Next Article in Journal
Digital Twins for Additive Manufacturing: A State-of-the-Art Review
Next Article in Special Issue
Using Simplified Swarm Optimization on Multiloop Fuzzy PID Controller Tuning Design for Flow and Temperature Control System
Previous Article in Journal
PrimaVera: Synergising Predictive Maintenance
Previous Article in Special Issue
Advanced Prediction of Roadway Broken Rock Zone Based on a Novel Hybrid Soft Computing Model Using Gaussian Process and Particle Swarm Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Predicting and Modeling Wildfire Propagation Areas with BAT and Maximum-State PageRank

Integration and Collaboration Laboratory, Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu City 300, Taiwan
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(23), 8349; https://doi.org/10.3390/app10238349
Submission received: 18 October 2020 / Revised: 11 November 2020 / Accepted: 19 November 2020 / Published: 24 November 2020
(This article belongs to the Special Issue Soft Computing in Applied Sciences and Industrial Applications)

Abstract

:

Featured Application

The Climate conditions as factors in the equations and random values will be incorporated into the featured application for future research model.

Abstract

The nature and characteristics of free-burning wildland fires have significant economic, safety, and environmental impacts. Additionally, the increase in global warming has led to an increase in the number and severity of wildfires. Hence, there is an increasing need for accurately calculating the probability of wildfire propagation in certain areas. In this study, we firstly demonstrate that the landscapes of wildfire propagation can be represented as a scale-free network, where the wildfire is modeled as the scale-free network whose degree follows the power law. By establishing the state-related concepts and modifying the Binary-Addition-Tree (BAT) together with the PageRank, we propose a new methodology to serve as a reliable tool in predicting the probability of wildfire propagation in certain areas. Furthermore, we demonstrate that the proposed maximum-state PageRank used in the methodology can be implemented separately as a fast, simple, and effective tool in identifying the areas that require immediate protection. The proposed methodology and maximum-state PageRank are validated in the example generated from the Barabási-Albert model in the study.

1. Introduction

The network research is very popular and has been applied to research in many fields [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Recently, wildfires have seen unbelievable growth in size, frequency, and complexity. As defined in [28], wildfire is a non-structure and non-prescribed that occurs in wildlands. Wildfires often ignite close to wildland-human boundaries, resulting in severe damage to assets [28,29,30], air pollution [31,32], loss of plants and forest [33,34,35], and high fatalities [36,37]. With global warming, a 1° increase in the climatic temperatures causes a 15% growth in wildfires [38]; the wildfires in turn increase the temperature, thereby further increasing the number of wildfires, forming an infinite loop [28,38].
Wildfire is a severe practical problem [28,38], and does not always occur in the same area, such as a town or city, but expands to the neighboring areas, and is affected by weather conditions, e.g., wind, rain, etc., and location surface, such as forest or lake [36]. Hence, unlike the traditional path problem [39], which states that all events occur in a path, and the spanning tree problem [40], which has fixed destinations, the wildland fire problem requires a new algorithm to estimate its occurrence and the possible results of its propagation [32,33,34].
Several deterministic and probabilistic models have been proposed to predict the wildfire propagation from node-to-node (cell/city/area) [28,29,30,31,32,33,34,35,36,37,38]. Among them, graph-based methodologies, including the path-based and tree-based methodologies, are popular [32,33,34]. Furthermore, many probabilistic wildfire propagation models have been proposed based on the continuous-time Markov chain [41].
The path-based algorithms [32,33,34] focus on identifying the deterministic or stochastic paths with the shortest distance, minimal travel time, or high probability. The tree-based algorithms emphasize on one-source to many-targets and one ignition to many different and known nodes, rather than the one-source to one-target, i.e., from ignition to another target, which is the basis of path-based algorithms [39,40]. The tree-based algorithms include all cellular automata-related algorithms. Furthermore, the path-based and tree-based algorithms require the final destination information [32,33,34,39,40].
Free-burning wildfire propagation exhibits extremely inconstant and chaotic behaviors [32,35,41]. In this study, we demonstrate that the wildfire propagations can be modeled as a scale-free network [42,43], which is a common and effective method to depict complex systems. To the best of our knowledge, this is the first time that the wildfire propagations are modeled as scale-free networks among the existing literature.
Many practical and important networks are scale-free networks where the node degree [42,43,44,45], i.e., the number of edges connected to a node, follows an asymptotical power-law distribution [44]. A model of the scale-free network is a scale-free model [42]. Several examples of the study and use of scale-free networks are available and include the sharing of information among nodes in the network via links, such as the world wide web, protein-interaction networks, metabolic networks for eukaryotes and bacteria, co-authorship/collaborative network, and power grid of the western United States [42,43,44,45].
Among the different models of scale-free [45] networks, the Barabási-Albert model [45] is the most popular with numerous variations and generalizations [45]. Hence, the Barabási-Albert model is used to model the propagation characteristic property of the wildland fire and generate test data to validate the performance of the proposed algorithm.
The Binary-Addition-Tree (BAT) proposed by Yeh [46] is similar to the depth-first-search (DFS) [22,47,48], breadth-first-search (BFS) [49,50,51], universal generating function methodology (UGFM) [22,43,44,45,46,47,48,49,50,51,52,53], etc. However, BAT is easier to understand and convenient to code. The most important advantage of BAT is its flexible unique search procedure, and its valuable and easy implementation [46]. Hence, it has been adapted to solve the proposed wildfire propagation.
This study aims to calculate the probability of the wildfire propagation areas and quickly determine the areas that require immediate protection. Using the proposed novel state concepts and traditional PageRank, whose details are provided in Section 2.3, this study proposes an innovative methodology based on BAT [46] and PageRank [54,55] to predict the probable areas affected by the wildfire propagation that is modeled using the scale-free network generated from the Barabási-Albert model [45] and assess the risk of wildfire spread. Furthermore, the proposed maximum-state PageRank is implemented to quickly identify the node that requires immediate protection.
The rest of this study is organized as follows. An overview of the wildfire propagation models, scale-free networks [42,43,44,45], Barabási-Albert model [45], and BAT [46] are presented in Section 2. The pseudo-code, details of the BAT in solving the given problem, and discussion regarding the novelty of the proposed BAT, innovative states, state PageRank, state probability, and maximum-state PageRank are presented in Section 3. An experiment is presented in Section 4 to demonstrate the applicability of the proposed BAT. Furthermore, the analytical results are reported in this section. Section 5 concludes and summarizes the discussion.

2. Overview of Wildfire Propagation, Scale-Free Network, Barabási-Albert Model, and BAT

Viegas [56] indicated that there are many factors involved in the wildfire, and there are no general models yet available to perform this task with a sufficient degree of accuracy and reliability. There is a wide range of fire propagation models, ranging from the empirical to the physical [57,58]. The wildfire propagation area estimation problem was modeled as a scale-free network using the Barabási-Albert model [45] and solved by modifying the BAT [46]. Therefore, before deliberating the proposed BAT, a general background of the wildfire propagation [28,38], scale-free network [15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45], Barabási-Albert model [45], and BAT [46] are presented in this section.

