SlideShare a Scribd company logo
1 of 13
Download to read offline
Sundarapandian et al. (Eds) : ICAITA, SAI, SEAS, CDKP, CMCA-2013
pp. 171–183, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3814
A CUSTOMIZED FLOCKING ALGORITHM FOR
SWARMS OF SENSORS TRACKING A SWARM OF
TARGETS
Anupam Shukla, Gaurav Ojha, Sachin Acharya, Shubham Jain1
1
Department of Information and Communication Technology, Indian Institute of
Information Technology and Management, Gwalior – 474010, INDIA
ABSTRACT
Wireless mobile sensor networks (WMSNs) are groups of mobile sensing agents with multi-
modal sensing capabilities that communicate over wireless networks. WMSNs have more
flexibility in terms of deployment and exploration abilities over static sensor networks. Sensor
networks have a wide range of applications in security and surveillance systems, environmental
monitoring, data gathering for network-centric healthcare systems, monitoring seismic activities
and atmospheric events, tracking traffic congestion and air pollution levels, localization of
autonomous vehicles in intelligent transportation systems, and detecting failures of sensing,
storage, and switching components of smart grids.
The above applications require target tracking for processes and events of interest occurring in
an environment. Various methods and approaches have been proposed in order to track one or
more targets in a pre-defined area. Usually, this turns out to be a complicated job involving
higher order mathematics coupled with artificial intelligence due to the dynamic nature of the
targets. To optimize the resources we need to have an approach that works in a more
straightforward manner while resulting in fairly satisfactory data. In this paper we have
discussed the various cases that might arise while flocking a group of sensors to track targets in
a given environment. The approach has been developed from scratch although some basic
assumptions have been made keeping in mind some previous theories. This paper outlines a
customized approach for feasibly tracking swarms of targets in a specific area so as to minimize
the resources and optimize tracking efficiency.
KEYWORDS
Wireless Sensor Networks, Flocking, Kalman Filtering, Mobile Robots.
1. INTRODUCTION
Flocking behavior is the behavior exhibited when a group of birds, called a flock, are hunting or
wandering in a flight. There are parallels with the shoaling behavior of fish, the swarming
behavior of insects, and herd behavior of land animals and so on. Computer simulations and
mathematical models which have been developed to emulate the flocking behaviors of birds can
generally be applied also to the "flocking" behavior of other species [1]. As a result, the term
"flocking" is sometimes applied, in computer science, to species other than birds. In general
terms, flocking algorithms are applied to objects – a group of which is then referred to as swarms.
Computer Science & Information Technology (CS & IT) 172
Objects may include satellites, sensors, imaging devices, mobile robots, or simply any singular
item which is required to communicate with its replicas and form groups.
In flocking simulations, there is no central control; each object behaves autonomously. In other
words, each object has to decide for itself which flocks to consider as its environment. Usually
environment is defined as a circle (2D) or sphere (3D) with a certain radius (representing reach).
A basic implementation of a flocking algorithm has complexity O(n2) - each object searches
through all other objects to find those which fall into its environment.
The main problem of interest is distributed multi-target tracking using multi mobile wireless
sensor networks. Sensor networks can be divided into two categories based on the relative sensing
range of their nodes: 1) Limited Sensing Range (LSR) sensor networks and 2) Unlimited Sensing
Range (USR) sensor networks. Fig. 1 illustrates the difference between wireless sensor networks
with limited sensing range and unlimited sensing range. Sensors with unlimited (or very long)
sensing range include radars and GPS and sensors with limited sensing range include LIDAR,
cameras, IR sensors, and sonars.
Figure 1. USR and LSR sensor networks: (a) Unlimited sensing range sensor network and (b) Limited
sensing range sensor network. In (a), all sensors are active and observe all targets manoeuvring in the
sensing field. In (b), each target is only observed by a limited set of active sensors that are within the
sensing range around the target.
In an unlimited sensing range sensor network all sensors have the capability of observing a target
manoeuvring in the sensing field for all t > 0. However, most real-life sensor networks are the
LSR-type due to their bounded sensing range and cheap. The main challenge in LSR sensor
networks is that targets of interest cannot be observed by all the sensors and therefore high
performance estimation and tracking of the targets requires reaching a consensus on state of the
targets among the collaborative mobile sensors. If sensors make low quality measurements, they
will not be able to accurately track targets. To obtain quality estimates, the sensors should self-
locate themselves closer to the targets and to get into close proximity of targets. Staying close to
targets requires knowing target location with high levels of certainty. For accurate target location,
dynamic placement of sensors near targets is required. In other words, dynamic placement of
sensors and high quality estimation and tracking of targets are coupled problems this is
schematically shown in figure 1. From figure1 it is clear that to obtain quality estimates, the
173 Computer Science & Information Technology (CS & IT)
sensors should be placed closed proximity of the target. In Figure 2 illustrates the importance of
sensor placement for sensor networks with limited sensing range. As sensors approach targets, the
information value of measurements increases. The scenario in Figure 2 (c) represents the case in
which sensors are placed in the sensing field such that all targets are observed by at least one
sensor.
Figure 2. Dynamic sensor placement, estimations, tracking of the target should self-locate themselves
closer to the targets and to get into close proximity of targets sensors need to have a proper dynamic
placement, i.e. control-driven estimation. This mobility control needs accurate knowledge of target
location. To better control the mobility of the sensors, the sensors need to accurately estimate the location
of the targets.
Figure 3. Three sensor placements scenarios: (a) none of the targets are observed by sensors and the, (b) a
large portion of targets are missed due to lack of proper placement of the sensors, and (c) sensors are
observing all targets and have a better placement compared to both cases (a) and (b). in this figure blue dot
