Multitarget Tracking Using Virtual Measurement of Binary Sensor Networks

Size: px
Start display at page:

Download "Multitarget Tracking Using Virtual Measurement of Binary Sensor Networks"

Transcription

1 Multitarget Tracking Using Virtual Measurement of Binary Sensor Networks Xuezhi Wang Melbourne Systems Laboratory Department of Electrical & Electronics University of Melbourne Australia Bill Moran Melbourne Systems Laboratory Department of Electrical & Electronics University of Melbourne Australia Abstract - Networks of small low-cost sensors for target tracking are becoming increasingly important for many applications. A major problem is that these small sensors usually have limited observability due to power constraints and the transition between sensor observation and target states is nonlinear. As a consequence, nonlinear filtering techniques, such as particle filtering, are often chosen by researchers in this context. We focus on a network of sensors where each sensor provides binary data at each epoch: target present or target absent. At this point it is not clear that existing approaches can effectively handle the tracking of multiple targets using such networks. In addition, algorithmic computational complexity is an issue if particle filters are used. In this paper, we present a new method, the Virtual Measurement (VM) approach, for multi-target tracking using distributed binary sensor networks. The central idea of this approach is to define a mapping between the space of binary sensor observations and the so-called VM space, such that, any point within a VM space is a transform of the target state, as if it were generated by an equivalent large sensor. With VMs, conventional multi-target tracking (MTT) algorithms can be used in a straightforward way for tracking multiple targets over the sensing field of binary sensor networks. Computer simulated examples of MTT demonstrate the effectiveness and robustness of the VM approach. Keywords: Multi-target tracking, Integrated Sensing and Processing (ISP), Binary sensor networks, Virtual Measurement (VM) Approach, Wireless Communications. 1 Introduction The application of distributed sensor networks to multitarget tracking can be seen as a benchmark in the achievement of Integrated (or Collaborative [1]) Sensing Processing (ISP). Sensor nodes equipped with wireless communication facilities (which are popularly called as smart dust or motes ), constrained by cost and size, usually have limited sensing ability, computing capability and low reliability. Research on methods and algorithms that can extract sufficient target information This work was supported in part by the Defense Advanced Research Projects Agency of the US Department of Defense and was monitored by the Office of Naval Research under Contract No. N14-4-C-437. from (distributed) sensor detections of such networks and thus estimate target states are clearly crucial to the development of these low cost sensor networks [1, 2]. One of the fundamental study areas on information processing is ISP through the class of binary sensor networks. A binary sensor network, perhaps, is the simplest prototype of sensor networks that can be used for target tracking. The sensor system we have in mind is comprised of a binary sensors as nodes in a communicating network, where each node serves as an event detector (e.g., a target enters an area or not, a target is approaching or departing), and generates and transmits one bit new information after every detection. Clearly, under the binary sensor model, individual sensors of the network have very limited observability with respect to target states apart from nonlinearity between what a sensor may observed and the target state of interest. In contrast to the use of large sensors 1, as mentioned in [1], distributed target tracking using binary sensors gives rise to many challenges to conventional target tracking techniques, in particular, to the way that target information is acquired. A number of approaches have been proposed in recent years, such as those in [3, 4, 5]. In these approaches, different ISP techniques were used to extract target information from multiple binary sensors under different assumptions. Target tracking is performed in a central structured sensor network segment, where a base station (or a dominant sensor node) collects and processes information from all sensors and provides the estimate of target state within each data sampling period. Among most existing approaches, a common theme is the particle filtering technique [6] which plays a central role for recovering information from highly compressed sensor data and thus provides an estimate of target state. It is important to bear in mind that while the use of particle filters may effectively solve the nonlinear estimation problem for small sensors, it also requires considerable computation compared to the use of linear estimation algorithms. To this end, it may not be appropriate for some applications using motes. Moreover, the use of particle filters for multi-target tracking problem is an ongoing research issue [7]. Therefore, the extension of existing approaches to handle multi-target tracking is 1 A single large sensor, such as a radar, can cover an entire surveillance region. Small sensors, such as motes, usually have significantly shorter sensing ranges and the surveillance region may only be filled by the deployment of many of them.

2 not trivial. In this paper, we present a new method: the virtual measurement (VM) approach, for multi-target tracking using distributed binary sensor networks. As in [5], we assume that binary sensors are deployed so as to cover the entire area of interest and their sensing ranges and locations are known to the base station. At each data sampling time, activated sensors signal the base station via wireless communications. The central idea is to define a mapping between the space of binary sensor observations and a space, called VM space, such that, a point within the VM space is a transform of a target state, as if it were generated by an equivalent large sensor. With VMs, conventional MTT algorithms can be used in a straightforward manner for the tracking of multiple targets over the sensing field of binary sensor networks. We believe that one of the reasons that existing approaches have been limited to single target tracking is that the ISP has failed to extract information that can lead to identification of multiple targets from a collection of sensor detections. In the VM approach, this information is extracted by clustering the collection of activated sensors into Independently Activated Sensor Groups (IASG), which is one of the contributions of this paper. An important property of the proposed method is that the uncertainty/noise associated with sensor detections, sensing radius, sensor locations can be reflected by the uncertainties of the assigned VMs. The latter can be effectively handled by techniques of multi-target tracking in clutter. The reminder of the paper is organized as follows. The problem of multi-target tracking in binary sensor networks is formulated in Section 2. The VM approach is presented in Section 3, where some important concepts, related algorithms, practical issues and solutions are discussed. In Section 5, we demonstrate the robustness and effectiveness, and highlight some properties of the proposed VM approach with a computer simulated scenario. Section 6 concludes the paper. 2 Problem Description Consider a 2D sensor network, comprised of a set of N passive sensors (motes) and a base station and it is used to track moving targets intruding into an area of interest. The base station is essentially a sensor (or mote) node capable of performing target tracking and exchanging information with other networks (segments). The sensors, which have sensing ranges R i at locations r i, i = 1,2,,N, are distributed to cover the area of interest with overlapping sensing fields. We assume n targets with states x j [position, velocity, ], j = 1,2,,n are present. The jth target trajectory may be modeled as a Markov process, x j k+1 = f(k,xj k,uj k ) + wj k j = 1,2,,n (1) where f is the state transition function, u is an input parameter for target dynamics and w is process noise. All noises are assumed independent. Target detection of the ith of N sensors is a binary output based on the model z i k = h(k, Hx j k r i ) + v i k, j = 1,2,,n (2) where H is a transition matrix, vk i is a noise term to account for uncertainties associated with sensor location, target location, sensing range and the environment of the sensor field, etc. In particular, { zk i 1, with PD 1, if Hx j = k r i R i, otherwise j = 1,2,,n (3) If the output of the ith sensor is equal to 1, we say that the ith sensor is activated. At each time k, the base station collects sensor detection outputs Z k = {z 1 k,z2 k, } from all activated sensors. The problem is to estimate the target states, conditioned on all available prior information and sensor detections up to time k collected by the base station; that is, to find the conditional posterior densities p(x j k Z k,z k 1, ), j = 1,2,,n (4) (4) has a close form solution only in very particular cases, such as the linear-gaussian case where x is Gaussian and z is a linear transformation of x. 3 Virtual Measurement Approach Sensor observation space Z Multiple targets Target location space S IASG space 1:1 * * * * * * * * * * * * * * ** * * * * * * * * * * * VM space Figure 1: Illustration of the proposed ISP process. As illustrated in Figure 1, in the VM approach we consider the ISP process as following mapping X = Z = S = Y (5) where X is target position vector space, Z signifies the (joint) sensor observation (i.e., binary vector) space, Y X is a discrete set and S is another binary vector space which bridges Z and Y. The key idea of the VM approach is to find the mapping, i.e., Z = Y X (6) such that for a given collection of activated sensors Z k = {zk 1,z2 k, } Z we can allocate a set of points Y k = {yk 1,y2 k,, } Y, where the space Y is a transform of the target state space X and is finite and discrete (since sensor observation space is finite).

