A real-time device-free localization system using correlated RSS measurements
|
|
- Herbert Wilkins
- 8 years ago
- Views:
Transcription
1 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 RESEARCH Open Access A real-tme devce-free localzaton system usng correlated RSS measurements Zhyong Yang, Kade Huang, Xueme Guo and Guol Wang * Abstract Devce-free localzaton (DFL) wth wreless sensor networks (WSN) s an emergng technology for target localzaton, whch has receved much attenton n the area of Internet of Thngs. Receved sgnal strength (RSS) measurements are the key to realze DFL and manly affects the localzaton performance. Most exstng approaches need to measure the RSS of all the wreless lnks n WSN, whch take much tme on measurement process and localzaton algorthm due to the large amounts of RSS data, thus they are neffcent, especally n the case of target trackng. In ths paper, by makng full use of the consecutveness of moton, we present an effcent measurement strategy based on a small set of correlated wreless lnks. Furthermore, a lghtweght compressed maxmum matchng select (CMMS) algorthm s proposed to localze target, whch only needs a small-scale matrx-vector product operatng for one estmaton. The proposed approach can sgnfcantly reduce the number of RSS measurements and mprove the real-tme capablty of the DFL system. Expermental results demonstrate the superor performance of the proposed method n the context of target localzaton and trackng. Keywords: Internet of Thngs; Wreless sensor networks; Devce-free localzaton; Compressed maxmum matchng select; Effcent measurement 1 Introducton Internet of Thngs (IoT) concerns about the seamless nteracton of objects, sensors, and computng devces [1]. Wth the ntegraton of wreless sensor networks (WSN) and the Internet, the IoT s fast becomng a realty. IoT s applcable to varous areas, ncludng busness logstcs, home automaton, and healthcare [2]. Trackng s an mportant aspect of the healthcare doman [3]. Devcefree localzaton (DFL) [4] s an emergng method for localzng and trackng target wth WSN, whch does not need equppng the target wth any wreless devce. Hence, the DFL technology would not nconvenence the target or make t uncomfortable. The DFL also can be used n other applcatons such as ntruson detecton, nghttme securty montorng, and emergency rescue, where the tradtonal localzaton scheme that target needs to equp wth a wreless devce to transmt or receve wreless sgnals wll become nvald. The locaton nformaton s extremely useful n these applcatons, as t may provde *Correspondence: sswgl@mal.sysu.edu.cn School of Informaton Scence and Technology, Sun Yat-sen Unversty, Guangzhou , Chna lfe-savng benefts for the emergency responders. Therefore, the study on realzng effcent real-tme DFL wth WSNsnecessaryandsgnfcatve. There are lots of wreless lnks wthn the deployment area of the WSN. When an object moves nto the area, t may shadow some of the lnks and reflect, absorb, dffract, or scatter some of the transmtted power, whch wll change the receved sgnal strength (RSS) of the shadowed lnks. The object locatng at a dfferent locaton wll shadow dfferent lnks, so we can realze DFL based on RSS measurements. Snce there are too many wreless lnks n a WSN, the measurements of all the wreless lnks wll cause some dsadvantages n resources consumpton, system latency, and estmaton processng. Ths artcle focuses on usng effcent measurement strategy and lghtweght algorthm to realze real-tme DFL. Wlson and Patwar [4-7] formulated the DFL as a rado tomography magng (RTI) problem and utlzed regularzaton method to solve t. Moussa and Youssef [8,9] modeled the DFL as a machne learnng problem and adopted fngerprnt-matchng method to solve the problem. Zhang et al. [10-14] proposed a sgnal dynamc model and used the geometrc method and probablstc 2013 Yang et al.; lcensee Sprnger. Ths s an Open Access artcle dstrbuted under the terms of the Creatve Commons Attrbuton Lcense ( whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted.
