110 research outputs found

    Decentralized Variational Filtering for Target Tracking in Binary Sensor Networks

    Full text link

    Long Range Automated Persistent Surveillance

    Get PDF
    This dissertation addresses long range automated persistent surveillance with focus on three topics: sensor planning, size preserving tracking, and high magnification imaging. field of view should be reserved so that camera handoff can be executed successfully before the object of interest becomes unidentifiable or untraceable. We design a sensor planning algorithm that not only maximizes coverage but also ensures uniform and sufficient overlapped camera’s field of view for an optimal handoff success rate. This algorithm works for environments with multiple dynamic targets using different types of cameras. Significantly improved handoff success rates are illustrated via experiments using floor plans of various scales. Size preserving tracking automatically adjusts the camera’s zoom for a consistent view of the object of interest. Target scale estimation is carried out based on the paraperspective projection model which compensates for the center offset and considers system latency and tracking errors. A computationally efficient foreground segmentation strategy, 3D affine shapes, is proposed. The 3D affine shapes feature direct and real-time implementation and improved flexibility in accommodating the target’s 3D motion, including off-plane rotations. The effectiveness of the scale estimation and foreground segmentation algorithms is validated via both offline and real-time tracking of pedestrians at various resolution levels. Face image quality assessment and enhancement compensate for the performance degradations in face recognition rates caused by high system magnifications and long observation distances. A class of adaptive sharpness measures is proposed to evaluate and predict this degradation. A wavelet based enhancement algorithm with automated frame selection is developed and proves efficient by a considerably elevated face recognition rate for severely blurred long range face images

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Coordinated Standoff Tracking of Moving Target Groups Using Multiple UAVs

    Get PDF
    This paper presents a methodology for coordinated standoff tracking of moving target groups using multiple unmanned aerial vehicles (UAVs). The vector field guidance approach for a single UAV is first applied to track a group of targets by defining a variable standoff orbit to be followed, which can keep all targets within the field-of-view of the UAV. A new feedforward term is included in the guidance command considering variable standoff distance, and the convergence of the vector field to the standoff orbit is analyzed and enhanced by adjusting radial velocity using two active measures associated with vector field generation. Moreover, for multiple group tracking by multiple UAVs, a two-phase approach is proposed as a suboptimal solution for a Non-deterministic Polynomial-time hard (NP-hard) problem, consisting of target clustering/assignment and cooperative standoff group tracking with online local replanning. Lastly, localization sensitivity to the group of targets is investigated for different angular separations between UAVs and sensing configurations. Numerical simulations are performed using randomly moving ground vehicles with multiple UAVs to verify the feasibility and benefit of the proposed approach.clos

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation

    Video Analysis in Pan-Tilt-Zoom Camera Networks

    Full text link

    Localisation en intérieur et gestion de la mobilité dans les réseaux sans fils hétérogènes émergents

