Thesis Report Final (1) - 230901 - 202841
Thesis Report Final (1) - 230901 - 202841
Thesis Report Final (1) - 230901 - 202841
First of all, I would like to thank M. Walid BARHOUMI, professor at ENI Carthage and the
chair of the defense jury, and M. Mahdi HAJJI, assistant professor at ISSAT Mateur and the
examiner of the defense jury, for their presence, for their attentive reading of my thesis as well
as for the remarks they will address to me during this defense to improve my work.
I would like to acknowledge all the people who have helped and supported me for the success
of this master thesis.
I would also like to thank all of the jury members for their participation in my master's defense
and for their encouraging and motivating comments.
I am extremely thankful to the CPS master teachers of the department of computer sciences at
the Higher Institute of Applied Science and Technology in Mateur(ISSATM), Bizerte,Tunisia.
Last but not least, I would like to thank my parents, my siblings, and my friends, who have
helped me with the valuable suggestion and support. Their guidance has been helpful in various
type and form in the phases of completion of the project.
Abstract
Over the last internet of things became something very important in our lives, everything we
see in our daily basis is connected such as smart appliances (stoves, washers and dryers), smart
homes, connected cities, connected vehicles and a lot of other things that we deal with in our
daily life.
Numerous of new use cases such as computing and storage anywhere and whenever needed,
have been made possible by cloud computing. A well-known example of cloud computing is
storing data and information from your smart phone to data centers.
Connected vehicles would change people’s life in the near future by making the transportation
safer cleaner and more comfortable, but due to some internal (the navigation app) and external
(uncertainties, risk) factors it may cause some level of distribution for the cloud and also the
vehicle itself.
Other applications like collision alerts, obstacle detection, and autonomous driving are delay-
critical. Subsequently, they need to be processed deterministically in a very short amount of
time (few tens of milliseconds).
Fog computing has been suggested as a solution for connected vehicle applications that need
to accommodate delay-critical computation, security concerns, and communication latency.
That brings cloud computing to the network's edge. Instead of centralized cloud analysis,
processing, and storage functions, they are now decentralized and run-on gateways/fogs close
to end user devices.
The majority of the vehicles require the immediate offloading of delay-sensitive applications to
the nearby fog infrastructure because to the resource limitations on the onboard computers of
the vehicles.
Due to these uncertainties, it is difficult to ensure high availability and deterministic guarantee
of computation resources. As a result, reserving the desired resources in advance is required.
In this thesis, we design a reservation technique based on uncertainties and probability maps to
reserve for the future the desired computation resources on fog nodes. Experimental results
show that the proposed algorithm performs remarkably well concerning useful and wasted
reservation.
Table of Contents
General Introduction .................................................................................................................. 1
1. Introduction ..................................................................................................................... 2
3. Computing Paradigm....................................................................................................... 4
5. Conclusion ..................................................................................................................... 13
1. Introduction ................................................................................................................... 14
5. Conclusion ..................................................................................................................... 21
Chapter 3: Our Fuzzy-Logic-Based Solution ........................................................................... 22
1. Introduction ................................................................................................................... 22
4. Conclusion ..................................................................................................................... 37
1. Introduction ................................................................................................................... 38
4. Conclusion ..................................................................................................................... 56
References ................................................................................................................................ 58
Annexes .................................................................................................................................... 61
List of Figures
Figure 1: IOT Architecture (A: Three-tier) (B: Five-tier) [1]. ................................................... 4
Figure 2: First appearance of Cloud, Edge, and Fog computing in the literature [3]. ............... 5
Figure 3: Relationship between Cloud, Fog & Edge computing [2]. ......................................... 5
Figure 4: Architecture of vehicular fog computing [7]. ........................................................... 10
Figure 5: Steps involved in Application Execution. ................................................................ 12
Figure 6: Task offloading. ........................................................................................................ 15
Figure 7: Boolean logic VS FL (ref.
https://www.techtarget.com/searchenterpriseai/definition/fuzzy-logic) . ................................ 23
Figure 8: Concept of a fuzzy logic expert system. ................................................................... 25
Figure 9: Visualization of a visit probability map.................................................................... 29
Figure 10: Explanation of creation of universe variable. ......................................................... 32
Figure 11: Example of membership function in our algorithm. ............................................... 33
Figure 12: Aggregated membership function. .......................................................................... 34
Figure 13: Threshold reservation result using the centroid method. ........................................ 34
Figure 14: Threshold reservation result using the SOM method. ............................................ 35
Figure 15: Threshold reservation result using the MOM method. ........................................... 35
Figure 16: Threshold reservation result using the LOM method. ............................................ 36
Figure 17: Flowchart of the proposed solution. ....................................................................... 37
Figure 18: Area of InTAS simulation. ..................................................................................... 38
Figure 19: Probability map of matrix 1 of vehicle 1292 on cell size 20. ................................. 43
Figure 20: Result of threshold reservation on of matrix 1 of vehicle 1292 on cell size 20 with
Centroid method. ...................................................................................................................... 43
Figure 21: Probability map of matrix 84 of vehicle 1292 on cell size 20. ............................... 44
Figure 22: Result of the threshold reservation of matrix 84 of the vehicle 1292 on cell size 20
with Centroid method. .............................................................................................................. 44
Figure 23: Probability map of matrix 38 of vehicle 1292 on cell size 50. ............................... 46
Figure 24: Result of the threshold reservation of matrix 38 of the vehicle 1292 on cell size 50
with Centroid method. .............................................................................................................. 46
Figure 25: Probability map of matrix 70 of vehicle 1292 on cell size 50. ............................... 47
Figure 26: Result of the threshold reservation of matrix 70 of the vehicle 1292 on cell size 50
with Centroid method. .............................................................................................................. 47
Figure 27: Probability map of matrix 102 of vehicle 1292 on cell size 100. ........................... 49
Figure 28: Result of the threshold reservation of matrix 102 of the vehicle 1292 on cell size
100 with Centroid method. ....................................................................................................... 49
Figure 29: Probability map of matrix 50 of vehicle 1292 on cell size 100. ............................. 50
Figure 30: Result of the threshold reservation of matrix 102 of the vehicle 1292 on cell size
100 with Centroid method. ....................................................................................................... 50
Figure 31: Probability map of matrix 6 of the vehicle 27245 on cell size 150. ....................... 52
Figure 32: Result of the threshold reservation of matrix 6 of the vehicle 27245 on cell size
150. ........................................................................................................................................... 52
Figure 33: Probability map of matrix 90 of the vehicle 27245 on cell size 150. ..................... 53
Figure 34: Result of the threshold reservation of matrix 90 of the vehicle 27245 on cell size
150. ........................................................................................................................................... 53
Figure 35: Probability map of matrix 20 of vehicle 27245 on cell size 200. ........................... 54
Figure 36: Result of the threshold reservation of matrix 20 of vehicle 27245 on cell size 200
with Centroid method. .............................................................................................................. 55
Figure 37: Probability map of matrix 20 of vehicle 27245 on cell size 200. ........................... 55
Figure 38: Result of the threshold reservation of matrix 64 of vehicle 27245 on cell size 200
with Centroid method. .............................................................................................................. 56
List of Tables
Table 1: Main differences between cloud computing and edge. ................................................ 7
Table 2: Comparison between Fog Computing and Edge Computing....................................... 9
Table 3: Head-to-Head Comparison between Fuzzy Logic and Probability. .......................... 24
Table 4: Pros & Cons of Fuzzy logic. ...................................................................................... 26
Table 5: Input data for the vehicle in Time T. ......................................................................... 30
Table 6: Used matrices sizes. ................................................................................................... 39
Table 7: Results of the threshold reservation on vehicle 1292 on cell size 20......................... 42
Table 8: Results of the threshold reservation on vehicle 1292 on cell size 50......................... 45
Table 9: Results of the threshold reservation on vehicle 1292 on cell size 100....................... 48
Table 10: Results of the threshold reservation on vehicle 27245 on cell size 150. ................. 51
Table 11: Results of the threshold reservation on vehicle 27245 on cell size 200. ................. 54
List of annexes
Annex 1: Threshold reservation of the vehicle 1292 with cell size 20 .................................... 61
Annex 2: Threshold reservation of the vehicle 27245 with cell size 200 ................................ 87
General Introduction
The pinnacle of the current distributed computing era has been the transfer of programs from
local Internet of Things devices to nearby infrastructures. For real-time applications, cloud
computing has proven fairly troublesome due to excessive latency and network limitations.
As a result, it has been suggested that Fog Computing should be provided in addition to Cloud
Computing for almost all applications.
To handle the generated data near to its source, the Fog computing architecture relies on so-
called fog nodes. The physical component of a fog node could be a router, switch, or gateway.
Fog computing therefore provides a wide range of services to time-critical use cases, such as
autonomous driving, to address a variety of issues, including obstacle detection.
In this circumstance, connected vehicles must often offload their time-critical applications or a
chosen subset of them to the nearby fog nodes with the least amount of latency. This task
offloading requires to reserve computational resources in advance to guarantee the safety on
roads.
The research team from University of Applied Sciences Landshut – Germany has already
developed a reservation and re-reservation technique based on probability map and simulate it
on the area of InTAS (Ingolstadt Traffic Scenario) using SUMO (Simulation of Urban
MObility) simulator and find out that the results are very specific for the selected simulation
scenario. However, the question that arises: what is the impact of the uncertainties, a dynamic
reservation, and a deterministic cell size on the probability map consequently on the
performance of this reservation technique.
The main challenge of this thesis is to develop a counter measure to cope with uncertainties
which facilitates finding a dynamic threshold allowing vehicles to decide which fog node must
be reserved. Therefore, we developed a fuzzy logic algorithm that connected vehicles use to
determine the dynamic threshold at a given time based on their context. To look into the
suggested algorithm, we use simulations to demonstrate the effectiveness of the suggested
strategy in comparison to the static criteria already used in the reservation technique.
The thesis is organized as follows. In Chapter 1, we give basic knowledge on IoT and computing
paradigms. In Chapter 2, we focus on the classification linked to task offloading and
computation resource reservation. Chapter 3 discusses the recommended solution to the
difficulties associated with our dilemma. Finally, in Chapter 4, we assess and explain the
experimental data, and we conclude the thesis with perspectives.
1
Chapter 1: IOT Basics and Computing Paradigms
1. Introduction
In this chapter, we’ll present some basics and background knowledge in order to understand the
state of the art in the next chapter. We will begin by a rundown on the Internet of Things (IOT).
Next, we will discuss the most know and used computing paradigms (Cloud, Edge and Fog).
Finally, we’ll introduce the Vehicular Fog Computing (VFC).
