Professional Documents
Culture Documents
net/publication/328475867
CITATION READS
1 949
1 author:
Gurav Aa
MasterCard
7 PUBLICATIONS 25 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Gurav Aa on 24 October 2018.
By
1
Approval Sheet
Examiners:
Supervisors:
Chairman:
Date:
Place:
2
Certificate
This is to certify that Mr. Aniket Anand Gurav has completed successfully the course as required
for the Dissertation Course carried out by himself for partial fulfillment of the requirements for
the degree in Master of Technology in Modelling and Simulation during the autumn session
2013-2014.
Guide
Mrs. Manisha. J. Nene
Asst. Professor ,
Department of Applied Mathematics
and Computer Engineering
DIAT (DU), Pune-411025
3
Declaration
This is to certify the dissertation report comprises of original work (except where indicated)
carried out by me and due acknowledgments have been made in the text to all other material
used. The dissertation does not any classified information related to national security and has not
been submitted in any form for another degree or diploma at any other institute/ university.
Aniket .A.Gurav
Reg. No. 11- 07- 03
Dept of Applied Mathematics
DIAT (DU),
Girinagar, Pune – 411025
Guide
Mrs. Manisha.J.Nene
Asst. Professor
Aniket .A.Gurav
Dept of Applied Mathematics
DIAT (DU),
Girinagar, Pune – 411025
5
Index
Abstract 8
List of abbreviations 9
List of Figures 9
Chapter 1 Introduction 11
1.1 Overview 11
1.2 Components of Wireless Sensor Networks 12
6
Chapter 5 Target Tracking in WSN 31
6 References 41
7
Abstract
In recent years, Wireless Sensor Networks WSNs have been the source of increasing interest to
research community. WSN gathers information from multiple sources at the same time. Some
critical tasks performed by it are target tracking in military applications, habitat monitoring,
detection of catastrophic events, environment monitoring, and health applications etc. Data is
sent to a BS Base Station via a routing algorithm to be compiled and analyzed. At the BS data is
processed and track of the object is estimated using the Particle filter PF.
Proposed Bio inspired energy efficient Optimal Path Identification OPI algorithm which
find single/ multiple path between sensor node SN and BS. This is developed keeping in mind
SN stringent requirements . For the trajectory tracking of the object PF is implemented. It tracks
the trajectory of the target and estimate its location and velocity.
8
List of Abbreviations
Abbreviations
WSN Wireless Sensor Network
SN Sensor Node
BS Base Station
GPS Global Positioning System
AoA Angle of Arrival
TDoA Time difference of Arrival
ACO Ant Colony Optimization
ACS Ant Colony System
AS Ant System
TSP Travelling Salesman Problem
OP Optimal Path
OPI Optimal Path Identification
SP Shortest Path
PDF Probability Density Function
PF Particle Filter
List of figures
Figure 1 Organization of Thesis 11
Figure 1.1 A typical WSN 12
Figure 2.1 Planned Deployment of Sensor 13
Figure 2.2 Random Deployment of Sensor 13
Figure 2.3 Time Difference of Arrival (TDoA) illustrated 14
Figure 2.4 Hyperbolic Trilateration 15
Figure 2.5 Triangulation technique 15
Figure 3.1 Binary bridge experiment to study ACO 18
Figure 3.2 Experiment with a binary bridge whose branches have 19
different length
Figure 3.3 Flow chart for ACO 21
Figure 4.1 SN randomly deployed in field of interest 25
Figure 4.2 result 25
Figure 4.3 Wireless sensor nodes and its network 28
Figure. 4.4 OP using modified ACO 28
Figure. 4.5 Optimal Path using traditional ACO 28
9
Figure 4.6 WSN 29
Figure 4.7 WSN 29
Figure 5.1 A typical scenario of tracking 31
Figure 5.2 event reporting 32
Figure 5.3 Particle Filter 35
Figure 5.4 Particle Filter 37
Figure 5.5 Trajectory tracking (result1) 37
Figure 5.6 Velocity Estimation (result1) 38
Figure 5.7 Velocity Estimation (result1) 39
Figure 5.8 Velocity Estimation (result2) 39
Figure 5.9 Trajectory tracking (result2) 40
Figure 5.10 Velocity Estimation ( result2) 40
10
Chapter 1 Introduction
1.1 Overview
Wireless sensor networks (WSNs) have attracted significant research and commercial
interest recently. It is used increasingly to track targets/object in battlefields, wildlife or habitat
monitoring, and monitoring of hazardous chemicals while they are in transit. Tracking
moving targets with WSN is one of the prominent applications. Depending on the applications,
sensors with different sensing modalities such as acoustic, seismic, infrared, radio, and magnetic
can be deployed for tracking different type of targets.