denotes the mobile robots carrying sensor(Limited Sensing Range (LSR) sensor), yellow bordered circle is
the sensing range, and red dots are the targets.
2. LITERATURE REVIEW
Traditionally, a lot of highly advanced mathematical techniques have been used to design
flocking algorithms and understand the behavior of swarms. But the situation becomes more
complex when we need to track certain targets which may also exhibit characteristics of flocking.
Some basic methods that have been used over the years are 1. Kalman filtering and its variations,
2. Alpha-beta filtering, 3. Kernel adaptive filtering and so on.
Kalman filtering algorithms and theory have been one of the most effective ways to address
estimation and multi-target tracking problems. The algorithm works in a two-step process. In the
prediction step, the Kalman filter produces estimates of the current state variables, along with
Computer Science & Information Technology (CS & IT) 174
their uncertainties. Once the outcome of the next measurement (necessarily corrupted with some
amount of error, including random noise) is observed, these estimates are updated using a
weighted average, with more weight being given to estimates with higher certainty. Because of
the algorithm's recursive nature, it can run in real time using only the present input measurements
and the previously calculated state; no additional past information is required.
Variations of Kalman filtering algorithm include a. The distributed Kalman filtering technique
(DKF) [8], b. Kalman Consensus Filtering (KCF), c. Hybrid Kalman filtering and d. Kalman-
bucy filtering.
An Alpha-beta filter is a simplified form of observer for estimation, data smoothing and control
applications. It is closely related to Kalman filters and to linear state observers used in control
theory. Its principal advantage is that it does not require a detailed system model.
Kernel adaptive filtering is an adaptive filtering technique for general nonlinear problems. It is a
natural generalization of linear adaptive filtering in reproducing kernel Hilbert spaces. Kernel
adaptive filters are online kernel methods, closely related to some artificial neural networks such
as radial basis function networks and regularization networks. Some distinguishing features
include: The learning process is online, the learning process is convex with no local minima, and
the learning process requires moderate complexity.
Quite a few researches have been done in this field and researchers have come up with a variety
of techniques. Reynolds [12] has described the motion of flocks as a result of three basic
principles viz. 1. Cohesion, which is an intrinsic attempt to stay close to other flock mates, 2.
Alignment, where the flock mates attempt to match their velocities and 3. Separation, meaning
that collision has to be avoided amongst themselves. Vicsek [11] gave a flocking model in which
the headings of the mobile agents are controlled in such a way that they match the average of the
headings of their closest neighbours. Spears [10] used artificial physics to provide a distributed
control of large number of agents and hence achieved certain positive results such as self-
assembly, self-repair and fault-tolerance. In more recent researches, it has also been considered
that the agents may flock in given space with a virtual leader [9] to guide them. Though this
approach did not consider a target system in the flocking problem.
Area exploration is also an important part of the problem and a novel approach towards the same
has been discussed in [2] and [3] addresses some issues of significance too.
In [4], Christoph, Thomas, et. al have discussed the minimalist flocking algorithm for swarm
robots. By this algorithm, simple swarm robots works without communication, memory or global
information and analyses its potential of aggregating an initially scattered robot swarm. But the
mobility of swarm robots depends on flock's size, increasing the flock size decreases the mobility.
In [5], Weishi, Hong, et. al have discussed a group tracking of flock targets in low-altitude
airspace. In this approach, encouraging results are obtained with high-efficiency and the data
association problem is also overcome. But this method doesn't take into consideration the
influence each object has on the others during flight and so it becomes difficult to adjust its
velocity.
In [7], Yan, Naixue, Nak Young, et. al have discussed a decentralized and adaptive flocking
algorithm for autonomous mobile robots. This algorithm can avoid the collision among robots, its
neighbors and obstacles in the environment. This algorithm would be very useful in practical
applications, like rescue after earthquake and space exploration.
The biggest challenge to solving this problem is to decide how to align the sensors so as to
optimize the resource usability while at the same time track targets efficiently without missing on
175 Computer Science & Information Technology (CS & IT)
any of them. Though this approach involves complex mathematics, we present it in an easily
assimilable form so that it provides a stable foundation for further research to be performed in this
area.
3. PROPOSED METHODOLOGY
In the proposed methodology, we begin with some assumptions regarding the positions and
movements of the sensor robots and the targets.
To start with, we assume that the area to be tracked by the sensor robots is fixed. That means, the
dimension and span of the area are known well-in advance. Vehicles or targets to be tracked enter
from one specific direction and move towards the opposite direction but are to be tracked as long
as they are in the specified area. Each sensor has a fixed range which extends in the form of
circular area around the sensor. This can be termed as its ‘zone’. A sensor can only track objects
within its ‘zone’. For our specific customized algorithm, each sensor possesses two kinds of
zones. A primary zone and a secondary zone. Primary zone is defined as the zone created by that
part of the sensor which can track targets, i.e. a high frequency signal is present in this zone
which can track the targets efficiently. A secondary zone is then defined as an extended area
outside the primary zone wherein low frequency signals, sufficient to track other sensors, is
present.
Figure 4. Primary and secondary zones in our hybrid sensors.
Activation of the secondary zone is subject to requirements and needs. The primary zone, too, can
sense the location of nearby sensors but in our cases it is not required. Keeping the secondary
zone deactivated optimizes the resource requirements to a large extent.
Next, we define the following customized approach for tracking a swarm of targets –
We first define an area ‘A’ which represents the tracking area, i.e. the area within which we are
