Extended Examples of Single-Layer Multi-sensor Systems

  • Itshak TkachEmail author
  • Yael Edan
Part of the Automation, Collaboration, & E-Services book series (ACES, volume 7)


This chapter describes three examples of multi-agent systems: a multi-sensory security system for supply networks, a multi-agent approach to solve the travelling salesman problem and multiple police officers allocated to crime incidents in law enforcement problem. These examples are evaluated by task allocation algorithms to demonstrate the methods described in Chap.  5. The comparison of the performances of nine state-of-the-art algorithms for these case studies is conducted in terms of tasks completion times and the number of unallocated tasks. Scalability and the influence of bias parameters of HDBA were analyzed for different numbers of sensors and tasks.


  1. 1.
    Amador S, Okamoto S, Zivan R (2014) Dynamic multi-agent task allocation with spatial and temporal constraints. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems, pp 1495–1496Google Scholar
  2. 2.
    Angeles R (2005) RFID technologies: supply-chain applications and implementation issues. Inf Syst Manage 22(1):51CrossRefGoogle Scholar
  3. 3.
    Attaran M (2007) RFID: an enabler of supply chain operations. Supply Chain Manag Int J 12(4):249–257CrossRefGoogle Scholar
  4. 4.
    Banks J, Hanny M, Pachano A, Thompson G (2007) RFID applied. Wiley, New JerseyGoogle Scholar
  5. 5.
    Bian F, Kempe D, Govindan R (2006) Utility based sensor selection. In: Proceedings of the 5th international conference on information processing in sensor networks, pp 11–18Google Scholar
  6. 6.
    Bratton D, Kennedy J (2007) Defining a standard for particle swarm optimization. In: IEEE swarm intelligence symposium, April, pp 120–127Google Scholar
  7. 7.
    Brintrup A, Ranasinghe D, McFarlane D (2010) RFID opportunity for leaner manufacturing. Int J Prod Res 48(9):2745–2764CrossRefGoogle Scholar
  8. 8.
    Byers J, Nasser G (2000) Utility-based decision-making in wireless sensor networks. In: Proceedings of the 1st ACM international symposium on mobile ad hoc networking & computing. IEEE Press, Boston, MA, USA, pp 143–144Google Scholar
  9. 9.
    Closs DJ, McGarrell EF (2004) Enhancing security throughout the supply chain. IBM Center for the Business of Government, Washington, DC, pp 10–12Google Scholar
  10. 10.
    Dias EM, Fontana CF, Mori FH, Facioli LP, Zancul PJ (2008) Security supply chain. In: Mastorakis NE, Mladenov V, Bojkovic Z, Simian D, Kartalopoulos S, Varonides A (eds) WSEAS international conference on mathematics and computers in science and engineering, p 12Google Scholar
  11. 11.
    Dorigo M, Maniezzo V, Colorni A (1996) Ant system: optimization by a colony of cooperating agents. IEEE Trans Syst Man Cybern B Cybern 26(1):29–41CrossRefGoogle Scholar
  12. 12.
    Eyers DR, Potter AT, Wang Y (2011) Supply chain implications of e-commerce channels for additive manufacturing. In: International conference of production research, Stuttgart, GermanyGoogle Scholar
  13. 13.
    Floerkemeier C, Lampe M (2005) RFID middleware design—addressing both application needs and RFID constraints. GI Jahrestagung 1:277–281Google Scholar
  14. 14.
    Fokum DT, Frost VS, DePardo D (2009) Experiences from a transportation security sensor network field trial. Technical report ITTC-FY2009-TR-41420-11. The University of KansasGoogle Scholar
  15. 15.
    Gao X, Xiang Z, Wang H, Shen J, Huang J, Song S (2004) An approach to security and privacy of RFID system for supply chain. In: IEEE international conference on e-commerce technology for dynamic e-business, pp 164–168Google Scholar
  16. 16.
    Gerkey BP, Matarić MJ (2003) Multi-robot task allocation: analyzing the complexity and optimality of key architectures. In: IEEE international conference on robotics and automation, pp 3862–3868Google Scholar
  17. 17.
    Gutin G, Punnen AP (eds) (2006) The traveling salesman problem and its variations, vol 12. Springer Science & Business MediaGoogle Scholar
  18. 18.