1.2 Organization
Chapter 2 describes discuss localization and distance estimation techniques.
Chapter 3 discusses Ant Colony Optimization.
Chapter 4 Explain proposed algorithm for Optimalt Path Identification.
Flow chart given below shows the important phases of dissertation work.
Start
BS communicate SP to SN (CHAPTER 3,
4)
Stop
11
Figure 1.1: Organization of Thesis
A typical WSN is shown in Figure 1.2 the two distinct elements that make up of most
WSN are: Base Station(s) BS, SN. They are deployed in the field of interest to monitor the
occurrence of event or existence of target object.
SN senses the phenomenon in the field of interest. It can store that information if required. It also
communicate the sensed information with SN in communication radius. Each SN forward sensed
data to the BS for further processing.
For object tracking task, there can be single target, or multiple targets. It is challenging to
estimate and predict the path of the object while traveling through the deployed WSN accurately.
12
Chapter 2
Deployment & Localization of nodes in WSN
During object detection and tracking, deployment & location estimation is important. In
many practical scenarios SNs are deployed disciplined manner (figure 2.1) or randomly (figure
2.2). Without information about SN location, the origin of data received at the BS can not be
identified and it become meaningless in some applications. Due to the importance and utilization
of location information, numerous localization algorithms have been proposed for WSNs [1,2,3].
The large scale and difficulty of redeploying a WSN make planning and pre-evaluation of the
localization algorithms important.
Figure 2.1: Planned Deployment of Sensor Figure 2.2: Random Deployment of Sensor
The location of the sensor can be determined using technologies like GPS. It will require each
node to equip with special position sensors to know about its absolute position. Various
approaches which are used for location estimation are as follows.
13
With n >=2 (2.1)
= -10* (t) (2.1.1)
By using formulae in 2.1.1 we can calculate distances if all other factors are known where Pi(t)
is a constant due to the transmitted power from transmitter i and the antenna gains, ή is the
attenuation constant, dij is the distance between the two nodes, Xij(t) is the uncertainty factor due
to multi-path and shadowing t is time, pRij is received signal strength.
By using the measured signal strength we can calculate the distance from the sender. If
the distance from SN more than or equal to three location are known then we can calculate
position of the receiver by multilateration.
A signal sent by radio travels much faster than the acoustic signal. This difference of
velocity can be used to estimate distance between two devices. Using TDoA as an estimate for
time of flight of the ultrasound signal, the receiver can estimate its distance to sender. If the
distance from more than or equal to 3 senders with known location are known then we can
calculate the position of the receiver by multilateration (Figure 2.3). In TDoA schemes, each
node is equipped with a speaker and a m i cro phone. Some system uses ultrasound while
others use audible frequencies. In TDoA, the transmitter first sends a radio message, however,
the general mathematical technique is independent of particular hardware. It waits some fixed
interval of time, tdelay (which might be zero), and then produces a fixed pattern of “chirps” on
its speaker. When listening nodes hear the radio signal, current time is noted, t r a d i o and then
turn on their microphones. When their microphones detect the chirp pattern, current time is
noted, t s o u n d . Once they have t r a d i o , t s o u n d , and tdelay the listeners can compute the distance d
between themselves and the transmitter using the fact that radio waves travel substantially faster
than sound in air.
SN A sends radio pulse and then an acoustic pulse. The time difference between arrivals of
two pulses is determined, by using this SN B can estimate its distance from A.
14
(2.2)
TDoA methods are impressively accurate under line- of-sight condition; however they perform best
in areas that are free of echoes, and when the speakers and microphones are calibrated to
each other the downside of TDoA system is that they inevitably require special hardware to be
built into SN, specifically a speaker and a microphone. TDoA systems perform best when it is
calibrated properly, since microphones & speakers never have transmission and reception
characteristics. The speed of sound in air varies with air temperature and humidity which
introduces inaccuracy into equation 2.2.Finally, line-of-sight constraint can be difficult to meet
in the same environments.
