Optimal Trajectory Planning of Drones for 3D Mobile Sensing

Size: px
Start display at page:

Download "Optimal Trajectory Planning of Drones for 3D Mobile Sensing"

Transcription

1 Optimal Trajectory Planning of Drones for 3D Mobile Sensing Pengyu Zhao, Yuzhe Yang, Yuanxing Zhang, Kaigui Bian, Lingyang Song Pengpeng Qiao, Zhetao Li Abstract Mobile sensing is challenging in 3D space, as there are many inaccessible places where people rarely venture. Unmanned aerial vehicle (UAV), commonly known as drone, has greatly extended the scope of mobile sensing in 3D space, and pushed forward a variety of 3D mobile sensing applications, such as aerial photo- or video-graphy, 3D wireless signal survey, and air quality monitoring. However, the short battery life of drones has largely restricted the wide adoption of these applications. In this paper, we study the trajectory planning problem for optimizing the flight route in a given sensing space. We first divide the 3D space into an infinite three-dimensional network of observation locations (OLs), and model the sensing scope as a finite subgraph of 3D OL network. We formulate the problem as finding the optimal trajectory in the sensing scope. We propose an algorithm that finds trajectory in each divided 3D grid of the sensing scope by generating a nearly optimal dominating path, and finding the minimum dominating set in the dominating path. Then, we concatenate obtained trajectories in 3D grids to a nearly optimal trajectory in the sensing scope. Experimental results show that the proposed algorithm takes 24% less time to complete sensing the given space, and during the battery life it can cover 19% more sensing scope, than existing solutions. I. INTRODUCTION Unmanned aerial vehicle (UAV), commonly known as drone, is an aircraft without a human pilot aboard, which is commonly used in measurement and sampling in 3D space [8]. Compared to manned aircraft, drones are more suitable for data collections and mobile sensing applications that capture different dimensions of signals in the environment that are beyond the sensing capability and scope of human beings, such as aerial photography [4], 3D wireless signal survey [1], air quality index (AQI) measurement [5], [9]. However, civilian drones are still not widely used by customers in our daily life today, due to lack of killer applications, and the privacy/safety concerns (no-drone zones are defined to protect the residents privacy, or the safety of civil aviation system). Moreover, if one has actually tried flying a drone, he/she may feel that existing civilian drones are not ready for use in daily life for its limitation in hardware. For example, a drone s battery life is usually tens of minutes (less than half an hour) [7], which limits the scope of the drone when mobile sensing in a large scale space. In this study, we are not interested in the battery technology. Instead, in order to maximize the sensing scope under the limited battery life, we focus on minimizing the time consumed for sensing a given space. Since the drone can sense the signals in the cubic space around it, the sensing scope of a trajectory is the union of the cubic spaces that the drone Battery life (%) Flight Hovering Time consumed (s) Fig. 1: The flight mode consumes more battery power than the hovering mode when flying a DJI Phantom 3 quadcopter. has traversed along the trajectory. Therefore, the trajectory planning problem arises naturally: given a 3D sensing scope, then how to plan the drone s optimal trajectory with a number of stops for minimizing the flight time? The conventional way of addressing the trajectory planning problem for a mobile device (e.g., a robot) takes a two-step approach: (1) first select an arbitrary number of stops; and then (2) connect these stops to create a path. The first step is usually completed by a near-optimal solution to find a minimum vertex cover; and the second step can be done by finding the shortest path connecting those stops [6]. However, such a stop-selection-first strategy does not work well for planning a drone s trajectory. Even though an arbitrary number of stops is chosen first, due to the limited battery life, the drone may not be able to complete the expected path and traverse all stops before running out of battery. Hence, in a given space, it is necessary to first plan a path for the drone, and then select an appropriate number of stops within the path based on its remaining battery life. Moreover, the flight mode is usually dominant in a drone s trajectory, while the hovering mode (for collecting sufficient measurement data in mobile sensing) only takes a few seconds at each stop. It is known that the flight mode consumes more battery power than the hovering mode [7], and our experimental results shown in Figure 1 also confirm this when flying a DJI Phantom 3 quadcopter. These observations again motivate the design of a path-planning-first strategy for addressing the problem. In this paper, we study the optimal trajectory planning problem of a drone for 3D space mobile sensing applications. We divide the 3D space into an infinite observation location (OL) network, and formulate trajectory planning problem as finding the optimal trajectory in a connected subgraph of OL network. We propose a strategy that first determines a nearly optimal dominating path, and then selects an appropriate number of