2 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 2 of 12 cover algorthm based on dynamc clusterng to localze targets. All these works requre suffcent RSS measurements of wreless lnks, whch are neffcent, have hgh-resource consumpton, and sometmes are not even possble. In ths paper, based on the consecutveness of moton, we propose an effcent measurement strategy that only needs to measure a few wreless lnks. Furthermore, we consder the nformaton of target locatons as a sparse sgnal and reconstruct t va compressve sensng (CS) method. CS has been appled to realze DFL n [15]; however, the convex optmzaton approach was adopted to reconstruct the sparse sgnal, whch s computatonally expensve. Meanwhle, the reconstructon s based on a randomly selected set of lnks, and ths leads to neffcency and low consstency. Wang et al. [16] presented a novel Bayesan greedy matchng pursut (BGMP) algorthm to solve the DFL problem based on the enumeraton regon bult on pror nformaton. However, the algorthm s stll computatonally expensve. In ths artcle, for realzng effcent real-tme DFL system wth wreless network, we frst provde the rado tomography magng model for relatng the varances of RSS measurements of wreless lnks to the spatal locatons of the targets. Based on the RTI model, we formulate the DFL ssue as a sparse sgnal reconstructon problem. Then we propose a novel and effcent measurement strategy based on the correlated lnks whch are determned wth possble regon bult on the prevous reconstructon. We also propose a compressed maxmum matchng select (CMMS) algorthm for fast reconstructon of the sgnal. It only utlzes RSS measurements of the correlated lnks and reconstructs the sgnal wthn a restrcted subspace. Hence, the runnng tme of the algorthm s reduced and the reconstructon performance s mproved smultaneously, whch completely meet the need for real-tme DFL applcatons. The remander of ths paper s organzed as follows. In the next secton, we wll dscuss some related works. Secton 3 ntroduces the RTI model and formulates the DFL ssue as a compressed RTI (CRTI) problem wth CS theory. Secton 4 presents the effcent measurement strategy and the CMMS algorthm. The experments and results are showed n Secton 5. Fnally, we conclude the paper n Secton 6. 2 Related works Localzaton of targets based on receved sgnal strength n WSN s a promsng technque whch has receved extensve attenton [17-21]. However, lttle attenton has been gven to the real-tme CS-based DFL and effcent measurement method. In ths secton, we brefly summarze the most relevant research on the DFL and the CS-based DFL. Devce-free localzaton was frst ntroduced by Zhang et al. [10] and Youssef et al. [9]. Zhang et al. [10-13] presented a dynamc model to descrbe the relaton between the RSS varance and the target locaton, then utlzed geometrc method and the dynamc cluster-based probablstc cover algorthm to solve the DFL problem. They also proposed a real-tme DFL system [14]. They dvded the trackng area nto dstnct sub-regons, wth each regon assgned wth a separate rado channel, and used the support vector regresson model to locate the target n each sub-regon. Youssef et al. [8,9] adopted the fngerprntmatchng method to realze DFL. The target s locaton was estmated by comparng the current RSS measurements wth the traned database. Although the above methods acheve reasonable performance, they need to buld a separate tranng measurement database before realzng the DFL. Tranng measurements ncrease exponentally wth the ncrease of the number of wreless lnks and targets. Moreover, the database wll be unavalable when the envronment changed. Wlson and Patwar [5,6,22,23] frstly modeled the DFL as a RTI problem, then they carred out n-depth research on relatng the temporal lnk sgnature wth the target s locaton. They utlzed the regularzaton method to solve the ll-posed nverse problem n the reconstructon of the rado tomographc mage. Ther studes lad the foundaton for future research on the rado tomographc magng and encouraged other researchers to start to work n ths drecton. Chen et al. [24] adopted an auxlary partcle flter to realze trackng of devcefree target based on the RSS measurements. These works requre that there should be suffcent number of wreless lnks be measured to guarantee the reconstructon performance, otherwse, the reconstructon performance wll drop sgnfcantly. On the bass of these works, we formulate the DFL as a CRTI problem and propose an effcent measurement strategy and a lghtweght algorthm to realze real-tme trackng. To the best of our knowledge, Kanso and Rabbat [15] adopted convex optmzaton algorthm to reconstruct the sparse mage, whch s the frst work that adopts CS theory to solve the DFL problem. However, the computaton complexty of the l 1 mnmzaton algorthm s too hgh and not sutable for wreless network. Wang et al. [16] also utlzed the CS theory to solve the DFL problem. They lmted the regon where the target may be located wth pror nformaton of last reconstructon, then used the proposed BGMP algorthm to solve the smplfed DFL problem. The BGMP algorthm teratvely seeks the contrbuton of each pxel n the restrcted regon and fnally locates the target on the pxel whch has the bggest contrbuton value. BGMP essentally s a fuson of the orthogonal matchng pursut (OMP) [25] algorthm and back-projecton algorthm. However, the algorthm s also computatonally expensve and not very sutable
