This document proposes a route selection scheme for drones conducting virtual tours of cultural heritage sites. It uses two algorithms: 1) the Analytic Network Process to model user preferences for different monument types, and 2) the Trapezoidal Fuzzy TOPSIS method to rank candidate drone routes based on how well they cover monuments of interest while accounting for uncertainty. The proposed scheme applies fuzzy multiple attribute decision making to select the optimal route for providing users a satisfactory virtual tour experience tailored to their preferences. Performance evaluation shows it produces better results than existing fuzzy TOPSIS by choosing the most suitable flying route.
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
CAMPUS VIRTUAL TOUR DESIGN TO ENHANCE VISITOR EXPERIENCE AND INTERACTION IN A...ijma
The natural forest and natural laboratory of the UKM campus are a part of nature that could be made into attractions for tourists and visitors, as they are abundant with natural resources, including scenic views, topography, as well as water features, plants, and heritage. The university has undertaken various efforts to share this information through portals and web pages. However, the method of information delivery –
display and delivery of static text and graphics is not that effective. As a consequence, users or visitor are unable to interact or appreciate the experience of being in an natural environment. Therefore, this study has developed a campus virtual tour design to enhance interaction experience in natural environment through a low-fidelity interface design method, brainstorming, and virtual tour prototype development. The
result of this study is a campus virtual tour design that can enhance the experience of benign, and utilisation of a natural environment.
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
CAMPUS VIRTUAL TOUR DESIGN TO ENHANCE VISITOR EXPERIENCE AND INTERACTION IN A...ijma
The natural forest and natural laboratory of the UKM campus are a part of nature that could be made into attractions for tourists and visitors, as they are abundant with natural resources, including scenic views, topography, as well as water features, plants, and heritage. The university has undertaken various efforts to share this information through portals and web pages. However, the method of information delivery –
display and delivery of static text and graphics is not that effective. As a consequence, users or visitor are unable to interact or appreciate the experience of being in an natural environment. Therefore, this study has developed a campus virtual tour design to enhance interaction experience in natural environment through a low-fidelity interface design method, brainstorming, and virtual tour prototype development. The
result of this study is a campus virtual tour design that can enhance the experience of benign, and utilisation of a natural environment.
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services, including medical services with strict constraints. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper, a VHO management scheme for supporting medical services in 5G-VCC systems, is described. It consists of the VHO initiation and the network selection processes, while at the same time, the vehicle’s velocity, its current connection type, as well as the status of the onboard patient’s health, are considered. Specifically, during the VHO initiation process the necessity to perform handover is evaluated. Subsequently, the network selection process selects the appropriate network alternative considering both medical service requirements and patients’ health status. The proposed scheme is applied to a 5G-VCC system which includes Long Term Evolution (LTE) and Worldwide Interoperability Microwave Access (WiMAX) Macrocells and Femtocells, as well as Wireless Access for Vehicular Environment Road Side Units (WAVE RSUs). Performance evaluation shows that the proposed algorithm outperforms existing VHO management schemes.
Pedestrian classification on transfer learning based deep convolutional neur...IJECEIAES
The investigation of a deep neural network for pedestrian classification using transfer learning methods is proposed in this study. The development of deep convolutional neural networks has significantly improved the autonomous driver assistance system for pedestrian classification. However, the presence of partially occluded parts and the appearance variation under complex scenes are still robust to challenge in the pedestrian detection system. To address this problem, we proposed six transfer learning models: end-to-end convolutional neural network (CNN) model, scratch-trained residual network (ResNet50) model, and four transfer learning models: visual geometry group 16 (VGG16), GoogLeNet (InceptionV3), ResNet50, and MobileNet. The performance of the pedestrian classification was evaluated using four publicly datasets: Institut National de Recherche en Sciences et Technologies du Numérique (INRIA), Prince of Songkla University (PSU), CVC05, and Walailak University (WU) datasets. The experimental results show that six transfer learning models achieve classification accuracy of 65.2% (end-to-end CNN), 92.92% (scratch-trained ResNet50), 97.15% (pre-trained VGG16), 94.39% (pre-trained InceptionV3), 90.43% (pre-trained ResNet50), and 98.69% (pre-trained MobileNet) using data from Southern Thailand (PSU dataset). Further analysis reveals that the deeper the ConvNet architecture, the more specific information of features is provided. In addition, the deep ConvNet architecture can distinguish pedestrian occluded patterns while being trained with partially occluded parts of data samples.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADSgerogepatton
As the population grows and more land is being used for urbanization, ecosystems are disrupted by our
roads and cars. This expansion of infrastructure cuts through wildlife territories, leading to many
instances of Wildlife-Vehicle Collision (WVC). These instances of WVC are a global issue that is having a
global socio-economic impact, resulting in billions of dollars in property damage and, at times, fatalities
for vehicle occupants. In Saudi Arabia, this issue is similar, with instances of Camel-Vehicle Collision
(CVC) being particularly deadly due to the large size of camels, which results in a 25% fatality rate [1].
The focus of this work is to test different object detection models on the task of detecting camels on the
road. The Deep Learning (DL) object detection models used in the experiments are: CenterNet, Efficient
Det, Faster R-CNN, SSD, and YOLOv8. Results of the experiments show that YOLOv8 performed the best
in terms of accuracy and was the most efficient in training. In the future, the plan is to expand on this work
by developing a system to make countryside roads safer.
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADSgerogepatton
As the population grows and more land is being used for urbanization, ecosystems are disrupted by our
roads and cars. This expansion of infrastructure cuts through wildlife territories, leading to many
instances of Wildlife-Vehicle Collision (WVC). These instances of WVC are a global issue that is having a
global socio-economic impact, resulting in billions of dollars in property damage and, at times, fatalities
for vehicle occupants. In Saudi Arabia, this issue is similar, with instances of Camel-Vehicle Collision
(CVC) being particularly deadly due to the large size of camels, which results in a 25% fatality rate [1].
The focus of this work is to test different object detection models on the task of detecting camels on the
road. The Deep Learning (DL) object detection models used in the experiments are: CenterNet, Efficient
Det, Faster R-CNN, SSD, and YOLOv8. Results of the experiments show that YOLOv8 performed the best
in terms of accuracy and was the most efficient in training. In the future, the plan is to expand on this work
by developing a system to make countryside roads safer.
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...IJSRD
Recent years have witnessed an increased interest on recommendation system. Classification techniques are supervised that has classified data item into predefined class. An existing system unsupervised constraints are automatically derived from two hidden Tourist area season topic (TAST) for tourist in travel group. It used to an alternating TRAST model are unique characteristic for the travel data and cocktail.
Real time path planning based on hybrid vanet enhanced transportation systemIISTech2015
Real time path planning based on hybrid vanet enhanced transportation system || 2015-2016 IEEE NS2 Projects Training
Contact: IIS TECHNOLOGIES
ph:9952077540,landline:044 42637391
mail:info@iistechnologies.in
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ieijjournal
The communication devices have produced digital traces for their users either voluntarily or not. This type
of collective data can give powerful indications that are affecting the urban systems design and
development. In this study mobile phone data during Armada event is investigated. Analyzing mobile
phone traces gives conceptual views about individuals densities and their mobility patterns in the urban
city. The geo-visualization and statistical techniques have been used for understanding human mobility
collectively and individually. The undertaken substantial parameters are inter-event times, travel distances
(displacements) and radius of gyration. They have been analyzed and simulated using computing platform
by integrating various applications for huge database management, visualization, analysis, and
simulation. Accordingly, the general population pattern law has been extracted. The study contribution
outcomes have revealed both the individuals densities in static perspective and individuals mobility in
dynamic perspective with multi levels of abstraction (macroscopic, mesoscopic, microscopic).