    Halim AH, Ismail I (2019) Combinatorial optimization: comparison of heuristic algorithms in travelling salesman problem. Arch Comput Methods Eng 26(2):367–380MathSciNetCrossRefGoogle Scholar
  19. 19.
    Haroun SA, Jamal B (2015) A performance comparison of GA and ACO applied to TSP. Int J Comput Appl 117(20)CrossRefGoogle Scholar
  20. 20.
    Hore S, Chatterjee A, Dewanji A (2018) Improving variable neighborhood search to solve the traveling salesman problem. Appl Soft Comput 68:83–91CrossRefGoogle Scholar
  21. 21.
    Ito T, Hattori H, Klein M (2007) Multi-issue negotiation protocol for agents: exploring nonlinear utility spaces. IJCAI 7:1347–1352Google Scholar
  22. 22.
    Ivanov D, Dolgui A, Sokolov B (2013) Multi-disciplinary analysis of interfaces “supply chain event management—RFID—control theory”. Int J Integr Supply Manag 8(1/2/3):52–66Google Scholar
  23. 23.
    Jeong W, Nof SY (2009) A collaborative sensor network middleware for automated production systems. Int J Comput Ind Eng 57:106–113CrossRefGoogle Scholar
  24. 24.
    Jevtić A, Gutiérrez A (2011) Distributed bees algorithm parameters optimization for a cost efficient task allocation in swarms of robots. Sensors 11(11):10880–10893CrossRefGoogle Scholar
  25. 25.
    Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697CrossRefGoogle Scholar
  26. 26.
    Ko HS, Azambuja M, Lee HF (2016) Cloud-based materials tracking system prototype integrated with radio frequency identification tagging technology. Autom Constr 63:144–154CrossRefGoogle Scholar
  27. 27.
    Ko HS, Yoon S, Nof SY (2011) Intelligent alert systems for error and conflict allocation in supply networks. In: 18th IFAC world congress, Milano, ItalyGoogle Scholar
  28. 28.
    Kongkaew W, Pichitlamken J (2012) A Gaussian process regression model for the traveling salesman problem. J Comput Sci 8(10):1749–1758CrossRefGoogle Scholar
  29. 29.
    Lau HC, Zhang L (2003) Task allocation via multi-agent coalition formation: taxonomy, algorithms and complexity. In: Proceedings of the 15th IEEE international conference on tools with artificial intelligence, Sacramento, CA, USA, pp 346–350Google Scholar
  30. 30.
    Lawson B, Potter A, Pil FK, Holweg M (2019) Supply chain disruptions: the influence of industry and geography on firm reaction speed. Int J Oper Prod ManagGoogle Scholar
  31. 31.
    Lučić P, Teodorović D (2003) Computing with bees: attacking complex transportation engineering problems. Int J Artif Intell Tools 12(03):375–394CrossRefGoogle Scholar
  32. 32.
    Lučić P, Teodorović D (2002) Transportation modeling: an artificial life approach. In: 14th IEEE international conference on tools with artificial intelligence, pp 216–223Google Scholar
  33. 33.
    Lánská M (2012) Supply chain security. In: Proceedings of the 9th international conference on logistics and sustainable transport, University of Maribor, Faculty of Logistics, Celje, pp 191–195Google Scholar
  34. 34.
    Mari SI, Lee YH, Memon MS, Park YS, Kim M (2015) Adaptivity of complex network topologies for designing resilient supply chain networks. Int J Ind Eng 22(1):102–116Google Scholar
  35. 35.
    Meng Y, Kazeem O, Muller JC (2007) A hybrid ACO/PSO control algorithm for distributed swarm robots. In: IEEE swarm intelligence symposium, April, pp 273–280Google Scholar
  36. 36.
    Modrák V, Moskvich V (2012) Impacts of RFID implementation on cost structure in networked manufacturing. Int J Prod Res 50(14):3847–3859CrossRefGoogle Scholar
  37. 37.
    Naskar S, Basu P, Sen AK (2019) A literature review of the emerging field of IoT using RFID and its applications in supply chain management. In: Securing the internet of things: concepts, methodologies, tools, and applications. IGI Global, pp 1664–1689Google Scholar
  38. 38.
    Nelke SA (2016) Market equilibrium-based mechanism for dynamic task allocation. Doctoral book, Ben-Gurion University of the Negev, Faculty of Engineering Sciences, Department of Industrial Engineering and ManagementGoogle Scholar
  39. 39.