In the end, many localization algorithms use time difference of arrival ranging simply
because it is dramatically more accurate than radio-only methods. The actual reason why TDoA
is more effective in practice than RSSI is due to the difference using signal travel time and signal
magnitude.
The most basic and intuitive method is called hyperbolic trilateration. It locates a node by
calculating the intersection of 3 circles as shown in Fig. 2.4.This method determines the position
of a node from the intersection of 3 circles of 3 anchor nodes that are formed based on distance
measurements between its neighbors. The intersecting curves which we get into this method are
hyperbolic.The radius of the circle is equal to the distance measurement as shown in Figure 2.4.
The intersection point of these three circles gives the possible position. However, in a real
15
environment, the distance measurement is not perfect; hence, more than three nodes are required
for this method.
(2.3)
Where a1,b1 is centre & r1 is radius. Similarly equation of 2nd and 3rd circle is
, (2.4 )
(2.5)
Where (a2,b2 ) is centre & r2 is radius of 2nd circle .( a3,b3 ) is centre & r3 is radius of 3rd circle.
Here all this centre are location of the SN locations and radius is distance that sensor has
measured. To find the intersection of these 3 circles , 1st solve 2.3 & 2.4 which will give
intersection of 1st And 2nd . Then same procedure is applicable for finding other remaining
intersection.
2.4 Triangulation
This method is used when the direction of the node is known in AoA systems. The SNs
positions are calculated using the trigonometry laws of sine and cosines (shown in Fig.2.5).
Initially by using distance estimation technique distances A, B, C are calculated. Then
trigonometry laws of sine and cosine angles are used.
16
17
Chapter 3
Ant colony optimization
Ant Colony Optimization (ACO) is Bio inspired probabilistic technique for solving
computational problem which can be reduced to finding Optimal Paths OP through graphs.
This technique was suggested by Marco Dorigo in 1992 [5].
The nest of a colony of Argentine ants Linepithema homeland a food source has been separated
by a diamond-shaped double bridge in which each branch is having the same length. Ants can
then free to move between food source and the nest . The percentage of ants which choose one or
the other of the two branches is observed over time. In this experiment initially there is no
pheromone on the two branches, therefore ants select this branch with the same probability.
Nevertheless, after an initial phase, due to random fluctuations ants randomly select one branch,
the upper one in Figure 3.1 Since the ants deposit pheromone while walking back and forth, the
greater number of ants on the upper branch determines a greater amount of pheromone on it,
which causes more ants to choose it.
18
3.3 Two branches of varying length
If the branches of the bridges are of different length, then the pheromone field can lead
the majority of the ants in the colony to select the shortest between the two available paths, the
first ants able to arrive at the food source are those that traveled following the shortest branch
(see Figure 3.2). Accordingly, the pheromone that these same ants have laid on the shortest
branch while moving forward towards the food source makes this branch marked by more
pheromone than the longest one. The higher levels of pheromone present on the shortest branch
stimulate these same ants to probabilistically choose again the shortest branch when moving
backward to their nest. In this way, pheromone is laid on the shortest branch at a higher rate than
on the longest branch. The experimental observation is that, after a transitory phase, most of the
ants use the path with the shortest branch. It is also observed that the colony’s probability of
selecting the shortest path increases with the difference in length between the long and the short
branches.
Figure 3.2: Experiment with a binary bridge whose branches have different length. a) Ants start
exploring the bridge. (b) Eventually most of the ants choose the shortest path.
ij * ij
j N j & j M k
p k
ij
ij * ij (3.1)
0
otherwise
19
Where ij is pheromone concentration on edge between node i and node j. ij is the value of
heuristic related to energy, The relative importance of pheromone trail and heuristic value is
controlled by α and β.
The heuristic value of node j is
1
ij = d (3.2)
l (i, j )
s
Where l(i, j) is the edge length between nodes me and j. After each iteration t ants deposit
quantity of pheromone which is given by
k (t ) .(1 / j k (t )) (3.3)
Where j k (t ) is the length of the path from source to destination traversed by ant k. Amount of
pheromone quantity on edge i to j is given by the equation
ij (t ) ij (t ) ij (t ) (3.4)
But as the time passes the pheromone deposited on the edge start evaporating. A control
coefficient [0,1] decides the amount of pheromone on each edge at any specific iteration
which is given by the equation
ij (t ) (1 ) ij (t ) (3.5)
As the number of iteration increases pheromone concentration on shortest path becomes more as
compared to relative longer paths present in the network. So more number of ants start taking the
path with greater concentration of the pheromone which keeps increasing pheromone level.
