1,737 research outputs found

    Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies, Multiagent System Paradigm, and Natural Ecosystems

    Get PDF
    Wireless sensor networks (WSNs) are key components in the emergent cyber physical systems (CPSs). They may include hundreds of spatially distributed sensors which interact to solve complex tasks going beyond their individual capabilities. Due to the limited capabilities of sensors, sensor actions cannot meet CPS requirements while controlling and coordinating the operations of physical and engineered systems. To overcome these constraints, we explore the ecosystem metaphor for WSNs with the aim of taking advantage of the efficient adaptation behavior and communication mechanisms of living organisms. By mapping these organisms onto sensors and ecosystems onto WSNs, we highlight shortcomings that prevent WSNs from delivering the capabilities of ecosystems at several levels, including structure, topology, goals, communications, and functions. We then propose an agent-based architecture that migrates complex processing tasks outside the physical sensor network while incorporating missing characteristics of autonomy, intelligence, and context awareness to the WSN. Unlike existing works, we use software agents to map WSNs to natural ecosystems and enhance WSN capabilities to take advantage of bioinspired algorithms. We extend our architecture and propose a new intelligent CPS framework where several control levels are embedded in the physical system, thereby allowing agents to support WSNs technologies in enabling CPSs

    Self-Organizing Mobility Control in Wireless Sensor and Actor Networks Based on Virtual Electrostatic Interactions

    Get PDF
    This paper introduces a new mobility control method for surveillance applications of wireless sensor and actor networks. The proposed method is based on virtual electrostatic forces which act on actors to coordinate their movements. The definition of virtual forces is inspired by Coulomb’s law from physics. Each actor calculates the virtual forces independently based on known locations of its neighbours and predetermined borders of the monitored area. The virtual forces generate movements of actors. This approach enables effective deployment of actors at the initial stage as well as adaptation of actors’ placement to variable conditions during execution of the surveillance task without the need of any central controller. Effectiveness of the introduced method was experimentally evaluated in a simulation environment. The experimental results demonstrate that the proposed method enables more effective organization of the actors’ mobility than state-of-the-art approaches

    Revolutionaries and spies on random graphs

    Get PDF
    Pursuit-evasion games, such as the game of Revolutionaries and Spies, are a simplified model for network security. In the game we consider in this paper, a team of rr revolutionaries tries to hold an unguarded meeting consisting of mm revolutionaries. A team of ss spies wants to prevent this forever. For given rr and mm, the minimum number of spies required to win on a graph GG is the spy number σ(G,r,m)\sigma(G,r,m). We present asymptotic results for the game played on random graphs G(n,p)G(n,p) for a large range of p=p(n),r=r(n)p = p(n), r=r(n), and m=m(n)m=m(n). The behaviour of the spy number is analyzed completely for dense graphs (that is, graphs with average degree at least n^{1/2+\eps} for some \eps > 0). For sparser graphs, some bounds are provided

    Energy efficient path planning and model checking for long endurance unmanned surface vehicles.

    Get PDF
    In this dissertation, path following, path planning, collision avoidance and model checking algorithms were developed and simulated for improving the level of autonomy for Unmanned Surface Vehicle (USV). Firstly, four path following algorithms, namely, Carrot Chasing, Nonlinear Guidance Law, Pure pursuit and LOS, and Vector Field algorithms, were compared in simulation and Carrot Chasing was tested in Unmanned Safety Marine Operations Over The Horizon (USMOOTH) project. Secondly, three path planning algorithms, including Voronoi-Visibility shortest path planning, Voronoi-Visibility energy efficient path planning and Genetic Algorithm based energy efficient path planning algorithms, are presented. Voronoi-Visibility shortest path planning algorithm was proposed by integrating Voronoi diagram, Dijkstra’s algorithm and Visibility graph. The path quality and computational efficiency were demonstrated through comparing with Voronoi algorithms. Moreover, the proposed algorithm ensured USV safety by keeping the USV at a configurable clearance distance from the coastlines. Voronoi-Visibility energy efficient path planning algorithm was proposed by taking sea current data into account. To address the problem of time-varying sea current, Genetic Algorithm was integrated with Voronoi-Visibility energy efficient path planning algorithm. The energy efficiency of Voronoi-Visibility and Genetic Algorithm based algorithms were demonstrated in simulated missions. Moreover, collision avoidance algorithm was proposed and validated in single and multiple intruders scenarios. Finally, the feasibility of using model checking for USV decision-making systems verification was demonstrated in three USV mission scenarios. In the final scenario, a multi-agent system, including two USVs, an Unmanned Aerial Vehicle (UAV), a Ground Control Station (GCS) and a wireless mesh network, were modelled using Kripke modelling algorithm. The modelled uncertainties include communication loss, collision risk, fault event and energy states. Three desirable properties, including safety, maximum endurance, and fault tolerance, were expressed using Computational Tree Logic (CTL), which were verified using Model Checker for Multi-Agent System (MCMAS). The verification results were used to retrospect and improve the design of the decision-making system.PhD in Aerospac

