SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
DOI : 10.5121/ijist.2013.3101 1
EVALUATING THE OPTIMAL PLACEMENT OF
BINARY SENSORS
Stephen P. Emmons and Farhad Kamangar
The University of Texas at Arlington, Arlington, Texas, USA
stephen.emmons@mavs.uta.edu and kamangar@cse.uta.edu
ABSTRACT
Binary sensor arrays have many applications for detecting and tracking the location of an object. Many
considerations factoring into the optimal design for such a system, including the accuracy of location, the
extent of the sensor coverage, and the number and size of the sensors used. In this paper, we frame the
problem by providing several definitions for sensor coverage and spatial probability for the general case,
with special attention to sensor arrays in one dimension as a simplification for the purpose of clarity. We
then propose a metric for measuring the overall the utility of a given set of choices that may be used in any
algorithm for seeking an optimal outcome by maximizing this utility. Finally, we perform a numerical
analysis of several variations of the the proposed metric, again in one dimensions, to illustrate its fitness
for the task.
KEYWORDS
Binary Sensors, Optimization
1. INTRODUCTION
Binary sensor arrays have been used in many applications for detecting the presence of an object
and tracking its location. Examples include finding the current location of an RFID tag within a
warehouse and tracking it as it moves, detecting the presence of a harmful chemical or radioactive
agent, or finding an intruder in a secure facility using motion detectors.
In each application, there may be many factors that are involved in designing an optimal sensor
array. Some applications may require a high degree of accuracy for the location of an object, but
not 100% coverage. Other applications may only be concerned with ensuring that 100% coverage
exists, but not with knowing exactly where an object is located.
In this study, we propose a technique for balancing many factors that go into the design of a
sensor array. We consider the precision with which we can take measurements, the coverage we
achieve, and the costs associated with a given set of choices.
We start with a brief survey of related work, followed by a precise definition of sensor coverage,
the specific characteristics of a one-dimensional sensor array, and an explanation of how we will
treat probability. Next we propose a utility function for evaluating the relative merits of various
sensor arrays, and analyze several one-dimensional sensor placement schemes using it.
2. RELATED WORK
The problem of optimal sensor placement have been covered extensively in the literature. Many
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
2
different criteria have been put forth as the basis for defining optimality. Often, the actual
placement of sensors is of less importance than what information may be derived from them
given a variety of assumptions.
Chakrabarty et al. [4] focused attention on how to maximize coverage with a minimum of
sensors. Their approach imposed a grid on a two- or three-dimensional field and uniquely
identified each grid location with a single sensor.
Aslam et al. [3] dealt primarily with tracking objects in binary sensor arrays using techniques for
approximating object location based on proximity to nearby sensors. They took a minimalist
view, assuming little or no control over the placement of the sensors.
Shrivastava et al. [9] [8] looked at how n two-dimensional, omnidirectional binary sensor regions
R partition the sensor field into a maximum of n2
− n + 2 “localization patches” F where |F| ≤
|R|. This study did not consider any specific arrangements of the sensors, but instead used a
generic sensor density ρ as the mean distance among the sensors. They showed that the precision
∆ with which the location of some object within the sensing field is 1/ρR and that it improves
(decreases in size) linearly as either ρ or R increase in size.
Sharif et al. [7] analyzed the cost effectiveness of directional sensors covering a large field. They
employed a range of cost functions applied to sensor arrays of differing sizes in an effort to
determine the optimal configuration.
Krause et al. [5] delved extensively into the fundamentals of two-dimensional temperature sensor
placement, considering aspects of variable sensor region size, sensor placement cost, and
optimization of sensor placement using information theory. They showed that optimal placement
of sensors is an NP-Hard problem and define optimization as based on a single criteria such as
maximal information gain from the system. As a result, they gave special attention to algorithms
to reduce the computational complexity of the optimization problem.
More recently, Azadzadeh et al. [2] focused on how to maximize the number of unique
“localization patches” found in two-dimensional, omnidirectional sensor arrays, and extended this
analysis to directional sensors as well. They did not consider the role of sensor coverage in the
sensor arrangement, focusing instead on the internal characteristics of the arrangement alone.
The contribution of this paper is to directly address the question of sensor coverage and combine
this along with other criteria into an overall measure of utility of a sensor array.
3. DEFINING SENSOR COVERAGE
We define sensor coverage as the portion of a field A over which we array a set of n sensor
regions R = {r1...rn}. The sensor regions partition A to define a “sensed” portion of the overall
field
S =∪(R). The remaining “un-sensed” portion being S, such that A = S + (~S). Further, an object
known to be in A must exist either in S or ~S. Figure 1 shows an example in two-dimensions
where L1 and L2 represent locations that fall inside and outside of S respectively.
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
3
Figure 1: Sensor coverage model
Since we know that sensor regions may overlap, we define a partitioning function Φ that
produces a set of m “patches” F where Φ(R) = F = {f1...fm}. Because these “patches” exactly