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ieijjournal1
The communication devices have produced digital traces for their users either voluntarily or not. This type
of collective data can give powerful indications that are affecting the urban systems design and
development. In this study mobile phone data during Armada event is investigated. Analyzing mobile
phone traces gives conceptual views about individuals densities and their mobility patterns in the urban
city. The geo-visualization and statistical techniques have been used for understanding human mobility
collectively and individually. The undertaken substantial parameters are inter-event times, travel distances
(displacements) and radius of gyration. They have been analyzed and simulated using computing platform
by integrating various applications for huge database management, visualization, analysis, and
simulation. Accordingly, the general population pattern law has been extracted. The study contribution
outcomes have revealed both the individuals densities in static perspective and individuals mobility in
dynamic perspective with multi levels of abstraction (macroscopic, mesoscopic, microscopic).
Leave a Trace - A People Tracking System Meets Anomaly Detectionijma
Video surveillance always had a negative connotation, among others because of the loss of privacy and because it may not automatically increase public safety. If it was able to detect atypical (i.e. dangerous) situations in real time, autonomously and anonymously, this could change. A prerequisite for this is an automatic detection of possibly dangerous situations from video data. From the derived trajectories we then want to determine dangerous situations by detecting atypical trajectories. However, it is better to develop such a system without people being threatened or even harmed, plus with having them know that there is such a tracking system installed. In the artistic project leave a trace the tracked people become
actor and thus part of the installation. Visualization in real-time allows interaction by these actors, which in turn creates many atypical interaction situations on which we could develop our situation detection.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies to fulfill the requirements of modern vehicular services. Efficient network selection algorithms are required to satisfy the constraints of Driver Assistance (DA) services, Passengers Entertainment and Information (PEnI) services and Medical (MED) services that provided to vehicular users. The presence of MED services affects the importance of other services in situations where patients with immediate health status exist within the vehicle. This paper proposes a network selection scheme which considers the patient health status to adapt the importance of each service. The scheme consists of two Fuzzy Multi Attribute Decision Making (FMADM) algorithms: the Trapezoidal Fuzzy Adaptive Analytic Network Process (TF-AANP) to calculate the relative importance of each vehicular service and the selection criteria, as well as the Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (TFT-ACW) to accomplish the ranking of the candidate networks. Both algorithms use Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN). Performance evaluation shows that the suggested method outperforms existing algorithms by satisfying the constraints of MED services when the patient health status becomes immediate.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
More Related Content
Similar to A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural Interest using Drones
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services, including medical services with strict constraints. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper, a VHO management scheme for supporting medical services in 5G-VCC systems, is described. It consists of the VHO initiation and the network selection processes, while at the same time, the vehicle’s velocity, its current connection type, as well as the status of the onboard patient’s health, are considered. Specifically, during the VHO initiation process the necessity to perform handover is evaluated. Subsequently, the network selection process selects the appropriate network alternative considering both medical service requirements and patients’ health status. The proposed scheme is applied to a 5G-VCC system which includes Long Term Evolution (LTE) and Worldwide Interoperability Microwave Access (WiMAX) Macrocells and Femtocells, as well as Wireless Access for Vehicular Environment Road Side Units (WAVE RSUs). Performance evaluation shows that the proposed algorithm outperforms existing VHO management schemes.
Pedestrian classification on transfer learning based deep convolutional neur...IJECEIAES
The investigation of a deep neural network for pedestrian classification using transfer learning methods is proposed in this study. The development of deep convolutional neural networks has significantly improved the autonomous driver assistance system for pedestrian classification. However, the presence of partially occluded parts and the appearance variation under complex scenes are still robust to challenge in the pedestrian detection system. To address this problem, we proposed six transfer learning models: end-to-end convolutional neural network (CNN) model, scratch-trained residual network (ResNet50) model, and four transfer learning models: visual geometry group 16 (VGG16), GoogLeNet (InceptionV3), ResNet50, and MobileNet. The performance of the pedestrian classification was evaluated using four publicly datasets: Institut National de Recherche en Sciences et Technologies du Numérique (INRIA), Prince of Songkla University (PSU), CVC05, and Walailak University (WU) datasets. The experimental results show that six transfer learning models achieve classification accuracy of 65.2% (end-to-end CNN), 92.92% (scratch-trained ResNet50), 97.15% (pre-trained VGG16), 94.39% (pre-trained InceptionV3), 90.43% (pre-trained ResNet50), and 98.69% (pre-trained MobileNet) using data from Southern Thailand (PSU dataset). Further analysis reveals that the deeper the ConvNet architecture, the more specific information of features is provided. In addition, the deep ConvNet architecture can distinguish pedestrian occluded patterns while being trained with partially occluded parts of data samples.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADSgerogepatton
As the population grows and more land is being used for urbanization, ecosystems are disrupted by our
roads and cars. This expansion of infrastructure cuts through wildlife territories, leading to many
instances of Wildlife-Vehicle Collision (WVC). These instances of WVC are a global issue that is having a
global socio-economic impact, resulting in billions of dollars in property damage and, at times, fatalities
for vehicle occupants. In Saudi Arabia, this issue is similar, with instances of Camel-Vehicle Collision
(CVC) being particularly deadly due to the large size of camels, which results in a 25% fatality rate [1].
The focus of this work is to test different object detection models on the task of detecting camels on the
road. The Deep Learning (DL) object detection models used in the experiments are: CenterNet, Efficient
Det, Faster R-CNN, SSD, and YOLOv8. Results of the experiments show that YOLOv8 performed the best
in terms of accuracy and was the most efficient in training. In the future, the plan is to expand on this work
by developing a system to make countryside roads safer.
SPOT-THE-CAMEL: COMPUTER VISION FOR SAFER ROADSgerogepatton
As the population grows and more land is being used for urbanization, ecosystems are disrupted by our
roads and cars. This expansion of infrastructure cuts through wildlife territories, leading to many
instances of Wildlife-Vehicle Collision (WVC). These instances of WVC are a global issue that is having a
global socio-economic impact, resulting in billions of dollars in property damage and, at times, fatalities
for vehicle occupants. In Saudi Arabia, this issue is similar, with instances of Camel-Vehicle Collision
(CVC) being particularly deadly due to the large size of camels, which results in a 25% fatality rate [1].
The focus of this work is to test different object detection models on the task of detecting camels on the
road. The Deep Learning (DL) object detection models used in the experiments are: CenterNet, Efficient
Det, Faster R-CNN, SSD, and YOLOv8. Results of the experiments show that YOLOv8 performed the best
in terms of accuracy and was the most efficient in training. In the future, the plan is to expand on this work
by developing a system to make countryside roads safer.
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...IJSRD
Recent years have witnessed an increased interest on recommendation system. Classification techniques are supervised that has classified data item into predefined class. An existing system unsupervised constraints are automatically derived from two hidden Tourist area season topic (TAST) for tourist in travel group. It used to an alternating TRAST model are unique characteristic for the travel data and cocktail.
Real time path planning based on hybrid vanet enhanced transportation systemIISTech2015
Real time path planning based on hybrid vanet enhanced transportation system || 2015-2016 IEEE NS2 Projects Training
Contact: IIS TECHNOLOGIES
ph:9952077540,landline:044 42637391
mail:info@iistechnologies.in
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ieijjournal
The communication devices have produced digital traces for their users either voluntarily or not. This type
of collective data can give powerful indications that are affecting the urban systems design and
development. In this study mobile phone data during Armada event is investigated. Analyzing mobile
phone traces gives conceptual views about individuals densities and their mobility patterns in the urban
city. The geo-visualization and statistical techniques have been used for understanding human mobility
collectively and individually. The undertaken substantial parameters are inter-event times, travel distances
(displacements) and radius of gyration. They have been analyzed and simulated using computing platform
by integrating various applications for huge database management, visualization, analysis, and
simulation. Accordingly, the general population pattern law has been extracted. The study contribution
outcomes have revealed both the individuals densities in static perspective and individuals mobility in
dynamic perspective with multi levels of abstraction (macroscopic, mesoscopic, microscopic).