3 If the mapping (6) is constructed, for each collection of sensor detections Z k, we can uniquely find a set Y k as described above. Using the time sequence Y k = {Y 1,Y 2,,Y k } Y, Y k = {yk 1,y2 k,, }, the MTT is able to apply a conventional technique of MTT in clutter [8]. A point y in the space of Y X is called a virtual measurement since it is not what sensor directly observes. Next, we show that with following defined conditions and assumptions, we can determine the mapping (6), i.e., Z = Y. In particular, that mapping is unique (1:1) for single target case. In the multiple target case, it is not unique, but it does include the information of all possible target locations, while the mapping uncertainty due to the presence of multi-target and clutter may be resolved via a conventional multi-target tracker. 3.1 Preliminaries First, we make several minimal assumptions for the sensor network to permit us to establish the theory of the VM approach. These assumptions are not fundamental to the VM approach and how our method can be extended to cope with the relaxing of them is discussed later. Assumptions 1 Target within the sensing area of a sensor will always be detected; that is, the probability of detection P D = 1 for all sensors. There is no sensor failure. Assumptions 2 All sensors are stationary and their locations r i and sensing ranges R i, i = 1,2,,N are known to the base station. Assumptions 3 There are no false detections. Definition 1 Distinct Sensing Region (DSR): A DSR is a particular sensing region in the region covered by a sensor network. It is distinguished from other sensing regions in one or more of the following: 1) the particular sensor detection regions overlapped, 2) its location, and 3) its size. With respect to a target location, the DSR is the smallest resolution cell that may be achieved with the given sensor distribution. Within a DSR, a target position cannot be further resolved via sensor detections. Figure 2 shows a DSR described by 2 sensors. If the sensing region of a sensor does not overlap with sensing regions of any other sensors, the DSR is just the detection region of that sensor. Definition 2 Virtual Measurement (VM): An VM is a random variable of sample space corresponding to a DSR. The collection of all VMs in the region of interest composes VM space. In this work, we assume the distribution of a VM to be a truncate Gaussian with mean at the center and standard deviation equal to to half of the maximum span of that DSR. In the example of Figure 2, we have V M N(Y,S), Y = [x,y], S = [ V 2 x V 2 y Definition 3 Independently Activated Sensor Group (IASG): An IASG is the largest set of activated sensors (or sensor cluster) at a sampling time, in which all members share a common DSR. ]. sensing boundaries Vy Vx overlapped sensing area Y = (x, y) Figure 2: A DSR is represented by a VM. In other words, an IASG is the largest set of sensors which may be triggered by a single point target 2. Note that an IASG may contain a single sensor if part of its sensing region is not overlapped by that of any other sensors (e.g., sensors 7, 5, and 9 in Figure 3, which correspond the regions A 2,A 4 and A 5 respectively). The IASG is an important concept for the VM approach and is a key to resolving those sensor detections due to multi-target trajectories. An example is A5 A A Figure 3: Example of IASGs: presented in Figure 3, where a region covered by total 13 sensors with sensing ranges indicated by circles. At the time of data collection, sensors 5,6,7,9,1 are activated (excited). According to IASG definition, we can identify 5 IASGs in this case as shown in Table 3.1. In Table 3.1: IASGs for Figure 3 IASG Index Sensor Index DSR 1 5, 6, 9, 1 A 1 2 6, 7, 1 A A A A 5 other words, in the case in Figure 3 the IASG definition implicitly assumes that there are 5 possible (target) sources located in the regions of A 1,A 2, A 3, A 4 and A 5 respectively and sensors 5,6,7,9,1 are excited by these or part of these sources at the time of data collection. 2 If the cross section of a target is less than or equal to the sensor resolution cell, sensors can only generate a single point measurement for target detection. We assume the target as a point target in this sense. 11 A3 A2

4 Having the concepts of DSR, VM and IASG, we may state the following assertion that lay down the foundation of the VM approach. Theorem 1 For a given binary sensor network configured based on Assumptions 1, 2 and 3, the IASG space is determined. The number of different IASGs which comprise the IASG space (see Figure 1) is equal to the number of DSRs (and thus to that of VMs). The mapping between the IASG space (S) and VM space (Y) is a one-to-one mapping. Theorem 2 If that target sources are well separated 3, the space of sensor observation (Z) and the space of IASG (S) are identical. The proofs of Theorems 1 and 2 are obvious and thus we omit them. 3.2 VM Approach As we pointed out earlier, a locally centralized sensor network is assumed to cover the region of interest. In the case of tracking a single target under perfect sensing condition, at each time, the base station collects data from activated sensors and identifies the index of the IASG. A VM that correspond to that IASG is then assigned to a linear estimation algorithm for updating the underlying target state estimate. Similar process can be expected for tracking multiple well separated targets over the sensor network. For tracking multiple targets which are closely spaced, uncertainties will arise in the VM domain. From the set of activated sensors multiple IASGs may be identified as to cover all possibilities of the sensor excitement due to multiple target sources and additional VMs will be assigned. Such a situation may be explained using the example of Figure 3, where sensors 5,6,7,9 and 1 are activated. 5 IASGs can be identified as in Table 3.1 to cover total 13 possibilities where targets of numbers between 2 5 may be present as listed in Table 3.2. In fact, 5 VMs that correspond to those IASGs have to be assigned although some of them may not originated from any of the unknown number of targets (i.e., they are false measurements). This is the exactly the same situation as in conventional multi-target tracking in clutter. Clearly, a data association mechanism is required to provide measurement-to-track association. Many data association techniques are available in the literature [9]. Among them, the well known probabilistic data association (PDA) technique [1] yields much better tracking performance, while it has only mildly increased computational requirements when compared to a Kalman type filter [8]. The key idea of PDA technique is to use the probabilistic average of all measurements (in side the tracking gate) to update the underlying track. A variety of algorithms for conventional multi-target tracking in clutter are based on the PDA technique [11], such as the one we used in the simulation software package. 3 In the situation where any sensor in the network can only be triggered by at most a single target source, we say, the target sources are well saperated. Table 3.2: Possibilities of Multiple Targets Index DSRs of target sources No. Targets 1 A 1,A 2 A 3,A 4,A A 1,A 3,A 2,A4 4 3 A 1,A 3,A 2,A A 1,A 3,A 4,A A 1,A 3,A A 1,A 3,A A 1,A 3,A A 1,A 3,A A 1,A 2,A A 1,A 2,A A 3,A 4,A A 1,A A 1,A 3 2 Same as conventional MTT, the PDA will treat alternative VMs as clutter (though they are not uniformly distributed in a track gate). It should be mentioned that for each given IASG, we need to work out the area and the center of its own DSR and this may be computational demanding when the number of IASGs is large. However, this work can be done offline for all VMs if sensors are stationary. In fact, we have included this process into the network initialization phase. Network Initialization Sensor Detection Collection Virtual Measurement Space Virtual Measurement Assignment Multitarget Tracking Figure 4: The idea of the proposed approach. In summary, as shown in Figure 4, the VM approach consists of following 2 processes: 1. Network Initialization obtain VM space (algorithm) based on Assumptions 1, 2 and 3. This process should be done during the network set up phase. 2. Target Tracking on line estimation of the states of all targets in the region covered by the sensor network based on the collection of binary sensor detections. At each epoch, on receiving data, the algorithm performs following 2 tasks: (a) Identify IASGs, and assign VMs accordingly; (b) Conventional multi-target tracking in clutter using the assigned VMs. 3.3 Algorithms The VM approach for target tracking requires the following algorithms: Network Initialization any method that can compute the centers and maximum spans of all DSRs for the local sensor network can be used. In our demonstration program, we implemented the network initialization using a 2D grid search. All VMs computed are stored into a database.