cover the same portion of A as the sensor regions R, it follows that S =∪(F).
Argawal and Sharir [1] showed that m ≤ O(nd
) where d is the dimensionality of A, and that m ≤ n2
− n + 2 in two dimensional case. Therefore, for any set of sensor regions R there is a maximum
possible value for m or mmax. Figure 2 illustrates R and F in two dimensions where n = 2 and m =
3.
Figure 2: Two sensor regions creating three patches
4. SENSOR PLACEMENT IN ONE DIMENSION
Commonly, we see examples of sensor placement in two dimensions, but by considering binary
sensor placement in one dimension, we reduce the complexity involved in studying possible
scenarios. Given two sensor regions r1 and r2, we see in Figure 3 (a), (b), and (c) how they can
overlap to produce one, three, or two patches, respectively.
Figure 3: Two sensors (a) at the same location, (b) partially overlapped,and (c) fully covering the
field
These examples let us examine the concept of average sensor density. Shrivastava et al. [9] [8]
define sensor density ρ as the number of sensor regions covering a given location. In Figure 3 (c),
we see that the total field of A is completely covered by S with no overlap among the sensor
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
4
regions R. This represents a sensor density of 1. Figure 3 (a) and (b) likewise have an average
sensor density of 1, but have local sensor densities of 2 where the sensor regions overlap, and 0
where there is no coverage.
These examples also show how the maximum number of patches for 2 sensor regions is 3. In the
general case, the maximum number of “patches” in one dimension is m ≤ 2n − 1 based on the
theoretical limit of O(nd
) where d = 1.
5. CLARIFYING SENSOR PROBABILITY
The probability of an object being detected by a sensor array may be defined as either temporal or
spatial. Temporal probability concerns the likelihood of an object occurring in A over time, and
subsequently, being detected in S. For the purpose of this analysis, we focus on spatial probability
which deals with the likelihood that an object known to exist in A falls within S.
In the spatial case, the probability that such an object falls in S is simply P(S), and outside of
S or ~S is P(S). Given this, the following are true of S, ~S, and F:
P(S) + P(~S) = 1 (1)
∑i=1-m P(fi) = P(S) (2)
∑i=1-m P(fi|S) = 1 (3)
These hold regardless of the spatial probability distribution of objects occurring in A. In the
general case, we calculate the probability for a region r by using the continuous distribution
function (cdf) of A and integrate over the range defined by r. As an example in one dimension, we
calculate P(r) as follows:
P(r) = ∫rright-rleft cdf(x)dx (4)
We may likewise produce P(S) by summing the probabilities of each “patch” fi ∈F as follows:
P(S) =∑i=1-m ∫iright-ileft cdf(x)dx (5)
If an object may be found with equal probability throughout A, then its probability is a simple
proportion of the sub-region size to the overall size of A. To facilitate this, we define the function
Ψ to produce a set of scalar values D where Ψ(R) = D = {d1...dn}. Additionally, we define the
related function ψ such that ∀ri ∈R and di ∈D then ψ(ri) = di. In one dimension, ψ simply
returns the sensor region width, whereas in two dimensions, it would returns the region area. With
ψ, we calculate P(S) and “patch” probability P(f) as follows:
∀f ∈F, P(f) = ψ(f) / ψ(A) and P(f|S) = ψ(f) / ψ(S) (6)
P(S)= ψ(S) / ψ(A) (7)
For the remainder of this analysis we limit ourselves to uniform spatial distribution.
6. MEASURING SENSOR ARRAY PERFORMANCE
In practice, the engineering design of a sensor system is intended to optimize several objectives
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
5
such as cost, efficiency, and accuracy. One way to determine if these objectives are met is to
measure each factor and combine them together in a utility function. By maximizing such a
function we can find the optimal design choices.
We propose a utility function U that is a linear combination of three weighted objective functions,
which are 1) Θ measuring precision, 2) Γ measuring coverage, and 3) Ω measuring the intrinsic
properties of the sensors represented by R. Each is paired with a weighting coefficient W = {w1,
w2, w3} for balancing the relative value of the objectives. In practical situations, the actual values
of W depend on factors such as cost of the sensors, required precision, and the consequences of
missing an event due to lack of coverage.
U(A,R,W) = w1 Θ(A,R)+w2 Γ(A,R)+w3 Ω(A,R) (8)
The structure of U is simple with the real work taking place in the objective functions Θ, Γ,
and Ω, as discussed in the following sections.
6.1. Considering Sensor Precision
The concept of “patches” F [2] more precisely identifies the location of a sensed object detected
in S. Thus we may measure the precision of R in terms of F. For this analysis, we examine three
definitions of the objective function Θ for measuring precision, labelled ΘA, ΘB, and ΘC.
Shrivastava et al. [9] [8] argues for using the Lebesque norm L∞ on F as a worst-case measure of
precision, so we base ΘA on this idea. The intuition is that we can reliably expect location
precision to be better than the size of the largest “patch” in F. Thus precision increases as L∞
decreases where L∞ = max(Ψ(F)).
To calculate L∞ and for subsequent uses, we need to convert the multi-dimensional regions and
sub-regions of A into scalar values.
For this and the rest of the objective functions, we want the values to be normalized and range
from 0 to 1. Recognizing that 0 ≤ max(Ψ(F)) ≤ max(Ψ(R)), we define ΘA as follows:
ΘA = (max(Ψ(R)) − max(Ψ(F))) / max(Ψ(R)) (9)
Next, we look to the concept of “mean squared error” to find the average accuracy for locations
detected within R which also decreases as the precision increases. With this idea, we define ΘB
using ψ to average the square of each “patch” size and scale it as with ΘA.
ΘB = (max(Ψ(R))2
− ∑i=1-m P(fi|R)ψ(fi)2
) / max(Ψ(R)) 2
(10)
Note that the full equation for “mean squared error” would include the squaring of half the size
