Next Article in Journal
Superpixel Segmentation Based Synthetic Classifications with Clear Boundary Information for a Legged Robot
Previous Article in Journal
Enhancing the Visibility of Delamination during Pulsed Thermography of Carbon Fiber-Reinforced Plates Using a Stacked Autoencoder
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Aspect-Aware Target Detection and Localization by Wireless Sensor Networks

College of Electronic Science, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(9), 2810; https://doi.org/10.3390/s18092810
Submission received: 30 June 2018 / Revised: 13 August 2018 / Accepted: 22 August 2018 / Published: 25 August 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
This paper considers the active detection of a stealth target with aspect dependent reflection (e.g., submarine, aircraft, etc.) using wireless sensor networks (WSNs). When the target is detected, its localization is also of interest. Due to stringent bandwidth and energy constraints, sensor observations are quantized into few-bit data individually and then transmitted to a fusion center (FC), where a generalized likelihood ratio test (GLRT) detector is employed to achieve target detection and maximum likelihood estimation of the target location simultaneously. In this context, we first develop a GLRT detector using one-bit quantized data which is shown to outperform the typical counting rule and the detection scheme based on the scan statistic. We further propose a GLRT detector based on adaptive multi-bit quantization, where the sensor observations are more precisely quantized, and the quantized data can be efficiently transmitted to the FC. The Cramer-Rao lower bound (CRLB) of the estimate of target location is also derived for the GLRT detector. The simulation results show that the proposed GLRT detector with adaptive 2-bit quantization achieves much better performance than the GLRT based on one-bit quantization, at the cost of only a minor increase in communication overhead.

1. Introduction

Recently, wireless sensor networks (WSNs) have received considerable attention due to their applicability to reconnaissance, surveillance, security, and environmental monitoring [1,2]. A typical WSN consists of a large number of low-cost battery-powered devices and usually has very stringent energy and bandwidth constraints [3].
The detection of specific events (targets, transmitters, etc.) is one of the main tasks for a WSN [4]. In a detection system based on WSN, centralized and decentralized frameworks are two typical setups for information transmission from sensors to the fusion center (FC) which is in charge of making the final decision [5]. In a centralized framework, the FC has full knowledge of all sensor observations, which results in optimal performance. However, the centralized setup amounts to instantaneous high-precision communication between sensors and the FC [6], which is impractical for WSNs due to the stringent bandwidth and energy constraints. To address this issue, decentralized schemes that allow sensors to transmit a few condensed information bits to the FC, are of significant interest. For decentralized target detection by a WSN, one of the key problems is how to quantize the sensor observations. Some one-bit quantization [7] and multi-level quantization schemes [8,9] have been studied for decentralized detection. However, these quantization schemes only work under the assumptions of Gaussian noise and a single unknown parameter.
When detecting a non-cooperative target (or signal) with unknown parameters in a WSN, a natural strategy is the so-called counting rule test, namely, the FC counts the number of local on-off detections and compares it with a threshold [10]. The generalized likelihood ratio test (GLRT) detector, which is obtained by substituting the unknown parameters with their maximum likelihood estimates (MLEs), is also commonly employed at the FC to make a final decision [11]. A GLRT detector based on one-bit quantized data was studied in refs. [7,12] to detect (i) an unknown scalar deterministic signal, and (ii) a random Gaussian signal with an unknown variance. GLRT and its computationally simpler alternatives were considered in [13,14,15,16,17] to detect a non-cooperative target with spatially dependent emission. In particular, GLRT fusion was derived in the context of detecting a target emitting a known signal at an unknown location [13], and detecting an unknown transmitter with an unknown location [14]. In the latter case, a complicated grid search on both the target location and emitted power domains may be required for implementation. To reduce the computational complexity, a generalized Rao test was developed in ref. [15]. Different from refs. [13,14,15] that treated the target emission as a deterministic signal, the emitted signal was presumed to be unknown and fluctuating in refs. [16,17], where generalized forms of locally optimum detectors were proposed as computationally simpler alternatives to the GLRT. While these works dealt with targets that emit or reflect a isotropic signal, the detection of a target with aspect dependent reflection is still under study.
A few works have addressed the localization [18,19] or detection [20] of a target with aspect dependent reflection in a WSN. More specifically, a model accounting for the aspect dependence of the reflected signal from a underwater target was utilized for the MLE of a submarine’s location in ref. [18]. In ref. [19], a scenario involving the location of low-visibility ground or air targets using multiple unmanned autonomous vehicles and a large number of distributed sensors, was considered. Later, in ref. [20], Song et al., studied the underwater target detection with a barrier sensor network. There, the aspect and distance dependence of the acoustic reflection signal of underwater targets were considered, and binary local decisions were fused in the FC via scan statistic to form a global decision. However, such a scan statistic-based detection schemes have obvious limitations, namely, numerous sensors are required to make a reliable decision, and target localization can not be achieved.
In this paper, we consider the detection and localization of a target with aspect dependent reflection. The detection and localization tasks are accomplished by the GLRT detector, where the MLE of target location is given as a by-product of the GLRT once the target is detected. The main contributions can be summarized as follows:
  • A GLRT detector based on one-bit quantized data is developed. If the target is detected, the MLE of the target location is given as a by-product of the GLRT detector. The differential evolution (DE) algorithm is introduced to solve the MLE. It is shown that the GLRT detector with one-bit quantization outperforms the existing detection scheme based on scan statistic [20].
  • A GLRT detector based on adaptive multi-bit quantization is proposed to further improve the detection and localization performance. The proposed adaptive quantizer achieves higher quantization precision; meanwhile, its yielding data has a greatly reduced communication burden compared with the typical multi-bit quantization scheme. The Cramer–Rao lower bound (CRLB) of the MLE is also derived.
The rest of this paper is organized as follows. In Section 2, we briefly introduce the active target detection and localization model where the reflected signal of the target is aspect and distance dependent. Then, the GLRT detector based on one-bit quantized data is studied in Section 3. In Section 4, we propose a GLRT detector based on adaptive multi-bit quantization, together with its CRLB derivation and communication overhead analysis. Numerical results and comparisons are provided in Section 5. Finally, Section 6 concludes the paper.

