Abstract
This chapter describes three examples of multi-agent systems: a multi-sensory security system for supply networks, a multi-agent approach to solve the travelling salesman problem and multiple police officers allocated to crime incidents in law enforcement problem. These examples are evaluated by task allocation algorithms to demonstrate the methods described in Chap. 5. The comparison of the performances of nine state-of-the-art algorithms for these case studies is conducted in terms of tasks completion times and the number of unallocated tasks. Scalability and the influence of bias parameters of HDBA were analyzed for different numbers of sensors and tasks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amador S, Okamoto S, Zivan R (2014) Dynamic multi-agent task allocation with spatial and temporal constraints. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems, pp 1495–1496
Angeles R (2005) RFID technologies: supply-chain applications and implementation issues. Inf Syst Manage 22(1):51
Attaran M (2007) RFID: an enabler of supply chain operations. Supply Chain Manag Int J 12(4):249–257
Banks J, Hanny M, Pachano A, Thompson G (2007) RFID applied. Wiley, New Jersey
Bian F, Kempe D, Govindan R (2006) Utility based sensor selection. In: Proceedings of the 5th international conference on information processing in sensor networks, pp 11–18
Bratton D, Kennedy J (2007) Defining a standard for particle swarm optimization. In: IEEE swarm intelligence symposium, April, pp 120–127
Brintrup A, Ranasinghe D, McFarlane D (2010) RFID opportunity for leaner manufacturing. Int J Prod Res 48(9):2745–2764
Byers J, Nasser G (2000) Utility-based decision-making in wireless sensor networks. In: Proceedings of the 1st ACM international symposium on mobile ad hoc networking & computing. IEEE Press, Boston, MA, USA, pp 143–144
Closs DJ, McGarrell EF (2004) Enhancing security throughout the supply chain. IBM Center for the Business of Government, Washington, DC, pp 10–12
Dias EM, Fontana CF, Mori FH, Facioli LP, Zancul PJ (2008) Security supply chain. In: Mastorakis NE, Mladenov V, Bojkovic Z, Simian D, Kartalopoulos S, Varonides A (eds) WSEAS international conference on mathematics and computers in science and engineering, p 12
Dorigo M, Maniezzo V, Colorni A (1996) Ant system: optimization by a colony of cooperating agents. IEEE Trans Syst Man Cybern B Cybern 26(1):29–41
Eyers DR, Potter AT, Wang Y (2011) Supply chain implications of e-commerce channels for additive manufacturing. In: International conference of production research, Stuttgart, Germany
Floerkemeier C, Lampe M (2005) RFID middleware design—addressing both application needs and RFID constraints. GI Jahrestagung 1:277–281
Fokum DT, Frost VS, DePardo D (2009) Experiences from a transportation security sensor network field trial. Technical report ITTC-FY2009-TR-41420-11. The University of Kansas
Gao X, Xiang Z, Wang H, Shen J, Huang J, Song S (2004) An approach to security and privacy of RFID system for supply chain. In: IEEE international conference on e-commerce technology for dynamic e-business, pp 164–168
Gerkey BP, Matarić MJ (2003) Multi-robot task allocation: analyzing the complexity and optimality of key architectures. In: IEEE international conference on robotics and automation, pp 3862–3868
Gutin G, Punnen AP (eds) (2006) The traveling salesman problem and its variations, vol 12. Springer Science & Business Media
Halim AH, Ismail I (2019) Combinatorial optimization: comparison of heuristic algorithms in travelling salesman problem. Arch Comput Methods Eng 26(2):367–380
Haroun SA, Jamal B (2015) A performance comparison of GA and ACO applied to TSP. Int J Comput Appl 117(20)
Hore S, Chatterjee A, Dewanji A (2018) Improving variable neighborhood search to solve the traveling salesman problem. Appl Soft Comput 68:83–91
Ito T, Hattori H, Klein M (2007) Multi-issue negotiation protocol for agents: exploring nonlinear utility spaces. IJCAI 7:1347–1352
Ivanov D, Dolgui A, Sokolov B (2013) Multi-disciplinary analysis of interfaces “supply chain event management—RFID—control theory”. Int J Integr Supply Manag 8(1/2/3):52–66
Jeong W, Nof SY (2009) A collaborative sensor network middleware for automated production systems. Int J Comput Ind Eng 57:106–113
Jevtić A, Gutiérrez A (2011) Distributed bees algorithm parameters optimization for a cost efficient task allocation in swarms of robots. Sensors 11(11):10880–10893
Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697
Ko HS, Azambuja M, Lee HF (2016) Cloud-based materials tracking system prototype integrated with radio frequency identification tagging technology. Autom Constr 63:144–154
Ko HS, Yoon S, Nof SY (2011) Intelligent alert systems for error and conflict allocation in supply networks. In: 18th IFAC world congress, Milano, Italy
Kongkaew W, Pichitlamken J (2012) A Gaussian process regression model for the traveling salesman problem. J Comput Sci 8(10):1749–1758
Lau HC, Zhang L (2003) Task allocation via multi-agent coalition formation: taxonomy, algorithms and complexity. In: Proceedings of the 15th IEEE international conference on tools with artificial intelligence, Sacramento, CA, USA, pp 346–350
