Research Article  Open Access
Selçuk K. İşleyen, Ukbe Uçar, Figen Balo, "A New Solution Approach for Maritime Surveillance Operation: The Case of Aegean Sea", Mathematical Problems in Engineering, vol. 2019, Article ID 8575219, 16 pages, 2019. https://doi.org/10.1155/2019/8575219
A New Solution Approach for Maritime Surveillance Operation: The Case of Aegean Sea
Abstract
Nowadays, many people illegally migrate to other countries by sea because of warfare or internal conflict in their countries, and thousands of people lose their lives for this reason. Besides, illegal trafficking of drugs or historical artifacts, illegal fishing, and various terrorist activities are conducted through the seas. Maritime surveillance operations are of great importance to prevent all these threats and maintain national security. In this study, the problem of surveillance and exploration which is performed by helicopters on the seas is discussed. A solution approach based on simulated annealing is proposed for the solution of the problem and the proposed algorithm has been tested on various scenarios. This methodology, at least to our knowledge, is used for the first time in the Moving Target Traveling Salesman ProblemTime Window. The proposed solution approach was tested on 50 different scenarios where the target number ranged from 20 to 100. As a result, in all of these scenarios, it has been determined that all of the targets have been destroyed with minimum operation time within the acceptable solution period. Thanks to this method, it is aimed at intervening quickly to illegal activities on the seas and contributing to the prevention of deaths due to refugee boats.
1. Introduction
Seas and oceans are home to many important activities, mainly trade and tourism. International passenger and freight transport, fishing, and various military shipments are carried out through these waters. Maritime surveillance operations are of great importance to ensure that all activities on the seas or oceans are carried out safely and that national and international security is maintained without any problems.
Today, one of the most important problems in the seas is undoubtedly the refugee ships. People are forced to leave their countries for a variety of reasons and migrate illegally to other countries to establish new lives. The seaway is one of the main ways used for this purpose and thousands of people die by drowning in the seas every year.
In Figure 1, the news about the illegal migrant ship trying to reach Italy from Libya in 2015 is shown. According to this news, the ship sank off the coast of Mediterranean and 400 of the 550 passengers lost their lives. Another sad part of this news is that the majority of people who died were children [1]. Besides, the seas are one of the ways that people who are sought for various crimes often use illegally to escape to other countries. Another important problem in the seas or oceans is the sea pirates. Every year hundreds of ships are looted by sea pirates; loss of lives may occur at times. In Figure 2, the news about the attacks and the robbery of refugees who cross from Turkey to Greece by the armed pirates is shown [2]. In addition, illegal fishing and infiltration into a country through the seas are two of the main problems encountered in the seas. Elimination of stated problems and fast intervention in enemies or threats is only possible with the right operation and surveillance strategy. This study discusses the problem of fast surveillance or neutralization of moving elements in the seas. The problem is addressed in the literature under the heading of maritime surveillance problem, which is investigated in relation to the MTTSPTW (Moving Target Traveling Salesman Problem with Time Window) due to the movement of threat elements and the remainder of the targets in the system over a certain period of time.
The MTTSP problem was first described by Helvig et al., and the problem has many fields of application, including military operations and maritime activities [34]. In the problem, constitutes the set of targets, each target having a constant velocity and initial position. In the system, there is a pursuer starting from the initial point and the pursuer (), a higher velocity than all targets. In the problem, the main purpose is to define a minimum tour route in which the pursuer will start from the original point, destroy all targets, and then return to the original point. The second largest application area under MTTSP is maritime surveillance and exploration activities. Scanning and tracking of ships in the seas and oceans routing security ships or aircrafts and routing of fishing vessels depending on fish density are some of the fields of application of this problem. There are many studies in the literature for MTTSP and Maritime Surveillance Problems. Groba et al. studied the fishing activity on the river Danube in their work and tried to determine how the fish harvesters on the river will be directed and when fishing nets will be collected. They proposed a solution approach based on estimation techniques (GATP) for the solution of problem and tested the efficiency of algorithm by comparing it with two different solution approaches (GAGSP; NN). As a result, they suggested that the proposed algorithm produces better results than the other two algorithms [35]. Mercer et al. discussed the problem of maritime surveillance operations as part of Australian national security and tried to determine the scan route by Genetic Algorithm that will minimize the total lane length with a marine surveillance aircraft having a constant v velocity, initial position, turn radius, and scan radius [36]. Killby et al. examined the maritime surveillance problem of an aircraft and a number of ships where velocitydirectioninitial position information of ships and