Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (14)

Search Parameters:
Keywords = Floyd–Warshall

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 2603 KiB  
Article
Modelling the Shortest Path for Inner Warehouse Travelling Using the Floyd–Warshall Algorithm
by Noraimi Azlin Mohd Nordin, S. Sarifah Radiah Shariff, Siti Suzlin Supadi and Ilyas Masudin
Mathematics 2024, 12(17), 2698; https://doi.org/10.3390/math12172698 - 29 Aug 2024
Viewed by 890
Abstract
Order picking is referred as a critical process of selecting items requested by a customer in a warehouse. Meeting the demand of every customer is the main objective in this area. Large warehouses pose a challenge since the order-picking process is slowed considerably [...] Read more.
Order picking is referred as a critical process of selecting items requested by a customer in a warehouse. Meeting the demand of every customer is the main objective in this area. Large warehouses pose a challenge since the order-picking process is slowed considerably by the lengthy time it takes to transport items across the warehouse. Throughout the study, the system is hoped to develop proper procedures in the order-picking process. In handling this scenario, the decision-makers need to take any possible action to ensure the warehouses can keep operating and meeting the requirements and satisfaction of the customers. Due to this, the study’s main objective is to determine whether the Floyd–Warshall algorithm or the dynamic programming method will give the most accurate shortest path and minimum travel distance for order pickers. Two data sets (nine nodes and nineteen nodes) are used to determine the optimal path and minimum travel distance for the order picker to meet and satisfy customer orders for the warehouse. The two models were modified and applied to address real-world case studies from the automotive manufacturing company in Malaysia. The results show a big difference between the total distance by 113.48% for 19 nodes. Through this finding, the company may choose which method suits their preferences. Concurrently, this study may also contribute to problem-solving issues in any warehouse operation with a similar procedure. Full article
Show Figures

Figure 1

Figure 1
<p>The procedure of order picking in the warehouse under study.</p>
Full article ">Figure 2
<p>Layout plan for Zone 1.</p>
Full article ">Figure 3
<p>Network layout structure in Zone 1.</p>
Full article ">Figure 4
<p>Flowchart of the Floyd–Warshall algorithm (Triana &amp; Syahputri, 2018) [<a href="#B20-mathematics-12-02698" class="html-bibr">20</a>].</p>
Full article ">Figure 5
<p>Shortest path for <span class="html-italic">n</span> = 9.</p>
Full article ">Figure 6
<p>Shortest path for <span class="html-italic">n</span> = 19.</p>
Full article ">Figure 7
<p>Shortest path using the DP method for <span class="html-italic">n</span> = 9.</p>
Full article ">Figure 8
<p>Shortest path when <span class="html-italic">n</span> = 19 (without limited packing capacity).</p>
Full article ">Figure 9
<p>Shortest path when <span class="html-italic">n</span> = 19 (with limited packing capacity).</p>
Full article ">
19 pages, 2270 KiB  
Article
Heuristic Greedy-Gradient Route Search Method for Finding an Optimal Traffic Distribution in Telecommunication Networks
by Konstantin Gaipov, Daniil Tausnev, Sergey Khodenkov, Natalya Shepeta, Dmitry Malyshev, Aleksey Popov and Lev Kazakovtsev
Algorithms 2024, 17(1), 7; https://doi.org/10.3390/a17010007 - 23 Dec 2023
Viewed by 1914
Abstract
Rapid growth in the volume of transmitted information has lead to the emergence of new wireless networking technologies with variable heterogeneous topologies. With limited radio frequency resources, optimal routing problems arise, both at the network design stage and during its operation. We propose [...] Read more.
Rapid growth in the volume of transmitted information has lead to the emergence of new wireless networking technologies with variable heterogeneous topologies. With limited radio frequency resources, optimal routing problems arise, both at the network design stage and during its operation. We propose an algorithm based on a minimum loss intensity (greedy-gradient algorithm) to search for optimal routes of information transmission in telecommunication networks. The relevance of the developed algorithm is determined by its practical use in data-transmitting modeling systems. The proposed algorithm satisfies several requirements, such as the speed of the calculations performed, the fulfillment of the conditions for its convergence, and its independence on the selected loss probability function, as well as on the network topology. The idea of the algorithm is a step-by-step recalculation of metrics based on derivatives of the loss intensity function with simultaneous redistribution of information flows along the routes determined by the Floyd algorithm. The comparative efficiency of the proposed algorithm is demonstrated by computational experiments on various network topologies (up to 100 nodes) with various traffic intensities. Full article
Show Figures