2.1. Wildfire Propagation

The landscape is mapped into an undirected binary-state network G(V,E), where V is the set of nodes representing towns, cities, forests, etc., and E is the set of undirected links connecting the nodes in V, such that two neighboring nodes are connected by an undirected link. Each node exhibits two states: with or without wildfire, and each link is assumed to be always perfect without any possible failure.
For example, Figure 1 illustrates a landscape network representing eight areas labeled 0–7 with 15 links connecting these nodes, e.g., nodes 3 and 7 are neighboring areas as there is a link between the two nodes.
The scale-free network grows independent of the number of nodes, i.e., the size of the network and underlying structure remains the same. The propagation of wildfire satisfies this property, and is thus considered as a scale-free model in this study. In this subsection, the model of the wildfire propagation is further modeled as a scale-free model with three prospects: ignition and spread of wildfire, probability of burning, and fire head intensity.
The ignition and spread of wildfire exhibit a high correlation with heat diffusion, which is a general observed natural phenomenon [59] and can be studied as a scale-free network. Heat diffusion is observed from high-temperature regions to lower temperature regions and this phenomenon is observed in the propagation of wildfire. Therefore, recently, heat diffusion has been implemented to model numerous networks whose information or flow is shared and propagated on online social networks.
From the MedSpread model, the probability of burning is defined in [31] as
P = (1 − e−r)p
where r is the spread rate and p is the fire intensity, representing the relation between the fire spread and the probability of burning. Equation (1) is similar to the power functions.
The fire head intensity q (kW/m) is the rate of energy release per unit length of the fire head (kW/m). Regardless of the depth of the fire and fuel characteristics, q is calculated as follows [36]:
q = 260 L2.174
where L is the flame length (m). Equation (2) is a power function.
Any model that follows the power law can be considered as a scale-free model, as reported in [44]. From the aforementioned heat diffusion and Equations (1) and (2), the wildfire propagation can be modeled as a scale-fee network. Hence, we adopt the scale-free model to estimate the possible affected areas during wildfire propagation.

2.2. Scale-Free and Barabási-Albert Model

In scale-free networks [42,43,44,45], the node degree follows a power-law distribution [44], such that the network size is independent of the scale. Hence, the node degree is the core of a scale-free network. Two different nodes are observed in scale-free networks: hub nodes and non-hub nodes, wherein the degrees of the nodes are greater than and less than a certain threshold, respectively [44].
The scale-free networks adopted here are generated from a minimal model called the Barabási-Albert model proposed by Barabási and Albert in 1999 [45]. Inspired by the observation that World Wide Web (WWW) exhibits power-law (or scale-free) degree distributions, the Barabási-Albert model [45] was proposed as the first scale-free model in developing the network based on the following two steps:
STEP B1.
Growth: Nodes are individually added into the network such that the network size, i.e., the number of nodes, increases over time.
STEP B2.
Preferential attachment: The probability of the newly added node being connected with an old node is dependent on the degree of the old node.
Growth and preferential attachment are extremely common in existing real-life networks. Growth indicates that the network grows from time to time by adding new nodes, and preferential attachment describes the growth of the network, i.e., the connection between new nodes and old nodes [45]. Furthermore, STEP B2 indicates that the degree of nodes follows the power law and preferential attachment is a probabilistic mechanism [45].
We assume that the number of nodes is n: 0, 1, 2…, (n − 1), Deg(i) is the degree of node i, and Pr(i) is the probability that a new node is connected to node i. STEP B2 is based on Pr(i) to predict the probability of the new node being added to the network in connection with node i. Pr(i) can be defined as
Pr ( i ) = Deg ( i ) j = 0 n 1 Deg ( j )
It can be seen from Equation (3) that in the scale-free network, most of the nodes are non-hub nodes with a few links. Based on Step B2, a few high-degree non-hub nodes can gradually transform into hubs because new nodes are more likely to connect with them [45]. This is called a rich-get-richer phenomenon [42,43,44,45]. In other words, the number of edges among all nodes approximately follows the power law property [44].
Table 1 presents the adjacency matrix [60] that can be used to determine the degree of each node in Figure 1, which is used as an input to the proposed method.
The normalized adjacency matrix presented in Table 2 is calculated by dividing the element values in Table 1 by their degrees. The normalized adjacency matrix is required to calculate the PageRank values discussed in the next section. The original concept of BAT is first proposed and used in Table 2 of [61] without naming it.

2.3. PageRank

In recent years, numerous algorithms have been proposed to rank the importance of nodes in scale-free networks. Among these algorithms, PageRank used by Google in their search engine was historically the first and most well-known algorithm [54,55]. Simply follows the basic property of a scale-free network, whereas PageRank assumes that many important nodes (websites) are expected to receive more links from other nodes (websites) [54].
The PageRank of a node (page/website) i after obtaining a degree, as listed in Table 1, is given as follows [44]:
PR(i) = (1 − d) + d × [PR(i1)/Degout(i1) + … +PR(in)/Degout(in)]
where
  • i1, i2, …, ini are nodes with links to node i
  • damping factor d is a number between 0 and 1 and it accounts for the (1 − d) chance of jumping into an arbitrary node.
  • Degout(j) is the out-degree number of a node, i.e., the number of links going from node j.
As an important node refers to other important nodes that are linked to it, the steps of the PageRank algorithm [53] are listed in Algorithm 1.
Algorithm 1 PageRank Algorithm [53]
Input A scale-free network G(V, E) with node set V = {0, 1, …, (n − 1)} and link set E.
Output Probability distribution, i.e., the PageRank value, PR(i) for all nodes iV.
1: Let time t = 0. Set the initial PR(i) as 1/n for node i and i = 0, 1, …, (n − 1).
2: Update PR(i) based on Equation (4) for all i ∈ V.
3: Redistribute PR(i) equally among the other nodes for all nodes i with Degout(i) = 0.
4: if there is no change in PR(i) for i = 0, 1, 2, …, (n − 1) then go to Stop.
5: else if let t = t + 1 return to line 2.
Line 1 initializes all node rankings with equal weights. Line 2 implements the basic concept of the PageRank defined in Equation (4) to update the node ranking recursively by adding the weight of every node that is linked to it and dividing it by the number of links emanating from the referring node [54]. The redistribution in line 3 is based on an underlying assumption that users will continue to search WWW if they enter a node (webpage in [54]) without exiting the link, i.e., a dead end. The procedure is repeated to update the rough PageRank value of each node in line 3 to converge to a constant number.
The output value PR(i) for all nodes i in the PageRank algorithm indicates the probability distribution of a user clicking on webpages (nodes) randomly to arrive at any particular webpage (node) [54,55]. Hence, the PR(i) can be adapted to estimate the probability that a wildfire randomly ignites and propagates in an area. Thus, to model the growth of wildfire propagation and describe the related burning areas, PageRank is adopted to measure the importance of nodes (areas) and is then transformed to the appropriate probability, which is used in the proposed dynamic BAT.

2.4. BAT

BAT was first proposed by Yeh [46] in 2020. It is a simple tree based on binary addition, and is used to generate all the possible binary-state vectors whose values of state coordinates are either 0 or 1. Experimental results have confirmed that BAT is better than the conventional Inclusion-Exclusion method, which is based on depth-first-search (DFS) [22,47], and the conventional Inclusion-Exclusion method is better than the Sum-of-disjoint product method, which is based on the breadth-first-search (BFS) [22,23,48,49]. Hence, BAT outperforms BFS and DFS in terms of the required computer memory and efficiency [46].
The flexibility of BAT highlights the malleability of its searchability and the ease of modification and customization with various practical applications [46]. Therefore, we customized it for the problems considered in this study.
Let us assume that Yk is the kth obtained vector with m coordinates and the ith coordinate Yk(i) is the state of link aiE in Yk. The original BAT is link-based and all coordinates in its calculated vectors are the states of the links. In the original link-based BAT, Yk+1 is generated after adding 1 to Yk by treating Yk as a binary number whose ith digit is equal to Yk(i). The overall pseudocode of BAT is shown in Algorithm 2.
Algorithm 2 BAT Algorithm [46]
Input A binary-state network G(V, E) with two states, either 0 or 1, to each link and V = {0, 1, 2, …, n − 1}
Output All possible non-duplicate link-based state vectors.
1: Let SUM = 0, vector index k = 1, and Y1 = Y be a zero vector with m coordinates which represented the states of the related links.
2: Let coordinate index i = m.
3: If Y(i) = 0, let Y(i) = 1, k = k + 1, Yk = Y, SUM = SUM + 1 then go to line 5.
4: Let Y(i) = 0. If i > 1, let i = i − 1 then go to line 3.
5: If SUM = m, halt, and Y1, Y2, …, Yk are all possible state vectors return line 2.
Algorithm 2 begins with a zero vector, as shown in line 1. All the other vectors are generated by adding 1 in accordance with the binary addition in sequence in the form of a loop from the line 2 to the line 4. The algorithm stops when SUM = m, i.e., all the coordinates are 1, in line 5 [46].
Considering m = 5, we have the zero vector Y1 = (0, 0, 0, 0, 0) whose binary number is 00000. Using the aforementioned pseudocode from the line 2 to the line 4., the first five vectors are easily obtained and represented in binary numbers as follows:
00000 + 1 = 00001,
00001 + 1 = 00010,
00001 + 1 = 00011,
00011 + 1 = 00100.
It can be seen from Equations (5)–(8), Y2 = (0, 0, 0, 0, 1), Y3 = (0, 0, 0, 1, 0), Y4 = (0, 0, 0, 1, 1), and Y5 = (0, 0, 1, 0, 0). Similarly, all the vectors obtained in BAT are presented in Table 3, where Columns Bi represent the binary numbers of the obtained vector Yi [46].
The value of each coordinate is either 0 or 1 in the binary-state network, with five coordinates in each vector. Hence, there are 25 = 32 different vectors. Thus, all the possible state vectors are obtained without duplications in BAT [46].