aircraft is known and tried to determine by Generic Algorithm by the tour route that will minimize the number of unscanned ships and total flight time within a mission field related to the solution of problem. The study is different from others in the literature as moving and fixed targets were used, the data changed dynamically, and features such as time window, priority constraints, intervention point, and demand estimation were taken into consideration [37]. Marlov et al. discussed the maritime surveillance operation that is performed by an aircraft moving with a constant speed within a limited area of mission, and developed NN technique, “2opt”, “2opt stationary ships”, and “2opt jumping ships” strategies for the solution of problem. As a result of experimental trials, they found that the heuristics “2opt” and “2opt stationary” produce better results than other two heuristics [38]. Fang et al. discussed the problem of protection of moving marine targets by mobile security forces with an optimal strategy. They analyzed the problem for cases with single or multiple number of targets on onedimensional and twodimensional planes. They developed the CASS algorithm for the solution of problem and tried to determine the appropriate protection strategy where the least number of targets will be damaged [39]. Cross et al. discussed the maritime surveillance problem in Australia's territorial waters and tried to scan and classify the vessels in relevant field of mission. In the problem, they assumed that the field of mission is limited and there are ships moving at random speeds and directions and tried to determine a flight route where all ships are scanned and classified by a constant speed maritime surveillance aircraft within a minimum travel time [40]. Ucar and Isleyen discussed the MTTSPTW under the destruction of moving targets by an air vehicle within minimum times and tried to solve the problem with simulated annealing algorithm and tested the proposed solution approach on theoretical data and 12 scenarios with number of targets varying between 5 and 15. As a result, they suggested that all targets were destroyed in reasonable times within specified time window [41]. In addition, some of the studies in the literature related to the subject are shown in Table 1.

In this study, Maritime Surveillance Problem which is one of the application areas of the MTTSP is discussed and the problem has been tried to be solved under the time window constraints. In this problem, the number of targets and the positions of the targets change continuously over time, and the coordinates for the purser and targets in each unit time need to be redefined. Under this dynamic information and without exceeding the time window constraint, it is necessary to recalculate the targets, at what time, on which coordinate axis, in which order it will be destroyed. Under these requirements, the problem is very difficult to solve and the problem has a dynamic structure because the determination of the best solution from a large number of possible solutions related to order of destruction of targets. For the solution of problem, a solution approach based on simulated annealing was developed and it has been tried to determine the tour route with minimum mission time that all threat elements are destroyed within short solution times. This solution approach, at least to our knowledge, is used for the first time in the Moving Target Traveling Salesman ProblemTime Window. In addition, this study is different from other studies in the literature due to the first implementation of metaheuristic techniques for the refugee problem in the sea. Second section of the study defines the problem and the third section describes the proposed solution method. In the fourth section, the proposed approach is tested on various scenarios by considering refugee activities in the Aegean Sea. The fifth and final sections cover recommendations and evaluations regarding the future studies.
2. Definition of Problem
The Aegean Sea is a sea that connects the Mediterranean Sea, with coasts surrounded by Turkey and Greece. The two counties have shares on the sea as defined in international conventions and each country performs security operations in its territorial waters. Figure 3 shows territorial water borders of the countries in the Aegean Sea. In the figure, the area marked with yellow shows the Turkish territorial waters. Since Greece is a door to Europe and the maritime control operations are harder than the land controls, thousands of people every year want to cross the Aegean Sea to the Greek islands by boats or ships, then to Europe. These transits are illegal and very risky, often resulting in drowning and death. Figures 4 and 5 show illegal migration routes related to migrations from Turkey to Greece through the Aegean Sea.
Figure 4 shows general pattern of migration from Turkey to Greece, while Figure 5 shows detailed analysis of migration from Turkish coasts to Greece. According to Figure 4, the refugee boats first leave the İzmir coasts and then sail to the nearby Greek islands such as Lisbon, Chios, or Samos. If such transit becomes successful, they introduce themselves as refugees to the Greek authorities and are transferred to Athens after staying in these islands for about one week. These transits are not always successful and they are mostly caught by the Turkish coast guard or people get drowned due to sinking of refugee boats. Figure 5 shows a detailed analysis of migration from the Aegean coasts to Greek islands, and Figure 6 shows the number of illegal immigrants caught in these regions in 2013.
According to Figure 6, most of illegal immigrants are in ÇeşmeAlaçatı, Seferihisar, and Kuşadası. Therefore, the problem of intervention in migrations from these coasts is examined in the application process.