of each “patch,” or a constant ¼ factor, that is here simply removed to maintain the normalized
result from 0 to 1.
For the definition of ΘC, we look to Shannon entropy [6] as a means of maximizing the
“information flow” from the sensor regions R. Although it is not properly a measure of precision,
entropy’s measure of information provides a useful objective function ΘC to use in contrast to the
others. We calculate the entropy HS by treating F as a set of symbols and the probability
distribution of an object being detected in any “patch” given its occurrence in S.
HS =−∑i=1-m P(fi|S)log2(P(fi|S)) (11)
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
6
To understand this, the two binary sensors in Figure 2 may have states 00, 10, 11, and 01 where 1
signifies detecting an object, 0 otherwise. States 01, 11, and 10 would represent the “patches” f1,
f2, and f3, respectively. These possible states represent “symbols” each with a probability of
occurrence.
Intuitively, we can imagine HS reaching its maximum when the arrangement of sensors R results
in “patches” F with an equal likelihood of detecting an object in S. Since HS naturally increases
from 0, we define ΘC simply as HS by the maximum possible value for any R. This maximum
occurs when Φ(R) produces an F with the number of “patches” previously denoted as mmax. Thus,
HSmax = log2(mmax).
ΘC = HS / HSmax (12)
6.2. Considering Sensor Coverage
Our objective function Γ provides a measure of sensor coverage. Since we want a value ranging
from 0 to 1, we conveniently chose the the spatial probability of an object known to be in A that is
also in S, namely P(S).
6.3. Considering Intrinsic Sensor-Array Properties
The purpose of our objective function Ω is to bring characteristics of the sensor array, regardless
of the specific arrangement of sensor regions R, into U. Intuitively, we know that the size and
number of the sensors must have some impact on our overall engineering design. At the very
least, we would expect the cost of the solution to increase with the number of sensors.
Since we have limited ourselves to uniform sensor region size, we define Ω as a simple function
of sensor count which we want to maximize with the fewest number of sensors. To do this, we
use 1/n which is largest when the n = 1 and is undefined – and uninteresting – for sensor counts
of 0.
7. STUDYING SENSOR PLACEMENT
With U, we have a metric for measuring the combined benefits of higher precision, higher
coverage, and fewer sensors across many scenarios. And while we might use this approach to
study either changes of field A or weights W for a given sensor array R, our primary concerns for
the rest of this paper are scenarios where A and W are fixed and only the placement of the sensor
regions R varies, the goal being to determine arrangements of R with maximal utility.
It is important to note that by varying only sensor placement, the sensor count remains constant as
does the value of Ω. So that going forward, we only consider precision and coverage as defined
by Θ and Γ.
To facilitate our analysis, we derive three variations of utility functions – UA, UB, and UC – based
on the three options for Θ and choosing weights W = {1, 1, 0} to explicitly eliminate Ω.
UA = ΘA + Γ (13)
UB = ΘB + Γ (14)
UC = ΘC + Γ (15)
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
7
Starting with two sensor regions at the same location as in Figure 3 (a), we may move them apart
to a point where they form three equal “patches” as in Figure 3 (b) and continue until they are
fully separated with no overlap as in Figure 3 (c). By setting the sensor width to 1, the width of
the overall field to 2, and computing values for ΘA, ΘB, ΘC, and Γ, we can see that they achieve
maximal values in different ways. Figure 4 plots each of these values on the Y-axis with the
spacing from 0 to 1 on the X-axis.
Figure 4: Objective functions for two sensors moving from co-location to full separation
Clearly from this example, we see that any choice for Θ or Γ by itself may give a different
maximal result. The “best” choice for coverage Γ occurs at full separation of the sensor regions,
while the “best” choices for precision Θ lie elsewhere with no clear criteria for choosing one or
the other. By combining Θ and Γ to produce our three derived versions of U as in Figure 5, we
see how that the overall utility is often maximally different than either taken separately.
Figure 5: Derived utility functions for two sensors moving from co-location to full separation
8. COMPARING EVEN AND RANDOM SPACING
Much of the literature assumes random placement of binary sensors in its analysis. Of course for
well-known or fixed fields A, we may place the sensors in specific locations in an effort to
maximize their effectiveness. For this study, we contrast random sensor placement with a
continuation of the evenly-spaced sensor placment approach from the previous section.
To test this idea, we define an overall field width of 100 and sensor regions of uniform width of
1 ∀
, such that Φ(A) = 100 and r ∈R, ψ(r) = 1. Next, we create scenarios with sensor densities of
ρ = 1.0 and 2.0, resulting in values of n = 100 and 200, respectively. For each sensor density ρ,
we then evenly space the sensor regions from 0 to 1 by increments of 0.001, and also generate
100 random scenarios where the placement of each may occur anywhere within A. Finally, we
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
8
plot our three measures of sensor precision Θ against the percentage of coverage A for each value
of ρ in Figure 6 and Figure 7.
Figure 6: Plot of precision objectives Θ against percent coverage of A with density ρ = 1.0 and
indicating maximum utility U for each
Figure 7: Plot of precision objectives Θ against percent coverage of A with density ρ = 2.0 and
indicating maximum utility U for each
We are able to make several important observations from these numerical studies. Perhaps the
most significant is that even spacing produces better results than random spacing in almost all
cases, and that some evenly-spaced placement option is always superior to the best random result.