3 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 3 of 12 for real-tme localzaton and trackng of targets. Furthermore, the above works choose a set of wreless lnks to reconstruct the sparse sgnal and they stll need to measure all of the wreless lnks. In ths paper, we proposed a novel effcent measurement strategy, whch only needs to measure a small set of correlated lnks so t s effcent and energy savng. To our best knowledge, ths s the frst work whch realzes effcent measurement n real-tme DFL system. We also proposed a lghtweght CMMS algorthm to localze target, whch only needs a small-scale matrx-vector product and a sortng operaton. Hence t runs fast and s sutable for real-tme system. 3 Model and problem formulaton In ths secton, we provde a RTI model for relatng the varance of the measured RSS value of each wreless lnks to the locaton of the target, and then we ntroduce the CS theory and formulate the DFL problem as a compressve RTI queston. 3.1 System model In a WSN, f the number of nodes s K, then the number of the unque two-way wreless lnks s M = (K 2 K)/2. For smplcty, we llustrate a WSN n Fgure 1 wth all the 20 wreless nodes unformly dstrbuted n a square permeter. When wreless nodes communcate, the RSS y (t) of a partcular lnk at tme t s denoted as where y (t) = P S (t) F (t) L v (t), (1) P s the transmtted power n decbel, S (t) s the shadowng loss n decbel caused by the targets whch attenuate the sgnal, F (t) s the fadng loss n decbel due to constructve and destructve nterference of narrow-band sgnals n mult-path communcaton, L s the statc loss n decbel due to antenna patterns, dstance, and devce nconsstences, v (t) s the measurement nose. For two tme nstants t a and t b, the change of the RSS measurement y s y = y (t b ) y (t a ) = S (t b ) S (t a ) + F (t b ) F (t a ) + v (t b ) v (t a ) (2) whch can be rewrtten as y = S + n, (3) where the nose s the groupng of fadng and measurements n = F (t b ) F (t a ) + v (t b ) v (t a ). (4) Fgure 1 An llustraton of an RTI network wth 20 nodes. As descrbed n (3), we can see that y s prmarly determned by the shadowng loss dfference of the two tme nstants. We examned the shadowng effect of the target on sngle lnk measurement. As seen n Fgure 2, a target was located n the WSN, and we took the lnks l 1, l 2,andl 3 for comparson. Fgure 2b shows thevaluesofrssmeasurementwhenahumanstood n the poston as showed n Fgure 2a and when wthout any human n the deployment WSN area. We can see that f a wreless lnk s shadowed by a target, ts RSS value wll sgnfcantly change from when t s not shadowed. Hence we can use the shadowng model to realze DFL. In the shadowng model, whch s the most wdely adopted model, the nose n s caused by tme-varyng measurements mscalbraton of the recever, by the contrbuton of thermal nose, and by the varatons n the multpath channels. The statstcs of the nose n has been examned n [5], whch s constant wth tme. Hence, the calbraton (when no movng targets exsted n the wreless network feld) could be able to establsh t as the baselne. Then one can use the changes of RSS measurements to realze DFL. Now we provde the RTI model. The montorng area of the WSN s dvded nto N square cells whch can be seen as pxels, as ndcated n Fgure 3. We use the word pxel to represent the cell n the followng sectons, and the locaton of each pxel s represented by the center pont of the correspondng cell. The shadowng loss y of lnk can be approxmated as a sum of attenuaton that occurs n each pxel. Snce the contrbuton of each pxel to the attenuaton of each lnk s dfferent, a weghtng s
4 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 4 of 12 (a) Fgure 2 A comparson of the shadowng effect of target n WSN. In one case the network s empty from target. In the other case, there s one target that passed through by two lnks (6,14) and (10,20) n the network. (a) Measurement setup. (b) RSS values. (b) appled. Mathematcally, ths s descrbed for sngle lnk as N y = S + n = w j x j + n (5) j=1 where x j s the attenuaton occurrng n pxel j, w j s the weghtng of pxel j for lnk, andn s the total number of pxels. The weghtng w j can be calculated wth ellpse model mathematcally descrbed as w j = 1 { 1, f dj (1) + d j (2) d + λ, (6) d 0, otherwse, where d sthedstancebetweenthetwonodesofthelnk, d j (1) and d j (2) are the dstance from the center of pxel j to the two nodes, and λ s a tunable parameter descrbng the wdth of the ellpse. The wdth parameter λ s typcally set very low n RTI, such that t s essentally the same as usng the lne-of-sght (LOS) model, as depcted n Fgure 3. Supposng that M lnks are adopted to realze RTI, the changes of RSS measurements can be expressed n matrx form as y = Wx + n (7) where the vector y =[ y 1, y 2,..., y M ] T s a M 1 vector that represents the changes of the RSS measurements, W = {w j, = 1, 2,..., M, j = 1, 2,..., N} s the M N weghtng matrx, x = [x 1, x 2,..., x N ] T s the unknown N 1 pxel vector to be reconstructed, and n = [n 1, n 2,..., n M ] T s the M 1 nose vector. The weghtng matrx can be calculated wth (6). Wth suffcent lnk RSS measurements, we can reconstruct an mage vector by solvng the nverse problem n (7). The mage vector descrbes the amount of rado power attenuaton occurrng due to the targets wthn the pxels of the WSN regon. Snce the pxel locatons are known, RTI allows us to know where the attenuatons n a WSN are occurrng and, therefore, where the targets are located. Fgure 3 Illustraton of the RTI ellptcal weght model.