Figure 7 shows some routes used for migrations to the Greek islands from relevant coasts. The problem of surveillance, exploration, and intervene in the refugee and trafficking boats in the seas is a type of problem that intersects with MTTSP in the literature. The MTTSP has moving targets in n number, with certain angles and speeds, these targets are destroyed by a constant velocity pursuer that starts from the original point, and as a result a tour route is attempted to be defined with a minimum time when all targets are destroyed and the pursuer returns the original point. Since the territorial waters have a certain boundary, the refugee boats must be intervened within the relevant boundaries, and thus the relevant problem is examined within the framework of MTTSPTW. It is assumed that TW (Time Window) related targets will exist in the system within a certain period of time, and if they are not destroyed within such time, then the mission will fail.
Figure 8 shows a tour route related to the targets that are observed and destroyed or intervened by a maritime surveillance helicopter or unmanned air vehicle. In the route, the targets that are identified based on information obtained are neutralized by a pursuer that starts from the original point. The representations of the problem on the coordinate axis and the state of the targets in the system at any time are shown in “Figure 9”. In the figures, the red line indicates the points at which the targets can be reached, and the task is considered to fail when the targets reach the red line.
(a) Targets in the system at time t = 0
(b) Targets in the system at time t = 3
(c) Targets in the system at time t = 5
(d) Targets in the system at time t = 7
(e) Targets in the system at time t = 9
(f) An example tour route = 0314256780
When the results in “Figure 9(a)” are examined, it is understood that there are four targets in the system at t = 0, when t = 3, a target is separated from the system, two targets are included, and the total number of targets is reached to 5. Referring to “Figures 9(c), 9(d), and 9(e)”, it is shown that new target inputs and existing targets are out of the system. In addition, an exemplary tour route for solving the problem is described on “Figure 9(f)”. When the shapes are examined, the targets change continuously and there are “n!” possible solutions. When the complex dynamic structure and time window constraints of the problem are taken into account, it is difficult and takes a lot of time to find the solution with minimum tour route with the approaches such as mathematical modelling among the large amount of possible solutions. For these reasons, intelligent solution strategies such as metaheuristic methods are needed to solve the problem. In this paper, problem is solved with the solution approach based on annealing simulation.
In this study, S70B2 Seahawk helicopters were selected as pursuer and shown in Figure 10. This helicopter is a Sikorsky type helicopter that has the capacity to carry out exploration and surveillance, search and rescue, vertical resupply, underwater and surface attack, and transport. The maximum speed of the helicopter is 270 km/h and the helicopter is equipped with torpedo, missile, and radar systems [42].
The problem has a large application area and can be addressed in a variety of ways. In this study, the following assumptions are made for the problem: The pursuer (helicopter) must have more speed than all targets. The pursuer (helicopter) must return to the starting point after destroying all targets. The pursuer and targets (x, y) move in the coordinate plane. Velocity and angles of the targets are constant. These speeds and angles do not change over time. The pursuer velocity is fixed and does not change over time. The targets exist in the system within specified time window and the time for each target to exit the system (time to arrive in the relevant Greek island) is different. If this target is not destroyed within the relevant time interval, then the mission is considered unsuccessful.
3. Methodology
The simulated annealing algorithm is a metaheuristic method developed by Kirckpatrik et al. in 1983. The method is a stochastic search method based on the physical annealing process of solids and iteratively proceeds through a single solution. In the algorithm, various motion mechanisms are used to improve solution quality, and the movements that cause improvement in the solution are accepted as initial solution, while the movements that do not affect solution quality are accepted with a certain probability. The Boltzmann probability () is used in acceptance of bad solutions [45]. It is a frequently used method as it makes good search and uses knowledge in solution of largescale problems. In this study, the simulated annealing algorithm was used as it guarantees to find the optimum statistically, is used in continuous optimization problems and can be applied easily to different cost functions and constraints [46, 47].
There are a number of decisions that need to be made when solving problems with the simulated annealing algorithm. These decisions have a significant impact on the quality and speed of the solution. In this context, one of the first decisions to be made is about the initial temperature. The cooling schedule is another factor that affects the success of optimization algorithm. This rate is an important parameter that affects the probability of acceptance and defines temperature value in each iteration and the cooling rate can range from 0,5 to 0,99 in the studies[47]. Also, geometric cooling schedule is used to update temperature values in the proposed algorithm. In this study, suitable values for the parameters in the algorithm were determined as a result of experimental studies and these values are shown in Section 4.1.
In the algorithm, the minimum time strategy is used in determining the initial solution. In this strategy, the target that the pursuer will destroy/detect within the shortest time is selected among the targets in the system for pursuer considering relevant time window constraint and the algorithm ends when all targets are destroyed/detected. The swap method is used as neighbourhood change mechanism, and it is aimed to obtain different solutions with a solution perturbation strategy in order to prevent the solution from getting stuck in local optimal after certain iteration. The solution perturbation strategy used is shown in Figure 11.