3. Novel Dynamic BAT and States

The conventional path- and tree-like problems demonstrate well-defined destinations [32,33,34]. However, the propagation of the wildland fire problem considered in this study, its final destinations, and the number of destinations is unknown. Hence, it is difficult to estimate its possible occurrences in comparison with the conventional path and tree-like problems. The states and focus of the proposed algorithm are discussed in this section.

3.1. States and Maximum-State

A state of a node, i.e., node iV, is a node subset in V(i), and these nodes in a state are all possible wildfires via node i. Hence, a state represents a possible wildfire that spreads from node i. A state has the following two properties:
  • the state of node i can be an empty node subset because it is possible that no area is affected by the wildfire in node i,
  • these nodes in each state are subsets of V(i) because the neighbor areas can face a wildfire spread from node i.
Hence, the possible state of each node, i.e., node i, is a node subset in V(i) representing the possible areas of the wildfire spread during the same period. For example, in Figure 1, the states of node 0 are ∅ {5}, {7}, and {5, 7}, which are node subsets in V(0). These states denote that a wildfire is possible in node 0 and does not spread, spread to node 5 but does not spread to node 7, spread to node 7 but does not spread to node 5, and spread to nodes 5 and 7, respectively.
The maximum-state is the state with the maximal number of nodes in V(i), i.e., V(i) is the maximum-state and the number of states is equal to the number of all possible node subsets of V(i). The degree, adjacent node subset, and the number of combinations denoted by the notation C(i) for node i in Figure 1 are listed in Table 4 C(i) = 2|Deg(i)| and the maximum-state label of node i is 2|Deg(i)| − 1, where |●| is the number of elements in set ●.

3.2. State Labels

Let us assume that Sk(i) is the state corresponding to the kth state label of node i for iV and k = 0, 1, …, 2|Deg(i)| − 1. For example, from Table 3, S0(0) = ∅, S1(1) = {5}, S3(2) = {6, 7}, S7(3) = {5, 6, 7}, S2(4) = {6}, S4(5) = {0, 1}, S3(6) = {3}, and S6(7) = {1, 3}, respectively.
Each state has a unique state label. The first eight combinations of node i = 0, 1, …, 7 in Figure 1 based on V(i) are listed in Table 5, where the first column and first row denote the node label and state label, respectively.
The state label is a number denoting a state’s location among all the related states of each node. A state label is called a decimal state label or binary state label if it is represented by a decimal number or binary number, respectively. To recognize the state represented by a state label without losing any states, the notation used in BAT is adapted here to represent the state and state label of a node, i.e., iV, based on the following rules:
  • the number of digits is equal to Deg(i) in the binary state label;
  • the nodes in the states of i are arranged in the decreasing order of their node labels in V(i);
  • the ith digit in the binary state label is equal to 0 or 1 if the ith node is included or excluded in the state, respectively.
The state label is a decimal state label if there is no further clarification. For example, in Figure 1, the degree of node 0 is 2, i.e., Deg(0) = 2, and its adjacent node subset is {7, 5}, i.e., V(0) = {7, 5} (listed in the order of decreasing node labels by Rule 2). From Rules 1 and 3, these states ∅, {5}, {7}, and {5, 7} can be represented in the binary numbers 00, 01, 10, and 11, respectively, where the first/second digit in the binary numbers represents the state of node 7/5 based on the node listed order in V(i). The corresponding decimal numbers of these binary numbers are state labels, i.e., state labels 0, 1, 2, and 3 are node subsets ∅, {5}, {7}, and {5, 7} because 0 = 00, 1 = 01, 2 = 10, and 3 = 11, respectively.

3.3. State Vectors

A state vector is a vector recording the sequence of the wildfire spread and its corresponding coordinates record the state labels of possible states of related nodes. In this study, the number of coordinates in a state vector depends on the situation and is not constant. Furthermore, the nodes that are included in the vector and the coordinates representing these nodes are dependent on each other.
To identify the node with a state in the state vector, each coordinate is denoted by a two-dimensional tuple in a ratio such that the numerator is the current state label of the node shown in the denominator, i.e., 7/5 implies that node 5 is in the state (label) 7. For example, X = (1/3, 1/5, 0/0) is a state vector including nodes 3, 5, and 0 with state labels 1, 1, and 0, respectively; and X* = (4/3, 1/5, 0/6) is another state vector including nodes 3, 5, and 6 with state labels 4, 1, and 0, respectively.
An important advantage is that the origin and destination nodes of the wildfire spread listed in the state vector can be easily identified. For example, from X = (1/3, 1/5, 0/0), we can identify that the wildfire is spread from nodes 3 to 5, then from nodes 5 to 0, and stops in node 0 because S1(3) = {5}, S1(5) = {0}, and S0(0) = ∅ from (1/3, 1/5, 0/0). Similarly, from X* = (4/3, 1/5, 0/6), the wildfire starts from node 3, spreads to nodes 5 and 6 at the same time, and then spreads from node 5 to 0 and does not spread from node 6.

3.4. State Pagerank, State Probability, and Maximum-State Pagerank

In the Barabási-Albert model [45] discussed in Section 2.2, the preferential attachment in emphasizes that the probability of a node obtaining a connection is proportional to its node degree. Hence, here, we define the occurrence spread probability of possible states, called the state probability.
After obtaining the PageRank values [44] of all nodes using the algorithm presented in Section 2.3 and the possible states of each node provided in Section 3.1, Section 3.2 and Section 3.3, the next step is to calculate the state PageRank and state probability.
The state PageRank and state probability represent the PageRank value and occurrence probability of the related state, respectively. We assume that PR(Sk(i)) is the state PageRank of state Sk(i) and Pr(Sk(i)) is the probability to obtain Sk(i), where node iV and k = 0, 1, …, 2|Deg(i)|−1. PR(Sk(i)) is calculated based on the PageRank of all nodes in the corresponding state of node i in terms of the probability of a node obtaining a connection proportional to its node degree, i.e.,
PR ( S k ( i ) )   =   | S j ( i ) | = 1   and   S j ( i ) S k ( i )   PR ( S j ( i ) ) .
Because the summation of the probability of all possible states is equal to one, we can normalize the related PageRank values as shown in the following equation:
Pr ( S k ( i ) )   =   PR ( S k ( i ) ) i = 0 2 | Deg ( i ) | 1 PR ( S k ( i ) )
where
PR(S0(v)) = 0.5 × Min{W(Sk(i)) | for | Sk(i)| = 1 and k = 0, 1, …, 2|Deg(i)| − 1}.
From the preferential attachment in the Barabási-Albert model [18], a newly added node is free to connect to any node in the network; however, the probability of connecting to a degree-two node is twice that of connecting to a degree-one node. Hence, we have Equations (9)–(11).
For example, for node 0 in Figure 1, the PageRank values of states 0–3 are 0.0816538, 0.194502, 0.163308, and 0.357809, respectively, where the PageRank value of state 0 is set to be the smallest among the states with one single node, i.e., binary states 01 and 10 (decimal states 1 and 2). From the PageRank values, we have the occurrence probabilities of states 0–3 of node 0:
0.10241600 = 0.0816538/(0816538 + 0.194502 + 0.163308 + 0.357809)
0.24395900 = 0.194502/(0.0816538 + 0.194502 + 0.163308 + 0.357809)
0.20483300 = 0.163308/(0.0816538 + 0.194502 + 0.163308 + 0.357809)
0.44879200 = 0.357809/(0.0816538 + 0.194502 + 0.163308 + 0.357809).
The PageRank values and probabilities of the first eight states of each node are listed in Table 6 and Table 7.