5 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 5 of Formulaton as CRTI problem CS s an emergng theory for reconstructng sparse sgnals from a much lower samplng rate than Shannon/Nyqust theorem. In the deployment area of a RTI system, when a target moves nto a pxel j, the pxel value x j wll be non-zero, otherwse, x j wll be zero. Note that after suffcent dense grddng, each target can be guaranteed to have a unque locaton n 1 pxel. In general DFL applcaton, the number of targets K s consderably less than the number of pxels N. Hence, the mage vector x wll be a sparse sgnal, and t wll be possble to reconstruct the x from a few measurements. Ths motvates us to utlze the CS theory to reconstruct the sparse sgnal based on (7). We wll present a lghtweght algorthm to solve the sparse sgnal reconstructon problem n the next secton. 4 Effcent measurement strategy and CMMS algorthm In ths secton, we descrbe the detaled mplementaton of the proposed real-tme DFL system, ncludng the effcent measurement strategy, the lghtweght reconstructon algorthm CMMS, and the system scheme. In a RTI system, f one drectly use (7) to fnd the pxel where the target s located, almost all the lnks should be measured, whch s tme and power consumng, especally when N s large. As we know, the WSN generally s powerlmted. To solve ths problem, we propose utlzng pror nformaton of last reconstructon to restrct the range of the pxels where the target may locate and to gude the next measurements. Once we know whch lnks need to be measured, the rado of the other nodes whch does not need to partcpate n the measurement can be turned off, hence, we can both reduce the latency of the system and save the power of the nodes. As movng s consecutve, the target s current locaton must be around the last locaton. As llustrated n Fgure 4, supposng that the target s located on x j at tme nstant t 1, then at the next tme nstant t, thetargetmust be located n a adjacent pxel of x j (the shaded pxels n Fgure 4), whch s called as possble regon n ths paper. If the dstance d j between pxel and pxel j s less than the threshold l, then the pxel s n the possble regon. The parameter l should be set as l = V max t nt,where V max s the maxmum speed of the target, and t nt s the tme nterval between two successve runnng of the estmaton algorthm. The wreless lnks that pass through the possble regon are called as correlated lnks. We can only use the correlated lnks to localze the target n the possble regon. Hence, we only need to measure the correlated lnks n the DFL system. Algorthm 1 presents the constructon process of the possble regon R and the correlated lnks of set L. Algorthm 1 Possble regon and correlated lnks constructon algorthm Requre: Index set R t 1 of pxels where targets located of the last tme nstant, Number of targets K, Measurement matrx W, The threshold l Ensure: The possble regon R, The correlated lnks set L 1: for j = 1toN do 2: for = 1toK do 3: f d jp t 1 < l then 4: R R {j}; 5: end f 6: end for 7: end for 8: for = 1toK do 9: for m = 1toM do 10: f w j > 0 then j R 11: L L {m} 12: end f 13: end for 14: end for After calculatng the set of lnks that needs to be measured, the host of the algorthm (generally a laptop) sends command messages to the wreless nodes through the base staton node to tell them when to partcpate n the measurement and when to go to sleep. Therefore, n Fgure 4 Illustraton of the possble regon and the correlated lnks.
6 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 6 of 12 the real-tme system, the nodes have two phases: one for measurement and the other for recevng command messages from the host computer. In the phase of measurement, the nodes are synchronzed and tme slots are assgned by the followng scheme. In 1 cycle of measurement,thetotalnumberofslotssthesameasthenumber of the nodes. Each node s assgned to transmt only n the slot n whch the seral number s equal to ts node ID number; n other slots, the node ether receves messages from another node for measurement the RSS of the lnk or keeps rado n sleep phase to save power. The packet transmtted by a node ncludes the ID of the node and the RSS values that t has already measured. In the measurement phase, the base staton node receves all the data packets and sends them to the host computer. Hence, when the last node has sent ts data packet, the host computer has all the RSS values of the correlated lnks. Then the wreless node wll turn to the second phase. All of them wll keep alve and receve command messages from the base staton node. Smultaneously, the host computer wll use the measured RSS vector to estmate the target s locaton wth Algorthm 2. Now, we only need to reconstruct the sgnal x R, whch contans far less elements than the source sgnal x. In addton, the magntude of the measured vector y L s also far Algorthm 2 CMMS algorthm Requre: Measurement matrx W, Number of targets K RSS Measurement vector y L, Possble regon R Ensure: Index set p t of pxels where targets located of the current tme nstant, Reconstructed sgnal x 1: Intalzaton: 2: x j 0, j {1, 2,..., N}; 3: for = 1toK do 4: W L R {w mj, m L, j R }; 5: c = W L R T y L ; 6: p t arg max cj, j j R, j / {p t 1, pt 2,..., pt 1, p t +1,..., pt K }; 7: end for 8: for = 1toK 1 do 9: for j = + 1toK do 10: f p t R j & p t j R then 11: f cos( p t 2 p t 1, p p t ) < cos( p t 2 p t 1, p p t j ) then 12: m p t, pt pt j, pt j m; 13: end f 14: end f 15: end for 16: end for 17: x p t 1, {1, 2,..., K} less than n the source vector y. Hence, the reconstructon problem n (7) s compressed to y L = W LR x R + n L. (8) We propose the CMMS algorthm to solve the above compressed problem. The pseudocode of the CMMS algorthm s summarzed n Algorthm 2. For estmatng the next locaton of target, the CMMS algorthm only needs to fnd out the pxel j that could maxmze W L R T y L, where R and L are the possble regon and the correlated lnks of the target, respectvely;w L R s a sub-matrx of W that only ncludes the rows n L and columns n R ;andy L s the measured RSS values of the correlated lnks L. Snce t only needs a small-scale matrx-vector product and a sortng operaton, the CMMS algorthm s lghtweght and has low complexty, whch makes t meet the requrements of real-tme systems. When two targets move too close together that t s dffcult to dstngush from each other, the algorthm wll make ther trajectores as smoother as possble. For clarty, the outlne of the proposed real-tme DFL method s summarzed n Fgure 5. 