In Figure 11, any two random points are selected in relevant solution and a new solution is created by reverse ordering of solutions remaining between these two points. In some cases, the random numbers generated (such as the cases when random numbers are the first target and the last target) cause a major change in the current solution. As a result, an efficient algorithm cannot be produced and the algorithm can shift to random search. In order to prevent the specified problem, the strategy shown in Figure 12 is used. In this study, the difference between two points is defined as 3 and the effectiveness is provided by replacing the targets between the two points.
The solution algorithm developed for solving the related problem according to specified properties is shown in Table 2.
The developed algorithm was tested on real life application and random scenarios mentioned in Section 4; a general evaluation about the study is provided in Section 5.
4. Application
4.1. Problem Design
A sample display of the problem sets which are developed to test the algorithm’s efficiency is shown in Figure 13 and Table 3 of this article. The information given in Figure 13 and Table 3 is based on real data. In the Figure 13, the mission area is about 9955,58 km2 and has a horizontal distance of 131 km and vertical distance of 76 km. The red lines in the figure represent the TurkishGreek borders, which may be different in official sources. The main purpose is to define the route that will allow the S70B Seahawk helicopter, which starts from the original point as shown in red circle, to destroy/rescue/detect the refugee boats and drug and treasury trafficking ships embarking from specified positions at various times under the assumptions given in section two within a minimum time before they reach relevant destinations, and to return to its original point.

Table 3 shows information on pursuer and targets as well as destruction times related to the result of solution.
The solution of algorithm was made by using C# on a computer with 4GB Ram and 2.5 GHz processor, the algorithm was run for 10 times based on the specified data, and the tour 06127181110259340 with the objective of 1.99 hours was obtained in all runs. The average run time for relevant analysis is 2 minutes. Also, the results in the table show that all targets were destroyed/detected within relevant time window. There are more targets in the field of operation in real life problems and efficiency of the algorithm should be determined by considering this situation. In the article, the number of targets taken into consideration in determining the algorithm efficiency is stated below.
The Aegean Sea is an international seaway where many types of ships like passenger ships, cargo vessels, tankers, and fishing boats, travel on densely. In order to determine the number of targets in the problem sets, the average daily traffic density on the Aegean Sea has to be determined first and the congestion analysis has to be made. Congestion analysis is a method that is used in real life situations for identifying the density of the system and finding out its performance. One of the main application fields of this method is the vehicle traffic in motorways. Numerous works on this topic are already present in the literature [48–52]. With this method it is aimed at controlling the traffic, correctly identifying congestions in the traffic webs, and taking precautions to relieve the traffic accordingly [53]. In calculating the level of congestion, realtime data is used and different methods can be employed [54].
The aforementioned data is also used while controlling and directing seaway traffic and the seaway density map aims to prevent accidents on the sea. In this work, the average daily number of ships in the Aegean is determined with density mapping and the problem sets which are to be used in testing the algorithm efficiency are formed. The data as taken from Marinetraffic for the traffic density in the Aegean Sea and of some of the ports on this sea is shown in Figure 14 [44].
(a) Aegean sea general density map
(b) Density map for Dikili Port and its surroundings
(c) Density map for Aliağa Port and its surroundings
(d) Density map for Foça Port and its surroundings
(e) Density map for Çeşme Port and its surroundings
(f) Density map for Kuşadası Port and its surroundings
Utilizing the density map in Figure 14, the efficiency of the algorithm is tested in 50 different scenarios where the number of targets ranges from 20 to 100. These scenarios are classified under 3 groups as small (20 and 40 targets), medium (60 targets), and large (80 and 100 targets). In the problem sets, the number of targets that enter the system in a certain amount of time is randomly generated according to the Poisson distribution and the time lapse between the targets’ arrival to the system is randomly generated according to exponential distribution. Knuth’s Algorithm and Inverse Transformation Function are employed for randomly generating numbers for Poisson distribution and for exponential distribution respectively [55, 56]. In the experiments, parameter for Poisson distribution is taken as 5 and 10. The exponential distribution parameter β is determined according to parameter . In the problem sets; pursuer’s speed value is randomly generated ranging from 200 km/h to 270 km/h and the target speeds are randomly generated between 20 km/h and 60 km/h. The main purpose of the algorithm is to determine the shortest time tour route in which the pursuer visits all the targets in the given time window and returns back to the starting point.
In addition to these data, experimental analysis studies were performed for determining the parameters of the algorithm. There are 5 parameters to the proposed simulated annealing: number of breaking solution (NBS), cooling rate (α), number of iterations at each temperature (N), initial (T0), and final (Tf) temperature. The NBS parameter states in how many iterations the solution would break down in the perturbation mechanism. Among the aforementioned parameters the “N” parameter is decided deterministically (number of neighbour produced by swap mechanism + number of neighbour produced by insert mechanism). The 4 remaining parameters require a parameter tuning. The parameters used in the tuning and their levels are stated in Table 4.

