Journal of Shandong University(Engineering Science) ›› 2019, Vol. 49 ›› Issue (1): 30-35, 40.doi: 10.6040/j.issn.1672-3961.0.2018.195

• Machine Learning & Data Mining • Previous Articles     Next Articles

Optimal deployment strategy of forest fire monitoring nodes based on visualization

Pengcheng ZHAO(),Fuquan ZHANG*(),Xubing YANG,Yin WU   

  1. College of Information Science and Technology, Nanjing Forestry University, Nanjing 210037, Jiangsu, China
  • Received:2018-05-31 Online:2019-02-20 Published:2019-03-01
  • Contact: Fuquan ZHANG E-mail:jerry19930325@163.com;zfq@njfu.edu.cn
  • Supported by:
    国家自然科学基金面上项目(31670554);江苏省自然基金项目(BK20161527);国家自然科学基金项目(31700478)

Abstract:

Because of the high cost of forest fire monitoring sensor nodes and large deployment area, the optimization of the deployment efficiency was the main problem in application. In order to coordinate the deployment cost and coverage efficiency of nodes, a visualization-based optimal monitoring nodes deployment strategy was proposed. This strategy was based on a practical dataset from the forest environment, and made viewshed analysis of the candidate nodes. The mutual information algorithm was used to greedily select the location with the highest coverage efficiency by using the viewshed area association matrix of the nodes. The optimal number of nodes was calculated under the cost constraints by the submodular algorithm. This strategy ensured coverage efficiency, and reduced deployment cost. It was a cost-effective deployment strategy for forest fire monitoring nodes.

Key words: forest fire prevention, covering algorithm, submodular model, visualization, mutual information

CLC Number: 

  • TP399

Fig.1

View analysis of multi observation nodes"

Fig.2

Model schematic diagram"

Fig.3

Candidate point layout for sensor observation"

Fig.4

Full coverage node distribution diagram"

Table 1

Full coverage optimization results"

覆盖次数 栅格个数 比例/%
1 7 584 15.49
2 23 035 47.05
3 15 265 31.18
4 2 957 6.04
>4 119 0.24

Table 2

Maximum coverage results under cost constraints"

传感器预算/元 覆盖栅格数 覆盖区域/% 未覆盖区域/% 一次覆盖/% 二次覆盖/%
420 000 42 018 85.82 14.18 46.71 31.66
540 000 45 317 92.68 7.32 43.39 35.19
660 000 46 196 94.35 5.65 31.33 36.93
780 000 48 458 98.97 1.03 23.42 41.35

Fig.5

Chart of coverage area, budget and number of sensors"