5 IASG Identification: Algorithm is implemented based on the Definition 3. Specifically, sensor s i and sensor s j are said to be in same IASG if and only if If r i r j (R i + R j ), i,j, i j (7) r i r j > (R i + R j ), j, i j (8) for entire or part of the sensing region of sensor s i, it will form an IASG on its own. VM Assignment For each identified IASG, assign the corresponding VM from the VM space (database) to the tracker. The VM assignment algorithm that follows from Theorem 1 is called an exact VM assignment (EVMA) algorithm. Tracker Any conventional multi-target tracking in clutter algorithms, such as, Linear Multitarget Integrated Probabilistic Data Association (LMIPDA) [12], Joint Integrated Probabilistic Data Association (JIPDA) [13], or simply the Integrated Probabilistic Data Association (IPDA) [14]. More reference can be found in [15, 16]. In our demonstration program, we implemented a LMIPDA tracker that includes automatic track formation [17] and maintenance [18] features. 4 Practical Issues and Solutions The method we described in the last section rests on the Assumptions 1, 2 and 3. In reality, sensors may fail to function or have detection probabilities 4 less than unit, i.e., P D < 1. Furthermore, both sensor locations and sensing boundaries may not be exactly known to the base station. The impact of these facts to the VM approach for target tracking and solutions are discussed in this section. 4.1 The Impact P D < 1 may lead a sensor to miss detection when a target is presented in its sensing field and thus miss a VM assignment to tracker. This is because that the IASGs identified according to the collection of activated sensors may not correspond to any VM in the VM space predefined when individual sensor P D < 1. Nevertheless, the problem of missing VMs can be handled by the tracker as if the overall detection probability of the equivalent sensor less than unit. The probability of missing target detection can be even higher if a DSR overlaps more than one sensor region. For example, if we assume identical detection probabilities, i.e., P D =.6 for all sensors, then for a DSR covered by a single sensor, the probability of missing VM assignment is 1 P D =.4; for a DSR covered by two sensors, the probability of missing VM assignment becomes 4 It may be more appropriate to model the detection probability as a function of relative distance to target. However, we will assume in this work that the detection probability of a sensor is a constant within its sensing range. 2(1 P D )P D + (1 P D ) 2 =.64. Higher probability of missing target measurements will lead to correspondingly higher probability of track loss. In the VM approach, we model the uncertainties of both sensor location r i and sensing boundary R i, i = 1,2,,N as zero-mean Gaussian noise. In particular, the measured location ˆr i and sensing range ˆRi of sensor s i are given by ˆr i = r i + r i r i N (, σ ri ) (9) ˆR i = R i + R i Ri N (, σ Ri ) (1) where r i and R i represent the exact sensor location and sensing range of sensor s i. As with the case of P D < 1, the existence of uncertainties both for sensor location and sensing range may lead to missed VM assignments. Because an IASG identified via (7) using ˆr i and ˆR i may not correspond to any VM in the VM space generated using r i and R i. Sensor failure can be seen as a special case of PD < 1. (When a large amount of sensor faults occurs, network should be re-initialized.) 4.2 Solution We assume that a target with state position component x k has entered into a DSR, denoted as DSR yj which corresponds to the jth VM, denoted as y j, at time k. If the detection probabilities of individual sensors, i.e., P D1,P D2,,P DN, are known, we may compute the following two conditional probabilities: the probability that the target will be detected, and the probability that a VM is assigned given that x k DSR yj, i.e., and P(y j x k DSR yj ) (11) P(the target will be detected x k DSR yj ) (12) Figure 5 is a plot of these two probabilities versus sensor P D for a DSR overlapped by 1,2,3,4 and 5 sensors respectively and we assume an identical P D for all sensors. Note that the probabilities (11) and (12) are equal to 1 if the P Di 1, i = 1,2,,N and this requires Assumptions 1, 2 and 3 to be hold. It is interesting that these two probabilities fall at different rates as sensor detection probability P D decreases and the DSR is overlapped by more than one sensor. The probability that a VM which corresponds to the DSR is assigned falls rapidly. In other words, the probability that the tracker is missing a VM rises quickly, while the probability that the target is detected (within a DSR) declines more slowly. As more sensors are involved, the difference between these two rates becomes larger. As a benefit of ISP, there will be a higher probability that a target is detected when the target is in a DSR covered by multiple sensors, even if the detection probabilities of these sensors are low. Motivated by this observation, we have developed another VM assignment algorithm, called the mixed VM Assignment (MVMA) algorithm, to reduce the probability of track loss when P D < 1.

6 IASG2 IASG3 the sensing range noise. We assume that the detection probability P D of these passive sensors is constant over sensing field (although it can be modeled as a function of the distance between sensor and target). IASG4.6 IASG5.5 P(target is detected x DSA yi ) P(y i x DSA yi ) Sensor PD Figure 5: The probability of a target is detected and the probability that a VM is assigned given x k DSR yj versus sensor P D. IASG Identification Figure 7: 1 motes distributed over m 2, where circles indicate the sensing boundaries. Is this IASG Registered? Yes VM Assignment No Pseudo VM Assignment The computed VM space that corresponds to the sensor network of Figure 7 is shown in Figure 8 (light blue stars). MTT Tracker Figure 6: Flowchart of the Mixed VM Assignment Algorithm. As illustrated in Figure 6, the MVMA will perform EVMA if a VM that corresponds to the identified IASG is found in the database (established during the network initialization phase), otherwise, it performs a pseudo- VM assignment algorithm. The pseudo-vm assignment algorithm computes the average location of those sensors in the IASG and treat it as a VM with standard deviation R m, where R m = max R i and R i,i = 1,2, are the sensing ranges of those sensors in the IASG. Clearly, the EVMA is a special case of MVMA. In general, MVMA algorithm can be used for all situation to replace EVMA algorithm. However, in some cases, such as tracking crossing targets, MVMA may assign unnecessary VMs, which may generate additional ambiguities for measurement-to-track association, to a tracker. 5 Demonstrative Results In this section, we present some statistical results from the target tracking perspective to demonstrate the effectiveness of the VM method. The results are based on the scenario described below. 1 motes are equally spaced over the area of m 2 with location offset uniformly distributed in [,2] m (see Figure 7). The sensing radius of individual sensors is 1 meters with boundary noise N(,B 2 ), where B is the standard deviation of Figure 8: Illustration of the set of VMs (VM space) after network initialization (light blue starts). Target motion is described by x k+1 = Fx k + Gw(k) (13) and the state of target can be observed according to y k = Hx k + v k (14) where x k is the target state, a 4 components vector that includes target position and velocity in a 2D Cartesian coordinate system, at time k, y k is the VM assigned at time k, F, H and G are known transition matrices given in [15] with sampling interval being T = 1 (sec). As in [8], the system process noise and observation noise are assumed to be Gaussian, i.e., w k N(, Q k ) and v k N(, S k ), Q k = GG q 2, q =.5 and S k is determined by VM assigned at k. A multi-target tracker based on the linear multitarget integrated probabilistic data association (LMIPDA) algorithm [12] is implemented for the simulation.