2 critical OLs within the path to perform measurement. According to the proposed strategy, we are able to draw the dominating path and select critical OLs in O(N) time where N is the total number of OLs in the sensing scope. Our experimental results reveal that the proposed algorithm outperforms existing algorithms in two aspects: (1) the proposed solution takes 24% less time than other solutions to complete sensing the same space; (2) during the battery life, the proposed solution can reach 19% more sensing scope than existing approaches. II. RELATED WORK A. Using drones in 3D mobile sensing Conventional mobile sensing systems rely on the mobile devices or ground-vehicles to perform the environmental sensing in a 2D plane, e.g., the mobile data analysis using robots [2]. Drones become more and more popular in 3D mobile sensing applications since they could capture different dimensions of signals in the 3D environment that are usually beyond our sensing capability. Aerial photo or video-graphy applications [4] facilitate the collection of images, and the analysis over the collected data. For example, it is feasible to locate anomalies in image data, and link particular image data to an address of the property where the anomaly is detected. DroneSense is a system for 3D wireless signal survey [1], i.e., measuring wireless signals in the 3D space, which provides us with an efficient method to quickly analyze wireless coverage and test their wireless propagation models. SensorFly is designed for indoor emergency response or inspections in inaccessible places where people cannot reach [5], which forms aerial sensor network platform that can adapt to node and network disruptions in harsh environments. However, these 3D mobile sensing applications of drones are constrained by the limited battery life, which motivates a more efficient measurement approach to better design the trajectory. B. Trajectory planning problem To address the trajectory planning problem, the genetic algorithm [11] and particle swarm optimization [3] are always proposed for real-time path planning, which could find an optimal or near-optimal path for robotics in both complicated static and dynamic environments. These approaches have been applied on the UAV platform which could ensure partial minimality between two nodes. Meanwhile, the trajectory planning for a large scale mobile sensing scenario is usually formulated as an Traveling Salesman Problem (TSP) [6]. Existing solutions take a twostep approach: (1) the first step is to find a vertex cover in the underlying network graph (i.e., a number of measurement locations that cover the given sensing area); and (2) the second step is to find the shortest path connecting these vertices (locations), along which the mobile device can traverse to complete the mobile sensing task in space. In this paper, we take a different approach by finding the optimal path first and then selecting the measurement locations, as the flight mode consumes more battery than the hovering mode for drone operations. III. SYSTEM MODEL AND PROBLEM FORMULATION In this section, we establish a multi-layer 3D network model for mobile sensing in the 3D space. Then, we analyze the time consumed for mobile sensing. Finally, we formulate the problem as a combination of the minimum dominating path problem and the constrained minimum dominating set problem. A. 3D network model Dividing the 3D space into cuboids: We divide the 3D space into basic cuboids that are a-meter long, b-meter wide and h-meter high. We define the center point of cuboid i as its observation location (OL) (as shown in Figure 2), which is denoted by the 3-tuple (longitude, latitude, and altitude), i.e., OL i = (x i, y i, z i ), where x i, y i, z i are 3D coordinates of OL i. Note that we call the OL at the center of cuboid i as OL i. 3D network of observation locations (OLs): OLs form an infinite 3D network graph in the 3D space. Specifically, the OL inside each cuboid i is considered as a vertex, and an edge (i, j) exists, if cuboid i is adjacent to cuboid j (i.e., they are the same in two coordinates and adjacent to each other in the third dimension coordinate). As a result, the OLs forms an infinite 3D grid. Moreover, the 3D grid could be divided into multiple layers of infinite 2D grids at different height. OL network embedding: We define the OL network embedding of sensing scope as the OLs inside the sensing scope, which forms a finite connected subgraph G = (V ; E ) of the infinite 3D grid. Since the sensing scope could be covered by its inner OLs, and each OL could cover a cuboid area in 3D space, sensing scope could be covered by a union of cuboids. For the convenience of proof, we assume that the sensing scope is a union of cuboids, otherwise we could fill the sensing scope into the ideal shape. The coverage set of OL i: We define the coverage set of OL i as the set of OLs including those located in the neighbor cuboids of the cuboid i, plus OL i itself, as shown in Figure 2. We denote the coverage set of vertex v as Cov(v), and the coverage set of a vertex set S as Cov(S). Correlation between OLs: We assume that the sensed data at two OLs in the same 3D space may have certain correlation. Intuitively, the more distant two OLs are located, the less correlation they may have. That is, two adjacent OLs have the strongest correlation in their sensed data; the sensed data at two adjacent OLs are almost the same if the distance between them is small. Hence, if the drone has sensed at one OL, it can skip sensing at its adjacent OLs. Critical OL (COL): Given a specific sensing scope and its OL network embedding G = (V ; E ), it is inefficient for 2

3 Unmeasured Location covers all OLs in V, and then select a set V C of COLs from V P as the dominating set. 3-Dimension Spatial Grid Observation Location Coverage Set Fig. 2: The divided cuboids of a 3D space; a center OL in the cuboid in the green color; and the OLs and their cuboids in the coverage set of the center OL. a drone to traverse all OLs in V. Based on the correlation between OLs, we could select a number of critical observation locations (COLs) in V where the drone can perform the measurement. B. Time consumed The time consumed by the 3D mobile sensing of drones consists of two parts: (1) the flight time, and (2) the measurement time. Let V C V denote the set of COLs in the sensing scope with embedding G = (V ; E ). Let V P V denote the set of vertices in the drone s trajectory which forms a path of OLs in the sensing scope. We have V C V P since the trajectory should contain the COLs. Flight time: the flight time T F is time consumed by the drone s flight. In the formed 3D grid, we use Hamiltonian distance to characterize the distance between OLs. So the flight time is proportion to the length of the trajectory, which is written as T F = t F V P, where t F is the flight time for a unit length in the coordinate system. Measurement time: the measurement time T M is time consumed by the drone for hovering and measurement. For the same sensing task (e.g., WiFi signal survey), we could assume that measurement time is the same for all OLs. So the total measurement time is proportion to the number of COLs, which can be written as T M = t M V C, where t M is the measurement time at each OL. Therefore, the total time T consumed by the drone is C. Problem formulation T = T F + T M. We formulate this problem as a combination of a minimum dominating path problem and a constrained minimum dominating set problem in a connected finite subgraph of infinite 3D grid. Problem 1 (Trajectory planning by both flight time and measurement time). Given a specific sensing scope in which OLs forms a connected subgraph G = (V ; E ) of infinite 3D grid graph, assume the time required for completing a drone s trajectory is dependent on the drone s flight time and measurement time, we seek to find the minimum dominating path V P V which minimize V P, V C subject to Cov(v) = V, v V P Cov(v) = V, v V C V P is a path, V C V P. IV. TRAJECTORY PLANNING MECHANISM In this section, we address Problem 1 by proposing an algorithm which divides OL network embedding of the sensing scope into multiple 3D grids first. For each 3D grid, we construct a nearly optimal trajectory by generating a dominating path, and then selecting critical OLs in it. Finally, we concatenate trajectories in 3D grids into the trajectory of sensing scope. A. Sensing scope division and trajectory planning For a given sensing scope in 3D space, its OL network embedding G is a finite subgraph of infinite 3D OL grid. As the shape of sensing scope is arbitrary, specifically, a union of cuboids, it is difficult to plan a optimal trajectory for the sensing scope. We will show the whole process for the sensing scope in Figure 3. Thus, we propose the following proposition: Proposition 1. Sensing scope could be divided into multiple disjoint 3D cuboids. Hence, its OL network embedding G could be divided into multiple disjoint 3D grids. Proof. We divide sensing scope in the same way as the division of 3D space in Section III, and merge adjacent cuboids until no two adjacent cuboids could be combined. Therefore, sensing scope could be divided into multiple disjoint 3D cuboids. Obviously, the OLs in each divided 3D cuboid forms a 3D grid, so G could be divided into multiple disjoint 3D grids. Following the proposition, the OL network embedding G could be divided into multiple disjoint 3D grids. And from the definition of the division, each 3D grid could be further divided into 2D grids in different layers. Then, for a given sensing scope, we could divide OLs in it into several multilayer 2D grids. Let L m,n denote a 2D grid with m rows and n columns. Since 2D grids of a 3D grid are the same in different layers, our proposed algorithm works by following steps. First, we divide the OL network embedding of sensing scope into several 3D grids. For each 3D grid, we generate a nearly optimal dominating path by connecting minimum dominating sets of different layer 2D grids. Then, we select COLs from the dominating path in the 3D grid. Finally, we merge trajectories in 3D grids into the trajectory of sensing scope. 3