As we might expect, the random results tend to cluster around an average coverage range that
increases with ρ. Whereas, the even spacing results for each variation of Θ display a characteristic
pattern of their underlying approach to measurement.
Another important observation is the location of the maximum utility function U. For example,
UB in Figure 6 achieves its maximum with only 70% coverage, given W = {1, 1, 0}.
With even spacing, all measures display low values for the smallest possible coverage where
spacing is 0 and all sensor regions R are co-located and have a coverage of max(Ψ(R)) / ψ(A) =
0.1. The measures quickly reach their maximum at spacing of max(Ψ(R)) / n where the uniform
sensor size is divided by sensor count to produce exactly n “patches” of equal size.
When looking specifically at objective function ΘA, we see that even spacing shows a linear
decrease in precision as the largest “patch” increases in size to ψ(A) / n when R achieves full
coverage. However, multiple evaluations using random spacing almost always produced at least
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
9
one “patch” based on an isolated sensor region such that max(Φ(F)) = 1, effectively making all
results the same. With even spacing, result is not very different in practical terms since the
mostly-linear relationship between ΘA and Γ leads to either choosing the maximum precision or
maximum coverage option, and which choice is highly sensitive the weights W used.
Both ΘB and ΘC, display an interesting pattern of local minima and maxima for the even- spacing
scenarios. By closely inspecting the data, we see that the local minima occur when sensor
boundaries align such that the number of “patches” generated for the arrangement drops
significantly and/or result in high variance of size. Despite the differences in calculation, both
approaches generate local minima for the same spacing intervals, with local maxima often at
different spacing intervals.
ΘB based on the idea of average accuracy generally decreases as coverage increases despite the
local fluctuations, which we would intuitively expect since the “patch” sizes are generally getting
larger and the precision therefore must suffer. On the other hand, ΘC based on entropy suggests
the idea that many spacing choices may result in near-maximal information flow.
Not all of the local maxima displayed for ΘC are, in fact, equal as would be evident by closely
inspecting the data, but they are, nevertheless, quite close for very different even-spacing con-
figuration. This quality tends to result in the spacing whose local maxima for ΘC is also closest to
full coverage being selected as having the maximum utility for the UC variant. Intuitively, UC
leads us to a desirable outcome where coverage is high, if not full, but the “best” choice takes into
consideration the performance of that coverage as a source of information.
Overall, the UA variant of utility does not effectively assist in balancing the considerations of
precision and coverage, while both, UB and UC lead to maximum results that balance both.
9. CONCLUSIONS AND FUTURE WORK
By studying the utility function U, we find that the variations using “mean squared error” (ΘB)
and entropy (ΘC) show promising results as a way to balance the competing factors of precision
and coverage in the design of a sensor array.
Additional work is necessary to apply this method to specific sensor array designs, as well as the
selection of different weighting factors W, and especially the re-introduction of the objective
function Ω by using an non-zero w3.
Other considerations for future study include non-uniform sensor size in the definition of Ω, non-
uniform spatial probability distribution of objects within Θ and Γ, and the role of temporal
probability in the overall definition of U.
REFERENCES
[1] P. Agarwal and M. Sharir. Arrangements and their Applications, pages 49–119. Elsevier Science B.
V., 1999.
[2] P. Asadzadeh, L. Kulik, E. Tanin, and A. Wirth. On optimal arrangements of binary sensors. In
COSIT 2011, pages 168–187. Springer-Verlag Berlin Heidelberg, 2011.
[3] J. Aslam, Z. Butler, F. Constantin, V. Crespi, G. Cybenko, and D. Rus. Tracking a moving object
with a binary sensor network. In SenSys ’03, pages 150–161. ACM, November 2003.
[4] K. Chakrabarty, S. Iyengar, H. Qi, and E. Cho. Coding theory framework for target location in
distributed sensor networks. In Information Technology: Coding and Computing, pages 130–134, Las
Vegas, NV, April 2001.
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
10
[5] A. Krause, A. Singh, and C. Guestrin. Near-optimal sensor placements in gaussian processes: Theory,
efficient algorithms and empirical studies. Journal of Machine Learning Research, 9:235–284, 2008.
[6] C. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379–423
and 623–656, July, October 1948.
[7] B. Sharif and F. Kamalabadi. Optimal sensor array configuration in remote image formation. IEEE
Trans. Image Process., 17(2):155–166, February 2008.
[8] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri. Target tracking with binary proximity
sensors: Fundamental limits, minimal descriptions, and algorithms. In SenSys ’06, pages 251–264.
ACM, November 2006.
[9] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri. Target tracking with binary proximity
sensors. ACM Transactions on Sensor Networks, 5(4):30:1–30:33, November 2009.
Authors
Stephen P. Emmons is a Ph.D. candidate in Computer Science and Engineering at the
University of Texas at Arlington. He has had a career developing commercial software
products for technical illustration, 3D solids modelling, and wireless sensor networking
spanning over 30 years.
Professor Farhad Kamangar received his Ph.D. in electrical engineering from the
University of Texas at Arlington in 1980 and M.S. in electrical engineering from UTA in
1977. He received his B.S. from the University of Tehran, Iran, in 1975. His research
interests include image processing, robotics, signal processing, machine intelligence and
computer graphics.

