Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932967
Giannis Botilias, George Pachoulas, S. Margariti, Jeries Besharat, Dimitrios Salmas, C. Stylios
Tourism is a critical element of economic activity and one of the world’s most important sectors. Alongside this, the rapid development of technology and computer science has brought impressive results in the field of smart devices. Technology integration into tourism has brought about a new kind of tourism, that of Smart Tourism. Smart Tourism refers to the growing need to integrate ICT into the tourism industry. This integration aims to improve a place’s economic activity and the user’s experience during their holidays. This study describes developing an ICT system based on innovative mobile phone technology to create a recommendation system.
{"title":"Smart Tourism via Smart Phone – An Enhanced Approach","authors":"Giannis Botilias, George Pachoulas, S. Margariti, Jeries Besharat, Dimitrios Salmas, C. Stylios","doi":"10.1109/SEEDA-CECNSM57760.2022.9932967","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932967","url":null,"abstract":"Tourism is a critical element of economic activity and one of the world’s most important sectors. Alongside this, the rapid development of technology and computer science has brought impressive results in the field of smart devices. Technology integration into tourism has brought about a new kind of tourism, that of Smart Tourism. Smart Tourism refers to the growing need to integrate ICT into the tourism industry. This integration aims to improve a place’s economic activity and the user’s experience during their holidays. This study describes developing an ICT system based on innovative mobile phone technology to create a recommendation system.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"749 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88228953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932897
George Amponis, T. Lagkas, D. Karampatzakis, Panagiotis I. Radoglou-Grammatikis, V. Argyriou, I. Moscholios, S. Goudos, P. Sarigiannidis
With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is different from more traditional WiFi protocols, as the upper five layers of the Open Systems Interconnection (OSI) stack are simplified to a single monolithic layer. The data does not need to travel through all the OSI-or Transmission Control Protocol (TCP)-specific layers, which measurably reduces over-head, processing delay all while increasing system responsiveness. The presented work targets the considerable research gap in regards to this protocol and constitutes an attempt to dissect it and provide experimental results, which prove to be promising for highly mobile clusters. Relevant developments find great applicability in ad hoc and vehicular communications, where real-time connectivity and sufficient coverage are pivotal in supporting reliable networking. In this paper, we also investigate the usage of a modified 802.11 standard to enable long-range and low-power interfacing amongst networked vehicular nodes.
{"title":"Efficient Peer-to-Peer Unicasting for VANET Architectures via Enhanced Monolithic Protocols","authors":"George Amponis, T. Lagkas, D. Karampatzakis, Panagiotis I. Radoglou-Grammatikis, V. Argyriou, I. Moscholios, S. Goudos, P. Sarigiannidis","doi":"10.1109/SEEDA-CECNSM57760.2022.9932897","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932897","url":null,"abstract":"With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is different from more traditional WiFi protocols, as the upper five layers of the Open Systems Interconnection (OSI) stack are simplified to a single monolithic layer. The data does not need to travel through all the OSI-or Transmission Control Protocol (TCP)-specific layers, which measurably reduces over-head, processing delay all while increasing system responsiveness. The presented work targets the considerable research gap in regards to this protocol and constitutes an attempt to dissect it and provide experimental results, which prove to be promising for highly mobile clusters. Relevant developments find great applicability in ad hoc and vehicular communications, where real-time connectivity and sufficient coverage are pivotal in supporting reliable networking. In this paper, we also investigate the usage of a modified 802.11 standard to enable long-range and low-power interfacing amongst networked vehicular nodes.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"75 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77617500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932974
K. Kalovrektis, Apostolos Xenakis, Dimitra Sofianou, Gavriil Simatos, Georgios Papadopoulos, G. Stamoulis
This paper presents a low cost and novel mechanical system to estimate patients’ Alzheimer’s disease (AD) early stage. In essence our device measures the time variance between the patient’s decisions to take his/her medicine. In more detail, the system calculates the time difference between significant time limits, where the patient is supposed to take the pills. This device may work as a warning tool to proactively diagnose and take medical actions, as it calculates patterns within the time difference in the patients’ behavior. To this end, this paper, presents the system testbed, with which we keep track of a patient behavior and warn the treating doctor.
{"title":"A Low Cost IoT TestBed System for Alzheimer’s Early Stages Diagnosis in Health 4.0 Application","authors":"K. Kalovrektis, Apostolos Xenakis, Dimitra Sofianou, Gavriil Simatos, Georgios Papadopoulos, G. Stamoulis","doi":"10.1109/SEEDA-CECNSM57760.2022.9932974","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932974","url":null,"abstract":"This paper presents a low cost and novel mechanical system to estimate patients’ Alzheimer’s disease (AD) early stage. In essence our device measures the time variance between the patient’s decisions to take his/her medicine. In more detail, the system calculates the time difference between significant time limits, where the patient is supposed to take the pills. This device may work as a warning tool to proactively diagnose and take medical actions, as it calculates patterns within the time difference in the patients’ behavior. To this end, this paper, presents the system testbed, with which we keep track of a patient behavior and warn the treating doctor.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"65 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74180429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932907
Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security.