7 Table 5: Tracking Performance Statistics P D B (m) Track Loss (%) Algorithm.9 EVMA.9 MVMA.9 3 EVMA.9 3 MVMA.5 75 EVMA.5 21 MVMA EVMA MVMA RMS Position Error RMS Performance with MVMA Algorithm PD =.9, B = PD =.5, B = PD =.5, B = 3 PD =.9, B = Scan 1 Monte Carlo runs were carried out for a single target tracking case. Table 5 listed the tracking performance statistics in terms of percentage of track loss in different cases and using different VM assignment algorithms. Figure 9 is the distribution of VMs assigned versus target true position. The root-mean-squared (RMS) errors of confirmed track in different cases are shown in Figure 1. Note that, a track is confirmed only if the value of its probability of target existence exceeds the track confirmation threshold. A track will be terminated if the value of its probability of target existence is below this threshold. We claim a track loss if a track has been terminated or has not been updated for 1 consecutive scans. It is evident that in multi-target tracking environments, tracking performance is dependend on the measurement-to-track association method used, and this varies across tracking algorithms. (While the performance of measurement-to-track association really depends on what MTT algorithm is used.) Figure 11 illustrates an example of tracking 2 crossing targets based on LMIPDA tracker. Figure 1: RMS position error performance comparison under diverse noise conditions. Tracking 2 Crossing Target Using a Sensor Network of 1 Motes T 5 (a) Half Way of Tracks T2 and T5 at 17 th Scan. T 2 T 116 T 2 T 5 (b) Tracks T2 and T5 after Crossing at 4 Scans. 18 Measurements X 18 Measurements Y Figure 11: Example of tracking 2 crossing targets: (a) Before crossing. (b) after crossing. Confirmed track thick line, tentative track thin line, VM circle Figure 9: Statistical distribution of VMs versus ground truth. Result discussion: The effectiveness of the VM approach is multi-fold. Firstly, it solves multi-target tracking problem over a binary sensor network of wireless motes which are constrained with power and bandwidth. Secondly, for stationary sensors, the most significant computations required by the VM approach can be allocated into the network initialization stage while the computational complexity for on-line tracking varies according to the choice of MTT algorithm, the number of targets involved, etc. Usually a satisfactory compromise for mote application can be achieved. Thirdly, the method takes into account uncertainties that related to sensor location, sensing radius and detection probability. The statistical distribution of the time sequence of VMs to target truth approximates a (zero-mean) Gaussian distribution (see Figure 9). The MVMA algorithm outperforms EVMA both in low P D and more densely distributed motes. In particular, MVMA will be identical to EVMA when perfect detection condition (P D = 1 and no sensor failure) is present. Nevertheless, when closely spaced multiple targets are present, MVMA may yield additional ambiguities by assigning additional VMs, which sometime can lead to track-swap. While advanced MTT algorithms such as multiple hypotheses tracker (MHT) [19], joint IPDA [13] may improve tracking performance (at the cost of yielding additional computational complexity), the tracking error of the VM approach will also depends

8 on the quality of VMs which in turn depend on the size of the associated DSRs. The more motes deployed (uniformly) into an area, the smaller the size of the DSRs will be and the smaller the tracking error can be achieved. Track loss may be reduced by increasing the process noise level of the tracker at the cost of larger tracking errors. In our simulation statistics of the examples, the average target-originated track confirmation requires 4 consecutive (target supporting) measurements as seen in Figure 1. This renders an indication for network design on the minimum number of motes needed to cover a region of interest for this case. 6 Conclusion In this paper, we propose a new method: the VM approach for multi-target tracking using energy and cost constrained, distributed binary sensor networks. A simple sensor model is assumed; that is, each sensor of the network will transmit a 1 if a target is entering its sensing region. At each sampling time, a set of sensor detections are mapped into a set VMs that correspond to target states. The mapping process fundamentally involves no information loss under perfect sensing conditions and may generate uncertainties in the VM domain if noise is present. Consequently, the technique of conventional multi-target tracking in clutter can be straightforwardly used to update tracks using these VMs. The VM concepts, the ISP technique used, the effectiveness and robustness of the proposed method are demonstrated via simulated examples of target tracking using motes. References [1] C. -Y. Chong, and S. P. Kumar. Sensor Networks: Evolution, Opportunities, and Challenges, Proc. of the IEEE, vol. 91, no. 8, pp , August 23. [2] I. F. Akyildiz, W. Su. Y. Sankarasubramaniam and E. Cayirci. A Survey on Sensor Networks, IEEE Communications Magazine, pp , August 22. [3] J. Aslam, Z. Butler, F. Constantin, V.Crespi, G.Cybenko, and D. Rus. Tracking a moving object with a binary sensor network, in the Proceedings of the First International Conference on Embeded Networked Sensor Systems, Los Angeles, CA, USA, 23, pp [4] K. Mechitov, S. Sundresh, Y. Kwon, and G. Agha. Cooperative tracking with binary-detection sensor networks, Technical Report UIUCDCS-R , University of Illinois at Urbana-Champaign, September 23. [5] P. M. Djuric, M. Vemula, and M. F. Bugallo. Signal processing by particle filtering for binary sensor networks, Proceedings of the 24 IEEE 11th Digital Signal Processing Workshop & IEEE Signal Processing Education Workshop, pp , 24. [6] A. Doucet, N. J. Gordon, and V.Krishnamurthy. Particle Filter for State Estimation of Jump Markov Linear Systems, Proceedings of Signal Processing, vol. 49, no. 3, pp , March 21. [7] M.R. Morelande and S.Challa. Maneuvering target tracking in clutter using particle filters, IEEE Trans. on AES, vol. 41, no. 1, pp , 25. [8] Y. Bar-Shalom, and T. E. Fortmann. Tracking and Data Association, Academic Press, [9] X. Wang, and D. Musǐcki. A Literature Review of Data Association Techniques for Target Tracking, Technical report to MOD,DSTO, University of Melbourne, Australia, March 25. [1] Y. Bar-Shalom, and E. Tse. Tracking in a Cluttered Environment With Probabilistic Data Association, Automatica, vol. 11, pp , [11] T.Kirubarajan, and Y. Bar-Shalom. Probabilistic data association techniques for target tracking in clutter, Proceedings of the IEEE, Vol. 92, No. 3 pp , March 24. [12] Darko Mušicki, Barbara La Scala, and Robin Evans. Multi-target tracking in clutter without measurement assignment. In 43rd IEEE Conference on Decision and Control, CDC 24, Atlantis, Paradise Island, Bahamas, December 24. [13] Mušicki, Darko and Evans, Robin. Joint integrated probabilistic data association - JIPDA, IEEE Trans. Aerospace Electronic Systems, vol. 4, no. 3, pp , July, 24. [14] D. Mušicki, R. J. Evans, and S. Stanković. Integrated Probabilistic Data Association, IEEE Trans. Auto. Control, Vol. 39, no. 6, pp , June [15] Y. Bar-Shalom, and X.-R. Li. Multitarget- Multisensor Tracking: Principles and Techniques, ISSN , YBS Publishing, [16] Y. Bar-Shalom, and W. D. Blair. Multitarget- Multisensor Tracking: Applications and Advances, Volume III Ed, Artech House, 2. [17] Y. Bar-Shalom, K. C. Chang, and H. A. P. Blom. Automatic Track Formation in Clutter with a Recursive Algorithm, in Multitarget- Multisensor Tracking: Advanced Applications, pp , Artech House, MA., 199. [18] X. Wang, and D. Mušicki. Low Elevation Sea- Surface Target Tracking Using IPDA Type Filters, in Proceedings of Radar 23 International Conference, Adelaide, Australia, September, 23, pp [19] S. Blackman. Multiple hypothesis tracking for multiple target tracking, IEEE AES Magazine, vol. 19, no. 1, pp. 5 18, January 24.