But we are going to give it the omniscient definition that everyone consensus of. The Internet
of Things is the outcome of the evolution of several technologies that lead to this novel concept,
which explain why IOT systems contain a large number of heterogenous components. First,
sensors and actuators are tools that allow us to interact with the physical world. The
environment can be monitored using a sensor (e.g., camera, GPS, light sensor, etc.), but changes
to the environment are made using an actuator (e.g., motor, switch relay, etc.). Second, the data
gathered or collected can be processed and stored on a remote server or at the network’s edge.
Thirdly, the majority of IoT device communication is wireless due to the dispersed locations.
All of these elements (sensors, actuators, computing servers, and communication network) are
essential to construct an IoT system. However, we require software to connect and manage all
of these disparate components.
In the following, we present the two most fundamental IOT architectures, three- and five-layer
architectures [1].
2
A. Three-layer IOT Architecture
This architecture was introduced in the early stages of research in this area, which make it
inadequate because frequently IOT applications focuses on finer concepts of the IoT. It has
three layers, namely, the perception, network, and application layers as shown in Figure 1 A.
(i) The perception layer is the physical layer, which has sensors for sensing and
gathering information about the environment. It senses some physical parameters or
identifies other smart objects in the environment.
(ii) The network layer is responsible for connecting to other smart things, network
devices, and servers. Its features are also used for transmitting and processing sensor
data.
(iii) The application layer is responsible for delivering application specific services to
the user. It defines various applications in which the Internet of Things can be
deployed, for example, smart homes, smart cities, and smart health.
The three-layer architecture defines the main idea of the Internet of Things, but it is not
sufficient for research on IoT because research often focuses on finer aspects of the Internet of
Things. That is why, we have other architectures such as five-layers architecture.
The role of the perception and application layers is the same as the architecture with three layers.
We outline the function of the remaining three layers.
(i) The transport layer transfers the sensor data from the perception layer to the
processing layer and vice versa through networks such as wireless, 3G, LAN,
Bluetooth, RFID, and NFC.
(ii) The processing layer is also known as the middleware layer. It stores, analyzes, and
processes huge amounts of data that comes from the transport layer. It can manage
and provide a diverse set of services to the lower layers. It employs many
technologies such as databases, cloud computing, and big data processing modules.
(iii) The business layer manages the whole IoT system, including applications, business
and profit models, and users’ privacy. The business layer is out of the scope of this
paper. Hence, we do not discuss it further.
3
Figure 1: IOT Architecture (A: Three-tier) (B: Five-tier) [1].
3. Computing Paradigm
In the last decade, we have witnessed a significant evolution of computing paradigms. The most
known and consolidated ones are cloud computing, edge computing and fog computing, they
have received a great deal of interest from both industry and academia. However, it is difficult
to find a clear and concise characterization of these computer paradigms and their relationships
in the literature. This makes it difficult for new researchers to obtain a clear grasp of these
paradigms.
As shown in Figure 2 [3], the idea of Edge computing first appeared in the
literature in 2004-2005 with the concept of pushing the application logic and data to the edge
of the network. Subsequently, Cloud computing and IoT appeared. The term “Cloud
computing” was first used by Google and Amazon in 2006. Eric Schmidt, Google CEO,
mentioned it in the Search Engine Strategies (SES) conference, while Amazon referred to the
Cloud as a commercial product. Later, in 2008, scientific papers about Cloud computing also
appeared. Fog computing has instead a clear origin. It was first mentioned and defined in 2012
by Flavio Bonomi at CISCO.
4
Figure 2: First appearance of Cloud, Edge, and Fog computing in the literature [3].
Figure 3 illustrates the relationship between these three paradigms through IOT devices.
According to the research community efforts and industrial advances, a fully-implemented real-
world landscape for IoT applications would consists of four layers: 1st layer is IoT layer, 2nd
layer is Edge Computing layer, 3rd layer is Fog Computing layer and final and 4th layer is Cloud
Computing layer [2].
5
3.1 Cloud Computing
Nowadays, Cloud computing is a well-known paradigm, we can define it as a network access
approach that enables ubiquitous, easy, on-demand network access to a shared pool of
programmable computing resources. (e.g., networks, servers, storage, applications, and
services) It may be installed and removed quickly with no administrative effort or service
provider interaction. Cloud computing have many strengths points, we can name the most
essential ones [3]:
6
Edge computing refers to the enabling technologies that allow computation to be conducted at
the network's edge, on downstream data for Cloud services and upstream data for IoT services.
Edge computing architecture is a federated network topology that introduces edge devices
between terminal devices and cloud computing to extend cloud services to the network's edge.
The cloud-edge cooperation structure is commonly separated into three layers: the terminal
layer, the edge layer, and the cloud computing layer. We can briefly put in place those layers
with their functions and compositions [4]:
- Terminal Layer: The terminal layer consists of all types of devices connected to the
edge network, including mobile terminals and many IOTS devices (e.g., sensors,
smartphones, smart cars, cameras, etc.). In the terminal layer, the device is not only
a data consumer, but also a data provider.
- Boundary Layer: The edge layer is the core of the three-tier architecture. It is located
at the edge of the network and consists of edge nodes widely distributed between
terminal devices and clouds. It usually includes base stations, access points, routers,
switches, gateways, etc.
- Cloud Layer: Among the federated services of cloud-edge computing, cloud
computing is still the most powerful data processing center. The cloud computing
layer consists of a number of high-performance servers and storage devices, with
powerful computing and storage capabilities, and can play a good role in areas
requiring large amounts of data analysis.
The following table illustrate the main differences between cloud computing and edge
computing.
7
3.3 Fog Computing
Fog computing is often considered as an implementation of Edge computing and it is an
expansion of Cloud computing but nearer to things that perform with IoT information. Fog
computing acts as a bridge between end devices and cloud computing, bringing storage,
networking, and computation capabilities closer to the edge devices. These end devices are
known as fog nodes, and they may be placed anywhere there is a network connection. A fog
node is a device that contains processing, computing, network connectivity, and storage.
Switches, servers, security cameras, and routers are examples of fog nodes.
The following are the major characteristics of fog computing [5]:
- Adaptability: There are extensive network sensors that keep track of the neighboring
environment. The fog delivers storage resources and disseminated computing which
can operate with such extensive end devices.
- Real-time communications: Fog computing solicitations provide simultaneous
communications amid fog nodes relative to the batch analysis utilized in the cloud.
- Physical distribution: In divergence to the integrated cloud, fog delivers applications
and services that are decentralized and can be hosted in any location.
- Less latency and position awareness: Fog is near to edge devices; it delivers less
waiting time when computing the information of edge devices. Besides, it assists
position responsiveness in which fog nodes can be hosted in various places.
- Compatibility: Fog modules can adapt and interoperate with dissimilar platforms
through diverse service providers.
The following table illustrate the differences between Fog computing and Edge computing
[5]:
Fog Computing Edge Computing
It shifts the edge computing operations to It generally takes place instantly on the IoT
CPU that are linked to the local area network devices in which the IoT sensors are
or into the hardware of local area network so connected or an entry point of IoT device that
that they may physically be more far away is physically “nearby” to the IoT sensors.
from the IoT sensors and IoT actuators.
The information is computed inside the fog The information is computed on the sensor or
nodes or gateway of IoT which is located IoT device, without being relocated to
inside the local area network. datacenters or cloud.
8
It can manage more information at a It keeps all information and computation on
particular time intervals which essentially the device which initially generated it.
rallies upon the capabilities of edge through
its capacity to handle real time needs.
The perfect period to adopt fog computing is Works well when high amounts of
when you have billions of IoT devices information have to be handled and instantly.
connected, exchanging the information in bi
directional
It can compute high volumes of information The information resides on the network
with very less or no interruption delay. “edges” and can be processed instantly.
Clients can handle various data locally and It stalls the time and saves the resources by
depend on their safety methods. looking after the processes by gathering and
examining the information generated in real-
time.
It does not necessitate continuous connected The information is primary computed locally,
access. The information can be kept locally and then sent to the central data centers.
or drawn up from local storage.
Table 2: Comparison between Fog Computing and Edge Computing.
In this section, we provide an overview of the VFC so that will make it easy to comprehend the
state of the art in the next chapter.
9
The argument behind VFC is that cars have progressed and are now capable of data processing,
analysis, and reasoning thanks to sophisticated computer and networking capabilities. In fact,
VFC is often made up of vehicles and infrastructures (both mobile and stationary), such as fog
nodes (FN). FN is often more powerful in terms of computing than automobiles.[6]
4.2 VFC Architecture
Figure 4 depicts a high-level architecture of vehicular fog computing that includes three types
of entities: smart automobiles as the data production layer, roadside units/fog nodes as the fog
layer, and cloud servers as the cloud layer.
(i) Data generation layer: Because of their real-time processing, sensing (cameras, radars,
GPS, etc.), networking, and storage capabilities, the vehicles serve as the primary data
generators in a VFC system. Some of this data can be analyzed by the smart vehicle
itself to inform real-time decision making (vehicle-level decision), while others will be
sent to the fog nodes for analysis and usage in other ways.
(ii) Fog layer: Fog Nodes, which are often located in different locations of a city, will gather
data supplied by smart cars, process the acquired data, and transmit the processed data
to cloud servers. In a VFC system, these nodes also function as middleware/intermediate
devices between the cloud servers and the smart automobiles. These fog nodes, unlike
existing vehicular networks, will have additional functionalities and will provide more
diversified services for smart cars, such as navigation, video streaming, and smart traffic
signals.
(iii) Cloud layer: From a faraway location, cloud servers conduct city-level monitoring and
centralized control. These servers will receive data from the fog nodes and use
computationally demanding analytics to make the best judgments (city-level decision).
10
To achieve optimal city-level traffic control, they will monitor, administer, and regulate
the city's road traffic infrastructures.
4.3 VFC Features
The following baseline properties can be easily achieved with VFC [7].
11
The process starts with application partitioning in which the code of the application is
partitioned, and computationally intensive tasks are selected and are offloaded to an identified
fog node. Task offloading involves resource discovery of nearby mobile devices and fog node
available. The resource mapping algorithm is used to map task to best node available that fulfills
Quality of Services (QoS) and resource requirements of application execution. If the number of
devices increases in the network, then the problem grows exponentially. This problem includes,
also, service resiliency, data security and privacy of the fog computing environment. Then the
scheduling of the task is performed, which leads to its execution, and finally, the results are
returned to the requesting node. Finally, in case of device failure or mobility, this process needs
to be resumed, and all these steps are executed again.
All these steps cannot be treated independently for distributed application execution, moreover
each step is a distinct research perspective that need special addressing (Figure 5).
12
5. Conclusion
In this chapter, we presented an overview about the main concepts that are related to this thesis.