1 刘丽萍, 王智, 孙优贤. 无线传感器网络部署及其覆盖问题研究[J]. 电子与信息学报, 2006, 28 (9): 1752- 1757.
LIU Liping , WANG Zhi , SUN Youxian . Survey on coverage in wireless sensor networks deployment[J]. Journal of Electronics & Information Technology, 2016, 28 (9): 1752- 1757.
2 CULLER D E , HILL J L . System architecture for wireless sensor networks[J]. Computer Science University of California, Berkeley, 2003, 11- 17.
3 刘陈, 蔡婷. 一种基于RSSI向量的传感器网络定位算法[J]. 山东大学学报(工学版), 2016, 46 (3): 23- 30.
LIU Chen , CAI Ting . A localization algorithm based on RSSI vector for wireless sensor networks[J]. Journal of Shandong University (Engineering Science), 2016, 46 (3): 23- 30.
4 符修文, 李文锋, 段莹. 分簇无线传感器网络级联失效抗毁性研究[J]. 计算机研究与发展, 2016, 53 (12): 2882- 2892.
doi: 10.7544/issn1000-1239.2016.20150455
FU Xiuwen , LI Wenfeng , DUAN Ying . Invulnerability of clustering wireless sensor network towards cascading failures[J]. Journal of Computer Research and Development, 2016, 53 (12): 2882- 2892.
doi: 10.7544/issn1000-1239.2016.20150455
5 张长森, 胡宇鹏, 陈鹏鹏. 基于Quorum的低占空比WSNs最优延迟可靠路由算法[J]. 计算机应用与软件, 2016, 33 (11): 79- 83.
doi: 10.3969/j.issn.1000-386x.2016.11.019
ZHANG Changsen , HU Yupeng , CHEN Pengpeng . Optimal-reliable delay routing algorithm for low duty cycle wsns based on quorum[J]. Computer Applications and Software, 2016, 33 (11): 79- 83.
doi: 10.3969/j.issn.1000-386x.2016.11.019
6 HUANG C F , TSENG Y C . The coverage problem in a wireless sensor network[J]. Mobile Networks & Applications, 2005, 10 (4): 519- 528.
7 HEO N, VARSHNEY P K. A distributed self spreading algorithm for mobile wireless sensor networks[C]//Wireless Communications and Networking. NewYork, USA: IEEE, 2003: 1597-1602.
8 O′ROURKE J . Art gallery theorems and algorithms[M]. Oxfordshire: Oxford University Press, 1987: 1- 10.
9 SLIJEOCEVIC S , POTKONJAK M . Power efficient organization of wireless sensor networks[J]. Proceedings of Icc Jun, 2001, 2, 472- 476.
10 赵璠, 舒立福, 周汝良. 林火行为蔓延模型研究进展[J]. 世界林业研究, 2017, 30 (2): 46- 50.
ZHAO Fan , SHU Lifu , ZHOU Ruliang . Areview of wildland fire spread modelling[J]. World Forestry Research, 2017, 30 (2): 46- 50.
11 LU G . Design of low power wsn node in wild environment[J]. American Journal of Network and Communications, 2017, 6 (2): 47- 53.
doi: 10.11648/j.ajnc.20170602.12
12 KIM Y H , RANA S , WISE S . Exploring multipleviewshed analysis using terrain features and optimisation techniques[J]. Computers & Geosciences, 2004, 30 (9): 1019- 1032.
13 BAO S , XIAO N , LAI Z , et al. Optimizing watchtower locations for forest fire monitoring using location models[J]. Fire Safety Journal, 2015, 71, 100- 109.
doi: 10.1016/j.firesaf.2014.11.016
14 REVELLE C . Review, extension and prediction in emergency service siting models[J]. European Journal of Operational Research, 1989, 40 (1): 58- 69.
15 SCHILLING D , ELZINGA D J , COHON J , et al. The team-fleet models for simultaneous facility and equipment Siting[J]. Transportation Science, 1979, 13 (2): 163- 175.
doi: 10.1287/trsc.13.2.163
16 LIU Q F , LI Y E . Improved sample method for medical image registration based on mutual information: improved sample method for medical image registration based on mutual information[J]. Journal of Computer Applications, 2010, 30 (4): 947- 949.
doi: 10.3724/SP.J.1087.2010.00947
17 KRAUSE A, GUESTRIN C. Near-optimal observation selection using submodular functions[C]//AAAI Conference on Artificial Intelligence. Vancouver, Canada: DBLP, 2007: 1650-1654.
18 GUESTRIN C, KRAUSE A, SINGH A P. Near optimal sensor placements in Gaussian processes[C]//International Conference on Machine Learning. Bonn, Germany: ACM, 2005: 265-272.
19 NEMHAUSER G L , WOLSEY L A , FISHER M L . An analysis of approximations for maximizing submodular set functions[J]. Mathematical Programming, 1978, 14 (1): 265- 294.
doi: 10.1007/BF01588971
20 KRAUSE A , LESKOVEC J , GUESTRIN C , et al. Efficient sensor placement optimization for securing large waterdistribution networks[J]. Journal of Water Resources Planning & Management, 2008, 134 (6): 516- 526.
[1] LIN Yaojin, ZHANG Jia, LIN Menglei, WANG Juan. A method of collaborative filtering recommendation based on fuzzy information entropy [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(5): 13-20.
[2] PAN Pan1, WANG Xi-zhao2, ZHAI Jun-hai2. An improved induction algorithm based on ordinal decision tree [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(1): 41-44.
[3] WU En-qi1, DU Bao-jiang1, WANG Hai-peng1, YU Jian-ping2. Study of visual planning of  underground power pipelines based on virtual reality [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(6): 54-57.
[4] WANG Fa-bo, XU Xin-shun. A new feature selection method for text categorization [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(4): 8-11.
[5] LI Li,YANG Zhong,XING Jian-fang,SHEN Chun-lin . Points sampling optimization strategy and performance analysis for a true 3D display system [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(3): 1-6 .
[6] ZHAI Haiting,WU Xiaojuan,PENG Zhang . A modified MI measure on 3D medical image registration [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(4): 33-39 .
[7] LI Ke,LIU Chang-chun,LI Tong-lei . Medical registration approach using improved maximization of mutual information [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 107-110 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] XIA Bin,ZHANG Lian-jun . Energy comparison-based TOA estimation algorithm for the DS-CDMA UWB system[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 70 -73 .
[2] LI Jie ,LIU Hong. A method of fractal artistic pattern generation based on a genetic algorithm[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(6): 33 -36 .
[3] CHEN Bin, CHEN Song-Can, PAN Zhi-Song, LI Bin. Survey of outlier detection technologies[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(6): 13 -23 .
[4] ZHANG Yu-Hua, WANG Xin. A LDA-based weighted null space algorithm in face recognition[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(6): 31 -34 .
[5] LIU Xin-guo,LUAN Shi-Bao . Backward error analysis of a class of the periodic symplectic matrices for eigenproblem[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 94 -98 .
[6] YAN Li-Gui, FU Song. Numerical simulation of the convection boundary layer in air along a vertical heated plate[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(6): 143 -146 .
[7] LI Wei-Teng, LI Shu-Cai, XUE Yi-Guo, ZHAO Yan, DING Zhi-Hai. Application of ground penetrating radar to the geological forecast for water-bearing faults in the  Jiaozhou Bay subsea tunnel construction[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(4): 65 -68 .
[8] LIU Yan-Pu, Shi-Lai-Shun, Ba-Huan-Fen, Guo-Fang. The investigation of polyethylene surface modification by cold plasma induced grafting polymerization of acrylonitrile[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(5): 124 -127 .
[9] DU Gan-Wei, HE Ban, WANG Yu-Ling, LIU Zhi. Formulation design of metalbearing composite explosive based on genetic algorithm[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(5): 149 -152 .
[10] ZHAO Zhihong 1,2, HUANG Lei 2, LIU Feng2, CHEN Zhenyu 1,2. A survey of search technologies in Deep Web[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 15 -20 .