Figure 1

Figure 1
<p>Example of a simple network.</p>
Full article ">Figure 2
<p>Dependence of channel bandwidth capacity on changes in the intensity of information loss. Blue curve—the 1st channel, red curve—the 2nd channel.</p>
Full article ">Figure 3
<p>Example of a network with eight nodes and three information routes (colored arrows).</p>
Full article ">Figure 4
<p>Dependence of information intensity flow changes in channels. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Histogram of the distribution of objective function values.</p>
Full article ">Figure 6
<p>Distribution of matching route parts.</p>
Full article ">Figure 7
<p>Modelling results for 20 target requests. Request intensity varies from 1 to 50 in steps of 0.1. All results are shown. <math display="inline"><semantics> <msup> <mi>S</mi> <mrow> <mo>&lt;</mo> <mn>4</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (red): target request flow rate, <math display="inline"><semantics> <msup> <mi>S</mi> <mrow> <mo>&lt;</mo> <mn>6</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (blue): transmission ratio, <math display="inline"><semantics> <msup> <mi>S</mi> <mrow> <mo>&lt;</mo> <mn>7</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (black): number of routes, <math display="inline"><semantics> <msup> <mi>S</mi> <mrow> <mo>&lt;</mo> <mn>8</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (pink): calculation time (ms).</p>
Full article ">Figure 8
<p>Modelling results for 20 target requests. Request intensity varies from 1 to 50 in steps of 0.1. Only results with granted transfer of all the requests are shown. <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mo>&lt;</mo> <mn>4</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (red): target request flow rate, <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mo>&lt;</mo> <mn>7</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (blue): number of routes, <math display="inline"><semantics> <msup> <mi>Q</mi> <mrow> <mo>&lt;</mo> <mn>8</mn> <mo>&gt;</mo> </mrow> </msup> </semantics></math> (black): calculation time (ms).</p>
Full article ">Figure 9
<p>Change in calculation time and the number of total number of routes when the condition of the 1st mode is met. <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>3</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (red): number of target requests, <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>7</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (blue): number of routes, <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>8</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (black): calculation time.</p>
Full article ">Figure 10
<p>Change in calculation time and the number of total number of routes when the condition of the 2nd mode is met. <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>3</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (red): number of target requests, <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>7</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (blue): number of routes, <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>8</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (black): calculation time.</p>
Full article ">Figure 11
<p>Change in calculation time and the number of total number of routes when the condition of the 3rd mode is met. <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>3</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (red): number of target requests, <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>7</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (blue): number of routes, <math display="inline"><semantics> <mrow> <mi>M</mi> <msup> <mn>1</mn> <mrow> <mo>&lt;</mo> <mn>8</mn> <mo>&gt;</mo> </mrow> </msup> </mrow> </semantics></math> (black): calculation time.</p>
Full article ">
13 pages, 3142 KiB  
Article
Identifying the Shortest Path of a Semidirected Graph and Its Application
by Rakhi Das, Laxminarayan Sahoo, Sovan Samanta, Vladimir Simic and Tapan Senapati
Mathematics 2022, 10(24), 4807; https://doi.org/10.3390/math10244807 - 17 Dec 2022
Cited by 4 | Viewed by 2103
Abstract
The basic goal of this research is to find the shortest path of a semidirected graph and apply it to the road network system. In the field of graph theory, networks are described as directed graphs, undirected graphs, or a combination of both. [...] Read more.
The basic goal of this research is to find the shortest path of a semidirected graph and apply it to the road network system. In the field of graph theory, networks are described as directed graphs, undirected graphs, or a combination of both. However, in the modern era of computing, several networks, such as social media networks, granular networks, and road transport networks, are not linked to any of the aforementioned network categories and in reality are a hybrid of networks with both directed and undirected interconnections. To better understand the notion of these types of networks, semidirected graphs have been developed to represent such networks. In a semidirect graph, both the directed and undirected edges concepts have been introduced together in a graph. In reality, it has been noted that for every node (source/destination) which is connected to another, some links/connections are directed—i.e., one-way—and some links/connections are undirected—i.e., two-way. Considering that there is no specific direction provided and that two nodes are connected, we have established the concept of an undirected edge as two-way connectivity since this provides for nodes in both ways. In this study, the road network system has been modelled using the concept of a semidirected graph, and the shortest path through it has been determined. For the purposes of illustration, we have used a real transportation road network in this case, and the computed results have been displayed. Full article
Show Figures