Eventually paths with shortest length are more preferred by ants.
Due to the adaptability feature of ACO, we applied ACO technique to find the SP in
WSN. ACO algorithms have been applied to many combinatorial optimization problems, like
quadratic assignment , protein folding or routing vehicles and a lot of derived methods have been
adapted to dynamic problems in real variables, multi-targets and parallel implementations,
stochastic problems,. It has been also been used to find near optimal solutions to the Travelling
Salesman Problem TSP. The ant colony algorithm can be run continuously and adapt to changes
in real time. This is of interest in urban transportation systems and network routing.
β : This parameter controls the relative importance of heuristic related to path length.
Total no of ants: Based on the pheromone concentration ants visits the nodes. While visiting the
nodes ants lay pheromones on the path. The concentration of pheromone on the path depends on
20
the length of the path. The pheromone dropped by ant on the path is updated only in the next
iteration. So the different types of solution which we are going to get are dependant on how
many ants there are. More the number of ants more solutions we get.
Start
Initialize Parameters
Create Ants
No Is destination
node
Yes
End
21
Chapter 4
Identifying Optimal Path in WSN using ACO
Last chapter describes ACO. This algorithm can be efficiently applied to combinatorial
problem. It has been already applied to the TSP. Which is proved to be NP hard problem, for
TSP ACO is giving near optimal solution.
In WSN there are hundreds to thousands of nodes. Each node tries to report the sense
information to the BS. So it will be useful if each SN in the network knows the OP between BS
to itself. Hence it is an important task for network communication protocol.
22
Here we are assuming that BS which is node 1, knows the coordinates of all other nodes.
Here we will try to find the optimal distance between BS to any target node. ACO will be
applied at BS and results which is Optimal Path OP will be forwarded to target node.
The working of our proposed algorithm is described in the steps 1 to 7. Our proposed
algorithm is modified to suit the needs of energy constrained WSNs. The proposed algorithm
considers a parameter's number of hops and path length to find OP. We overcome the fact that in
traditional ACO the number of hops and path length together are not considered. The value for
the parameter α, β are 3 and 2 & [0,1]
Steps
Step 1: When the BS starts calculating SP, it detects/selects
Destination nodes in WSN. An ant is created which will generate a path from the BS to the
destination node.
Step 2: Ant “k” on node “i” selects the next node “j” using formula in equation 3.1.
Here “j” is an adjacent node of “i”. An ant “k” has more probability to choose the
node with larger values of pij the next node selected is stored in memory of ant k. ( M k )
k
Step 3: If any ant visits the node which is already visited by the same ant that ant
Is discarded.
Step 4: Step 2 and 3 are repeated till ant k finds a destination node or discarded.
Step 6: When all ants complete above procedure pheromone is updated by the amount on
each edge between node i to j using formulae in the equation.
1 1
ij (t ) ij (t ) (( ) ( ij (t 1) ( k ))
(4.1)
j (t )
As the above steps are iterated, BS comes to know about the optimal path between it and
the destination. Similarly the BS can calculate distance between it and all other sensor nodes.
23
4.3 Comparison proposed algorithm with Traditional ACO
1. In proposed algorithm Pheromone updating is using equation 4.1 which considers total
path length of Ant, number of hops present in the path while in traditional ACO uses equation
3.3 and 3.4
k (t ) .(1 / j k (t )) And ij (t ) ij (t ) ij (t )
These equations don’t consider path length. In proposed algorithm only optimisation of path
length is done node energy, delay, congestion is not considered.
2. Due to different pheromone updating rule best solutions in each iteration gets more chance in
the next iteration so convergence is early achieved compared to traditional ACO.
3. Along with optimal path we can also get other good quality of paths hence the output is
multipath.
5. Traditional ACO uses the greedy approach in selecting the next node to visit short comings of
these approaches is overcome in this proposed algorithm.
6. Entire computation of optimal path is done at BS & then optimal path is communicated with
the target node.
7. In proposed algorithm we are getting multiple paths so in the future it's possible to do load
balancing.