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ieijjournal1
The communication devices have produced digital traces for their users either voluntarily or not. This type
of collective data can give powerful indications that are affecting the urban systems design and
development. In this study mobile phone data during Armada event is investigated. Analyzing mobile
phone traces gives conceptual views about individuals densities and their mobility patterns in the urban
city. The geo-visualization and statistical techniques have been used for understanding human mobility
collectively and individually. The undertaken substantial parameters are inter-event times, travel distances
(displacements) and radius of gyration. They have been analyzed and simulated using computing platform
by integrating various applications for huge database management, visualization, analysis, and
simulation. Accordingly, the general population pattern law has been extracted. The study contribution
outcomes have revealed both the individuals densities in static perspective and individuals mobility in
dynamic perspective with multi levels of abstraction (macroscopic, mesoscopic, microscopic).
Leave a Trace - A People Tracking System Meets Anomaly Detectionijma
Video surveillance always had a negative connotation, among others because of the loss of privacy and because it may not automatically increase public safety. If it was able to detect atypical (i.e. dangerous) situations in real time, autonomously and anonymously, this could change. A prerequisite for this is an automatic detection of possibly dangerous situations from video data. From the derived trajectories we then want to determine dangerous situations by detecting atypical trajectories. However, it is better to develop such a system without people being threatened or even harmed, plus with having them know that there is such a tracking system installed. In the artistic project leave a trace the tracked people become
actor and thus part of the installation. Visualization in real-time allows interaction by these actors, which in turn creates many atypical interaction situations on which we could develop our situation detection.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies to fulfill the requirements of modern vehicular services. Efficient network selection algorithms are required to satisfy the constraints of Driver Assistance (DA) services, Passengers Entertainment and Information (PEnI) services and Medical (MED) services that provided to vehicular users. The presence of MED services affects the importance of other services in situations where patients with immediate health status exist within the vehicle. This paper proposes a network selection scheme which considers the patient health status to adapt the importance of each service. The scheme consists of two Fuzzy Multi Attribute Decision Making (FMADM) algorithms: the Trapezoidal Fuzzy Adaptive Analytic Network Process (TF-AANP) to calculate the relative importance of each vehicular service and the selection criteria, as well as the Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (TFT-ACW) to accomplish the ranking of the candidate networks. Both algorithms use Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN). Performance evaluation shows that the suggested method outperforms existing algorithms by satisfying the constraints of MED services when the patient health status becomes immediate.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...University of Piraeus
Τhe development in the fields of Underwater Cultural Heritage (UCH) management and Maritime Archaeology, yields an interdisciplinary and creative academic framework, such as the Information and Communication Technologies (ICT) sector that has been proved to build intelligent systems and applications. However, the ways to fully make use of these technologies are still being explored, as their potential have not been exploited yet. Underwater archaeological sites, semi (/or fully) submerged settlements, ancient ports and shipwrecks, unlike land sites, are not accessible to public due to their special (sub) marine environment and depth. In this paper, an innovative research idea of using Augmented Reality (AR) for maintaining the memory and the information of underwater archaeological sites, is presented. Although the “artificial” visual documentation cannot replace the authentic values of the underwater tangible heritage, the AR technology can contribute to the protection of the intangible properties and the conquered knowledge of the past of a place. This research work will focus, among other case studies, on the (semi) submerged fortifications and their contiguous contents of the acropolis of Halai in east Lokris, Greece. Hence, along with the climate change that may lead more antiquities covered by water during the following years, the advances in the communication field and the up-coming 5G and cloud technologies will make the idea fully applicable, contributing to the enhancement of the coastal and the underwater archaeological remains.
Fifth generation (5G) Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies to
fulfill the requirements of modern services. Multiple services with dierent Quality of Service (QoS) constraints could be available in each vehicle, while at the same time, user requirements and provider policies must be addressed. Therefore, the design of ecient Vertical Handover (VHO) management schemes for 5G-VCC infrastructures is needed. In this paper, a novel VHO management scheme for 5G-VCC systems is proposed. Whenever the user satisfaction grade becomes less than a predefined threshold, VHO is initiated and network selection is performed, considering the velocity of the vehicle, network characteristic criteria such as throughput, delay, jitter and packet loss, as well as provider policy criteria such as service reliability, security and price. The proposed scheme uses linguistic values for VHO criteria attributes represented by Interval Valued Pentagonal Fuzzy Numbers (IVPFNs) to express the information using membership intervals. The VHO scheme is applied to a 5G-VCC system which includes 3GPP Long Term Evolution (LTE) and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) Macrocells and Femtocells, as well as IEEE 802.11p Wireless Access for Vehicular Environment (WAVE) Road Side Units (RSUs). Performance evaluation shows that the suggested method ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Performance Analysis and Optimization of Next Generation Wireless Networks (P...University of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Personalized Real-Time Virtual Tours in Places with Cultural InterestUniversity of Piraeus
Virtual tours using drones enhance the experience the users perceive from a place with cultural interest. Drones equipped with 360o cameras perform real-time video streaming of the cultural sites. The user preferences about each monument type should be considered in order the appropriate flying route for the drone to be selected. This paper describes a scheme for supporting personalized real-time virtual tours in sites with cultural interest using drones. The user preferences are modeled using the MPEG-21 and the MPEG-7 standards, while Web Ontology Language (OWL) ontologies are used for the description of the metadata structure and semantics. The Metadata-aware Analytic Network Process (MANP) algorithm is proposed in order the weights about the user preferences for each monument type to be estimated. Subsequently, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS) algorithm accomplishes ranks the candidate heritage routes. Finally, after each virtual tour, the user preferences metadata are updated in order the scheme to continuously learn about the user preferences.
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The convergence of blockchain, internet of things (io t) and building informa...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The revival of back-filled monuments through Augmented Reality (AR) (presenta...University of Piraeus
The development of three-dimensional (3D) models and the use of Augmented Reality (AR) in the field of cultural heritage consists an innovative process the recent years that provides the visitors of archaeological sites with additional information. This has been made possible due to achievements in digital technologies, communications, devices and developments in software engineering. Nevertheless, the research to fully make use of these new methods continues, as the potentials of new technologies have not been exploited. In archaeological sites, the production of 3D models for AR is focused on the virtual reconstruction of ruined monuments at their original form, aiming to give visitors the third dimension (height, volume etc.), especially to those who do not have special knowledge of archaeology. This paper describes an innovative approach of using AR for maintaining the memory and the information of monuments, as they have been originally excavated, but that are going to be back -filled due to the particularity of their material or their location. Also, the system architecture of the proposed scheme is described considering two study cases, a Neolithic settlement in the archaeological site of Halai, Lokris and the remains of a Classical Temple on open field of a hill in Thebes, Boeotia. Both mentioned monuments are under the direction of the American School of Classical Studies in Athens (ASCSA).
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...University of Piraeus
This paper presents a web service which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the web service host. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information and the Web Ontology Language (OWL) to produce and manipulate ontological descriptions. SPARQL is used for querying the OWL ontologies. The MPEG Query Format (MPQF) is also used, providing a wellknown framework for applying queries to the metadata and to the ontologies.
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)University of Piraeus
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the server. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information. The Web Ontology Language (OWL) language is used to produce and manipulate the relative ontological descriptions.