Figure 1

Figure 1
<p>Semidirected graph.</p>
Full article ">Figure 2
<p>Semidirect graph (bidirectional edges).</p>
Full article ">Figure 3
<p>Weighted semidirected graph.</p>
Full article ">Figure 4
<p>Semidirect graph of a road network system.</p>
Full article ">Figure 5
<p>Equivalent bidirectional graph of semidirected graph.</p>
Full article ">Figure 6
<p>Semidirected network of a road network system.</p>
Full article ">Figure 7
<p>Description of path name with distance using Google Maps.</p>
Full article ">Figure 8
<p>Equivalent bidirectional graph of a semidirected graph (<a href="#mathematics-10-04807-f006" class="html-fig">Figure 6</a>).</p>
Full article ">
12 pages, 2407 KiB  
Article
Ndist2vec: Node with Landmark and New Distance to Vector Method for Predicting Shortest Path Distance along Road Networks
by Xu Chen, Shaohua Wang, Huilai Li, Fangzheng Lyu, Haojian Liang, Xueyan Zhang and Yang Zhong
ISPRS Int. J. Geo-Inf. 2022, 11(10), 514; https://doi.org/10.3390/ijgi11100514 - 9 Oct 2022
Cited by 4 | Viewed by 2399
Abstract
The ability to quickly calculate or query the shortest path distance between nodes on a road network is essential for many real-world applications. However, the traditional graph traversal shortest path algorithm methods, such as Dijkstra and Floyd–Warshall, cannot be extended to large-scale road [...] Read more.
The ability to quickly calculate or query the shortest path distance between nodes on a road network is essential for many real-world applications. However, the traditional graph traversal shortest path algorithm methods, such as Dijkstra and Floyd–Warshall, cannot be extended to large-scale road networks, or the traversal speed on large-scale networks is very slow, which is computational and memory intensive. Therefore, researchers have developed many approximate methods, such as the landmark method and the embedding method, to speed up the processing time of graphs and the shortest path query. This study proposes a new method based on landmarks and embedding technology, and it proposes a multilayer neural network model to solve this problem. On the one hand, we generate distance-preserving embedding for each node, and on the other hand, we predict the shortest path distance between two nodes of a given embedment. Our approach significantly reduces training time costs and is able to approximate the real distance with a relatively low Mean Absolute Error (MAE). The experimental results on a real road network confirm these advantages. Full article
Show Figures

Figure 1

Figure 1
<p>An example of undirected road network graph.</p>
Full article ">Figure 2
<p>Base architecture of node2vec-Sg.</p>
Full article ">Figure 3
<p>Base architecture of vdist2vec.</p>
Full article ">Figure 4
<p>Base architecture of ndist2vec.</p>
Full article ">Figure 5
<p>Base architecture of neural networks.</p>
Full article ">Figure 6
<p>Road networks.</p>
Full article ">
16 pages, 499 KiB  
Article
Research on Optimal Model of Maritime Search and Rescue Route for Rescue of Multiple Distress Targets
by Wen-Chih Ho, Jian-Hung Shen, Chung-Ping Liu and Yung-Wei Chen
J. Mar. Sci. Eng. 2022, 10(4), 460; https://doi.org/10.3390/jmse10040460 - 24 Mar 2022
Cited by 11 | Viewed by 3294
Abstract
Coastal countries began to develop green energy, and offshore wind power equipment in coastal areas was gradually built. Since coastal wind power generation often requires carrying out maintenance between wind turbines with the assistance of service operation vessels, this situation may cause coastal [...] Read more.
Coastal countries began to develop green energy, and offshore wind power equipment in coastal areas was gradually built. Since coastal wind power generation often requires carrying out maintenance between wind turbines with the assistance of service operation vessels, this situation may cause coastal areas to be prone to people falling into the water. However, traditional maritime search and rescue plans take a long time to gather information from man overboard incidents. In order to minimize injuries to people in distress, the maritime search and rescue process must be as short as possible. Despite that all the search and rescue plans are based on the concept of the shortest path, the efficient plans must not only consider the distance but also consider the cost of search and rescue. Therefore, this study established a set of practices applicable to the on-site commander (OSC) to dispatch rescue ships, as well as the planning of maritime search and rescue route models. Based on the easy-to-observe state of the target in distress, the model is analyzed and calculated by Floyd–Warshall algorithm and Grey relational analysis so as to sort the rescue plan and optimize the effect of the search and rescue route at sea. According to the simulation analysis, when the man overboard incident occurs in the coastal area, the OSC can immediately use this model to plan the best search and rescue route and dispatch a reasonable number of rescue ships. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

Figure 1
<p>Line chart of GRA analysis results.</p>
Full article ">
22 pages, 2061 KiB  
Article
BDPS: An Efficient Spark-Based Big Data Processing Scheme for Cloud Fog-IoT Orchestration
by Rakib Hossen, Md Whaiduzzaman, Mohammed Nasir Uddin, Md. Jahidul Islam, Nuruzzaman Faruqui, Alistair Barros, Mehdi Sookhak and Md. Julkar Nayeen Mahi
Information 2021, 12(12), 517; https://doi.org/10.3390/info12120517 - 10 Dec 2021
Cited by 16 | Viewed by 4131
Abstract
The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical expansion. IoT networks provide end-to-end connectivity while keeping minimal latency. To reduce delays, efficient data delivery schemes are required for dispersed fog-IoT network orchestrations. We use [...] Read more.
The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical expansion. IoT networks provide end-to-end connectivity while keeping minimal latency. To reduce delays, efficient data delivery schemes are required for dispersed fog-IoT network orchestrations. We use a Spark-based big data processing scheme (BDPS) to accelerate the distributed database (RDD) delay efficient technique in the fogs for a decentralized heterogeneous network architecture to reinforce suitable data allocations via IoTs. We propose BDPS based on Spark-RDD in fog-IoT overlay architecture to address the performance issues across the network orchestration. We evaluate data processing delays from fog-IoT integrated parts using a depth-first-search-based shortest path node finding configuration, which outperforms the existing shortest path algorithms in terms of algorithmic (i.e., depth-first search) efficiency, including the Bellman–Ford (BF) algorithm, Floyd–Warshall (FW) algorithm, Dijkstra algorithm (DA), and Apache Hadoop (AH) algorithm. The BDPS exhibits low latency in packet deliveries as well as low network overhead uplink activity through a map-reduced resilient data distribution mechanism, better than in BF, DA, FW, and AH. The overall BDPS scheme supports efficient data delivery across the fog-IoT orchestration, outperforming faster node execution while proving effective results, compared to DA, BF, FW and AH, respectively. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