At first, we have provided an overview of the IoT, its definitions and its architectures. Then,
we have introduced the three computing paradigms: cloud, fog, and edge. Finally, we have
presented an important concept for our study namely VFC by introducing it, its architecture and
its features. This overview will allow us to introduce two important concepts in the next chapter:
the task offloading and the computation resource reservation.
13
Chapter 2: Task offloading and Computation Resource Allocation
1. Introduction
In the prior chapter, we discussed how VFC decreases the strain and traffic created to reach
cloud data centers by relocating data storage and computation to the network's edge. The VFC
architecture, in particular, provides the required capabilities for speeding up computation tasks
and minimizing latency. One of these methods is resource allocation (reservation), it is
designed to manage available resources and reduce computation costs, such as how the vehicle
and network operator interact and how computational tasks are split across several neighboring
fog nodes.
In the literature, the taxonomy of resource allocation is widely varied. There are several
terminologies of the term “resource allocation” such as: resource placement, resource
scheduling, resource migration, resource offloading, etc. At this point, we should note that, for
the rest of this master’s thesis, we refer to the term “resource allocation” [9]. Moreover, task
offloading is considered to be one of the main resource allocation steps in the field of fog
computing. In fact, industry and academia proposed it as a promising solution for resource
management in computing systems based on edge, fog, and cloud paradigm [10].
In this chapter, we first discuss task offloading, including approaches and challenges, and then
present fog computing resource reservations for connected vehicles based on path prediction.
Task offloading is a complex process that can be influenced by a variety of circumstances. This
procedure, in particular, incorporates mobile device resource discovery, resource allocation
algorithms, and task transfer from vehicle to fog nodes.
14
Figure 6: Task offloading.
- Delay: The delay minimization of task execution is one of the main objectives
during offloading. Regardless of the type of task offloading, the overall goal is to
reduce the total execution delay.
- Energy: The energy consumption typically refers to the end devices. The reason is
that mobile and IoT devices are usually battery powered, that’s why a major concern
is how to maximize the lifetime of the battery by reducing the device’s energy
consumption.
- Bandwidth: Due to the great influence that it has on the task offloading performance,
bandwidth can also be considered as an objective. Since to the limited available
bandwidth, especially in IoT networks and dense cellular networks, the careful
allocation of spectrum becomes of utmost importance.
- Load balancing: Due to the availability of physical hardware resources, load
balancing is another objective to consider during task offloading. The goal is to
provide the necessary scalability by increasing the resource availability, increasing
the number of offloaded tasks, maximizing the resource sharing, and facilitating the
offloading of future tasks.
15
- Deployment cost: It can be modeled in various ways, each having a different
interpretation. For example, the cost can be expressed as the monetary cost for
computing processing, memory and network bandwidth, induced for using network
resources.
- Multi-objective: The objectives presented previously are usually conflicting,
making task offloading a challenging problem. For example, minimize the latency
can lead to higher energy consumption on the end device, by deciding to execute the
tasks locally. Adopting load balancing objectives, offloaded tasks can be distributed
among different fog sites, in order to reduce the total delay and energy consumption.
In the same way, when minimizing the deployment cost, offloaded tasks may be
gathered in one single fog site; these results create significant congestion in the
infrastructure and thus higher communication delays.
2.2 Task Offloading Approaches
Many difficult challenges arise while offloading tasks. Because fog computing involves various
dynamic elements, such as the dynamic nature of networks, the dynamic behavior of fog nodes,
and the availability of resources in fog nodes, etc.,
These issues require answers for some critical questions, such as how to select the destination
node for the offloading and how to choose tasks to be offloaded. For the first question, two
approaches exist to address it, namely static and dynamic offloading.
In static offloading, the destination node is chosen regardless of the status of the nodes and the
network. Even though static offloading provides a response to this question, real-time
applications require a lot of techniques that can fully and efficiently exploit resources in fog
networks. On the other hand, dynamic offloading evolves promising solutions, where the
decision is made considering the current status of the nodes and the needs of the offloaded task.
A. Object Detection
The task of object identification includes image collecting, recognition, pre-processing, feature
extraction, and database searching. This object could be a signboard, a number plate, a human
16
face and/or animal recognition, or anything else that is involved in an event that has to be
recognized. These jobs require significant compute capability and are time sensitive, therefore
we must offload them, partially or entirely, to the fog node.
B. Traffic Management
Vehicular networks enable communication and data sharing between vehicles. The increased
number of vehicles on the road infrastructure has an impact on road safety and traffic load.
Traffic management, which is time sensitive and requires precision, makes advantage of
accident and road blockage information acquired from vehicles and fog nodes via offloading.
D. Video Analytics
The process of extracting relevant information from a video is known as video analytics. Video
Crowdsourcing is a method of gathering information from several clients at the same time. This
method can be employed in vehicles equipped with dash-mounted cameras. These videos are
transferred to a fog node, where they are evaluated for a variety of purposes, including traffic
management, driving assistance, road situations, weather conditions, and event recognition,
among others.
E. Autonomous Driving
Autonomous driving seeks to provide safe navigation in the face of changes in surroundings
caused by automobiles, people, or other barriers. Furthermore, this system must deal with
unexpected events such as roadblocks, traffic congestion, and accidents. Perception, planning,
and control are the three most important difficulties in autonomous driving. The perception is
in charge of gathering data, which is subsequently sorted and filtered. However, the data
acquired in the vehicle may necessitate a high computational capability in order to make a
judgment. As a result, tasks are offloaded to fog nodes.
F. Content Distribution
A large amount of content, such as music, games, and essential information like traffic
congestion or accidents, must be downloaded/uploaded in vehicle networks. The content
17
supplied could be a little file containing important information in the form of bits or a huge
video file. Some content distributions, such as emergency notifications, may be delay-sensitive
and need minimal latency, but infotainment-related content distribution (data distribution) may
not be.
G. Parking Assistance
One of the critical focuses of the parking assistance system is to provide a location where
vehicles can be parked with minimal effort and fuel. There are numerous parking assistance
system designs in the literature. When a car enters or exits a parking slot in a parking
management system, its status is relayed to the server for recording and computation. The server
side responds to the car request for a parking space by using information from sensors indicating
available spaces. Parking assistance systems have numerous advantages, including the ability
to save time, reduce fuel use, and improve traffic and parking efficiency.
18
There is another known approach such as:
19
vehicle, such as path planning, and real-time object detection, etc. Also, due to the multiple
constraints for real world, they claim that the configuration of vehicular network is variational
which makes almost impossible to build one ML model that is compatible for all the cases. For
that reason, the authors propose a two-stage meta-learning-based approach in order to choose
the appropriate machine learning algorithms based on the meta-features extracted on database
to be able to predict the resource consumption in edge nodes accurately for different scenarios.
According to [18], edge computing allows to facilitate edge services in vehicular networks by
using edge computing devices (ECDs). In this paper, the writers establish a reservation service
framework that ensures a connection between a vehicle's reservation service request and one of
the ECDs that is ahead of its driving direction. However, due to the trustworthiness of the cars,
they suggest a trusted relay selection system for edge services based on dynamic traffic status
and the reputation management mechanism.
Another approach is presented in [19], In fact, the authors presented Deep Reserve, a
spatiotemporal reinforcement learning method based on the deep deterministic policy gradient
algorithm. According to them, existing schemes rely on statistical information can’t satisfy real
problems due to the time-varying demands. We mainly have three developed parts in [19]:
In [20], authors proposed a proactive resource reservation scheme to predict slice needs in fifth
generation (5G) networks based on the URLLC key service (Ultra-Reliable Low Latency
Communications). However, the authors confirm that URLLC slice resource dimensioning
cannot be static in some cases such as safety message exchange in vehicular services due to the
varying number of vehicles in the cell. That said, they propose three proactive resource
reservation schemes:
- static Maximal Reservation: in order to ensure the reliability of URLLC, a maximal
number of resources must be reserved, in a static, for URLLC slice for each cell in
the network. To determine this optimal number of allocated resources needed by a
given number of User Equipment (UE) per cell, they use an offline simulation.
20
- Proactive reservation on neighboring cells: in this case, the scheme is dynamic and
proactive. Without knowing the users’ trajectory, the authors suppose that an
URLLC user can move to any of the neighboring cells. When the user moves from
a source cell to a target cell, the number of URLLC users is increased for the
neighboring cells of the target cell that are not neighbors of the source cell and
decreased for the neighbors of the source cells that are not neighbors of the target
cells.
- Proactive reservation on predicted vehicular URLLC UEs trajectory: in this scheme,
they suppose that they can deduce the expected total number of URLLC UEs and
determine the corresponding resource reservation if they can predict the URLLC
UEs trajectory. The authors confirm that this scheme allow to prevent useless
reservation of resources.
5. Conclusion
Task offloading is an inevitable action, particularly in resource-constrained nodes, and the
research community has presented a variety of approaches for effective and successful task
offloading. In this chapter, we initially addressed the problems, techniques, and application
areas of task offloading in Vehicular Fog Computing. In the second section, we concentrated
on fog computing resource reservation for connected vehicles based on path prediction, we
presented three prediction techniques deterministic, history-based, and stochastic models. Then,
we studied the stat of the art on the problem of computation resource reservation.
Because of that, in the next chapter we’re going to introduce our counter measure that cope
with uncertainties for a guaranteed reservation of computing resources for connected vehicles.
21
Chapter 3: Our Fuzzy-Logic-Based Solution
1. Introduction
In Vehicular Fog Computing, reserving fog computation resources is a challenge because of
the limited coverage of the fog nodes and the mobility of the vehicles that can browse many of
them. In addition, the access to the computation resources must be guaranteed at any times
because of the time critical vehicular applications. In order to guarantee access to computational
resources, vehicles must reserve the remaining context-depending resources in advance (such
as offloading current sensor values from the vehicle to the fog). This reservation process
depends on the probability map and probability threshold to reserve the needed resources for
the vehicles.
In this thesis, we propose to use fuzzy logic to determine a guaranteed reservation threshold
based on the vehicle position and the risk surrounding it. Depending on this context, our
technique allows to the vehicle to decide which fog nodes must be reserved on given Time T,
in order to save resources and costs.
Fuzzy set theory has been used for solving different problems in diverse fields. It is mostly used
in the field of engineering as it resolves the problems of imprecision and vagueness.
22
FL mainly depends upon the rules formed by the Linguistic variables. FL control is free of
complex numerical calculations, unlike other methods. It only uses simple mathematical
calculations to control the model. Despite relying on basic mathematical analysis, it provides
good performance in a control system. Hence, this method is one of the best methods available
and also easier one to control a plant.
In fuzzy set theory, each element has a degree of membership with which it belongs to any
particular set. We can say that fuzzy sets are like classical sets without much sharper boundaries.