A downlink scheduler supporting real time services in LTE cellular networks (...University of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
A Vertical Handover Management Scheme for VANET Cloud Computing SystemsUniversity of Piraeus
Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper a VHO management scheme for VCC systems is described. The proposed method takes into account the vehicles velocity as well as its current connection type and applies a two step VHO algorithm to reduce operations’ costs and optimize mobility management. Accordingly, as a first step a VHO initiation process evaluates the necessity to perform handover and subsequently a network selection process selects the appropriate network alternative considering both vehicular service requirements and operators’ policies. The proposed scheme is applied to a VCC system which includes Long Term Evolution (LTE) Macrocells and Femtocells as well as 802.11p Road Side Units (RSUs). Performance evaluation shows that the suggested algorithm ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
QoS-aware scheduling in LTE-A networks with SDN control (presentation)University of Piraeus
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural Interest using Drones
1. A Route Selection Scheme for supporting Virtual
Tours in Sites with Cultural Interest using Drones
Emmanouil Skondras1, Konstantina Siountri1,2, Angelos Michalas3, Dimitrios D. Vergados1
1
Department of Informatics, University of Piraeus, Piraeus, Greece, Email: {skondras, ksiountri, vergados}@unipi.gr
2
Department of Department of Cultural Technology and Communication, University of Aegean,
Mytilene, Lesvos, Greece, Email: ksiountri@aegean.gr
3
Department of Informatics Engineering, Technological Educational Institute of Western Macedonia,
Kastoria, Greece, Email: amichalas@kastoria.teiwm.gr
Abstract—Virtual tourism is a novel trend that enhances
the experience the users perceive from touristic places, such
as archaeological sites. Drones are equipped with 360o
video
cameras and used for video capturing of the heritage sites. The
video material is streamed to the users in real time, enriched
with additional 3D, Augmented Reality (AR) or Mixed Reality
(MR) material. Furthermore, the selection of the appropriate
flying route for each drone should be performed, in order to
provide a satisfactory tour experience to the user, considering his
preferences about specific monuments. To address this issue, this
paper describes a heritage route selection scheme for supporting
real-time virtual tours in sites with cultural interest using drones.
The proposed scheme applies a Fuzzy Multiple Attribute Decision
Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis
for Heritage Route Selection (TFT-HRS), to accomplish the
ranking of the candidate heritage routes. The algorithm uses
Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the
representation of heritage routes evaluation values. Performance
evaluation shows that the suggested method produces better
results compared to the Fuzzy Topsis (FTOPSIS) by selecting
the most appropriate flying route for the drone.
I. INTRODUCTION
Virtual tourism [1] is a novel paradigm that reduces time
or spatial limitations of real tourism and provides touristic
experience to users. Services such as 360o
video streaming
[2], 3D animation [3], Augmented Reality (AR) [4] and Mixed
Reality (MR) [5] are used to construct a totally virtual world
for the user. In this field, drones [6] equipped with 360o
cameras are used for the video capture of the touristic place.
Thereafter, the video material is enriched with 3D, AR or MR
material and streamed to users in real time [7] .
The application of virtual tour services to heritage sites [8]
has obtained increased interest. Drones can provide us with
real time images with a totally new perspective, the ”bird’s
eye view”, that is going to change not only what we see but
also how we perceive and think about tangible heritage and
physical environment. In recent implementations, the drone
interacts with a Fifth Generation (5G) [9] mobile infrastructure
to obtain access to plenty of networking, computational and
storage resources. Indicatively, the enriched 360o
video is
streamed to the user through a 5G Mobile Edge Computing
(MEC) or Fog [10][11] infrastructure, which assures the
satisfaction of its constraints in Quality of Service (QoS)
related factors such as throughput, delay, jitter and packet loss.
The 5G infrastructure could support heterogeneous network
access technologies, such as the 3GPP Long Term Evolution
Advanced (LTE-A) [12], the IEEE 802.11p Wireless Access
for Vehicular Environment (WAVE) [13] RSUs and the IEEE
802.16 WiMAX [14].
Each drone is remotely controlled by the user or, in more ad-
vanced implementations, it is autonomous navigated [15][16]
using its own Artificial Intelligence (AI) [17]. A critical task
of the autonomous navigation service is the selection of the
most appropriate flying route for the drone, while factors such
as Points of Interest (PoIs) [18], user preferences or wireless
networks availability could be considered. Specifically, in
heritage sites where multiple monument types exist, the user
preference for each type should be considered, in order the
most appropriate flying route to be selected for the drone.
Virtual tours with drones can be used in numerous cases
dealing with protection, preservation and enhancement of
tangible heritage, as well as servicing special groups of people,
i.e. elderly, children, persons with disabilities that can not
reach the inaccessible monuments. Some of the potential uses
of the proposed virtual tours in this paper are the following:
• Emergency, i.e. in case of fire, earthquake or flood the
local administration can have a short-time check of the
potentially harmed monuments
• Typical Control, i.e. regular control of the heritage sites
dealing with everyday problems like checking the vege-
tation in archaeological sites or monitoring inaccessible
monuments.
• Shared Experience, i.e. groups of visitors can be provided
simultaneously real time experience either by accessing
a monument or not.
• Selective Visit, i.e visitors will have the opportunity to
visit virtually an amount of monuments of an area but
due to time limit they will be able to choose a physical
tour in one or two of them.
978-1-5386-8161-9/18/$31.00 c 2018 IEEE
2. • Educational Purpose, i.e. visitors of areas of natural
beauty like lakes, rivers, and canyons will be able to have
an holistic experience of the sites including inaccessible
spots or monuments.
In general, Multi Attribute Decision Making (MADM)
methods are used to select the best alternative among can-
didate routes. MADM algorithms are able to evaluate differ-
ent alternatives, sometimes even contradictory, using multi-
criteria analysis. Widely used methods include the Analytic
Hierarchy Process (AHP) [19] [20], the Analytic network
process (ANP) [21], the Simple Additive Weighting (SAW)
[20][22],the Multiplicative Exponent Weighting (MEW) [20],
the Gray Relational Analysis (GRA) [20], the Distance to Ideal
Alternative (DIA) [20], the Weighted Product Method (WPM)
[23] and the Technique for Order Preference by Similarity to
Ideal Solution (TOPSIS) [24]. Furthermore, various weighting
methods are used, in order to provide suitable criteria weights
for each alternative. It should also be noted that there is a rate
of uncertainty in evaluating the monuments in each heritage
route. Therefore, Fuzzy MADM (FMADM) methods have
received the interest of many researchers in decision theory.
In particular, several FMADM methods are proposed utiliz-
ing linguistic variables, triangular fuzzy numbers, trapezoidal
fuzzy numbers etc. to evaluate heritage routes. Such methods
include the Fuzzy AHP - SAW (FAS) [25], the Fuzzy TOPSIS
(FTOPSIS) [26], the Fuzzy AHP - TOPSIS (FAT) [27], the
Fuzzy AHP - SAW (FAS) [27], the Fuzzy AHP Mew (FAM)
[27], as well as the Fuzzy AHP - ELECTRE (FAE) [28].
This paper describes a heritage route selection scheme for
supporting real-time virtual tours in heritage sites using drones.
It uses two algorithms, the Analytic Network Process (ANP)
to model the user preferences about monument types and
the Trapezoidal Fuzzy Topsis for Heritage Route Selection
(TFT-HRS) to accomplish the ranking of the candidate flying
routes, considering the aforementioned user preferences. The
TFT-HRS algorithm uses Interval-Valued Trapezoidal Fuzzy
Numbers (IVTFN) for the representation of heritage routes’
evaluation values.
The rest paper is organized as follows: Section II describes
the proposed scheme, while Section III presents the simulation
setup and the evaluation results. Finally, section IV concludes
the discussed work.