4 Fig. 3: The top figure is an irregular sensing scope of a real 3D space. The bottom figure shows the sensing scope division of the above space. We will show how to construct trajectory in detail in the following sections. B. Generating nearly optimal dominating path in a 3D grid For each 3D grid, since 2D grids in different layers are the same, the minimum dominating set in each 2D grid is also the same. We will show that those dominating sets could be connected into a nearly optimal dominating path of the 3D grid. Proposition 2. Given a specific 3D grid G = (V; E) = L m,n,p, denote G i = L m,n as the layer i 2D grid of G, and denote VS i = {(x 1, y 1, i), (x 2, y 2, i),..., (x V i S, y VS i, i)} Gi as the minimum dominating set of G i, where (x j, y j, i) is the intersection of row x j and column y j in layer i. Then, we have (1) p 1 V S i forms a dominating set in G. (2) p 1 V S i could be concatenated into a dominating path (V P ) of G. (3) V P is optimal when m, n and p tend to infinity. Proof. We denote V S as the size of all VS i because the minimum dominating sets are the same for 2D grids in different layers. Therefore, (1) since VS i is a dominating set in Gi, and G = p 1 Gi, p 1 V S i is a dominating set of G. (2) As we have proved the domination property in (1), we could generate a dominating path as follows: First, for j = 1, 2,..., V S, we connect vertices in the same position of different layers and get a dominating path P j = {(x j, y j, 1), (x j, y j, 2),..., (x j, y j, p)}. Then, we concatenate P 1, P 2,..., P V S on the top layer and the bottom layer to a dominating path (V P ) of G, as shown in Figure 4(c). (3) Because every vertex has at most 7 neighbors (including itself) in 3D space, vertices in every dominating path could cover only 5 vertices (including itself) other than its predecessor and successor. Therefore, the size of the minimum dominating path in G should be greater than m n p 5. From [1], when m and n tend to infinity, we have lim V (m + 2) (n + 2) S = lim 4. (1) m,n m,n 5 Since those vertices which are used to connect P i in both the top layer and the bottom layer could not exceed a single 2D grid L m,n, we have V S V P P i + m n i=1 p = V i S + m n (2) i=1 = p V S + m n. Thus, when m, n and p tend to infinity, we have lim V P lim p V S + m n m,n,p m,n,p (m + 2) (n + 2) = lim p 4 + m n m,n,p 5 pmn = lim m,n, p n + 2 5m + 1 p 16 mn = lim m,n, p = lim m,n, p pmn 5 1 pmn 5. (3) Therefore, V P converges to the size of the minimum dominating path in G, which means the proposed dominating path is optimal. Following the above method, we could obtain a nearly optimal dominating path in a 3D grid. Figure 4 (a)-(d) shows the dominating path generation in a divided 3D cuboid. C. Selecting COLs from obatined dominating paths In the previous section, we find a nearly optimal dominating path in the 3D grid. We will give an approach to show how to select COLs from the obtained dominating path in a specific 3D grid G = (V; E) = L m,n,p. We use the same symbols as Proposition 2. First, we select all vertices in VS i as COLs, for i = 3, 4,..., p 2. Then, for v = (x j, y j, 1) VS 1, if there exists a vertex u = (x j, y j, 1) V P such that u is adjacent to v, while (x j, y j, 2) is the only one vertex which could only be covered by w = (x j, y j, 2), we select u as COL. Otherwise, we select v and w as COLs. Similarly, for v = (x j, y j, p) V p S, if there exists a vertex u = (x j, y j, p) V P such that u is adjacent to v, while (x j, y j, p 1) is the only one vertex which could only be covered by w = (x j, y j, p 1), we select u as COL. Otherwise, we select v and w as COLs. Since the vertices in selected COLs could cover the coverage set of all vertices in p 1 V S i, while from Proposition 2 p 1 V S i is a dominating set of G, the selected COLs forms a 4