5 Expermental results To evaluate the performance of the real-tme DFL system, we conduct the real-tme measurement and trackng experment. In ths secton, we frst descrbe our expermental setup. Then the trackng performance of movng targets s provded. Lastly, we wll gve some analyses and dscussons. 5.1 Physcal descrpton of experment A wreless network contanng 20 nodes was deployed n a laboratory. Each node s placed 1.0 m apart along the permeter of 5 5 m 2 and 1.0 m off the ground on a trpod. A photograph of the expermental setup s shown n Fgure 6. The network comprses MICAz wreless nodes [26] made by MEMSIC (MEMSIC Inc., Andover, MA, USA). Each node operates n the 2.4G frequency band and runs the IEEE standard protocol for communcaton. A base staton node lstens all network traffc then feeds the data to a laptopcomputervaausbportforprocessng.italsosends command messages to the wreless nodes from the laptop computer. To avod network transmsson collsons, a smple token passng protocol s used. Each node s assgned an ID number from 1 to 20 and programmed wth a known order of transmsson. When a node transmts ts packet, the other nodes that need to measure the RSS of the lnk wll wake up to receve the message for acqurng the RSS value and then put t nto ts send buffer. When ts turn to transmt arrves, the measured RSS values wll be sent
7 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 7 of 12 Fgure 5 Flow dagram of the system. out. Snce the base staton node always receves all the packages after the last node transmtted ts packet, the real-tme trackng program runnng on the laptop wll get all the needed RSS values. When the base staton node sends a message to the wreless nodes, ts package follows a certan format. The base staton node needs to send two knds of messages to the wreless nodes: the frst knd of messages tells the nodes when they need to wake up for recevng packages; we call ths knd of messages as L message. Packagesofthe L message follow the format as ndcated n Fgure 7. The second knd of message s a command that tells the nodes start to measure; we call ths knd of message as start message, whch s set as a smple 3 bytes packet Once the nodes receve the start message, they wll start ther tmer and the node wth ID number 1 wll transmt frst. The start message can also synchronze the wreless nodes. Fgure 6 The setup of the experment.
8 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 8 of 12 EE ID XX XX XX EE ID XX XX EE... Fgure 7 The packet format of the L message. Delmter Node ID Slot number that the node needs to wake up for recevng message In the experment, the system s calbrated by takng RSS measurements whle the network s vacant from movng targets. The RSS vector s averaged over a 120-second perod, whch results n approxmately 1,240 samples from each lnk. The calbrated RSS vector s saved n the laptop computer and provdes a baselne aganst whch all other RSS measurements are dfferenced. Ths process has to be done off-lne. The default parameters are as follows: the pxel sze s m, and the possble regon threshold s l = 0.75 m; hence, the possble regon ncludes 9 pxels. In the experments, the parameters were set as gven n Table Trackng performance In order to verfy the proposed method, three experments were conducted: one for one target trackng, the others for two targets trackng. Each experment was repeated two tmes: one experment for real-tme trackng wth the CMMS algorthm and one that measured the RSS of all the wreless lnks for off-lne processng wth the other algorthms. In the experments, the expermenter moves at a typcal walkng pace on a predefned path at a normal walkng speed of 1.2 m/s. A metronome and unformly placed markngs on the floor help the expermenter to take constant-szed steps at a regular tme nterval. The actual locaton of the expermenter s nterpolated usng the start and stop tme and the known marker postons. In the frst experment, a target moved around the square s shown n Fgure 8. The fgure compares the true trace wth the estmated ones obtaned by CMMS, l 1,regularzaton, and BGMP. In the experment, we assume that the startng locaton of the target s known, whch s reasonable n target trackng. It should be ponted out that Table 1 Relevant parameter settngs Parameter Value Descrpton w 0.5 Pxel wdth (m) λ Wdth of weghtng ellpse (m) α 4 Regularzaton parameter l 0.75 Threshold for calculate possble regon (m) there were two consecutve locatons estmated by the algorthms for each pxel that the target traveled. It s obvous that the proposed CMMS algorthm could acheve better trackng performance than the other algorthms. The detaled statstcal characters of the localzaton errors of dfferent algorthms are summarzed n Table 2. We can see that the average error of the proposed CMMS s 0.09 m whch s smaller than the errors of the regularzaton (0.27 m) and BGMP (0.15 m) and even smaller than the error of the l 1 (0.12 m). The maxmum error of thecmmssalsosmallerthantheonesoftheotheralgorthms. We addtonally tested the average runnng tme of dfferent algorthms for once estmaton on a dual-core 2.6 GHz PC. The proposed CMMS algorthm consumed about 0.06 ms, whch s far less than 1 ms the regularzaton algorthm consumed 0.3 ms; the BGMP algorthm consumed approxmately 5 ms; and l 1 consumed much more about 28 ms. We can see that the CMMS needs consderably less tme than the other algorthms. Based on the proposed effcent measurement strategy, each node needs to receve 2.3 packets on average from the other nodes and addtonal 3 packets from the base staton node for one estmaton. Wthout utlzng the effcent measurement strategy, each node needs to receve 19 packets from all the other nodes. Each node needs to send one packet n the two stuatons. Therefore, one can save nearly 88% of the RSS measurements and about 72% of the rado communcatons usng the proposed effcent measurement strategy. In experments 2 and 3, two targets walked along the polylne shown n Fgure 9a,b. The target A moved from A1 to A2; smultaneously, target B moved from B1 to B2. In Fgure 9a, the dstance between target A and target B wasalwayslongerthan3pxels.wecanseethatthetrajectores estmated by the CMMS algorthm s smlar to the real ones. The average error of ths experment s 0.11 m. In Fgure 9b, target A and target B moved nto two adjacent pxels (1.25, 2.25) and (1.25, 2.75). Wecanseethat the trackng performance s gettng worse when two targets moved too close to each other. The average error of ths experment ncreases to 0.23 m. In summary, the total average error of the experments of two targets s 0.17 m, thus the expermental trackng performance s acceptable.