II. THE PROPOSED HERITAGE ROUTE SELECTION SCHEME
A. The Analytic Network Process (ANP)
The Analytic Network Process (ANP) was introduced by
Saaty [29] to deal with decision problems that criteria and
alternatives depend on each other. ANP is actually the gen-
eralization of the AHP. A decision problem that is analyzed
with the ANP can be designed either as a control-hierarchy or
as a non-hierarchical network. Nodes of the network represent
components (or clusters) of the system while arcs denote inter-
actions between them. All interactions and feedbacks within
clusters are called inner dependencies, while interactions and
feedbacks between clusters are called outer dependencies. The
ANP is composed of four major steps [30]:
a) Model construction and problem structuring: During
this step the problem is analyzed and decomposed into a
rational system, like a network .
b) Pairwise comparison matrices and priority vectors:
During this step, the pairwise comparison matrix, as in AHP,
is derived using Saatys nine-point importance scale (Table I).
TABLE I: Nine-point importance scale.
Importance Definition
1 Equal Importance
3 Moderate Importance
5 Strong Importance
7 Very Strong Importance
9 Extreme Importance
2, 4, 6, 8 Intermediate Values
c) Supermatrix formation: During this step, matrix, su-
permatrix of the ANP model is constructed to represent the
inner and outer dependencies of the network. It is actually
a partitioned matrix, where each matrix segment represents a
relationship between two clusters in the network. To contrust
the supermatrix the local priority vectors obtained in Step
2 are grouped and placed in the appropriate positions in a
supermatrix based on the flow of influence from one cluster
to another, or from a cluster to itself, as in the loop. Then, the
supermatrix is transformed to a stochastic one,the weighted
supermatrix. Finally, the weighted supermatrix is raised to
limiting powers until all the entries converge to calculate the
overall priorities, and thus the cumulative influence of each
element on every other element with which it interacts is
obtained [31]. At this point, all the columns of the new matrix,
the limit supermatrix, are the same and their values show the
global priority of each element of network.
For example if we assume a network with n clusters, where
each cluster Qk, k = 1, 2, , n, and has mn elements, denoted
as qk1, qk2, , qkmk
, then the standard form for a supermatrix
can be expressed as:
W =
Q1 ... Qk ... Qn
q11...q1m1
... qk1...qkmk
... qn1...qnmn
q11
Q1
.
.
. W11 ... W1k ... W1n
q1m1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
qk1
Qk
.
.
. Wk1 ... Wkk ... Wkn
qkmk
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
qn1
Qn
.
.
. Wn1 ... Wnk ... Wnn
qnmn
(1)
d) Obtain the priority weights: If the supermatrix formed
in Step 3 covers the whole network, then the priority weights
of the alternatives can be found in the column of alternatives in
the normalized supermatrix. Otherwise, additional calculations
using matrix operations are required, in order to obtain the
overall priorities of the alternatives.
3. B. The Trapezoidal Fuzzy Topsis for Heritage Route Selection
(TFT-HRS)
The Trapezoidal Fuzzy Topsis for Heritage Route Se-
lection (TFT-HRS) is used to accomplish the ranking of
candidate heritage routes. Interval-Valued Trapezoidal Fuzzy
Numbers (IVTFN) [32] are used for the representation of
heritage routes’ evaluation values. An IVTFN, is a gen-
eral form of fuzzy number and can be represented as:
˜a = [˜aL
, ˜aU
] = [(aL
1 , aL
2 , aL
3 , aL
4 , vL
), (aU
1 , aU
2 , aU
3 , aU
4 , vU
))]
where: 0 ≤ aL
1 ≤ aL
2 ≤ aL
3 ≤ aL
4 ≤ 1, 0 ≤ aU
1 ≤ aU
2 ≤ aU
3 ≤
aU
4 ≤ 1, 0 ≤ vL
≤ vU
≤ 1 and ˜aL
⊂ ˜aU
. The operational
rules of the IVTFNs are defined in [32].
The candidate heritage routes are ranked using the TFT-
HRS method, which adjusts the TFT [33] network selection
algorithm, in order route selection to be performed. Similar
to TFT, TFT-HRS is based on the concept that the best
alternative should have the shortest distance from the positive
ideal solution and the longest distance from the negative
ideal solution. Also, it assumes that the linguistic values of
criteria attributes (e.g. user preferences about specific monu-
ments) are represented by IVTFNs. More specifically, suppose
AL = {AL1, AL2, . . . , ALz} is the set of possible alternative
heritage routes, MT = {MT1, MT2, . . . , MTn} is the set of
monument types that exist in each route and w1, w2, . . . , wn
are the user preferences of the respective monument types
obtained from the application of the ANP algorithm. The steps
of the method are as follows:
a) Construction of the decision matrix: Each ˜gij element
of the z×n decision matrix ˜D is an IVTFN number expressing
the evaluation value of alternative heritage route i for mon-
ument j, which refers to the percentage of the monument j
covered by route i. Thus:
˜D =
MT1 ... MTn
AL1 ˜g11 ... ˜g1n
.
.
.
.
.
.
...
.
.
.
ALz ˜gz1 ... ˜gzn
(2)
where ˜gij = (gL
ij1, gL
ij2, gL
ij3, gL
ij4, vL
ij), (gU
ij1, gU
ij2, gU
ij3, gU
ij4, vU
ij) .
In the case that there are multiple monuments belonging to
a specific monument type MT, the decision matrix includes the
average of their evaluation values. Hence, assuming that for the
xth
monument ˜gijx is its evaluation value in the heritage route
i, the average of the evaluation values is given by formula 3.
˜gij =
1
X
X
x=1
˜gijx =
1
X
X
x=1
g
L
ijx1,
1
X
X
x=1
g
L
ijx2,
1
X
X
x=1
g
L
ijx3,
1
X
X
x=1
g
L
ijx4, v
L
ijx ,
1
X
X
x=1
g
U
ijx1,
1
X
X
x=1
g
U
ijx2,
1
X
X
x=1
g
U
ijx3,
1
X
X
x=1
g
U
ijx4, v
U
ijx
(3)
b) Normalization of the decision matrix: Considering
that Γ is the set of monuments, the elements of the normal-
ized decision matrix are calculated using formula 4, where
bj = maxi gU
ij4 for each j ∈ Γ.
˜gij =
gL
ij1
bj
,
gL
ij2
bj
,
gL
ij3
bj
,
gL
ij4
bj
, v
L
ij ,
gU
ij1
bj
,
gU
ij2
bj
,
gU
ij3
bj
,
gU
ij4
bj
, v
U
ij
(4)
c) Construction of the weighted normalized decision ma-
trix: The weighted normalized decision matrix is constructed
by multiplying each element of the normalized decision matrix
˜gij with the respective weight wj according to the formula 5.
˜uij = g
L
ij1 · wj , g
L
ij2 · wj , g
L
ij3 · wj , g
L
ij4 · wj , v
L
ij ,
g
U
ij1 · wj , g
U
ij2 · wj , g
U
ij3 · wj , g
U
ij4 · wj , v
U
ij
(5)
d) Determination of the positive and negative ideal so-
lution: The positive ideal solution is defined in 6, where
i
≡ maxi. Correspondingly, the negative ideal solution is
defined in 7, where i ≡ mini.