{"title":"Security Revisited: Honeytokens meet Google Authenticator","authors":"Vassilis Papaspirou, Maria Papathanasaki, Leandros A. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke","doi":"10.1109/SEEDA-CECNSM57760.2022.9932907","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932907","url":null,"abstract":"In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"13 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77260054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932971
V. Nastos, Alexandros Bantaloukas-Arjmand, Klevis Tsakai, D. Dimopoulos, D. Varvarousis, A. Tzallas, N. Giannakeas, A. Ploumis, Ch Gogos
Human activity recognition (HAR) and gait analysis are two study topics that are used to identify numerous daily activities, such as walking, running, and stair climbing, and how they are performed. The valid identification of any gait deviation, as an abnormality in the gait cycle, can help in the real-time monitoring of patients with neuromuscular and musculoskeletal causes, and eventually in the restoration of their normal gait function. The current study combines multiple data preprocessing approaches with supervised machine learning algorithms to provide a framework for recognizing diverse gait activities using data samples from the publicly accessible “HuGaDB” human gait database. The automated analysis method takes into account 3-dimensional (3D) signals derived from two types of inertial sensors: accelerometers and gyroscopes, as well as electromyography (EMG) devices placed on the right and left leg of 18 healthy human participants. The proposed tool achieves a classification accuracy of 80% and Fl-score of 79% with Random Forest emerging as the optimal gait patterns identification method.
{"title":"Human Activity Recognition using Machine Learning Techniques","authors":"V. Nastos, Alexandros Bantaloukas-Arjmand, Klevis Tsakai, D. Dimopoulos, D. Varvarousis, A. Tzallas, N. Giannakeas, A. Ploumis, Ch Gogos","doi":"10.1109/SEEDA-CECNSM57760.2022.9932971","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932971","url":null,"abstract":"Human activity recognition (HAR) and gait analysis are two study topics that are used to identify numerous daily activities, such as walking, running, and stair climbing, and how they are performed. The valid identification of any gait deviation, as an abnormality in the gait cycle, can help in the real-time monitoring of patients with neuromuscular and musculoskeletal causes, and eventually in the restoration of their normal gait function. The current study combines multiple data preprocessing approaches with supervised machine learning algorithms to provide a framework for recognizing diverse gait activities using data samples from the publicly accessible “HuGaDB” human gait database. The automated analysis method takes into account 3-dimensional (3D) signals derived from two types of inertial sensors: accelerometers and gyroscopes, as well as electromyography (EMG) devices placed on the right and left leg of 18 healthy human participants. The proposed tool achieves a classification accuracy of 80% and Fl-score of 79% with Random Forest emerging as the optimal gait patterns identification method.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"83 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83985605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932939
K. Dimitropoulos, S. Mystakidis, M. Fragkaki
Continuing, life-long education for flexible upskilling and reskilling has been a systemic challenge, a ruthless race against time, accelerated technological change and unforeseen adversities. Especially in the post-pandemic fourth industrial revolution era, higher education learners need systems that can facilitate durable, reliable knowledge construction and retention. Many e-learning platforms and methods have emerged and tried to solve this problem, however not all with the desired success. This kind of deeper learning is a lot trickier to implement effectively; it requires multifaceted thoughtful instructional and interaction design to operate as it should and keep learners engaged. In this paper, the design and development of a dual, hybrid, neuroscience-informed online learning platform is presented based on the design thinking methodology. This platform was used to facilitate an innovative didactic course based on neuroscience to higher education faculty members.