In this study, parameter tuning was determined by experimental tests. The tests revealed that the ideal values are 150 for T0, 1 for Tf, 5 for NBS, and 0,90 for α.
4.2. Experimental Results
The analysis study for this article was executed on a personal computer with 4 GB Ram and 2.5 Ghz processor using C# software. The algorithm was run 10 times for each scenario and the obtained results are shown in Appendix (Tables 5 and 6). These tables include information about the mean, the best, the standard deviation, and the deviation of the mean from the best solution value. The results in the tables are examined in detail in the graphs below (Figures 15, 16, 17, and 18).


The analysis results in terms of objective values for =5 are shown in Figure 15. According to these results, it was determined that the algorithm successfully destroyed/detected/rescue all targets for each scenario within minimum mission times. In addition, there was no difference between the best known values and average results in the 14 scenarios, and the difference in other scenarios was found to be quite low. When the results in Table 5 are examined, it is understood that the standard deviation values are low. In this case, it shows that the algorithm is effective for =5 and can be applied on different types of problems.
The response of the algorithm in terms of the size of the problem and the solution time is shown in Figure 16.
When Figure 16 is examined, it was determined that the best known solution values for small and medium size problems were reached in a very short time and that the solution time is more in largescale problems.
The results of the analysis in terms of objective values for = 10 are shown in Figure 17. It is understood that the algorithm produces effective results for = 10 according to this figure and Table 6. When the difference between the best value and the average value was examined, it was observed that the difference in all scenarios was less than 10%. In addition, when looking at the standard deviation values in Table 6, it is determined that the algorithm produces nearaverage results.
Figure 18 indicates the performance of the algorithm in terms of the times of solution on the developed scenarios for = 10. It is understood from the results in this figure that all problems are solved within acceptable solution times. In addition, as the number of targets increases, the increase in the solution time is another result extracted from Figure 18.
In all experiments, it was observed that the solution time increased when the number of targets increased. The main reasons for this situation are that the problem has a very complex and dynamic structure and the parameters in the problem (the position of the pursuer and targets, time of entry and exit of targets, and instantaneous change of the number of targets in the system) change momentarily. In addition, it has been determined that the algorithm responds rapidly and effectively to the changes in the number and characteristics of the targets. In particular, the algorithm produced effective solutions in cases where the number of targets coming into the system at the unit time increases and the arrival times of the targets become frequent. Due to these reasons, it can be said that the proposed algorithm is robust and effective.
5. Conclusion
Many countries in the world have borders with seas or oceans, and these waters are home to many activities such as transportation and fishing, especially tourism. These territorial waters are also a major threat to many countries, and countries make great efforts to ensure national and international security. In today's world, many countries have internal conflict or war, and therefore many people have to migrate from their countries to others. This migration process is often prevented by coast guard forces, but sometimes it results in deaths as a result of sinking of refugee ships. Besides, trafficking and illegal fishing are carried out on the seas, and pirate activities are committed in larger water areas such as oceans. The common purpose of all these problems is that all targets are scanned, monitored, and destroyed/detected within minimum periods of time.
A solution approach based on the simulated annealing algorithm was developed to prevent the problems mentioned in this study, to assist national security forces and intervene in targets in a short time with S70B Seahawk helicopter. The problem was associated with the MTTSPTW problem, and the effectiveness of proposed algorithm was analyzed on various scenarios based on actual data. As a result, it was found that all targets were destroyed/detected in short times within specified time window in all scenarios and the proposed solution approach is an effective algorithm based on the analysis results.
It is thought that the proposed solution methodology can be used to routing and control maritime traffic. In this way, it is predicted that sea traffic accidents will be prevented and accident risks will decrease. It is also expected that the proposed method will be used to solve the routing problem for fish picking devices.
The problem discussed in this study is similar to many problems besides maritime surveillance operations, especially military operations, routing of unmanned air vehicles, guiding of surveillance cameras, positioning of satellites around the world, scheduling of robotic systems, and search and rescue activities. It is believed that the proposed solution approach can be easily applied for the specified problems as it has a generic structure.
It is estimated that better results can be obtained in future studies by defining different parameters and decision mechanisms for the proposed solution approach or by hybridization of the method with other algorithms. Also, it is anticipated that new areas of application may emerge with the addition of different features to given problem or discussing the problem from different perspectives.
Appendix
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work is supported by the TubitakBIDEB 2211 PhD Scholarship Program.