interested in tracking that swarm of objects.
The radius of the range of each sensor (S) is ‘r’, and n(S) represents the number of sensors that
are there for any given instance.
We start by finding out the total area covered by ‘n’ sensors and denote it by AS.
Computer Science & Information Technology (CS & IT) 176
Range or zone of each sensor is defined as
Case 1: AS ≥ A so n(S) is sufficient to cover the area A. Sensors are arranged so as to cover the
whole area and then tracking is done using suitable handoff techniques.
Figure 5. Case 1, when the number of sensors is enough to cover the region to be tracked.
In this case, there are n sensors covering the given area. Since the number of sensors are n, the
total area covered by the sensor is given by .
Therefore, if then, a suitable handoff technique is used to track the moving targets.
As the targets move, a hand-off technique can be applied. If the Velocity of the target in the
outward direction is either increasing or constant and the distance of the target from the sensor is
increasing, then a hand-off technique can be used to pass off the information of the location of the
target to the nearby sensor. A customized handoff algorithm can be further developed for this
approach based upon the study outlined in [13] where it has been discussed about an approach
where handoff is based on relative zonal strengths between sensors and targets and it occurs when
the relative zonal strength between a sensor and the target decreases while at the same time it
increases with respect to another sensor.
As shown in figure, the sensors have arranged themselves to cover the whole area. Some sensors
may be left out after this exercise because we have assumed that their number is sufficient to
cover the whole area.
Case 2: As >> A, so we can put some of the sensors to rest and then do Case 1.
177 Computer Science & Information Technology (CS & IT)
Figure 6. Case 2, when the number of sensors is more than enough to cover the region to be tracked.
In this case, since the number of sensors is extremely large, the area covered by the sensors is
extremely greater than the area of the ground. In this situation, the excess sensors may be put to
some other use and Case 1 may be applied.
Case 3: AS < A, we arrange the sensors in the area towards the direction from where the vehicles
are supposed to enter and then use a suitable algorithm to define the motion of the sensors with
respect to the targets.
This is a tricky case. We take into consideration the approach defined by Xiaoyuan, et al. [6] and
for the dynamic system, the following assumptions have to be made –
1. Each sensor knows its own absolute position in terms of a co-ordinate system defined for
the area in which tracking is to be done.
2. Each sensor has information about the positions of only those sensors which are located
in its secondary zone. If the secondary zones of two sensors overlap, they still know each
other’s positions and velocities because each knows its own absolute position.
3. Each sensor has the information about the positions and velocities of the targets in its
primary zone only.
4. Each sensor can track only a limited number of targets.
As previously defined, the area to be tracked is A and the number of sensors is n(S), where As is
the total area that can be covered by the primary zones of the sensors and As < A. Now, let’s say
that n(s) is sufficient to cover th part of the total area A using the approach defined in case 1. So,
we arrange n(S)/2 sensors in A/2kth part of the area. The remaining n(S)/2 sensors then evenly
distribute themselves in the remaining part of the area such that their secondary zones
overlap and they know the positions of each other pairwise. If their secondary zones cannot
overlap, then it boils down to case 4 implying that the number of sensors is just not sufficient to
cover the whole area and the targets cannot be tracked.
Considering that the case holds true, we can now define the following behaviour for the sensors-
Computer Science & Information Technology (CS & IT) 178
1. As long as the targets move in the first A/2k part of the area, they can be efficiently
tracked without any sensor movement as explained in case 1.
2. When a target enters the next part of the area, the sensors use a ‘pass the parcel’
approach and keep handing off the tracking job to the nearest sensors towards which the
targets are moving based upon their velocities and direction of movement.
Figure 7. Case 3, when the number of sensors is just optimum to cover the region to be tracked.
Case 4: AS << A, the number of sensors is insufficient to cover the area given.
In this case, the number of sensors is insufficient to cover the area. Therefore, if
then we cannot effectively track the targets in the given area and thus tracking will not be
possible.
Figure 8. Case 4, when the number of sensors is too less than what is required to cover the region in which
tracking is to be done.
179 Computer Science & Information Technology (CS & IT)
4. EVALUATION AND INFERENCES
We built a customized application to test the feasibility and working of the proposed algorithm.
We have obtained some brilliant results. We have predicted the optimum number of sensors
required for a given area and assigning it to one of the cases as described above. The results of the
evaluation are given as follows –
Area Radius of
Primary
Zone
Radius of
Secondary
Zone
Area of
Primary
Zone
Area of
Secondary
Zone
No. of
Sensors for
Optimized
Tracking
Value of K Case
Used -
4 2 4 12.566 50.265 1 0.32 Case 1
10 2 4 12.566 50.265 1 0.8 Case 3
20 2 4 12.566 50.265 2 0.8 Case 3
40 2 4 12.566 50.265 4 0.8 Case 3
50 2 4 12.566 50.265 4 0.99 Case 3
80 2 4 12.566 50.265 6 1.06 Case 3
90 2 4 12.566 50.265 6 1.19 Case 3
160 2 4 12.566 50.265 10 1.27 Case 3
210 2 4 12.566 50.265 12 1.39 Case 3
250 2 4 12.566 50.265 14 1.42 Case 3
1000 1 3 3.142 28.274 80 3.98 Case 3
1000 2 4 12.566 50.265 54 1.47 Case 3
1000 3 5 28.274 78.54 40 0.88 Case 3
1000 4 6 50.265 113.097 32 0.62 Case 3
1000 5 7 78.54 153.938 28 0.45 Case 1
1000 6 8 113.097 201.062 24 0.37 Case 1
1000 7 9 153.938 254.469 20 0.32 Case 1
The value of K was calculated keeping in mind that the optimum number of sensors required (as
described by Case 3 of the proposed methodology) are found out by equating the area covered by
primary zones of half of the sensors to the area covered by the secondary zones of the other half
of the sensors.
So, we got where A represents the area of the region to be tracked and n is the number
of sensors and r is the radius of the primary zones.
The Value of n is calculated using the formula where R is the radius of the secondary
zone.
Based on an extended version of the above table, we plotted the following graphs –
Computer Science & Information Technology (CS & IT) 180
