217 research outputs found

    The Ant and the Trap: Evolution of Ant-Inspired Obstacle Avoidance in a Multi-Agent Robotic System

    Get PDF
    Interest in swarm robotics, particularly those modeled on biological systems, has been increasing with each passing year. We created the iAnt robot as a platform to test how well an ant-inspired robotic swarm could collect resources in an unmapped environment. Although swarm robotics is still a loosely defined field, one of the included hallmarks is multiple robots cooperating to complete a given task. The use of multiple robots means increased cost for research, scaling often linearly with the number of robots. We set out to create a system with the previously described capabilities while lowering the entry cost by building simple, cheap robots able to operate outside of a dedicated lab environment. Obstacle avoidance has long been a necessary component of robot systems. Avoiding collisions is also a difficult problem and has been studied for many years. As part of moving the iAnt further towards the real-world we needed a method of obstacle avoidance. Our hypothesis is that use of biological methods including evolution, stochastic movements and stygmergic trails into the iAnt Central Place Foraging Algorithm (CPFA) could result in robot behaviors suited to navigating obstacle-filled environments. The result is a modification of the CPFA to include pheromone trails, CPFA-Trails or CPFAT. This thesis first demonstrates the low-cost, simple and robust design of the physical iAnt robot. Secondly we will demonstrate the adaptability of the the system to evolve and succeed in an obstacle-laden environment

    PERFORMANCE ANALYSIS AND OPTIMIZATION OF QUERY-BASED WIRELESS SENSOR NETWORKS

    Get PDF
    This dissertation is concerned with the modeling, analysis, and optimization of large-scale, query-based wireless sensor networks (WSNs). It addresses issues related to the time sensitivity of information retrieval and dissemination, network lifetime maximization, and optimal clustering of sensor nodes in mobile WSNs. First, a queueing-theoretic framework is proposed to evaluate the performance of such networks whose nodes detect and advertise significant events that are useful for only a limited time; queries generated by sensor nodes are also time-limited. The main performance parameter is the steady state proportion of generated queries that fail to be answered on time. A scalable approximation for this parameter is first derived assuming the transmission range of sensors is unlimited. Subsequently, the proportion of failed queries is approximated using a finite transmission range. The latter approximation is remarkably accurate, even when key model assumptions related to event and query lifetime distributions and network topology are violated. Second, optimization models are proposed to maximize the lifetime of a query-based WSN by selecting the transmission range for all of the sensor nodes, the resource replication level (or time-to-live counter) and the active/sleep schedule of nodes, subject to connectivity and quality-of-service constraints. An improved lower bound is provided for the minimum transmission range needed to ensure no network nodes are isolated with high probability. The optimization models select the optimal operating parameters in each period of a finite planning horizon, and computational results indicate that the maximum lifetime can be significantly extended by adjusting the key operating parameters as sensors fail over time due to energy depletion. Finally, optimization models are proposed to maximize the demand coverage and minimize the costs of locating, and relocating, cluster heads in mobile WSNs. In these models, the locations of mobile sensor nodes evolve randomly so that each sensor must be optimally assigned to a cluster head during each period of a finite planning horizon. Additionally, these models prescribe the optimal times at which to update the sensor locations to improve coverage. Computational experiments illustrate the usefulness of dynamically updating cluster head locations and sensor location information over time

    Mobile Business as Strategic Tools in the US Airline Industry

    Get PDF
    This thesis analyzes opportunities and threats of mobile business in the context of the US airline industry as s strategic tool to create a sustainable competitive advantage through the implementation of an effective mobile business model. The analysis is based on the assumption that mobile airline strategies have to create a strategic fit with the business environment seen from an airline perspective. Forces inherent in the global environment as well as in the micro-environment are analyzed using environmental scanning as systematic technique. Exploratory data obtained from a focus group interview is added to the analysis in order to assess opportunities and threats and to extract the key success factors for airline m-business, which is found to have tremendous impact on the way an airline creates value to its customers. Key success factors discussed in this thesis are user experience, the value contribution of mobile technology, and customer requirements. Crucial elements found for matching these factors are to expedite and facilitate processes, the ability to integrate systems into a mobile infrastructure, and using devices that yield quick and inexpensive results

    Performance Evaluation of Ad Hoc Routing in a Swarm of Autonomous Aerial Vehicles

    Get PDF
    This thesis investigates the performance of three mobile ad hoc routing protocols in the context of a swarm of autonomous unmanned aerial vehicles (UAVs). It is proposed that a wireless network of nodes having an average of 5.1774 log n neighbors, where n is the total number of nodes in the network, has a high probability of having no partitions. By decreasing transmission range while ensuring network connectivity, and implementing multi-hop routing between nodes, spatial multiplexing is exploited whereby multiple pairs of nodes simultaneously transmit on the same channel. The proposal is evaluated using the Greedy Perimeter Stateless Routing (GPSR), Optimized Link State Routing (OLSR), and Ad hoc On-demand Distance Vector (AODV) routing protocols in the context of a swarm of UAVs using the OPNET network simulation tool. The first-known implementation of GPSR in OPNET is constructed, and routing performance is observed when routing protocol, number of nodes, transmission range, and traffic workload are varied. Performance is evaluated based on proportion of packets successfully delivered, average packet hop count, and average end-to-end delay of packets received. Results indicate that the routing protocol choice has a significant impact on routing performance. While GPSR successfully delivers 50% more packets than OLSR, and experiences a 53% smaller end-to-end delay than AODV when routing packets in a swarm of UAVs, increasing transmission range and using direct transmission to destination nodes with no routing results in a level of performance not achieved using any of the routing protocols evaluated

    Optimal sensor placement for sewer capacity risk management

    Get PDF
    2019 Spring.Includes bibliographical references.Complex linear assets, such as those found in transportation and utilities, are vital to economies, and in some cases, to public health. Wastewater collection systems in the United States are vital to both. Yet effective approaches to remediating failures in these systems remains an unresolved shortfall for system operators. This shortfall is evident in the estimated 850 billion gallons of untreated sewage that escapes combined sewer pipes each year (US EPA 2004a) and the estimated 40,000 sanitary sewer overflows and 400,000 backups of untreated sewage into basements (US EPA 2001). Failures in wastewater collection systems can be prevented if they can be detected in time to apply intervention strategies such as pipe maintenance, repair, or rehabilitation. This is the essence of a risk management process. The International Council on Systems Engineering recommends that risks be prioritized as a function of severity and occurrence and that criteria be established for acceptable and unacceptable risks (INCOSE 2007). A significant impediment to applying generally accepted risk models to wastewater collection systems is the difficulty of quantifying risk likelihoods. These difficulties stem from the size and complexity of the systems, the lack of data and statistics characterizing the distribution of risk, the high cost of evaluating even a small number of components, and the lack of methods to quantify risk. This research investigates new methods to assess risk likelihood of failure through a novel approach to placement of sensors in wastewater collection systems. The hypothesis is that iterative movement of water level sensors, directed by a specialized metaheuristic search technique, can improve the efficiency of discovering locations of unacceptable risk. An agent-based simulation is constructed to validate the performance of this technique along with testing its sensitivity to varying environments. The results demonstrated that a multi-phase search strategy, with a varying number of sensors deployed in each phase, could efficiently discover locations of unacceptable risk that could be managed via a perpetual monitoring, analysis, and remediation process. A number of promising well-defined future research opportunities also emerged from the performance of this research

    SciTech News [full issue]

    Get PDF
    • …
    corecore