Figure 1
<p>Spark-RDD mechanism.</p>
Full article ">Figure 2
<p>Fog-IoT orchestration.</p>
Full article ">Figure 3
<p>A generic mesh-based overlay tree architecture.</p>
Full article ">Figure 4
<p>Overview of our developed BDPS scheme.</p>
Full article ">Figure 5
<p>Throughput of data execution among existing algorithms and BDPS over fog-IoT mesh architecture.</p>
Full article ">Figure 6
<p>Network overhead among existing algorithms and BDPS over fog-IoT mesh architecture.</p>
Full article ">Figure 7
<p>Packet drop generation scenario over the FW, AH, BF, DA and BDPS algorithms in cloud, fog and IoT orchestration.</p>
Full article ">Figure 8
<p>Network efficiency generation scenario over the FW, AH, BF, DA and BDPS algorithms in cloud, fog, and IoT orchestration.</p>
Full article ">Figure 9
<p>Histogram view of computational delay over node execution among existing algorithms and BDPS.</p>
Full article ">Figure 10
<p>Box plot statistics of time delay among existing algorithms and BDPS.</p>
Full article ">
29 pages, 472 KiB  
Article
Parallel Privacy-Preserving Shortest Path Algorithms
by Mohammad Anagreh, Peeter Laud and Eero Vainikko
Cryptography 2021, 5(4), 27; https://doi.org/10.3390/cryptography5040027 - 14 Oct 2021
Cited by 12 | Viewed by 4878
Abstract
In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classical algorithms—Bellman–Ford and Dijkstra for SSSD; Johnson, Floyd–Warshall, and transitive [...] Read more.
In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classical algorithms—Bellman–Ford and Dijkstra for SSSD; Johnson, Floyd–Warshall, and transitive closure for APSD. As the computational platforms offered by SMC protocol sets have performance profiles that differ from typical processors, we had to perform extensive changes to the structure (including their control flow and memory accesses) and the details of these algorithms in order to obtain good performance. We implemented our protocols on top of the secret sharing based protocol set offered by the Sharemind SMC platform, using single-instruction-multiple-data (SIMD) operations as much as possible to reduce the round complexity. We benchmarked our protocols under several different parameters for network performance and compared our performance figures against each other and with ones reported previously. Full article
Show Figures

Figure 1

Figure 1
<p>Bellman-Ford algorithm performance (time in seconds) in different networks for different <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>n</mi> <mo>,</mo> <mi>m</mi> <mo>)</mo> </mrow> </semantics></math> (red: HBLL, green: HBHL, blue: LBHL, dark: Version 1, light: Version 2).</p>
Full article ">Figure 2
<p>Performance (in seconds) comparison of Dijkstra’s (blue) and Bellman–Ford (red) algorithms on sparse and dense graphs.</p>
Full article ">Figure 3
<p>Performance (in seconds) comparison of Dijkstra’s (blue) and Bellman–Ford (light red: <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>3</mn> <mi>n</mi> </mrow> </semantics></math>; dark red: <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> <mi>n</mi> </mrow> </semantics></math>) algorithms on planar-like graphs.</p>
Full article ">Figure 4
<p>Performance (in seconds) of Dijkstra’s algorithm on graphs with given numbers of vertices in different network environments (red: HBLL, green: HBHL, blue: LBHL).</p>
Full article ">Figure 5
<p>Dijkstra’s algorithm performance (as serial fraction; lower is better) on multiple graphs of various sizes (number of vertices given on the graph) in different network environments (red: HBLL, green: HBHL, blue: LBHL).</p>
Full article ">Figure 6
<p>Performance (time in seconds) of Floyd–Warshall and transitive closure algorithms on graphs of different sizes in different network environments (red: HBLL, green: HBHL, blue: LBHL, dark: Floyd–Warshall, light: transitive closure).</p>
Full article ">
17 pages, 1799 KiB  
Article
Cluster-Based Relocation of Stations for Efficient Forest Fire Management in the Province of Valencia (Spain)
by Miguel de Domingo, Nuria Ortigosa, Javier Sevilla and Sandra Roger
Sensors 2021, 21(3), 797; https://doi.org/10.3390/s21030797 - 25 Jan 2021
Cited by 4 | Viewed by 2630
Abstract
Forest fires are undesirable situations with tremendous impacts on wildlife and people’s lives. Reaching them quickly is essential to slowing down their expansion and putting them out in an effective manner. This work proposes an optimized distribution of fire stations in the province [...] Read more.
Forest fires are undesirable situations with tremendous impacts on wildlife and people’s lives. Reaching them quickly is essential to slowing down their expansion and putting them out in an effective manner. This work proposes an optimized distribution of fire stations in the province of Valencia (Spain) to minimize the impacts of forest fires. Using historical data about fires in the Valencia province, together with the location information about existing fire stations and municipalities, two different clustering techniques have been applied. Floyd–Warshall dynamic programming algorithm has been used to estimate the average times to reach fires among municipalities and fire stations in order to quantify the impacts of station relocation. The minimization was done approximately through k-means clustering. The outcomes with different numbers of clusters determined a predicted tradeoff between reducing the time and the cost of more stations. The results show that the proposed relocation of fire stations generally ensures faster arrival to the municipalities compared to the current disposition of fire stations. In addition, deployment costs associated with station relocation are also of paramount importance, so this factor was also taken into account in the proposed approach. Full article
Show Figures