Figure 9. Comparison of K-values v/s Area of the region to be tracked.
The above graph shows the variation of k-value as the area increases given that the radii of the
primary and secondary zones are constant. The results show that the value of K converges to a
constant even though area increases steadily. We can say that the constant K value indicates a
general tendency for the system to use Case 3.
Next, we have plotted a graph of K-value v/s Radius of the Primary Zone.
Figure 10. Comparisons of K-values v/s Radius of primary zone of the sensor.
We found out that, keeping the area constant, the K-value diminishes continuously with increase
in the radius of the primary zone. Beyond k = 0.5, the system as enough sensors to cover the
whole area and so, it utilizes the approach mentioned in case 1.
181 Computer Science & Information Technology (CS & IT)
Finally, we plotted a graph of number of sensors required v/s area of the region to be tracked. It
was observed that the number of sensors varies directly as the area.
Figure 11. Comparison of Area v/s Number of sensors required to track the area.
5. APPLICATIONS
Sensor networks have a wide range of applications in security and surveillance systems,
environmental monitoring, data gathering for network-centric healthcare systems, monitoring
seismic activities and atmospheric events, tracking traffic congestion and air pollution levels,
localization of autonomous vehicles in intelligent transportation systems, and detecting failures of
sensing, storage, and switching components of smart grids.
In security and surveillance systems, it can be used to track infiltrations and movements of high
profile targets or VIPs for their security. It can be a very efficient method to provide security at
the border of countries. In environmental monitoring, it can used effectively to track the motion
of endangered animals to make sure they’re in a safe zone. It can also be used to see if any
harmful wild animals or poachers are approaching any restricted areas viz. human habitations and
protected areas respectively.
In traffic congestion monitoring this method can be very accurate at pulling out details about jam-
prone areas and help chalk out techniques to prevent congestion in real time.
6. CONCLUSION
We have developed a customized approach for tracking a swarm of targets using a swarm of
sensors. We have also taken a number of cases which can possibly arise in the implementation of
this technique. It can prove to be very effective in a number of cases as discussed in the
applications.
But we have also seen that the method fails if the area to be tracked is really large or the number
of sensors is small. In that case one approach is to let the sensors move haphazardly behind the
targets and keep tracking them as long as possible. In this approach we face the problem of de-
Computer Science & Information Technology (CS & IT) 182
flocking of the targets. We can never be very sure that a flock of targets won’t separate while
moving. Another approach is to assign the sensors some specific targets so that they don’t get
overloaded. But this approach requires previous information about the movement of the targets
which may not always be possible.
Further research is required in order to develop more advanced techniques for case 3 described in
the proposed methodology and we also need to address the issue of failure of the technique as
outlined in case 4. A better hand-off technique tailor-made to suit this approach can be designed
to take full advantage of this customized flocking algorithm.
REFERENCES
[1] Basics of Flocking Behaviour http://ccl.northwestern.edu/netlogo/models/Flocking and simulations
http://www.red3d.com/cwr/boids/
[2] Shukla, Anupam, et al., A novel approach for path planning, area explore and area retrieval of an
autonomous robot using the low-cost infrared sensors, 7th IEEE Conference on Industrial Electronics
and Applications (ICIEA), 2012.
[3] Tiwari, Ritu, Sharma, Sanjeev, et al., Area Exploration by Flocking of Multi Robot, Procedia
Engineering, Volume 41, 377-382, published by Elsevier, 2012.
[4] Christoph, M., Thomas, S. and Karl, C., A minimalist flocking algorithm for swarm robots, Advances
in Artifial Life, Darwin meets von Neumann, published in Springer LNCS, Volume 5778, pp 375-
382, 2011.
[5] Weishi, C., Hong, L., et al., ‘Group Tracking of Flock Targets in Low-Altitude Airspace’, in
Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with
Applications Workshops, 131-136, May 26-28, 2011.
[6] Xiaoyuan, L., et al., Flocking algorithm with multi-target tracking for multi-agent systems, Pattern
Recognition Letters, Volume 31, 800-805, published by Elsevier, 2010.
[7] Yan, Y., Naixue, X., et al., A decentralized and adaptive flocking algorithm for autonomous mobile
robots, 3rd International Conference on Grid and Pervasive Computing – Workshops, March 2008
[8] R. Olfati-Saber, Distributed Kalman Filtering for Sensor Networks, In Proceedings of the 46th IEEE
Coneference on Decision and Control, New Orleans, LA, USA, Dec. 12-14, 2007.
[9] Shi, H. et al., 2007, Flocking of multi-agent systems with a virtual leader, In Proceedings of the 2007
IEEE Symposium on Artificial Life, Hawaii, USA, pp. 287–294.
[10] Spears, W. et al., 2004, Distributed, physics-based control of swarms of vehicles, Autonomous Robots
17, 137–162.
[11] Vicsek, T. et al., 1995, Novel type of phase transition in a system of self-driven particles. Phys. Rev.
Lett. 75 (8), 1226–1229.
[12] Reynolds, C. W., 1987, Flocks, birds, and schools: A distributed behavioral mode. Comput. Graphics
(ACM SIGGRAPH ’87 Conf. Proc.) 21 (6), 25–34.
[13] Nasif, Ekiz, Salih, Tara, et. al., ‘An Overview of Handoff Techniques in Cellular Networks’,
International Journal of Information Technology, Volume 2, Number 2.
Authors
Prof. Anupam Shukla is a Professor in the ICT Department of the institute. He has 19 years
of teaching experience. His research interest includes Speech processing, Artificial
Intelligence, Soft Computing and Bio-informatics. Prior to IIITM, Gwalior, he was Reader
and Head at NIT, Raipur in Biomedical Engineering Department.
Gaurav Ojha is a student in the Department of Information Technology at Indian Institute
of Information Technology and Management, Gwalior. His areas of interest are Web
Technologies, Open Source Software and Internet Security.
183 Computer Science & Information Technology (CS & IT)
Sachin Acharya is a student in the Department of Information Technology and Indian
Institute of Information Technology and Management, Gwalior. His areas of interest are OS,
Optimization methods and algorithms.
Shubham Jain isa student in the Department of Information Technology, Indian Institute of
Information Technology and Management, Gwalior. He is interested in a variety of nature
inspired algorithms and optimization techniques.