More Related Content

What's hot

Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Highly accurate log skew normal
Highly accurate log skew normalHighly accurate log skew normal
Highly accurate log skew normalcsandit
 
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...Md Kafiul Islam
 
LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY
LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEYLOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY
LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEYIJCNCJournal
 
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore ProjectsLatest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects1crore projects
 
lecture_mooney.ppt
lecture_mooney.pptlecture_mooney.ppt
lecture_mooney.pptbutest
 
Boosting ced using robust orientation estimation
Boosting ced using robust orientation estimationBoosting ced using robust orientation estimation
Boosting ced using robust orientation estimationijma
 
B02110105012
B02110105012B02110105012
B02110105012theijes
 
A Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOA Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOIRJET Journal
 

What's hot (11)

Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Highly accurate log skew normal
Highly accurate log skew normalHighly accurate log skew normal
Highly accurate log skew normal
 
Fixed sensors
Fixed sensorsFixed sensors
Fixed sensors
 
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
 
LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY
LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEYLOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY
LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY
 
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore ProjectsLatest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
Latest 2016 IEEE Projects | 2016 Final Year Project Titles - 1 Crore Projects
 
PhysRevLett.105.163602
PhysRevLett.105.163602PhysRevLett.105.163602
PhysRevLett.105.163602
 
lecture_mooney.ppt
lecture_mooney.pptlecture_mooney.ppt
lecture_mooney.ppt
 
Boosting ced using robust orientation estimation
Boosting ced using robust orientation estimationBoosting ced using robust orientation estimation
Boosting ced using robust orientation estimation
 
B02110105012
B02110105012B02110105012
B02110105012
 
A Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOA Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMO
 

Similar to EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS

A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...ijcseit
 
A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...ijcseit
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged byijcsit
 
Environmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection SystemEnvironmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection SystemAIRCC Publishing Corporation
 
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEMENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEMijcsit
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
Cg32955961
Cg32955961Cg32955961
Cg32955961IJMER
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldAlexander Decker
 
Sparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency EstimatorSparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency EstimatorJason Fernandes
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...Ahmed Ammar Rebai PhD
 
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...IJMER
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersDr. Ali Nassib
 

Similar to EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS (20)

A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
 
A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged by
 
Environmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection SystemEnvironmentally Corrected RSSI Based Real Time Location Detection System
Environmentally Corrected RSSI Based Real Time Location Detection System
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEMENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
ENVIRONMENTALLY CORRECTED RSSI BASED REAL TIME LOCATION DETECTION SYSTEM
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
Cg32955961
Cg32955961Cg32955961
Cg32955961
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near field
 
Sparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency EstimatorSparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...
 
50120140501009
5012014050100950120140501009
50120140501009
 
Introduction to Compressive Sensing
Introduction to Compressive SensingIntroduction to Compressive Sensing
Introduction to Compressive Sensing
 
Ijetr042309
Ijetr042309Ijetr042309
Ijetr042309
 
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
 
Mumma_Radar_Lab_Posters
Mumma_Radar_Lab_PostersMumma_Radar_Lab_Posters
Mumma_Radar_Lab_Posters
 

More from ijistjournal

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 

More from ijistjournal (20)

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 

Recently uploaded

Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 

Recently uploaded (20)

Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 

EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 DOI : 10.5121/ijist.2013.3101 1 EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS Stephen P. Emmons and Farhad Kamangar The University of Texas at Arlington, Arlington, Texas, USA stephen.emmons@mavs.uta.edu and kamangar@cse.uta.edu ABSTRACT Binary sensor arrays have many applications for detecting and tracking the location of an object. Many considerations factoring into the optimal design for such a system, including the accuracy of location, the extent of the sensor coverage, and the number and size of the sensors used. In this paper, we frame the problem by providing several definitions for sensor coverage and spatial probability for the general case, with special attention to sensor arrays in one dimension as a simplification for the purpose of clarity. We then propose a metric for measuring the overall the utility of a given set of choices that may be used in any algorithm for seeking an optimal outcome by maximizing this utility. Finally, we perform a numerical analysis of several variations of the the proposed metric, again in one dimensions, to illustrate its fitness for the task. KEYWORDS Binary Sensors, Optimization 1. INTRODUCTION Binary sensor arrays have been used in many applications for detecting the presence of an object and tracking its location. Examples include finding the current location of an RFID tag within a warehouse and tracking it as it moves, detecting the presence of a harmful chemical or radioactive agent, or finding an intruder in a secure facility using motion detectors. In each application, there may be many factors that are involved in designing an optimal sensor array. Some applications may require a high degree of accuracy for the location of an object, but not 100% coverage. Other applications may only be concerned with ensuring that 100% coverage exists, but not with knowing exactly where an object is located. In this study, we propose a technique for balancing many factors that go into the design of a sensor array. We consider the precision with which we can take measurements, the coverage we achieve, and the costs associated with a given set of choices. We start with a brief survey of related work, followed by a precise definition of sensor coverage, the specific characteristics of a one-dimensional sensor array, and an explanation of how we will treat probability. Next we propose a utility function for evaluating the relative merits of various sensor arrays, and analyze several one-dimensional sensor placement schemes using it. 2. RELATED WORK The problem of optimal sensor placement have been covered extensively in the literature. Many
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 2 different criteria have been put forth as the basis for defining optimality. Often, the actual placement of sensors is of less importance than what information may be derived from them given a variety of assumptions. Chakrabarty et al. [4] focused attention on how to maximize coverage with a minimum of sensors. Their approach imposed a grid on a two- or three-dimensional field and uniquely identified each grid location with a single sensor. Aslam et al. [3] dealt primarily with tracking objects in binary sensor arrays using techniques for approximating object location based on proximity to nearby sensors. They took a minimalist view, assuming little or no control over the placement of the sensors. Shrivastava et al. [9] [8] looked at how n two-dimensional, omnidirectional binary sensor regions R partition the sensor field into a maximum of n2 − n + 2 “localization patches” F where |F| ≤ |R|. This study did not consider any specific arrangements of the sensors, but instead used a generic sensor density ρ as the mean distance among the sensors. They showed that the precision ∆ with which the location of some object within the sensing field is 1/ρR and that it improves (decreases in size) linearly as either ρ or R increase in size. Sharif et al. [7] analyzed the cost effectiveness of directional sensors covering a large field. They employed a range of cost functions applied to sensor arrays of differing sizes in an effort to determine the optimal configuration. Krause et al. [5] delved extensively into the fundamentals of two-dimensional temperature sensor placement, considering aspects of variable sensor region size, sensor placement cost, and optimization of sensor placement using information theory. They showed that optimal placement of sensors is an NP-Hard problem and define optimization as based on a single criteria such as maximal information gain from the system. As a result, they gave special attention to algorithms to reduce the computational complexity of the optimization problem. More recently, Azadzadeh et al. [2] focused on how to maximize the number of unique “localization patches” found in two-dimensional, omnidirectional sensor arrays, and extended this analysis to directional sensors as well. They did not consider the role of sensor coverage in the sensor arrangement, focusing instead on the internal characteristics of the arrangement alone. The contribution of this paper is to directly address the question of sensor coverage and combine this along with other criteria into an overall measure of utility of a sensor array. 3. DEFINING SENSOR COVERAGE We define sensor coverage as the portion of a field A over which we array a set of n sensor regions R = {r1...rn}. The sensor regions partition A to define a “sensed” portion of the overall field S =∪(R). The remaining “un-sensed” portion being S, such that A = S + (~S). Further, an object known to be in A must exist either in S or ~S. Figure 1 shows an example in two-dimensions where L1 and L2 represent locations that fall inside and outside of S respectively.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 3 Figure 1: Sensor coverage model Since we know that sensor regions may overlap, we define a partitioning function Φ that produces a set of m “patches” F where Φ(R) = F = {f1...fm}. Because these “patches” exactly cover the same portion of A as the sensor regions R, it follows that S =∪(F). Argawal and Sharir [1] showed that m ≤ O(nd ) where d is the dimensionality of A, and that m ≤ n2 − n + 2 in two dimensional case. Therefore, for any set of sensor regions R there is a maximum possible value for m or mmax. Figure 2 illustrates R and F in two dimensions where n = 2 and m = 3. Figure 2: Two sensor regions creating three patches 4. SENSOR PLACEMENT IN ONE DIMENSION Commonly, we see examples of sensor placement in two dimensions, but by considering binary sensor placement in one dimension, we reduce the complexity involved in studying possible scenarios. Given two sensor regions r1 and r2, we see in Figure 3 (a), (b), and (c) how they can overlap to produce one, three, or two patches, respectively. Figure 3: Two sensors (a) at the same location, (b) partially overlapped,and (c) fully covering the field These examples let us examine the concept of average sensor density. Shrivastava et al. [9] [8] define sensor density ρ as the number of sensor regions covering a given location. In Figure 3 (c), we see that the total field of A is completely covered by S with no overlap among the sensor