5 (a) (b) (c) (d) (e) Fig. 4: A nearly optimal trajectory planning in a 3D cuboid. Figure (a) shows the 3D grid (blue vertices) in the cuboid. For each layer of 3D grid, we select the minimum dominating set (black vertices) in it as shown in (b), where we hide the blue vertices for better visualization. We connect vertices in the same position of different layer dominating sets (grey lines), as shown in (c). We then concatenate obtained vertical paths on the top layer and the bottom layer (with dark blue vertices as connecting vertices), and get a nearly optimal dominating path in the cuboid as shown in (d). Finally, we select COLs (orange vertices) from the dominating path with the proposed approach as shown in (e). dominating set of G. Then, we will show that the obtained COLs is optimal. dominating set. Thus, we assume there is only one vertex u = (x j, y j, 2) in v s independent coverage set. Then, we choose w = (x j, y j, 1) to cover u if w VP. If we just replace v by w, the size the obtained dominating set is the same as Ð p of i. However, since l = (x, y, 1) s independent V j j 1 S coverage set is one layer below v s independent coverage set, l s independent coverage set contains w only. Therefore, we could use w to replace both v and l which belong to 1 VSi if the above condition is fulfilled. 3) Since the replacement in both layer p 1 and p is the same as layer 1 and 2, we would not repeat here. Proposition 3. The selected COLs is a constrained minimum dominating set of G, which is restricted in VP. Proof. Again, we use the same symbols as Proposition 2. Moreover, we define connecting vertices as the relative complement of 1 VSi with respect to VP. And we define independent coverage set of a vertex v in VP as the coverage set of v which could not be covered by other vertices in VP except connecting vertices. Since 1 VSi is a dominating set in VP, we would like to consider the replacement of vertices in 1 VSi to a constrained minimum dominating set in VP. That is, if 1 VSi is not the smallest constrained dominating set, some vertices in it could be replaced by a smaller subset (or empty set) in VP while keeping the coverage set unchanged. Specifically, v VSi might be replaced by vertices between layer i 1 and i + 1. We will show the replacement of vertices in different layers below. 1) When 2 < i < p 1, for v VSi, v s independent coverage set contains at least one vertex, because from [1], v covers at least one vertex (other than v) which is beyond the coverage set of other vertices in layer i of VP (which is indeed VSi ), not to mention vertices in layer i 1 and layer i + 1. Therefore, we could not replace v by any other vertices in the dominating path. This implies that the constrained minimum dominating set in VP contains all vertices in VSi for 2 < i < p 1. 2) We consider dominating set in both layer 1 and 2. If we want to replace a vertex v in layer 1, we would need one more connecting vertex in the same layer since v s independent coverage set contains at least one vertex. Therefore, we could not just replace vertices in layer 1. If we want to replace v = (x j, y j, 2) VS2, since v s independent coverage set contains at least one vertex, we could only choose connecting vertices in layer 1 to cover v s independent coverage set. If v s independent coverage set needs more than two vertices to cover, we would not acquire a smaller Note that the result of replacement is the same as the selected COLs. Therefore, the selected COLs is a constrained minimum dominating set of G. Following Propositions 2 and 3, we could get a nearly optimal trajectory in a 3D grid as shown in Figure 4. D. Concatenating trajectories in 3D grids to the trajectory of sensing scope For each 3D grid divided from sensing scope, we could construct a nearly optimal trajectory by finding a nearly optimal dominating path, and selecting a constrained minimum dominating set in the dominating path with above method. Then, we will show how to generate the trajectory of sensing scope. First, we could simply construct the set of COLs in the sensing scope by joining COLs of all divided 3D grids. Based on the domination property of the dominating path and the connectivity of sensing scope, every pair of adjacent 3D grids must intersect in their minimum dominating paths or in the neighborhood of their minimum dominating paths. Therefore, we propose a heuristic algorithm that traverses obtained dominating paths in 3D grids in the spatial order. Specifically, if any unvisited 3D grid is in the neighborhood of current position, we traverse it recursively, mark it visited, and move back to the origin position after traversal. Since the OL network embedding of sensing scope is connected, 5

6 Start and then select COLs from path. The two algorithms are introduced below. 1) COL prior algorithm: We select the minimum dominating set in the sensing scope as COLs, and find a optimal dominating path to connect those vertices following the layer-first strategy which chooses the next COL as the closest one in the same layer. 2) Path greedy algorithm: We select an OL as start point. Then, we use a greedy algorithm to construct the dominating path in the sensing scope which chooses the next vertex v as the closest one that can lead to the maximum coverage, such as: min max v, where End d(v,v ) N [v]\n [P] v V is the last vertex of path of V P V. Next, we select the minimum dominating set constrained in V P as COLs. Performance metrics: We use the following two metrics for evaluating the algorithm performance. Time consumed: The time consumed is defined as total time of flight and measurement of the drone to cover the space of the trajectory under a specific algorithm. Coverage space: The coverage space is defined as the maximum coverage area in the 3D space during entire battery life, by following the trajectory under a specific algorithm. Fig. 5: The nearly optimal trajectory in the whole sensing scope generated by the proposed algorithm. Orange vertices are COLs, blue vertices are connecting vertices. Fig. 6: DJI Phantom 3 quadcopter. we could finally obtain a nearly optimal trajectory of sensing scope by traversing dominating paths of all 3D grids. Thus, given a specific 3D sensing scope, we could generate a nearly optimal trajectory for the drone. Figure 5 shows the obtained trajectory in sensing scope shown in Figure 3. B. Experimental Results We divide the 3D space into cuboids, and choose an irregular open space in a university campus as sensing scope. Using sensing scope division algorithm in Section IV-A, sensing scope could be divided into 5 disjoint 3D cuboids, which are 7 7 7, 9 5 8, 4 6 5, 1 5 5, 3 6 7, respectively as shown in Figure 3. Since the time consumed is the sum of flight time and measurement time, we consider the impact of different measurement times in experiments, which are set as, 1, 2, 5 seconds at each COL. The trajectory generated by proposed algorithm is shown in Figure 5. Time consumed: Figure 7 shows the time consumed under compared algorithms with different granularity of the measurement time. We observe that our proposed algorithm consumes less time for all measurement granularities. Furthermore, the gap between our algorithm and compared algorithms increases as the measurement time increases. Coverage space: Figure 8 shows the coverage space in the sensing scope under compared algorithms with different granularity of the measurement time during the battery life. We limit battery life under which trajectories generated by the proposed algorithm and compared algorithms would not exceed sensing scope. We observe that our proposed algorithm could cover more space than compared algorithms during the whole battery life, when the unit measurement time are, 1, 2 seconds. While in the case that the unit measurement time is 5 seconds, path greedy algorithm outperforms other algorithms, since it utilizes a short-sighted strategy, which means it could cover more space in the early stages, but also face a performance drop in the final stages. As the V. E VALUATION A. Experiment Setup Prototype: The prototype consists of two parts: (1) a drone with an API that can configure its trajectory; and (2) a measurement sensor board or a smartphone is installed into a plastic box with vent-holes made by a laser engraving machine, which is attached at the bottom of the drone. The drone we use is a DJI Phantom 3 quadcopter, as shown in Figure 6. There is an intelligent flight mode that allows the customization of the trajectory by configuring a number of stop locations such that the drone will autonomously follow this trajectory to hover over each stop and complete the flight. The GPS sensor, ultrasonic sensor, and the motion sensors collectively determine the current observation location of the drone and guide the drone to the next stop in the trajectory. At each stop, the drone hovers for a few seconds, t M, to collect sufficient measurement data, before traversing to the next stop. Compared algorithms: We compare the proposed algorithm with two other conventional algorithms. In proposed algorithm, we choose dominating paths in divided 3D grids, select COLs from paths, and merge obtained trajectories into the trajectory of sensing scope. In contrast, the first conventional algorithm we considered will select COLs first, and then choose a path to connect the selected COLs, while the second conventional algorithm we considered will choose a dominating path in the whole sensing scope greedily first, 6

