoughts actually becoming limited and therefore citizens do not have their own critical thinking, and thus do what they are told to do, and do nothing of their own. (Literary Analysis Essay, 2013) “Don’t you see the whole aim of Newspeak is to narrow the range of thought? In the end we shall make thoughtcrime literally impossible, because there will be no words in which to express it. Every concept that can ever be needed will be expressed by exactly one…

• 1888 Words
• 8 Pages
Superior Essays
• Superior Essays

The first known use of boredom dates back to 1852, and is defined as “the state of being weary and restless through lack of interest.” Bill Wasik discusses his evolution to boredom in his essay entitled, “My Crowd Experiment: The Mob Project.” Bill coined the term “Flash Mob”. Influenced by Stanley Milgram, through the use of technology, he executed a total of 6 successful whimsical social experiments whose only goal was to attract a crowd. Milgram elegantly documented the essences of herd behavior, what economists call a “bandwagon affect”; the instinctive tendency of the human animal to rely on the actions of others in choosing its own course of action, thanks to a fear of missing out. We get interested in what we see others getting interested in (Wasik, 522). Suffering with what Wasik refers to as acute boredom, the MOB Project was born.…

• 1063 Words
• 5 Pages
Superior Essays
• Improved Essays

Theorem 3.2. Suppose that u ∈ Cp+1(Ω); s = 1; 2;∞;Ω ⊂ R2 and that uh ∈ Wh on a quasi-uniform family {Qh} of meshes on Ω into quadrilaterals. Then a necessary condition for ∥u − uh∥ Ls(Ω) = O(hp+1) is for uh to be Wp+1 s smooth. In particular, for ∥u − uh∥ L∞(Ω) = O(hp+1) a necessary condition is that all the kth partial derivatives at xi ∈ T satisfy (41) @ (u − uh)(xi) = O(hp+1−k); | | = k; 0 ≤ k ≤ p: In other words, we have a simultaneous approximation result. Here all smoothness refers to interior smoothness and {xi} is any collection of points, one from each element.…

• 1571 Words
• 7 Pages
Improved Essays
• Improved Essays

Suppose the system contains n_od nodes that will be divided into number of Rendezvous geographic Zones (〖RG〗_Z) based on their geographic area. Each zone will have number of nodes n_od ranges from max┬i⁡celi to min┬i⁡flo depend on their area load. This will achieves O(log(AVG [max┬i⁡celi , min┬i⁡flo] ) running time. These zones are categorized as follows and so on. Then instead of hashing all the nodes in the system, we start hashing each node in a specific zone by using spooky hash function illustrated in next subsection, then based on the hashes obtained the nodes are organized in levels (level 1 to 3 based on number of nodes) and the node with the highest weighted hash in the upper level will be assigned as coordinator of this level 〖C(j)〗_(m.x)^n, where n is the zone number, m is the level the coordinator in and x is the coordinator ID.…

• 2049 Words
• 9 Pages
Improved Essays
• Great Essays

The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013). Method for data exfiltration includes: Backdoors: This method used by the attacker to capture keystrokes, as well as video and audio of the system’s environment, using attached audio microphones and video cameras File transfer protocols Abuse: Attackers can abuse legitimate Windows features as well. For instance, attackers can…

• 1307 Words
• 6 Pages
Great Essays