3.5. The New BAT

In general, BAT can identify all possible state vectors (cases) that satisfy certain predefined conditions, e.g., a connected path, required amount/information flows, etc., between two specific node subsets in networks, i.e., one source-node to one target-node, one source-node to many target-nodes, many source-nodes to many target-nodes, and many source-nodes to one target-node [46]. However, to satisfy the real-time wildfire propagation conditions, the number of coordinates, the node representing a coordinate, and the state label for a node are unknown.
To meet the convenience of the conventional BAT for the practical problem discussed in this study, a novel dynamic BAT is proposed by implementing dynamic trees with dynamic lengths, flexible node orders, and different states.
We assume that the wildfire starts in the node (area) i, and we aim to identify all the possible scenarios where the wildfire spreads to at least Narea areas and their corresponding probabilities. The procedure of the proposed BAT in determining the scenarios and probabilities are listed in Algorithm 3.
Algorithm 3 New-BAT Algorithm.
InputG(V, E), V(i), Sk(i), and the node s where the wildfire is first identified, for all k = 0, 1, …, 2|Deg(i)| − 1 and iV.
Output the probability Pr(s, Narea) that the wildfire spreads to at least Narea (≥1) areas (including the first area of wildfire identified).
1: Let i = s be the node that the wildfire was first found, l = 0, the current sum of probabilities that the wildfire are spread out to at least Narea areas R = 0, Tl = {i}, T−1 = ∅, the state label X(i) = 1.
2: If X(i) = 2|Deg(i)| − 1, i.e., node i reaches its the maximum-state then go to line 11.
3: Let X(i) = X(i) + 1 and T* = {j | j ∈ [V(i) − Tl]}.
4: If T* = ∅ then go to line 7.
5: Let Tl = Tl-1T*, X(j) = 0 for all jT*, and Pl = P(l−1) × Pr(SX(i)(i)).
6: If |Sl| ≥ Nneighbor, let R = R + Pl then go to line 3.
7: Let new node i be the node right after the current node i in Tl then go to line 4.
8: If there is no such node in line 7 then go to line 3.
9: Let l = l − 1, i be the node right before the current node i in Tl, and go to line 2. If there is no such node i, halt, and Pr(s, Narea) = R is the final probability that the wildfire can be spread out at least Narea areas.
The number of coordinates in the state vectors may be different in the proposed BAT and the nodes connected may be present in the same state vectors as shown in Table 8.
For example, in Table 8, the initial state vector is X = (1/3) if node 3 is the first identified area with a wildfire. The initial state vector always includes the first burned node and its state label starts from 1, as shown in line 3. Then, X = (1/3, 0/5) due to S1(3) = {5} and node 3 does not reach its maximum-state. Furthermore, the other areas that are not the first identified area must begin with state 0, as shown in line 5.
If Narea = 2, we obtain a possible state vector because the wildfire in node 3 is propagated to a neighbor area, i.e., node 5, by line 6. If Narea > 2, we should increase the state of node 5 by one because the current state of node 5 is zero, i.e., it does not reach another node. The aforementioned analysis is based on line 3 and is similar to that of the conventional BAT.
The proposed BAT procedure to obtain the first state vector with five coordinates, i.e., where the number of wildfire areas Narea is at least five, is provided and listed in Table 8.

3.6. Overall Procedure of the Proposed Method

The overall pseudo-code for the proposed method, based on the New BAT in Section 3.5 along with the novel state concepts discussed in Section 3.1, Section 3.2, Section 3.3 and Section 3.4, in estimating the number of the wildfire propagation areas is presented in Algorithm 4.
Algorithm 4 The overall procedure of we proposed methof.
Input The map including all areas we are interested in estimating the wildfire propagation
Output The total probabilities of the wildfire propagation areas.
1: Build the network model for the area map by letting the city/down/important area to be node and links to connect these areas that are neighbor to each other.
2: Generate and normalize the adjacency matrix based on each column.
3: Calculate the PageRank values for each node based on the degree of nodes as shown in Equation (4).
4: Find out all node subsets of each node as discussed in Section 3.1.
5: Calculate the state PageRank values (including the maximum-state PageRank values) and state probabilities based on Section 3.4.
6: Use the maximum-state PageRank values to decide which areas need to protect in the beginning, middle, and final stages of the wildfire propagation.
7: Use the proposed the New BAT provided in Section 3.5 to calculate Pr(i, Narea) for all nodes i and Narea = 1, 2, …, |V|.

4. Experimental Results

The scale-free network illustrated in Figure 1 is used to validate the proposed algorithm in estimating the occurrence probability of the wildfire propagation areas, i.e., Pr(i, Narea) for i = 0, 1, …, (n−1) and Narea = 1, 2, …, |V| = n without loss generality. In the experiment, we consider all occurrence probabilities for Narea = 1, 2, …, 8 by assuming that the ignition area begins in nodes 0, 1, …, 7, respectively. Hence, there are 64 tests included.
The proposed algorithm was coded in Python, and all 64 tests were run on Spyder, and performed on the Notebook on Windows 10 with an Intel Core i7-8650U CPU at 1.90 GHz and 2.11 GHz with 16 GB RAM.
Let R1 = R0.85 and R2 = R0.15 be the related probability for d = 0.85 and 0.15, respectively. The experimental results are listed in Table 9 and Table 10, illustrated in Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6 which are analyzed in the following subsections.

4.1. General Results

The probability of one burned area, i.e., Narea = 1, is 100% because there is always an ignition area in the wildfire propagation, e.g., Pr(i, Narea = 1) = 100% for all node i and d = 0.85 and 0.15 as presented in Table 9.
From Table 9, the probability including R1 = R0.85 and R2 = R0.15 is decreased which is also further shown in Figure 2 and Figure 3 for Figures representing the stages of how a network grows/densify, the number of state vectors is increased, and runtime is increased, which is also further shown in Figure 4 for Figures representing the stages of how a network grows/densifies with an increased Narea. In addition, from Figure 2 and Figure 3, the probability including R1 = R0.85 and R2 = R0.15 is dramatically decreased when Narea increases to 8. The aforementioned observation satisfies the real-life phenomena. Moreover, the number of state vectors and runtime are exponential for Narea because the degree distribution in scale-free networks follows the power law.