˜G
+
= g
+L
ij1 , g
+L
ij2 , g
+L
ij3 , g
+L
ij4 , v
+L
ij , g
+U
ij1 , g
+U
ij2 , g
+U
ij3 , g
+U
ij4 , v
+U
ij
=
i
u
L
ij1,
i
u
L
ij2,
i
u
L
ij3,
i
u
L
ij4, v
L
ij ,
i
u
U
ij1,
i
u
U
ij2,
i
u
U
ij3,
i
u
U
ij4, v
U
ij
(6)
˜G
−
= g
−L
ij1 , g
−L
ij2 , g
−L
ij3 , g
−L
ij4 , v
−L
ij , g
−U
ij1 , g
−U
ij2 , g
−U
ij3 , g
−U
ij4 , v
−U
ij
=
i
u
L
ij1,
i
u
L
ij2,
i
u
L
ij3,
i
u
L
ij4, v
L
ij ,
i
u
U
ij1,
i
u
U
ij2,
i
u
U
ij3,
i
u
U
ij4, v
U
ij
(7)
e) Measurement of the distance of each alternative from
the ideal solutions: The distances of each alternative heritage
route from the positive ideal solution are evaluated using
formulas 8 and 9. Likewise the distances of each alternative
from the negative ideal solution are estimated using formulas
10 and 11.
p
+
i1 =
n
j=1
1
4
u
L
ij1 − g
+L
ij1
2
+
u
L
ij2 − g
+L
ij2
2
+ u
L
ij3 − g
+L
ij3
2
+ u
L
ij4 − g
+L
ij4
2
1
2
(8)
p
+
i2 =
n
j=1
1
4
u
U
ij1 − g
+U
ij1
2
+
u
U
ij2 − g
+U
ij2
2
+ u
U
ij3 − g
+U
ij3
2
+ u
U
ij4 − g
+U
ij4
2
1
2
(9)
p
−
i1 =
n
j=1
1
4
u
L
ij1 − g
−L
ij1
2
+
u
L
ij2 − g
−L
ij2
2
+ u
L
ij3 − g
−L
ij3
2
+ u
L
ij4 − g
−L
ij4
2
1
2
(10)
p
−
i2 =
n
j=1
1
4
u
U
ij1 − g
−U
ij1
2
+
u
U
ij2 − g
−U
ij2
2
+ u
U
ij3 − g
−U
ij3
2
+ u
U
ij4 − g
−U
ij4
2
1
2
(11)
Consequently, the alternatives distance from the positive and
negative ideal solutions are expressed by intervals such as
4. [p+
i1, p+
i2] and [p−
i1, p−
i2], instead of single values, while in this
way less information is lost.
f) Calculation of the relative closeness: The relative
closeness of the distances from the ideal solutions are calcu-
lated using formula 12 and 13. Subsequently, the compound
relative closeness is obtained using formula 14.
RCi1 =
p−
i1
p+
i1 + p−
i1
(12)
RCi2 =
p−
i2
p+
i2 + p−
i2
(13)
RCi =
RCi1 + RCi2
2
(14)
g) Alternative heritage routes ranking: The alternative
heritage routes are ranked according to their RCi values, while
the best alternative is that with the higher RCi value.
III. SIMULATION SETUP AND RESULTS
In our experiments, we consider a 5G architecture (figure 1)
which includes a Cloud and a Fog infrastructure. The Cloud
infrastructure includes a set of Virtual Machines (VMs), while
each VM hosts a set of 3D, AR and MR heritage models.
Accordingly, the Fog infrastructure includes LTE and WiMAX
Macrocells and Femtocells, as well as WAVE RSUs, with
additional computational and storage resources. Additionally,
inside the area of the Fog, a number of Ancient [34], Byzan-
tine [35], Modern [34] and Natural Beauty [36] monuments
exist. A Software Defined Network (SDN) controller provides
centralized control of the entire architecture.
As it concerns the Hellenic territory, the category of Ancient
monuments consists of prehistoric antiquities, monuments of
Classical, Roman and Hellenistic Era and all of their sub-
categories. In the group of Byzantine monuments, we refer
to the antiquities between 330 AD and 1830 AD, including
the subcategories Early Byzantine, Middle Byzantine, Post
Byzantine monuments (in Western Europe, the term Byzantine
could be replaced by the term Medieval). With the term
Modern monuments, we refer to artifacts after 1830 AD,
i.e. exceptional buildings constructed according to Neoclassic,
Art Nouveau and Bauhaus style, well preserved traditional
complexes, industrial buildings, statues etc. In the category
of Natural Beauty there are landscapes with special features,
remarkable and sensitive ecosystems, i.e. rivers, lakes, forests,
canyons, etc.
The case where 5 users need to perform a virtual tour
using a drone is considered. Initially the preferences of each
user for each type of monument are modeled as presented in
table II, which includes the corresponding pairwise compar-
isons. Subsequently, using the ANP method, the weights that
concern the users’ preferences for each monument type are
estimated. As can be observed in figure 2, the estimated user
preferences are proportional to the aforementioned pairwise
comparisons. Indicatively, user 1 mostly prefers the Ancient
monuments, user 2 prefers the Byzantine monuments, user 3
prefers the Natural Beauty monuments, user 4 prefers both
Ancient and Byzantine monuments and, finally, user 5 prefers
Cloud Infrastructure
Fog Infrastructure
WAVE RSU
LTE Femtocell
WiMAX Femtocell
LTE Macrocell
WiMAX Macrocell
Ancient
Monument 1
Byzantine
Monument 1
Ancient
Monument 3
Byzantine
Monument 2
LTE Macrocell
LTE Macrocell
WiMAX Femtocell
LTE Femtocell
WAVE RSU
SDN
Controller
Virtual Machine
3D Models
Augmented Reality Models
Mixed Reality Models
Virtual Machine
3D Models
Augmented Reality Models
Mixed Reality Models
Virtual Machine
3D Models
Augmented Reality Models
Mixed Reality Models
...
...
...
...
...
...
...
...
...
...
Modern
Monument 2
Modern
Monument 3
Ancient
Monument 2
Modern
Monument 1
Natural
Beauty 1
Natural
Beauty 2
Fig. 1: The simulated Fog infrastructure.
TABLE II: The pairwise comparisons between the monument types for each
user.
User Ancient Byzantine Modern Natural Beauty
User 1
Ancient 1 3 7 9
Byzantine 1/3 1 5 7
Modern 1/7 1/5 1 3
Natural Beauty 1/9 1/7 1/3 1
User 2
Ancient 1 1/9 1/5 1
Byzantine 9 1 5 9
Modern 5 1/5 1 5
Natural Beauty 1 1/9 1/5 1
User 3
Ancient 1 1 1 1/9
Byzantine 1 1 1 1/9
Modern 1 1 1 1/9
Natural Beauty 9 9 9 1
User 4
Ancient 1 1 5 9
Byzantine 1 1 5 9
Modern 1/5 1/5 1 5
Natural Beauty 1/9 1/9 1/5 1
User 5
Ancient 1 5 9 1
Byzantine 1/5 1 3 1/5
Modern 1/9 1/3 1 1/9
Natural Beauty 1 5 9 1
Ancient and Natural Beauty monuments. Furthermore, table III
represents the linguistic terms and the corresponding interval-
valued trapezoidal fuzzy numbers used for the definition of
the evaluation values of each monument in each flying route.
Accordingly, table IV presents the corresponding value that
each monument obtains in each route.
Each user interacts with the Fog infrastructure and requests
to perform a real-time virtual tour using a drone. Thereafter,
the Fog interacts with the SDN controller, in order the most
appropriate flying route to be selected for the drone, using the
TFT-HRS algorithm which considers the user’s preferences
about each monument type. Also, the Fog retrieves the corre-
5. 0
0,2
0,4
0,6
0,8
1
User 1 User 2 User 3 User 4 User 5
ANPweight
Users
Users Preferences for each Monument Type
Monument type: Ancient Byzantine Modern Natural Beauty
Fig. 2: The ANP weights which concern the users’ preferences for each
monument type.
TABLE III: Lingustic terms and the corresponding IVTFNs used for the
definition of the evaluation values of each monument in each heritage route.