More Related Content

What's hot

LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
Indoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsIndoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsjoaquin_gonzalez
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksArtificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksambitlick
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...csandit
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...eSAT Publishing House
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
An optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingAn optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingmarwaeng
 

What's hot (17)

LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
O026084087
O026084087O026084087
O026084087
 
Indoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsIndoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNs
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksArtificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
F33022028
F33022028F33022028
F33022028
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networks
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
Optimization of Average Distance Based Self-Relocation Algorithm Using Augmen...
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
An optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healingAn optimal algorithm for coverage hole healing
An optimal algorithm for coverage hole healing
 

Similar to A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TARGETS

Enhancing indoor localization using IoT techniques
Enhancing indoor localization using IoT techniquesEnhancing indoor localization using IoT techniques
Enhancing indoor localization using IoT techniquesMohamed Nabil, MSc.
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla SahiSilvaGraf83
 
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Eswar Publications
 
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networksA privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networkssamah72
 
IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...
IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...
IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...IRJET Journal
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...ijsrd.com
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
APPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVES
APPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVESAPPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVES
APPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVESAmy Roman
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...Acad
 
Prediction Based Moving Object Tracking in Wireless Sensor Network
Prediction Based Moving Object Tracking in Wireless Sensor NetworkPrediction Based Moving Object Tracking in Wireless Sensor Network
Prediction Based Moving Object Tracking in Wireless Sensor NetworkIRJET Journal
 

Similar to A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TARGETS (20)

Enhancing indoor localization using IoT techniques
Enhancing indoor localization using IoT techniquesEnhancing indoor localization using IoT techniques
Enhancing indoor localization using IoT techniques
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
 
E010412433
E010412433E010412433
E010412433
 
N017318992
N017318992N017318992
N017318992
 
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networksA privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
 
Seminar
SeminarSeminar
Seminar
 
IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...
IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...
IRJET= Air Writing: Gesture Recognition using Ultrasound Sensors and Grid-Eye...
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
IJET-V2I6P1
IJET-V2I6P1IJET-V2I6P1
IJET-V2I6P1
 
F33022028
F33022028F33022028
F33022028
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
APPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVES
APPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVESAPPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVES
APPLICATION OF WIRELESS NANO SENSOR NETWORKS FOR WILD LIVES
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
 
J017345864
J017345864J017345864
J017345864
 
Prediction Based Moving Object Tracking in Wireless Sensor Network
Prediction Based Moving Object Tracking in Wireless Sensor NetworkPrediction Based Moving Object Tracking in Wireless Sensor Network
Prediction Based Moving Object Tracking in Wireless Sensor Network
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TARGETS