Instead of Boolean logic, fuzzy logics are utilized while designing any fuzzy logic expert
framework. As such, a fuzzy expert system is a gathering of membership functions and
principles that are used to reason about information.
FL has had a significant impact: it is utilized on a large scale and in a variety of areas, including
engineering, medicine, science, and business. There is numerous well-known and effective FL
applications in use in the industry (for example, Sendai subway control (Hitachi), airplane
control (Rockwell Corporation), and intelligent cruise control (Peugeot and Nissan
automobiles)). Aside from these well-known industrial uses, several current research projects
in many fields are exploring FL's enormous potential.
Figure7 illustrates the main difference between Boolean logic and FL:
23
simplification, we consider that FL is a logic of vague, imprecise notions and propositions,
propositions that may be more or less true. Fuzzy logic is then a logic of partial degrees of truth.
On the contrary, probability deal with crisp notion and propositions, propositions that are either
true or false; the probability of a proposition is the degree of belief on the truth of that
proposition.
In Table 3, we highlight the main difference between fuzzy logic and probability:
Fuzzy expert systems, which work based on the fuzzy-logic approach, can model the rules
obtained from fuzzy preferences of experts and can provide outputs by using these rules. The
most important application of fuzzy system (fuzzy logic) is in uncertain issues. When a problem
has dynamic behavior, fuzzy logic is a suitable tool that deals with this problem [25].
A fuzzy logic expert system is composed of the following components: fuzzification interface,
rule base, inference system and defuzzification interface (Figure 8).
The fuzzification interface assigns measured input values a certain degree of membership to
each of the linguistic terms of a linguistic variable. The rule base and the inference system map
combinations of linguistic terms of the input variables to the output variable. The
defuzzification interface transforms the fuzzy output set into a crisp score
24
Figure 8: Concept of a fuzzy logic expert system.
Now, we are going to define each component in the fuzzy expert system [26]:
- Input: The input is the crisp values that are given to the system for taking decision.
- Fuzzification interface: Here the input variables are compared with the membership
functions on the antecedent part of fuzzy rule to obtain the membership values of
each linguistic label. In this process crisp inputs from the domain are transformed
into fuzzy inputs with help of membership function.
- Inference system: Combine the membership values using multiplication or min
function on the premise part to get firing strength i.e., degree of fulfilment of each
rule. Inference Engine generates the qualified consequents which can be either fuzzy
or crisp on each rule depending on the firing strength. It uses rules to map inputs to
outputs. The appropriate rule is applied to the conclusion part of each rule. This
results in one fuzzy subset to be assigned to each output variable for each rule.
- Rule base: Or Knowledge base is a repository of rules which is applied on fuzzy sets
to find degree of membership. The rule base is the most important requirement for
the fuzzy logic. The rule base generally consists of various cases of If-Then rules.
First the fuzzy sets and the membership functions are declared. Then the If-Then
rules for the membership functions are decided for the particular control. The output
is controlled by these rules on input.
- Defuzzification: Here the qualified consequents are aggregated to produce crisp
output. It is a process of transposing the fuzzy outputs to crisp outputs, from the
given fuzzy sets and corresponding membership degrees.
- Output: Final crisp value that system gives as decision.
25
2.2 Fuzzy logic pros and cons
Fuzzy logic, like almost every framework, has advantages and disadvantages. In this part we
are going to discuss some of the most important strength point of fuzzy logic and some of its
most known weak points [27]. We are going to sum up those pros and cons in the following
table (table. 4).
Advantages Disadvantages
The structure of Fuzzy Logic systems is The fuzzy rationale isn't always exact.
simple and justifiable.
It is generally utilized for business and Approval and verification of a fuzzy
useful purposes. information-based framework needs broad
testing with equipment.
It encourages you to control machines and Setting accurate, fuzzy guidelines and,
purchase items. enrollment capacities can be a tough task.
It asks you to manage vulnerabilities in the Occasionally, the fuzzy rationale is mistaken
design process. for likelihood hypothesis.
Generally strong as no exact information
sources required.
On the off chance that the input sensor quits
working, you can program it into the
circumstance.
You can change it to improve or modify
framework execution.
Economical sensors can be utilized which
encourages you to keep the general
framework cost and intricacy low.
Table 4: Pros & Cons of Fuzzy logic.
26
A. Medical fields
In recent years, computational intelligence has been used to solve many complex problems by
developing intelligent systems. And fuzzy logic has proved to be a powerful tool for decision-
making systems, such as expert systems and pattern classification systems. Fuzzy set theory has
already been used in some medical expert systems [28].
27
systems. Fuzzy logic controller (FLC) is being widely used in solar PV (Photovoltaics)
applications for MPPT (Maximum Power Point Tracking) [29].
- Solar: some authors have presented a fuzzy set methodology for comparing the
benefit to cost ratios of different solar systems for various applications in Jordan.
Overall fuzzy weights are given for each solar system. GIS (Global System
Integrator) based spatial fuzzy multi-criteria evaluation was carried out at Oman to
assess the land suitability for large PV farms implementation. The electricity
generation potential using solar PV technology on highly suitable lands have been
estimated.
- Wind: Fuzzy approach has been applied in wind energy for site identification,
economic analysis, capturing uncertainties, wind prediction, wind energy
assessment etc. The probable sites where wind energy conversion systems can be
located have been identified using fuzzy based risk analysis. The variables used in
the analysis are wind speed and its frequency of occurrence.
Nevertheless, we chose the visit/residence probability map to model a vehicle navigation space.
In fact, as shown in Figure 9, the probability map is a graphical representation that indicates the
probability that the cell (area) will be visited by the vehicle or not. It divides a specified area
into cells of equal size. Each cell in the probability map has a value that represents the odds of
a visit. The brightest cells have the highest probability. All possible paths are represented by
the yellow links [15].
28
Figure 9: Visualization of a visit probability map.
It is difficult to reserve fog computation resources, particularly for vehicles. Fog nodes have a
limited coverage area, and vehicles can move through many of them. Because of the importance
of time-critical applications, the availability of computation resources must be guaranteed at all
times. As a result, computation resources must be reserved for the future.
Coordination is required between fog computing resources and moving objects such as vehicles.
Resources must be available at all times, especially for time-critical applications of autonomous
vehicles. To ensure availability, computation resources must be partially reserved in the future.
29
The main challenge of this thesis is to develop a counter measure to cope with uncertainties for
a guaranteed reservation of fog computing resources for connected vehicles which makes it
possible to find a dynamic threshold allowing vehicle to decide which fog nodes must be
reserved according to the context. Our technique is based mainly on the probability map, cell
size, position, the uncertainties, and speed of the initiator vehicle as input. For each simulation
time, the input parameters are changed.
In this work, we assume that the fog nodes cover the entire simulation area and that bandwidths
are reserved in advance at any time with a deterministic guarantee. Furthermore, the fog
provider always responds positively to the initiator vehicle.
Moreover, we assume that the cell size of the probability map can have the following values:
20 – 50 – 100 – 150 – 200 meters. Finally, in this study, we consider a static fog node.
Input Description
Probability Matrix (Mrc) The probability matrix of the vehicle at time
T. It is the implementation of the probability
map.
Cell size (Cs) The cell size of the probability matrix (20 –
50 – 100 –150 – 200 m).
Vehicle Speed (speed) The vehicle speed at time T.
Vehicle Position (Vp) The vehicle position on the probability
matrix at time T.
Risk The risk of an uncertainties that can face the
vehicle which can cause a delay (bad
weather, accident on the road, road
construction, etc.).
Table 5: Input data for the vehicle in Time T.
The probability matrix Mrc is a critical input to our reservation algorithm. It represents the area
where reservations will or will not take place. A matrix can be represented in various ways in
programming, but the most common is as a two-dimensional array. The number of cells in each
30
dimension determines the size of the matrix. Because there are an infinite number of possible
matrices, the algorithm must be able to handle any size.
For our algorithm, Mrc can be any n × m matrix where (n, m) Ꞓ ℕ. We expect that Mrc scale
based on the historical movement of the vehicle and the current desired destination. Because
any size of matrix can represent any size of a real map, the additional information of the cell
size Cs Ꞓ ℚ+ where 5 < Cs < 200 is needed. In this thesis we assume Cs is between the size of
the car (5 meters) and the maximum range of the coverage of one fog node (200 meters).
In our algorithm, we followed the fuzzy logic process to attend the desired result for the
dynamic threshold reservation.
In the following, we study and explain the steps of our proposed fuzzy logic algorithm:
31
interval of the values contained in an array, space between them, and their type with four
parameters of arange.
- start is the number (integer or decimal) that defines the first value in the array.
- stop is the number that defines the end of the array and isn’t included in the array.
- step is the number that defines the spacing (difference) between each two
consecutive values in the array and defaults to 1.
The most common range of values of membership functions is the unit interval [0,1]. In this
case, each membership function maps elements of a given universal set X, which is always a
crisp set, into real numbers in [0,1].
Two distinct notations are commonly used and employed in the literature to denote membership
function. In one of them, the membership function in the fuzzy set A is denoted by µ A, that is:
µA: X→ [0,1], which is the method that we used. And in the other one, the function is denoted
by A and has, of course, the same form: A→X [0,1].
32
Figure 11: Example of membership function in our algorithm.
C. Construct all the rules for the inference system rule base:
In this section, we take advantage of existing data and information to infer knowledge and
experience in the form of rules, these rules are based on various case of if (X and Y)→ then(Z).
Those rules are an encoding of knowledge that can be used for prediction, but there are some
difficulties with this, because our experience is often encoded in a vague language. Therefore,
we need to inject some precision in our problem to make solving it rather easy, but the issue is
that the linguistic term that we use to describe the degree of something are fuzzy, so by making
it precise, we’ve lost some of the intent. So, we need to take into account the fuzziness or the
impreciseness of the language in our logical rules.
After the process of going from crisp input value to a fuzzy value (fuzzification), comes the
inference and the rule constructing that is based on those fuzzified value. In general, these rules
could create new fuzzy variables that are drastically different form the fuzzy set that was created
in the previous process.
After constructing the needed rules for our inference system, we have to apply them in function
of our desired result (if [input1 and input2] or [input3 and input4] then [output]).
After fuzzifying the crisp inputs, and setting up the inference system (rule base), we need to
cluster the input and the output membership function together in order to get our dynamic
reservation threshold. The aggregated result is shown in a plot (fig.12), the threshold reservation
result depends on the input and the inference rules, the bleu zone in the plot is the range of the
33
result, the threshold reservation can be in any point of this zone, and the finale result will be
determined in the final step which is defuzzification.
- Centroid method: this method is also known as the center of mass, center of area or
center of gravity, it is the most commonly used defuzzification method. In the
following image we can see the result of the centroid method in numerical shape on
the top of the figure and the black line in the yellow zone is the graphical
presentation of the result.