4.2. Pr(i, Narea) and Deg(i)

From Table 9, the values of R0.85–R0.15 have a higher chance of being positive excepted for i = 5 and 7 and larger Narea. Hence, the related probabilities d = 0.85 (i.e., R0.85) are often better than those of d = 0.15 (i.e., R0.15).
Furthermore, from Table 9, if the adjacent node subsets of two different nodes are the same, e.g., V(i) = V(j), we have Pr(i, Narea) = Pr(j, Narea) for all Narea. For example, for nodes 1, 3, and 4 in Figure 1, V(1) = V(3) = V(4), and their probabilities of having at least Narea = 1, 2, …, 8 burned areas are identical: 1.0000, 0.9642, 0.9620, 0.9586, 0.9524, 0.9349, 0.8530, and 0.5144 for d = 0.85, respectively, i.e., Pr(i, Narea) = Pr(j, Narea) for i, j = 1, 3, 4, and all values of Narea.
However, the total number of possible state vectors is different for a particular number of Narea. For example, for nodes 1, 3, and 4, V(1) = V(3) = V(4), the number of vectors for nodes 1, 3, and 4 are different for 5 ≤ Narea, e.g., the 36276, 36212, and 36180 correspond to nodes 1, 3, and 4 when Narea = 5.
It can be seen from Figure 2 for d = 0.85, the higher degree node seems to have a higher probability in lower Narea but lower probability in higher Narea. For example, nodes 5 and 6 exhibit a degree of 6, which is the highest among all the nodes in Figure 1. Pr(i = 6, Narea) is always the highest among all other nodes for Narea = 1, 2, …, 7 areas, but Pr(i = 6, Narea = 8) ranks third from last. Similarly, Pr(i = 5, Narea) is less than Pr(i = 6, Narea) and its Pr(i = 5, Narea = 8) is the least. On the contrary, Pr(i = 2, Narea) is always the least for Narea = 1, 2, …, 7 but that of Pr(i = 2, Narea = 8) is not the least.
Hence, it is necessary to extinguish wildfires in the areas with a higher degree in the beginning. However, the nodes with a lower degree for larger Narea in the final stage of wildfire propagation require further attention.

4.3. Pr(i, Narea) and the Maximum-State PageRank

Moreover, the nodes with a better ranking in PageRank show the better ranking in the probability of smaller Narea; in contrast, these nodes with better ranking in 1 − (their PageRank values), i.e., the least PageRank values, show the better ranking in the probability of larger Narea. This is because the higher degree of nodes always shows higher values of PageRank and better Pr(i, Narea) for smaller values of Narea.
For example, in Table 10, Figure 3, Figure 5 and Figure 6, A, B, …, H denote nodes 0, 1, …, 7 in Figure 1, node 6 exhibits the best maximum-state PageRank and its values of Pr(6, Narea) correspond well for Narea = 1, 2, …, 7; node 1 exhibits the least maximum-state PageRank values and its Pr(0, Narea) correspond well for Narea = 8.
Hence, it is recommended to protect the areas with better maximum-state PageRank values at the beginning of the wildfire propagation and those with the least maximum-state PageRank values later. The observations further confirm the conclusion in Section 4.2.

4.4. Maximum-State PageRank

The proposed new BAT can calculate the correct value of Pr(i, Narea) for all nodes i and Narea, i.e., the probability of the number of wildfire propagation areas, as presented in Table 9. However, the node degree distribution follows the power law, and the computation burden is increased following the power law based on the size of the scale-free network and the value of Narea. The aforementioned obstacle may overcome the requirement for a high-performance computer or GPU for a larger-size scale-free network.
The aforementioned analysis shows that the number of wildfire propagation areas is highly dependent on the proposed concept: maximum-state PageRank is the summation of all PageRank values in the maximum state of the related node, described in Section 4.2 and Section 4.3.
Hence, in the aforementioned procedure, the computation burden may be avoided if we wish to identify the area that requires protection to reduce the wildfire propagation, i.e., we can consider PRmax(i) if Pr(i, Narea) is not required.

5. Conclusions

In this study, our goal is to develop a novel, easily programable method to calculate the probability of the number of wildfire propagation areas.
First, we identify the possible wildfire landscapes from a scale-free network. These landscapes are modeled as a scale-free network generated from the Barabási-Albert model. Then, the PageRank algorithm is employed to calculate the distribution probability of each node. The probability of wildfire propagation areas is calculated based on the identified spread states that provide all possible states of each node and a new BAT to intelligently determine all scenarios of wildfire landscapes.
From the computational experiments conducted in 64 tests, the proposed BAT demonstrates the capability of systematically calculating the possible area numbers in wildfire propagation.
The proposed methodology presents analytical results. The proposed novel maximum-state PageRank values used in the algorithm can be separated to quickly determine the nodes (area) that reduce the probability of the wildfire propagation throughout, including at the beginning, middle, and end of the wildfire propagation. Without imposing a computational burden or affecting the final analytical results, the proposed novel maximum-state PageRank serves as a reliable and efficient tool in predicting wildfire propagation areas.
These results indicate that the proposed BAT, including the concept of the maximum-state PageRank, can be extended to large-scale problems. In the future, we will seek cooperation opportunities among the results of this study, the government, and private companies to apply the results of this study to practical cases. Besides which, the Climate conditions as factors in the equations and random values will also be incorporated into the research model in future studies.

Author Contributions

Conceptualization, W.-C.Y.; methodology, W.-C.Y.; software, W.-C.Y.; validation, W.-C.Y. and C.-C.K.; formal analysis, W.-C.Y. and C.-C.K.; investigation, W.-C.Y.; resources, W.-C.Y.; data curation, W.-C.Y.; writing—original draft preparation, W.-C.Y. and C.-C.K.; writing—review and editing, W.-C.Y. and C.-C.K.; visualization, W.-C.Y.; supervision, W.-C.Y.; project administration, W.-C.Y.; funding acquisition, W.-C.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Ministry of Science and Technology, R.O.C., grant number MOST 102-2221-E-007-086-MY3 and MOST 104-2221-E-007-061-MY3.