Figure 1

Figure 1
<p>Shape of the province of Valencia.</p>
Full article ">Figure 2
<p>Shortest path between Navarrés and Bicorp.</p>
Full article ">Figure 3
<p>Small part of the province divided as the matrix <math display="inline"><semantics> <mi mathvariant="bold">P</mi> </semantics></math> would do. The numbers at the bottom indicate the column numbers and those on the right the row numbers. Painted in red, there is the road linking two villages: Ayora and Teresa de Cofrentes.</p>
Full article ">Figure 4
<p>Block diagram of the proposed approach for fire station relocation.</p>
Full article ">Figure 5
<p>Block diagram of the proposed approach for shortest path calculation.</p>
Full article ">Figure 6
<p>Evolution of time saved with respect to having one cluster less for different numbers of clusters.</p>
Full article ">Figure 7
<p>In the left image, the real stations (red Xs) are compared with those calculated by <span class="html-italic">k</span>-means (blue Xs), and in the right image, the same comparison is made with the results of running DBSCAN (green Xs).</p>
Full article ">Figure 8
<p>Small part of the province divided as the matrix <math display="inline"><semantics> <mi mathvariant="bold">P</mi> </semantics></math> would do. The numbers at the bottom imply the column numbers and those on the left border the row numbers. The red Xs are placed where the current forest fire stations are, and the blue Xs represent the same stations in their optimized locations.</p>
Full article ">Figure 9
<p>Distribution of forest fire stations in the province according to the proposed model.</p>
Full article ">
21 pages, 2662 KiB  
Article
3D Cruise Trajectory Optimization Inspired by a Shortest Path Algorithm
by Alejandro Murrieta-Mendoza, Charles Romain and Ruxandra Mihaela Botez
Aerospace 2020, 7(7), 99; https://doi.org/10.3390/aerospace7070099 - 21 Jul 2020
Cited by 24 | Viewed by 4732
Abstract
Aircrafts require a large amount of fuel in order to generate enough power to perform a flight. That consumption causes the emission of polluting particles such as carbon dioxide, which is implicated in global warming. This paper proposes an algorithm which can provide [...] Read more.
Aircrafts require a large amount of fuel in order to generate enough power to perform a flight. That consumption causes the emission of polluting particles such as carbon dioxide, which is implicated in global warming. This paper proposes an algorithm which can provide the 3D reference trajectory that minimizes the flight costs and the fuel consumption. The proposed algorithm was conceived using the Floyd–Warshall methodology as a reference. Weather was taken into account by using forecasts provided by Weather Canada. The search space was modeled as a directional weighted graph. Fuel burn was computed using the Base of Aircraft DAta (BADA) model developed by Eurocontrol. The trajectories delivered by the developed algorithm were compared to long-haul flight plans computed by a European airliner and to as-flown trajectories obtained from Flightradar24®. The results reveal that up to 2000 kg of fuel can be reduced per flight, and flight time can be also reduced by up to 11 min. Full article
(This article belongs to the Special Issue Aircraft Trajectory Design and Optimization)
Show Figures