    On a test-bed application for the ART-WiSe framework

    Get PDF
    This report describes the development of a Test-bed Application for the ART-WiSe Framework with the aim of providing a means of access, validate and demonstrate that architecture. The chosen application is a kind of pursuit-evasion game where a remote controlled robot, navigating through an area covered by wireless sensor network (WSN), is detected and continuously tracked by the WSN. Then a centralized control station takes the appropriate actions for a pursuit robot to chase and “capture” the intruder one. This kind of application imposes stringent timing requirements to the underlying communication infrastructure. It also involves interesting research problems in WSNs like tracking, localization, cooperation between nodes, energy concerns and mobility. Additionally, it can be easily ported into a real-world application. Surveillance or search and rescue operations are two examples where this kind of functionality can be applied. This is still a first approach on the test-bed application and this development effort will be continuously pushed forward until all the envisaged objectives for the Art-WiSe architecture become accomplished

    Social Eavesdropping in Zebrafish

    Get PDF
    Group living animals may eavesdrop on signalling interactions between conspecifics. This enables them to collect adaptively relevant information about others, without incurring in the costs of first-hand information acquisition. Such ability, aka social eavesdropping, is expected to impact Darwinian fitness and hence predicts the evolution of cognitive processes that enable social animals to use social information available in the environment.(...

    Advanced Air and Missile Defense under Spatial Grasp Technology

    No full text
    A novel control ideology and technology for solving tasks in large distributed networked systems will be briefed. Based on active scenarios self-navigating and self-matching distributed spaces in a highly organized super-virus mode, it can effectively establish global control over large systems of any natures. The technology can use numerous scattered and dissimilar facilities in an integral and holistic way, allow-ing them to work together in goal-driven supercomputer mode. The approach can be useful for advanced air and missile defense in a variety of ways, some of which described and explained in this paper. The re-lated material has been accepted for presentation at The 12th 3AF Integrated Air and Missile Defence in-ternational conference, June 27–29, Stockholm, Sweden, http://3af-integratedairmissiledefence.com.Коротко викладено нову ідеологію та технологію керування для вирішення задач у великих мережевих системах. Запропонований підхід, який базується на активних сценаріях, що здійснюють самонавігацію і самосинхронізацію в розподілених просторах у режимі організованого супервіруса, може встановлювати глобальний контроль над системами довільної природи. Технологія дозволяє ефективно інтегрувати безліч розрізнених та неоднорідних об’єктів, дозволяючи їм працювати разом у цілеспрямованому суперкомп’ютерному режимі. Вона може бути корисною для перспективної протиповітряної та протиракетної оборони різними способами; деякі з них викладені та пояснені у цій статті. Відповідний матеріал прийнятий для презентації на 12-й Міжнародній конференції з Інтегрованої протиповітряної і протиракетної оборони, 27–29 червня в Стокгольмі, Швеція, http://3af-integratedairmissiledefence.com.Кратко изложены новая идеология и технология управления для решения задач в больших сетевых системах. Предложенный подход, основанный на активных сценариях, осуществляющих самонавигацию и самосинхронизацию в распределенных пространствах в режиме организованного супервируса, может устанавливать глобальный контроль над системами любой природы. Технология позволяет эффективно интегрировать множество разрозненных и разнородных объектов, позволяя им работать совместно в целенаправленном суперкомпьютерном режиме. Она может быть полезна для перспективной противовоздушной и противоракетной обороны разными способами; некоторые из них изложены и объяснены в этой статье. Соответствующий материал принят для представления на 12-й Международной конференции по интегрированной противовоздушной и противоракетной обороне, 27–29 июня в Стокгольме, Швеция, http://3af-integratedairmissiledefence.com
    corecore