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 4 regions R. This represents a sensor density of 1. Figure 3 (a) and (b) likewise have an average sensor density of 1, but have local sensor densities of 2 where the sensor regions overlap, and 0 where there is no coverage. These examples also show how the maximum number of patches for 2 sensor regions is 3. In the general case, the maximum number of “patches” in one dimension is m ≤ 2n − 1 based on the theoretical limit of O(nd ) where d = 1. 5. CLARIFYING SENSOR PROBABILITY The probability of an object being detected by a sensor array may be defined as either temporal or spatial. Temporal probability concerns the likelihood of an object occurring in A over time, and subsequently, being detected in S. For the purpose of this analysis, we focus on spatial probability which deals with the likelihood that an object known to exist in A falls within S. In the spatial case, the probability that such an object falls in S is simply P(S), and outside of S or ~S is P(S). Given this, the following are true of S, ~S, and F: P(S) + P(~S) = 1 (1) ∑i=1-m P(fi) = P(S) (2) ∑i=1-m P(fi|S) = 1 (3) These hold regardless of the spatial probability distribution of objects occurring in A. In the general case, we calculate the probability for a region r by using the continuous distribution function (cdf) of A and integrate over the range defined by r. As an example in one dimension, we calculate P(r) as follows: P(r) = ∫rright-rleft cdf(x)dx (4) We may likewise produce P(S) by summing the probabilities of each “patch” fi ∈F as follows: P(S) =∑i=1-m ∫iright-ileft cdf(x)dx (5) If an object may be found with equal probability throughout A, then its probability is a simple proportion of the sub-region size to the overall size of A. To facilitate this, we define the function Ψ to produce a set of scalar values D where Ψ(R) = D = {d1...dn}. Additionally, we define the related function ψ such that ∀ri ∈R and di ∈D then ψ(ri) = di. In one dimension, ψ simply returns the sensor region width, whereas in two dimensions, it would returns the region area. With ψ, we calculate P(S) and “patch” probability P(f) as follows: ∀f ∈F, P(f) = ψ(f) / ψ(A) and P(f|S) = ψ(f) / ψ(S) (6) P(S)= ψ(S) / ψ(A) (7) For the remainder of this analysis we limit ourselves to uniform spatial distribution. 6. MEASURING SENSOR ARRAY PERFORMANCE In practice, the engineering design of a sensor system is intended to optimize several objectives
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 5 such as cost, efficiency, and accuracy. One way to determine if these objectives are met is to measure each factor and combine them together in a utility function. By maximizing such a function we can find the optimal design choices. We propose a utility function U that is a linear combination of three weighted objective functions, which are 1) Θ measuring precision, 2) Γ measuring coverage, and 3) Ω measuring the intrinsic properties of the sensors represented by R. Each is paired with a weighting coefficient W = {w1, w2, w3} for balancing the relative value of the objectives. In practical situations, the actual values of W depend on factors such as cost of the sensors, required precision, and the consequences of missing an event due to lack of coverage. U(A,R,W) = w1 Θ(A,R)+w2 Γ(A,R)+w3 Ω(A,R) (8) The structure of U is simple with the real work taking place in the objective functions Θ, Γ, and Ω, as discussed in the following sections. 6.1. Considering Sensor Precision The concept of “patches” F [2] more precisely identifies the location of a sensed object detected in S. Thus we may measure the precision of R in terms of F. For this analysis, we examine three definitions of the objective function Θ for measuring precision, labelled ΘA, ΘB, and ΘC. Shrivastava et al. [9] [8] argues for using the Lebesque norm L∞ on F as a worst-case measure of precision, so we base ΘA on this idea. The intuition is that we can reliably expect location precision to be better than the size of the largest “patch” in F. Thus precision increases as L∞ decreases where L∞ = max(Ψ(F)). To calculate L∞ and for subsequent uses, we need to convert the multi-dimensional regions and sub-regions of A into scalar values. For this and the rest of the objective functions, we want the values to be normalized and range from 0 to 1. Recognizing that 0 ≤ max(Ψ(F)) ≤ max(Ψ(R)), we define ΘA as follows: ΘA = (max(Ψ(R)) − max(Ψ(F))) / max(Ψ(R)) (9) Next, we look to the concept of “mean squared error” to find the average accuracy for locations detected within R which also decreases as the precision increases. With this idea, we define ΘB using ψ to average the square of each “patch” size and scale it as with ΘA. ΘB = (max(Ψ(R))2 − ∑i=1-m P(fi|R)ψ(fi)2 ) / max(Ψ(R)) 2 (10) Note that the full equation for “mean squared error” would include the squaring of half the size of each “patch,” or a constant ¼ factor, that is here simply removed to maintain the normalized result from 0 to 1. For the definition of ΘC, we look to Shannon entropy [6] as a means of maximizing the “information flow” from the sensor regions R. Although it is not properly a measure of precision, entropy’s measure of information provides a useful objective function ΘC to use in contrast to the others. We calculate the entropy HS by treating F as a set of symbols and the probability distribution of an object being detected in any “patch” given its occurrence in S. HS =−∑i=1-m P(fi|S)log2(P(fi|S)) (11)
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 6 To understand this, the two binary sensors in Figure 2 may have states 00, 10, 11, and 01 where 1 signifies detecting an object, 0 otherwise. States 01, 11, and 10 would represent the “patches” f1, f2, and f3, respectively. These possible states represent “symbols” each with a probability of occurrence. Intuitively, we can imagine HS reaching its maximum when the arrangement of sensors R results in “patches” F with an equal likelihood of detecting an object in S. Since HS naturally increases from 0, we define ΘC simply as HS by the maximum possible value for any R. This maximum occurs when Φ(R) produces an F with the number of “patches” previously denoted as mmax. Thus, HSmax = log2(mmax). ΘC = HS / HSmax (12) 6.2. Considering Sensor Coverage Our objective function Γ provides a measure of sensor coverage. Since we want a value ranging from 0 to 1, we conveniently chose the the spatial probability of an object known to be in A that is also in S, namely P(S). 6.3. Considering Intrinsic Sensor-Array Properties The purpose of our objective function Ω is to bring characteristics of the sensor array, regardless of the specific arrangement of sensor regions R, into U. Intuitively, we know that the size and number of the sensors must have some impact on our overall engineering design. At the very least, we would expect the cost of the solution to increase with the number of sensors. Since we have limited ourselves to uniform sensor region size, we define Ω as a simple function of sensor count which we want to maximize with the fewest number of sensors. To do this, we use 1/n which is largest when the n = 1 and is undefined – and uninteresting – for sensor counts of 0. 7. STUDYING SENSOR PLACEMENT With U, we have a metric for measuring the combined benefits of higher precision, higher coverage, and fewer sensors across many scenarios. And while we might use this approach to study either changes of field A or weights W for a given sensor array R, our primary concerns for the rest of this paper are scenarios where A and W are fixed and only the placement of the sensor regions R varies, the goal being to determine arrangements of R with maximal utility. It is important to note that by varying only sensor placement, the sensor count remains constant as does the value of Ω. So that going forward, we only consider precision and coverage as defined by Θ and Γ. To facilitate our analysis, we derive three variations of utility functions – UA, UB, and UC – based on the three options for Θ and choosing weights W = {1, 1, 0} to explicitly eliminate Ω. UA = ΘA + Γ (13) UB = ΘB + Γ (14) UC = ΘC + Γ (15)