24
4.4 Results:
No of ants: 24 Sensor Nodes:12 No of iterations:5
Figure 4.2
Best path: 1 12 8 5 3 7 6 10
Length: 162
25
Best ants Table 2
Best path: 1 12 8 5 4 3 7 11 10
Length: 176
Best ant : 1 5 4 3 7 2 11 6 10
Length:177.84
Best ants
Table 4
Best ant : 1 5 4 3 2 10
Length: 154.20
26
Best ants
Table 5
Best Ant: 1 5 4 3 2 10
Min: 154.20
Table 6
27
Previously documented results
This part discusses the identified path using modified ACO and using the traditional
ACO. Figures 4.3, 4.4 and 4.5 show WSN and its communication network. The distance between
corresponding sensors is indicated near the edges.
Figure 4.3 Wireless sensor nodes and its network Figure 4.4 OP using modified ACO
Here task is to find an optimal path between node 1 to 9. The initial pheromone concentration on
all edges is 0.00001.After implementing API we get the path marked with red colour shown in
figure 4.5. So our optimal path is the 1-3-8-9. The corresponding Pheromone table is given
below. The path which we will get by traditional ACO is shown in figure 4.5.
For choosing the optimal path we just have to look at the edges (table block) with a
maximum pheromone concentration starting from sensor 1 (in row 1) till we reach sensor 9. So
from 1st node pheromone concentration is maximum in the 3rd column (3rd column in 1st row)
which is 0.0001059. So edge from 1 to 3 is added. Then from the 3rd sensor (from 3rd row) look
for maximum pheromone value. 8th column value is 0.0001138 which is the maximum. So add
edge from 3 to 8. With the edge 8, the maximum pheromone concentration is 0.001153, so edge
from 8 to 9 is added. By proceeding this way one can find a path. In Figure 4.4 the path with the
maximum pheromone concentration is marked with red colour. This path is OP.
28
Table 7
N 1 2 3 4 5 6 7 8 9
0.00003 0.0001
1
0 53 059 0.000015 0 0 0 0 0
0.0000 0.0000
2
353 0 185 0.0000317 0.0000166 0 0 0 0
0.0001 0.00001
3
059 85 0 0.0000205 0 0 0 0.0001138 0
0.00001
5
0 66 0 0.0000221 0 0.0000227 0.0000216 0 0
0.0001
8
0 0 138 0 0 0 0.0000145 0 0.001153
9 0 0 0 0 0 0 0.000309 0.001153 0
Now on the same network but with the node number 7 (figure 4.6 & 4.7)
29
As a destination node destination node OPI is applied then result are shown in figure 4.6. Figure
4.7 shows result using 4.8.
Table 8
N 1 2 3 4 5 6 7 8 9
1 0.024
0 0.2753 0.0176 0 0 0 0 0
83
2 0.024 0.0179
0.0273 0.0143 0 0 0 0
83 81
3 0.275 0.017
0.0168 0 0 0 0.2777 0
3 9
4 0.017 0.027
0.0168 0 0.0209 0.01636 0 0 0
6 3
5 0.014
0 0 0.0209 0 0.0200 0.0213 0 0
3
6 0 0 0 0.0163 0.0200 0 0.0187 0 0
7 0 0 0 0 0.0213 0.01873 0 0.2737 0.01399
8 0 0 0.2777 0 0 0 0.2737 0 0.01399
9 0 0 0 0 0 0 0.0139 0.0139 0
From node 1 to 7 if we chose the maximum pheromone value then our path becomes 1-3-8-7.
The total path length of this path is 79.
4.5 Conclusion:
Finding the optimal path in dynamically changing resource constrained WSN is
challenging. Our work proposes an approach to identify an OP for communication between SN
to BS. Existing greedy approach is static in providing optimal path. In our computational
approach and communication overhead is reduced as BS takes the responsibility of computation
& OP is calculated based on pheromone concentration. It and contributes to enhance network
life time by proposing an alternative path for communication between BS and SN.
30
5 Target Tracking in WSN
This chapter deals with the problem of tracking single target in the WSN. The SNs which
are deployed in the field of interest sense the moving target. There are measurement uncertainties
in the position sensed by the SN due to environmental noise, multipath propagation of signals. In
such a scenario we have to estimate the trajectory of the target. The target's trajectory can be
linear or nonlinear. If the trajectory is linear and noise is Gaussian then Kalman filter is the very
strong method for tracking the trajectory of the (object) target. But practically many time
trajectories are non linear and noise is non Gaussian. In this scenario Particle Filter PF is very
useful method.