9 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 9 of y(m) 2.5 y(m) CMMS trajectory Real trajectory Node L1 trajectory Real trajectory Node (a) x(m) (b) x(m) y(m) 2.5 y(m) Regularzaton trajectory Real trajectory Node BGMP trajectory Real trajectory Node x(m) x(m) (c) Fgure 8 Vsualzed trackng example wth one target. (a) CMMS. (b) l 1. (c) Regularzaton. (d) BGMP. (d) 5.3 Analyses and dscussons We frst analyze the latency of the system. Snce the total number of the nodes s 20, there 20 tme slots n the measurement phase. A MICAz node takes 7 ms on average to transmt a packet wth 51 bytes, so we assgned each tme slot wth 8 ms. The measurement phase needs 20 8 = 160 ms = 0.16 s. In the frst experment, the number of lnks each node needs to measure on average s 2.3, followng the packet format n Fgure 7; each node needs up to 5 bytes on average n the packet of the L message. The maxmum length of the payload n TnyOS packet s over 51 bytes, so the L message can be sent n Table 2 Comparson of localzaton error and executon tme Algorthm Medan (m) Average (m) Stand devaton (m) 90% (m) Max (m) CPU tme (ms) CMMS l Regularzaton BGMP
10 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 10 of 12 (a) Fgure 9 Vsualzed trackng example wth two targets. (a) The dstance between the two targets was always longer than 3 pxels. (b) The two targets moved nto two adjacent pxels (1.25, 2.25) and (1.25, 2.75). (b) two packets. The tme requred by the base staton node sendng L message and start message to the nodes s up to (2+1) 7 = 21 ms. The tme needed for the host runnng the reconstructon algorthm s less than 1 ms. In total, once estmaton of the locaton of the target needs up to = 182 ms 0.2s.Insummary,oursystem can reach the real-tme trackng wth the latency of about 0.2 s, whch sgnfcantly outperforms prevous trackng systems [10,11,14]. The latency wll ncrease as enlargement of the deployment area wth more nodes. Based on the above analyss, we can see that the system latency wll ncrease at less than 10 ms wth each addtonal node. In general applcaton, two estmaton n 1 s s enough. On ths condton, the system can be extended up to 50 nodes. The system can also be extended by clusterng nodes nto dfferent regons whch are assgned wth separate channels and share tmeslots as ntroduced n [11]. Hence, the system s scalable. The wdth of the pxel s an mportant parameter n RTI problem, whch correlates hghly wth the resoluton. We beleve that t s manly dependent on the applcaton. In the experments, we set t at 0.5 m, whch can (a) ( b) Fgure 10 Performance under dfferent parameters. (a) λ. (b)l.
11 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 11 of 12 (a) Fgure 11 Imagng performance. (a) Real mage. (b)image reconstructed by CMMS. (b) meet the requrement of general applcatons. In addton, ncreasng or decreasng of the wdth of the pxel wll not sgnfcantly change the latency of the system. To evaluate the performance of the proposed method under dfferent condtons, we evaluate the algorthm wth dfferent wdth of the ellpse λ and possble regon threshold l. The weghtng parameter plays an mportant role n generatng accurate RTI mages. If the ellpse s too wde, the pxels of where attenuaton s not occurrng may be ncluded. If the ellpse s too narrow, pxels that do, n fact, attenuate a lnk s sgnal may not be captured by the model. Ths may result n a loss of nformaton that degrades the fnal reconstructon qualty. Fgure 10a llustrates the mean squared error (MSE) wth respect to dfferent λ. It s obvous that the CMMS algorthm can acheve better results when λ n the neghborhood of the pont And the MSE wth respect to dfferent possble regon threshold l s ndcated n Fgure 10b. We can see that the MSE s very large (over 1.8 m) when l = 0.5 m, because the target may move out of the possble regon whch only comprses 5 pxels. The MSE does not sgnfcantly ncrease wth the threshold l ncreasng, but a very large value of l wll ncrease both the computatonal complexty and the system latency. Essentally, the threshold l s determned by V max and t nt (l V max t nt ). If the movement speed of the target s very slow, one can set t nt wth a bg value (such as 1 or 2 s) for conservng system resources. Snce once estmaton of the target s locaton needs less than 0.2 s, the value of t nt can down to 0.2 s. On the precondton of l = 0.75 m and w = 0.5 m, the value of V max can up to 3.75 m/s, whch s much larger than the normal walkng speed. In short, one should carefully select the value of l accordng to specfc applcaton for reachng good trackng accuracy and conservng system resources. Essentally, our proposed real-tme DFL s based on the RTI theory, hence, the localzaton performance s dependng on the magng performance. We provde an magng result n Fgure 11. It can be seen that the CMMS algorthm could acheve reasonable magng performance. 6 Concluson In ths artcle, we desgned and mplemented a real-tme DFL system, whch s based on effcent measurement strategy and lghtweght reconstructon algorthm. The measurement strategy makes use of the last localzaton result to predct a possble regon of the target, then fnds the wreless lnks whch travel through the possble regon toestablshthesetofcorrelatedlnks.thesystemonly needs to measure the RSS of the correlated lnks va cooperatng wth the baston staton node. As far as we know, we are the frst to realze real-tme DFL based on measurements of correlated lnks. Furthermore, the proposed CMMS algorthm only needs a small-scale matrx-vector product operaton to reconstruct the sgnal and localze the target. In summary, we realzed an effcent and energy-savng real-tme DFL wreless network system. Expermental results demonstrate the effectveness of our approach and confrm that the CMMS algorthm could acheve satsfactory localzaton and trackng results. Competng nterests The authors declare that they have no competng nterests. Acknowledgements Ths work has been fnancally supported by the Natonal Natural Scence Foundaton of Chna (grant no ).