Figure 1

Figure 1
<p>Weather interpolations. In time (<b>a</b>), by flight level/pressure altitude (<b>b</b>), and finally by exact geographical position via bilinear interpolation (<b>c</b>).</p>
Full article ">Figure 2
<p>3D search space for the cruise phase.</p>
Full article ">Figure 3
<p>Typical Floyd–Warshall pseudo-code.</p>
Full article ">Figure 4
<p>Graph example.</p>
Full article ">Figure 5
<p>Matrices <span class="html-italic">D</span><sub>0</sub> and <span class="html-italic">S</span><sub>0</sub> at the first iteration of the algorithm.</p>
Full article ">Figure 6
<p>Matrices <span class="html-italic">D</span><sub>2</sub> and <span class="html-italic">S</span><sub>2</sub>, s iteration.</p>
Full article ">Figure 7
<p>Matrices <span class="html-italic">D</span><sub>5</sub> and <span class="html-italic">S</span><sub>5</sub> at the fifth iteration.</p>
Full article ">Figure 8
<p>Floyd–Warshall pseudo-code implementation for reference trajectory optimization.</p>
Full article ">Figure 9
<p>The 3D optimization algorithm pseudo-code.</p>
Full article ">Figure 10
<p>Lateral and vertical reference trajectory for the Flight between Montreal and Rio de Janeiro. (<b>a</b>) Lateral reference trajectory. (<b>b</b>) Vertical reference trajectory.</p>
Full article ">Figure 11
<p>Fuel burn differences between reference flight, optimized vertical flight, and optimized 3D Floyd–Warshall (FW) flight trajectories.</p>
Full article ">Figure 12
<p>Flight cost differences between reference flight, optimized vertical flight, and optimized 3D FW flight trajectories. Flight optimization for different as-flown flights.</p>
Full article ">Figure 13
<p>Real and 3D-optimized time and fuel burn costs for the different flights.</p>
Full article ">
16 pages, 5210 KiB  
Article
ACD: An Adaptable Approach for RFID Cloning Attack Detection
by Weiqing Huang, Yanfang Zhang and Yue Feng
Sensors 2020, 20(8), 2378; https://doi.org/10.3390/s20082378 - 22 Apr 2020
Cited by 9 | Viewed by 3430
Abstract
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which [...] Read more.
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Network diagram.</p>
Full article ">Figure 2
<p>Flowchart of the detection method.</p>
Full article ">Figure 3
<p>Abnormal detection.</p>
Full article ">Figure 4
<p>Vertical view of experimental area.</p>
Full article ">Figure 5
<p>System deployment.</p>
Full article ">Figure 6
<p>Detection accuracy of the clone event.</p>
Full article ">Figure 7
<p>Impact of the number of antennas on the precision and recall.</p>
Full article ">Figure 8
<p>Delay of the cloning detection method.</p>
Full article ">Figure 9
<p>Comparison of the runtime between classic and improved algorithms.</p>
Full article ">Figure 10
<p>Vertical view of the large venue.</p>
Full article ">Figure 11
<p>Precision of clone detection in a large area.</p>
Full article ">
17 pages, 2597 KiB  
Article
Multi-Topology Routing Algorithms in SDN-Based Space Information Networks
by Xiangli Meng, Lingda Wu and Shaobo Yu
Future Internet 2019, 11(1), 15; https://doi.org/10.3390/fi11010015 - 12 Jan 2019
Cited by 8 | Viewed by 5552
Abstract
Aiming at the complex structure of the space information networks (SIN) and the dynamic change of network topology, in order to design an efficient routing strategy, this paper establishes a SIN management architecture based on Software-defined Networking (SDN). A routing algorithm flow of [...] Read more.
Aiming at the complex structure of the space information networks (SIN) and the dynamic change of network topology, in order to design an efficient routing strategy, this paper establishes a SIN management architecture based on Software-defined Networking (SDN). A routing algorithm flow of the spatial information network based on a snapshot sequence is designed. For different spatial tasks with different Quality of Service (QoS) requirements, the concept of integrated link weight is proposed. The Warshall–Floyd algorithm is used to design the optimal routing strategy. A Task-oriented Bandwidth Resource Allocation (TBA) algorithm is proposed for multiple spatial tasks in the same link. Simulation results show that the algorithm can effectively guarantee the priority transmission of important tasks and avoid the unnecessary waste of bandwidth resources. Full article
Show Figures

