161 research outputs found

    Building Evacuation with Mobile Devices

    Get PDF
    In der Dissertation wird ein Konzept fĂŒr ein GebĂ€udeevakuierungssystem vorgestellt, das es ermöglicht, Personen mit Hilfe mobiler EndgerĂ€te im Evakuierungsfall aus einem GebĂ€ude zu fĂŒhren. Die Dissertation gliedert sich in drei thematische Bereiche, in denen zunĂ€chst ein Konzept fĂŒr die Systemarchitektur vorgestellt wird und anschließend verschiedene Algorithmen zur Routenplanung sowie zur Lokalisierung der GerĂ€te vorgestellt und evaluiert werden

    Effects of Data Resolution and Human Behavior on Large Scale Evacuation Simulations

    Get PDF
    Traffic Analysis Zones (TAZ) based macroscopic simulation studies are mostly applied in evacuation planning and operation areas. The large size in TAZ and aggregated information of macroscopic simulation underestimate the real evacuation performance. To take advantage of the high resolution demographic data LandScan USA (the zone size is much smaller than TAZ) and agent-based microscopic traffic simulation models, many new problems appeared and novel solutions are needed. A series of studies are conducted using LandScan USA Population Cells (LPC) data for evacuation assignments with different network configurations, travel demand models, and travelers compliance behavior. First, a new Multiple Source Nearest Destination Shortest Path (MSNDSP) problem is defined for generating Origin Destination matrix in evacuation assignments when using LandScan dataset. Second, a new agent-based traffic assignment framework using LandScan and TRANSIMS modules is proposed for evacuation planning and operation study. Impact analysis on traffic analysis area resolutions (TAZ vs LPC), evacuation start times (daytime vs nighttime), and departure time choice models (normal S shape model vs location based model) are studied. Third, based on the proposed framework, multi-scale network configurations (two levels of road networks and two scales of zone sizes) and three routing schemes (shortest network distance, highway biased, and shortest straight-line distance routes) are implemented for the evacuation performance comparison studies. Fourth, to study the impact of human behavior under evacuation operations, travelers compliance behavior with compliance levels from total complied to total non-complied are analyzed.Comment: PhD dissertation. UT Knoxville. 130 pages, 37 figures, 8 tables. University of Tennessee, 2013. http://trace.tennessee.edu/utk_graddiss/259

    Adoption of vehicular ad hoc networking protocols by networked robots

    Get PDF
    This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan

    Novel applications and contexts for the cognitive packet network

    Get PDF
    Autonomic communication, which is the development of self-configuring, self-adapting, self-optimising and self-healing communication systems, has gained much attention in the network research community. This can be explained by the increasing demand for more sophisticated networking technologies with physical realities that possess computation capabilities and can operate successfully with minimum human intervention. Such systems are driving innovative applications and services that improve the quality of life of citizens both socially and economically. Furthermore, autonomic communication, because of its decentralised approach to communication, is also being explored by the research community as an alternative to centralised control infrastructures for efficient management of large networks. This thesis studies one of the successful contributions in the autonomic communication research, the Cognitive Packet Network (CPN). CPN is a highly scalable adaptive routing protocol that allows for decentralised control in communication. Consequently, CPN has achieved significant successes, and because of the direction of research, we expect it to continue to find relevance. To investigate this hypothesis, we research new applications and contexts for CPN. This thesis first studies Information-Centric Networking (ICN), a future Internet architecture proposal. ICN adopts a data-centric approach such that contents are directly addressable at the network level and in-network caching is easily supported. An optimal caching strategy for an information-centric network is first analysed, and approximate solutions are developed and evaluated. Furthermore, a CPN inspired forwarding strategy for directing requests in such a way that exploits the in-network caching capability of ICN is proposed. The proposed strategy is evaluated via discrete event simulations and shown to be more effective in its search for local cache hits compared to the conventional methods. Finally, CPN is proposed to implement the routing system of an Emergency Cyber-Physical System for guiding evacuees in confined spaces in emergency situations. By exploiting CPN’s QoS capabilities, different paths are assigned to evacuees based on their ongoing health conditions using well-defined path metrics. The proposed system is evaluated via discrete-event simulations and shown to improve survival chances compared to a static system that treats evacuees in the same way.Open Acces

    Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Get PDF
    A mobile ad hoc network (MANET) is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP) model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR), destination-sequenced distance-vector routing (DSDV), and ad hoc n-demand distance vector routing (AODV). The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To conclude, it is possible to develop a range of techniques for modelling scenarios applicable to MANETs, and these simulation models could be utilised for the evaluation of routing protocols

    Generative Modeling of Human Behavior: Social Interaction and Networked Coordination in Shared Facilities

    Get PDF
    Urbanization is bringing together various modes of transport, and with that, there are challenges to maintaining the safety of all road users, especially vulnerable road users (VRUs). Therefore, there is a need for street designs that encourages cooperation and resource sharing among road users. Shared space is a street design approach that softens the demarcation of vehicles and pedestrian traffic by reducing traffic rules, traffic signals, road markings, and regulations. Understanding the interactions and trajectory formations of various VRUs will facilitate the design of safer shared spaces. It will also lead to many applications, such as implementing reliable ad hoc communication networks. In line with this motivation, this dissertation develops a methodology for generating VRUs\u27 trajectories that accounts for their walking behaviors and social interactions. The performed study leads to three traffic scenarios covering most pedestrian behavior and interactions traffic scenarios - group interactions, fixed obstacle interaction, and moving obstacle interaction. To implement the different scenarios in shared space facilities, we develop a receding horizon optimization-based trajectory planning algorithm capable of modeling pedestrian behavior and interactions. The generated trajectories are validated using two benchmark pedestrian datasets – DUT and TrajNet++. The validation is shown to yield low or near-zero Mean Euclidean Distance and Final Displacement Error values supporting the performance validity of the proposed generative algorithm. We further demonstrate the application of generated trajectories to predict the communication network topology formation, which leads to a stable network formation when integrated within ad hoc protocols. The developed pedestrian trajectory planning algorithm can be expanded as a simulation framework to provide a more realistic demonstration of how pedestrians use traffic facilities and interact with their environment. Moreover, the model\u27s applicability is not limited to road traffic and shared spaces. It can find broader applications such as the emergency evacuation of buildings, large events, airports, and railway stations

    Information Systems for Supporting Fire Emergency Response

    Get PDF
    Despite recent work on information systems, many first responders in emergency situations are unable to develop sufficient understanding of the situation to enable them to make good decisions. The record of the UK Fire and Rescue Service (FRS) has been particularly poor in terms of providing the information systems support to the fire fighters decision-making during their work. There is very little work on identifying the specific information needs of different types of fire fighters. Consequently, this study has two main aims. The first is to identify the information requirements of several specific members of the FRS hierarchy that lead to better Situation Awareness. The second is to identify how such information should be presented. This study was based on extensive data collected in the FRS brigades of three counties and focused on large buildings having a high-risk of fire and four key fire fighter job roles: Incident Commander, Sector Commander, Breathing Apparatus Entry Control Officer and Breathing Apparatus Wearers. The requirements elicitation process was guided by a Cognitive Task Analysis (CTA) tool: Goal Directed Information Analysis (GDIA), which was developed specifically for this study. Initially appropriate scenarios were developed. Based on the scenarios, 44 semi-structured interviews were carried out in three different elicitation phases with both novice and experienced fire fighters. Together with field observations of fire simulation and training exercises, fire and rescue related documentation; a comprehensive set of information needs of fire fighters was identified. These were validated through two different stages via 34 brainstorming sessions with the participation of a number of subject-matter experts. To explore appropriate presentation methods of information, software mock-up was developed. This mock-up is made up of several human computer interfaces, which were evaluated via 19 walkthrough and workshop sessions, involving 22 potential end-users and 14 other related experts. As a result, many of the methods used in the mock-up were confirmed as useful and appropriate and several refinements proposed. The outcomes of this study include: 1) A set of GDI Diagrams showing goal related information needs for each of the job roles with the link to their decision-making needs, 2) A series of practical recommendations suitable for designing of human computer interfaces of fire emergency response information system, 3) Human computer interface mock-ups for an information system to enhance Situation Awareness of fire fighters and 4) A conceptual architecture for the underlying information system. In addition, this study also developed an enhanced cognitive task analysis tool capable of exploring the needs of emergency first responders. This thesis contributes to our understanding of how information systems could be designed to enhance the Situation Awareness of first responders in a fire emergency. These results will be of particular interest to practicing information systems designers and developers in the FRS in the UK and to the wider academic community

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms
    • 

    corecore