Dynamically Configured Waveform-Agile Sensor Systems

Dynamically Configured Waveform-Agile Sensor Systems Dynamically Configured Waveform-Agile Sensor Systems Antonia Papandreou-Suppappola in collaboration with D. Morrell, D. Cochran, S. Sira, A. Chhetri Arizona State University June 27, 2006 Supported by

More information

REAL TIME INDOOR TRACKING OF TAGGED OBJECTS WITH A NETWORK OF RFID READERS

REAL TIME INDOOR TRACKING OF TAGGED OBJECTS WITH A NETWORK OF RFID READERS th European Signal Processing Conference (EUSIPCO ) Bucharest, Romania, August 7 -, REAL TIME INDOOR TRACKING OF TAGGED OBJECTS WITH A NETWORK OF RFID READERS Li Geng, Mónica F. Bugallo, Akshay Athalye,

More information

Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target

Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target 14th International Conference on Information Fusion Chicago, Illinois, USA, July -8, 11 Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target Mark Silbert and Core

More information

Comparison of Two Detection Combination Algorithms for Phased Array Radars

Comparison of Two Detection Combination Algorithms for Phased Array Radars Comparison of Two Detection Combination Algorithms for Phased Array Radars Zhen Ding and Peter Moo Wide Area Surveillance Radar Group Radar Sensing and Exploitation Section Defence R&D Canada Ottawa, Canada

More information

Integrated Detection and Tracking in Multistatic Sonar

Integrated Detection and Tracking in Multistatic Sonar Stefano Coraluppi Reconnaissance, Surveillance, and Networks Department NATO Undersea Research Centre Viale San Bartolomeo 400 19138 La Spezia ITALY coraluppi@nurc.nato.int ABSTRACT An ongoing research

More information

Performance Analysis of Adaptive Probabilistic Multi-Hypothesis Tracking With the Metron Data Sets

Performance Analysis of Adaptive Probabilistic Multi-Hypothesis Tracking With the Metron Data Sets 14th International Conference on Information Fusion Chicago, Illinois, USA, July 5-8, 2011 Performance Analysis of Adaptive Probabilistic Multi-Hypothesis Tracking With the Metron Data Sets Dr. Christian

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Data Fusion with ML-PMHT for Very Low SNR Track Detection in an OTHR

Data Fusion with ML-PMHT for Very Low SNR Track Detection in an OTHR 18th International Conference on Information Fusion Washington, DC - July 6-9, 215 Data Fusion with ML-PMHT for Very Low SNR Track Detection in an OTHR Kevin Romeo, Yaakov Bar-Shalom, and Peter Willett

More information

INDOOR USER ZONING AND TRACKING IN PASSIVE INFRARED SENSING SYSTEMS. Gianluca Monaci, Ashish Pandharipande

INDOOR USER ZONING AND TRACKING IN PASSIVE INFRARED SENSING SYSTEMS. Gianluca Monaci, Ashish Pandharipande 20th European Signal Processing Conference (EUSIPCO 2012) Bucharest, Romania, August 27-31, 2012 INDOOR USER ZONING AND TRACKING IN PASSIVE INFRARED SENSING SYSTEMS Gianluca Monaci, Ashish Pandharipande

More information

Radar / ADS-B data fusion architecture for experimentation purpose

Radar / ADS-B data fusion architecture for experimentation purpose Radar / ADS-B data fusion architecture for experimentation purpose O. Baud THALES 19, rue de la Fontaine 93 BAGNEUX FRANCE olivier.baud@thalesatm.com N. Honore THALES 19, rue de la Fontaine 93 BAGNEUX

More information

Artificial Beacons with RGB-D Environment Mapping for Indoor Mobile Robot Localization

Artificial Beacons with RGB-D Environment Mapping for Indoor Mobile Robot Localization Sensors and Materials, Vol. 28, No. 6 (2016) 695 705 MYU Tokyo 695 S & M 1227 Artificial Beacons with RGB-D Environment Mapping for Indoor Mobile Robot Localization Chun-Chi Lai and Kuo-Lan Su * Department

More information

Waveform Libraries for Radar Tracking Applications: Maneuvering Targets

Waveform Libraries for Radar Tracking Applications: Maneuvering Targets Waveform Libraries for Radar Tracking Applications: Maneuvering Targets S. Suvorova and S. D. Howard Defence Science and Technology Organisation, PO BOX 1500, Edinburgh 5111, Australia W. Moran and R.

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

16 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004

16 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004 16 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004 Tracking a Maneuvering Target Using Neural Fuzzy Network Fun-Bin Duh and Chin-Teng Lin, Senior Member,

More information

Self Localization Using A Modulated Acoustic Chirp

Self Localization Using A Modulated Acoustic Chirp Self Localization Using A Modulated Acoustic Chirp Brian P. Flanagan The MITRE Corporation, 7515 Colshire Dr., McLean, VA 2212, USA; bflan@mitre.org ABSTRACT This paper describes a robust self localization

More information

A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity

A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity 1970 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 12, DECEMBER 2003 A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity Jie Luo, Member, IEEE, Krishna R. Pattipati,

More information

AWIRELESS sensor network (WSN) employs low-cost

AWIRELESS sensor network (WSN) employs low-cost IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 5, MAY 2009 1987 Tracking in Wireless Sensor Networks Using Particle Filtering: Physical Layer Considerations Onur Ozdemir, Student Member, IEEE, Ruixin

More information

Adaptive Control and Reconfiguration of Mobile Wireless Sensor Networks for Dynamic Multi-Target Tracking Xi Zhang, Senior Member, IEEE

Adaptive Control and Reconfiguration of Mobile Wireless Sensor Networks for Dynamic Multi-Target Tracking Xi Zhang, Senior Member, IEEE IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 56, NO. 10, OCTOBER 2011 2429 Adaptive Control and Reconfiguration of Mobile Wireless Sensor Networks for Dynamic Multi-Target Tracking Xi Zhang, Senior Member,

More information

On Event Signal Reconstruction in Wireless Sensor Networks

On Event Signal Reconstruction in Wireless Sensor Networks On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle

More information

Cubature Kalman Filtering: Theory & Applications

Cubature Kalman Filtering: Theory & Applications Cubature Kalman Filtering: Theory & Applications I. (Haran) Arasaratnam Advisor: Professor Simon Haykin Cognitive Systems Laboratory McMaster University April 6, 2009 Haran (McMaster) Cubature Filtering

More information

Passive Emitter Geolocation using Agent-based Data Fusion of AOA, TDOA and FDOA Measurements

Passive Emitter Geolocation using Agent-based Data Fusion of AOA, TDOA and FDOA Measurements Passive Emitter Geolocation using Agent-based Data Fusion of AOA, TDOA and FDOA Measurements Alex Mikhalev and Richard Ormondroyd Department of Aerospace Power and Sensors Cranfield University The Defence

More information

VHF Radar Target Detection in the Presence of Clutter *

VHF Radar Target Detection in the Presence of Clutter * BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 1 Sofia 2006 VHF Radar Target Detection in the Presence of Clutter * Boriana Vassileva Institute for Parallel Processing,

More information

DESIGN AND DEVELOPMENT OF A SIGNAL AND DATA PROCESSOR TEST BED FOR A PASSIVE RADAR IN THE FM BAND

DESIGN AND DEVELOPMENT OF A SIGNAL AND DATA PROCESSOR TEST BED FOR A PASSIVE RADAR IN THE FM BAND DESIGN AND DEVELOPMENT OF A SIGNAL AND DATA PROCESSOR TEST BED FOR A PASSIVE RADAR IN THE FM BAND A. Benavoli, L. Chisci*, A. Di Lallo, A. Farina, R. Fulcoli, R. Mancinelli, L. Timmoneri * DSI, Università

More information

MATHEMATICAL MODELS Vol. I - Measurements in Mathematical Modeling and Data Processing - William Moran and Barbara La Scala

MATHEMATICAL MODELS Vol. I - Measurements in Mathematical Modeling and Data Processing - William Moran and Barbara La Scala MEASUREMENTS IN MATEMATICAL MODELING AND DATA PROCESSING William Moran and University of Melbourne, Australia Keywords detection theory, estimation theory, signal processing, hypothesis testing Contents.

More information

Improving histogram test by assuring uniform phase distribution with setting based on a fast sine fit algorithm. Vilmos Pálfi, István Kollár

Improving histogram test by assuring uniform phase distribution with setting based on a fast sine fit algorithm. Vilmos Pálfi, István Kollár 19 th IMEKO TC 4 Symposium and 17 th IWADC Workshop paper 118 Advances in Instrumentation and Sensors Interoperability July 18-19, 2013, Barcelona, Spain. Improving histogram test by assuring uniform phase

More information

Kalman Tracking and Bayesian Detection for Radar RFI Blanking

Kalman Tracking and Bayesian Detection for Radar RFI Blanking Kalman Tracking and Bayesian Detection for Radar RFI Blanking Weizhen Dong, Brian D. Jeffs Department of Electrical and Computer Engineering Brigham Young University J. Richard Fisher National Radio Astronomy

More information

SIGNAL MODEL AND PARAMETER ESTIMATION FOR COLOCATED MIMO RADAR

SIGNAL MODEL AND PARAMETER ESTIMATION FOR COLOCATED MIMO RADAR SIGNAL MODEL AND PARAMETER ESTIMATION FOR COLOCATED MIMO RADAR Moein Ahmadi*, Kamal Mohamed-pour K.N. Toosi University of Technology, Iran.*moein@ee.kntu.ac.ir, kmpour@kntu.ac.ir Keywords: Multiple-input

More information

A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING

A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING Gaurang Mokashi, Hong Huang, Bharath Kuppireddy, and Subin Varghese Klipsch School of Electrical and

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

IT S A COMPLEX WORLD RADAR DEINTERLEAVING. Philip Wilson. Slipstream Engineering Design Ltd.

IT S A COMPLEX WORLD RADAR DEINTERLEAVING. Philip Wilson. Slipstream Engineering Design Ltd. IT S A COMPLEX WORLD RADAR DEINTERLEAVING Philip Wilson pwilson@slipstream-design.co.uk Abstract In this paper, we will look at how digital radar streams of pulse descriptor words are sorted by deinterleaving

More information

A Design of the Matched Filter for the Passive Radar Sensor

A Design of the Matched Filter for the Passive Radar Sensor Proceedings of the 7th WSEAS International Conference on Signal, Speech and Image Processing, Beijing, China, September 15-17, 7 11 A Design of the atched Filter for the Passive Radar Sensor FUIO NISHIYAA

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Non-Data Aided Doppler Shift Estimation for Underwater Acoustic Communication

Non-Data Aided Doppler Shift Estimation for Underwater Acoustic Communication Non-Data Aided Doppler Shift Estimation for Underwater Acoustic Communication (Invited paper) Paul Cotae (Corresponding author) 1,*, Suresh Regmi 1, Ira S. Moskowitz 2 1 University of the District of Columbia,

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

Technischer Bericht TUM. Institut für Informatik. Technische Universität München. Beacon-based Vehicle Tracking in Vehicular Ad-hoc Networks

Technischer Bericht TUM. Institut für Informatik. Technische Universität München. Beacon-based Vehicle Tracking in Vehicular Ad-hoc Networks TUM TECHNISCHE UNIVERSITÄT MÜNCHEN INSTITUT FÜR INFORMATIK Beacon-based Vehicle Tracking in Vehicular Ad-hoc Networks Karim Emara, Wolfgang Woerndl, Johann Schlichter TUM-I1343 Technischer Bericht Technische

More information

On the Estimation of Interleaved Pulse Train Phases

On the Estimation of Interleaved Pulse Train Phases 3420 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 12, DECEMBER 2000 On the Estimation of Interleaved Pulse Train Phases Tanya L. Conroy and John B. Moore, Fellow, IEEE Abstract Some signals are

More information

The Gaussian Mixture Cardinalized PHD Tracker on MSTWG and SEABAR 07 Datasets

The Gaussian Mixture Cardinalized PHD Tracker on MSTWG and SEABAR 07 Datasets 1791 The Gaussian Mixture Cardinalized PHD Tracker on MSTWG and SEABAR 7 Datasets O. Erdinc, P. Willett ECE Department University of Connecticut ozgur, willett @engr.uconn.edu S. Coraluppi NATO Undersea

More information

Outlier-Robust Estimation of GPS Satellite Clock Offsets

Outlier-Robust Estimation of GPS Satellite Clock Offsets Outlier-Robust Estimation of GPS Satellite Clock Offsets Simo Martikainen, Robert Piche and Simo Ali-Löytty Tampere University of Technology. Tampere, Finland Email: simo.martikainen@tut.fi Abstract A

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

TIMA Lab. Research Reports

TIMA Lab. Research Reports ISSN 292-862 TIMA Lab. Research Reports TIMA Laboratory, 46 avenue Félix Viallet, 38 Grenoble France ON-CHIP TESTING OF LINEAR TIME INVARIANT SYSTEMS USING MAXIMUM-LENGTH SEQUENCES Libor Rufer, Emmanuel

More information

ARRAY PROCESSING FOR INTERSECTING CIRCLE RETRIEVAL

ARRAY PROCESSING FOR INTERSECTING CIRCLE RETRIEVAL 16th European Signal Processing Conference (EUSIPCO 28), Lausanne, Switzerland, August 25-29, 28, copyright by EURASIP ARRAY PROCESSING FOR INTERSECTING CIRCLE RETRIEVAL Julien Marot and Salah Bourennane