Acknowledgments

The author wishes to thank the anonymous editor and the referees for their constructive comments and recommendations, which significantly improved this article. This research was supported in part by the Ministry of Science and Technology, R.O.C. under grant MOST 102-2221-E-007-086-MY3 and MOST 104-2221-E-007-061-MY3. This article was once submitted to arXiv as a temporary submission that was just for reference and did not provide the copyright.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wei, S.C.; Yeh, W.C. Resource allocation decision model for dependable and cost-effective grid applications based on Grid Bank. Future Gener. Comput. Syst. 2017, 77, 12–28. [Google Scholar] [CrossRef]
  2. Wang, M.; Yeh, W.C.; Chu, T.C.; Zhang, X.; Huang, C.L.; Yang, J. Solving Multi-Objective Fuzzy Optimization in Wireless Smart Sensor Networks under Uncertainty Using a Hybrid of IFR and SSO Algorithm. Energies 2018, 11, 2385. [Google Scholar] [CrossRef] [Green Version]
  3. Huang, C.L.; Huang, S.Y.; Yeh, W.C.; Wang, J. Fuzzy System and Time Window Applied to Traffic Service Network Problems under a Multi-Demand Random Network. Electronics 2019, 8, 539. [Google Scholar] [CrossRef] [Green Version]
  4. Wang, J.H.; Yeh, W.C.; Xiong, N.N.; Wang, J.; He, X.; Huang, C.L. Building an Improved Internet of Things Smart Sensor Network Based on a Three-Phase Methodology. IEEE Access 2019, 7, 141728–141737. [Google Scholar] [CrossRef]
  5. Yeh, W.C.; Lin, J.S. New Parallel Swarm Algorithm for Smart Sensor Systems Redundancy Allocation Problems in the Internet of Things. J. Supercomput. 2018, 74, 4358–4384. [Google Scholar] [CrossRef]
  6. Yeh, W.C. A squeezed artificial neural network for the symbolic network reliability functions of binary-state networks. IEEE Trans. Neural Netw. Learn. Syst. 2016, 28, 2822–2825. [Google Scholar] [CrossRef] [PubMed]
  7. Lai, C.M.; Yeh, W.C. Two-stage simplified swarm optimization for the redundancy allocation problem in a multi-state bridge system. Reliab. Eng. Syst. Saf. 2016, 156, 148–158. [Google Scholar] [CrossRef]
  8. Yeh, W.C. Solving cold-standby reliability redundancy allocation problems using a new swarm intelligence algorithm. Appl. Soft Comput. 2019, 83, 105582. [Google Scholar] [CrossRef]
  9. Zhu, W.; Yeh, W.C.; Cao, L.; Zhu, Z.; Chen, D.; Chen, J.; Li, A.; Lin, Y. Faster Evolutionary Convolutional Neural Networks Based on iSSO for Lesion Recognition in Medical Images. Basic Clin. Pharmacol. Toxicol. 2019, 124, 329. [Google Scholar]
  10. Yeh, W.C.; Zuo, M.J. A New Subtraction-based Algorithm for the d-MPs for all d Problem. IEEE Trans. Reliab. 2019, 68, 999–1008. [Google Scholar] [CrossRef]
  11. Hao, Z.; Yeh, W.C.; Hu, C.F. A Novel Multistate Minimal Cut Vectors Problem. IEEE Trans. Reliab. 2019, 68, 291–301. [Google Scholar] [CrossRef]
  12. Yeh, W.C.; Chu, T.C. A Novel Multi-Distribution Multi-State Flow Network and its Reliability Optimization Problem. Reliab. Eng. Syst. Saf. 2018, 176, 209–217. [Google Scholar] [CrossRef]
  13. Yeh, W.C. A Novel Boundary Swarm Optimization for Reliability Redundancy Allocation Problems. Reliab. Eng. Syst. Saf. 2018, 192, 106060. [Google Scholar] [CrossRef]
  14. Yeh, W.C. Fast algorithm for searching d-MPs for all possible d. IEEE Trans. Reliab. 2018, 67, 308–315. [Google Scholar] [CrossRef]
  15. Yeh, W.C. Methodology for the reliability evaluation of the novel learning-effect multi-state flow network. IISE Trans. 2017, 49, 1078–1085. [Google Scholar] [CrossRef]
  16. Yeh, W.C. A New Exact Solution Algorithm for a Novel Generalized Redundancy Allocation Problem. Inf. Sci. 2017, 408, 182–197. [Google Scholar] [CrossRef]
  17. Yeh, W.C. Evaluation of the One-to-all-target-subsets Reliability of a Novel Deterioration-Effect Acyclic Multi-state Information Network. Reliab. Eng. Syst. Saf. 2017, 166, 132–137. [Google Scholar] [CrossRef]
  18. Yeh, W.C. A Fast Algorithm for Quickest Path Reliability Evaluations in Multi-State Flow Networks. IEEE Trans. Reliab. 2015, 64, 1175–1184. [Google Scholar] [CrossRef]
  19. Yeh, W.C.; Bae, C.; Huang, C.L. A New Cut-based Algorithm for the Multi-state Flow Network Reliability Problem. Reliab. Eng. Syst. Saf. 2015, 136, 1–7. [Google Scholar] [CrossRef]
  20. Yeh, W.C. A Novel Node-based Sequential Implicit Enumeration Method for finding all d-MPs in a Multistate Flow Network. Inf. Sci. 2015, 297, 283–292. [Google Scholar] [CrossRef]
  21. Yeh, W.C. Orthogonal Simplified Swarm Optimization for the Series-Parallel Redundancy Allocation Problem with a Mix of Components. Knowl.-Based Syst. 2014, 64, 1–12. [Google Scholar] [CrossRef]
  22. Hao, Z.; Yeh, W.C.; Wang, J.; Wang, G.G.; Sun, B. A Quick Inclusion-Exclusion technique. Inf. Sci. 2019, 486, 20–30. [Google Scholar] [CrossRef]
  23. Yeh, W.C. An improved sum-of-disjoint-products technique for symbolic multi-state flow network reliability. IEEE Trans. Reliab. 2016, 64, 1185–1193. [Google Scholar] [CrossRef]
  24. Yeh, W.C. New method in searching for all minimal paths for the directed acyclic network reliability problem. IEEE Trans. Reliab. 2016, 65, 1263–1270. [Google Scholar] [CrossRef]
  25. Yeh, W.C. A simple heuristic algorithm for generating all minimal paths. IEEE Trans. Reliab. 2007, 56, 488–494. [Google Scholar] [CrossRef]
  26. Yeh, W.C. A simple universal generating function method to search for all minimal paths in networks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2009, 39, 1247–1254. [Google Scholar]
  27. Yeh, W.C. A Simple Algorithm to Search for All MCs in Networks. Eur. J. Oper. Res. 2006, 174, 1694–1705. [Google Scholar] [CrossRef]
  28. Firewise. Wildfire News and Notes. Wildland Fire Management Terminology; No. 1; Firewise: North Central Washington, DC, USA, 1998; Volume 12, p. 10. Available online: http://www.firewise.org/pubs/wnn/vol12/no1/pp-10.html (accessed on 1 November 2020).
  29. Khakzad, N. Modeling wildfire spread in wildland-industrial interfaces using dynamic Bayesian network. Reliab. Eng. Syst. Saf. 2019, 189, 165–176. [Google Scholar] [CrossRef]
  30. Fasullo, J.T.; Otto-Bliesner, B.L.; Stevenson, S. ENSO’s changing influence on temperature, precipitation, and wildfire in a warming climate. Geophys. Res. Lett. 2018. [Google Scholar] [CrossRef]
  31. Duane, A.; Aquilué, N.; Gil-Tena, A.; Brotons, L. Integrating fire spread patterns in fire modelling at landscape scale. Environ. Model. Softw. 2016, 86, 219–231. [Google Scholar] [CrossRef]
  32. Hajian, M.; Melachrinoudis, E.; Kubat, P. Modeling wildfire propagation with the stochastic shortest path: A fast simulation approach. Environ. Model. Softw. 2016, 82, 73–88. [Google Scholar] [CrossRef]
  33. Stepanov, A.; Smith, J.M. Modeling wildfire propagation with delaunay triangulation and shortest path algorithms. Eur. J. Oper. Res. 2012, 218, 775–788. [Google Scholar] [CrossRef]