2. Problem Statement

Consider an active detection system that consists of an active source, K passive sensors, and an FC. As illustrated in Figure 1, the source first sends out a probing signal to the surveillance area for target detection as well as to all the sensors to activate them from sleep mode. If a target exists, the reflected signal from the target is concentrated within a narrow angle. In addition to such an aspect dependence, the reflected signal is also distance dependent due to free-space attenuation. The observed information is then transmitted from sensors to the FC where the global decision is made.

2.1. Observing the Reflected Signal at Sensors

Since the waveform of the probing signal is known to sensors, a matched filter can be applied to preprocess the received signal, thus yielding the observation r k , where k = 1 , 2 , , K is the sensor index. Assume that sensor noises are independent and identically distributed zero-mean complex Gaussian variables with a variance of σ 2 . In the absence of a target ( H 0 ), r k is exponentially distributed, and has a probability density function (pdf) of [20,21]
f 0 k ( r k ) = 1 2 η σ 2 exp r k 2 η σ 2 ,
where η is the known waveform energy. In the presence of a target ( H 1 ), the received signal at the sensors is a combination of the reflected signal and the noise. The energy of the reflected signal depends on the sensor–target geometry and the target aspect, which is parameterized by ϵ k . Assuming a Rayleigh fading signal model, the pdf of r k can be written as [20,21]
f 1 k ( r k ) = 1 2 η σ 2 + 2 η ϵ k 2 exp r k 2 η σ 2 + 2 η ϵ k 2 1 2 η σ 2 ( 1 + ρ k ) exp r k 2 η σ 2 ( 1 + ρ k ) ,
where the definition ρ k η ϵ k 2 σ 2 is employed. In accordance with refs. [18,19,20], ρ k is specified by
ρ k = C 0 g 1 ( d k ) g 2 ( α k , φ ) ,
where C 0 is a constant, g 1 ( · ) specifies the power loss caused by the propagation distance, and g 2 ( · ) describes the aspect dependence of the reflected signal. More specifically, d k denotes the propagation distance of the signal from the source to the k-th sensor via target reflection, i.e.,
d k = ( x X s ) 2 + ( y Y s ) 2 + ( x X k ) 2 + ( y Y k ) 2 ,
with ( x , y ) , ( X s , Y s ) and ( X k , Y k ) being locations of the target, the active source, and the k-th sensor, respectively; α k is the angle from the k-th sensor to the target:
α k = arctan x X k y Y k ,
and φ is the principal reflection angle of the target which implies the aspect dependence of the target reflection.
Next, we define the attenuation funtion ( g 1 ( d k ) ) and the aspect dependence ( g 2 ( α k , φ ) ). Assuming free-space attenuation, we have [19]
g 1 ( d k ) = ( d k ) β ,
where β = 1 corresponds to cylindrical spreading, β = 2 is spherical spreading, and sometimes, larger values of β are used to model loss due to shadowing, e.g., β = 3.5 . In this work, we set β = 1 , and the corresponding development can be easily extended to other types of attenuation.
On the other hand, the aspect dependent reflection gain is modeled by the following Butterworth filter [18,19,20]:
g 2 ( α k , φ ) = 1 1 + α k φ Φ 2 Ω ,
where Ω denotes the filter order, and 2 Φ is the 3 dB bandwidth. Although the exact function ( g 2 ( · ) ) might be different from (7) under specific circumstances, the following analysis can be similarly performed for other aspect dependent reflection models as long as its closed-form expression is available.
In the following analysis, we assume perfect knowledge of the model parameters σ 2 , C 0 , Φ and Ω . In practice, these values could be estimated based on training data. In addition, sensor positions are assumed to be known to the FC, since they can be estimated periodically during network maintenance (see, e.g., refs. [22,23], and references therein). However, under hypothesis H 1 , the target’s position ( ( x , y ) ) and the principal reflection angle ( φ ) remain unknown.

2.2. Data Transmission and Global Decision Making

After making observations, the sensors send their local information to the FC which makes a final decision on whether the target exists or not. To meet the stringent energy and bandwidth constraints in WSNs, sensor measurements are usually quantized into few-bit data individually before transmission. The design of a quantizer is one of the focuses of this work.
At the FC, a composite binary hypothesis testing problem is addressed due to the unknown target parameters. GLRT solutions, which achieve target detection and localization simultaneously, are also of interest here.

3. Target Detection and Localization by GLRT Utilizing One-Bit Quantized Data

We start with the scenario where sensors only transmit one-bit of information to the FC. Faced with a composite hypothesis testing problem, the FC employs the GLRT approach which is obtained by substituting the unknown parameters with their MLEs into a general likelihood ratio test. The DE algorithm is employed to solve the MLE of unknown target parameters since no closed-form solutions are available for the MLE. The CRLB of the MLE is also given for evaluation of the target localization performance.

