Skip to main content

Extended Examples of Single-Layer Multi-sensor Systems

  • Chapter
  • First Online:
Distributed Heterogeneous Multi Sensor Task Allocation Systems

Part of the book series: Automation, Collaboration, & E-Services ((ACES,volume 7))

  • 306 Accesses

Abstract

This chapter describes three examples of multi-agent systems: a multi-sensory security system for supply networks, a multi-agent approach to solve the travelling salesman problem and multiple police officers allocated to crime incidents in law enforcement problem. These examples are evaluated by task allocation algorithms to demonstrate the methods described in Chap. 5. The comparison of the performances of nine state-of-the-art algorithms for these case studies is conducted in terms of tasks completion times and the number of unallocated tasks. Scalability and the influence of bias parameters of HDBA were analyzed for different numbers of sensors and tasks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amador S, Okamoto S, Zivan R (2014) Dynamic multi-agent task allocation with spatial and temporal constraints. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems, pp 1495–1496

    Google Scholar 

  2. Angeles R (2005) RFID technologies: supply-chain applications and implementation issues. Inf Syst Manage 22(1):51

    Article  Google Scholar 

  3. Attaran M (2007) RFID: an enabler of supply chain operations. Supply Chain Manag Int J 12(4):249–257

    Article  Google Scholar 

  4. Banks J, Hanny M, Pachano A, Thompson G (2007) RFID applied. Wiley, New Jersey

    Google Scholar 

  5. Bian F, Kempe D, Govindan R (2006) Utility based sensor selection. In: Proceedings of the 5th international conference on information processing in sensor networks, pp 11–18

    Google Scholar 

  6. Bratton D, Kennedy J (2007) Defining a standard for particle swarm optimization. In: IEEE swarm intelligence symposium, April, pp 120–127

    Google Scholar 

  7. Brintrup A, Ranasinghe D, McFarlane D (2010) RFID opportunity for leaner manufacturing. Int J Prod Res 48(9):2745–2764

    Article  Google Scholar 

  8. Byers J, Nasser G (2000) Utility-based decision-making in wireless sensor networks. In: Proceedings of the 1st ACM international symposium on mobile ad hoc networking & computing. IEEE Press, Boston, MA, USA, pp 143–144

    Google Scholar 

  9. Closs DJ, McGarrell EF (2004) Enhancing security throughout the supply chain. IBM Center for the Business of Government, Washington, DC, pp 10–12

    Google Scholar 

  10. Dias EM, Fontana CF, Mori FH, Facioli LP, Zancul PJ (2008) Security supply chain. In: Mastorakis NE, Mladenov V, Bojkovic Z, Simian D, Kartalopoulos S, Varonides A (eds) WSEAS international conference on mathematics and computers in science and engineering, p 12

    Google Scholar 

  11. Dorigo M, Maniezzo V, Colorni A (1996) Ant system: optimization by a colony of cooperating agents. IEEE Trans Syst Man Cybern B Cybern 26(1):29–41

    Article  Google Scholar 

  12. Eyers DR, Potter AT, Wang Y (2011) Supply chain implications of e-commerce channels for additive manufacturing. In: International conference of production research, Stuttgart, Germany

    Google Scholar 

  13. Floerkemeier C, Lampe M (2005) RFID middleware design—addressing both application needs and RFID constraints. GI Jahrestagung 1:277–281

    Google Scholar 

  14. Fokum DT, Frost VS, DePardo D (2009) Experiences from a transportation security sensor network field trial. Technical report ITTC-FY2009-TR-41420-11. The University of Kansas

    Google Scholar 

  15. Gao X, Xiang Z, Wang H, Shen J, Huang J, Song S (2004) An approach to security and privacy of RFID system for supply chain. In: IEEE international conference on e-commerce technology for dynamic e-business, pp 164–168

    Google Scholar 

  16. Gerkey BP, Matarić MJ (2003) Multi-robot task allocation: analyzing the complexity and optimality of key architectures. In: IEEE international conference on robotics and automation, pp 3862–3868

    Google Scholar 

  17. Gutin G, Punnen AP (eds) (2006) The traveling salesman problem and its variations, vol 12. Springer Science & Business Media