{"title":"Bringing Educational Neuroscience to Distance Learning with Design Thinking : The Design and Development of a Hybrid E-learning Platform for Skillful Training","authors":"K. Dimitropoulos, S. Mystakidis, M. Fragkaki","doi":"10.1109/SEEDA-CECNSM57760.2022.9932939","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932939","url":null,"abstract":"Continuing, life-long education for flexible upskilling and reskilling has been a systemic challenge, a ruthless race against time, accelerated technological change and unforeseen adversities. Especially in the post-pandemic fourth industrial revolution era, higher education learners need systems that can facilitate durable, reliable knowledge construction and retention. Many e-learning platforms and methods have emerged and tried to solve this problem, however not all with the desired success. This kind of deeper learning is a lot trickier to implement effectively; it requires multifaceted thoughtful instructional and interaction design to operate as it should and keep learners engaged. In this paper, the design and development of a dual, hybrid, neuroscience-informed online learning platform is presented based on the design thinking methodology. This platform was used to facilitate an innovative didactic course based on neuroscience to higher education faculty members.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"18 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84104481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932916
Yiannis Tsampoulatidis, C. Achillas, D. Aidonis, A. Mourouzis, Kyriakos Koritsoglou
Lately, the term accessibility attracts more attention globally in policy, but also in scientific and business terms. This is mainly triggered by two key reasons. The first one is its importance for the social performance of communities. Public are becoming more sensitive in social issues lately, and accessibility is considered a cornerstone towards this direction. Moreover, accessibility becomes essential towards sustainable development, due to its business importance. Efficiently handling accessibility issues and accommodating the special needs of people with disabilities may provide a robust business environment and substantial exploit market opportunities. To that end, the need for accessibility, especially in urban environments, is vital and ICT can play a key role towards enhancing accessibility. There are several tools and applications already available to serve this goal. This work presents a novel tool, namely the Seek & Go application, which is a holistic aid application for disabled people with features of a GPS navigation system, especially designed for pedestrians with mobility problems and special accessibility requirements. The paper briefly discusses the key technical aspects, while also presents user experience insights and description of the models and document schemas that have been selected for its development.
{"title":"Development of a Tool for Auditing Accessibility of Public Infrastructure and Points of Interest in Urban Areas","authors":"Yiannis Tsampoulatidis, C. Achillas, D. Aidonis, A. Mourouzis, Kyriakos Koritsoglou","doi":"10.1109/SEEDA-CECNSM57760.2022.9932916","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932916","url":null,"abstract":"Lately, the term accessibility attracts more attention globally in policy, but also in scientific and business terms. This is mainly triggered by two key reasons. The first one is its importance for the social performance of communities. Public are becoming more sensitive in social issues lately, and accessibility is considered a cornerstone towards this direction. Moreover, accessibility becomes essential towards sustainable development, due to its business importance. Efficiently handling accessibility issues and accommodating the special needs of people with disabilities may provide a robust business environment and substantial exploit market opportunities. To that end, the need for accessibility, especially in urban environments, is vital and ICT can play a key role towards enhancing accessibility. There are several tools and applications already available to serve this goal. This work presents a novel tool, namely the Seek & Go application, which is a holistic aid application for disabled people with features of a GPS navigation system, especially designed for pedestrians with mobility problems and special accessibility requirements. The paper briefly discusses the key technical aspects, while also presents user experience insights and description of the models and document schemas that have been selected for its development.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"37 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84109131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to address the issue of lack of teaching of algorithmic thinking to primary school students in the Greek education system. In our research, we focus on primary school students and introduce material and lesson plans that can be used by teachers who may not have any knowledge of computer science and without the usage of a computer. We show that it is possible for students to comprehend and use algorithms in the context of every day tasks, but also in the context of other subjects (most notably Mathematics). We conducted an in-class evaluation of the proposed approaches using a group of student who had no previous contact with the subject of algorithms or programming. Our results shows that our approach managed to attract the interest of the majority of the students, while many of them were interested in learning even more about algorithms and computer science in the future.
{"title":"Introducing Algorithmic Thinking in Primary Education in Greece","authors":"Athanasios Karakostas, Vasilis Liarokapis, Akrivi Vlachou","doi":"10.1109/SEEDA-CECNSM57760.2022.9932953","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932953","url":null,"abstract":"This paper aims to address the issue of lack of teaching of algorithmic thinking to primary school students in the Greek education system. In our research, we focus on primary school students and introduce material and lesson plans that can be used by teachers who may not have any knowledge of computer science and without the usage of a computer. We show that it is possible for students to comprehend and use algorithms in the context of every day tasks, but also in the context of other subjects (most notably Mathematics). We conducted an in-class evaluation of the proposed approaches using a group of student who had no previous contact with the subject of algorithms or programming. Our results shows that our approach managed to attract the interest of the majority of the students, while many of them were interested in learning even more about algorithms and computer science in the future.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"102 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932980
Aristeidis Karras, Christos N. Karras, K. Giotopoulos, D. Tsolis, K. Oikonomou, S. Sioutas
Federated Learning (FL) is an emerging technique that assures user privacy and data integrity in distributed machine learning environments. To perform so, chunks of data are trained across edge devices and a high performance cluster server maintains a local copy without exchanging it with other parties. In this work, we investigate a FL scenario in a real-world case study using 5, 10 and 20 Raspberry Pi devices acting as clients. Under this setup, we employ the widely known FedAvg algorithm which trains each client for several local epochs and then the weight of each model is aggregated. Moreover we perform experiments across imbalanced and noisy data so as to explore scalability and robustness based on real-world datasets were noise is present and we also propose two innovative algorithms where the FL scenario is considered as a peer-to-peer formulation. Ultimately, to ensure that each device is not oversampled a client-balancing Dirichlet sampling algorithm with probabilistic guarantees is proposed.