3.1. Derivation of GLRT Detector

The optimal one-bit quantization at each sensor is known to be a thresholding rule of the likelihood ratio [15]. However, it is impractical to compute the likelihood ratio at each sensor due to the unknown target parameters. A natural one-bit quantization strategy is to compare each sensor’s observation with a preset threshold Δ [18,20], which produces the output { b k } k = 1 K as follows:
b k = { 1 , if r k Δ , 0 , otherwise , , k = 1 , 2 , , K .
We first derive the distribution of the quantizer output, { b k } k = 1 K . In accordance with refs. (1) and (2), the probabilities that b k takes a value of 1 under hypotheses H 0 and H 1 are respectively given by
P 0 Pr ( b k = 1 | H 0 ) = 0 Δ f 0 k ( r k ) d r k = exp Δ 2 η σ 2 ,
and
P 1 , θ k Pr ( b k = 1 | H 1 ) = 0 Δ f 1 , θ k ( r k ) d r k = exp Δ 2 η σ 2 ( 1 + ρ θ k ) ,
where θ denotes the vector of all unknown parameters, i.e., θ [ x , y , φ ] , and f 1 , θ k ( r k ) is the pdf of the received signal under H 1 with specific θ . Also, ρ 1 , θ k is the value of ρ k with a given θ . Using the notations P 0 and P 1 , θ k , the probability mass functions (pmfs) of b k under hypotheses H 0 and H 1 are given as follows, respectively:
h 0 k ( b k ) = ( P 0 ) b k ( 1 P 0 ) 1 b k ,
and
h 1 , θ k ( b k ) = P 1 , θ k b k 1 P 1 , θ k 1 b k .
Assuming that all the binary data b [ b 1 , b 2 , , b K ] can be received by the FC without errors, the FC is faced with the following composite binary hypothesis testing problem:
{ H 0 : b k h 0 k ( b k ) , k = 1 , 2 , , K , H 1 : b k h 1 , θ k ( b k ) , k = 1 , 2 , , K ,
where ∼ denotes “distributed according to”. A natural approach to solve the composite hypothesis testing problem above is to replace the unknown parameters with their MLEs [11], which yields the GLRT detector,
T ˜ ( b ) log max θ k = 1 K h 1 , θ k ( b k ) k = 1 K h 0 k ( b k ) H 0 H 1 λ ,
where λ is a prescribed decision threshold to satisfy certain error probabilities. After substituting (11) and (12) into (14), the generalized log-likelihood ratio (GLLR) T ˜ ( b ) can be written as:
T ˜ ( b ) = max θ k = 1 K log h 1 , θ k ( b k ) k = 1 K log h 0 k ( b k ) = k = 1 K b k log P 1 , θ ˜ k P 0 + ( 1 b k ) log 1 P 1 , θ ˜ k 1 P 0 .
In ref. (15), θ ˜ denotes the MLE of the unknown parameter vector θ , which is obtained by maximizing the log-likelihood function of θ , i.e.,
θ ˜ = arg max θ L ˜ b ( θ ) ,
where
L ˜ b ( θ ) = k = 1 K b k log P 1 , θ k + ( 1 b k ) log ( 1 P 1 , θ k ) .
Clearly, if a target is detected, θ ˜ provides the desired estimation of the target location.

3.2. Solve the MLE with the Differential Evolution Algorithm

Note that no closed-form solution can be found for (16) due to the complicated objective function. Conventional optimization methods, such as the gradient decent method, to a great extent, rely on the assumption of the objective function’s characteristics (e.g., concavity, convexity, and monotonicity). However, it is difficult to check the concavity of the objective function in (17). Furthermore, it is a subtle task to tune the parameters of conventional optimization methods for high-quality solutions. On the other hand, the DE algorithm [24] addresses these issues properly. Thus, we resort to the DE algorithm to solve (16).
The DE algorithm imitates the biological evolution and can generate a good solution that maximizes (or minimizes) the objective function via the iterative process of reproduction and selection [25]. Specifically, the DE first randomly initializes the population to cover the entire search space uniformly. The individuals of the population are then perturbed and combined by applying mutation and crossover operators to produce new candidates. The better individuals among the current population and the newly produced candidates are selected, constituting the next generation. The mutation, crossover, and selection procedures are repeated until the stopping criterion is satisfied. Then, the best individual among the last generation is chosen as the final solution.
In this work, the detailed steps used to solve the MLE by the DE algorithm were as follows. First, given the size of the population ( N p ), the scalar number (F), the crossover rate ( C r ), the maximum number of generations ( G max ), the maximum bounds of the parameters were θ max = [ x max , y max , φ max ] and the minimum bounds were θ min = [ x min , y min , φ min ] .
  • Initialization. The generation number was set to G = 0 and N p individuals were randomly initialized with their goal vectors ( θ i , G = [ θ 1 , i , G , θ 2 , i , G , θ 3 , i , G ] ) uniformly drawn from the search space ( θ min , θ max ) , where i = 1 , 2 , , N p .
  • Generation Evolution. While the current generation count ( G < G max ) was occurring, Steps 2.1–2.3 were performed for each individual i, and then G = G + 1 was set.
    Step 2.1: Mutation. Create a donor vector ϑ i , G = [ ϑ 1 , i , G , ϑ 2 , i , G , ϑ 3 , i , G ] for the i-th goal vector following the differential mutation scheme:
    ϑ i , G = θ γ 1 i , G + F ( θ γ 2 i , G θ γ 3 i , G ) .
    The indices γ 1 i , γ 2 i , and γ 3 i are different integers randomly chosen from { 1 , 2 , , N p } , which are also different from the current goal vector index (i).
    Step 2.2: Crossover. On the basis of goal vector θ i , G and donor vector ϑ i , G , generate a trial vector μ i , G = [ μ 1 , i , G , μ 2 , i , G , μ 3 , i , G ] by performing the following crossover operation on each of the three components:
    μ j , i , G = { ϑ j , i , G if ( rand i , j C r or j = j rand ) , θ j , i , G otherwise , , j = 1 , 2 , 3 ,
    where rand i , j is a uniformly distributed random number within ( 0 , 1 ) , and j rand { 1 , 2 , 3 } is a randomly chosen index ensuring that μ i , G gets at least one component from ϑ i , G .
    Step 2.3: Selection. Determine whether the goal vector θ i , G or the trial vector μ i , G survives to the next generation by comparing their objective function values, which are respectively calculated by substituting θ i , G and μ i , G into (17), i.e.,
    θ i , G + 1 = { μ i , G if L ^ b ( μ i , G ) L ^ b ( θ i , G ) , θ i , G otherwise .
  • Termination. The iteration in Step 2 stops at the G max -th generation. Among the N p goal vectors of the G max -th generation, the goal vector that yields the largest objective function value is chosen as the final solution.
We note that the runtime-complexity of solving the MLE by the DE method is O ( 3 · N p · G max ) , since, in each generation of the DE, a loop over N p is performed, containing a loop over the three components of θ in the mutation and crossover operations.