References
 https://www.google.com.tr/search?rlz=1C1NDCM_trTR717TR717&biw=1366&bih=613&tbm=isch&sa=1&q=m%C3%BClteci+gemisi&oq=m%C3%BClteci+ge&gs_l=psyab.3.0.0l2j0i24k1.7690.11404.0.11985.9.9.0.0.0.0.154.1296.0j9.9.0....0...1.1.64.psyab..0.9.1293...0i67k1j0i13k1j0i13i30k1j0i8i30k1.0.hkswIdtEhsU#imgrc=JXUK_BMmHYogJM.
 https://sputniknews.com/europe/201508141025748642/, 2015.
 https://www.google.com.tr/search?rlz=1C1NDCM_trTR717TR717&biw=1366&bih=613&tbm=isch&sa=1&q=ege+denizi+t%C3%BCkr+karasular%C4%B1&oq=ege+denizi+t%C3%BCkr+karasular%C4%B1&gs_l=psyab.3...2632.5653.0.5906.16.15.0.0.0.0.204.1399.0j10j1.11.0....0...1.1.64.psyab..5.5.685...0j0i67k1j0i8i30k1j0i24k1j0i13k1.0.GPW6NkzHZVQ#imgrc=8HB3ME9EmPlR_M.
 https://www.google.com/maps/place/Akhisar,+Manisa/@38.4567361,25.430988,8.25z/data=!4m5!3m4!1s0x14b9d204dcf18c4d:0x4cad81cdf80f483b!8m2!3d38.917664!4d27.83662, 2019.
 M. Z. Bodur, “Ege'de Denizden Yapılan Yasa Dışı Göç ve Göçmen Profilleri, Göçmenlerin Geleceğe Yönelik Beklentileri ve Öngörüler,” Güvenlik Stratejileri Dergisi, vol. 12, no. 12, 2010, http://dergipark.ulakbim.gov.tr/guvenlikstrtj/article/view/5000098898/5000092154, Sayfa103. View at: Google Scholar
 “Ege Kıyılarında(İzmirAydın) Gerçekleşen Yasa Dışı Göç Hakkında İnceleme Raporu (2014), Türkiye Büyük Millet Meclisi İnsan Haklarını İnceleme Komisyonu,” https://www.tbmm.gov.tr/komisyon/insanhaklari/docs/2014/ege_kiyilarinda_yasadisigoc_hakkinda_inceleme_raporu_27052014.pdf (2014). View at: Google Scholar
 A. Fügenschuh, M. Knapp, and H. Rothe, The Multiple Traveling Salesmen Problem with Moving Targets. HelmutSchmidtUniv., Professur für Angewandte Mathematik, 2014.
 A. Stieber, A. Fügenschuh, M. Epp, M. Knapp, and H. Rothe, “The multiple traveling salesmen problem with moving targets,” Optimization Letters, vol. 9, no. 8, pp. 1569–1583, 2015. View at: Google Scholar
 A. Stieber and A. Fügenschuh, “Variants in Modeling Time Aspects for the Multiple Traveling Salesmen Problem with Moving Targets, 2016”. View at: Google Scholar
 Q. Jiang, R. Sarker, and H. Abbass, “Tracking moving targets and the nonstationary traveling salesman problem,” Complexity International, vol. 11, pp. 171–179, 2005. View at: Google Scholar
 P. Jindal and A. Kumar, “Multiple target intercepting traveling salesman problem,” International Journal of Computer Science and Technology, vol. 2, no. 2, pp. 327–331, 2011. View at: Google Scholar
 B. Engiot, T. Sahai, and I. Cohen, “Efficient tracking and pursuit of moving targets by heuristic solution of the traveling salesman problem,” in Proceedings of the 2013 IEEE 52nd Annual Conference on Decision and Control (CDC), pp. 3433–3438, IEEE, 2013. View at: Google Scholar
 P. Jindal, A. Kumar, and S. Kumar, “Dynamic version of traveling salesman problem,” International Journal of Computer Applications, vol. 19, no. 1, pp. 0975–8887, 2011. View at: Google Scholar
 M. Khosravi and A. G. Aghdam, “Cooperative receding horizon control for multitarget interception in uncertain environments,” in Proceedings of the 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), pp. 4497–4502, IEEE, 2014. View at: Google Scholar
 M. Hammar and B. J. Nilsson, “Approximation results for kinetic variants of TSP,” in Proceedings of the International Colloquium on Automata, Languages, and Programming, pp. 392–401, Springer, Berlin, Germany, 1999. View at: Google Scholar
 A. Zhou, L. Kang, and Z. Yan, “Solving dynamic TSP with evolutionary approach in real time,” in Proceedings of the 2003 Congress on Evolutionary Computation, (CEC'03), vol. 2, pp. 951–957, IEEE, 2003. View at: Google Scholar
 N. S. Choubey, “Moving Target Travelling Salesman Problem Using Genetic Algorithm,” International Journal of Computer Applications, vol. 70, no. 2, 2013. View at: Google Scholar
 Z.J. Lee, C.Y. Lee, and S.F. Su, “An immunitybased ant colony optimization algorithm for solving weapontarget assignment problem,” Applied Soft Computing, vol. 2, no. 1, pp. 39–47, 2002. View at: Publisher Site  Google Scholar