Figure 1

Figure 1
<p>Software-defined Networking (SDN) structure.</p>
Full article ">Figure 2
<p>Space information networks (SIN) management framework based on SDN.</p>
Full article ">Figure 3
<p>Routing algorithm flow based on snapshot sequence.</p>
Full article ">Figure 4
<p>Schematic diagram of delay forwarding routing.</p>
Full article ">Figure 5
<p>Schematic diagram of integrated link weight of Task1.</p>
Full article ">Figure 6
<p>Task1 best route diagram.</p>
Full article ">Figure 7
<p>Schematic diagram of integrated link weight of Task2.</p>
Full article ">Figure 8
<p>Task2 best route diagram.</p>
Full article ">Figure 9
<p>Task1 transmission rate comparison schematic diagram.</p>
Full article ">Figure 10
<p>Task2 transmission rate comparison schematic diagram.</p>
Full article ">Figure 11
<p>Task3 transmission rate comparison schematic diagram.</p>
Full article ">
25 pages, 5858 KiB  
Article
An Optimized Algorithm and Test Bed for Improvement of Efficiency of ESS and Energy Use
by Seung-Mo Je and Jun-Ho Huh
Electronics 2018, 7(12), 388; https://doi.org/10.3390/electronics7120388 - 4 Dec 2018
Cited by 8 | Viewed by 3559
Abstract
The Republic of Korea (ROK) has four distinct seasons. Such an environment provides many benefits, but also brings some major problems when using new and renewable energies. The rainy season or typhoons in summer become the main causes of inconsistent production rates of [...] Read more.
The Republic of Korea (ROK) has four distinct seasons. Such an environment provides many benefits, but also brings some major problems when using new and renewable energies. The rainy season or typhoons in summer become the main causes of inconsistent production rates of these energies, and this would become a fatal weakness in supplying stable power to the industries running continuously, such as the aquaculture industry. This study proposed an improvement plan for the efficiency of Energy Storage System (ESS) and energy use. Use of sodium-ion batteries is suggested to overcome the disadvantages of lithium-ion batteries, which are dominant in the current market; a greedy algorithm and the Floyd–Warshall algorithm were also proposed as a method of scheduling energy use considering the elements that could affect communication output and energy use. Some significant correlations between communication output and energy efficiency have been identified through the OPNET-based simulations. The simulation results showed that the greedy algorithm was more efficient. This algorithm was then implemented with C-language to apply it to the Test Bed developed in the previous study. The results of the Test Bed experiment supported the proposals. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Fluctuations in Signal–Noise Ratio according to the changes in Transmitted Power. (X axis: Time, Y axis: Signal–Noise Ratio and Received Power).</p>
Full article ">Figure 2
<p>Fluctuations in Received Power according to the changes in Transmitted Power. (X axis: Time, Y axis: Transmitted power).</p>
Full article ">Figure 3
<p>Fluctuations in Received Power for the first Value Group. (X axis: Time, Y axis: Received power).</p>
Full article ">Figure 4
<p>Fluctuations in Received Power for the second Value Group. (X axis: Time, Y axis: Received power).</p>
Full article ">Figure 5
<p>The Blue Line (all the transmission power outputs were set at 0.05).</p>
Full article ">Figure 6
<p>The Red Line (all the transmission power outputs were set at 0.1).</p>
Full article ">Figure 7
<p>Improvement of Energy Efficiency (1). (X axis: Time, Y axis: Energy efficiency).</p>
Full article ">Figure 8
<p>Improvement of Energy Efficiency (2). (X axis: Time, Y axis: Energy efficiency).</p>
Full article ">Figure 9
<p>Representation of Zigbee-based communication as an Extensive-form Game.</p>
Full article ">Figure 10
<p>Representation of Zigbee-based communication as a Normal-form Game and Expression of an Elliptic part by the Nash Equilibrium solution.</p>
Full article ">Figure 11
<p>Test Bed Scenario Setup.</p>
Full article ">Figure 12
<p>All the Nodes being Connected in the Network.</p>
Full article ">Figure 13
<p>Greedy algorithm: Best’ graph using R Studio. (X axis: Number of nodes, Y axis: Amount of calculation).</p>
Full article ">Figure 14
<p>Greedy algorithm: Worst’ graph Using R Studio. (X axis: Number of nodes, Y axis: Amount of calculation).</p>
Full article ">Figure 15
<p>Comparison of ‘Greedy algorithm: Best/Worst’ Using R Studio. (X axis: Number of nodes, Y axis: Amount of calculation).</p>
Full article ">Figure 16
<p>Floyd–Warshall algorithm.</p>
Full article ">Figure 17
<p>Time complexity of the Floyd–Warshall algorithm using R Studio. (X axis: Number of nodes, Y axis: Amount of calculation).</p>
Full article ">Figure 18
<p>Comparison of time complexities between the Greedy algorithm and the Floyd–Warshall algorithm using R Studio. (X axis: Number of nodes, Y axis: Amount of calculation).</p>
Full article ">
15 pages, 1855 KiB  
Article
A Regional Protection Partition Strategy Considering Communication Constraints and Its Implementation Techniques
by Zhenxing Li, Yang Gong, Lu Wang, Hong Tan, Prominent Lovet Kativu and Pengfei Wang
Energies 2018, 11(10), 2502; https://doi.org/10.3390/en11102502 - 20 Sep 2018
Cited by 1 | Viewed by 2289
Abstract
Regional protection based on multisource information of a regional power network depends on communication technology. A partition strategy considering communication constraints and implementation techniques must be considered to realize the regional protection of a large power grid. This paper aims at examining the [...] Read more.
Regional protection based on multisource information of a regional power network depends on communication technology. A partition strategy considering communication constraints and implementation techniques must be considered to realize the regional protection of a large power grid. This paper aims at examining the technical requirements of rapid and reliable regional protection, considering the number of hops as the factor affecting communication between secondary substations and primary substations, and combining this with the equalization of substations. Then, a primary substation selection model of regional protection based on an exhaustive method is proposed using the Floyd–Warshall algorithm (an algorithm for finding shortest paths in a weighted graph). The partition model is further established according to the multifactors that affect the communication delay time for regional protection. Focusing on the N-1 channel fault in the preset region after the formation of the subregions, this paper analyzes the circuitous process of information in an interrupt channel and considers the influence of communication delay time to further improve the partition strategy. Finally, this paper puts forward techniques for partition strategy implementation based on graph theory; an example analysis of an actual power network is also given, and the conclusions of multiple partitions of the same power network are compared and analyzed. Besides this, partition suggestions and theoretical guidance considering actual engineering demands are given. Full article
Show Figures