3.3. Discussion

It is well known that false alarm probability and detection probability are performance indicators of any given detection rule and are defined as
P f a = Pr { T ˜ ( b ) λ | H 0 } , and P d = Pr { T ˜ ( b ) λ | H 1 } .
However, P f a and P d cannot be analytically derived since the conditional pdfs of P ( T ˜ ( b ) | H 0 ) , and P ( T ˜ ( b ) | H 1 ) are unavailable. Nevertheless, the simulation results under target absence hypothesis may help the designer choose a threshold ( λ ) to form a constant false alarm rate detector. P d is also evaluated by simulations, which is acceptable since P d is target dependent in any case.
If a target is detected, θ ˜ provides the MLEs of the target location and the principal reflection angle. The theoretical performance limits of the MLEs are given by the CRLB matrix. It is worth mentioning that the CRLB of the MLE was derived for underwater target localization in ref. [18], and that analysis is also applicable here. Therefore, the Fisher information matrix (FIM), which is employed to characterize the CRLB, is a 3 × 3 matrix with the i , j -th element given by ref. [18]
I ˜ i , j = k = 1 K Δ 2 P 1 , θ k 4 η 2 σ 4 ( 1 + ρ θ k ) 4 1 P 1 , θ k ρ θ k θ i ρ θ k θ j .
Taking the inverse of I ˜ leads to the CRLB matrix I ˜ 1 , and the diagonal entries of I ˜ 1 specify the lower bounds on the estimation accuracy of the corresponding parameters.
In (22), the first-order partial derivative of ρ θ k is calculated as
ρ θ k θ i = ρ θ k g 1 d k d k θ i + 2 Ω Φ 2 Ω α k φ 2 Ω 1 g 2 α k , φ α k θ i φ θ i ,
and ρ θ k θ j can be readily obtained with similar steps. As θ i , θ j { x , y , φ } , the partial derivatives required in (23) are derived from (4) and (5), i.e.,
d k x = x X s x X s 2 + y Y s 2 + x X k x X k 2 + y Y k 2 , d k y = y Y s x X s 2 + y Y s 2 + y Y k x X k 2 + y Y k 2 , d k φ = 0 ,
α k x = Y k y x X k 2 + y Y k 2 , α k y = x X k x X k 2 + y Y k 2 , α k φ = 0 ,
and
φ x = 0 , φ y = 0 , φ φ = 1 .
Though the GLRT based on one-bit quantized data is easy to implement with only one-bit communication required between sensors and the FC, it suffers severe information loss during observation quantization at sensors which may lead to an unacceptable performance at low signal-noise-ratios (SNRs). To mitigate this degradation, we propose the GLRT detector which employs multi-bit quantization on sensor observations.

4. Target Detection and Localization by GLRT Employing an Adaptive Multi-Bit Quantizer

In this section, we consider a GLRT detector based on multi-bit quantization where sensor observations are uniformly quantized. Considering the aspect dependence of the target reflection, an adaptive multi-bit quantizer is proposed to efficiently transmit the observed information from sensors to the FC. Then, the GLRT based on adaptive multi-bit quantization is derived for target detection and localization. Additionally, the CRLB matrix of the MLE is also derived.

4.1. Adaptive Multi-Bit Quantization

The optimal multi-bit (or multi-level) quantizer design has been widely studied where the main challenge is the high computational complexity as the design of a multi-level quantizer often involves a nonlinear, multi-dimensional search process [9]. Due to the lack of knowledge of the target parameters, it seems impossible to optimize the quantization strategy. Therefore, it is natural to uniformly quantize the sensor observations, and to employ the same quantization thresholds among all of the sensors.
The typical Q-bit uniform quantization scheme quantizes the observations into one of the M 2 Q quantization levels as follows:
m k = 0 , 0 < r k < Γ , 1 , Γ r k < 2 Γ , M 1 , ( M 1 ) Γ r k < , , k = 1 , 2 , , K ,
where m k denotes the quantizer output of the k-th sensor, and Γ is the quantization parameter. Then, the quantized data ( m k ) is encoded into a binary codeword with fixed number of bits (i.e., Q bits) according to a certain encoding rule, before being transmitted to the FC.
In the aspect dependent target reflection model, much of the reflected energy from the target will be concentrated within a particular conical angle (cf. Figure 1). Therefore, when the target is present, only a few sensors located in a certain zone can receive the reflected waves and hence, have relative larger valued observations, while the other sensors merely observe noises with probably small values. On the other hand, it is known from refs. (1) and (2) that the probability of the sensor observation taking a specific value decreases rapidly with a growing r k under both H 0 and H 1 . Consequently, we can conclude that only those rarely occurring but relatively large valued { r k } s, and hence, large quantizer outputs ( { m k } s) contain information about the target. To strike a balance between using less bits to quantize most of the observations containing probably small valued noise and using more bits to represent those rare but relatively large valued observations containing valuable knowledge about the target, we propose the following adaptive Q-bit quantization scheme which quantizes the sensor observations into one of the L 2 Q + 1 2 quantization levels, i.e.,
m k = 0 , 0 < r k < Λ , 1 , Λ r k < 2 Λ , L 1 , ( L 1 ) Λ r k < , , k = 1 , 2 , , K ,
where Λ denotes the quantization parameter of the proposed quantizer. Correspondingly, the quantizer output m k is adaptively encoded into binary codeword w k following the encoding scheme shown in Table 1. The design philosophy of the proposed encoding scheme is described as follows. Different from the conventional encoding scheme that employs fixed number of bits to encode the quantized message, here, the codeword length of w k , denoted by q k , is determined by the value of m k . More specifically, shorter codeword lengths are used to represent smaller m k s that have larger occurring probabilities, while longer codeword lengths are employed to represent rarely occurring but larger valued m k s. In this encoding manner, each sensor can efficiently transmit its quantized data to the FC, which is important to the WSNs with strictly constrained bandwidths and energy levels. Recall that the number of quantization levels in the typical Q-bit quantization scheme is M = 2 Q , while our proposed adaptive Q-bit quantizer has more quantization levels available, i.e., L 2 Q + 1 2 . Thus, the proposed quantization scheme achieves much more precise quantization than the typical quantizer, which is another benefit of the proposed scheme.
Note that the choice of the quantization parameter Λ for the proposed quantizer should affect the final detection and localization performance. However, the optimization of parameter Λ is a impermissible task due to the unavailability of target parameters. Nevertheless, we set Λ to be the same as the quantization threshold in the one-bit quantization case described in Section 3, i.e., set Λ = Δ to gain insight into the performance of the detector employing the proposed adaptive quantizer as well as to make a relatively fair comparison with the one-bit quantization-based GLRT.
To be specific, the resulting communication overhead of the proposed adaptive Q-bit quantizer is quantitatively analyzed as follows. Denote the expected total number of bits required to be transmitted to the FC under hypotheses H 1 and H 0 as N 1 , θ and N 0 , respectively. For the proposed quantizer, the pmf of codeword length q k under hypothesis H 1 is given by
χ 1 , θ ( q k ) Pr ( q k | H 1 ) = { ( 2 q k 2 ) Δ ( 2 q k + 1 2 ) Δ f 1 , θ k ( r k ) d r k = ( P 1 , θ k ) ( 2 q k 2 ) ( P 1 , θ k ) ( 2 q k + 1 2 ) , 1 q k < Q , ( 2 q k 2 ) Δ f 1 , θ k ( r k ) d r k = ( P 1 , θ k ) ( 2 q k 2 ) , q k = Q ,
where the notation P 1 , θ k defined in (10) is employed. The corresponding expectation of total number of bits under transmission is then calculated as
N 1 , θ = k = 1 K q k = 1 Q q k · χ 1 , θ ( q k ) = k = 1 K q k = 1 Q exp ( 2 q k 2 ) Δ 2 η σ 2 ( 1 + ρ θ k ) .
Similarly, the expected communication overhead between sensors and the FC under hypothesis H 0 can be derived as
N 0 = k = 1 K q k = 1 Q exp ( 2 q k 2 ) Δ 2 η σ 2 .
Compared with the typical Q-bit quantization scheme in ref. (27) that has the expected communication overhead between sensors and the FC fixed as Q · K , the proposed adaptive multi-bit quantization scheme greatly reduces the expected communication overhead under both H 1 and H 0 . Moreover, the expected communication overhead of the proposed quantization scheme increases slowly with a growing Q, while the expected communication overhead of the typical multi-bit quantization increases proportionally to Q. More specifically, it is shown later by simulation that the adaptive 2- or 3-bit quantizer only incurs a fractional increase of communication overhead compared with the one-bit quantizer in Section 3, and this minor compromise brings substantial performance gain.
It is worth mentioning that the encoded data { w k } k = 1 K with variable codeword length may increase the complexity of data reception at the FC. Nevertheless, we assume that the binary codewords { w k } k = 1 K can be received without errors, with the help of symbol synchronization (e.g., [26]).