- Min of Maximum (SOM): This method determines the smallest value of the domain
with maximum membership value. The SOM result is shown in the figure and the
34
back line that show the defuzzified result is nearly impossible to see because the
result is zero.
- Mean of Maximum (MOM): In this method, the defuzzified value is taken as the
element with the highest membership values. When there are more than one element
having maximum membership values, the mean value of the maxima is taken. In
other words, the fuzzy controller uses the typical value of the consequent term of
the most valid rule as the crisp output value. This behavior results in stepped output
characteristics, as shown in the following image.
35
- Max of Maximum (LOM): Determine the largest value of the domain with
maximum membership value.
The following flowchart (fig.17) summarize all the steps above, this flowchart has been
converted into an algorithm is shown on Algorithm: Dynamic Reservation Threshold.
The flowchart starts with receiving the crisp inputs variables after initialization, then the
defuzzification of the inputs with the input membership function if succeeded, we continue to
the next step which is the inference and creation of the rule base, if not we go back to the
previous step. And is the same for the inference process if failed we go back to the fuzzification
process, and if it is well done it moves to the next process that is defuzzification which provides
the output membership function and aggregate it with the input membership function, and like
the two previous processes if it’s done flourishingly it comes to the final step in the flowchart
the output which is attending the dynamic threshold reservation, if not it goes back to the
previous step.
36
Figure 17: Flowchart of the proposed solution.
4. Conclusion
In this chapter, we focused on the problem to solve in this thesis: finding a dynamic threshold
for reservation of fog computing resources for connected vehicles. First, we started with the
main tool used which is the probability matrix. Then, we described the problem and the
assumptions considered. Afterwards, we detailed all steps for our approach which is based on
the context of the vehicle in order to determine the dynamic reservation threshold. Finally, this
approach was formulated as an algorithm which will be implemented, simulated, and discussed
in the next chapter.
37
Chapter 4: Performance Evaluation
1. Introduction
During this chapter, we evaluate the performance of our solution through simulation using
Python programming language. We first present the simulation settings followed by the
performance metrics which should be considered while analyzing the performance of our
solution. Then, we detail the simulation scenarios followed by the given results and discus them.
2. Simulation settings
In this part we are going to study the area where our simulation is conducted, the software and
the hardware environment where our programed solution is simulated.
38
SUMO is a purely microscopic traffic simulation where each vehicle is defined at least by an
identifier (name), the departure time, and the vehicle’s route through the network. Also, each
vehicle can be described more detailed by adding the departure and arrival properties, the lane
to use, the velocity, or the position. Furthermore, the definitions of vehicles can be generated
using different sources such as:
- origin/destination matrices: they describe the movement between traffic assignment
zones in vehicle number per time.
- od2trips: an application for converting O/D matrices to single vehicle trips.
- jtrrouter: uses definitions of turn percentages at intersection for computing routes
through the network.
In recent years, some of research work were trying to create an accurate scenario based on real
traffic-data using SUMO. Among these works, InTAS have more advantages than other
scenario such as [30]:
- Modeled and validated with real traffic numbers.
- 24 hours of simulation.
- Actual road network based on the city of Ingolstadt.
- Reallocation of all Traffic Lights in city.
- Simulation of real Traffic Light Systems.
InTAS provides a great variety of roads (inner city, highway and federal roads) with a total
length of 717 km and a total area of about 52 square kilometers. To prepare the evaluation of
our solution, we received the probability matrices of 10 vehicles with their speed. From these
matrices, we deducted the vehicle position and the road type. Table 6 illustrate the whole
information about used vehicles. Obviously, when we decrease the cell size then we increase
the matrix size, consequently, simulation process needs more time computing.
Vehicle Id Road type Number Cell size (meters)
Highway Urban of 20 50 100 150 200
matrices Number of cells per matrix
1292 × 123
1617 × 887
15267 × 571
27245 × 269
41629 × 4382 32400 52560 13140 5810 3285
99851 × 795
101117 × 1053
118316 × 1100
119762 × 780
133499 × 1084
Table 6: Used matrices sizes.
39
3.2 Software programing environment
For the implementation of the dynamic reservation algorithm described in Chapter 3, we use
Python version 3 as a programming language. Beside C++ and Java, Python is one of the most
popular programming languages. Due to lack of skills and knowledge about the programming
language C++, it falls out of the selection of the language to be used. Compared to the compiled
language Java, Python is an interpreted Language, so testing smaller amounts of codes while
coding is faster with Python due to no need for compiling the code first to machine code like in
Java. Writing code in Python is 3-5 times shorter than equivalent Java programs, which makes
it more transparent and better understandable for other programmers to read. Also, for plotting
figures, it is faster to read and write of the files and it makes the evaluation of the data much
easier, Python can be used for all purpose of this thesis.
3. Simulation results
In this section, we are going to present the results of our algorithm on different cell size. The
shown results were conducted on Vehicle 1292 in highway and then Vehicle 27245 in urban
area. It is noteworthy that every cell of the used probability matrix has its own risk.
As we mentioned before in Table 6, Vehicle 1292 is on the highway road with 123 matrices,
and Vehicle 27245 in on urban road with 269 matrices. We tested all of them but we are going
to present 16 of them according to the fuzzy rules that we conducted in our algorithm (Figure
14).
40
- If the “risk” is very low and “speed” is very slow then the “threshold reservation” is
high.
- If the “risk” is very low and “speed” is slow then the “threshold reservation” is high.
- If the “risk” is very low and “speed” is fast then the “threshold reservation” is
middle.
- If the “risk” is very low and “speed” is very fast then the “threshold reservation” is
middle.
- If the “risk” is low and “speed” is very slow then the “threshold reservation” is high.
- If the “risk” is low and “speed” is slow then the “threshold reservation” is high.
- If the “risk” is low and “speed” is fast then the “threshold reservation” is middle.
- If the “risk” is low and “speed” is very fast then the “threshold reservation” is
middle.
- If the “risk” is middle and “speed” is very slow then the “threshold reservation” is
middle.
- If the “risk” is middle and “speed” is slow then the “threshold reservation” is middle.
- If the “risk” is middle and “speed” is fast then the “threshold reservation” is low.
- If the “risk” is middle and “speed” is very fast then the “threshold reservation” is
very low.
- If the “risk” is high and “speed” is very slow then the “threshold reservation” is low.
- If the “risk” is high and “speed” is slow then the “threshold reservation” is low.
- If the “risk” is high and “speed” is fast then the “threshold reservation” is very low.
- If the “risk” is high and “speed” is very fast then the “threshold reservation” is very
low.
After conducting all the rules in our algorithm, we choose to work with four defuzzification
methods (centroid, mean of the maximum, min of the maximum, and max of the maximum),
but the most relay on method in our work is centroid one.
41
Matrix Vehicle Risk Centroid SOM MOM LOM
number speed (%)
(km per
h)
Speed Rule1 1292-1 14,82 12 87,363 86 93 100
very Rule 2 1292-3 4,46 36 83.46 96 98.0 100
low & Rule 3 1292-122 3,69 52 79,7 86 93 100
Risk Rule 4 1292-35 17,16 88 50,06 33,5 18 49
variable
Speed Rule 5 1292-50 48,22 18 71,42 85 92,5 100
low & Rule 6 1292-39 43,44 33 75,21 91 95,5 100
Risk Rule 7 1292-60 49,02 59 51,75 51 66,5 82
variable Rule 8 1292-38 36,65 78 54,14 56 67 78
Speed Rule 9 1292-65 66 8 66,67 59 66,5 74
fast & Rule 10 1292-70 78,40 26 66,66 56 67 78
Risk Rule 11 1292-78 60.89 54 47,8 21 33,5 46
variable Rule 12 1292-64 58,39 100 23,49 0 4 8
Speed Rule 13 1292-100 199 20 66,66 54 67 80
very Rule 14 1292-90 172,28 42 67,27 59 67 75
fast & Rule 15 1292-84 132,38 68 20,86 0 6 12
Risk Rule 16 1292-102 199,86 91 20 0 6 12
variable
Table 7: Results of the threshold reservation on vehicle 1292 on cell size 20.
- Matrix 1292-1 probability map and threshold reservation result using centroid
method on cell size 20
Figure 19 presents the probability map of Matrix 1 of Vehicle 1292 (a vehicle on the highway
after coming from an urban area). The white line in the figure shows the possible path of the
road that Vehicle 1292 with the 1st matrix can go take on the cell size 20. When the cells in the
line get darker that means that the probability matrix is getting lower and vis-versa (when the
cells get brighter the probability matrix is higher).
42
Figure 19: Probability map of matrix 1 of vehicle 1292 on cell size 20.
As we mentioned before, the method that we rely on method is the centroid. Figure 20 illustrates
the result of the threshold reservation with a plot. The yellow zone represents the range of our
result, it can change depending on the inputs and the defuzzification method, which is
represented as a black line in the yellow zone (the other plots of the threshold reservation result
are illustrated in Annex 1), and the result is written on the top left of the figure.
Figure 20: Result of threshold reservation on of matrix 1 of vehicle 1292 on cell size 20 with Centroid method.
The figure 21 represents the probability map of the matrix 84 of the vehicle 1292, it is a vehicle
on the highway after coming from an urban area. The white line in the figure shows the possible
path of the road that the car 1292 with the 84th matrix can go take on the cell size 20.
43
Figure 21: Probability map of matrix 84 of vehicle 1292 on cell size 20.
Figure 22 illustrates the result of the threshold reservation with centroid method, the numerical
result is presented on the top left of the figure and the graphical presentation of the result is
presented as a line the yellow zone.
Figure 22: Result of the threshold reservation of matrix 84 of the vehicle 1292 on cell size 20 with Centroid
method.
The other threshold reservation with the other methods and the other matrixes probability map
and results of the vehicle 1292 on cell size 20 are presented in annex 1.
B. Speed-based threshold reservation with cell size 50
Table 8 represents the results of the simulated matrixes by cell size 50
44
(km per
h)
Speed Rule1 1292-1 14,82 90 43,69 19 33,5 48
very Rule 2 1292-3 4,46 60 33,33 29 33 37
low & Rule 3 1292-122 3,69 24 88,20 91 95,5 100
Risk Rule 4 1292-35 17,16 0 87,12 84 92 100
variable
Speed Rule 5 1292-50 48,22 95 37,42 19 33 48
low & Rule 6 1292-39 43,44 60 56,10 57 66,5 76
Risk Rule 7 1292-60 49,02 37 65,17 85 92,5 100
variable Rule 8 1292-38 36,65 12 87,33 89 94,5 100
Speed Rule 9 1292-65 66 91 19,44 0 4,5 9
fast & Rule 10 1292-70 78,40 55 48,37 22 33,5 45
Risk Rule 11 1292-78 60.89 15 67,24 52 66,5 81
variable Rule 12 1292-64 58,39 3 67,63 59 66,5 74
Speed Rule 13 1292-100 199 100 9,76 0 0 0
very Rule 14 1292-90 172,28 82 20,86 0 6 12
fast & Rule 15 1292-84 132,38 40 58,63 61 67 73
Risk Rule 16 1292-102 199,86 15 66 52 66,5 81
variable
Table 8: Results of the threshold reservation on vehicle 1292 on cell size 50.