  • 1. Sundarapandian et al. (Eds) : ICAITA, SAI, SEAS, CDKP, CMCA-2013 pp. 171–183, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3814 A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TARGETS Anupam Shukla, Gaurav Ojha, Sachin Acharya, Shubham Jain1 1 Department of Information and Communication Technology, Indian Institute of Information Technology and Management, Gwalior – 474010, INDIA ABSTRACT Wireless mobile sensor networks (WMSNs) are groups of mobile sensing agents with multi- modal sensing capabilities that communicate over wireless networks. WMSNs have more flexibility in terms of deployment and exploration abilities over static sensor networks. Sensor networks have a wide range of applications in security and surveillance systems, environmental monitoring, data gathering for network-centric healthcare systems, monitoring seismic activities and atmospheric events, tracking traffic congestion and air pollution levels, localization of autonomous vehicles in intelligent transportation systems, and detecting failures of sensing, storage, and switching components of smart grids. The above applications require target tracking for processes and events of interest occurring in an environment. Various methods and approaches have been proposed in order to track one or more targets in a pre-defined area. Usually, this turns out to be a complicated job involving higher order mathematics coupled with artificial intelligence due to the dynamic nature of the targets. To optimize the resources we need to have an approach that works in a more straightforward manner while resulting in fairly satisfactory data. In this paper we have discussed the various cases that might arise while flocking a group of sensors to track targets in a given environment. The approach has been developed from scratch although some basic assumptions have been made keeping in mind some previous theories. This paper outlines a customized approach for feasibly tracking swarms of targets in a specific area so as to minimize the resources and optimize tracking efficiency. KEYWORDS Wireless Sensor Networks, Flocking, Kalman Filtering, Mobile Robots. 1. INTRODUCTION Flocking behavior is the behavior exhibited when a group of birds, called a flock, are hunting or wandering in a flight. There are parallels with the shoaling behavior of fish, the swarming behavior of insects, and herd behavior of land animals and so on. Computer simulations and mathematical models which have been developed to emulate the flocking behaviors of birds can generally be applied also to the "flocking" behavior of other species [1]. As a result, the term "flocking" is sometimes applied, in computer science, to species other than birds. In general terms, flocking algorithms are applied to objects – a group of which is then referred to as swarms.
  • 2. Computer Science & Information Technology (CS & IT) 172 Objects may include satellites, sensors, imaging devices, mobile robots, or simply any singular item which is required to communicate with its replicas and form groups. In flocking simulations, there is no central control; each object behaves autonomously. In other words, each object has to decide for itself which flocks to consider as its environment. Usually environment is defined as a circle (2D) or sphere (3D) with a certain radius (representing reach). A basic implementation of a flocking algorithm has complexity O(n2) - each object searches through all other objects to find those which fall into its environment. The main problem of interest is distributed multi-target tracking using multi mobile wireless sensor networks. Sensor networks can be divided into two categories based on the relative sensing range of their nodes: 1) Limited Sensing Range (LSR) sensor networks and 2) Unlimited Sensing Range (USR) sensor networks. Fig. 1 illustrates the difference between wireless sensor networks with limited sensing range and unlimited sensing range. Sensors with unlimited (or very long) sensing range include radars and GPS and sensors with limited sensing range include LIDAR, cameras, IR sensors, and sonars. Figure 1. USR and LSR sensor networks: (a) Unlimited sensing range sensor network and (b) Limited sensing range sensor network. In (a), all sensors are active and observe all targets manoeuvring in the sensing field. In (b), each target is only observed by a limited set of active sensors that are within the sensing range around the target. In an unlimited sensing range sensor network all sensors have the capability of observing a target manoeuvring in the sensing field for all t > 0. However, most real-life sensor networks are the LSR-type due to their bounded sensing range and cheap. The main challenge in LSR sensor networks is that targets of interest cannot be observed by all the sensors and therefore high performance estimation and tracking of the targets requires reaching a consensus on state of the targets among the collaborative mobile sensors. If sensors make low quality measurements, they will not be able to accurately track targets. To obtain quality estimates, the sensors should self- locate themselves closer to the targets and to get into close proximity of targets. Staying close to targets requires knowing target location with high levels of certainty. For accurate target location, dynamic placement of sensors near targets is required. In other words, dynamic placement of sensors and high quality estimation and tracking of targets are coupled problems this is schematically shown in figure 1. From figure1 it is clear that to obtain quality estimates, the
  • 3. 173 Computer Science & Information Technology (CS & IT) sensors should be placed closed proximity of the target. In Figure 2 illustrates the importance of sensor placement for sensor networks with limited sensing range. As sensors approach targets, the information value of measurements increases. The scenario in Figure 2 (c) represents the case in which sensors are placed in the sensing field such that all targets are observed by at least one sensor. Figure 2. Dynamic sensor placement, estimations, tracking of the target should self-locate themselves closer to the targets and to get into close proximity of targets sensors need to have a proper dynamic placement, i.e. control-driven estimation. This mobility control needs accurate knowledge of target location. To better control the mobility of the sensors, the sensors need to accurately estimate the location of the targets. Figure 3. Three sensor placements scenarios: (a) none of the targets are observed by sensors and the, (b) a large portion of targets are missed due to lack of proper placement of the sensors, and (c) sensors are observing all targets and have a better placement compared to both cases (a) and (b). in this figure blue dot denotes the mobile robots carrying sensor(Limited Sensing Range (LSR) sensor), yellow bordered circle is the sensing range, and red dots are the targets. 2. LITERATURE REVIEW Traditionally, a lot of highly advanced mathematical techniques have been used to design flocking algorithms and understand the behavior of swarms. But the situation becomes more complex when we need to track certain targets which may also exhibit characteristics of flocking. Some basic methods that have been used over the years are 1. Kalman filtering and its variations, 2. Alpha-beta filtering, 3. Kernel adaptive filtering and so on. Kalman filtering algorithms and theory have been one of the most effective ways to address estimation and multi-target tracking problems. The algorithm works in a two-step process. In the prediction step, the Kalman filter produces estimates of the current state variables, along with
  • 4. Computer Science & Information Technology (CS & IT) 174 their uncertainties. Once the outcome of the next measurement (necessarily corrupted with some amount of error, including random noise) is observed, these estimates are updated using a weighted average, with more weight being given to estimates with higher certainty. Because of the algorithm's recursive nature, it can run in real time using only the present input measurements and the previously calculated state; no additional past information is required. Variations of Kalman filtering algorithm include a. The distributed Kalman filtering technique (DKF) [8], b. Kalman Consensus Filtering (KCF), c. Hybrid Kalman filtering and d. Kalman- bucy filtering. An Alpha-beta filter is a simplified form of observer for estimation, data smoothing and control applications. It is closely related to Kalman filters and to linear state observers used in control theory. Its principal advantage is that it does not require a detailed system model. Kernel adaptive filtering is an adaptive filtering technique for general nonlinear problems. It is a natural generalization of linear adaptive filtering in reproducing kernel Hilbert spaces. Kernel adaptive filters are online kernel methods, closely related to some artificial neural networks such as radial basis function networks and regularization networks. Some distinguishing features include: The