4.2. Derivation of GLRT Detector

Assume that the encoded data { w k } k = 1 K can be transmitted to the FC reliably. Then, the FC is responsible for making a global decision based on the recovered messages { m k } k = 1 K .
For the proposed adaptive Q-bit quantization scheme, the probability that the output data ( m k ) takes the specific value l under hypothesis H 1 can be calculated as
U 1 , θ k , l Pr ( m k = l | H 1 ) = P 1 , θ k l P 1 , θ k l + 1 , 0 l < L 1 , P 1 , θ k l , l = L 1 .
Correspondingly, the pmf of message ( m k ) under H 1 is
s 1 , θ k ( m k ) = l = 1 L 1 U 1 , θ k , l δ ( m k l ) ,
where δ ( · ) denotes the Dirac function. Similarly, the probability that m k takes the value l under H 0 is given by
U 0 k , l Pr ( m k = l | H 0 ) = P 0 k l P 0 k l + 1 , 0 l < L 1 , P 0 k l , l = L 1 ,
where the notation P 0 defined in (9) is employed. The corresponding pmf of m k under H 0 can be written as
s 0 k ( m k ) = l = 1 L 1 U 0 k , l δ ( m k l ) .
On the basis of the received data, m [ m 1 , m 2 , , m K ] , the FC is faced to tackle the following composite hypothesis testing problem.
{ H 0 : m k s 0 k ( m k ) , k = 1 , 2 , , K , H 1 : m k s 1 , θ k ( m k ) , k = 1 , 2 , , K .
Accordingly, the GLRT should be employed to simultaneously reach a final decision and give the target location estimation once it is detected. Similar to ref. (16), the MLE of θ is given by
θ ¯ arg max θ k = 1 K s 1 , θ k ( m k ) = arg max θ k = 1 K l = 0 L 1 δ ( m k l ) log U 1 , θ k , l ,
which can also be solved by the DE algorithm. The corresponding GLLR is then computed as
T ¯ ( m ) = log max θ k = 1 K s 1 , θ ( m k ) k = 1 K s 0 k ( m k ) = k = 1 K l = 0 L 1 δ ( m k l ) log U 1 , θ ¯ k , l U 0 k , l .
The final decision is easily made by comparing the GLLR with a predetermined threshold.