The figure 23 represents the probability map of the matrix 38 of the vehicle 1292, it is a vehicle
on the highway after coming from an urban area. The white line in the figure shows the possible
path of the road that the car 1292 with the 38th matrix can go take on the cell size 50.
45
Figure 23: Probability map of matrix 38 of vehicle 1292 on cell size 50.
Figure 24 illustrates the result of the threshold reservation with centroid method of matrix 38
on cell size 50, the numerical result is presented on the top left of the figure and the graphical
presentation of the result is presented as a line the yellow zone.
Figure 24: Result of the threshold reservation of matrix 38 of the vehicle 1292 on cell size 50 with Centroid
method.
The figure 25 represents the probability map of the matrix 70 of the vehicle 1292 on cell size
50.
46
Figure 25: Probability map of matrix 70 of vehicle 1292 on cell size 50.
Figure 26 illustrates the result of the threshold reservation with centroid method of matrix 70
on cell size 50.
Figure 26: Result of the threshold reservation of matrix 70 of the vehicle 1292 on cell size 50 with Centroid
method.
47
Speed Rule 2 1292-3 4,46 29 88,71 96 98 100
very Rule 3 1292-122 3,69 55 83,73 89 94,5 100
low & Rule 4 1292-35 17,16 85 50,51 19 33,5 48
Risk
variable
Speed Rule 5 1292-50 48,22 20 87,61 87 93,5 100
low & Rule 6 1292-39 43,44 38 79,28 89 94,5 100
Risk Rule 7 1292-60 49,02 62 67,76 58 66,5 75
variable Rule 8 1292-38 36,65 79 56,14 52 66,5 81
Speed Rule 9 1292-65 66 6 88,57 95 97,5 100
fast & Rule 10 1292-70 78,40 22 77,96 89 94,5 100
Risk Rule 11 1292-78 60,89 55 68,58 55 66,5 78
variable Rule 12 1292-64 58,39 90 44,83 24 33,5 43
Speed Rule 13 1292-100 199 11 66,66 56 65,5 77
very Rule 14 1292-90 172,28 48 55,17 53 67 81
fast & Rule 15 1292-84 132,38 76 32,83 25 33,5 42
Risk is Rule 16 1292-102 199,86 98 18,86 0 1 2
variable
Table 9: Results of the threshold reservation on vehicle 1292 on cell size 100.
The figure 27 represents the probability map of the matrix 102 of the vehicle 1292 on cell size
100. As we said before the white line in the figure shows the possible path of the road that the
car 1292 with the 102th matrix can go take on the cell size 100. When the cells in the line get
darker that means that the probability matrix is getting lower and when the cells get brighter
the probability matrix is higher.
48
Figure 27: Probability map of matrix 102 of vehicle 1292 on cell size 100.
Figure 28 illustrates the result of the threshold reservation with centroid method of matrix 102
on cell size 100, the numerical result is presented on the top left of the figure and the graphical
presentation of the result is presented as a line the yellow zone.
Figure 28: Result of the threshold reservation of matrix 102 of the vehicle 1292 on cell size 100 with Centroid
method.
The figure 29 represents the probability map of the matrix 50 of the vehicle 1292 on cell size
100.
49
Figure 29: Probability map of matrix 50 of vehicle 1292 on cell size 100.
Figure 30 illustrates the result of the threshold reservation with centroid method of matrix 50
on cell size 100.
Figure 30: Result of the threshold reservation of matrix 102 of the vehicle 1292 on cell size 100 with Centroid
method.
50
(km per
h)
Speed Rule1 27245-1 14,27 20 87,61 87 93,5 100
very Rule 2 27245-90 20,67 33 88,06 90 95 100
low & Rule 3 27245-140 20,65 58 74,68 90 95 100
Risk Rule 4 27245-80 20,43 89 42,52 23 33,5 44
variable
Speed Rule 5 27245-64 38,56 13 87,49 86 93 100
low & Rule 6 27245-4 36,39 46 72,15 85 92,5 100
Risk Rule 7 27245-5 43,47 62 68,56 56 67 78
variable Rule 8 27245-59 40,76 99 35,05 21 33,5 46
Speed Rule 9 27245-20 51,75 22 87,92 89 94,5 100
fast & Rule10 27245-28 51,89 55 68,58 55 66,5 78
Risk Rule11 27245-35 52,05 72 60,65 60 66,5 73
variable Rule12 27245-6 50,69 100 33,33 26 33,5 41
Speed Rule13
very Rule14 The vehicle 27245 is in an urban area it doesn’t reach the “very fast”
fast & Rule15 level of speed.
Risk is Rule16
variable
Table 10: Results of the threshold reservation on vehicle 27245 on cell size 150.
The figure 31 represents the probability map of the matrix 6 of the vehicle 27245, it is a vehicle
in an urban area. The two white lines in the figure shows the possible path of the road that the
vehicle 27245 with the 6th matrix can go take on the cell size 150.
51
Figure 31: Probability map of matrix 6 of the vehicle 27245 on cell size 150.
Figure 32 presents the result of the threshold reservation for the matrix 6 of the vehicle on cell
size 150.
Figure 32: Result of the threshold reservation of matrix 6 of the vehicle 27245 on cell size 150.
The figure 33 represents the probability map of the matrix 90 of the vehicle 27245.
52
Figure 33: Probability map of matrix 90 of the vehicle 27245 on cell size 150.
The following figure represents the threshold reservation result of the matrix 90 of the vehicle
27245 on cell size 150.
Figure 34: Result of the threshold reservation of matrix 90 of the vehicle 27245 on cell size 150.
53
Speed Rule 3 27245-140 20,65 62 74,68 90 95 100
very Rule 4 27245-80 20,43 100 33,33 24 33,5 43
low &
Risk
variable
Speed Rule 5 27245-64 38,56 21 87,49 86 93 100
low & Rule 6 27245-4 36,39 59 69,91 52 66,5 81
Risk Rule 7 27245-5 43,47 73 60,37 56 67 78
variable Rule 8 27245-59 40,76 82 53,61 52 67 82
Speed Rule 9 27245-20 51,75 4 88,42 93 96,5 100
fast & Rule 10 27245-28 51,89 49 71,14 85 92,5 100
Risk Rule 11 27245-35 52,05 68 65,45 60 66,5 73
variable Rule 12 27245-6 50,69 89 46,55 23 33,5 44
Speed Rule13
very Rule14 Because the vehicle 27245 is in an urban area it doesn’t reach the “very
fast & Rule15 fast” level of speed.
Risk is Rule16
variable
Table 11: Results of the threshold reservation on vehicle 27245 on cell size 200.
The figure 35 represents the probability map of the matrix 20 of the vehicle 27245.
Figure 35: Probability map of matrix 20 of vehicle 27245 on cell size 200.
54
Figure 36 illustrates the result of the threshold reservation with centroid method of matrix 20
on cell size 200.
Figure 36: Result of the threshold reservation of matrix 20 of vehicle 27245 on cell size 200 with Centroid
method.
The figure 37 represents the probability map of the matrix 64 of the vehicle 27245.
Figure 37: Probability map of matrix 20 of vehicle 27245 on cell size 200.
Figure 38 shows the result of the threshold reservation with centroid method of matrix 64 on
cell size 200.
55
Figure 38: Result of the threshold reservation of matrix 64 of vehicle 27245 on cell size 200 with Centroid
method.
The probability map of each executed matrix and the defuzzified plotted results for vehicle
27245 on cell size 200 are shown in annex 2.
4. Conclusion
The simulation results shown in this chapter demonstrate how the suggested strategy can
maximize the number of reserved fog nodes in comparison to a static threshold. Additionally,
we tested the efficiency of the suggested algorithm for various cell sizes (20, 50, 100, 150, and
200 meters) and two different types of roadways (urban and highway). The suggested solution
would assist in enhancing both the reservation time and the level of car satisfaction.
56
Conclusion and Perspective
To accomplish compute-intensive and latency-sensitive tasks, emerging vehicular applications
necessitate a large amount of computing capacity. Fog computing, which focuses on relocating
computing resources to the network's edge, complements cloud computing by addressing
latency issues and reducing traffic to the cloud. This spawned a new paradigm known as
Vehicular Fog Computing (VFC).
A significant challenge with this new paradigm arises when a vehicle attempts to reserve
computing fog resources based on its probability matrix at a given time. As a result, we have
concentrated our efforts throughout this thesis on the reservation threshold in order to achieve
a guaranteed reservation and an adequate level of vehicle satisfaction.
To do, at first, we started to study and provide background information about IoT, cloud, edge,
and fog computing. In addition, we also presented detailed overview about vehicular fog
computing. Here, our goal was to get a deeper understanding on this new paradigm, in order to
get position of the thesis in relation to the problem to be solved.
In addition, we discussed task offloading in fog computing, its challenges, and application areas
in VFC. As a matter of fact, we examined various resource reservation techniques for connected
vehicles. Following that, we presented our proposed solution.
We have shown that the proposed solution allows to cope with uncertainties to guarantee
reservation with dynamic threshold. In addition, we validated the effectiveness of the proposed
algorithm by testing it for different cell size (20 – 50 – 100 – 150 – 200 meters) and for two
types of roads (urban and highway).
However, in this thesis some constraints have not been addressed since we made assumptions,
but they represent shortcomings that will be addressed in the future. Thus, future works can be
further extended to the following direction: we have always assumed that the current budget
of the vehicle covers the cost of the fog node reservation and we took for granted the risk that
the vehicle faced.
Nevertheless, in the real world the budget default case can easily be encountered. To get closer
to reality, it is recommended to design an extension based on fuzzy logic which consider the
vehicle budget and infuse machine learning to fuzzy logic which help us detect accident and
uncertainties in both urban and highway roads.
57
References
[1] P. Sethi and S. R. Sarangi, « Internet of things: architectures, protocols, and applications »,
Journal of Electrical and Computer Engineering, vol. 2017, 2017.
[2] M. S. Aslanpour, S. S. Gill and A. N. Toosi, «Performance Evaluation Metrics for Cloud,
Fog and Edge Computing: A Review, Taxonomy, Benchmarks and Standards for Future
Research», Part of the Studies in Computational Intelligence book series (SCI,volume 731),
2017.