learning process is online, the learning process is convex with no local minima, and the learning process requires moderate complexity. Quite a few researches have been done in this field and researchers have come up with a variety of techniques. Reynolds [12] has described the motion of flocks as a result of three basic principles viz. 1. Cohesion, which is an intrinsic attempt to stay close to other flock mates, 2. Alignment, where the flock mates attempt to match their velocities and 3. Separation, meaning that collision has to be avoided amongst themselves. Vicsek [11] gave a flocking model in which the headings of the mobile agents are controlled in such a way that they match the average of the headings of their closest neighbours. Spears [10] used artificial physics to provide a distributed control of large number of agents and hence achieved certain positive results such as self- assembly, self-repair and fault-tolerance. In more recent researches, it has also been considered that the agents may flock in given space with a virtual leader [9] to guide them. Though this approach did not consider a target system in the flocking problem. Area exploration is also an important part of the problem and a novel approach towards the same has been discussed in [2] and [3] addresses some issues of significance too. In [4], Christoph, Thomas, et. al have discussed the minimalist flocking algorithm for swarm robots. By this algorithm, simple swarm robots works without communication, memory or global information and analyses its potential of aggregating an initially scattered robot swarm. But the mobility of swarm robots depends on flock's size, increasing the flock size decreases the mobility. In [5], Weishi, Hong, et. al have discussed a group tracking of flock targets in low-altitude airspace. In this approach, encouraging results are obtained with high-efficiency and the data association problem is also overcome. But this method doesn't take into consideration the influence each object has on the others during flight and so it becomes difficult to adjust its velocity. In [7], Yan, Naixue, Nak Young, et. al have discussed a decentralized and adaptive flocking algorithm for autonomous mobile robots. This algorithm can avoid the collision among robots, its neighbors and obstacles in the environment. This algorithm would be very useful in practical applications, like rescue after earthquake and space exploration. The biggest challenge to solving this problem is to decide how to align the sensors so as to optimize the resource usability while at the same time track targets efficiently without missing on
  • 5. 175 Computer Science & Information Technology (CS & IT) any of them. Though this approach involves complex mathematics, we present it in an easily assimilable form so that it provides a stable foundation for further research to be performed in this area. 3. PROPOSED METHODOLOGY In the proposed methodology, we begin with some assumptions regarding the positions and movements of the sensor robots and the targets. To start with, we assume that the area to be tracked by the sensor robots is fixed. That means, the dimension and span of the area are known well-in advance. Vehicles or targets to be tracked enter from one specific direction and move towards the opposite direction but are to be tracked as long as they are in the specified area. Each sensor has a fixed range which extends in the form of circular area around the sensor. This can be termed as its ‘zone’. A sensor can only track objects within its ‘zone’. For our specific customized algorithm, each sensor possesses two kinds of zones. A primary zone and a secondary zone. Primary zone is defined as the zone created by that part of the sensor which can track targets, i.e. a high frequency signal is present in this zone which can track the targets efficiently. A secondary zone is then defined as an extended area outside the primary zone wherein low frequency signals, sufficient to track other sensors, is present. Figure 4. Primary and secondary zones in our hybrid sensors. Activation of the secondary zone is subject to requirements and needs. The primary zone, too, can sense the location of nearby sensors but in our cases it is not required. Keeping the secondary zone deactivated optimizes the resource requirements to a large extent. Next, we define the following customized approach for tracking a swarm of targets – We first define an area ‘A’ which represents the tracking area, i.e. the area within which we are interested in tracking that swarm of objects. The radius of the range of each sensor (S) is ‘r’, and n(S) represents the number of sensors that are there for any given instance. We start by finding out the total area covered by ‘n’ sensors and denote it by AS.
  • 6. Computer Science & Information Technology (CS & IT) 176 Range or zone of each sensor is defined as Case 1: AS ≥ A so n(S) is sufficient to cover the area A. Sensors are arranged so as to cover the whole area and then tracking is done using suitable handoff techniques. Figure 5. Case 1, when the number of sensors is enough to cover the region to be tracked. In this case, there are n sensors covering the given area. Since the number of sensors are n, the total area covered by the sensor is given by . Therefore, if then, a suitable handoff technique is used to track the moving targets. As the targets move, a hand-off technique can be applied. If the Velocity of the target in the outward direction is either increasing or constant and the distance of the target from the sensor is increasing, then a hand-off technique can be used to pass off the information of the location of the target to the nearby sensor. A customized handoff algorithm can be further developed for this approach based upon the study outlined in [13] where it has been discussed about an approach where handoff is based on relative zonal strengths between sensors and targets and it occurs when the relative zonal strength between a sensor and the target decreases while at the same time it increases with respect to another sensor. As shown in figure, the sensors have arranged themselves to cover the whole area. Some sensors may be left out after this exercise because we have assumed that their number is sufficient to cover the whole area. Case 2: As >> A, so we can put some of the sensors to rest and then do Case 1.
  • 7. 177 Computer Science & Information Technology (CS & IT) Figure 6. Case 2, when the number of sensors is more than enough to cover the region to be tracked. In this case, since the number of sensors is extremely large, the area covered by the sensors is extremely greater than the area of the ground. In this situation, the excess sensors may be put to some other use and Case 1 may be applied. Case 3: AS < A, we arrange the sensors in the area towards the direction from where the vehicles are supposed to enter and then use a suitable algorithm to define the motion of the sensors with respect to the targets. This is a tricky case. We take into consideration the approach defined by Xiaoyuan, et al. [6] and for the dynamic system, the following assumptions have to be made – 1. Each sensor knows its own absolute position in terms of a co-ordinate system defined for the area in which tracking is to be done. 2. Each sensor has information about the positions of only those sensors which are located in its secondary zone. If the secondary zones of two sensors overlap, they still know each other’s positions and velocities because each knows its own absolute position. 3. Each sensor has the information about the positions and velocities of the targets in its primary zone only. 4. Each sensor can track only a limited number of targets. As previously defined, the area to be tracked is A and the number of sensors is n(S), where As is the total area that can be covered by the primary zones of the sensors and As < A. Now, let’s say that n(s) is sufficient to cover th part of the total area A using the approach defined in case 1. So, we arrange n(S)/2 sensors in A/2kth part of the area. The remaining n(S)/2 sensors then evenly distribute themselves in the remaining part of the area such that their secondary zones overlap and they know the positions of each other pairwise. If their secondary zones cannot overlap, then it boils down to case 4 implying that the number of sensors is just not sufficient to cover the whole area and the targets cannot be tracked. Considering that the case holds true, we can now define the following behaviour for the sensors-
  • 8. Computer Science & Information Technology (CS & IT) 178 1. As long as the targets move in the first A/2k part of the area, they can be efficiently tracked without any sensor movement as explained in case 1. 2. When a target enters the next part of the area, the sensors use a ‘pass the parcel’ approach and keep handing off the tracking job to the nearest sensors towards which the targets are moving based upon their velocities and direction of movement. Figure 7. Case 3, when the number of sensors is just optimum to cover the region to be tracked. Case 4: AS << A, the number of sensors is insufficient to cover the area given. In this case, the number of sensors is insufficient to cover the area. Therefore, if then we cannot effectively track the targets in the given area and thus tracking will not be possible. Figure 8. Case 4, when the number of sensors is too less than what is required to cover the region in which tracking is to be done.