4.3. Discussion and Derivation of the Cramer–Rao Lower Bound

The global false alarm and detection probability of the GLRT detector based on adaptive multi-bit quantization have similar definitions as in ref. (21); however, neither of these two performance indicators can be analytically derived since the conditional probability density functions of P ( T ¯ ( m ) | H 0 ) and P ( T ¯ ( m ) | H 1 ) are not available. The simulation results under hypothesis H 0 help to find global decision thresholds for the detector, following a constant false alarm probability setup. Later, in Section 5, we present simulation results to reveal the detection performance of the proposed GLRT detector. On the other hand, if the target is detected, the CRLB matrix of the MLEs of target parameters is derived to evaluate the target localization performance.
Denote I ¯ as the FIM for θ under the adaptive multi-bit quantization scheme which is derived as follows to characterize the CRLB matrix. According to ref. (37), the log-likelihood function of θ can be written as
L ¯ m ( θ ) = log k = 1 K s 1 , θ k ( m k ) = k = 1 K l = 0 L 1 δ ( m k l ) log U 1 , θ k , l .
Taking the second-order partial derivative of (39) with respect to θ i and θ j , we obtain
2 L ¯ m ( θ ) θ i θ j = k = 1 K l = 0 L 1 δ ( m k l ) U 1 , θ k , l 2 U 1 , θ k , l θ i U 1 , θ k , l θ j + δ ( m k l ) U 1 , θ k , l 2 U 1 , θ k , l θ i θ j ,
where θ i , θ j { x , y , φ } . The first-order partial derivative of P 1 , θ k required in (40) is written as
U 1 , θ k , l θ i = { l P 1 , θ k l 1 ( l + 1 ) P 1 , θ k l P 1 , θ k θ i , 0 l < L 1 , l P 1 , θ k l 1 P 1 , θ k θ i , l = L 1 ,
and the second-order partial derivative of P 1 , θ k can be computed as
2 U 1 , θ k , l θ i θ j = l ( l 1 ) P 1 , θ k l 2 l ( l + 1 ) P 1 , θ k l 1 P 1 , θ k θ i P 1 , θ k θ j + l P 1 , θ k l 1 ( l + 1 ) P 1 , θ k l 2 P 1 , θ k θ i θ j , 0 l < L 1 , l ( l 1 ) [ P 1 , θ k l 2 ] P 1 , θ k θ i P 1 , θ k θ j + l P 1 , θ k l 1 2 P 1 , θ k θ i θ j , l = L 1 ,
where P 1 , θ k θ i = Δ P 1 , θ k 2 η σ 2 ( 1 + ρ θ k ) 2 ρ θ k θ i .
Note that E 1 , θ [ δ ( m k l ) ] = U 1 , θ k , l and l = 0 L 1 2 U 1 , θ k , l θ i θ j = 0 . The i , j -th element of the FIM is then obtained by taking the negative expectation of (40) with respect to m k , i.e.,
I ¯ i , j = E 1 , θ 2 L ¯ m ( θ ) θ i θ j = k = 1 K Δ 2 P 1 , θ k 1 ( P 1 , θ k ) L 1 4 η 2 σ 4 ( 1 + ρ θ k ) 4 1 P 1 , θ k 2 ρ θ k θ i ρ θ k θ j .
The CRLB matrix is then I ¯ 1 . Recalling that P 1 , θ k < 1 and L = 2 Q + 1 2 , it can be expected that the term 1 ( P 1 , θ k ) L 1 in (43) will quickly approach 1 with a growing number of quantization bits (Q). Therefore, it is enough to use a small number of bits (e.g., 2 or 3 bits) for quantization of the sensor observations in terms of closely achieving the localization performance when L = . A further increase in the number of quantization bits brings negligible gain in the localization performance, except for adding a communication burden.
Note that the FIM for the GLRT employing the adaptive multi-bit quantizer (i.e., ref. (43)), as well as the FIM for the GLRT based on one-bit quantized data (i.e., ref. (22)), is a summation of K components. The contributions of the k-th sensor to the ( i , j ) -th element of the FIM are denoted as I ¯ i , j k and I ˜ i , j k for the GLRT detectors based on multi-bit and one-bit quantized data, respectively, i.e.,
I ¯ i , j k Δ 2 P 1 , θ k 1 ( P 1 , θ k ) L 1 4 η 2 σ 4 ( 1 + ρ θ k ) 4 1 P 1 , θ k 2 ρ θ k θ i ρ θ k θ j , I ˜ i , j k Δ 2 P 1 , θ k 4 η 2 σ 4 ( 1 + ρ θ k ) 4 1 P 1 , θ k ρ θ k θ i ρ θ k θ j .
Consequently, we have the ratio
I ¯ i , j k I ˜ i , j k = 1 ( P 1 , θ k ) L 1 1 P 1 , θ k 1 .
This result agrees with our intuition whereby the GLRT employing the multi-bit quantizer obtains more precise information from sensors, compared with that based on one-bit quantized data. Specifically, the information gain at the k-th sensor is determined by the term 1 ( P 1 , θ k ) L 1 1 P 1 , θ k .

5. Simulation Results

In this section, we provide simulation results to demonstrate the performance of our proposed GLRT detectors under different settings. The simulations were carried out on a core i5-8250U 3.4 GHz personal computer using MATLAB software. Following refs. [18,20], an active source was assumed to be located at ( 0 , 0 ) , and η = 1 , σ 2 = 1 , Δ = 5.9915 was set (thus giving rise to P 0 = 0.05 ). Also, the beampattern parameters of the reflection model were assumed to be Ω = 4 and Φ = 5 π / 180 . The constant C 0 was defined through C 0 = γ ref · SNR , such that the specified SNR was achieved at the reference distance γ ref . In our tests, we set γ ref = 1600 . The sensors were deployed within the area { ( X , Y ) | 1200 X 1200 ,   0 Y 240 } . Note that although our proposed method works for any sensor deployment pattern as long as sensor locations are known, we assumed uniformly deployed sensors here for simplicity. Specifically, sensors were deployed on the grids of { ( X k , Y k ) | X k = a x · D min , Y k = a y · D min } , where a x , a y are integers, and D min is the minimum distance between sensors. The experiment time for Monte Carlo (MC) simulations is 10 6 . Note that the exact detection and localization performance may be target dependent. Nevertheless, we assumed a target located at ( 0 , 800 ) with the principal reflection angle being φ = π / 6 (or 30°), to gain insight into the performance of the proposed schemes.
As mentioned before, the solutions of the MLEs in refs. (16) and (37) used the DE algorithm. The corresponding parameters were set as follows. The population size was N p = 24 , the maximal generation number was G max = 60 , the scalar number was F = 0.5 , and the crossover rate was C r = 0.9 . Additionally, the upper and lower bounds for searching the target parameters θ were set as θ max = [ 1000 , 1300 , π 4 ] and θ min = [ 1000 , 300 , π 4 ] , respectively.