 P. Agharkar and F. Bullo, “Vehicle routing algorithms to intercept escaping targets,” in Proceedings of the 2014 American Control Conference (ACC '14), pp. 952–957, IEEE, 2014. View at: Google Scholar
 J. Bengt, “Approximation Results for Kinetic Variants of TSP,” Discrete & Computational Geometry, vol. 4, no. 27, 2002. View at: Google Scholar
 M. Knapp and H. Rothe, “Concept for simulating engagement strategies for CRAM systems using laser weapons,” in Proceedings of the DMMS, 2012. View at: Google Scholar
 J.M. Bourjolly, O. Gurtuna, and A. Lyngvi, “On‐orbit servicing: a time‐dependent, moving‐target traveling salesman problem,” International Transactions in Operational Research, vol. 13, no. 5, pp. 461–481, 2006. View at: Publisher Site  Google Scholar
 O. P. Blough, T. K. Farrington, and J. Hudson, Trojan Asteroid Mission Design: Target Selection And Sequencing Optimization, 2016.
 G. Mei, X. Ran, D. Fang, and C. Zhang, “Improved Satellite Scheduling Algorithm for Moving Target,” in Proceedings of the fourth International Conference on Information Science and Cloud Computing (ISCC '15), Guangzhou, China, 2015, http://pos.sissa.it/cgibin/reader/conf.cgi?confid=264, id. 58. View at: Google Scholar
 A. Del Bimbo and F. Pernici, “Distant targets identification as an online dynamic vehicle routing problem using an activezooming camera,” in Proceedings of the 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, pp. 97–104, IEEE, 2005. View at: Google Scholar
 A. D. Bimbo and F. Pernici, “Saccades planning with kinetic TSP for distant targets identification,” in Proceedings of the IEEE International Symposium on Imaging for Crime Detection and Prevention, 2005. ICDP '05, pp. 145–149, IET, 2005. View at: Google Scholar
 K. Ilavarasi and K. S. Joseph, “Variants of travelling salesman problem: A survey,” in Proceedings of the 2014 International Conference on Information Communication and Embedded Systems (ICICES '14), pp. 1–7, IEEE, 2014. View at: Google Scholar
 Y. Asahiro, T. Horiyama, K. Makino, H. Ono, T. Sakuma, and M. Yamashita, “How to collect balls moving in the euclidean plane,” Electronic Notes in Theoretical Computer Science, vol. 91, pp. 229–245, 2004. View at: Publisher Site  Google Scholar
 Y. Asahiro, E. Miyano, and S. Shimoirisa, “Grasp and delivery for moving objects on broken lines,” Theory of Computing Systems, vol. 42, no. 3, pp. 289–305, 2008. View at: Publisher Site  Google Scholar
 P. Chalasani, R. Motwani, and A. N. I. L. Rao, “Algorithms for robot grasp and delivery,” in Proceedings of the 2nd International Workshop on Algorithmic Foundations of Robotics, 1996. View at: Google Scholar
 C. Groba, A. Sartal, and X. H. Vázquez, “Integrating forecasting in metaheuristic methods to solve dynamic routing problems: Evidence from the logistic processes of tuna vessels,” Engineering Applications of Artificial Intelligence, vol. 76, pp. 55–66, 2018. View at: Publisher Site  Google Scholar
 N. Papadakos, G. TzallasRegas, B. Rustem, and J. Thoms, “Risky traveling salesman problem,” European Journal of Operational Research, vol. 212, no. 1, pp. 69–73, 2011. View at: Publisher Site  Google Scholar
 U. Uçar and S. Isleyen, “A New Solution Approach for UAV Routing Problem with Moving Target – Heterogeneous Fleet,” Journal of Polytechnic, 2019. View at: Publisher Site  Google Scholar
 C. S. Helvig, G. Robins, and A. Zelikovsky, “The movingtarget traveling salesman problem,” Journal of Algorithms, vol. 49, no. 1, pp. 153–174, 2003. View at: Publisher Site  Google Scholar
 C. Groba, A. Sartal, and X. H. Vázquez, “Solving the dynamic traveling salesman problem using a genetic algorithm with trajectory prediction: An application to fish aggregating devices,” Computers & Operations Research, vol. 56, pp. 22–32, 2015. View at: Publisher Site  Google Scholar
 G. Mercer, S. I. Barry, D. O. Marlow, and P. Kilby, “Investigating the effect of detection and classification range and aircraft dynamics on a,” ANZIAM Journal, vol. 49, pp. 475–492, 2008. View at: Google Scholar