[3] M. De Donno, K. Tange, and N. Dragoni, « Foundations and Evolution of Modern
Computing Paradigms: Cloud, IoT, Edge, and Fog », IEEE Access, vol. 7, p. 150936‑150948,
2019, doi: 10.1109/ACCESS.2019.2947652.
[4] K. Cao, Y. Liu, G. Meng, and Q. Sun, « An Overview on Edge Computing Research »,
IEEE Access, vol. 8, p. 85714‑85728, 2020, doi: 10.1109/ACCESS.2020.2991734.
[5] S. H. et N. V., « A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and
Research Challenges », ICT Express, vol. 7, no 2, p. 162‑176, June 2021, doi:
10.1016/j.icte.2021.05.004.
[6] N. Gaouar and M. Lehsaini, « Toward vehicular cloud/fog communication: A survey on
data dissemination in vehicular ad hoc networks using vehicular cloud/fog computing », Int J
Common Syst, vol. 34, no 13, sept. 2021, doi: 10.1002/dac.4906.
[7] C. Huang, R. Lu, and K.-K. R. Choo, « Vehicular Fog Computing: Architecture, Use Case,
and Security and Forensic Challenges », IEEE Common. Mag., vol. 55, no 11, p. 105‑111,
November. 2017, doi: 10.1109/MCOM.2017.1700322.
[8] M. Ashraf, M. Shiraz, A. Abbasi, and S. Albahli, « Distributed application execution in fog
computing: A taxonomy, challenges and future directions », Journal of King 56 Saud University
- Computer and Information Sciences, vol. 34, no 7, p. 3887‑3909, July. 2022, doi:
10.1016/j.jksuci.2022.05.002.
[9] I. B. Lahmar and K. Boukadi, « Resource Allocation in Fog Computing: A Systematic
Mapping Study », in 2020 Fifth International Conference on Fog and Mobile Edge Computing
(FMEC), Paris, France, April. 2020, p. 86‑93. doi: 10.1109/FMEC49853.2020.9144705.
[10] K. Gasmi, S. Dilek, S. Tosun, and S. Ozdemir, « A survey on computation offloading and
service placement in fog computing-based IoT », J Supercomput, vol. 78, no 2, p. 1983‑2014,
February. 2022, doi: 10.1007/s11227-021-03941-y.
58
[11] F. Saeik et al., « Task offloading in Edge and Cloud Computing: A survey on mathematical,
artificial intelligence and control theory solutions », Computer Networks, vol. 195, p. 108177,
August 2021, doi: 10.1016/j.comnet.2021.108177.
[12] A. Waheed et al., « A Comprehensive Review of Computing Paradigms, Enabling
Computation Offloading and Task Execution in Vehicular Networks », IEEE Access, vol. 10,
p. 3580‑3600, 2022, doi: 10.1109/ACCESS.2021.3138219.
[13] N. Aljeri and A. Boukerche, « Movement prediction models for vehicular networks: an
empirical analysis », Wireless Netw, vol. 25, no 4, p. 1505‑1518, May 2019, doi:
10.1007/s11276-017-1607-x.
[14] C. Lum, R. Rysdyk, and A. Pongpunwattana, « Occupancy Based Map Searching Using
Heterogeneous Teams of Autonomous Vehicles », presented in AIAA Guidance, Navigation,
and Control Conference and Exhibit, Keystone, Colorado, August 2006. doi: 10.2514/6.2006-
6196.
[15] U. Kubach and K. Rothermel, « Exploiting location information for infostation-based
hoarding », in Proceedings of the 7th annual international conference on Mobile computing and
networking - MobiCom ’01, Rome, Italy, 2001, p. 15‑27. doi: 10.1145/381677.381680.
[16] G. Premsankar, B. Ghaddar, M. Di Francesco, and R. Verago, « Efficient placement of
edge computing devices for vehicular applications in smart cities », in NOMS 2018 - 2018
IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, April. 2018, p.
1‑9. doi:10.1109/NOMS.2018.8406256.
[17] D. Chen, Y.-C. Liu, B. Kim, J. Xie, C. S. Hong, and Z. Han, « Edge Computing Resources
Reservation in Vehicular Networks: A Meta-Learning Approach », IEEE Trans. Veh.
Technol., vol. 69, no 5, p. 5634‑5646, May 2020, doi: 10.1109/TVT.2020.2983445.
[18] Y. Hui, Z. Su, T. H. Luan, and C. Li, « Reservation Service: Trusted Relay Selection for
Edge Computing Services in Vehicular Networks », IEEE J. Select. Areas Common., vol. 38,
no 12, p. 2734‑2746, December. 2020, doi: 10.1109/JSAC.2020.3005468.
[19] J. Zhang, S. Chen, X. Wang, and Y. Zhu, « DeepReserve: Dynamic Edge Server
Reservation for Connected Vehicles with Deep Reinforcement Learning », in IEEE INFOCOM
2021 - IEEE Conference on Computer Communications, Vancouver, BC, Canada, May 2021,
p. 1‑10. doi: 10.1109/INFOCOM42981.2021.9488888.
[20] N. Naddeh, S. B. Jemaa, S. Eddine ELAYOUBI, and T. Chahed, « Proactive RAN
Resource Reservation for URLLC Vehicular Slice », in 2021 IEEE 93rd Vehicular Technology
Conference (VTC2021-Spring), Helsinki, Finland, April. 2021, p. 1‑5. doi: 10.1109/VTC2021-
Spring51267.2021.9448703.
59
[21] L. A. Zadeh, «Making computers think like people [fuzzy set theory] », in IEEE Spectrum,
Volume: 21, Issue: 8, p.26-32, August 1984, doi: 10.1109/MSPEC.1984.6370431.
[22] I. Tal, and G. B. Muntean, «Towards Reasoning Vehicles: A Survey of Fuzzy Logic-Based
Solutions in Vehicular Networks», ACM Computing Surveys, Volume 50, Issue 6, November
2018, Article No: 80, p.1–37, doi: 10.1145/3125640.
[23] P. Hajek, L. Godo, and F. Esteva,« Fuzzy Logic and Probability», Cornell University, in
Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence, 2013, doi:
/10.48550/arXiv.1302.4953.
[24] M. Kaufmann, S. Tobias, and R. Schulin, «Quality evaluation of restored soils with a fuzzy
logic expert system», Geoderma, Volume 151, Issues 3–4, 15 July 2009, Pages290-302, doi:
10.1016/j.geoderma.2009.04.018.
[25] A. Adeli, and M. Neshat, «A Fuzzy Expert System for Heart Disease Diagnosis»,
Proceedings of the International Multi Conference of Engineers and Computer Scientists 2010,
Hong Kong, Vol I, IMECS 2010, March 17 - 19, 2010, doi: 10.1109/20780966.
[26] S. Thakera, and V. Nagorib, «Analysis of Fuzzification Process in Fuzzy Expert System»,
International Conference on Computational Intelligence and Data Science, Procedia Computer
Science, Volume 132, Pages 1308-1316, 2018, doi: 10.1016/j.procs.2018.05.047.
[27] P. Albertos, A. Sala, M. Olivers, «Fuzzy logic controllers. Advantages and drawbacks», X
Spanish Congress on Fuzzy Technologies and Fuzzy Logic ESTYLF'00, Sevilla, Spain,
September 2000.
[28] M. Mahfouf, M. F. Abbod, and D. A. Linkens, «A survey of fuzzy logic monitoring and
control utilisation in medicine», Artificial Intelligence in Medicine, Volume 21, Issues 1–3,
Pages 27-42, January–March 2001, doi: /10.1016/S0933-3657(00)00072-5.
[29] L. Suganthi, S. Iniyan, and A. A. Samuel, «Applications of fuzzy logic in renewable energy
systems – A review», Renewable and Sustainable Energy Reviews, Volume 48, Pages 585-
607, August 2015, doi: /10.1016/j.rser.2015.04.037.
60
Annexes
Annex 1: Threshold reservation of the vehicle 1292 with cell size 20
- Matrix 1: Threshold reservation results:
Annex 1-fig 1: Result of the threshold reservation of matrix 1 of vehicle 1292 on cell size 20 with MOM method.
Annex 1-fig 2: Result of the threshold reservation of matrix 1 of vehicle 1292 on cell size 20 with SOM method.
Annex 1-fig 3: Result of threshold reservation of matrix 1 of vehicle 1292 on cell size 20 with LOM method.
61
- Matrix 3: Probability map and threshold reservation results:
Annex 1-fig 4: Probability map of matrix 3 of vehicle 1292 on cell size 20.
Annex 1-fig 5 : Result of threshold reservation on of matrix 3 of vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 6: Result of threshold reservation on of matrix 3 of vehicle 1292 on cell size 20 with SOM method.
62
Annex 1-fig 7: Result of threshold reservation on of matrix 3 of vehicle 1292 on cell size 20 with MOM method.
Annex 1-fig 8: Result of threshold reservation on of matrix 3 of vehicle 1292 on cell size 20 with LOM method.
Annex 1-fig 9: Probability map of the matrix 122 of the vehicle 1292 on cell size 20.
63
Annex 1-fig 10: Result of the threshold reservation of matrix 122 of the vehicle 1292 on cell size 20 with
centroid method.
Annex 1-fig 11: Result of the threshold reservation of matrix 122 of the vehicle 1292 on cell size 20 with MOM
method.
Annex 1-fig 12: Result of the threshold reservation of matrix 122 of the vehicle 1292 on cell size 20 with SOM
method.
64
Annex 1-fig 13: Result of the threshold reservation of matrix 122 of the vehicle 1292 on cell size 20 with LOM
method.
Annex 1-fig 14: Probability map of the matrix 35 of the vehicle 1292 on cell size 20.
Annex 1-fig 15: Result of the threshold reservation of matrix 35 of the vehicle 1292 on cell size 20 with centroid
method
65
.
Annex 1-fig 16: Result of the threshold reservation of matrix 35 of the vehicle 1292 on cell size 20 with MOM
method.
Annex 1-fig 17: Result of the threshold reservation of matrix 35 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 18: Result of the threshold reservation of matrix 35 of the vehicle 1292 on cell size 20 with LOM
method.
66
- Matrix 50: Probability map and threshold reservation results
Annex 1-fig 19: Probability map of the matrix 50 of the vehicle 1292 on cell size 20.
Annex 1-fig 20: Result of the threshold reservation of matrix 50 of the vehicle 1292 on cell size 20 with Centroid
method
Annex 1-fig 21: Result of the threshold reservation of matrix 50 of the vehicle 1292 on cell size 20 with MOM
method.
67
Annex 1-fig 22: Result of the threshold reservation of matrix 50 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 23: Result of the threshold reservation of matrix 50 of the vehicle 1292 on cell size 20 with LOM
method.