When SN sense the target that event is reported back to the BS as shown in figure 5.2
31
Figure 5.2 event reporting
For reporting the target back to the BS the OPI is used which is already mentioned in the
previous section. Then at BS PF Particle Filter is implemented to estimate the trajectory of the
target.
The goal of this project is to estimate the target's position and velocity at corresponding instance.
Each SN in the network is assumed to be already localized. The target position and velocity is
estimated using the PF & Performance of SN is analyzed. It is assumed that each sensor is
actively contributing to the observation. Performance of the sensor network is analyzed when the
SNs are placed randomly. Each SN role is to decide whether the target is present or absent. This
decision is based on M samples of the received signal. This received signal passes through the
SN in a noisy channel. Hence, the decision made is not always accurate. After making the
decision, the SN transmits a one or a zero depending upon the presence or absence of the target.
This transmission takes place every dt seconds, where dt is the time interval between any two
32
consecutive transmissions. Based on this observed information, the PF estimates the position and
velocity of the target.
(5.1a)
Where:
(5.1b)
A=[ 1 0 dt 0 (5.2 a)
0 1 0 dt
0010
0001]
PF is applied using the above mentioned target model, the important steps in PF is given in the
algorithm. Flowchart in figure 5.3 shows the important steps.
Bayesian approach is very helpful for estimating trajectory using PF. In the Bayesian
approach for dynamic state estimation, one attempts to estimate the state Xk (real position of the
object) with the help of the available measurements Y1, Y2, ..., Yk (Observed position by the SN).
Where Xk, Yk denote the kth instant sample. Let us denote the set of measurements (observation)
that are available up to the time step k as Y1: k = [Y1, Y 2, ..., Y k] and the set of all (real position)
states as X0:k = [X0, X1, ..., Xk]. This is equivalent to constructing the conditional posterior
probability density function PDF p(X0:k|Y1:k) of the state of the based on all available
information, including the receiving measurements . An optimal state can be estimated from the
posterior PDF if a priori distribution function is known.
So probability distribution function is not available and we try to estimate the probability
distribution function p(Xk|X1:k−1). It is assumed that the initial probability distribution function
p(X0|Y0) = p(X0) is available as initial state is known. Y0 implies that there are no measurements
33
at time k = 0. The probability distribution function p(Xk|Y1:k) is obtained recursively. In first
phase prediction is done in the second phase update is done.
Prediction Stage: Let us assume that the probability distribution function p(Xk−1|Yk−1) at time
k − 1 is available. In This stage system model is used to obtain the prior probability distribution
function of the state at time k using the Chapman-Kolmogorov equation
=
(5.3)
Update Stage: In the prediction stage, we use Bayes theorem to compute p(Xk|Y1:k). Thus,
= /
(5.4)
In Equation (5.4), p(Yk|Xk) is called the likelihood function, p(Xk|Y1:k−1) is called
The prior or the prediction density and p(Yk|Y1:k−1) is called the evidence function.
PF assume that we can draw samples from a given probability distribution function. Let us
assume that we can draw N independent and identically distributed samples from the posterior
probability. These samples are called as the particles. Once the N particles are drawn the weight
are assigned to this particles .The weight of the particle is inversely proportional to difference
between particles position and actual location of the object at that instant. wik refers to the weight
of the ith particle at kth instant of time. Once the weight of the all the particle at that instant is
obtained then position of the object can be estimated using the formulae 5.5
= (5.5)
Start
Initialize Particles
Particle Generation
Weight Computation
More Output
Observation
End
The above flow chart shows the important steps of PF. The algorithm below explains the PF.
35
Steps
1. Initialize t: k = 0
2. Sample the particles Xi0= p(X0) for all i ( i = 1, 2, . . . , N)
3. k = k + 1
4. For all i (i = 1, 2, . . . ,N) sample particle Xik = p(Xk|Xik−1) & calculate estimated position
using equation 5.5.
7. Go back to step 3
(5.6)
(5.7)
36
At each iteration re-sampling is done .Weight update equation for each particle is wk = p(Yk/Xk)
Figure 5.4, shows the target tracking scenario using PF.
The performance criterion is the average squared error. In All the simulations performed the
initial state is known. So initial state of the target is known to the PF. One other factor is that in
the case where SNs are randomly distributed, only once random distribution is chosen.
In the experiment 500 sensors are randomly distributed, no of particles in the experiment
are 100. Figure 5.5 explains variation in original trajectory estimated trajectory.