7 1 2 5 Time consumed (s) Measurement time (s) Fig. 7: Time consumed of three algorithms with different granularity of measurement time. Coverage space (m 3 ) Measurement time (s) Fig. 8: Coverage space of three algorithms with different granularity of measurement time. Time consumed (s) No Loads With Cell Phones With AQI Sensors Fig. 9: Time consumed of three algorithms with different loads. Coverage space (m 3 ) No Loads With Cell Phones With AQI Sensors Fig. 1: Coverage space of three algorithms with different loads. measurement time increases, the coverage area by any of three algorithms decreases, since the measurement time consumes part of the battery. Time consumed and the coverage space with different loads: In a real-world application, drones might be used to delivery packages or other goods. Hence, we also evaluate the time consumed and the coverage space with different loads when we only consider the flight time. We fix the unit measurement time, which is 2 seconds at each COL. Results in Figure 9 and 1 show that as the load increases, the time consumed of three algorithms to complete the sensing task of a given grid increases; meanwhile, the coverage space of three algorithms during the battery life decreases. Note that the proposed algorithm performs the best in all scenarios under different loads on the drone. Results in different-size spaces: In above experiments, we only test the performance of compared algorithm in a given sensing scope with the fixed size. Next, we evaluate the algorithms performance in different-size spaces. Specifically, we fix the height of sensing scope, and test the performance in different-size 3D grids. Figure 11 shows the flight time in spaces with different width and length. We observe that our algorithm consumes less time to complete the sensing task in each grid. When fixing the width (or length) of the grid, the gap among algorithms increases as the length (or width) increases. VI. CONCLUSIONS In this paper, we study the optimal trajectory planning problem for mobile sensing in 3D space, where a drone can cover the sensing scope of the space by following the minimum-cost trajectory. We divide the 3D space into a grid of observation locations, and consider the sensing scope as a finite subgraph of the infinite 3D grid. We formulate the problem as finding the minimum dominating path to cover the sensing scope in 3D space with the minimum number of stops. We propose a nearly optimal algorithm that first finds the minimum dominating path and critical OLs in the dominating path in each 3D grid divided from the sensing scope embedding, and then concatenates obtained trajectories in 3D grids to the trajectory of the sensing scope. Experimental results show that the proposed algorithm can save 24% less time than existing approaches to complete sensing a given space; during the battery life, it can cover 19% more sensing scope than existing solutions. Fig. 11: Comparison of the proposed, COL prior, and path greedy algorithms on time consumed in different-size grids. REFERENCES [1] S. Alanko, S. Crevals, A. Isopoussu, P. Östergård, and V. Pettersson. Computing the domination number of grid graphs. the electronic journal of combinatorics, 18(1):P141, 211. [2] R. Brooks. A robust layered control system for a mobile robot. IEEE journal on robotics and automation, 2(1):14 23, [3] Y. Fu, M. Ding, and C. Zhou. Phase angle-encoded and quantumbehaved particle swarm optimization applied to three-dimensional route planning for uav. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 42(2): , 212. [4] D. L. Newman. Drone for collecting images and system for categorizing image data, 214. [5] A. Purohit, Z. Sun, F. Mokaya, and P. Zhang. Sensorfly: Controlledmobile sensing platform for indoor emergency response applications. In International Conference on Information Processing in Sensor Networks, pages , 211. [6] K. Savla, F. Bullo, and E. Frazzoli. On traveling salesperson problems for dubins vehicle: stochastic and dynamic environments. In Decision and Control, 25 and 25 European Control Conference. Cdc-Ecc 5. IEEE Conference on, pages , 25. [7] D.-J. I. Science and L. D. Technology Co. Phantom 3 professional. Website, [8] K. P. Valavanis and G. J. Vachtsevanos. Handbook of unmanned aerial vehicles. Springer Publishing Company, Incorporated, 214. [9] Y. Yang, Z. Zheng, K. Bian, Y. Jiang, L. Song, and Z. Han. Arms: a fine-grained 3d aqi realtime monitoring system by uav. In IEEE GLOBECOM, 217, pages 1 6. IEEE, 217. [1] E. Yu, X. Xiong, and X. Zhou. Automating 3d wireless measurements with drones. In Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, pages 65 72, 216. [11] S. C. Yun, V. Ganapathy, and L. O. Chong. Improved genetic algorithms based optimum path planning for mobile robot. In International Conference on Control Automation Robotics & Vision, pages ,

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization Lana Dalawr Jalal Abstract This paper addresses the problem of offline path planning for

More information

The Traveling Salesperson Problem with Forbidden Neighborhoods on Regular 3D Grids

The Traveling Salesperson Problem with Forbidden Neighborhoods on Regular 3D Grids The Traveling Salesperson Problem with Forbidden Neighborhoods on Regular 3D Grids Anja Fischer, Philipp Hungerländer 2, and Anna Jellen 2 Tehnische Universität Dortmund, Germany, anja2.fischer@tu-dortmund.de,

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Reality Modeling Drone Capture Guide

Reality Modeling Drone Capture Guide Reality Modeling Drone Capture Guide Discover the best practices for photo acquisition-leveraging drones to create 3D reality models with ContextCapture, Bentley s reality modeling software. Learn the

More information

Rectification Algorithm for Linear Pushbroom Image of UAV

Rectification Algorithm for Linear Pushbroom Image of UAV Rectification Algorithm for Linear Pushbroom Image of UAV Ruoming SHI and Ling ZHU INTRODUCTION In recent years, unmanned aerial vehicle (UAV) has become a strong supplement and an important complement

More information

Rectification Algorithm for Linear Pushbroom Image of UAV

Rectification Algorithm for Linear Pushbroom Image of UAV Ruoming SHI and Ling ZHU, China Key words: Rectification, Linear Pushbroom, GCP, UAV. 2 SUMMARY This research presents a method of rectification for the image flow acquired by UAV. The sensor on the UAV

More information

EULER S FORMULA AND THE FIVE COLOR THEOREM

EULER S FORMULA AND THE FIVE COLOR THEOREM EULER S FORMULA AND THE FIVE COLOR THEOREM MIN JAE SONG Abstract. In this paper, we will define the necessary concepts to formulate map coloring problems. Then, we will prove Euler s formula and apply

More information

Approximation Algorithms

Approximation Algorithms Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Approximation Algorithms Tamassia Approximation Algorithms 1 Applications One of

More information

Mathematical Thinking

Mathematical Thinking Mathematical Thinking Chapter 2 Hamiltonian Circuits and Spanning Trees It often happens in mathematics that what appears to be a minor detail in the statement of a problem can have a profound effect on

More information

Adjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge.

Adjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge. 1 Graph Basics What is a graph? Graph: a graph G consists of a set of vertices, denoted V (G), a set of edges, denoted E(G), and a relation called incidence so that each edge is incident with either one

More information

Chapter 12. Path Planning. Beard & McLain, Small Unmanned Aircraft, Princeton University Press, 2012,

Chapter 12. Path Planning. Beard & McLain, Small Unmanned Aircraft, Princeton University Press, 2012, Chapter 12 Path Planning Beard & McLain, Small Unmanned Aircraft, Princeton University Press, 212, Chapter 12: Slide 1 Control Architecture destination, obstacles map path planner waypoints status path

More information

The Traveling Salesman Problem on Grids with Forbidden Neighborhoods

The Traveling Salesman Problem on Grids with Forbidden Neighborhoods The Traveling Salesman Problem on Grids with Forbidden Neighborhoods Anja Fischer Philipp Hungerländer April 0, 06 We introduce the Traveling Salesman Problem with forbidden neighborhoods (TSPFN). This

More information

Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes

Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes Leonor Aquino-Ruivivar Mathematics Department, De La Salle University Leonorruivivar@dlsueduph

More information

A motion planning method for mobile robot considering rotational motion in area coverage task

A motion planning method for mobile robot considering rotational motion in area coverage task Asia Pacific Conference on Robot IoT System Development and Platform 018 (APRIS018) A motion planning method for mobile robot considering rotational motion in area coverage task Yano Taiki 1,a) Takase

More information

Algorithms for Euclidean TSP

Algorithms for Euclidean TSP This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation

More information

Topology Homework 3. Section Section 3.3. Samuel Otten

Topology Homework 3. Section Section 3.3. Samuel Otten Topology Homework 3 Section 3.1 - Section 3.3 Samuel Otten 3.1 (1) Proposition. The intersection of finitely many open sets is open and the union of finitely many closed sets is closed. Proof. Note that

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that

More information

REINFORCEMENT LEARNING: MDP APPLIED TO AUTONOMOUS NAVIGATION

REINFORCEMENT LEARNING: MDP APPLIED TO AUTONOMOUS NAVIGATION REINFORCEMENT LEARNING: MDP APPLIED TO AUTONOMOUS NAVIGATION ABSTRACT Mark A. Mueller Georgia Institute of Technology, Computer Science, Atlanta, GA USA The problem of autonomous vehicle navigation between

More information

Computational Geometry

Computational Geometry Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Notes for Recitation 9

Notes for Recitation 9 6.042/18.062J Mathematics for Computer Science October 8, 2010 Tom Leighton and Marten van Dijk Notes for Recitation 9 1 Traveling Salesperson Problem Now we re going to talk about a famous optimization

More information

Optimal Detector Locations for OD Matrix Estimation

Optimal Detector Locations for OD Matrix Estimation Optimal Detector Locations for OD Matrix Estimation Ying Liu 1, Xiaorong Lai, Gang-len Chang 3 Abstract This paper has investigated critical issues associated with Optimal Detector Locations for OD matrix

More information

DEVELOPMENT OF A ROBUST IMAGE MOSAICKING METHOD FOR SMALL UNMANNED AERIAL VEHICLE

DEVELOPMENT OF A ROBUST IMAGE MOSAICKING METHOD FOR SMALL UNMANNED AERIAL VEHICLE DEVELOPMENT OF A ROBUST IMAGE MOSAICKING METHOD FOR SMALL UNMANNED AERIAL VEHICLE J. Kim and T. Kim* Dept. of Geoinformatic Engineering, Inha University, Incheon, Korea- jikim3124@inha.edu, tezid@inha.ac.kr

More information

UAV Position and Attitude Sensoring in Indoor Environment Using Cameras

UAV Position and Attitude Sensoring in Indoor Environment Using Cameras UAV Position and Attitude Sensoring in Indoor Environment Using Cameras 1 Peng Xu Abstract There are great advantages of indoor experiment for UAVs. Test flights of UAV in laboratory is more convenient,

More information

Epipolar geometry-based ego-localization using an in-vehicle monocular camera

Epipolar geometry-based ego-localization using an in-vehicle monocular camera Epipolar geometry-based ego-localization using an in-vehicle monocular camera Haruya Kyutoku 1, Yasutomo Kawanishi 1, Daisuke Deguchi 1, Ichiro Ide 1, Hiroshi Murase 1 1 : Nagoya University, Japan E-mail:

More information

FACET SHIFT ALGORITHM BASED ON MINIMAL DISTANCE IN SIMPLIFICATION OF BUILDINGS WITH PARALLEL STRUCTURE

FACET SHIFT ALGORITHM BASED ON MINIMAL DISTANCE IN SIMPLIFICATION OF BUILDINGS WITH PARALLEL STRUCTURE FACET SHIFT ALGORITHM BASED ON MINIMAL DISTANCE IN SIMPLIFICATION OF BUILDINGS WITH PARALLEL STRUCTURE GE Lei, WU Fang, QIAN Haizhong, ZHAI Renjian Institute of Surveying and Mapping Information Engineering

More information

A New Protocol of CSI For The Royal Canadian Mounted Police

A New Protocol of CSI For The Royal Canadian Mounted Police A New Protocol of CSI For The Royal Canadian Mounted Police I. Introduction The Royal Canadian Mounted Police started using Unmanned Aerial Vehicles to help them with their work on collision and crime

More information

Image Resizing Based on Gradient Vector Flow Analysis

Image Resizing Based on Gradient Vector Flow Analysis Image Resizing Based on Gradient Vector Flow Analysis Sebastiano Battiato battiato@dmi.unict.it Giovanni Puglisi puglisi@dmi.unict.it Giovanni Maria Farinella gfarinellao@dmi.unict.it Daniele Ravì rav@dmi.unict.it

More information

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

Improving Connectivity via Relays Deployment in Wireless Sensor Networks Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

Placement and Motion Planning Algorithms for Robotic Sensing Systems

Placement and Motion Planning Algorithms for Robotic Sensing Systems Placement and Motion Planning Algorithms for Robotic Sensing Systems Pratap Tokekar Ph.D. Thesis Defense Adviser: Prof. Volkan Isler UNIVERSITY OF MINNESOTA Driven to Discover ROBOTIC SENSOR NETWORKS http://rsn.cs.umn.edu/