Annex 1-fig 24: Probability map of the matrix 39 of the vehicle 1292 on cell size 20.
68
Annex 1-fig 25: Result of the threshold reservation of matrix 39 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 26: Result of the threshold reservation of matrix 39 of the vehicle 1292 on cell size 20 with MOM
method.
Annex 1-fig 27: Result of the threshold reservation of matrix 39 of the vehicle 1292 on cell size 20 with SOM
method.
69
Annex 1-fig 28: Result of the threshold reservation of matrix 39 of the vehicle 1292 on cell size 20 with LOM
method.
Annex 1-fig 29: Probability map of the matrix 60 of the vehicle 1292 on cell size 20.
Annex 1-fig 30: Result of the threshold reservation of matrix 60 of the vehicle 1292 on cell size 20 with Centroid
method
70
Annex 1-fig 31: Result of the threshold reservation of matrix 60 of the vehicle 1292 on cell size 20 with MOM
method.
Annex 1-fig 32: Result of the threshold reservation of matrix 60 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 33: Result of the threshold reservation of matrix 60 of the vehicle 1292 on cell size 20 with LOM
method.
71
Annex 1-fig 34: Probability map of the matrix 38 of the vehicle 1292 on cell size 20.
Annex 1-fig 35: Result of the threshold reservation of matrix 38 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 36: Result of the threshold reservation of matrix 38 of the vehicle 1292 on cell size 20 with MOM
method.
72
Annex 1-fig 37: Result of the threshold reservation of matrix 38 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 38: Result of the threshold reservation of matrix 38 of the vehicle 1292 on cell size 20 with LOM
method.
73
Annex 1-fig 39: Probability map of the matrix 65 of the vehicle 1292 on cell size 20
Annex 1-fig 40: Result of the threshold reservation of matrix 65 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 41: Result of the threshold reservation of matrix 65 of the vehicle 1292 on cell size 20 with MOM
method.
74
Annex 1-fig 42: Result of the threshold reservation of matrix 65 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 43: Result of the threshold reservation of matrix 65 of the vehicle 1292 on cell size 20 with LOM
method.
75
Annex 1-fig 44: Probability map of the matrix 70 of the vehicle 1292 on cell size 20.
Annex 1-fig 45: Result of the threshold reservation of matrix 70 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 46: Result of the threshold reservation of matrix 70 of the vehicle 1292 on cell size 20 with MOM
method.
76
Annex 1-fig 47: Result of the threshold reservation of matrix 70 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 48: Result of the threshold reservation of matrix 70 of the vehicle 1292 on cell size 20 with LOM
method.
77
Annex 1-fig 49: Probability map of the matrix 78 of the vehicle 1292 on cell size 20.
Annex 1-fig 50: Result of the threshold reservation of matrix 78 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 51: Result of the threshold reservation of matrix 78 of the vehicle 1292 on cell size 20 with MOM
method.
78
Annex 1-fig 52: Result of the threshold reservation of matrix 78 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 53: Result of the threshold reservation of matrix 78 of the vehicle 1292 on cell size 20 with LOM
method.
79
Annex 1-fig 54: Probability map of the matrix 64 of the vehicle 1292 on cell size 20.
Annex 1-fig 55: Result of the threshold reservation of matrix 64 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 56: Result of the threshold reservation of matrix 64 of the vehicle 1292 on cell size 20 with MOM
method.
80
Annex 1-fig 57: Result of the threshold reservation of matrix 64 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 58: Result of the threshold reservation of matrix 64 of the vehicle 1292 on cell size 20 with LOM
method.
81
Annex 1-fig 59: Probability map of the matrix 100 of the vehicle 1292 on cell size 20.
Annex 1-fig 60: Result of the threshold reservation of matrix 100 of the vehicle 1292 on cell size 20 with
Centroid method.
Annex 1-fig 61: Result of the threshold reservation of matrix 100 of the vehicle 1292 on cell size 20 with MOM
method.
82
Annex 1-fig 62: Result of the threshold reservation of matrix 100 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 63: Result of the threshold reservation of matrix 100 of the vehicle 1292 on cell size 20 with LOM method.
83
Annex 1-fig 64: Probability map of the matrix 90 of the vehicle 1292 on cell size 20.
Annex 1-fig 65: Result of the threshold reservation of matrix 90 of the vehicle 1292 on cell size 20 with Centroid
method.
Annex 1-fig 66: Result of the threshold reservation of matrix 90 of the vehicle 1292 on cell size 20 with MOM
method.
84
Annex 1-fig 67: Result of the threshold reservation of matrix 90 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 68: Result of the threshold reservation of matrix 90 of the vehicle 1292 on cell size 20 with LOM
method.
Annex 1-fig 69: Result of the threshold reservation of matrix 84 of the vehicle 1292 on cell size 20 with MOM
method.
85
Annex 1-fig 70: Result of the threshold reservation of matrix 84 of the vehicle 1292 on cell size 20 with SOM
method.
Annex 1-fig 71: Result of the threshold reservation of matrix 84 of the vehicle 1292 on cell size 20 with LOM
method.
86
Annex 2: Threshold reservation of the vehicle 27245 with cell size 200
- Matrix 1: Probability map and threshold reservation results
Annex 2-fig 1: Probability map of matrix 1 of vehicle 27245 on cell size 200.
Annex 2-fig 2: Results of threshold reservation of matrix 1 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 3: Results of threshold reservation of matrix 1 of vehicle 27245 on cell size 200 with MOM method.
87
Annex 2-fig 4: Results of threshold reservation of matrix 1 of vehicle 27245 on cell size 200 with SOM method.
Annex 2-fig 5: Results of threshold reservation of matrix 1 of vehicle 27245 on cell size 200 with LOM method.
Annex 2-fig 6: Probability map of matrix 90 of vehicle 27245 on cell size 200.
88
Annex 2-fig 7 : Results of threshold reservation of matrix 90 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 8: Results of threshold reservation of matrix 90 of vehicle 27245 on cell size 200 with MOM
method.
Annex 2-fig 9: Results of threshold reservation of matrix 90 of vehicle 27245 on cell size 200 with SOM
method.
89
Annex 2-fig 10: Results of threshold reservation of matrix 90 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 11: Probability map of matrix 140 of vehicle 27245 on cell size 200.
Annex 2-fig 12: Result of the threshold reservation of matrix 140 of vehicle 27245 on cell size 200 with Centroid
method.
90
Annex 2-fig 13: Result of the threshold reservation of matrix 140 of vehicle 27245 on cell size 200 with MOM method.
Annex 2-fig 14: Result of the threshold reservation of matrix 140 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 15: Result of the threshold reservation of matrix 140 of vehicle 27245 on cell size 200 with LOM
method.
91
- Matrix 80: Probability map and threshold reservation results
Annex 2-fig 16: Probability map of matrix 80 of vehicle 27245 on cell size 200.
Annex 2-fig 17: Result of the threshold reservation of matrix 80 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 18: Result of the threshold reservation of matrix 80 of vehicle 27245 on cell size 200 with MOM
method.
92
Annex 2-fig 19: Result of the threshold reservation of matrix 80 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 20: Result of the threshold reservation of matrix 80 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 21: Result of the threshold reservation of matrix 64 of vehicle 27245 on cell size 200 with MOM
method.
93
Annex 2-fig 22: Result of the threshold reservation of matrix 64 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 23: Result of the threshold reservation of matrix 64 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 24: Probability map of matrix 4 of vehicle 27245 on cell size 200.
94
Annex 2-fig 25: Result of the threshold reservation of matrix 4 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 26: Result of the threshold reservation of matrix 4 of vehicle 27245 on cell size 200 with MOM
method.
Annex 2-fig 27: Result of the threshold reservation of matrix 4 of vehicle 27245 on cell size 200 with SOM
method.
95
Annex 2-fig 28: Result of the threshold reservation of matrix 4 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 29: Probability map of matrix 5 of vehicle 27245 on cell size 200.
Annex 2-fig 30: Result of the threshold reservation of matrix 5 of vehicle 27245 on cell size 200 with Centroid
method.
96
Annex 2-fig 31: Result of the threshold reservation of matrix 5 of vehicle 27245 on cell size 200 with MOM
method.
Annex 2-fig 32: Result of the threshold reservation of matrix 5 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 33: Result of the threshold reservation of matrix 5 of vehicle 27245 on cell size 200 with LOM
method.
97
- Matrix 59: Probability map and threshold reservation results
Annex 2-fig 34: Probability map of matrix 59 of vehicle 27245 on cell size 200.
Annex 2-fig 35: Result of the threshold reservation of matrix 59 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 36: Result of the threshold reservation of matrix 59 of vehicle 27245 on cell size 200 with MOM
method.
98
Annex 2-fig 37: Result of the threshold reservation of matrix 59 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 38: Result of the threshold reservation of matrix 59 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 39: Result of the threshold reservation of matrix 20 of vehicle 27245 on cell size 200 with MOM
method.
99
Annex 2-fig 40: Result of the threshold reservation of matrix 20 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 41: Result of the threshold reservation of matrix 20 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 42: Probability map of matrix 28 of vehicle 27245 on cell size 200.
100
Annex 2-fig 43: Result of the threshold reservation of matrix 28 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 44: Result of the threshold reservation of matrix 28 of vehicle 27245 on cell size 200 with MOM
method.
Annex 2-fig 45: Result of the threshold reservation of matrix 28 of vehicle 27245 on cell size 200 with SOM
method.
101
Annex 2-fig 46: Result of the threshold reservation of matrix 28 of vehicle 27245 on cell size 200 with LOM
method.
Annex 2-fig 47: Probability map of matrix 35 of vehicle 27245 on cell size 200.
Annex 2-fig 48: Result of the threshold reservation of matrix 35 of vehicle 27245 on cell size 200 with Centroid
method.
102
Annex 2-fig 49: Result of the threshold reservation of matrix 35 of vehicle 27245 on cell size 200 with MOM
method.
Annex 2-fig 50: Result of the threshold reservation of matrix 35 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 51: Result of the threshold reservation of matrix 35 of vehicle 27245 on cell size 200 with LOM
method.
103
- Matrix 6: Probability map and threshold reservation results
Annex 2-fig 52: Probability map of matrix 6 of vehicle 27245 on cell size 20.
Annex 2-fig 53: Result of the threshold reservation of matrix 6 of vehicle 27245 on cell size 200 with Centroid
method.
Annex 2-fig 54: Result of the threshold reservation of matrix 6 of vehicle 27245 on cell size 200 with MOM
method.
104
Annex 2-fig 55: Result of the threshold reservation of matrix 6 of vehicle 27245 on cell size 200 with SOM
method.
Annex 2-fig 56: Result of the threshold reservation of matrix 6 of vehicle 27245 on cell size 200 with LOM
method.
105