12 Yang et al. EURASIP Journal on Wreless Communcatons and Networkng 2013, 2013:186 Page 12 of 12 Receved: 5 December 2012 Accepted: 2 July 2013 Publshed: 9 July 2013 References 1. The Internet of Thngs, ITU Internet Reports (2005). nternetofthngs/. Accessed 15 May CFok,CJulen,GRoman,CLu,nProceedngs of the 2nd workshop on Software Engneerng for Sensor Network Applcatons, SESENA 11, Wakk, Honolulu. Challenges of satsfyng multple stakeholders: qualty of servce n the nternet of thngs (ACM New York, 2011), pp L Atzor, A Iera, G Morabto, The nternet of thngs: a survey. Comput. Netw. 54(15), (2010) 4. N Patwar, J Wlson, RF sensor networks for devce-free localzaton: measurements, models, and algorthms. Proc. IEEE. 98(11), (2010) 5. J Wlson, N Patwar, Rado tomographc magng wth wreless networks. IEEE Trans. Mob. Comput. 9(5), (2010) 6. J Wlson, N Patwar, F Vasquez, n Vrgna Tech Symposum on Wreless Personal Communcatons. Regularzaton methods for rado tomographc magng. The Inn, 3 5 June J Wlson, N Patwar, See-through walls: moton trackng usng varance-based rado tomography networks. IEEE Trans. Mob. Comput. 10(5), (2011) 8. M Moussa, M Youssef, n Proceedngs of the 2009 IEEE Internatonal Conference on Pervasve Computng and Communcatons (PerCom).Smart devces for smart envronments: devce-free passve detecton n real envronments. Galveston, TX, 9 13 March M Youssef, M Mah, A Agrawala, n Proceedngs of the 13th annual ACM Internatonal Conference on Moble Computng and Networkng (MobCom), Montreal, 9 14 September. Challenges: devce-free passve localzaton for wreless envronments (ACM New York, 2007), pp D Zhang, J Ma, Q Chen, LM N, n Proceedngs of the Ffth IEEE Internatonal Conference on Pervasve Computng and Communcatons (PerCom) Whte Plans, NY, March. An RF-based system for trackng transcever-free objects (IEEE Computer Socety Press Los Alamtos, 2007), pp D Zhang, LM N, n Proceedngs of the 2009 IEEE Internatonal Conference on Pervasve Computng and Communcatons (PerCom) Galveston, 9 13 March. Dynamc clusterng for trackng multple transcever-free objects (IEEE Computer Socety Press Los Alamtos, 2009), pp D Zhang, Y Lu, LM N, n Proceedngs of the 30th Internatonal Conference on Dstrbuted Computng Systems (ICDCS) Genova, June. Lnk-centrc probablstc coverage model for transcever-free object detecton n wreless networks (IEEE Press, Pscataway, 2010), pp D Zhang, Y Yang, D Cheng, S Lu, LM N, n Proceedngs of the 2010 IEEE Internatonal Conference on Communcatons (ICC), Cape Town, May. Cocktal: an RF-based hybrd approach for ndoor localzaton (IEEE Press, Pscataway, 2010), pp D Zhang, Y Lu, LM N, n Proceedngs of the 2011 IEEE Internatonal Conference on Pervasve Computng and Communcatons (PerCom) Seattle, March. RASS: a real-tme, accurate and scalable system for trackng transcever-free objects (IEEE Computer Socety Press, Los Alamtos, 2011), pp M Kanso, M Rabbat, n Dstrbuted Computng n Sensor Systems. Compressed RF tomography for wreless sensor networks: centralzed and decentralzed approaches (Sprnger, New York, 2009), pp J Wang, Q Gao, H Chen, X Zhang, H Wang, Devce-free localsaton wth wreless networks based on compressve sensng. IET Commun. 6(15), (2012) 17. V Seshadr, G Zaruba, M Huber, n Proceedngs of the Thrd IEEE Internatonal Conference on Pervasve Computng and Communcatons (PerCom) Kaua Island, HI, 8-12 March. A Bayesan samplng approach to n-door localzaton of wreless devces usng receved sgnal strength ndcaton (IEEE Computer Socety Press, Los Alamtos, 2005), pp R Ouyang, AS Wong, CT Lea, Receved sgnal strength-based wreless localzaton va semdefnte programmng: noncooperatve and cooperatve schemes. IEEE Trans. Veh. Technol. 59(3), (2010) 19. X L, Collaboratve localzaton wth receved-sgnal strength n wreless sensor networks. IEEE Trans. Veh. Technol. 56(6), (2007) 20. Q Sh, C He, H Chen, L Jang, Dstrbuted wreless sensor network localzaton va sequental greedy optmzaton algorthm. IEEE Trans. Sgnal Process. 58(6), (2010) 21. X P, H Yu, n Proceedngs of the Sxth Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes (PDCAT), Dalan, 5 8 December. A dstrbuted and cooperatve target localzaton algorthm n wreless sensor networks (IEEE Computer Socety Press, Los Alamtos, 2005), pp N Patwar, SK Kasera, Temporal lnk sgnature measurements for locaton dstncton. IEEE Trans. Mob. Comput. 10(3), (2011) 23. J Wlson, N Patwar, A fade level Skew-Laplace sgnal strength model for devce-free localzaton wth wreless networks. IEEE Trans. Mob. Comput. 6(99), (2012) 24. X Chen, A Edelsten, Y L, M Coates, M Rabbat, A Men, n Proceedngs of the 10th Internatonal Conference on Informaton Processng n Sensor Networks (IPSN), Chcago, Aprl. Sequental Monte Carlo for smultaneous passve devce-free trackng and sensor localzaton usng receved sgnal strength measurements (IEEE Computer Socety Press, Los Alamtos, 2011), pp J Tropp, A Glbert, Sgnal recovery from random measurements va orthogonal matchng pursut. IEEE Trans. Inf. Theory. 53(12), (2007) 26. MICAz, MEMSIC, Wreless sensor networks. wreless-sensor-networks/. Accessed 15 May 2013 do: / Cte ths artcle as: Yang et al.: A real-tme devce-free localzaton system usng correlated RSS measurements. EURASIP Journal on Wreless Communcatons and Networkng :186. Submt your manuscrpt to a journal and beneft from: 7 Convenent onlne submsson 7 Rgorous peer revew 7 Immedate publcaton on acceptance 7 Open access: artcles freely avalable onlne 7 Hgh vsblty wthn the feld 7 Retanng the copyrght to your artcle Submt your next manuscrpt at 7 sprngeropen.com