More information

A Decreasing k-means Algorithm for the Disk Covering Tour Problem in Wireless Sensor Networks

A Decreasing k-means Algorithm for the Disk Covering Tour Problem in Wireless Sensor Networks A Decreasing k-means Algorithm for the Disk Covering Tour Problem in Wireless Sensor Networks Jia-Jiun Yang National Central University Jehn-Ruey Jiang National Central University Yung-Liang Lai Taoyuan

More information

Definition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1

Definition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1 Graph fundamentals Bipartite graph characterization Lemma. If a graph contains an odd closed walk, then it contains an odd cycle. Proof strategy: Consider a shortest closed odd walk W. If W is not a cycle,

More information

CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information

CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information CrowdPath: A Framework for Next Generation Routing Services using Volunteered Geographic Information Abdeltawab M. Hendawi, Eugene Sturm, Dev Oliver, Shashi Shekhar hendawi@cs.umn.edu, sturm049@umn.edu,

More information

Introduction to Optimization

Introduction to Optimization Introduction to Optimization Greedy Algorithms October 28, 2016 École Centrale Paris, Châtenay-Malabry, France Dimo Brockhoff Inria Saclay Ile-de-France 2 Course Overview Date Fri, 7.10.2016 Fri, 28.10.2016

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are

More information

Ian Mitchell. Department of Computer Science The University of British Columbia

Ian Mitchell. Department of Computer Science The University of British Columbia CPSC 542D: Level Set Methods Dynamic Implicit Surfaces and the Hamilton-Jacobi Equation or What Water Simulation, Robot Path Planning and Aircraft Collision Avoidance Have in Common Ian Mitchell Department

More information

Cascaded Coded Distributed Computing on Heterogeneous Networks

Cascaded Coded Distributed Computing on Heterogeneous Networks Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information

Assessing the Accuracy of Stockpile Volumes Obtained Through Aerial Surveying

Assessing the Accuracy of Stockpile Volumes Obtained Through Aerial Surveying CASE STUDY Assessing the Accuracy of Stockpile Volumes Obtained Through Aerial Surveying Martin Remote Sensing share surveying insight DroneDeploy Introduction This report comes to us from Kelsey Martin,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Robot Path Planning Method Based on Improved Genetic Algorithm

Robot Path Planning Method Based on Improved Genetic Algorithm Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Robot Path Planning Method Based on Improved Genetic Algorithm 1 Mingyang Jiang, 2 Xiaojing Fan, 1 Zhili Pei, 1 Jingqing

More information

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS CHAPTER 6 NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS Abstract Localization of sensor nodes in a wireless sensor network is needed for many practical purposes. If the nodes are considered

More information

Fundamental Properties of Graphs

Fundamental Properties of Graphs Chapter three In many real-life situations we need to know how robust a graph that represents a certain network is, how edges or vertices can be removed without completely destroying the overall connectivity,

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Geometry of Aerial photogrammetry. Panu Srestasathiern, PhD. Researcher Geo-Informatics and Space Technology Development Agency (Public Organization)

Geometry of Aerial photogrammetry. Panu Srestasathiern, PhD. Researcher Geo-Informatics and Space Technology Development Agency (Public Organization) Geometry of Aerial photogrammetry Panu Srestasathiern, PhD. Researcher Geo-Informatics and Space Technology Development Agency (Public Organization) Image formation - Recap The geometry of imaging system

More information

Lecturer 2: Spatial Concepts and Data Models

Lecturer 2: Spatial Concepts and Data Models Lecturer 2: Spatial Concepts and Data Models 2.1 Introduction 2.2 Models of Spatial Information 2.3 Three-Step Database Design 2.4 Extending ER with Spatial Concepts 2.5 Summary Learning Objectives Learning

More information

ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space

ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space Lecturer: Nikolay Atanasov: natanasov@ucsd.edu Teaching Assistants: Tianyu Wang: tiw161@eng.ucsd.edu Yongxi Lu: yol070@eng.ucsd.edu

More information

Locating Objects in a Sensor Grid

Locating Objects in a Sensor Grid Locating Objects in a Sensor Grid Buddhadeb Sau 1 and Krishnendu Mukhopadhyaya 2 1 Department of Mathematics, Jadavpur University, Kolkata - 700032, India buddhadebsau@indiatimes.com 2 Advanced Computing

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

Visualization and Analysis of Inverse Kinematics Algorithms Using Performance Metric Maps

Visualization and Analysis of Inverse Kinematics Algorithms Using Performance Metric Maps Visualization and Analysis of Inverse Kinematics Algorithms Using Performance Metric Maps Oliver Cardwell, Ramakrishnan Mukundan Department of Computer Science and Software Engineering University of Canterbury

More information

arxiv: v1 [cs.ro] 2 Sep 2017

arxiv: v1 [cs.ro] 2 Sep 2017 arxiv:1709.00525v1 [cs.ro] 2 Sep 2017 Sensor Network Based Collision-Free Navigation and Map Building for Mobile Robots Hang Li Abstract Safe robot navigation is a fundamental research field for autonomous

More information

Equipment. Remote Systems & Sensors. Altitude Imaging uses professional drones and sensors operated by highly skilled remote pilots

Equipment. Remote Systems & Sensors. Altitude Imaging uses professional drones and sensors operated by highly skilled remote pilots Remote Systems & Sensors Altitude Imaging uses professional drones and sensors operated by highly skilled remote pilots Equipment www.altitude-imaging.com About Us Altitude Imaging has been providing a

More information

ACO and other (meta)heuristics for CO

ACO and other (meta)heuristics for CO ACO and other (meta)heuristics for CO 32 33 Outline Notes on combinatorial optimization and algorithmic complexity Construction and modification metaheuristics: two complementary ways of searching a solution

More information

A Training Simulator for PD Detection Personnel

A Training Simulator for PD Detection Personnel Journal of Power and Energy Engineering, 2014, 2, 573-578 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24077 A Training Simulator for PD

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Variable-resolution Velocity Roadmap Generation Considering Safety Constraints for Mobile Robots

Variable-resolution Velocity Roadmap Generation Considering Safety Constraints for Mobile Robots Variable-resolution Velocity Roadmap Generation Considering Safety Constraints for Mobile Robots Jingyu Xiang, Yuichi Tazaki, Tatsuya Suzuki and B. Levedahl Abstract This research develops a new roadmap