More information

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,

More information

Bayesian Estimation of Tumours in Breasts Using Microwave Imaging

Bayesian Estimation of Tumours in Breasts Using Microwave Imaging Bayesian Estimation of Tumours in Breasts Using Microwave Imaging Aleksandar Jeremic 1, Elham Khosrowshahli 2 1 Department of Electrical & Computer Engineering McMaster University, Hamilton, ON, Canada

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Frugal Sensing Spectral Analysis from Power Inequalities

Frugal Sensing Spectral Analysis from Power Inequalities Frugal Sensing Spectral Analysis from Power Inequalities Nikos Sidiropoulos Joint work with Omar Mehanna IEEE SPAWC 2013 Plenary, June 17, 2013, Darmstadt, Germany Wideband Spectrum Sensing (for CR/DSM)

More information

Chapter 4 SPEECH ENHANCEMENT

Chapter 4 SPEECH ENHANCEMENT 44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or

More information

TIME encoding of a band-limited function,,

TIME encoding of a band-limited function,, 672 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 8, AUGUST 2006 Time Encoding Machines With Multiplicative Coupling, Feedforward, and Feedback Aurel A. Lazar, Fellow, IEEE

More information

Waveform-Space-Time Adaptive Processing for Distributed Aperture Radars

Waveform-Space-Time Adaptive Processing for Distributed Aperture Radars Waveform-Space-Time Adaptive Processing for Distributed Aperture Radars Raviraj S. Adve, Dept. of Elec. and Comp. Eng., University of Toronto Richard A. Schneible, Stiefvater Consultants, Marcy, NY Gerard

More information

A Steady State Decoupled Kalman Filter Technique for Multiuser Detection

A Steady State Decoupled Kalman Filter Technique for Multiuser Detection A Steady State Decoupled Kalman Filter Technique for Multiuser Detection Brian P. Flanagan and James Dunyak The MITRE Corporation 755 Colshire Dr. McLean, VA 2202, USA Telephone: (703)983-6447 Fax: (703)983-6708

More information

SIGNIFICANT advances in hardware technology have led

SIGNIFICANT advances in hardware technology have led IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 5, SEPTEMBER 2007 2733 Concentric Anchor Beacon Localization Algorithm for Wireless Sensor Networks Vijayanth Vivekanandan and Vincent W. S. Wong,

More information

Femtocell Collaborative Outage Detection (FCOD) with Built-in Sleeping Mode Recovery (SMR) Technique

Femtocell Collaborative Outage Detection (FCOD) with Built-in Sleeping Mode Recovery (SMR) Technique Femtocell Collaborative Outage Detection (FCOD) with Built-in Sleeping Mode Recovery (SMR) Technique Dalia Abouelmaati, Arsalan Saeed, Oluwakayode Onireti, Muhammad Ali Imran, Kamran Arshad Institute for

More information

A Hybrid TDOA/RSSD Geolocation System using the Unscented Kalman Filter

A Hybrid TDOA/RSSD Geolocation System using the Unscented Kalman Filter A Hybrid TDOA/RSSD Geolocation System using the Unscented Kalman Filter Noha El Gemayel, Holger Jäkel and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT, Germany

More information

Resource Allocation in Distributed MIMO Radar for Target Tracking

Resource Allocation in Distributed MIMO Radar for Target Tracking Resource Allocation in Distributed MIMO Radar for Target Tracking Xiyu Song 1,a, Nae Zheng 2,b and Liuyang Gao 3,c 1 Zhengzhou Information Science and Technology Institute, Zhengzhou, China 2 Zhengzhou

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Fault-tolerant Coverage in Dense Wireless Sensor Networks

Fault-tolerant Coverage in Dense Wireless Sensor Networks Fault-tolerant Coverage in Dense Wireless Sensor Networks Akshaye Dhawan and Magdalena Parks Department of Mathematics and Computer Science, Ursinus College, 610 E Main Street, Collegeville, PA, USA {adhawan,

More information

An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method

An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method International Journal of Emerging Trends in Science and Technology DOI: http://dx.doi.org/10.18535/ijetst/v2i8.03 An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon

More information

Bias Correction in Localization Problem. Yiming (Alex) Ji Research School of Information Sciences and Engineering The Australian National University

Bias Correction in Localization Problem. Yiming (Alex) Ji Research School of Information Sciences and Engineering The Australian National University Bias Correction in Localization Problem Yiming (Alex) Ji Research School of Information Sciences and Engineering The Australian National University 1 Collaborators Dr. Changbin (Brad) Yu Professor Brian

More information

Adaptive Correction Method for an OCXO and Investigation of Analytical Cumulative Time Error Upperbound

Adaptive Correction Method for an OCXO and Investigation of Analytical Cumulative Time Error Upperbound Adaptive Correction Method for an OCXO and Investigation of Analytical Cumulative Time Error Upperbound Hui Zhou, Thomas Kunz, Howard Schwartz Abstract Traditional oscillators used in timing modules of

More information

On the GNSS integer ambiguity success rate

On the GNSS integer ambiguity success rate On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity

More information

Perimeter Security Intruder Tracking and Classification Using an Array of Low Cost Ultra- Wideband (UWB) Radars

Perimeter Security Intruder Tracking and Classification Using an Array of Low Cost Ultra- Wideband (UWB) Radars Perimeter Security Intruder Tracking and Classification Using an Array of Low Cost Ultra- Wideband (UWB) Radars Henry Mahler, Brian Flynn Time Domain Corp Huntsville, AL Henry.mahler@timedomain.com Abstract

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

The fundamentals of detection theory

The fundamentals of detection theory Advanced Signal Processing: The fundamentals of detection theory Side 1 of 18 Index of contents: Advanced Signal Processing: The fundamentals of detection theory... 3 1 Problem Statements... 3 2 Detection

More information

Measurement Association for Emitter Geolocation with Two UAVs

Measurement Association for Emitter Geolocation with Two UAVs Measurement Association for Emitter Geolocation with Two UAVs Nicens Oello and Daro Mušici Melbourne Systems Laboratory Department of Electrical and Electronic Engineering University of Melbourne, Parville,

More information

Emitter Location in the Presence of Information Injection

Emitter Location in the Presence of Information Injection in the Presence of Information Injection Lauren M. Huie Mark L. Fowler lauren.huie@rl.af.mil mfowler@binghamton.edu Air Force Research Laboratory, Rome, N.Y. State University of New York at Binghamton,

More information

An SVD Approach for Data Compression in Emitter Location Systems

An SVD Approach for Data Compression in Emitter Location Systems 1 An SVD Approach for Data Compression in Emitter Location Systems Mohammad Pourhomayoun and Mark L. Fowler Abstract In classical TDOA/FDOA emitter location methods, pairs of sensors share the received

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

Performance Analysis of a 1-bit Feedback Beamforming Algorithm

Performance Analysis of a 1-bit Feedback Beamforming Algorithm Performance Analysis of a 1-bit Feedback Beamforming Algorithm Sherman Ng Mark Johnson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2009-161

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios

A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios Noha El Gemayel, Holger Jäkel, Friedrich K. Jondral Karlsruhe Institute of Technology, Germany, {noha.gemayel,holger.jaekel,friedrich.jondral}@kit.edu