Lawson B, Potter A, Pil FK, Holweg M (2019) Supply chain disruptions: the influence of industry and geography on firm reaction speed. Int J Oper Prod Manag
Lučić P, Teodorović D (2003) Computing with bees: attacking complex transportation engineering problems. Int J Artif Intell Tools 12(03):375–394
Lučić P, Teodorović D (2002) Transportation modeling: an artificial life approach. In: 14th IEEE international conference on tools with artificial intelligence, pp 216–223
Lánská M (2012) Supply chain security. In: Proceedings of the 9th international conference on logistics and sustainable transport, University of Maribor, Faculty of Logistics, Celje, pp 191–195
Mari SI, Lee YH, Memon MS, Park YS, Kim M (2015) Adaptivity of complex network topologies for designing resilient supply chain networks. Int J Ind Eng 22(1):102–116
Meng Y, Kazeem O, Muller JC (2007) A hybrid ACO/PSO control algorithm for distributed swarm robots. In: IEEE swarm intelligence symposium, April, pp 273–280
Modrák V, Moskvich V (2012) Impacts of RFID implementation on cost structure in networked manufacturing. Int J Prod Res 50(14):3847–3859
Naskar S, Basu P, Sen AK (2019) A literature review of the emerging field of IoT using RFID and its applications in supply chain management. In: Securing the internet of things: concepts, methodologies, tools, and applications. IGI Global, pp 1664–1689
Nelke SA (2016) Market equilibrium-based mechanism for dynamic task allocation. Doctoral book, Ben-Gurion University of the Negev, Faculty of Engineering Sciences, Department of Industrial Engineering and Management
Ngai EWT, To CK, Moon KK, Chan LK, Yeung PK, Lee MC (2010) RFID systems implementation: a comprehensive framework and a case study. Int J Prod Res 48(9):2583–2612
Park K, Min H, Min S (2016) Inter-relationship among risk taking propensity, supply chain security practices, and supply chain disruption occurrence. J Purch Supply Manag 22(2):120–130
Qiu RG (2007) RFID-enabled automation in support of factory integration. Int J Robot Comput Integr Manuf 23:677–683
Rana OF, Stout K (2000) What is scalability in multi-agent systems? In: Proceedings of the fourth international conference on autonomous agents. ACM, pp 56–63
Reinelt G (1991) TSPLIB—a traveling salesman problem library. ORSA J Comput 3:376–384
Rowaihy H, Eswaran S, Johnson M, Verma D, Bar-Noy A, Brown T, Porta TL (2007) A survey of sensor selection schemes in wireless sensor networks. In: Proceedings of SPIE, vol 6562
Sharma SK, Vasant BS (2015) Developing a framework for analyzing global supply chain security. IUP J Supply Chain Manag 12(3):7
Sidorov M, Ong MT, Sridharan RV, Nakamura J, Ohmura R, Khor JH (2019) "Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains." IEEE Access 7, 7273–7285
Spector L (2004) Automatic quantum computer programming: a genetic programming approach, vol 7. Springer Science & Business Media
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Tkach I, Edan Y, Nof SY (2012) Security of supply chains by automatic multi-agents collaboration. Inf Control Probl Manuf 14(1):475–480
Tkach I, Edan Y, Nof SY (2017) Multi-sensor task allocation framework for supply networks security using task administration protocols. Int J Prod Res 55:5202–5224
Tkach I, Jevtić A, Nof SY, Edan Y (2013) Automatic multi-sensor task allocation using modified distributed bees algorithm. In: IEEE international conference on systems, man, and cybernetics (SMC), Manchester, England, pp 1401–1406
Tkach I, Jevtić A, Edan Y, Nof SY (2018) A modified distributed bees algorithm for multi-sensor task allocation. Sensors 18(3):759. https://doi.org/10.3390/s18030759
Vu DM, Hewitt M, Boland N, Savelsbergh M (2019) Dynamic discretization discovery for solving the time-dependent traveling salesman problem with time windows. Transp Sci
Weinstein R (2005) RFID: a technical overview and its application to the enterprise. IT Prof 7(3):27–33
Whipple JM, Voss MD, Closs DJ (2009) Supply chain security practices in the food industry: do firms operating globally and domestically differ? Int J Phys Distrib Logist Manag 39(7):574–594
Williams NP, Liu Y, Nof SY (2002) TestLAN approach and protocols for the integration of distributed assembly and test networks. Int J Prod Res 40(17):4505–4522
Wolski R, Plank JS, Brevik J, Bryan T (2001) Analyzing market-based resource allocation strategies for the computational grid. Int J High Perform Comput Appl 15(3):258–281
Xiao F, Wang Z, Ye N, Wang R, Li XY (2018) One more tag enables fine-grained RFID localization and tracking. IEEE/ACM Trans Netw 26(1):161–174
Yoon Y, Kim YH (2013) An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks. IEEE Trans Cybern 43(5):1473–1483
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Tkach, I., Edan, Y. (2020). Extended Examples of Single-Layer Multi-sensor Systems. In: Distributed Heterogeneous Multi Sensor Task Allocation Systems. Automation, Collaboration, & E-Services, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-030-34735-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-34735-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34734-5
Online ISBN: 978-3-030-34735-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)