Linguistic term Interval-Valued Trapezoidal Fuzzy Number (IVTFN)
Absolutely Poor (AP) [(0.0, 0.0, 0.0, 0.0, 0.9), (0.0, 0.0, 0.0, 0.0, 1.0)]
Very Poor (VP) [(0.01, 0.02, 0.03, 0.07, 0.9), (0.0, 0.01, 0.05, 0.08, 1.0)]
Poor (P) [(0.04, 0.1, 0.18, 0.23, 0.9), (0.02, 0.08, 0.2, 0.25, 1.0)]
Medium Poor (MP) [(0.17, 0.22, 0.36, 0.42, 0.9), (0.14, 0.18, 0.38, 0.45, 1.0)]
Medium (M) [(0.32, 0.41, 0.58, 0.65, 0.9), (0.28, 0.38, 0.6, 0.7, 1.0)]
Medium Good (MG) [(0.58, 0.63, 0.8, 0.86, 0.9), (0.5, 0.6, 0.9, 0.92, 1.0)]
Good (G) [(0.72, 0.78, 0.92, 0.97, 0.9), (0.7, 0.75, 0.95, 0.98, 1.0)]
Very Good (VG) [(0.93, 0.98, 1.0, 1.0, 0.9), (0.9, 0.95, 1.0, 1.0, 1.0)]
Absolutely Good (AG) [(1.0, 1.0, 1.0, 1.0, 0.9), (1.0, 1.0, 1.0, 1.0, 1.0)]
sponding 3D, AR and MR models from the Cloud and informs
the drone about the selected heritage route. Subsequently,
the drone flights along the selected route, while the captured
360o
video is enriched with the aforementioned 3D, AR and
MR models and streamed to the user in real-time. Figure 3
illustrates the entire process.
Cloud
FogFog DroneDroneUserUser
SDN
controller
SDN
controller
Request for Real-Time
Virtual Tour
(User_Preferences)
Request for Real-Time Virtual Tour
(Selected_Flying_Route)
Request for the selection of the
optimal flying route
(User_Preferences)
Run TFT-HRS
(User_Preferences)
Perform the flight
according to the
selected route
Real-Time
Video Streaming
Virtual
Machines
Virtual
Machines
Selected_Flying_Route
3D, AR and MR models
Enrich video with
3D, AR and MR models
Retrieve the corresponding
3D, AR and MR models()
Fig. 3: The sequence diagram about the entire procedure.
Table V compares the results of the proposed scheme with
the ones obtained using the FTOPSIS algorithm. A critical
weakness of the FTOPSIS is that it does not support the
existence of multiple monuments of the same monument type.
Consequently, the FTOPSIS method considers only the first
monument of each type, namely the Ancient Monument 1,
the Byzantine Monument 1, the Modern Monument 1 and
the Natural Beauty Monument 1, for the Ancient, Byzantine,
Modern and Natural Beauty monument types, respectively.
Both algorithms provide similar results for users 1 and 2, by
selecting the route 7 and the route 4, respectively. However, for
the rest of the users, the TFT-HRS outperforms the FTOPSIS,
by selecting more appropriate heritage routes considering the
evaluation values for multiple monuments of the same type
that exist in each route. Specifically, in the case of user 3,
who mostly prefers the Natural Beauty monuments, the TFT-
HRS selects the route 8, which provides AG and VG for
Natural Beauty 1 and Natural Beauty 2, respectively. On the
contrary, for the same user, the FTOPSIS selects the route
7, which provides AG for Natural Beauty 1 but AP for
Natural Beauty 2. Accordingly, in the case of user 4, who
prefers both Ancient and Byzantine monuments, the TFT-
HRS selects the route 7, which provides AG, AG, VG, G and
AG values for Ancient Monument 1, Ancient Monument 2,
Ancient Monument 3, Byzantine Monument 1 and Byzantine
Monument 2, respectively. On the other hand, the FTOPSIS
selects the route 3, which provides VG instead of AG for
Ancient Monument 1, while the offered values for the rest
of Ancient and Byzantine monuments are similar. Finally, in
the case of user 5 who prefers Ancient and Natural Beauty
monuments, the TFT-HRS selects the route 3, which provides
AG for Natural Beauty 2, while the FTOPSIS selects the route
7, which provides similar values for the most Ancient and
Natural Beauty Monuments, but AP for the Natural Beauty 2
monument.
IV. CONCLUSION
This paper proposes a scheme for the selection of drone
navigation to support virtual tours in sites with cultural interest
using drones. The proposed scheme is called TFT-HRS and
selects the most appropriate heritage route for the drone, in
order the user preferences about specific monument types to
be satisfied. Thereafter, the drone flights along the selected
route and captures video about the corresponding monuments.
The video is transmitted to the user in real time, enriched with
3D, AR and MR material. The scheme is applied to a 5G
architecture which includes a Cloud and a Fog infrastructure.
Performance evaluation showed that the proposed scheme
outperforms the FTOPSIS algorithm in terms of selecting
the most appropriate drone navigation considering the users
preferences about each monument type.
ACKNOWLEDGEMENTS
The publication of this paper has been partly supported by the
University of Piraeus Research Center (UPRC).
REFERENCES
[1] J. Beck and R. Egger, “Emotionalise me: Self-reporting and arousal
measurements in virtual tourism environments,” in Information and
Communication Technologies in Tourism 2018. Springer, 2018, pp.
3–15.
[2] F. Qian, L. Ji, B. Han, and V. Gopalakrishnan, “Optimizing 360 video
delivery over cellular networks,” in Proceedings of the 5th Workshop on
All Things Cellular: Operations, Applications and Challenges. ACM,
2016, pp. 1–6.
[3] A. Bustillo, M. Alaguero, I. Miguel, J. M. Saiz, and L. S. Iglesias, “A
flexible platform for the creation of 3d semi-immersive environments
to teach cultural heritage,” Digital Applications in Archaeology and
Cultural Heritage, vol. 2, no. 4, pp. 248–259, 2015.
[4] L. F. Marques, J. A. Tened´orio, M. Burns, T. Rom˜ao, F. Birra, J. Mar-
ques, A. Pires et al., “Cultural heritage 3d modelling and visualisation
within an augmented reality environment, based on geographic informa-
tion technologies and mobile platforms,” 2017.
[5] F. Debandi, R. Iacoviello, A. Messina, M. Montagnuolo, F. Manuri,
A. Sanna, and D. Zappia, “Enhancing cultural tourism by a mixed
reality application for outdoor navigation and information browsing
using immersive devices,” in IOP Conference Series: Materials Science
and Engineering, vol. 364, no. 1. IOP Publishing, 2018, p. 012048.
6. TABLE IV: The available monuments for each heritage route.
Heritage
Route
Ancient
Monument 1
Ancient
Monument 2
Ancient
Monument 3
Byzantine
Monument 1
Byzantine
Monument 2
Modern
Monument 1
Modern
Monument 2
Modern
Monument 3
Natural
Beauty 1
Natural
Beauty 2
Route 1 AG G VG P MP AP G P MG MP
Route 2 VG G G MG AG G VP M AG AP
Route 3 VG AG G VG AG AP AP P VG AG
Route 4 AP P MP VG AG AG VG MG G G
Route 5 P MP AG G MG MG VG G VG AG
Route 6 G MG AG AG VG MG MG AG G VG
Route 7 AG AG VG G AG G G MG AG AP
Route 8 VG AG AG VP VG P AG AG AG VG
Route 9 P VP VP MP MG G G MG VG AG
Route 10 VG AG AP P AG G MG MP P VG
TABLE V: Routes’ classification in respect of TFT-HRS and FTOPSIS
results.