  34. Demange, M.; Gabrel, V.; Haddad, M.A.; Murat, C. A robust p-Center problem under pressure to locate shelters in wildfire context. J. Comput. Optim. 2020, 8, 103–139. [Google Scholar] [CrossRef]
  35. Alexandre, M.E.; Cruz, M.G. Limitations on the accuracy of model predictions of wildland fire behavior: A state-of-the-knowledge overview. For. Chron. 2013, 89, 370–381. [Google Scholar]
  36. Byram, G.M. Forest fire: Control and use. In Combustion of Forest Fuels; Davis, K.P., Ed.; McGraw-Hill: New York, NY, USA, 1959; pp. 61–89. [Google Scholar]
  37. Cruz, M.G.; Alexander, M.E. Uncertainty associated with model predictions of surface and crown fire rates of spread. Environ. Model. Softw. 2013, 7, 16–28. [Google Scholar] [CrossRef]
  38. Doerr, S.H.; Santín, C. Global trends in wildfire and its impacts: Perceptions versus realities in a changing world. Philos. Trans. R. Soc. B Biol. Sci. 2016, 371. [Google Scholar] [CrossRef]
  39. Niu, Y.; Gao, Z.; Sun, H. An improved algorithm for solving all d-MPs in multi-state network. J. Syst. Sci. Syst. Eng. 2017, 26, 711–731. [Google Scholar] [CrossRef]
  40. Ramirez-Marquez, J.E. Assessment of the transition-rates importance of Markovian systems at steady state using the unscented transformation. Reliab. Eng. Syst. Saf. 2015, 142, 212–220. [Google Scholar]
  41. Boychuk, D.; Braun, W.J.; Kulperger, R.J.; Krougly, Z.L.; Stanford, D.A. A stochastic forest fire growth model. Environ. Ecol. Stat. 2019, 16, 133–151. [Google Scholar] [CrossRef]
  42. Clauset, A.; Shalizi, C.R.; Newman, M.E.J. Power-law distributions in empirical data. Siam Rev. 2009, 51, 661–703. [Google Scholar] [CrossRef] [Green Version]
  43. Onnela, J.P.; Saramäki, J.; Hyvönen, J.; Szabó, G.; Lazer, D.; Kaski, K.; Kertész, J.; Barabási, A.L. Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. USA 2007, 104, 7332–7336. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  44. Bomholdt, S.; Ebel, H. World Wide Web scaling exponent from Simon’s 1955 model. Phys. Rev. E 2001, 64, 035104. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  45. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar]
  46. Yeh, W.C. Novel binary-addition tree algorithm (BAT) for binary-state network reliability problem. arXiv 2020, arXiv:2004.08238. [Google Scholar]
  47. Yeh, W.C. A greedy branch-and-bound inclusion-exclusion algorithm for calculating the exact multi-state network reliability. IEEE Trans. Reliab. 2008, 57, 88–93. [Google Scholar]
  48. Yeh, W.C.; Lin, Y.C.; Chung, Y.Y. Performance analysis of cellular automata Monte Carlo Simulation for estimating network reliability. Expert Syst. Appl. 2010, 37, 3537–3544. [Google Scholar] [CrossRef]
  49. Yeh, W.C. An improved sum-of-disjoint-products technique for the symbolic network reliability analysis with known minimal paths. Reliab. Eng. Syst. Saf. 2007, 92, 260–268. [Google Scholar] [CrossRef]
  50. Levitin, G. The Universal Generating Function in Reliability Analysis and Optimization; Springer: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
  51. Yeh, W.C. A novel cut-based universal generating function method. IEEE Trans. Reliab. 2013, 62, 628–636. [Google Scholar] [CrossRef]
  52. Yeh, W.C. A simple universal generating function method for estimating the reliability of general multi-state node networks. Iie Trans. 2008, 41, 3–11. [Google Scholar] [CrossRef]
  53. Yeh, W.C.; El Khadiri, M. A new universal generating function method for solving the single (d, τ)-quick path problem in multistate flow networks. IEEE Trans. Syst. Man Cybern. 2012, 42, 1476–1484. [Google Scholar]
  54. Google Press Center: Fun Facts. Available online: https://pulseagency.com.au/wp-content/uploads/2018/06/funfacts.html (accessed on 15 July 2001).
  55. Facts about Google and Competition. Available online: https://blog.google/competition#facts (accessed on 4 November 2011).
  56. Viegas, D. Forest fire propagation. Philosophical transactions. Math. Phys. Eng. Sci. 1998, 356, 2907–2928. Available online: http://www.jstor.org/stable/55054 (accessed on 10 November 2020). [CrossRef]
  57. André, J.C.S.; Lopes, A.M.G.; Viegas, D.X. A broad synthesis of research on physical aspects of forest fires. In Cadernos Cientificos Sobre Incendios Florestais; Viegas, D.X., Ed.; Fluid Mechanics Group, Mechanical Engineering Department, Faculty of Science and Technology, University of Coimbra: Coimbra, Portugal, 1992; Volume 3, p. 148. [Google Scholar]
  58. Rothermel, R.C. Modelling fire behaviour. In Proceedings of the 1st International Conference on Forest Fire Research, Coimbra, Portugal, 19–22 November 1990. [Google Scholar]
  59. Tricaud, C.; Chen, Y.Q. Optimal Mobile Sensing and Actuation Policies in Cyber-Physical Systems; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  60. Nemhauser, G.L.; Wolsey, L.A. Integer and Combinatorial Optimization; Wiley-Interscience: New York, NY, USA, 1999. [Google Scholar]
  61. Yeh, W.C. A Novel Method for the Network Reliability in terms of Capacitated-Minimum-Paths without Knowing Minimum-Paths in Advance. J. Oper. Res. Soc. 2005, 56, 1235–1240. [Google Scholar] [CrossRef]
Figure 1. Example network.
Figure 1. Example network.
Applsci 10 08349 g001
Figure 2. The probability of R1 for Narea = 1, 2, …, 8 in nodes 0, 1, …, 7.
Figure 2. The probability of R1 for Narea = 1, 2, …, 8 in nodes 0, 1, …, 7.
Applsci 10 08349 g002
Figure 3. The probability of R2 for Narea = 1, 2, …, 8 in nodes 0, 1, …, 7.
Figure 3. The probability of R2 for Narea = 1, 2, …, 8 in nodes 0, 1, …, 7.
Applsci 10 08349 g003
Figure 4. Runtime for Narea = 1, 2, …, 8 in nodes 0, 1, …, 7.
Figure 4. Runtime for Narea = 1, 2, …, 8 in nodes 0, 1, …, 7.
Applsci 10 08349 g004
Figure 5. Maximum-state PageRank values.
Figure 5. Maximum-state PageRank values.
Applsci 10 08349 g005
Figure 6. Node ranks based on maximum-state PageRank values.
Figure 6. Node ranks based on maximum-state PageRank values.
Applsci 10 08349 g006
Table 1. Adjacency matrix for Figure 1.
Table 1. Adjacency matrix for Figure 1.
Applsci 10 08349 i001
Table 2. Normalized adjacency matrix based on each column.
Table 2. Normalized adjacency matrix based on each column.
01234567
0000000.16666700.2
1000000.1666670.1666670.2
2000000.1666670.1666670
3000000.1666670.1666670.2
4000000.1666670.1666670.2
50.50.3333330.50.3333330.33333300.1666670
600.3333330.50.3333330.3333330.16666700.2
70.50.33333300.3333330.33333300.1666670
Table 3. Yi value obtained in the proposed Binary-Addition-Tree (BAT) [20].
Table 3. Yi value obtained in the proposed Binary-Addition-Tree (BAT) [20].
BiYiiBiYi
100000(0, 0, 0, 0, 0)1710000(1, 0, 0, 0, 0)
200001(0, 0, 0, 0, 1)1810001(1, 0, 0, 0, 1)
300010(0, 0, 0, 1, 0)1910010(1, 0, 0, 1, 0)
400011(0, 0, 0, 1, 1)2010011(1, 0, 0, 1, 1)