Figure 1

Figure 1
<p>A communication system schematic of regional protection and the implementation of regional protection information transmission.</p>
Full article ">Figure 2
<p>An example system with 18 substations and 27 channels, which can be used to explain the minimum hops sum, the link degree sum, and the primary substation selection model.</p>
Full article ">Figure 3
<p>The system with seven substations in two regions, which can be used to explain partition correction under an N-1 channel fault.</p>
Full article ">Figure 4
<p>Corrections under different situations: (<b>a</b>) The circuitous process of information when it is acceptable to circuit within its own region; (<b>b</b>) The circuitous process of information when the help of other regions is necessary to circuit; (<b>c</b>) The partition correction when the delay will be too long if circuiting within its own region or with the help of other regions.</p>
Full article ">Figure 5
<p>The IEEE39 node system’s communication network after merging bus bars in the same substation as one point, which is convenient for introducing the partition strategy proposed in this article.</p>
Full article ">Figure A1
<p>The processes of the regional protection partition strategy considering all communication constraints, such as the lengths and bandwidths of channels.</p>
Full article ">Figure A2
<p>The 220 kV grid communication system in the eastern region of Hubei province, China, to verify the applicability of the partition strategy proposed in this article under larger system conditions.</p>
Full article ">
3033 KiB  
Article
A Study on Price-Based Charging Strategy for Electric Vehicles on Expressways
by Lixing Chen, Zhong Chen, Xueliang Huang and Long Jin
Energies 2016, 9(5), 385; https://doi.org/10.3390/en9050385 - 19 May 2016
Cited by 20 | Viewed by 5859
Abstract
With the large-scale adoption of electric vehicles (EVs) on expressways, the exploration of a guiding-based charging method to effectively adjust interactions between EVs and the fast charging stations (CSs) is urgently needed. This paper proposes a status-of-use (SOU) price-based charging strategy that can [...] Read more.
With the large-scale adoption of electric vehicles (EVs) on expressways, the exploration of a guiding-based charging method to effectively adjust interactions between EVs and the fast charging stations (CSs) is urgently needed. This paper proposes a status-of-use (SOU) price-based charging strategy that can motivate users to charge in advance. A queuing model for a CS cluster was established to verify the effectiveness of the strategy, and then a simulation of traveling and charging conditions of 12,000 pure EVs on the road network from 0:00 to 24:00 was performed according to the related data and using the Monte Carlo method, the Floyd-Warshall algorithm, and the queuing algorithm proposed in this paper. Compared to unordered charging (UC), SOU price-based charging can not only reduce the charging cost and waiting time for users, but also increase the utilization ratio of charging facilities in a CS cluster and thus lower their influence on the power grid and expressway traffic. SOU price-based charging can effectively adjust interactions between EVs and CSs. Full article
Show Figures

Figure 1

Figure 1
<p>A probability density curve of the EV flow at the origin.</p>
Full article ">Figure 2
<p>A typical queuing system.</p>
Full article ">Figure 3
<p>The flowchart of queuing algorithm.</p>
Full article ">Figure 4
<p>A simplified expressway network.</p>
Full article ">Figure 5
<p>Distribution of CSs in the network.</p>
Full article ">Figure 6
<p>Waiting time of EVs in different charging situations.</p>
Full article ">Figure 7
<p>Charging times of charged EVs in in different charging situations.</p>
Full article ">Figure 8
<p>Utilization ratios of charging facilities of CSs under different charging conditions.</p>
Full article ">Figure 9
<p>A simplified power system.</p>
Full article ">Figure 10
<p>Active charging load of CSs in different charging situations: (<b>a</b>) unordered charging (<b>b</b>) orderly charging.</p>
Full article ">Figure 11
<p>Queue length in each CS in different charging situations: (<b>a</b>) unordered charging (<b>b</b>) orderly charging.</p>
Full article ">
Back to TopTop