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationA Revised Received Signal Strength Based Localization for Healthcare
, pp.273-282 http://dx.do.org/10.14257/mue.2015.10.10.27 A Revsed Receved Sgnal Strength Based Localzaton for Healthcare Wenhuan Ch 1, Yuan Tan 2, Mznah Al-Rodhaan 2, Abdullah Al-Dhelaan 2 and Yuanfeng
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationA Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationProperties of Indoor Received Signal Strength for WLAN Location Fingerprinting
Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More informationOPT Online Person Tracking System for Context-awareness in Wireless Personal Network
OPT Onlne Person Trackng System for Context-awareness n Wreless Personal Network Xuel An R. Venkatesha Prasad Jng Wang I.G.M.M. Nemegeers EEMCS, Delft Unversty of Technology, The Netherlands {x.an, j.wang3,vprasad,gnas.n}@ew.tudelft.nl
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationVehicle Detection and Tracking in Video from Moving Airborne Platform
Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationAn Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol
246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationCooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
More informationAbstract. 1. Introduction
System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,
More informationSingle and multiple stage classifiers implementing logistic discrimination
Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationA Multi-Camera System on PC-Cluster for Real-time 3-D Tracking
The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationCloud-based Social Application Deployment using Local Processing and Global Distribution
Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationFREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationDistributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
More informationA Fast Incremental Spectral Clustering for Large Data Sets
2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School
More informationRealistic Image Synthesis
Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random
More informationHow To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More informationAn Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
More informationCONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM
Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE
More informationAutomated information technology for ionosphere monitoring of low-orbit navigation satellite signals
Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationCloud-based WirelessHART networking for Critical Industrial Monitoring and Control
-based WrelessHART networkng for Crtcal Industral Montorng and Control LeonardoAscort 1,StefanoSavazz 2,StefanoGalmbert 1 1 Pepperl-Fuchs,Sulbate(MI),Italy 2 NatonalResearchCounclofItalyCNR-IEIIT,MlanoItaly
More informationFinancial Mathemetics
Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,
More informationBayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationWeb Object Indexing Using Domain Knowledge *
Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct
More informationOptimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationSecure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationEye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns
Eye Center Localzaton on a Facal Image Based on Mult-Bloc Local Bnary Patterns Anatoly tn, Vladmr Khryashchev, Olga Stepanova Yaroslavl State Unversty Yaroslavl, Russa anatolyntnyar@gmal.com, vhr@yandex.ru,
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationEnterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationA High-confidence Cyber-Physical Alarm System: Design and Implementation
A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationMACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION
MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationLoad Balancing By Max-Min Algorithm in Private Cloud Environment
Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam
More informationA Programming Model for the Cloud Platform
Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com
More informationtaposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com
G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng
More informationAn Empirical Study of Search Engine Advertising Effectiveness
An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationReinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)
Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode
More information