500100(0, 0, 1, 0, 0)2110100(1, 0, 1, 0, 0)
600101(0, 0, 1, 0, 1)2210101(1, 0, 1, 0, 1)
700110(0, 0, 1, 1, 0)2310110(1, 0, 1, 1, 0)
800111(0, 0, 1, 1, 1)2410111(1, 0, 1, 1, 1)
901000(0, 1, 0, 0, 0)2511000(1, 1, 0, 0, 0)
1001001(0, 1, 0, 0, 1)2611001(1, 1, 0, 0, 1)
1101010(0, 1, 0, 1, 0)2711010(1, 1, 0, 1, 0)
1201011(0, 1, 0, 1, 1)2811011(1, 1, 0, 1, 1)
1301100(0, 1, 1, 0, 0)2911100(1, 1, 1, 0, 0)
1401101(0, 1, 1, 0, 1)3011101(1, 1, 1, 0, 1)
1501110(0, 1, 1, 1, 0)3111110(1, 1, 1, 1, 0)
1601111(0, 1, 1, 1, 1)3211111(1, 1, 1, 1, 1)
Table 4. Deg(i), V(i), C(i), and PR(i) values of node i.
Table 4. Deg(i), V(i), C(i), and PR(i) values of node i.
iDeg(i)V(i)C(i)PR(i)PR(V(i))1 - PR(V(i))
02{5, 7}40.0740660.3578090.642191
13{5, 6, 7}80.1011600.5490560.450944
22{6, 7}40.0733980.3578090.642191
33{5, 6, 7}80.1011600.5490560.450944
43{5, 6, 7}80.1011600.5490560.450944
56{0, 1, 2, 3, 4, 6}640.1945020.6421910.357809
66{1, 2, 3, 4, 5, 7}640.1912470.7346870.265313
75{0, 1, 3, 4, 6}320.1633070.5687930.431207
Table 5. The first eight combinations of node i based on V(i) and Rules 1–3.
Table 5. The first eight combinations of node i based on V(i) and Rules 1–3.
State01234567
Node
0{5}{7}{5, 7}
1{5}{6}{7}{5, 6}{5, 7}{6, 7}{5, 6, 7}
2{5}{6}{6, 7}
3{5}{6}{7}{5, 6}{5, 7}{6, 7}{5, 6, 7}
4{5}{6}{7}{5, 6}{5, 7}{6, 7}{5, 6, 7}
5{0}{1}{2}{0, 1}{0, 2}{1, 2}{0, 1, 2}
6{1}{2}{3}{1, 2}{1, 3}{2, 3}{1, 2, 3}
7{0}{1}{3}{0, 1}{0, 3}{1, 3}{0, 1, 3}
Table 6. PageRank values of the first eight states of each node.
Table 6. PageRank values of the first eight states of each node.
i01234567
00.08165380.1945020.1633080.357809
10.08165380.1945020.1912470.3857480.1633080.3578090.3545540.549056
20.09562330.1945020.1912470.385748
30.08165380.1945020.1912470.3857480.1633080.3578090.3545540.549056
40.08165380.1945020.1912470.3857480.1633080.3578090.3545540.549056
50.03669880.07406670.101160.1752270.07339770.1474640.1745580.248624
60.03669880.101160.07339770.1745580.101160.202320.1745580.275718
70.03703330.07406670.101160.1752270.101160.1752270.202320.276387
Table 7. Probabilities of the first 8 combinations of each node.
Table 7. Probabilities of the first 8 combinations of each node.
i01234567
00.102416000.243959000.204833000.44879200
10.035846400.085387200.083958300.169346000.071692900.157080000.155651000.24103800
20.110277000.224308000.220554000.44486200
30.035846400.085387200.083958300.169346000.071692900.157080000.155651000.24103800
40.035846400.085387200.083958300.169346000.071692900.157080000.155651000.24103800
50.001782640.003597770.004913820.008511600.003565280.007163050.008479100.01207690
60.001558560.004296150.003117110.007413260.004296150.008592290.007413260.01170940
70.004052800.008105590.011070600.019176200.011070600.019176200.022141200.03024680
Table 8. Proposed BAT procedure to obtain the first state vector with five coordinates.
Table 8. Proposed BAT procedure to obtain the first state vector with five coordinates.
liV(i)Label 1Label 2X(i)T#Tl = Tl−1S#XProbability *
03{7, 6, 5}10011{5}{3, 5}(1/3)p3,{5}
15{6, 4, 3, 2, 1, 0}00000000{3, 5}(1/3, 0/5)p3,{5}p5,
25{6, 4, 3, 2, 1, 0}10000011{5,7}{3, 5, 0, 7}(1/3, 1/5)p3,{5}p5,{0}
30{7, 5}0000{3, 5, 0, 7}(1/3, 1/5, 0/0)p3,{5}p5,{0}p0,
47{6, 4, 3, 2, 1, 0}00000000{3, 5, 0, 7}(1/3, 1/5, 0/0, 0/7)p3,{5}p5,{0}p0,{7}p7,
57{6, 4, 3, 2, 1, 0}10000011{3, 5, 0, 7}(1/3, 1/5, 0/0, 1/7)p3,{5}p5,{0}p0,{7}p7,{1}
1 decimal labels 2 binary state labels * pi,I = Pr(Sj(i)) = Pr(X(i)), where node subset I is the jth state of node I and X(i) = j.
Table 9. Deg(i), V(i), Comb(i), and PR(i) values of node i.
Table 9. Deg(i), V(i), Comb(i), and PR(i) values of node i.
iNareaVector NumberRuntimeR1 = R0.85R2 = R0.15R1-R2
0110.0001.00001.00000.0000
250.0000.89760.89190.0057
31910.0030.89380.88640.0074
411060.0110.88950.88110.0084
5180360.3770.88630.87760.0087
63566646.4480.87760.86890.0087
7751083684.4700.82830.82530.0031
8877425881131.3780.55180.5654−0.0136
1110.0001.00001.00000.0000
2130.0000.96420.96120.0030
33240.0070.96200.95860.0034
426070.0220.95860.95470.0040
5362760.3240.95240.94870.0038
67738286.7790.93490.93250.0025
713814130152.8260.85300.8617−0.0087
81226684281591.6090.51440.5412−0.0268
2110.0001.00001.00000.0000
250.0000.88970.8904−0.0007
32550.0160.88750.88720.0003
416540.0310.88400.88320.0008
5213940.5270.87820.87760.0005
64159948.5190.86470.8649−0.0003
78604502117.4730.81580.8213−0.0055
8951780461374.0700.54840.5675−0.0191
3110.0001.00001.00000.0000
2130.0000.96420.96120.0030
33240.0000.96200.95860.0034
426070.0310.95860.95470.0040
5362120.3470.95240.94870.0038
67719407.1050.93490.93250.0025
713797962167.7600.85300.8617−0.0087
81228218923518.9260.51440.5412−0.0268
4110.0001.00001.00000.0000
2130.0000.96420.96120.0030
33240.0040.96200.95860.0034
426070.0260.95860.95470.0040
5361800.3460.95240.94870.0038
67717327.0750.93490.93250.0025
713791562156.8020.85300.8617−0.0087
81232443561742.5730.51440.5412−0.0268
5110.0001.00001.00000.0000
22520.0030.99490.9963−0.0014
35940.0060.98650.9892−0.0027
486640.0750.97980.9834−0.0036
51199141.0820.96960.9753−0.0057
6205042418.7960.94260.9540−0.0113
726321044339.0850.83060.8604−0.0298
81839613582505.2810.46280.5074−0.0446
6110.0001.00001.00000.0000
21250.0020.99840.99760.0008
33550.0050.99560.99420.0014
452160.0770.99160.99040.0012
5700061.1720.98150.98110.0004
6115332118.1140.95730.9596−0.0023
714700763178.0700.85520.8706−0.0154
81208039441547.1870.49110.5204−0.0292
7110.0001.00001.00000.0000
21240.0020.99000.9918−0.0018
34560.0070.97870.9810−0.0022
479980.1600.97250.9753−0.0028
51309861.8450.96500.9689−0.0039
6257116035.2290.94520.9528−0.0077
729212442461.0610.83860.8641−0.0255
81793070462957.6420.46800.5105−0.0425
Table 10. Node ranks based on Table 9 and PageRank values.
Table 10. Node ranks based on Table 9 and PageRank values.
Narea12345678PR1-PR
i
01777777181
11444442343
21888888271
31444442343
41444442343
51222236827
61111111618
71333325736
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yeh, W.-C.; Kuo, C.-C. Predicting and Modeling Wildfire Propagation Areas with BAT and Maximum-State PageRank. Appl. Sci. 2020, 10, 8349. https://doi.org/10.3390/app10238349

AMA Style

Yeh W-C, Kuo C-C. Predicting and Modeling Wildfire Propagation Areas with BAT and Maximum-State PageRank. Applied Sciences. 2020; 10(23):8349. https://doi.org/10.3390/app10238349

Chicago/Turabian Style

Yeh, Wei-Chang, and Chia-Chen Kuo. 2020. "Predicting and Modeling Wildfire Propagation Areas with BAT and Maximum-State PageRank" Applied Sciences 10, no. 23: 8349. https://doi.org/10.3390/app10238349

APA Style

Yeh, W. -C., & Kuo, C. -C. (2020). Predicting and Modeling Wildfire Propagation Areas with BAT and Maximum-State PageRank. Applied Sciences, 10(23), 8349. https://doi.org/10.3390/app10238349

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop