Coalitions for Distributed Sensor Fusion 1
|
|
- Lesley Rogers
- 6 years ago
- Views:
Transcription
1 Coalitions for Distributed Sensor Fusion 1 Abstract - We address the problem of efficient use of communication bandwidth in a network of distributed sensors. Each sensor node has enough computational power to fuse its own estimates with those of other nodes using an optimal filter, but message passing is expensive. The goal is to give each node an identical tactical picture of the area of interest without compromising target track accuracy. In the current leading approach, each sensing node sends an Associated Measurement Report (AMR: a sensor reading matched to a track ID) to every other node. This paper considers a method of decimation of reporting nodes by choosing a subset (coalition) of those nodes that have the best information on the target. Only coalition nodes share AMRs with each other; then the coalition sends a report to non-coalition nodes. Simulations and analytical studies are used to support the promise of the Coalition approach. Keywords: Target tracking, sensor data fusion, sensor management, distributed systems. 1 Introduction Coordinated distributed sensors have many advantages over isolated sensors, including greater area coverage, robustness, and cooperative sensing. This paper considers sensor nodes that have enough computational power to fuse their own estimates with those of the other nodes in the network using an optimal filter. Systems of concern include JTIDS, the Cooperative Engagement Capability (CEC), and the proposed Tactical Component Network (TCN). The goal is to give each node an identical tactical picture of the area of interest without compromising target track accuracy. The best estimate of target position is achieved if each sensing node sends an Associated Measurement Report (AMR: a sensor reading matched to a track ID) to every other node at each sensing period. The AMR approach gives an «optimal» tracking estimate, and is thus appropriate in cases where communications bandwidth is not a limited resource. However, in cases where inter-node communication bandwidth is a limited resource, the challenge is to reduce the required bandwidth without degrading tracking accuracy. Two key strategies, decimation and tracklets, Michael Howard, David Payton, Regina Estkowski HRL Laboratories, LLC Malibu, CA 9265 {howard, payton, regina}@hrl.com have recently been compared in [1]. In decimation, a subset of sensing nodes sends their AMRs to every other node. Each node makes a decision whether or not to transmit each AMR. A tracklet is an equivalent measurement report, an accumulation of several sensor measurements into a single message. One or more AMRs can be combined into a single tracklet that contains all the kinematic and state information of the AMRs. In the tracklet approach, every sensing node sends a tracklet to every other node, but at a multiple of the sensing rate. This paper considers a strategy that is a blend of the tracklet and decimation approaches described above. As in decimation, only a subset of nodes that sense the target actually send reports. We call this subset a coalition. The coalition periodically sends a tracklet to every noncoalition node. In the next section, we describe the coalition approach. Section 3 discusses the analysis methodology, and in Section 4 we present analytic and empirical results. 2 Distributed Tracking and the Coalition Approach It is beyond the scope of this paper to detail the mathematics behind each of the alternative approaches. [2][3] cover tracking networks and various types of filters. [1][2] have detailed descriptions of AMRs, tracklets, and decimation. The use of tracklets was defined in [2][4][5][6]. In this section we will provide a brief description of the Kalman filter and measurement updates, then discuss some aspects of the coalition approach. 2.1 Kalman Filter Formulation A Kalman filter can be represented in its information form, which has some nice properties for combining evidence. The following briefly shows the form of the information filter and the information each node has to work with. The target state vector is 3D position and velocity: x = [p x, p y, p z, v x, v y, v z ] T. F(k) is the state transition matrix, and there is a zero mean Gaussian noise w k so 1 This work was supported by funding from Raytheon Corporation and sponsored by Raytheon Joint Sensor Networking, nd Street North, St. Petersburg, FL,
2 x k = F k x k-1 + w k. Since most radars are not good at velocity measurement, the observation vector is ust position: z = [p x, p y, p z ] T, and z k = H k x k + v k, where z k is the observation at time k, H k the observation matrix, and v k is the observation noise. R k is the observation noise covariance. These equations apply equally for linear and non-linear forms, by use of different terms in the H k and F k matrices. The estimate of the target state is the expectation of x given all the past observations: x ˆ( k k) = Ε{ x( k) Z k }, where the covariance is called P(k k). Intuitively P -1, the inverse of the covariance of the state estimate xˆ, tells us how good the estimate is. The information state vector [7] at time step ( l) is given by 1 yˆ( l) P ( l) xˆ( l). P -1 ( l) is called the information matrix. We ll use this form of the filter because it clarifies the presentation, but in practice either form may be used. Each node i maintains a global filter by combining the contributions of each node : T 1 y ˆ k k = yˆ k k 1 + H k R ( k) z ( k). ( ) i( ) ( ) i The information matrix is given by 1 1 T 1 P k k = P k k 1 + H ( k) R ( k) H ( k) i ( ) i ( ). The decimation and coalition strategies are called reporting responsibility approaches [2]. In these, a metric is used to decide whether to send each sensor measurement out to other nodes. There may be several components to the metric; for example, one decimation strategy reported in [1] is to compare the trace of the covariance matrix P before and after adding the sensor measurement. If the decrease is more than some prespecified threshold, the measurement is sent ; otherwise it is dropped. We discuss some other ideas for a metric in the next section. Tracklet strategies (including the coalition strategy as described in the next section) require that each node maintain a global filter and a private local filter. Each node adds the measurement into the tracklet equivalent measurement report, which may be based on all or some portion of the local track. It then makes a decision on whether to send the tracklet based on whether the covariance of the global filter is greater by some threshold than the new local state s covariance. 2.2 The Coalition Approach We very briefly defined three approaches in the introduction : Associated Measurement Report, or AMR (our baseline, where every sensor broadcasts every measurement), tracklets (an aggregation of multiple sensor measurements, broadcast periodically), and decimation (where only a subset of the sensors broadcast AMRs). Tracklets and decimation are reasonable ways of reducing bandwidth requirements by reporting more intelligently. We now propose a new strategy. A Sensor Coalition is a group of sensor nodes that cooperate to track a single target. It is a form of decimation in that only a subset of sensing nodes actually sends a report. But rather than broadcasting their AMRs to all nodes as in decimation, coalition nodes only send AMRs to other coalition nodes and then the coalition sends an update tracklet, an aggregation of the coalition AMRs, to every non-coalition node. A different coalition would be formed to track each unique target. Since non-coalition nodes are updated only after coalition nodes update each other, the coalition approach does not achieve the goal of giving every node an equivalent tactical picture. In comparison with a decimation approach, coalition nodes have exactly the same error as decimation nodes. However, non-coalition nodes get information that is delayed by the time it takes to collect the coalition AMRs into a tracklet, and send the tracklet. In this approach, nodes that need the most accurate data (e.g. weapons systems) must be able to be at least silent members of the coalition. Nodes that want to monitor the tactical picture could receive the slightly older updates. The sensor coalition we propose can be a very transitory organization, whose lifetime is limited to the time a et or a missile moves across an area of interest. The membership is likely to be dynamic, because as a target moves, obscuration and reflectivity levels of sensors of different types in different locations will change. Multiagent systems research has considered protocols for generating and optimizing organizational structure, often called coalition formation [8]. However, protocols that require negotiation and consensus are not suitable for the multi-sensor tracking domain, due to the critical time constraints. In the next section we discuss some components of a coalition membership function. 2.3 Considerations for Coalition Membership At one extreme, any node that can sense the target is a member of the coalition tracking that target; this is the current AMR method. At the other extreme, only one node tracks the target and periodically updates the rest of the nodes. The goal is to strike a balance by finding a subset of nodes based primarily on the ability of a node to provide unique information on the target. The metric reported in [1] compares the trace of the position covariance matrix before and after adding the sensor measurement to the global filter. 637
3 The trace metric would allow a non-member node to compare its ability to reduce position uncertainty beyond a threshold. If it passes the metric, it oins the coalition of its own accord by starting to send the coalition its AMRs. The details of oining are dependent on the network; for example, if something like multicast is available, it can simply oin the multicast address for the coalition, recorded in the last tracklet message from the coalition. The trace metric is based entirely on current data as represented by the current state of the global filter and the latest local measurement. The rest of this section discusses three other terms that might be added to such a metric to possibly improve the selection of coalition members. The value of these terms, however, remains to be investigated in future work. The metric would become a weighted sum of each term, and the weights would be decided after some experimentation on a particular network. First, if a node s contribution is increasing at every time step, it should be preferred for membership over another node with equal information but a decreasing contribution. A node could calculate the derivative of the trace metric mentioned abover, over several reporting periods. Second, since target reflectivity is often different at different angles, geometric location of sensors with respect to the present and predicted position of the target could be added. Intuitively, we would like to choose a small set of sensors with significantly different viewing angles to the target. One way to do this is with a Delauny triangulation, where the vertices of the triangulation include the target and all sensors within a given distance of the target. The sensors that are adacent to the target in the triangulation would then be such a set of sensors. To calculate this, a node must know the locations of every other node, which is a reasonable expectation for allied tracking systems. Delauny triangulations can be quickly calculated and locally repaired. Figure 1a shows how the Delauny neighborhood of a target T changes as T moves in the direction of node S. Within the next instant, the topology of the triangulation will change and S will lie in the Delauny neighborhood of T. If T continues in the predicted direction, the Delauny neighborhood will consist of the sensors on the dotted line. Even if T changes course, in terms of geometry, S is still a reasonable sensor to include in the coalition. The frequency of topology changes due to target motion can be reduced by selecting sensors that are far from the target. Figure 1b indicates how the Delauny neighborhood can be extended by eliminating immediate neighbors until desired distances are obtained. A third consideration for a coalition metric requires knowledge of the capabilities of current coalition a S members. For example, phased array sensor and rotators have different ranges and reporting frequencies. Even among the same type of sensor, they typically run banks of filters optimized for different hypotheses of target movement [2]; one may detect a maneuver before another or lose a track for short periods of time. Therefore, we would like to select a set of coalition members with a variety of capabilities. This decision requires a knowledge of the current coalition members and their capabilities. Non-coalition members could be informed of the coalition membership in a short coded message sent only when membership changed, so this might not add appreciably to bandwidth. Of course, coalition members know the membership because they receive AMRs from each other coalition member directly. 3 Analysis Methodology T Figure 1. The Delauny neighborhood of T includes nodes on the heavy solid line. Direct neighbors of T can be removed leaving the extended neighborhood, on the dashed line. 3.1 Bandwidth Analysis The bandwidth requirements of each approach (AMR, decimation, tracklets, and coalition) were calculated analytically. To simplify the analysis and clarify the issues, we make the worst-case assumption that all nodes can see all tracks at all times. In reality, only a subset of nodes would be able to see a target at any one time due to the earth s curvature alone, if not occluded by local terrain features. Also, this analysis assumes a perfect network with bandwidth on demand. It does not account for the real world constraints of deployed military systems, which may incur overhead for transmission security. So AMR and Tracklet bandwidths in this analysis are an upper bound, and bandwidth savings of decimation and coalition over AMR are also an upper bound. We use message size estimates in Table 1, ustified in [1]. A CCS target is Constant Course and Speed which is simulated using a stochastic differential equation with noise of 18 m/sec 3/2, so it s not perfectly constant. Using these estimates, if n nodes send AMRs to each other at a b T 638
4 rate r (reports/minute) over a total time period T, the bandwidth required for the baseline AMR approach is: bw amr = 224 n (n-1) r T (1) In an AMR decimation approach, only a subset c of the n nodes will transmit an AMR to each of the other n-1 nodes, based on a decision made by each node at each reporting time. The metric for sending should select nodes that have the highest quality sensor reading to report. It will provide less information than the full AMR approach, and tracking error will be somewhat higher, but if the decimation is done carefully the loss of precision will be minimized. The bandwidth used by the decimation approach would be: bw decimation = 224 c (n-1) r T (2) Note that this bandwidth calculation, and also the coalition bandwidth below, are idealized. If the decision to report or not (in effect, oining the c group) is based on metrics whose value may change from moment-to-moment, then c could vary. But for the purposes of comparison, we are holding c constant. In a tracklet approach, each of the n nodes periodically (every t time steps) sends a tracklet to each of the other nodes. Fewer words are required for a tracklet on a maneuvering target because the velocity terms for a maneuvering target are of little value in estimating the state. Assume for simplicity that tracklets for maneuvering targets are being sent at a higher rate than for the CCS targets, yielding the same bandwidth. Then the bandwidth used by the tracklet approach would be: bw tracklet = 56 n (n-1) r T/ t (3) The coalition approach is a combination of the decimation and tracklet approach. Like decimation, only a subset c (the coalition) of nodes decides to send an AMR to each of the other (c-1) coalition nodes. One of the coalition nodes periodically (every t timesteps) sends a tracklet to each of the n c non-coalition nodes. Assume for simplicity that tracklets for maneuvering targets are being sent at twice the rate of the CCS targets, yielding the same bandwidth. Then over a total time period T, if each sensor is making measurements at this rate r (reports/minute), the bandwidth used by the coalition approach is: bw coalition = 224 (# AMRs within coalition) + 56 (# tracklets to each non-coalition node) Required Bandwidth 2.5 x Bandwidth Comparison O(n 2 ) comm AMR Decimation Tracklet Coalition AMR bandwidth Tracklet Bandwidth Reporting Nodes (out of 1 ) Figure 2. Bandwidth comparison for sample situation in which all 1 nodes can hold the target for 2 iterations. Note that AMR and Tracklet are only defined for all reporting nodes, bw coalition = 224 c (c-1) r T + 56 (n-c) r T/ t (4) This represents one AMR at each timestep sent from every coalition node to every other, plus a tracklet from the coalition to every non-coalition node at each tracklet time t. 3.2 Tracking Error Simulation We analyze error trends empirically by means of a Cartesian Kalman filter simulation. A target moves at constant course and speed across an area of interest. For simplicity, all nodes can track the target throughout the 2 time steps. Both measurement and process noise were modeled as mean white Gaussian noise. Process noise was unit variance for all sensors. A number of factors can reduce a sensor s accuracy for a period of time, such as weather and terrain obscuration, aspect of target to sensor, calibration changes due to heating, etc. We modeled that by adding extra noise to a subset of the nodes. Other simplifications were made in this analysis that may affect the details of the results. Reporting nodes all have the same reporting rate. The simulation does not account for processing and communication time lags. Tracklets were sent at fixed time intervals; in practice they would only be sent when the error of the coalition s local filter falls some threshold below that of the global filter. Table 1: Bandwidth of Sensor Update Messages Type of Update Type of target 32 bit words total bits / message AMR All types 7ea x 32 bits 224 bits Tracklet CCS target 17.5ea x 32 bits 56 bits Maneuvering target 1.5 x 32 bits 336 bits 639
5 4 Results 4.1 Bandwidth Savings and Error Characterization of Coalition Approach The total required bandwidth of each of the four approaches (per equations 1-4 above) are plotted in Figure 2 as a function of the number of reporting nodes. Required coalition bandwidth is much less than the baseline AMR approach, but it is also less than the decimation approach because it is a combination of the decimation and tracklet approach. The tracking errors versus bandwidth for optimal tracklet policies and optimal AMR policies (i.e., decimation) were compared in [1]. We will start by comparing the coalition approach to the baseline AMR approach, and then briefly discuss the comparison for decimation and tracklets. A different way to look at the bandwidth savings of the coalition approach over the AMR approach is to plot the relative savings of the coalition vs. AMR approach (bw amr bw coalition ) as a percent of bw amr versus coalition size. Figure 3 shows that plot. The bandwidth savings over any time period T that is a multiple of the tracklet interval t, is related to the size of the coalition c 2. Figure 3 shows the set of curves varying coalition size c from 1 to the maximum number of sensing nodes 1, where tracklets are sent from the coalition to each of the n-c non-coalition nodes, every 1-7 time periods. The graph is parabolic, with maximum bandwidth savings for small coalition sizes. A coalition size of zero is meaningless for the coalition approach, but a coalition of 1 means only one node tracks the target and periodically sends a tracklet to the rest of the n-1 nodes (56 (n-1) r T / t). This requires about 95% less bandwidth than the other extreme, where every node is in the coalition equivalent to the AMR approach. Perhaps the most notable feature is that the curve approaches zero slope for small size coalitions, and only gradually decreases. Thus even if 3% of the nodes are in the coalition, the bandwidth savings can still be 9% of the savings for a coalition of 1. Furthermore, this curve changes very little as the number of measurements in a tracklet changes. With a larger numbers of nodes, the curves in Figure 3 are very close together. With less than 1 nodes, the tracklet curves start to separate, but even with only 1 node in the coalition, sending tracklets of size 1, it still has 75% of the potential savings over the AMR scenario. In other words, we can increase the frequency at which we send tracklets from the coalition to non-coalition nodes, without losing much of our bandwidth savings over the AMR approach. This is because we only send O(n-c) tracklets, whereas AMRs are broadcast from every node to every other, O(n 2 ). Thus bandwidth savings is dominated by the size of the % of maximum BW savings Position Error (meters) Non-Coalition Error With Updates Without Update Iteration Figure 3. Tracking error of non-coalition nodes, with and without coalition tracklet updates every 7 periods. Bandwidth Savings of Coalition over AMR O(n 2 ) comm 1 C(*,1) 9 C(*,3) C(*,5) 8 C(*,7) Coalition Size (out of 1 reporting nodes) Figure 4. (AMR bandwidth minus Coalition bandwidth) divided by AMR bw. C(*,m) means a plot for a coalition of varying sizes, using a tracklet of m measurements. Bandwidth Savings of Coalition over Decimation O(n log n) co % of maximum BW savings Coalition Size (out of 1 reporting nodes) C(*,1) C(*,3) C(*,5) C(*,7) Figure 5. C(*,m) means a plot for a coalition of varying sizes, using a tracklet of m measurements to update noncoaliton nodes. 64
6 coalition, and the frequency of updates to the n-c noncoalition nodes is less important. Therefore, we can even send a coalition tracklet every time step and keep the noncoalition error down, without significantly increasing bandwidth requirements. In the coalition approach, coalition nodes send AMRs to each other, and one coalition node sends a tracklet to each non-coalition node every 7 th time step (immediately after the 7 th AMR update with no time lag). Seven time steps is a long time to go without an update, but it was chosen to make the error trend clear. Figure 4 shows the XY position error of the target as seen by a non-coalition node that is updated by periodic coalition tracklets, and one that is not updated, averaged over five runs. In both cases the non-coalition nodes make their own noisy measurements every timestep, and add them into their Kalman filters. The error of the non-coalition nodes exhibits the characteristic sawtooth error pattern: immediately after updating with the more accurate coalition tracklet, the error of the non-coalition node will be close to that of the coalition node. In between updates, the error increases. In Figure 5, coalition error is plotted against non-coalition error, showing that when a tracklet arrives, every seventh iteration, non-coalition error is reset to match that of the coalition nodes. The coalition system should be carefully compared with the closest existing system : decimation. In a decimation system, the best nodes are chosen to send their AMRs to all the other nodes. The bandwidth follows equation 2 above. The metric for choosing a node to be in the decimation group is likely to be very similar to the metric used to oin a coalition. The difference is that in the coalition system, coalition members only send AMRs to other coalition members, and then the coalition sends a tracklet to the non-coalition nodes. Figure 6 shows the coalition savings with respect to the decimation approach. Error (meters) Coalition vs. Non-Coalition Error Coalition Non-Coalition Iteration Figure 6. This plot shows non-coalition nodes getting updated every 7 nodes. In general, their error is greater than coalition nodes. The appearance of maxima gives a clear goal for coalition size. In this comparison the number of measurements in the tracklet makes a bigger difference, particularly in the smaller coalition sizes. We have not compared the error of the two systems for this paper, due to its dependence on the time each update is received, which is not in our current simulation. If there is a node that needs highly accurate tracking data, but has no sensor of its own (perhaps a weapons system), it can be added to the coalition as a silent partner. It receives AMRs from each member but contributes no sensor measurements of its own. This loosens the traditional ties binding a specific sensor to a specific weapon system, and makes the estimate more robust. When one silent node (snode) is added, if we still use c to represent the number of reporting coalition nodes, the inter-coalition AMR message is now sent from c nodes to c+1 other nodes, so the coalition part of the bandwidth becomes 224 c ((c+1)-1)rt, or 224c 2 rt. The non-coalition update now has 1 less node to update, so it becomes 56 (n-(c+1))rt/t. Therefore the bandwidth bw coalition (4) will change to : bw coalition +snode = coalition part + non-coalition part = 224 c 2 r T + 56 (n-(c+1)) r T/ t (5) The difference between equation (5) and equation (4) is 224crT + 56rT/t. We conclude that high priority systems can be added to the coalition as silent partners without significantly increasing the bandwidth (only O(c) increase). In the coalition approach, non-coalition nodes should experience about the same error as in a pure tracklet approach. However, coalition nodes would experience about the same error as the AMR approach. Intelligent routing systems will do better than O(n 2 ) Bandwidth Savings of Coalition over AMR O(n log n) comm 1 C(*,1) C(*,3) C(*,5) 9 C(*,7) % of maximum BW savings Coalition Size (out of 1 reporting nodes) Figure 7. The savings are plotted for varying tracklet sizes of 1 to 7 measurements each. This plot is similar to Figure 3, except that communication is O(n log n) here rather than O(n 2 ). 641
7 performance, and can approach O(n log n). In such a network the dominating portion of coalition bandwidth, which is a broadcast from every coalition member to every other, will be less expensive. Figure 7 shows that there is still a bandwidth savings, but it drops off more linearly, so there is nearly an equal penalty to pay for each node that is added to the coalition. However, as mentioned in section 3.1, there is also an overhead to be paid for transmission security, and it would surely offset the gains made by intelligent routing. In each of the bandwidth analyses in this paper, we used tracklet sizes from 1 to 7. Tracklets of size 1 are similar to an AMR. The coalition AMRs must be collected and fused, and the resulting estimate sent to the non-coalition nodes. 5 Conclusions The preceding analysis indicates that the coalition approach is promising. The bandwidth trends have been defined analytically. The study compared coalitions of different sizes, from a coalition of 1 that uses the least bandwidth, to a coalition that contains all nodes, which is the same as the AMR system. We showed that, with O(n 2 ) communication, even if the coalition includes 3% of the sensing nodes, we still save 9% of the maximum savings for a coalition of 1 (8% for O(n log n) communication). Error trends were indicated via a very simple simulation, and more work should be done to try to find a bound on the error analytically, and to improve the simulation to get more convincing experimental results. This study has not yet produced a graph of error versus bandwidth for the coalition strategy, which is required for a thorough treatment. This would be the subect of future work, since there are issues of network design and update timing that complicate such an analysis. Instead, since the coalition scheme is a combination of decimation and tracklet strategies, we suggest that the error of coalition nodes would be nearly that of decimation schemes. The error of non-coalition nodes would be comparable to tracklet systems. Fire Control Symposium, Kauai, Hawaii, pp August 21. [2] Y. Bar-Shalom and W.D. Blair, eds., Multitarget- Multisensor Tracking, Norwood, MA, Artech House, 2. [3] S. S. Blackman and R. Popoli, Design and Analysis of Modern Tracking Systems, Norwood, MA, Artech House, [4] Oliver E. Drummond, Feedback in Track Fusion Without Process Noise, Signal and Data Processing of Small Targets 1995, Proc. SPIE, Vol. 2561, p July [5] Oliver E. Drummond, A Hybrid Sensor Fusion Algorithm Architecture and Tracklets, Signal and Data Processing of Small Targets 1997, Proc. SPIE, Vol. 3163, p. 485, July [6] Oliver E. Drummond, Tracklets and a Hybrid Fusion With Process Noise, Signal and Data Processing of Small Targets 1997, Proc. SPIE, Vol. 3163, p. 512, July [7] J. Manyika and H. Durrant-Whyte, Data Fusion and Sensor Management: A Decentralized Information- Theoretic Approach. Ellis Horwood Series in Electrical and Electronic Engineering, Ellis Horwood, New York, [8] Gerhard Weiss, ed., Multiagent Systems, a Modern Approach to Distributed Artificial Intelligence, MIT Press, Acknowledgements Raytheon Corporation supported this research, and we are indebted in particular to Bill Barker, Tom Nichols, Dennis King and Chris Eck for their deep understanding of this domain and their excellent comments and suggestions. References [1] W. H. Barker, T. S. Nichols, C. R. Eck, S. Kadambe, A Tradeoff Analysis of Bandwidth Utilization Strategies in Distributed Sensor Networks. In proceedings of National 642
Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target
14th International Conference on Information Fusion Chicago, Illinois, USA, July -8, 11 Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target Mark Silbert and Core
More informationAutonomous Underwater Vehicle Navigation.
Autonomous Underwater Vehicle Navigation. We are aware that electromagnetic energy cannot propagate appreciable distances in the ocean except at very low frequencies. As a result, GPS-based and other such
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationDeployment and Testing of Optimized Autonomous and Connected Vehicle Trajectories at a Closed- Course Signalized Intersection
Deployment and Testing of Optimized Autonomous and Connected Vehicle Trajectories at a Closed- Course Signalized Intersection Clark Letter*, Lily Elefteriadou, Mahmoud Pourmehrab, Aschkan Omidvar Civil
More informationApplying Multisensor Information Fusion Technology to Develop an UAV Aircraft with Collision Avoidance Model
1 Applying Multisensor Information Fusion Technology to Develop an UAV Aircraft with Collision Avoidance Model {Final Version with
More informationLocalization in Wireless Sensor Networks
Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem
More informationRadar / ADS-B data fusion architecture for experimentation purpose
Radar / ADS-B data fusion architecture for experimentation purpose O. Baud THALES 19, rue de la Fontaine 93 BAGNEUX FRANCE olivier.baud@thalesatm.com N. Honore THALES 19, rue de la Fontaine 93 BAGNEUX
More informationATPC: Adaptive Transmission Power Control for Wireless Sensor Networks
ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks Shan Lin, Jingbin Zhang, Gang Zhou, Lin Gu, Tian He, and John A. Stankovic Department of Computer Science, University of Virginia
More informationDistributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes
7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis
More informationA ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING
A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING Gaurang Mokashi, Hong Huang, Bharath Kuppireddy, and Subin Varghese Klipsch School of Electrical and
More informationLaboratory 1: Uncertainty Analysis
University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can
More informationStructure and Synthesis of Robot Motion
Structure and Synthesis of Robot Motion Motion Synthesis in Groups and Formations I Subramanian Ramamoorthy School of Informatics 5 March 2012 Consider Motion Problems with Many Agents How should we model
More informationPrognostic Optimization of Phased Array Antenna for Self-Healing
Prognostic Optimization of Phased Array Antenna for Self-Healing David Allen 1 1 HRL Laboratories, LLC, Malibu, CA, 90265, USA dlallen@hrl.com ABSTRACT Phased array antennas are widely used in many applications
More informationLane Detection in Automotive
Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...
More informationKALMAN FILTER APPLICATIONS
ECE555: Applied Kalman Filtering 1 1 KALMAN FILTER APPLICATIONS 1.1: Examples of Kalman filters To wrap up the course, we look at several of the applications introduced in notes chapter 1, but in more
More informationNonuniform multi level crossing for signal reconstruction
6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven
More informationExtended Kalman Filtering
Extended Kalman Filtering Andre Cornman, Darren Mei Stanford EE 267, Virtual Reality, Course Report, Instructors: Gordon Wetzstein and Robert Konrad Abstract When working with virtual reality, one of the
More informationA Java Tool for Exploring State Estimation using the Kalman Filter
ISSC 24, Belfast, June 3 - July 2 A Java Tool for Exploring State Estimation using the Kalman Filter Declan Delaney and Tomas Ward 2 Department of Computer Science, 2 Department of Electronic Engineering,
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationDesign of Parallel Algorithms. Communication Algorithms
+ Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter
More informationAdvances in Antenna Measurement Instrumentation and Systems
Advances in Antenna Measurement Instrumentation and Systems Steven R. Nichols, Roger Dygert, David Wayne MI Technologies Suwanee, Georgia, USA Abstract Since the early days of antenna pattern recorders,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationApplying Multisensor Information Fusion Technology to Develop an UAV Aircraft with Collision Avoidance Model
Applying Multisensor Information Fusion Technology to Develop an UAV Aircraft with Collision Avoidance Model by Dr. Buddy H Jeun and John Younker Sensor Fusion Technology, LLC 4522 Village Springs Run
More informationENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS WAFIC W. ALAMEDDINE A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN
More informationChapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks
Chapter Number Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Thakshila Wimalajeewa 1, Sudharman K. Jayaweera 1 and Carlos Mosquera 2 1 Dept. of Electrical and Computer
More informationMultiple attenuation via predictive deconvolution in the radial domain
Predictive deconvolution in the radial domain Multiple attenuation via predictive deconvolution in the radial domain Marco A. Perez and David C. Henley ABSTRACT Predictive deconvolution has been predominantly
More informationIntegration of GNSS and INS
Integration of GNSS and INS Kiril Alexiev 1/39 To limit the drift, an INS is usually aided by other sensors that provide direct measurements of the integrated quantities. Examples of aiding sensors: Aided
More informationUsing Signaling Rate and Transfer Rate
Application Report SLLA098A - February 2005 Using Signaling Rate and Transfer Rate Kevin Gingerich Advanced-Analog Products/High-Performance Linear ABSTRACT This document defines data signaling rate and
More informationA Positon and Orientation Post-Processing Software Package for Land Applications - New Technology
A Positon and Orientation Post-Processing Software Package for Land Applications - New Technology Tatyana Bourke, Applanix Corporation Abstract This paper describes a post-processing software package that
More informationPhased Array Velocity Sensor Operational Advantages and Data Analysis
Phased Array Velocity Sensor Operational Advantages and Data Analysis Matt Burdyny, Omer Poroy and Dr. Peter Spain Abstract - In recent years the underwater navigation industry has expanded into more diverse
More informationDetection of Obscured Targets: Signal Processing
Detection of Obscured Targets: Signal Processing James McClellan and Waymond R. Scott, Jr. School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250 jim.mcclellan@ece.gatech.edu
More informationDecentralised SLAM with Low-Bandwidth Communication for Teams of Vehicles
Decentralised SLAM with Low-Bandwidth Communication for Teams of Vehicles Eric Nettleton a, Sebastian Thrun b, Hugh Durrant-Whyte a and Salah Sukkarieh a a Australian Centre for Field Robotics, University
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1
More informationPopulation Adaptation for Genetic Algorithm-based Cognitive Radios
Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications
More informationKalman Tracking and Bayesian Detection for Radar RFI Blanking
Kalman Tracking and Bayesian Detection for Radar RFI Blanking Weizhen Dong, Brian D. Jeffs Department of Electrical and Computer Engineering Brigham Young University J. Richard Fisher National Radio Astronomy
More informationMATHEMATICAL MODELS Vol. I - Measurements in Mathematical Modeling and Data Processing - William Moran and Barbara La Scala
MEASUREMENTS IN MATEMATICAL MODELING AND DATA PROCESSING William Moran and University of Melbourne, Australia Keywords detection theory, estimation theory, signal processing, hypothesis testing Contents.
More informationState-Space Models with Kalman Filtering for Freeway Traffic Forecasting
State-Space Models with Kalman Filtering for Freeway Traffic Forecasting Brian Portugais Boise State University brianportugais@u.boisestate.edu Mandar Khanal Boise State University mkhanal@boisestate.edu
More informationSurveillance and Calibration Verification Using Autoassociative Neural Networks
Surveillance and Calibration Verification Using Autoassociative Neural Networks Darryl J. Wrest, J. Wesley Hines, and Robert E. Uhrig* Department of Nuclear Engineering, University of Tennessee, Knoxville,
More informationFast and efficient randomized flooding on lattice sensor networks
Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation
More informationEvolutionary Control of an Autonomous Field
47 Evolutionary Control of an Autonomous Field Mark W. Owen SSC San Diego Dale M. Klamer and Barbara Dean Orincon Corporation INTRODUCTION The Office of Naval Research (ONR) established the Deployable
More informationINTRODUCTION TO KALMAN FILTERS
ECE5550: Applied Kalman Filtering 1 1 INTRODUCTION TO KALMAN FILTERS 1.1: What does a Kalman filter do? AKalmanfilterisatool analgorithmusuallyimplementedasa computer program that uses sensor measurements
More informationChapter 4 SPEECH ENHANCEMENT
44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationOn the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels
On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH
More informationDESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK. Timothy E. Floore George H. Gilman
Proceedings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, and M. Fu, eds. DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK Timothy
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationDynamic displacement estimation using data fusion
Dynamic displacement estimation using data fusion Sabine Upnere 1, Normunds Jekabsons 2 1 Technical University, Institute of Mechanics, Riga, Latvia 1 Ventspils University College, Ventspils, Latvia 2
More informationPassive Emitter Geolocation using Agent-based Data Fusion of AOA, TDOA and FDOA Measurements
Passive Emitter Geolocation using Agent-based Data Fusion of AOA, TDOA and FDOA Measurements Alex Mikhalev and Richard Ormondroyd Department of Aerospace Power and Sensors Cranfield University The Defence
More informationHybrid Positioning through Extended Kalman Filter with Inertial Data Fusion
Hybrid Positioning through Extended Kalman Filter with Inertial Data Fusion Rafiullah Khan, Francesco Sottile, and Maurizio A. Spirito Abstract In wireless sensor networks (WSNs), hybrid algorithms are
More informationSimulating and Testing of Signal Processing Methods for Frequency Stepped Chirp Radar
Test & Measurement Simulating and Testing of Signal Processing Methods for Frequency Stepped Chirp Radar Modern radar systems serve a broad range of commercial, civil, scientific and military applications.
More informationVehicle Speed Estimation Using GPS/RISS (Reduced Inertial Sensor System)
ISSC 2013, LYIT Letterkenny, June 20 21 Vehicle Speed Estimation Using GPS/RISS (Reduced Inertial Sensor System) Thomas O Kane and John V. Ringwood Department of Electronic Engineering National University
More informationA Neural Extended Kalman Filter Multiple Model Tracker
A Neural Extended Kalman Filter Multiple Model Tracer M. W. Owen, U.S. Navy SPAWAR Systems Center San Diego Code 2725, 53560 Hull Street San Diego, CA, 92152, USA mar.owen@navy.mil A. R. Stubberud, University
More informationVOL. 3, NO.11 Nov, 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Effect of Fading Correlation on the Performance of Spatial Multiplexed MIMO systems with circular antennas M. A. Mangoud Department of Electrical and Electronics Engineering, University of Bahrain P. O.
More informationTarget Recognition and Tracking based on Data Fusion of Radar and Infrared Image Sensors
Target Recognition and Tracking based on Data Fusion of Radar and Infrared Image Sensors Jie YANG Zheng-Gang LU Ying-Kai GUO Institute of Image rocessing & Recognition, Shanghai Jiao-Tong University, China
More informationPerformance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA By Hamed D. AlSharari College of Engineering, Aljouf University, Sakaka, Aljouf 2014, Kingdom of Saudi Arabia, hamed_100@hotmail.com
More informationAntennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO
Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and
More informationUNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS. Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik
UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik Department of Electrical and Computer Engineering, The University of Texas at Austin,
More informationDesign of Pipeline Analog to Digital Converter
Design of Pipeline Analog to Digital Converter Vivek Tripathi, Chandrajit Debnath, Rakesh Malik STMicroelectronics The pipeline analog-to-digital converter (ADC) architecture is the most popular topology
More informationAppendix C: Graphing. How do I plot data and uncertainties? Another technique that makes data analysis easier is to record all your data in a table.
Appendix C: Graphing One of the most powerful tools used for data presentation and analysis is the graph. Used properly, graphs are an important guide to understanding the results of an experiment. They
More informationA Level-Encoded Transition Signaling Protocol for High-Throughput Asynchronous Global Communication
A Level-Encoded Transition Signaling Protocol for High-Throughput Asynchronous Global Communication Peggy B. McGee, Melinda Y. Agyekum, Moustafa M. Mohamed and Steven M. Nowick {pmcgee, melinda, mmohamed,
More informationA Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications IEEE Transactions on Image Processing, Vol. 21, No. 2, 2012 Eric Dedrick and Daniel Lau, Presented by Ran Shu School
More informationBalancing Bandwidth and Bytes: Managing storage and transmission across a datacast network
Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Pete Ludé iblast, Inc. Dan Radke HD+ Associates 1. Introduction The conversion of the nation s broadcast television
More informationThe below identified patent application is available for licensing. Requests for information should be addressed to:
DEPARTMENT OF THE NAVY OFFICE OF COUNSEL NAVAL UNDERSEA WARFARE CENTER DIVISION 1176 HOWELL STREET NEWPORT Rl 02841-1708 IN REPLY REFER TO Attorney Docket No. 102079 23 February 2016 The below identified
More informationResource Allocation in Distributed MIMO Radar for Target Tracking
Resource Allocation in Distributed MIMO Radar for Target Tracking Xiyu Song 1,a, Nae Zheng 2,b and Liuyang Gao 3,c 1 Zhengzhou Information Science and Technology Institute, Zhengzhou, China 2 Zhengzhou
More informationThe Practical Limits of RS-485
The Practical Limits of RS-485 INTRODUCTlON This application note discusses the EIA-485 standard for differential multipoint data transmission and its practical limits. It is commonly called RS-485, however
More informationSurvey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B
Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B Department of Electronics and Communication Engineering K L University, Guntur, India Abstract In multi user environment number of users
More informationWaveform Libraries for Radar Tracking Applications: Maneuvering Targets
Waveform Libraries for Radar Tracking Applications: Maneuvering Targets S. Suvorova and S. D. Howard Defence Science and Technology Organisation, PO BOX 1500, Edinburgh 5111, Australia W. Moran and R.
More informationTesting Sensors & Actors Using Digital Oscilloscopes
Testing Sensors & Actors Using Digital Oscilloscopes APPLICATION BRIEF February 14, 2012 Dr. Michael Lauterbach & Arthur Pini Summary Sensors and actors are used in a wide variety of electronic products
More informationFTSP Power Characterization
1. Introduction FTSP Power Characterization Chris Trezzo Tyler Netherland Over the last few decades, advancements in technology have allowed for small lowpowered devices that can accomplish a multitude
More informationState Estimation Advancements Enabled by Synchrophasor Technology
State Estimation Advancements Enabled by Synchrophasor Technology Contents Executive Summary... 2 State Estimation... 2 Legacy State Estimation Biases... 3 Synchrophasor Technology Enabling Enhanced State
More informationExam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2010 Lecture 19 Today: (1) Diversity Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.
