1,129 research outputs found

    Reoptimisation strategies for dynamic vehicle routing problems with proximity-dependent nodes

    Get PDF
    Autonomous vehicles create new opportunities as well as new challenges to dynamic vehicle routing. The introduction of autonomous vehicles as information-collecting agents results in scenarios, where dynamic nodes are found by proximity. This paper presents a novel dynamic vehicle-routing problem variant with proximity-dependent nodes. Here, we introduced a novel variable, detectability, which determines whether a proximal dynamic node will be detected, based on the sight radius of the vehicle. The problem considered is motivated by autonomous weed-spraying vehicles in large agricultural operations. This work is generalisable to many other autonomous vehicle applications. The first step to crafting a solution approach for the problem is to decide when reoptimisation should be triggered. Two reoptimisation trigger strategies are considered—exogenous and endogenous. Computational experiments compared the strategies for both the classical dynamic vehicle routing problem as well as the introduced variant. Experiments used extensive standardised vehicle-routing problem benchmarks with varying degrees of dynamism and geographical node distributions. The results showed that for both the classical problem and the novel variant, an endogenous trigger strategy is better in most cases, while an exogenous trigger strategy is only suitable when both detectability and dynamism are low. Furthermore, the optimal level of detectability was shown to be dependent on the combination of trigger, degree of dynamism, and geographical node distribution, meaning practitioners may determine the required detectability based on the attributes of their specific problem

    Collaborative Solutions to Visual Sensor Networks

    Get PDF
    Visual sensor networks (VSNs) merge computer vision, image processing and wireless sensor network disciplines to solve problems in multi-camera applications in large surveillance areas. Although potentially powerful, VSNs also present unique challenges that could hinder their practical deployment because of the unique camera features including the extremely higher data rate, the directional sensing characteristics, and the existence of visual occlusions. In this dissertation, we first present a collaborative approach for target localization in VSNs. Traditionally; the problem is solved by localizing targets at the intersections of the back-projected 2D cones of each target. However, the existence of visual occlusions among targets would generate many false alarms. Instead of resolving the uncertainty about target existence at the intersections, we identify and study the non-occupied areas in 2D cones and generate the so-called certainty map of targets non-existence. We also propose distributed integration of local certainty maps by following a dynamic itinerary where the entire map is progressively clarified. The accuracy of target localization is affected by the existence of faulty nodes in VSNs. Therefore, we present the design of a fault-tolerant localization algorithm that would not only accurately localize targets but also detect the faults in camera orientations, tolerate these errors and further correct them before they cascade. Based on the locations of detected targets in the fault-tolerated final certainty map, we construct a generative image model that estimates the camera orientations, detect inaccuracies and correct them. In order to ensure the required visual coverage to accurately localize targets or tolerate the faulty nodes, we need to calculate the coverage before deploying sensors. Therefore, we derive the closed-form solution for the coverage estimation based on the certainty-based detection model that takes directional sensing of cameras and existence of visual occlusions into account. The effectiveness of the proposed collaborative and fault-tolerant target localization algorithms in localization accuracy as well as fault detection and correction performance has been validated through the results obtained from both simulation and real experiments. In addition, conducted simulation shows extreme consistency with results from theoretical closed-form solution for visual coverage estimation, especially when considering the boundary effect

    Optimal Selection of Sampling Points within Sewer Networks for Wastewater-Based Epidemiology Applications

    Get PDF
    Wastewater-based epidemiology (WBE) has great potential to monitor community public health, especially during pandemics. However, it faces substantial hurdles in pathogen surveillance through WBE, encompassing data representativeness, spatiotemporal variability, population estimates, pathogen decay, and environmental factors. This paper aims to enhance the reliability of WBE data, especially for early outbreak detection and improved sampling strategies within sewer networks. The tool implemented in this paper combines a monitoring model and an optimization model to facilitate the optimal selection of sampling points within sewer networks. The monitoring model utilizes parameters such as feces density and average water consumption to define the detectability of the virus that needs to be monitored. This allows for standardization and simplicity in the process of moving from the analysis of wastewater samples to the identification of infection in the source area. The entropy-based model can select optimal sampling points in a sewer network to obtain the most specific information at a minimum cost. The practicality of our tool is validated using data from Hildesheim, Germany, employing SARS-CoV-2 as a pilot pathogen. It is important to note that the tool’s versatility empowers its extension to monitor other pathogens in the future

    Analysis of Error Propagation Between Software Processes

    Get PDF

    Assessing the Unmanned Aerial Vehicles' Surveillance Problems and Actual Solution Options from the Different Stakeholders' Viewpoint

    Get PDF
    The problems related to the integration of the unmanned aerial vehicles into national airspaces is one of the main topics that the scientific researchers are dealing with these days. Despite that, none of them are investigating the UAVs from the surveillance point of view. For that reason, highlighting the problems that have to be dealt with and assessing them through a holistic approach is the aim of the paper. Therefore, the paper takes the different stakeholders view and identify the key factors that have to be taken into account. The authors propose the surveillance technologies that can be considered and evaluated them along the revealed factors through a global view. The results can be applied as a base for the further research in UAVs surveillance domain

    Smart Metering System: Developing New Designs to Improve Privacy and Functionality

    Get PDF
    This PhD project aims to develop a novel smart metering system that plays a dual role: Fulfil basic functions (metering, billing, management of demand for energy in grids) and protect households from privacy intrusions whilst enabling them a degree of freedom. The first two chapters of the thesis will introduce the research background and a detailed literature review on state-of-the-art works for protecting smart meter data. Chapter 3 discusses theory foundations for smart meter data analytics, including machine learning, deep learning, and information theory foundations. The rest of the thesis is split into two parts, ‘Privacy’ and ‘Functionality’, respectively. In the ‘Privacy’ part, the overall smart metering system, as well as privacy configurations, are presented. A threat/adversary model is developed at first. Then a multi-channel smart metering system is designed to reduce the privacy risks of the adversary. Each channel of the system is responsible for one functionality by transmitting different granular smart meter data. In addition, the privacy boundary of the smart meter data in the proposed system is also discovered by introducing a data mining algorithm. By employing the algorithm, a three-level privacy boundary is concluded. Furthermore, a differentially private federated learning-based value-added service platform is designed to provide flexible privacy guarantees to consumers and balance the trade-off between privacy loss and service accuracy. In the ‘Functionality’ part, three feeder-level functionalities: load forecasting, solar energy separation, and energy disaggregation are evaluated. These functionalities will increase thepredictability, visibility, and controllability of the distributed network without utilizing household smart meter data. Finally, the thesis will conclude and summarize the overall system and highlight the contributions and novelties of this project
    • …
    corecore