    Ngai EWT, To CK, Moon KK, Chan LK, Yeung PK, Lee MC (2010) RFID systems implementation: a comprehensive framework and a case study. Int J Prod Res 48(9):2583–2612CrossRefGoogle Scholar
  40. 40.
    Park K, Min H, Min S (2016) Inter-relationship among risk taking propensity, supply chain security practices, and supply chain disruption occurrence. J Purch Supply Manag 22(2):120–130CrossRefGoogle Scholar
  41. 41.
    Qiu RG (2007) RFID-enabled automation in support of factory integration. Int J Robot Comput Integr Manuf 23:677–683CrossRefGoogle Scholar
  42. 42.
    Rana OF, Stout K (2000) What is scalability in multi-agent systems? In: Proceedings of the fourth international conference on autonomous agents. ACM, pp 56–63Google Scholar
  43. 43.
    Reinelt G (1991) TSPLIB—a traveling salesman problem library. ORSA J Comput 3:376–384CrossRefGoogle Scholar
  44. 44.
    Rowaihy H, Eswaran S, Johnson M, Verma D, Bar-Noy A, Brown T, Porta TL (2007) A survey of sensor selection schemes in wireless sensor networks. In: Proceedings of SPIE, vol 6562Google Scholar
  45. 45.
    Sharma SK, Vasant BS (2015) Developing a framework for analyzing global supply chain security. IUP J Supply Chain Manag 12(3):7Google Scholar
  46. 46.
    Sidorov M, Ong MT, Sridharan RV, Nakamura J, Ohmura R, Khor JH (2019) "Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains." IEEE Access 7, 7273–7285CrossRefGoogle Scholar
  47. 47.
    Spector L (2004) Automatic quantum computer programming: a genetic programming approach, vol 7. Springer Science & Business MediaGoogle Scholar
  48. 48.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  49. 49.
    Tkach I, Edan Y, Nof SY (2012) Security of supply chains by automatic multi-agents collaboration. Inf Control Probl Manuf 14(1):475–480Google Scholar
  50. 50.
    Tkach I, Edan Y, Nof SY (2017) Multi-sensor task allocation framework for supply networks security using task administration protocols. Int J Prod Res 55:5202–5224CrossRefGoogle Scholar
  51. 51.
    Tkach I, Jevtić A, Nof SY, Edan Y (2013) Automatic multi-sensor task allocation using modified distributed bees algorithm. In: IEEE international conference on systems, man, and cybernetics (SMC), Manchester, England, pp 1401–1406Google Scholar
  52. 52.
    Tkach I, Jevtić A, Edan Y, Nof SY (2018) A modified distributed bees algorithm for multi-sensor task allocation. Sensors 18(3):759. Scholar
  53. 53.
    Vu DM, Hewitt M, Boland N, Savelsbergh M (2019) Dynamic discretization discovery for solving the time-dependent traveling salesman problem with time windows. Transp SciGoogle Scholar
  54. 54.
    Weinstein R (2005) RFID: a technical overview and its application to the enterprise. IT Prof 7(3):27–33CrossRefGoogle Scholar
  55. 55.
    Whipple JM, Voss MD, Closs DJ (2009) Supply chain security practices in the food industry: do firms operating globally and domestically differ? Int J Phys Distrib Logist Manag 39(7):574–594CrossRefGoogle Scholar
  56. 56.
    Williams NP, Liu Y, Nof SY (2002) TestLAN approach and protocols for the integration of distributed assembly and test networks. Int J Prod Res 40(17):4505–4522CrossRefGoogle Scholar
  57. 57.
    Wolski R, Plank JS, Brevik J, Bryan T (2001) Analyzing market-based resource allocation strategies for the computational grid. Int J High Perform Comput Appl 15(3):258–281CrossRefGoogle Scholar
  58. 58.
    Xiao F, Wang Z, Ye N, Wang R, Li XY (2018) One more tag enables fine-grained RFID localization and tracking. IEEE/ACM Trans Netw 26(1):161–174CrossRefGoogle Scholar
  59. 59.
    Yoon Y, Kim YH (2013) An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks. IEEE Trans Cybern 43(5):1473–1483CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Rishon LeZionIsrael
  2. 2.Department of Industrial Engineering and ManagementBen-Gurion University of the NegevBe’er ShevaIsrael

Personalised recommendations