English Polish
Akademia Morska w Szczecinie

DSpace Home

DSpace/Manakin Repository

Show simple item record

Author Vaňek, Ondřej
Affiliation Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
E-mail vanek@agents.fel.cvut.cz
Author Hrstka, Ondřej
Affiliation Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
E-mail hrstka@agents.fel.cvut.cz
Author Kopřiva, Štěpán
Affiliation Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
E-mail kopriva@agents.fel.cvut.cz
Author Faigl, Jan
Affiliation Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
E-mail faigl@blindspot-solutions.com
Author Pěchouček, Michal
Affiliation Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
E-mail pechoucek@blindspot-solutions.com
ISSN printed 1733-8670
URI https://repository.am.szczecin.pl/handle/123456789/770
Abstract Contemporary maritime shipping is subject to a large number of constraints given by tight shipping schedules and very low margins. Additionally, problematic areas with increased security needs dynamically changing in time, combined with seasonal oceanographic and meteorological conditions pose a challenging voyage planning problem. In this work we present a risk-aware voyage planner taking into account spatio-temporal environmental conditions. The planner is based on a graph-based search algorithm A*. We discretize the required area into a graph, we store various layers of information into the edges of the graph (such as risk and weather conditions) in a form of numeric weights and we define a bi-objective planning problem with a tradeoff between security and duration of the voyage. The nature of the algorithm guarantees a complete and optimal solution in a form of an optimized voyage with respect to the criterion function composed of the two weighted components, i.e, duration and security of the voyage. We demonstrate the approach on our area of interest: Indian Ocean. We use NATO piracy activity risk surface as the risk layer and we compute all transit voyages between relevant routing points in the area. Finally, thanks to the discretization of the problem, we are able to integrate corridors imposed by the shipping authorities and evaluate additional what-if scenarios with extended corridor systems. The resulting planner is exposed to the public using a web service with an easy interface requiring start time of the voyage and the origin and the destination point of voyage. Combined with an expressive visualization, this tool demonstrates the capabilities of the proposed solution.
Pages 115-124
Publisher Scientific Journals Maritime University of Szczecin, Zeszyty Naukowe Akademia Morska w Szczecinie
Keywords modeling
Keywords optimization
Keywords risk analysis
Keywords maritime piracy
Keywords risk-aware planning
Keywords FTA
Title Bi-objective maritime route planning in pirate-infested waters
Type Original scientific article
References
  1. BARTON, D.C. & STAMBER, K.L. (2000) An agent-based microsimulation of critical infrastructure systems. Technical report. Sandia National Labs., Albuquerque, NM (US); Sandia National Labs., Livermore, CA (US)
  2. BOURDON, S., GAUTHIER, Y. & GREISS, J. (2007) MATRICS: A maritime traffic simulation. Technical report. Defence R&D Canada.
  3. BRUZZONE, A.G., MASSEI, M., MADEO, F., TARONE, F. & GUNAL M.M. (2011) Simulating marine asymmetric scenarios for testing different C2 maturity levels. In: Proceedings of the 16th International Command and Control Researh and Technology Symposium. pp. 12–23.
  4. CHAWDHRY, P.K. (2009) Risk modeling and simulation of airport passenger departures process. In: Proceedings of the 2009 Winter Simulation Conference. Austin, TX, 13–16 Dec. 2009. IEEE. pp. 2820–2831.
  5. DECRAENE, J., ANDERSON, M. & LOW, M.Y.H. (2010) Maritime counter-piracy study using agent-based simulations. In: Proceedings of the 2010 Spring Simulation Multiconference. New York: ACM. pp. 82–89.
  6. HANSEN, J., JACOBS, G., HSU, L., DYKES, J., DASTUGUE, J., ALLARD, R., BARRON, C., LALEJINI, D., ABRAMSON, M., RUSSELL, S. & MITTU, R. (2011) Information domination: Dynamically coupling METOC and INTEL for improved guidance for piracy interdiction. NRL Review. pp. 110–115.
  7. HASEGAWA, K., HATA, K., SHIOJI, M., NIWA, K., MORI, S. & FUKUDA, H. (2004) Maritime traffic simulation in congested waterways and its applications. In: 4th Conference for New Ship and Marine Technology. Chine, pp. 195–199.
  8. HWANG, CH.-L. & MASUD, A.S. (1979) Multiple objective decision making: methods and applications. Berlin: Springer-Verlag.
  9. KOCH, D.B. (2007) PortSim – a port security simulation and visualization tool. In: Proceedings of 41st Annual IEEE International Carnahan Conference on Security Technology. IEEE. pp. 109–116.
  10. LAUREN, M. & STEPHEN, R. (2002) Map-aware nonuniform automata (MANA)-a New Zealand approach to scenario modelling. Journal of Battlefield Technology. 5. pp. 27–31.
  11. MCGUIRE. G. (2009) Combined Maritime Forces (CMF) – who we are and wider military counter piracy update. Brief presented at the MARLO Maritime Conference, Dubai, UAE. December 2009. Availabe from: http://www.cusnc.navy.mil/marlo/Events/DEC09- MARLO-DubaiConference.htm
  12. ONUOHA, F.C. (2010) Piracy and maritime security off the Horn of Africa: Connections, causes, and concerns. African Security. 3(4). pp. 191–215.
  13. RUSSELL, S.J., NORVIG, P., DAVIS, E., RUSSELL, S.J. & RUSSELL, S.J. (2010) Artificial intelligence: a modern approach. New Jork: Prentice Hall.
  14. SEBBAH, S., GHANMI, A. & BOUKHTOUTA, A. (2011) Modeling and simulation of military tactical logistics distribution. In: Proceedings of the 2011 Winter Simulation Conference. Phoenix, AZ, 11–14 Dec. 2011. IEEE. pp. 2507–2518.
  15. SLOOTMAKER, L.A. (2011) Countering piracy with the nextgeneration piracy performance surface model (master thesis). Technical report, Naval Postgraduate School. Monterey California.
  16. TSILIS, T. (2011) Counter-piracy escort operations in the Gulf of Aden (master thesis). Technical report, Naval Postgraduate School, Monterey California.
  17. United Kingdom. ICC International Maritime Bureau (2000) Piracy and armed robbery against ships. Technical report. London: Cinnabar Wharf, 24 Wapping High Street.
  18. VANĚK, O., JAKOB, M., HRSTKA, O. & PĚCHOUČEK, M. (2013) Agent-based model of maritime traffic in piracyaffected waters. Transportation research part C: emerging technologies. 36. pp. 157–176.
  19. WONG, M.CH. & YIP, T.L. (2012) Maritime piracy: an analysis of attacks and violence. International Journal of Shipping and Transport Logistics. 4(4). pp. 306–322.
ISSN on-line 2392-0378
Language English
Funding The research presented in this paper was supported by the Office of Naval Research grant No. N000140910537, by the Office of Naval Research grant No. N62909-14-1-N231 and by the Czech Science Foundation (GAČR) under research project No. 13-18316P.
Figures 10
Tables 0
DOI 10.17402/046
Published 2015-09-10
Accepted 2015-08-09
Recieved 2015-07-15


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search repository

Advanced Search

Browse

My Account

RSS Feeds