 P. Kilby, P. Tobin, R. Luscombe, S. I. Barry, and R. Hickson, The maritime surveillance problem, 2007.
 D. O. Marlow, P. Kilby, and G. N. Mercer, “The travelling salesman problem in maritime surveillance–techniques, algorithms and analysis,” in Proceedings of the International Congress on Modelling and Simulation, pp. 684–690, 2007. View at: Google Scholar
 F. Fang, A. Xin, and M. Tambe, “Protecting moving targets with multiple mobile resources,” Journal of Artificial Intelligence Research, vol. 48, pp. 583–634, 2013. View at: Publisher Site  Google Scholar
 M. Cross, D. Marlow, and J. Looker, “Application of the nonstationary travelling salesman problem to maritime surveillance,” in Proceedings of the MISG, pp. 1–4, 2007. View at: Google Scholar
 http://iats17.firat.edu.tr/images/Proceedings/Chapter15.pdf, Accessed: 08.12.2017.
 https://webcache.googleusercontent.com/search?q=cache:YosbDmJ4geAJ, https://tr.wikipedia.org/wiki/S70B2_Seahawk+&cd=1&hl=tr&ct=clnk&gl=tr, Acessed:16.10.201713:03.
 https://webcache.googleusercontent.com/search?q=cache:YosbDmJ4geAJ, https://tr.wikipedia.org/wiki/S70B2_Seahawk+&cd=1&hl=tr&ct=clnk&gl=tr2019, Acessed:22.06.201916:02.
 https://www.marinetraffic.com/en/ais/home/centerx:25.6/centery:38.4/zoom:8, 2019.
 M. M. Mafarja and S. Mirjalili, “Hybrid whale optimization algorithm with simulated annealing for feature selection,” Neurocomputing, vol. 260, pp. 302–312, 2017. View at: Publisher Site  Google Scholar
 L. Ingber, “Simulated annealing: practice versus theory,” Mathematical and Computer Modelling, vol. 18, no. 11, pp. 29–57, 1993. View at: Publisher Site  Google Scholar  MathSciNet
 T. ElGhazali, Metaheuristics: from Design to Implementation, John Wiley & Sons, 2009.
 T. Tsubota, A. Bhaskar, E. Chung, and R. Billot, “Arterial traffic congestion analysis using Bluetooth Duration data,” 2011. View at: Google Scholar
 Z. Kan, L. Tang, M.P. Kwan, C. Ren, D. Liu, and Q. Li, “Traffic congestion analysis at the turn level using Taxis’ GPS trajectory data,” Computers, Environment and Urban Systems, vol. 74, pp. 229–243, 2019. View at: Publisher Site  Google Scholar
 B. H. Susilo and I. Imanuel, “Traffic congestion analysis using travel time ratio and degree of saturation on road sections in Palembang, Bandung, Yogyakarta, and Surakarta,” in Proceedings of the MATEC Web of Conferences, vol. 181 of EDP Sciences, p. 06010, 2018. View at: Google Scholar
 Q. Wang, J. Wan, and Y. Yuan, “Locality constraint distance metric learning for traffic congestion detection,” Pattern Recognition, vol. 75, pp. 272–281, 2018. View at: Publisher Site  Google Scholar
 S. He, “Quantitative problem of road traffic congestion simulation and extension information analysis,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 2, 2012. View at: Google Scholar
 F. He, X. Yan, Y. Liu, and L. Ma, “A traffic congestion assessment method for urban road networks based on speed performance index,” Procedia Engineering, vol. 137, pp. 425–433, 2016. View at: Google Scholar
 N. Petrovska and A. Stevanovic, “Traffic congestion analysis visualisation tool,” in Proceedings of the 2015 IEEE 18th International Conference on Intelligent Transportation Systems, pp. 1489–1494, IEEE, 2015. View at: Google Scholar
 https://tr.wikipedia.org/wiki/Poisson_da%C4%9F%C4%B1l%C4%B1m%C4%B1, Acessed:07.05.2019.
 https://en.wikipedia.org/wiki/Inverse_transform_sampling, Acessed:07.05.2019.
Copyright
Copyright © 2019 Selçuk K. İşleyen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.