More informationReduced Overhead Distributed Consensus-Based Estimation Algorithm
Reduced Overhead Distributed Consensus-Based Estimation Algorithm Ban-Sok Shin, Henning Paul, Dirk Wübben and Armin Dekorsy Department of Communications Engineering University of Bremen Bremen, Germany
More informationMATCHED FIELD PROCESSING: ENVIRONMENTAL FOCUSING AND SOURCE TRACKING WITH APPLICATION TO THE NORTH ELBA DATA SET
MATCHED FIELD PROCESSING: ENVIRONMENTAL FOCUSING AND SOURCE TRACKING WITH APPLICATION TO THE NORTH ELBA DATA SET Cristiano Soares 1, Andreas Waldhorst 2 and S. M. Jesus 1 1 UCEH - Universidade do Algarve,
More informationFuzzy Automaton with Kalman State-Smoothing
Fuzzy Automaton with Kalman State-Smoothing Scott Imhoff and Palak Thakkar Raytheon Intelligence and Information Systems 16800 E. Centretech Parkway Aurora Colorado 80011 Abstract - This paper presents
More informationBackground Adaptive Band Selection in a Fixed Filter System
Background Adaptive Band Selection in a Fixed Filter System Frank J. Crosby, Harold Suiter Naval Surface Warfare Center, Coastal Systems Station, Panama City, FL 32407 ABSTRACT An automated band selection
More informationSelf Localization Using A Modulated Acoustic Chirp
Self Localization Using A Modulated Acoustic Chirp Brian P. Flanagan The MITRE Corporation, 7515 Colshire Dr., McLean, VA 2212, USA; bflan@mitre.org ABSTRACT This paper describes a robust self localization
More informationINDOOR HEADING MEASUREMENT SYSTEM
INDOOR HEADING MEASUREMENT SYSTEM Marius Malcius Department of Research and Development AB Prospero polis, Lithuania m.malcius@orodur.lt Darius Munčys Department of Research and Development AB Prospero
More informationChapter 2 Channel Equalization
Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and
More informationMotomatic Servo Control
Exercise 2 Motomatic Servo Control This exercise will take two weeks. You will work in teams of two. 2.0 Prelab Read through this exercise in the lab manual. Using Appendix B as a reference, create a block
More informationKalman Filtering, Factor Graphs and Electrical Networks
Kalman Filtering, Factor Graphs and Electrical Networks Pascal O. Vontobel, Daniel Lippuner, and Hans-Andrea Loeliger ISI-ITET, ETH urich, CH-8092 urich, Switzerland. Abstract Factor graphs are graphical
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationAPPLICATION NOTE 3942 Optimize the Buffer Amplifier/ADC Connection
Maxim > Design Support > Technical Documents > Application Notes > Communications Circuits > APP 3942 Maxim > Design Support > Technical Documents > Application Notes > High-Speed Interconnect > APP 3942
More information6. FUNDAMENTALS OF CHANNEL CODER
82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on
More informationA Hybrid Synchronization Technique for the Frequency Offset Correction in OFDM
A Hybrid Synchronization Technique for the Frequency Offset Correction in OFDM Sameer S. M Department of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur West
More informationIntegrated Detection and Tracking in Multistatic Sonar
Stefano Coraluppi Reconnaissance, Surveillance, and Networks Department NATO Undersea Research Centre Viale San Bartolomeo 400 19138 La Spezia ITALY coraluppi@nurc.nato.int ABSTRACT An ongoing research
More informationLOCALIZATION WITH GPS UNAVAILABLE
LOCALIZATION WITH GPS UNAVAILABLE ARES SWIEE MEETING - ROME, SEPT. 26 2014 TOR VERGATA UNIVERSITY Summary Introduction Technology State of art Application Scenarios vs. Technology Advanced Research in
More informationEvolution of Sensor Suites for Complex Environments
Evolution of Sensor Suites for Complex Environments Annie S. Wu, Ayse S. Yilmaz, and John C. Sciortino, Jr. Abstract We present a genetic algorithm (GA) based decision tool for the design and configuration
More informationUnderstanding Apparent Increasing Random Jitter with Increasing PRBS Test Pattern Lengths
JANUARY 28-31, 2013 SANTA CLARA CONVENTION CENTER Understanding Apparent Increasing Random Jitter with Increasing PRBS Test Pattern Lengths 9-WP6 Dr. Martin Miller The Trend and the Concern The demand
More informationThe case for longer sweeps in vibrator acquisition Malcolm Lansley, Sercel, John Gibson, Forest Lin, Alexandre Egreteau and Julien Meunier, CGGVeritas
The case for longer sweeps in vibrator acquisition Malcolm Lansley, Sercel, John Gibson, Forest Lin, Alexandre Egreteau and Julien Meunier, CGGVeritas There is growing interest in the oil and gas industry
More informationPower Efficiency of LDPC Codes under Hard and Soft Decision QAM Modulated OFDM
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 5 (2014), pp. 463-468 Research India Publications http://www.ripublication.com/aeee.htm Power Efficiency of LDPC Codes under
More informationGeolocation using TDOA and FDOA Measurements in sensor networks Using Non-Linear Elements
Geolocation using TDOA and FDOA Measurements in sensor networks Using Non-Linear Elements S.K.Hima Bindhu M.Tech Ii Year, Dr.Sgit, Markapur P.Prasanna Murali Krishna Hod of Decs, Dr.Sgit, Markapur Abstract:
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationCommunication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi
Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 16 Angle Modulation (Contd.) We will continue our discussion on Angle
More informationMobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe
More informationTheoretical Aircraft Overflight Sound Peak Shape
Theoretical Aircraft Overflight Sound Peak Shape Introduction and Overview This report summarizes work to characterize an analytical model of aircraft overflight noise peak shapes which matches well with
More informationAN AIDED NAVIGATION POST PROCESSING FILTER FOR DETAILED SEABED MAPPING UUVS
MODELING, IDENTIFICATION AND CONTROL, 1999, VOL. 20, NO. 3, 165-175 doi: 10.4173/mic.1999.3.2 AN AIDED NAVIGATION POST PROCESSING FILTER FOR DETAILED SEABED MAPPING UUVS Kenneth Gade and Bjørn Jalving
More informationIncreasing the precision of mobile sensing systems through super-sampling
Increasing the precision of mobile sensing systems through super-sampling RJ Honicky, Eric A. Brewer, John F. Canny, Ronald C. Cohen Department of Computer Science, UC Berkeley Email: {honicky,brewer,jfc}@cs.berkeley.edu
More informationA Numerical Approach to Understanding Oscillator Neural Networks
A Numerical Approach to Understanding Oscillator Neural Networks Natalie Klein Mentored by Jon Wilkins Networks of coupled oscillators are a form of dynamical network originally inspired by various biological
More informationGrayscale and Resolution Tradeoffs in Photographic Image Quality. Joyce E. Farrell Hewlett Packard Laboratories, Palo Alto, CA
Grayscale and Resolution Tradeoffs in Photographic Image Quality Joyce E. Farrell Hewlett Packard Laboratories, Palo Alto, CA 94304 Abstract This paper summarizes the results of a visual psychophysical
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More information