37
We can see from the result shown in the diagram estimated trajectory almost matches the
true one. The squared average error is 0.1704.
The result for the same trajectory but by differently resolving x and y component of
motion is shown in figure 5.6 .The squared average error in x axis direction 4.0161 and the
Squared average error in y axis direction 0.0973. Calculating these components differently
increases the accuracy of the PF. It also makes the analysis of the result simpler.
Figure 5.7 shows true and estimated velocity along the x & y direction. The squared
average error in x axis is 0.1385. The squared average error in y axis is
0.0993. The motion estimation can be done using the PF as well as using the Kalman filter also.
Figure 5.8, 5.9, 5.10 shows some more result for trajectory tracking. From this it is clear
that PF estimate almost perfect trajectory of the object.
38
Figure 5.7 Velocity Estimation (result1)
Comparison of original trajectory and actual in 2d plane. squared average error is 0.2269
39
Figure 5.9 Trajectory tracking (result2)
Squared average error in x axis direction is 6.0757. squared average error in y axis direction
4.9729.
40
Squared average error in x direction velocity is 0.1549.
Squared average error in y direction velocity is 0.1657.
5.5 Conclusion
Accurately estimating the trajectory of the target in the field of interest using the observations
received from SNs is challenging. Improper techniques involved can lead to erroneous estimates
of the locations of target t, at any point of time in the field. Our work uses PF technique to
estimate the trajectory of moving object using the observation collected by the randomly
deployed WSN, the measurement of the SN within specific distance are only considered reliable
WSN for estimation . These reliable nodes increase the tracking accuracy. Simulation results
Show that the error of tracking the trajectory is very small.
Along with trajectory velocity of the moving object is also estimated. The estimates
velocity helps in the resamling process. This finally improves the accuracy of tracking.
The work in this project can be divided into two parts 1. OPI using ACO and 2.Object
Tracking using PF.
In 1st case it is also possible to obtain the multiple paths in WSN between BS and SN
which are optimal and sub optimal. As optimization is done taking into account path length and
number of hops in the path some other factors like energy consumption and traffic on the path
can be also considered.
For trajectory tracking we have only estimated the trajectory travelled by the target, but
using the same technique the next position of the object can be predicted. This information can
be used to alert SN around that position and increasing the accuracy of tracking. It is also
possible to use the sleep scheduling in WSN and save the energy in the WSN but it will
compromise the accuracy of the tracking. In this case also PF can be used to increase the
accuracy of the tracking.
41
6 References:
1. Zheng Yang, Yunho Liu, Xiang-Yang Li “Beyond Trilateration: on the Localizability of
Wireless Ad hock Networks” IEEE Transaction On Network, ACM , VOL 18,NO 6, Dec 2010
2. Andreas Savvides, Heemin Park , Mani Srivastava ”The n-Hop Multilateration Primitive
for Node Localization problems.”Mobile network and application 8, 443-451, 2003
3. Neal Patwari, Joshau N.Ash, Alfred o.Hero, Neir S.Correal “Locating the Nodes
Cooperative localization in wireless sensor networks”IEEE Signal processing magazine July
2005
4. Farah Mourad, Hichem Chehade, Lionel Amodeo “Controlled Mobility sensor Networks
for Target Tracking using Ant Colony Optimization” IEEE Transactions on Mobile
Computing Vol 11,No 8 , Aug 2012
6.Dorigo, M.and Gambardella, L.M., “Ant colony system: A cooperative learning approach
to the traveling salesman problem” IEEE Transactions on Evolutionary Computation,Vo1.1-
1,pp.53-66(1997)
8. Selcuk Okdem and Dervis Karabog “Routing in Wireless Sensor Networks Using an Ant
Colony Optimization (ACO) Router Chip” Sensors 2009, 9, 909-921; doi:10.3390/s90200909
9. Selculk Okdem, Dervis Karaboga ”Routing in sensor network using Ant Colony
Optimization” Proceeding of the first NASA conference on Adaptive Hardware(AH’06) 0-
7695-2614—4/06 2006 IEEE
42
Publication
Aniket. A. Gurav, Manisha. J. Nene “Optimal path Identification using Ant Colony
Optimisation in Wireless Sensor Network” selected for International conference WIMOA
2013 to be held at Delhi will be published in Springers Advances in Intelligent Systems and
Computing book Series.
43