    Google Scholar 

  18. Halim AH, Ismail I (2019) Combinatorial optimization: comparison of heuristic algorithms in travelling salesman problem. Arch Comput Methods Eng 26(2):367–380

    Article  MathSciNet  Google Scholar 

  19. Haroun SA, Jamal B (2015) A performance comparison of GA and ACO applied to TSP. Int J Comput Appl 117(20)

    Article  Google Scholar 

  20. Hore S, Chatterjee A, Dewanji A (2018) Improving variable neighborhood search to solve the traveling salesman problem. Appl Soft Comput 68:83–91

    Article  Google Scholar 

  21. Ito T, Hattori H, Klein M (2007) Multi-issue negotiation protocol for agents: exploring nonlinear utility spaces. IJCAI 7:1347–1352

    Google Scholar 

  22. Ivanov D, Dolgui A, Sokolov B (2013) Multi-disciplinary analysis of interfaces “supply chain event management—RFID—control theory”. Int J Integr Supply Manag 8(1/2/3):52–66

    Google Scholar 

  23. Jeong W, Nof SY (2009) A collaborative sensor network middleware for automated production systems. Int J Comput Ind Eng 57:106–113

    Article  Google Scholar 

  24. Jevtić A, Gutiérrez A (2011) Distributed bees algorithm parameters optimization for a cost efficient task allocation in swarms of robots. Sensors 11(11):10880–10893

    Article  Google Scholar 

  25. Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697

    Article  Google Scholar 

  26. Ko HS, Azambuja M, Lee HF (2016) Cloud-based materials tracking system prototype integrated with radio frequency identification tagging technology. Autom Constr 63:144–154

    Article  Google Scholar 

  27. Ko HS, Yoon S, Nof SY (2011) Intelligent alert systems for error and conflict allocation in supply networks. In: 18th IFAC world congress, Milano, Italy

    Google Scholar 

  28. Kongkaew W, Pichitlamken J (2012) A Gaussian process regression model for the traveling salesman problem. J Comput Sci 8(10):1749–1758

    Article  Google Scholar 

  29. Lau HC, Zhang L (2003) Task allocation via multi-agent coalition formation: taxonomy, algorithms and complexity. In: Proceedings of the 15th IEEE international conference on tools with artificial intelligence, Sacramento, CA, USA, pp 346–350

    Google Scholar 

  30. Lawson B, Potter A, Pil FK, Holweg M (2019) Supply chain disruptions: the influence of industry and geography on firm reaction speed. Int J Oper Prod Manag

    Google Scholar 

  31. Lučić P, Teodorović D (2003) Computing with bees: attacking complex transportation engineering problems. Int J Artif Intell Tools 12(03):375–394

    Article  Google Scholar 

  32. Lučić P, Teodorović D (2002) Transportation modeling: an artificial life approach. In: 14th IEEE international conference on tools with artificial intelligence, pp 216–223

    Google Scholar 

  33. Lánská M (2012) Supply chain security. In: Proceedings of the 9th international conference on logistics and sustainable transport, University of Maribor, Faculty of Logistics, Celje, pp 191–195

    Google Scholar 

  34. Mari SI, Lee YH, Memon MS, Park YS, Kim M (2015) Adaptivity of complex network topologies for designing resilient supply chain networks. Int J Ind Eng 22(1):102–116

    Google Scholar 

  35. Meng Y, Kazeem O, Muller JC (2007) A hybrid ACO/PSO control algorithm for distributed swarm robots. In: IEEE swarm intelligence symposium, April, pp 273–280

    Google Scholar 

  36. Modrák V, Moskvich V (2012) Impacts of RFID implementation on cost structure in networked manufacturing. Int J Prod Res 50(14):3847–3859

    Article  Google Scholar 

  37. Naskar S, Basu P, Sen AK (2019) A literature review of the emerging field of IoT using RFID and its applications in supply chain management. In: Securing the internet of things: concepts, methodologies, tools, and applications. IGI Global, pp 1664–1689

    Google Scholar 

  38. Nelke SA (2016) Market equilibrium-based mechanism for dynamic task allocation. Doctoral book, Ben-Gurion University of the Negev, Faculty of Engineering Sciences, Department of Industrial Engineering and Management