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 7 Starting with two sensor regions at the same location as in Figure 3 (a), we may move them apart to a point where they form three equal “patches” as in Figure 3 (b) and continue until they are fully separated with no overlap as in Figure 3 (c). By setting the sensor width to 1, the width of the overall field to 2, and computing values for ΘA, ΘB, ΘC, and Γ, we can see that they achieve maximal values in different ways. Figure 4 plots each of these values on the Y-axis with the spacing from 0 to 1 on the X-axis. Figure 4: Objective functions for two sensors moving from co-location to full separation Clearly from this example, we see that any choice for Θ or Γ by itself may give a different maximal result. The “best” choice for coverage Γ occurs at full separation of the sensor regions, while the “best” choices for precision Θ lie elsewhere with no clear criteria for choosing one or the other. By combining Θ and Γ to produce our three derived versions of U as in Figure 5, we see how that the overall utility is often maximally different than either taken separately. Figure 5: Derived utility functions for two sensors moving from co-location to full separation 8. COMPARING EVEN AND RANDOM SPACING Much of the literature assumes random placement of binary sensors in its analysis. Of course for well-known or fixed fields A, we may place the sensors in specific locations in an effort to maximize their effectiveness. For this study, we contrast random sensor placement with a continuation of the evenly-spaced sensor placment approach from the previous section. To test this idea, we define an overall field width of 100 and sensor regions of uniform width of 1 ∀ , such that Φ(A) = 100 and r ∈R, ψ(r) = 1. Next, we create scenarios with sensor densities of ρ = 1.0 and 2.0, resulting in values of n = 100 and 200, respectively. For each sensor density ρ, we then evenly space the sensor regions from 0 to 1 by increments of 0.001, and also generate 100 random scenarios where the placement of each may occur anywhere within A. Finally, we
  • 8. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 8 plot our three measures of sensor precision Θ against the percentage of coverage A for each value of ρ in Figure 6 and Figure 7. Figure 6: Plot of precision objectives Θ against percent coverage of A with density ρ = 1.0 and indicating maximum utility U for each Figure 7: Plot of precision objectives Θ against percent coverage of A with density ρ = 2.0 and indicating maximum utility U for each We are able to make several important observations from these numerical studies. Perhaps the most significant is that even spacing produces better results than random spacing in almost all cases, and that some evenly-spaced placement option is always superior to the best random result. As we might expect, the random results tend to cluster around an average coverage range that increases with ρ. Whereas, the even spacing results for each variation of Θ display a characteristic pattern of their underlying approach to measurement. Another important observation is the location of the maximum utility function U. For example, UB in Figure 6 achieves its maximum with only 70% coverage, given W = {1, 1, 0}. With even spacing, all measures display low values for the smallest possible coverage where spacing is 0 and all sensor regions R are co-located and have a coverage of max(Ψ(R)) / ψ(A) = 0.1. The measures quickly reach their maximum at spacing of max(Ψ(R)) / n where the uniform sensor size is divided by sensor count to produce exactly n “patches” of equal size. When looking specifically at objective function ΘA, we see that even spacing shows a linear decrease in precision as the largest “patch” increases in size to ψ(A) / n when R achieves full coverage. However, multiple evaluations using random spacing almost always produced at least
  • 9. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 9 one “patch” based on an isolated sensor region such that max(Φ(F)) = 1, effectively making all results the same. With even spacing, result is not very different in practical terms since the mostly-linear relationship between ΘA and Γ leads to either choosing the maximum precision or maximum coverage option, and which choice is highly sensitive the weights W used. Both ΘB and ΘC, display an interesting pattern of local minima and maxima for the even- spacing scenarios. By closely inspecting the data, we see that the local minima occur when sensor boundaries align such that the number of “patches” generated for the arrangement drops significantly and/or result in high variance of size. Despite the differences in calculation, both approaches generate local minima for the same spacing intervals, with local maxima often at different spacing intervals. ΘB based on the idea of average accuracy generally decreases as coverage increases despite the local fluctuations, which we would intuitively expect since the “patch” sizes are generally getting larger and the precision therefore must suffer. On the other hand, ΘC based on entropy suggests the idea that many spacing choices may result in near-maximal information flow. Not all of the local maxima displayed for ΘC are, in fact, equal as would be evident by closely inspecting the data, but they are, nevertheless, quite close for very different even-spacing con- figuration. This quality tends to result in the spacing whose local maxima for ΘC is also closest to full coverage being selected as having the maximum utility for the UC variant. Intuitively, UC leads us to a desirable outcome where coverage is high, if not full, but the “best” choice takes into consideration the performance of that coverage as a source of information. Overall, the UA variant of utility does not effectively assist in balancing the considerations of precision and coverage, while both, UB and UC lead to maximum results that balance both. 9. CONCLUSIONS AND FUTURE WORK By studying the utility function U, we find that the variations using “mean squared error” (ΘB) and entropy (ΘC) show promising results as a way to balance the competing factors of precision and coverage in the design of a sensor array. Additional work is necessary to apply this method to specific sensor array designs, as well as the selection of different weighting factors W, and especially the re-introduction of the objective function Ω by using an non-zero w3. Other considerations for future study include non-uniform sensor size in the definition of Ω, non- uniform spatial probability distribution of objects within Θ and Γ, and the role of temporal probability in the overall definition of U. REFERENCES [1] P. Agarwal and M. Sharir. Arrangements and their Applications, pages 49–119. Elsevier Science B. V., 1999. [2] P. Asadzadeh, L. Kulik, E. Tanin, and A. Wirth. On optimal arrangements of binary sensors. In COSIT 2011, pages 168–187. Springer-Verlag Berlin Heidelberg, 2011. [3] J. Aslam, Z. Butler, F. Constantin, V. Crespi, G. Cybenko, and D. Rus. Tracking a moving object with a binary sensor network. In SenSys ’03, pages 150–161. ACM, November 2003. [4] K. Chakrabarty, S. Iyengar, H. Qi, and E. Cho. Coding theory framework for target location in distributed sensor networks. In Information Technology: Coding and Computing, pages 130–134, Las Vegas, NV, April 2001.
  • 10. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013 10 [5] A. Krause, A. Singh, and C. Guestrin. Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies. Journal of Machine Learning Research, 9:235–284, 2008. [6] C. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379–423 and 623–656, July, October 1948. [7] B. Sharif and F. Kamalabadi. Optimal sensor array configuration in remote image formation. IEEE Trans. Image Process., 17(2):155–166, February 2008. [8] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri. Target tracking with binary proximity sensors: Fundamental limits, minimal descriptions, and algorithms. In SenSys ’06, pages 251–264. ACM, November 2006. [9] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri. Target tracking with binary proximity sensors. ACM Transactions on Sensor Networks, 5(4):30:1–30:33, November 2009. Authors Stephen P. Emmons is a Ph.D. candidate in Computer Science and Engineering at the University of Texas at Arlington. He has had a career developing commercial software products for technical illustration, 3D solids modelling, and wireless sensor networking spanning over 30 years. Professor Farhad Kamangar received his Ph.D. in electrical engineering from the University of Texas at Arlington in 1980 and M.S. in electrical engineering from UTA in 1977. He received his B.S. from the University of Tehran, Iran, in 1975. His research interests include image processing, robotics, signal processing, machine intelligence and computer graphics.