    Get PDF
    Au cours des dernières décennies, nous avons été témoins d'une évolution considérable dans l'informatique mobile, réseau sans fil et des appareils portatifs. Dans les réseaux de communication à venir, les utilisateurs devraient être encore plus mobiles exigeant une connectivité omniprésente à différentes applications qui seront de préférence au courant de leur contexte. Certes, les informations de localisation dans le cadre de leur contexte est d'une importance primordiale à la fois la demande et les perspectives du réseau. Depuis l'application ou de point de vue utilisateur, la fourniture de services peut mettre à jour si l'adaptation au contexte de l'utilisateur est activée. Du point de vue du réseau, des fonctionnalités telles que le routage, la gestion de transfert, l'allocation des ressources et d'autres peuvent également bénéficier si l'emplacement de l'utilisateur peuvent être suivis ou même prédit. Dans ce contexte, nous nous concentrons notre attention sur la localisation à l'intérieur et de la prévision transfert qui sont des composants indispensables à la réussite ultime de l'ère de la communication omniprésente envisagé. Alors que les systèmes de positionnement en plein air ont déjà prouvé leur potentiel dans un large éventail d'applications commerciales, le chemin vers un système de localisation à l'intérieur de succès est reconnu pour être beaucoup plus difficile, principalement en raison des caractéristiques difficiles à l'intérieur et l'exigence d'une plus grande précision. De même, la gestion de transfert dans le futur des réseaux hétérogènes sans fil est beaucoup plus difficile que dans les réseaux traditionnels homogènes. Régimes de procédure de transfert doit être sans faille pour la réunion strictes de qualité de service (QoS) des applications futures et fonctionnel malgré la diversité des caractéristiques de fonctionnement des différentes technologies. En outre, les décisions transfert devraient être suffisamment souples pour tenir compte des préférences utilisateur d'un large éventail de critères proposés par toutes les technologies. L'objectif principal de cette thèse est de mettre au point précis, l'heure et l'emplacement de puissance et de systèmes efficaces de gestion de transfert afin de mieux satisfaire applications sensibles au contexte et mobiles. Pour obtenir une localisation à l'intérieur, le potentiel de réseau local sans fil (WLAN) et Radio Frequency Identification (RFID) que l'emplacement autonome technologies de détection sont d'abord étudiés par des essais plusieurs algorithmes et paramètres dans un banc d'essai expérimental réel ou par de nombreuses simulations, alors que leurs lacunes sont également été identifiés. Leur intégration dans une architecture commune est alors proposée afin de combiner leurs principaux avantages et surmonter leurs limitations. La supériorité des performances du système de synergie sur le stand alone homologues est validée par une analyse approfondie. En ce qui concerne la tâche de gestion transfert, nous repérer que la sensibilité au contexte peut aussi améliorer la fonctionnalité du réseau. En conséquence, deux de tels systèmes qui utilisent l'information obtenue à partir des systèmes de localisation sont proposées. Le premier schéma repose sur un déploiement tag RFID, comme notre architecture de positionnement RFID, et en suivant la scène WLAN analyse du concept de positionnement, prédit l'emplacement réseau de la prochaine couche, c'est à dire le prochain point de fixation sur le réseau. Le second régime repose sur une approche intégrée RFID et sans fil de capteur / actionneur Network (WSAN) de déploiement pour la localisation des utilisateurs physiques et par la suite pour prédire la prochaine leur point de transfert à deux couches de liaison et le réseau. Etre indépendant de la technologie d'accès sans fil principe sous-jacent, les deux régimes peuvent être facilement mises en œuvre dans des réseaux hétérogènes [...]Over the last few decades, we have been witnessing a tremendous evolution in mobile computing, wireless networking and hand-held devices. In the future communication networks, users are anticipated to become even more mobile demanding for ubiquitous connectivity to different applications which will be preferably aware of their context. Admittedly, location information as part of their context is of paramount importance from both application and network perspectives. From application or user point of view, service provision can upgrade if adaptation to the user's context is enabled. From network point of view, functionalities such as routing, handoff management, resource allocation and others can also benefit if user's location can be tracked or even predicted. Within this context, we focus our attention on indoor localization and handoff prediction which are indispensable components towards the ultimate success of the envisioned pervasive communication era. While outdoor positioning systems have already proven their potential in a wide range of commercial applications, the path towards a successful indoor location system is recognized to be much more difficult, mainly due to the harsh indoor characteristics and requirement for higher accuracy. Similarly, handoff management in the future heterogeneous wireless networks is much more challenging than in traditional homogeneous networks. Handoff schemes must be seamless for meeting strict Quality of Service (QoS) requirements of the future applications and functional despite the diversity of operation features of the different technologies. In addition, handoff decisions should be flexible enough to accommodate user preferences from a wide range of criteria offered by all technologies. The main objective of this thesis is to devise accurate, time and power efficient location and handoff management systems in order to satisfy better context-aware and mobile applications. For indoor localization, the potential of Wireless Local Area Network (WLAN) and Radio Frequency Identification (RFID) technologies as standalone location sensing technologies are first studied by testing several algorithms and metrics in a real experimental testbed or by extensive simulations, while their shortcomings are also identified. Their integration in a common architecture is then proposed in order to combine their key benefits and overcome their limitations. The performance superiority of the synergetic system over the stand alone counterparts is validated via extensive analysis. Regarding the handoff management task, we pinpoint that context awareness can also enhance the network functionality. Consequently, two such schemes which utilize information obtained from localization systems are proposed. The first scheme relies on a RFID tag deployment, alike our RFID positioning architecture, and by following the WLAN scene analysis positioning concept, predicts the next network layer location, i.e. the next point of attachment to the network. The second scheme relies on an integrated RFID and Wireless Sensor/Actuator Network (WSAN) deployment for tracking the users' physical location and subsequently for predicting next their handoff point at both link and network layers. Being independent of the underlying principle wireless access technology, both schemes can be easily implemented in heterogeneous networks. Performance evaluation results demonstrate the advantages of the proposed schemes over the standard protocols regarding prediction accuracy, time latency and energy savingsEVRY-INT (912282302) / SudocSudocFranceF

    Advances in Intelligent Vehicle Control

    Get PDF
    This book is a printed edition of the Special Issue Advances in Intelligent Vehicle Control that was published in the journal Sensors. It presents a collection of eleven papers that covers a range of topics, such as the development of intelligent control algorithms for active safety systems, smart sensors, and intelligent and efficient driving. The contributions presented in these papers can serve as useful tools for researchers who are interested in new vehicle technology and in the improvement of vehicle control systems

    Uncertainty Minimization in Robotic 3D Mapping Systems Operating in Dynamic Large-Scale Environments

    Get PDF
    This dissertation research is motivated by the potential and promise of 3D sensing technologies in safety and security applications. With specific focus on unmanned robotic mapping to aid clean-up of hazardous environments, under-vehicle inspection, automatic runway/pavement inspection and modeling of urban environments, we develop modular, multi-sensor, multi-modality robotic 3D imaging prototypes using localization/navigation hardware, laser range scanners and video cameras. While deploying our multi-modality complementary approach to pose and structure recovery in dynamic real-world operating conditions, we observe several data fusion issues that state-of-the-art methodologies are not able to handle. Different bounds on the noise model of heterogeneous sensors, the dynamism of the operating conditions and the interaction of the sensing mechanisms with the environment introduce situations where sensors can intermittently degenerate to accuracy levels lower than their design specification. This observation necessitates the derivation of methods to integrate multi-sensor data considering sensor conflict, performance degradation and potential failure during operation. Our work in this dissertation contributes the derivation of a fault-diagnosis framework inspired by information complexity theory to the data fusion literature. We implement the framework as opportunistic sensing intelligence that is able to evolve a belief policy on the sensors within the multi-agent 3D mapping systems to survive and counter concerns of failure in challenging operating conditions. The implementation of the information-theoretic framework, in addition to eliminating failed/non-functional sensors and avoiding catastrophic fusion, is able to minimize uncertainty during autonomous operation by adaptively deciding to fuse or choose believable sensors. We demonstrate our framework through experiments in multi-sensor robot state localization in large scale dynamic environments and vision-based 3D inference. Our modular hardware and software design of robotic imaging prototypes along with the opportunistic sensing intelligence provides significant improvements towards autonomous accurate photo-realistic 3D mapping and remote visualization of scenes for the motivating applications
    corecore