    Google Scholar 

  39. Ngai EWT, To CK, Moon KK, Chan LK, Yeung PK, Lee MC (2010) RFID systems implementation: a comprehensive framework and a case study. Int J Prod Res 48(9):2583–2612

    Article  Google Scholar 

  40. Park K, Min H, Min S (2016) Inter-relationship among risk taking propensity, supply chain security practices, and supply chain disruption occurrence. J Purch Supply Manag 22(2):120–130

    Article  Google Scholar 

  41. Qiu RG (2007) RFID-enabled automation in support of factory integration. Int J Robot Comput Integr Manuf 23:677–683

    Article  Google Scholar 

  42. Rana OF, Stout K (2000) What is scalability in multi-agent systems? In: Proceedings of the fourth international conference on autonomous agents. ACM, pp 56–63

    Google Scholar 

  43. Reinelt G (1991) TSPLIB—a traveling salesman problem library. ORSA J Comput 3:376–384

    Article  Google Scholar 

  44. Rowaihy H, Eswaran S, Johnson M, Verma D, Bar-Noy A, Brown T, Porta TL (2007) A survey of sensor selection schemes in wireless sensor networks. In: Proceedings of SPIE, vol 6562

    Google Scholar 

  45. Sharma SK, Vasant BS (2015) Developing a framework for analyzing global supply chain security. IUP J Supply Chain Manag 12(3):7

    Google Scholar 

  46. Sidorov M, Ong MT, Sridharan RV, Nakamura J, Ohmura R, Khor JH (2019) "Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains." IEEE Access 7, 7273–7285

    Article  Google Scholar 

  47. Spector L (2004) Automatic quantum computer programming: a genetic programming approach, vol 7. Springer Science & Business Media

    Google Scholar 

  48. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  49. Tkach I, Edan Y, Nof SY (2012) Security of supply chains by automatic multi-agents collaboration. Inf Control Probl Manuf 14(1):475–480

    Google Scholar 

  50. Tkach I, Edan Y, Nof SY (2017) Multi-sensor task allocation framework for supply networks security using task administration protocols. Int J Prod Res 55:5202–5224

    Article  Google Scholar 

  51. Tkach I, Jevtić A, Nof SY, Edan Y (2013) Automatic multi-sensor task allocation using modified distributed bees algorithm. In: IEEE international conference on systems, man, and cybernetics (SMC), Manchester, England, pp 1401–1406

    Google Scholar 

  52. Tkach I, Jevtić A, Edan Y, Nof SY (2018) A modified distributed bees algorithm for multi-sensor task allocation. Sensors 18(3):759. https://doi.org/10.3390/s18030759

    Article  Google Scholar 

  53. Vu DM, Hewitt M, Boland N, Savelsbergh M (2019) Dynamic discretization discovery for solving the time-dependent traveling salesman problem with time windows. Transp Sci

    Google Scholar 

  54. Weinstein R (2005) RFID: a technical overview and its application to the enterprise. IT Prof 7(3):27–33

    Article  Google Scholar 

  55. Whipple JM, Voss MD, Closs DJ (2009) Supply chain security practices in the food industry: do firms operating globally and domestically differ? Int J Phys Distrib Logist Manag 39(7):574–594

    Article  Google Scholar 

  56. Williams NP, Liu Y, Nof SY (2002) TestLAN approach and protocols for the integration of distributed assembly and test networks. Int J Prod Res 40(17):4505–4522

    Article  Google Scholar 

  57. Wolski R, Plank JS, Brevik J, Bryan T (2001) Analyzing market-based resource allocation strategies for the computational grid. Int J High Perform Comput Appl 15(3):258–281

    Article  Google Scholar 

  58. Xiao F, Wang Z, Ye N, Wang R, Li XY (2018) One more tag enables fine-grained RFID localization and tracking. IEEE/ACM Trans Netw 26(1):161–174

    Article  Google Scholar 

  59. Yoon Y, Kim YH (2013) An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks. IEEE Trans Cybern 43(5):1473–1483

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Itshak Tkach .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tkach, I., Edan, Y. (2020). Extended Examples of Single-Layer Multi-sensor Systems. In: Distributed Heterogeneous Multi Sensor Task Allocation Systems. Automation, Collaboration, & E-Services, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-030-34735-2_6

Download citation

Publish with us

Policies and ethics