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

UTILIZATION OF GIS AND GRAPH THEORY FOR DETERMINATION OF OPTIMAL MAILING ROUTE *

UTILIZATION OF GIS AND GRAPH THEORY FOR DETERMINATION OF OPTIMAL MAILING ROUTE * UTILIZATION OF GIS AND GRAPH THEORY FOR DETERMINATION OF OPTIMAL MAILING ROUTE * Dr. Mufid Abudiab, Michael Starek, Rene Lumampao, and An Nguyen Texas A&M University-Corpus Christi 1500 Ocean Drive Corpus

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

CSE 417 Branch & Bound (pt 4) Branch & Bound

CSE 417 Branch & Bound (pt 4) Branch & Bound CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity

More information

Navigation of Multiple Mobile Robots Using Swarm Intelligence

Navigation of Multiple Mobile Robots Using Swarm Intelligence Navigation of Multiple Mobile Robots Using Swarm Intelligence Dayal R. Parhi National Institute of Technology, Rourkela, India E-mail: dayalparhi@yahoo.com Jayanta Kumar Pothal National Institute of Technology,

More information

Hole repair algorithm in hybrid sensor networks

Hole repair algorithm in hybrid sensor networks Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 2016) Hole repair algorithm in hybrid sensor networks Jian Liu1,

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 97 E-mail: natarajan.meghanathan@jsums.edu Optimization vs. Decision

More information

coding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight

coding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight Three-Dimensional Object Reconstruction from Layered Spatial Data Michael Dangl and Robert Sablatnig Vienna University of Technology, Institute of Computer Aided Automation, Pattern Recognition and Image

More information

Detect tracking behavior among trajectory data

Detect tracking behavior among trajectory data Detect tracking behavior among trajectory data Jianqiu Xu, Jiangang Zhou Nanjing University of Aeronautics and Astronautics, China, jianqiu@nuaa.edu.cn, jiangangzhou@nuaa.edu.cn Abstract. Due to the continuing

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

Dijkstra's Algorithm

Dijkstra's Algorithm Shortest Path Algorithm Dijkstra's Algorithm To find the shortest path from the origin node to the destination node No matrix calculation Floyd s Algorithm To find all the shortest paths from the nodes

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 397 E-mail: natarajan.meghanathan@jsums.edu Optimization vs. Decision

More information

Introduction to Parallel & Distributed Computing Parallel Graph Algorithms

Introduction to Parallel & Distributed Computing Parallel Graph Algorithms Introduction to Parallel & Distributed Computing Parallel Graph Algorithms Lecture 16, Spring 2014 Instructor: 罗国杰 gluo@pku.edu.cn In This Lecture Parallel formulations of some important and fundamental

More information

Use of Shape Deformation to Seamlessly Stitch Historical Document Images

Use of Shape Deformation to Seamlessly Stitch Historical Document Images Use of Shape Deformation to Seamlessly Stitch Historical Document Images Wei Liu Wei Fan Li Chen Jun Sun Satoshi Naoi In China, efforts are being made to preserve historical documents in the form of digital

More information

Outline of this Talk

Outline of this Talk Outline of this Talk Data Association associate common detections across frames matching up who is who Two frames: linear assignment problem Generalize to three or more frames increasing solution quality

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

A MULTI-OBJECTIVE GENETIC ALGORITHM FOR A MAXIMUM COVERAGE FLIGHT TRAJECTORY OPTIMIZATION IN A CONSTRAINED ENVIRONMENT

A MULTI-OBJECTIVE GENETIC ALGORITHM FOR A MAXIMUM COVERAGE FLIGHT TRAJECTORY OPTIMIZATION IN A CONSTRAINED ENVIRONMENT A MULTI-OBJECTIVE GENETIC ALGORITHM FOR A MAXIMUM COVERAGE FLIGHT TRAJECTORY OPTIMIZATION IN A CONSTRAINED ENVIRONMENT Bassolillo, S.*, D Amato, E.*, Notaro, I.*, Blasi, L.* * Department of Industrial

More information

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016 edestrian Detection Using Correlated Lidar and Image Data EECS442 Final roject Fall 2016 Samuel Rohrer University of Michigan rohrer@umich.edu Ian Lin University of Michigan tiannis@umich.edu Abstract

More information

Distributed Dominating Sets on Grids

Distributed Dominating Sets on Grids Distributed Dominating Sets on Grids Elaheh Fata Stephen L Smith Shreyas Sundaram Abstract This paper presents a distributed algorithm for finding near optimal dominating sets on grids The basis for this

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

CHAPTER SIX. the RRM creates small covering roadmaps for all tested environments.

CHAPTER SIX. the RRM creates small covering roadmaps for all tested environments. CHAPTER SIX CREATING SMALL ROADMAPS Many algorithms have been proposed that create a roadmap from which a path for a moving object can be extracted. These algorithms generally do not give guarantees on

More information

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4) S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G

More information

Coverage and Search Algorithms. Chapter 10

Coverage and Search Algorithms. Chapter 10 Coverage and Search Algorithms Chapter 10 Objectives To investigate some simple algorithms for covering the area in an environment To understand how to break down an environment into simple convex pieces

More information

Autonomous Navigation in Unknown Environments via Language Grounding

Autonomous Navigation in Unknown Environments via Language Grounding Autonomous Navigation in Unknown Environments via Language Grounding Koushik (kbhavani) Aditya (avmandal) Sanjay (svnaraya) Mentor Jean Oh Introduction As robots become an integral part of various domains

More information

Applications. Foreground / background segmentation Finding skin-colored regions. Finding the moving objects. Intelligent scissors

Applications. Foreground / background segmentation Finding skin-colored regions. Finding the moving objects. Intelligent scissors Segmentation I Goal Separate image into coherent regions Berkeley segmentation database: http://www.eecs.berkeley.edu/research/projects/cs/vision/grouping/segbench/ Slide by L. Lazebnik Applications Intelligent

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. An Introduction to Graph Theory

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. An Introduction to Graph Theory SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics An Introduction to Graph Theory. Introduction. Definitions.. Vertices and Edges... The Handshaking Lemma.. Connected Graphs... Cut-Points and Bridges.

More information

The Fibonacci hypercube

The Fibonacci hypercube AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness

On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness by Elaheh Fata A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information