User 1 User 2 User 3 User 4 User 5
``````Routes
Method
TFT-HRS
FTOPSIS
TFT-HRS
FTOPSIS
TFT-HRS
FTOPSIS
TFT-HRS
FTOPSIS
TFT-HRS
FTOPSIS
Route 1 6 6 10 9 10 9 9 7 7 6
Route 2 5 3 6 6 9 2 4 4 6 2
Route 3 2 2 4 4 3 3 2 1 1 3
Route 4 9 8 1 1 6 8 7 6 10 10
Route 5 8 9 5 5 2 4 6 9 5 7
Route 6 3 4 2 2 5 7 3 3 3 5
Route 7 1 1 3 3 7 1 1 2 4 1
Route 8 4 7 9 10 1 5 5 8 2 4
Route 9 10 10 8 7 4 6 10 10 9 8
Route 10 7 5 7 8 8 10 8 5 8 9
[6] D. Mirk and H. Hlavacs, “Virtual tourism with drones: experiments and
lag compensation,” in Proceedings of the First Workshop on Micro Aerial
Vehicle Networks, Systems, and Applications for Civilian Use. ACM,
2015, pp. 45–50.
[7] M. Xing, S. Xiang, and L. Cai, “A real-time adaptive algorithm for
video streaming over multiple wireless access networks,” IEEE Journal
on Selected Areas in communications, vol. 32, no. 4, pp. 795–805, 2014.
[8] C. Castagnetti, M. Giannini, and R. Rivola, “Image-based virtual tours
and 3d modeling of past and current ages for the enhancement of
archaeological parks: The visualversilia 3d project,” The International
Archives of Photogrammetry, Remote Sensing and Spatial Information
Sciences, vol. 42, p. 639, 2017.
[9] G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz,
“A survey on 5g networks for the internet of things: communication
technologies and challenges,” IEEE Access, vol. 6, pp. 3619–3647, 2018.
[10] R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, fog et
al.: A survey and analysis of security threats and challenges,” Future
Generation Computer Systems, vol. 78, pp. 680–698, 2018.
[11] P. Mach and Z. Becvar, “Mobile edge computing: A survey on archi-
tecture and computation offloading,” IEEE Communications Surveys &
Tutorials, vol. 19, no. 3, pp. 1628–1656, 2017.
[12] “TS 36.300 (V13.2.0): Evolved Universal Terrestrial Radio Access
Network (E-UTRAN) (Rel.13),” Technical Specification, 3GPP, 2016.
[13] “1609.3-2016 - ieee standard for wireless access in vehicular environ-
ments (wave) – networking services,” IEEE, 2016.
[14] “802.16q-2015 - ieee standard for air interface for broadband wireless
access systems– amendment 3 multi-tier networks,” IEEE, 2015.
[15] M. Kan, S. Okamoto, and J. H. Lee, “Development of drone capable
of autonomous flight using gps,” in Proceedings of the International
MultiConference of Engineers and Computer Scientists, vol. 2, 2018.
[16] J. Colorado, C. Devia, M. Perez, I. Mondragon, D. Mendez, and C. Parra,
“Low-altitude autonomous drone navigation for landmine detection
purposes,” in Unmanned Aircraft Systems (ICUAS), 2017 International
Conference on. IEEE, 2017, pp. 540–546.
[17] U. Challita, A. Ferdowsi, M. Chen, and W. Saad, “Artificial intelligence
for wireless connectivity and security of cellular-connected uavs,” arXiv
preprint arXiv:1804.05348, 2018.
[18] F. T. Alaoui, V. Renaudin, and D. Betaille, “Points of interest detection
for map-aided pdr in combined outdoor-indoor spaces,” in Indoor Po-
sitioning and Indoor Navigation (IPIN), 2017 International Conference
on. IEEE, 2017, pp. 1–8.
[19] Z. Shi and Q. Zhu, “Network selection based on multiple attribute
decision making and group decision making for heterogeneous wireless
networks,” The Journal of China Universities of Posts and Telecom-
munications, vol. 19, no. 5, pp. 92 – 114, 2012. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S1005888511603051
[20] M. Lahby, C. Leghris, and A. Adib, “New multi access selection method
based on mahalanobis distance,” Applied Mathematical Sciences, vol. 6,
no. 53-56, pp. 2745–2760, 2012.
[21] I. Martinez and V. Ramos, “Netanpi: A network selection mechanism for
lte traffic offloading based on the analytic network process,” in Sarnoff
Symposium, 2015 36th IEEE. IEEE, 2015, pp. 117–122.
[22] I. Lassoued, J.-M. Bonnin, Z. Ben Hamouda, and A. Belghith, “A
methodology for evaluating vertical handoff decision mechanisms,” in
Networking, 2008. ICN 2008. Seventh International Conference on.
IEEE, 2008, pp. 377–384.
[23] N. S. Fitriasari, S. A. Fitriani, and R. A. Sukamto, “Comparison of
weighted product method and technique for order preference by simi-
larity to ideal solution method: Complexity and accuracy,” in Science in
Information Technology (ICSITech), 2017 3rd International Conference
on. IEEE, 2017, pp. 453–458.
[24] S. Kaur, S. K. Sehra, and S. S. Sehra, “A framework for software quality
model selection using topsis,” in Recent Trends in Electronics, Infor-
mation & Communication Technology (RTEICT), IEEE International
Conference on. IEEE, 2016, pp. 736–739.
[25] D. A. Maroua Drissi, Mohammed Oumsis, “A fuzzy ahp approach to
network selection improvement in heterogeneous wireless networks,”
Networked Systems, pp. 169–182.
[26] M. Deveci, N. C¸ . Demirel, and E. Ahmeto˘glu, “Airline new route
selection based on interval type-2 fuzzy mcdm: A case study of new
route between turkey-north american region destinations,” Journal of
Air Transport Management, vol. 59, pp. 83–99, 2017.
[27] R. K. Goyal, S. Kaushal, and A. K. Sangaiah, “The utility based non-
linear fuzzy ahp optimization model for network selection in heteroge-
neous wireless networks,” Applied Soft Computing, 2017.
[28] D. E. Charilas, O. I. Markaki, J. Psarras, and P. Constantinou, “Ap-
plication of fuzzy ahp and electre to network selection,” in Mobile
Lightweight Wireless Systems. Springer, 2009, pp. 63–73.
[29] T. L. Saaty, “Decision making with dependence and feedback: The
analytic network process,” 1996.
[30] ˙I. Y¨uksel and M. Dagdeviren, “Using the analytic network process (anp)
in a swot analysis–a case study for a textile firm,” Information Sciences,
vol. 177, no. 16, pp. 3364–3382, 2007.
[31] T. L. Saaty and L. G. Vargas, “Diagnosis with dependent symptoms:
Bayes theorem and the analytic hierarchy process,” Operations Research,
vol. 46, no. 4, pp. 491–502, 1998.
[32] S.-H. Wei and S.-M. Chen, “Fuzzy risk analysis based on interval-valued
fuzzy numbers,” Expert Systems with Applications, vol. 36, no. 2, pp.
2285–2299, 2009.
[33] E. Skondras, A. Sgora, A. Michalas, and D. D. Vergados, “An analytic
network process and trapezoidal interval-valued fuzzy technique for
order preference by similarity to ideal solution network access selection
method,” International Journal of Communication Systems, vol. 29,
no. 2, pp. 307–329, 2016.
[34] “Law 3028/2002 ”for the protection of antiquities and the cultural
heritage in general”,” Greece, 2002.
[35] K. Siountri, D. D. Vergados, and C.-N. Anagnostopoulos, “Classification
of byzantine temples topology through pattern recognition,” EUROMED,
2017.
[36] P. Selman and C. Swanwick, “On the meaning of natural beauty in
landscape legislation,” Landscape Research, vol. 35, no. 1, pp. 3–26,
2010.