{"title":"Peer to Peer Federated Learning: Towards Decentralized Machine Learning on Edge Devices","authors":"Aristeidis Karras, Christos N. Karras, K. Giotopoulos, D. Tsolis, K. Oikonomou, S. Sioutas","doi":"10.1109/SEEDA-CECNSM57760.2022.9932980","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932980","url":null,"abstract":"Federated Learning (FL) is an emerging technique that assures user privacy and data integrity in distributed machine learning environments. To perform so, chunks of data are trained across edge devices and a high performance cluster server maintains a local copy without exchanging it with other parties. In this work, we investigate a FL scenario in a real-world case study using 5, 10 and 20 Raspberry Pi devices acting as clients. Under this setup, we employ the widely known FedAvg algorithm which trains each client for several local epochs and then the weight of each model is aggregated. Moreover we perform experiments across imbalanced and noisy data so as to explore scalability and robustness based on real-world datasets were noise is present and we also propose two innovative algorithms where the FL scenario is considered as a peer-to-peer formulation. Ultimately, to ensure that each device is not oversampled a client-balancing Dirichlet sampling algorithm with probabilistic guarantees is proposed.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"26 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82699229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.1109/SEEDA-CECNSM57760.2022.9932945
K. Bezas, Georgios Tsoumanis, Kyriakos Koritsoglou, K. Oikonomou, A. Tzallas, N. Giannakeas, M. Tsipouras, C. T. Angelis
Drones have evolved over the past years to a level that they have become more efficient and, at the same time, have miniature sizes and advanced environment sensing capabilities. As a result, drone swarms are being applied in various applications nowadays, as they can sense and process information from the surrounding environment to achieve higher level of functionality. For example, drone swarms are employed in disaster control and large area monitoring to prevent catastrophic events such as wild fires. For drone swarms to operate properly, a critical aspect is their remote command and control capabilities. Since swarms can possibly consist of an increased number of drones, it is important that they hold a certain degree of autonomy. In the current work, a Coverage Path Planning (CPP) algorithm is proposed for unknown area exploration. The proposed algorithm discovers the Wireless Sensor Network (WSN) nodes within the area and, then, it collects their data under a data collection scheme being used. For evaluating the proposed algorithm, a simulated environment is developed to assess its effectiveness in terms of fairness in data collection from the WSN nodes. Fairness, in the current case, measures the percentage of data collected from the WSN nodes and is calculated multiple times during the experiments. Two coverage paths are considered here, the parallel lines and the spiral lines. The results showcase that the coverage path affects the fairness index while the parallel lines seem to provide more consistent data collection than the spiral, the latter increasing the fairness index.
{"title":"A Fairness-aware Coverage Algorithm for Drone Swarms","authors":"K. Bezas, Georgios Tsoumanis, Kyriakos Koritsoglou, K. Oikonomou, A. Tzallas, N. Giannakeas, M. Tsipouras, C. T. Angelis","doi":"10.1109/SEEDA-CECNSM57760.2022.9932945","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932945","url":null,"abstract":"Drones have evolved over the past years to a level that they have become more efficient and, at the same time, have miniature sizes and advanced environment sensing capabilities. As a result, drone swarms are being applied in various applications nowadays, as they can sense and process information from the surrounding environment to achieve higher level of functionality. For example, drone swarms are employed in disaster control and large area monitoring to prevent catastrophic events such as wild fires. For drone swarms to operate properly, a critical aspect is their remote command and control capabilities. Since swarms can possibly consist of an increased number of drones, it is important that they hold a certain degree of autonomy. In the current work, a Coverage Path Planning (CPP) algorithm is proposed for unknown area exploration. The proposed algorithm discovers the Wireless Sensor Network (WSN) nodes within the area and, then, it collects their data under a data collection scheme being used. For evaluating the proposed algorithm, a simulated environment is developed to assess its effectiveness in terms of fairness in data collection from the WSN nodes. Fairness, in the current case, measures the percentage of data collected from the WSN nodes and is calculated multiple times during the experiments. Two coverage paths are considered here, the parallel lines and the spiral lines. The results showcase that the coverage path affects the fairness index while the parallel lines seem to provide more consistent data collection than the spiral, the latter increasing the fairness index.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"32 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81784562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}