  • 9. 179 Computer Science & Information Technology (CS & IT) 4. EVALUATION AND INFERENCES We built a customized application to test the feasibility and working of the proposed algorithm. We have obtained some brilliant results. We have predicted the optimum number of sensors required for a given area and assigning it to one of the cases as described above. The results of the evaluation are given as follows – Area Radius of Primary Zone Radius of Secondary Zone Area of Primary Zone Area of Secondary Zone No. of Sensors for Optimized Tracking Value of K Case Used - 4 2 4 12.566 50.265 1 0.32 Case 1 10 2 4 12.566 50.265 1 0.8 Case 3 20 2 4 12.566 50.265 2 0.8 Case 3 40 2 4 12.566 50.265 4 0.8 Case 3 50 2 4 12.566 50.265 4 0.99 Case 3 80 2 4 12.566 50.265 6 1.06 Case 3 90 2 4 12.566 50.265 6 1.19 Case 3 160 2 4 12.566 50.265 10 1.27 Case 3 210 2 4 12.566 50.265 12 1.39 Case 3 250 2 4 12.566 50.265 14 1.42 Case 3 1000 1 3 3.142 28.274 80 3.98 Case 3 1000 2 4 12.566 50.265 54 1.47 Case 3 1000 3 5 28.274 78.54 40 0.88 Case 3 1000 4 6 50.265 113.097 32 0.62 Case 3 1000 5 7 78.54 153.938 28 0.45 Case 1 1000 6 8 113.097 201.062 24 0.37 Case 1 1000 7 9 153.938 254.469 20 0.32 Case 1 The value of K was calculated keeping in mind that the optimum number of sensors required (as described by Case 3 of the proposed methodology) are found out by equating the area covered by primary zones of half of the sensors to the area covered by the secondary zones of the other half of the sensors. So, we got where A represents the area of the region to be tracked and n is the number of sensors and r is the radius of the primary zones. The Value of n is calculated using the formula where R is the radius of the secondary zone. Based on an extended version of the above table, we plotted the following graphs –
  • 10. Computer Science & Information Technology (CS & IT) 180 Figure 9. Comparison of K-values v/s Area of the region to be tracked. The above graph shows the variation of k-value as the area increases given that the radii of the primary and secondary zones are constant. The results show that the value of K converges to a constant even though area increases steadily. We can say that the constant K value indicates a general tendency for the system to use Case 3. Next, we have plotted a graph of K-value v/s Radius of the Primary Zone. Figure 10. Comparisons of K-values v/s Radius of primary zone of the sensor. We found out that, keeping the area constant, the K-value diminishes continuously with increase in the radius of the primary zone. Beyond k = 0.5, the system as enough sensors to cover the whole area and so, it utilizes the approach mentioned in case 1.
  • 11. 181 Computer Science & Information Technology (CS & IT) Finally, we plotted a graph of number of sensors required v/s area of the region to be tracked. It was observed that the number of sensors varies directly as the area. Figure 11. Comparison of Area v/s Number of sensors required to track the area. 5. APPLICATIONS Sensor networks have a wide range of applications in security and surveillance systems, environmental monitoring, data gathering for network-centric healthcare systems, monitoring seismic activities and atmospheric events, tracking traffic congestion and air pollution levels, localization of autonomous vehicles in intelligent transportation systems, and detecting failures of sensing, storage, and switching components of smart grids. In security and surveillance systems, it can be used to track infiltrations and movements of high profile targets or VIPs for their security. It can be a very efficient method to provide security at the border of countries. In environmental monitoring, it can used effectively to track the motion of endangered animals to make sure they’re in a safe zone. It can also be used to see if any harmful wild animals or poachers are approaching any restricted areas viz. human habitations and protected areas respectively. In traffic congestion monitoring this method can be very accurate at pulling out details about jam- prone areas and help chalk out techniques to prevent congestion in real time. 6. CONCLUSION We have developed a customized approach for tracking a swarm of targets using a swarm of sensors. We have also taken a number of cases which can possibly arise in the implementation of this technique. It can prove to be very effective in a number of cases as discussed in the applications. But we have also seen that the method fails if the area to be tracked is really large or the number of sensors is small. In that case one approach is to let the sensors move haphazardly behind the targets and keep tracking them as long as possible. In this approach we face the problem of de-
  • 12. Computer Science & Information Technology (CS & IT) 182 flocking of the targets. We can never be very sure that a flock of targets won’t separate while moving. Another approach is to assign the sensors some specific targets so that they don’t get overloaded. But this approach requires previous information about the movement of the targets which may not always be possible. Further research is required in order to develop more advanced techniques for case 3 described in the proposed methodology and we also need to address the issue of failure of the technique as outlined in case 4. A better hand-off technique tailor-made to suit this approach can be designed to take full advantage of this customized flocking algorithm. REFERENCES [1] Basics of Flocking Behaviour http://ccl.northwestern.edu/netlogo/models/Flocking and simulations http://www.red3d.com/cwr/boids/ [2] Shukla, Anupam, et al., A novel approach for path planning, area explore and area retrieval of an autonomous robot using the low-cost infrared sensors, 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2012. [3] Tiwari, Ritu, Sharma, Sanjeev, et al., Area Exploration by Flocking of Multi Robot, Procedia Engineering, Volume 41, 377-382, published by Elsevier, 2012. [4] Christoph, M., Thomas, S. and Karl, C., A minimalist flocking algorithm for swarm robots, Advances in Artifial Life, Darwin meets von Neumann, published in Springer LNCS, Volume 5778, pp 375- 382, 2011. [5] Weishi, C., Hong, L., et al., ‘Group Tracking of Flock Targets in Low-Altitude Airspace’, in Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, 131-136, May 26-28, 2011. [6] Xiaoyuan, L., et al., Flocking algorithm with multi-target tracking for multi-agent systems, Pattern Recognition Letters, Volume 31, 800-805, published by Elsevier, 2010. [7] Yan, Y., Naixue, X., et al., A decentralized and adaptive flocking algorithm for autonomous mobile robots, 3rd International Conference on Grid and Pervasive Computing – Workshops, March 2008 [8] R. Olfati-Saber, Distributed Kalman Filtering for Sensor Networks, In Proceedings of the 46th IEEE Coneference on Decision and Control, New Orleans, LA, USA, Dec. 12-14, 2007. [9] Shi, H. et al., 2007, Flocking of multi-agent systems with a virtual leader, In Proceedings of the 2007 IEEE Symposium on Artificial Life, Hawaii, USA, pp. 287–294. [10] Spears, W. et al., 2004, Distributed, physics-based control of swarms of vehicles, Autonomous Robots 17, 137–162. [11] Vicsek, T. et al., 1995, Novel type of phase transition in a system of self-driven particles. Phys. Rev. Lett. 75 (8), 1226–1229. [12] Reynolds, C. W., 1987, Flocks, birds, and schools: A distributed behavioral mode. Comput. Graphics (ACM SIGGRAPH ’87 Conf. Proc.) 21 (6), 25–34. [13] Nasif, Ekiz, Salih, Tara, et. al., ‘An Overview of Handoff Techniques in Cellular Networks’, International Journal of Information Technology, Volume 2, Number 2. Authors Prof. Anupam Shukla is a Professor in the ICT Department of the institute. He has 19 years of teaching experience. His research interest includes Speech processing, Artificial Intelligence, Soft Computing and Bio-informatics. Prior to IIITM, Gwalior, he was Reader and Head at NIT, Raipur in Biomedical Engineering Department. Gaurav Ojha is a student in the Department of Information Technology at Indian Institute of Information Technology and Management, Gwalior. His areas of interest are Web Technologies, Open Source Software and Internet Security.
  • 13. 183 Computer Science & Information Technology (CS & IT) Sachin Acharya is a student in the Department of Information Technology and Indian Institute of Information Technology and Management, Gwalior. His areas of interest are OS, Optimization methods and algorithms. Shubham Jain isa student in the Department of Information Technology, Indian Institute of Information Technology and Management, Gwalior. He is interested in a variety of nature inspired algorithms and optimization techniques.