More information

Study on the UWB Rader Synchronization Technology

Study on the UWB Rader Synchronization Technology Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

A Closed Form for False Location Injection under Time Difference of Arrival

A Closed Form for False Location Injection under Time Difference of Arrival A Closed Form for False Location Injection under Time Difference of Arrival Lauren M. Huie Mark L. Fowler lauren.huie@rl.af.mil mfowler@binghamton.edu Air Force Research Laboratory, Rome, N Department

More information

Tracking of UWB Multipath Components Using Probability Hypothesis Density Filters

Tracking of UWB Multipath Components Using Probability Hypothesis Density Filters Tracking of UWB Multipath Components Using Probability Hypothesis Density Filters Markus Froehle, Paul Meissner and Klaus Witrisal Graz University of Technology, Graz, Austria. Email: {froehle, paul.meissner,

More information

124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997

124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997 124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997 Blind Adaptive Interference Suppression for the Near-Far Resistant Acquisition and Demodulation of Direct-Sequence CDMA Signals

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Effective Data Association Algorithms for. Multitarget Tracking

Effective Data Association Algorithms for. Multitarget Tracking Effective Data Association Algorithms for Multitarget Tracking EFFECTIVE DATA ASSOCIATION ALGORITHMS FOR MULTITARGET TRACKING BY BIRUK K. HABTEMARIAM, B.Sc., M.A.Sc. a thesis submitted to the department

More information

Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators

Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators 374 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators Jenq-Tay Yuan

More information

Maximum Likelihood Detection of Low Rate Repeat Codes in Frequency Hopped Systems

Maximum Likelihood Detection of Low Rate Repeat Codes in Frequency Hopped Systems MP130218 MITRE Product Sponsor: AF MOIE Dept. No.: E53A Contract No.:FA8721-13-C-0001 Project No.: 03137700-BA The views, opinions and/or findings contained in this report are those of The MITRE Corporation

More information

Range Free Localization of Wireless Sensor Networks Based on Sugeno Fuzzy Inference

Range Free Localization of Wireless Sensor Networks Based on Sugeno Fuzzy Inference Range Free Localization of Wireless Sensor Networks Based on Sugeno Fuzzy Inference Mostafa Arbabi Monfared Department of Electrical & Electronic Engineering Eastern Mediterranean University Famagusta,

More information

Static Path Planning for Mobile Beacons to Localize Sensor Networks

Static Path Planning for Mobile Beacons to Localize Sensor Networks Static Path Planning for Mobile Beacons to Localize Sensor Networks Rui Huang and Gergely V. Záruba Computer Science and Engineering Department The University of Texas at Arlington 416 Yates, 3NH, Arlington,

More information

Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band

Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band Chapter 4 DOA Estimation Using Adaptive Array Antenna in the 2-GHz Band 4.1. Introduction The demands for wireless mobile communication are increasing rapidly, and they have become an indispensable part

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Developing the Model

Developing the Model Team # 9866 Page 1 of 10 Radio Riot Introduction In this paper we present our solution to the 2011 MCM problem B. The problem pertains to finding the minimum number of very high frequency (VHF) radio repeaters

More information

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

More information

Performance study of node placement in sensor networks

Performance study of node placement in sensor networks Performance study of node placement in sensor networks Mika ISHIZUKA and Masaki AIDA NTT Information Sharing Platform Labs, NTT Corporation 3-9-, Midori-Cho Musashino-Shi Tokyo 8-8585 Japan {ishizuka.mika,

More information

Imaging with Wireless Sensor Networks

Imaging with Wireless Sensor Networks Imaging with Wireless Sensor Networks Rob Nowak Waheed Bajwa, Jarvis Haupt, Akbar Sayeed Supported by the NSF What is a Wireless Sensor Network? Comm between army units was crucial Signal towers built

More information

Tracking Algorithms for Multipath-Aided Indoor Localization

Tracking Algorithms for Multipath-Aided Indoor Localization Tracking Algorithms for Multipath-Aided Indoor Localization Paul Meissner and Klaus Witrisal Graz University of Technology, Austria th UWB Forum on Sensing and Communication, May 5, Meissner, Witrisal

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

Electronic Noise Effects on Fundamental Lamb-Mode Acoustic Emission Signal Arrival Times Determined Using Wavelet Transform Results

Electronic Noise Effects on Fundamental Lamb-Mode Acoustic Emission Signal Arrival Times Determined Using Wavelet Transform Results DGZfP-Proceedings BB 9-CD Lecture 62 EWGAE 24 Electronic Noise Effects on Fundamental Lamb-Mode Acoustic Emission Signal Arrival Times Determined Using Wavelet Transform Results Marvin A. Hamstad University

More information

Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks

Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks 29 29th IEEE International Conference on Distributed Computing Systems Workshops Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks Fatos Xhafa Department of

More information

Deployment and Testing of Optimized Autonomous and Connected Vehicle Trajectories at a Closed- Course Signalized Intersection

Deployment and Testing of Optimized Autonomous and Connected Vehicle Trajectories at a Closed- Course Signalized Intersection Deployment and Testing of Optimized Autonomous and Connected Vehicle Trajectories at a Closed- Course Signalized Intersection Clark Letter*, Lily Elefteriadou, Mahmoud Pourmehrab, Aschkan Omidvar Civil

More information

A Novel Adaptive Method For The Blind Channel Estimation And Equalization Via Sub Space Method

A Novel Adaptive Method For The Blind Channel Estimation And Equalization Via Sub Space Method A Novel Adaptive Method For The Blind Channel Estimation And Equalization Via Sub Space Method Pradyumna Ku. Mohapatra 1, Pravat Ku.Dash 2, Jyoti Prakash Swain 3, Jibanananda Mishra 4 1,2,4 Asst.Prof.Orissa

More information

An improved strategy for solving Sudoku by sparse optimization methods

An improved strategy for solving Sudoku by sparse optimization methods An improved strategy for solving Sudoku by sparse optimization methods Yuchao Tang, Zhenggang Wu 2, Chuanxi Zhu. Department of Mathematics, Nanchang University, Nanchang 33003, P.R. China 2. School of

More information

HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS

HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS Magnus Lindström Radio Communication Systems Department of Signals, Sensors and Systems Royal Institute of Technology (KTH) SE- 44, STOCKHOLM,

More information

A PREDICTABLE PERFORMANCE WIDEBAND NOISE GENERATOR

A PREDICTABLE PERFORMANCE WIDEBAND NOISE GENERATOR A PREDICTABLE PERFORMANCE WIDEBAND NOISE GENERATOR Submitted by T. M. Napier and R.A. Peloso Aydin Computer and Monitor Division 700 Dresher Road Horsham, PA 19044 ABSTRACT An innovative digital approach

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

A Rapid Acquisition Technique for Impulse Radio

A Rapid Acquisition Technique for Impulse Radio MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com A Rapid Acquisition Technique for Impulse Radio Gezici, S.; Fishler, E.; Kobayashi, H.; Poor, H.V. TR2003-46 August 2003 Abstract A novel rapid

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS

ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS Prepared for: DARPA Prepared by: Krishnan Eswaran, Engineer Cornell University May 12, 2003 ENGRC 350 RESEARCH GROUP 2003 Krishnan Eswaran Energy-Efficient

More information