5.1. Detection Performance Evaluation

We first examined the detection performance of the GLRT based on one-bit quantized data and the GLRT detector employing multi-bit adaptive quantizer under different sensor deployments. Two uniformly deployed sensor fields were considered: (a) a sensor field with D min = 120 , and thus 10 a x 10 , 0 a y 2 , with K = 63 sensors; amd (b) a sensor field with D min = 80 , and thus 15 a x 15 , 0 a y 3 , and K = 124 .
Figure 2 illustrates the receiver operating characteristic (ROC) curves of the proposed GLRT detectors either based on one-bit or adaptive multi-bit quantization under the assumed sensor deployments. The ROC curve of the typical counting rule test based on one-bit data from sensors [10] and that of the decentralized detection scheme proposed in ref. [20], which employs the scan statistic (SS) to fuse the one-bit quantized sensor measurements as well as the ROC curves of the GLRT detectors using typical multi-bit quantizers, are also given for comparison. For the scan statistic-based scheme, its scanning window length is set at 7. Correspondingly, Table 2 shows the expected communication overhead between sensors and the FC for the detectors mentioned above.
We can observe from Figure 2 that the GLRT detectors greatly outperform the existing scan statistic-based scheme and the counting rule test, even with one-bit quantization; this is because more prior knowledge about the target reflection model and the sensor locations is utilized by the GLRT detectors. By combining Figure 2 and Table 2, it is found that the GLRT based on adaptive 2-bit quantization achieves better performance than the GLRT employing the typical 2-bit quantizer at low false alarm probabilities; meanwhile, the communication overhead of the former is significantly reduced. Also, similar phenomenons can be observed for the GLRT detectors either based on adaptive 3-bit quantization or typical 3-bit quantization. These results can be explained as follows. Compared with the typical quantizer with the same number of quantization bits, the adaptive quantizer achieves more precise quantization since it has more quantization levels available; meanwhile, the adaptive quantizer encodes the quantized data into binary codewords more smartly, in the sense of using short codeword lengths to represent the quantized data that have small values but frequently appear. It is also viewed from Figure 2 that the GLRT detectors with 3-bit quantization bring in negligible gain in the detection performance, compared with the adaptive 2-bit quantization-based GLRT. Thus, it is enough to use a small number of bits to quantize sensor observations.
Table 3 specifies the computational time of the above-mentioned detectors with a given deciding threshold (e.g., 8). It is found that the computational time of the scan statistic-based detection scheme is slightly longer than that of the counting test rule, and both of them are significantly shorter than the computational time of all the GLRT detectors. This is because that the GLRT detectors are required to solve the MLE of target parameters and have more complicated expressions for test statistics.
We then tested the detection performance and the communication overhead of the proposed GLRT detectors under different SNR conditions. The sensor field with 4 rows and 31 columns of sensors (i.e., D min = 80 ) was employed. Figure 3 shows the detection probability as a function of reflected signal’s SNR when the false alarm probability is fixed; correspondingly, Table 4 gives the expected communication overheads of the detectors.
Figure 3 again verifies the behaviors for which the GLRT detector with one-bit quantization outperforms the existing scan statistic-based scheme, and the GLRT employing adaptive 2-bit quantizer achieves better detection performance than the GLRT using a typical 2-bit quantizer, especially at low SNRs. It is noticed from Table 4 that the expected communication overhead of the adaptive 2-bit quantization scheme under H 1 increases with growing SNR, which agrees with our intuition that more encoded data exists with long codeword lengths at higher SNRs. Nevertheless, the communication burden of the GLRT employing the proposed adaptive 2-bit quantization is still much lower than that using a typical 2-bit quantizer. By combining Figure 3 and Table 4, it is found that the proposed 2-bit quantizer only incurs a fractional increase of communication overhead, compared with the one-bit quantization scheme. Moreover, this minor compromise brings substantial performance gain.

5.2. Localization Performance Evaluation

In this subsection, we are interested in the target localization performance of the proposed GLRT detectors. Similar to ref. [18], the root-mean-square-error (RMSE) is used as the localization performance metric. The definition of RMSE is given by
RMSE E x ˜ x 2 + y ˜ y 2 ,
where ( x ˜ , y ˜ ) is the MLE of the target location. The lower bounds of the RMSE for different GLRT detectors are then specified by their CRLB matrixes. Specifically, I ˜ 1 1 , 1 + I ˜ 1 2 , 2 gives the lower bound of the RMSE for one-bit quantization based GLRT, and the lower bounds of the RMSE for the GLRT detectors based on 2-bit quantization can be obtained similarly.
Figure 4 illustrates the RMSE of the MLE of target location under different SNR conditions. Solid lines are the results of MC experiments; dashed lines are the CRLBs calculated according to the derived expressions (cf. (22) and (43)). It is known from Figure 4 that the RMSEs of MC experiments do not reach their CRLBs. The reason for this is that the MLE is asymptotically efficient when a sufficiently large number of samples are available. While for the aspect dependent target reflection model discussed here, only a few sensor observations are utilized for the maximum likelihood estimation, since the power of the reflected signal is concentrated within a narrow conical angle. It is also observed that the GLRT employing an adaptive 2-bit quantizer achieves much better localization performance than the GLRT based on one-bit quantization at the cost of only a minor increase of communication overhead (cf. Table 4). For all three GLRT detectors, the RMSEs from the MC experiment are shown to be closer to the corresponding CRLBs of RMSE as the SNR grows.
Figure 5 demonstrates the RMSE under various sensor deployments. More specifically, the minimum distances between sensors are D min = 120 , 80, 48, 40, and 30, respectively, thus giving rise to the sensor fields with K = 63 , 124, 306, 427, and 729 sensors. It is observed that when the number of sensors increases, the RMSE decreases considerably; meanwhile, the gap between the RMSE of MC experiments and its CRLB also decreases.

6. Conclusions

This paper considered the aspect-aware target detection and localization in a WSN, where the analysis focused on the aspect and distance dependent target reflection model. First, the GLRT detector based on one-bit quantization was proposed to simultaneously achieve target detection and localization. We then proposed the GLRT detector employing an adaptive multi-bit quantizer which quantizes sensor observations more precisely to further improve the detection and localization performance. When the target was detected, the CRLB matrix of the MLE was also derived for the proposed GLRT detector. The numerical results showed that the proposed GLRT detector based on one-bit quantization outperforms the existing scheme that based on scan statistic. Moreover, the proposed GLRT detector employing a adaptive 2-bit quantizer achieves much better performance than the one-bit quantization based GLRT at the cost of only a minor increase in communication overhead.

Author Contributions

L.H. contributed to this work with the main development of the algorithms, as well as performing the simulations and drafting the manuscript. S.W. contributed to this work with the overall design of the system, as well as providing support with the simulations and in the drafting of the manuscript. L.H., S.W. and E.Z. contributed to the revision of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors would like to thank Shang Li for discussion of the algorithms.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chong, C.Y.; Kumar, S.P. Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 2003, 91, 1247–1256. [Google Scholar] [CrossRef]
  2. Veeravalli, V.V.; Varshney, P.K. Distributed inference in wireless sensor networks. Philos. Trans. R. Soc. A 2012, 370, 100–117. [Google Scholar] [CrossRef] [PubMed]
  3. Fang, J.; Li, X.; Li, H.; Huang, L. Precoding for decentralized detection of unknown deterministic signals. IEEE Trans. Aerosp. Electron. Syst. 2014, 50, 2116–2128. [Google Scholar] [CrossRef]
  4. Javadi, S.H. Detection over sensor networks: A tutorial. IEEE Aerosp. Electron. Syst. Mag. 2016, 31, 2–18. [Google Scholar] [CrossRef]
  5. Viswanathan, R.; Varshney, P.K. Distributed detection with multiple sensors I. fundamentals. Proc. IEEE 1997, 85, 54–63. [Google Scholar] [CrossRef]
  6. Li, S.; Li, X.; Wang, X.; Liu, J. Decentralized sequential composite hypothesis test based on one-bit communication. IEEE Trans. Inf. Theory 2017, 63, 3405–3424. [Google Scholar] [CrossRef]
  7. Fang, J.; Liu, Y.; Li, H.; Li, S. One-bit quantizer design for multisensor GLRT fusion. IEEE Signal Process. Lett. 2013, 20, 257–260. [Google Scholar] [CrossRef]
  8. Aziz, A.M. A simple and efficient suboptimal multilevel quantization approach in geographically distributed sensor systems. Signal Process. 2008, 88, 1698–1714. [Google Scholar] [CrossRef]
  9. Gao, F.; Guo, L.; Li, H.; Liu, J.; Fang, J. Quantizer design for distributed GLRT detection of weak signal in wireless sensor networks. IEEE Trans. Wireless Commun. 2015, 14, 2032–2042. [Google Scholar] [CrossRef]
  10. Niu, R.; Varshney, P.K.; Cheng, Q. Distributed detection in a large wireless sensor network. Inform. Fusion 2006, 7, 380–394. [Google Scholar] [CrossRef]
  11. Kay, S.M. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory; Prentice-Hall: Upper Saddle River, NJ, USA, 1998. [Google Scholar]
  12. Gao, F.; Guo, L.; Li, H.; Fang, J. One-bit quantization and distributed detection with an unknown scale parameter. Algorithms 2015, 8, 621–631. [Google Scholar] [CrossRef]
  13. Niu, R.; Varshney, P.K. Joint detection and location in sensor networks based on local decisions. In Proceedings of the Fortieth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 29 October–1 November 2006; pp. 525–529. [Google Scholar]
  14. Shoari, A.; Seyedi, A. Detection of a non-cooperative transmitter in Rayleigh fading with binary observations. In Proceedings of the IEEE Military Communications Conference (MILCOM), Orlando, FL, USA, 29 October–1 November 2012; pp. 1–5. [Google Scholar]
  15. Ciuonzo, D.; Rossi, P.S.; Willett, P. Generalized Rao test for decentralized detection of an uncooperative target. IEEE Signal Process. Lett. 2017, 24, 678–682. [Google Scholar] [CrossRef]
  16. Ciuonzo, D.; Rossi, P.S. Distributed detection of a non-cooperative target via generalized locally-optimum approaches. Inform. Fusion 2017, 36, 261–274. [Google Scholar] [CrossRef] [Green Version]
  17. Ciuonzo, D.; Rossi, P.S. Quantizer design for generalized locally-optimum detectors in wireless sensor networks. IEEE Wireless Commun. Lett. 2018, 7, 162–165. [Google Scholar] [CrossRef]
  18. Zhou, S.; Willett, P. Submarine location estimation via a network of detection-only sensors. IEEE Trans. Signal Process. 2007, 55, 3104–3115. [Google Scholar] [CrossRef]
  19. Berger, C.R.; Zhou, S.; Willett, P. Aspect aware UAV localization. In Proceedings of the 2008 Defense and Security Symposium, Orlando, FL, USA, 16–21 March 2008; pp. 1–10. [Google Scholar]
  20. Song, X.; Willett, P.; Glaz, J.; Zhou, S. Active detection with a barrier sensor network using a scan statistic. IEEE J. Ocean. Eng. 2012, 37, 66–74. [Google Scholar] [CrossRef]
  21. Rago, C.; Willett, P.; Bar-Shalom, Y. Detection-tracking performance with combined waveforms. IEEE Trans. Aerosp. Electron. Syst. 1998, 34, 612–624. [Google Scholar] [CrossRef]
  22. Erol-Kantarci, M.; Mouftah, H.T.; Oktug, S. Localization techniques for underwater acoustic sensor networks. IEEE Commun. Mag. 2010, 48, 152–158. [Google Scholar] [CrossRef]
  23. Luo, H.; Wu, K.; Gong, Y.; Ni, L. Localization for drifting restricted floating ocean sensor networks. IEEE Trans. Veh. Technol. 2016, 65, 9968–9981. [Google Scholar] [CrossRef]
  24. Das, S.; Suganthan, P.N. Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 2011, 15, 4–31. [Google Scholar] [CrossRef]
  25. Tang, C.; Jiang, M.; Zhao, C.; Shen, H. Design of protograph-based LDPC codes with limited decoding complexity. IEEE Commun. Lett. 2017, 21, 2570–2573. [Google Scholar] [CrossRef]
  26. Mason, S.F.; Berger, C.R.; Zhou, S.; Willett, P. Detection, synchronization, and doppler scale estimation with multicarrier waveforms in underwater acoustic communication. IEEE J. Sel. Areas Commun. 2008, 26, 1638–1649. [Google Scholar] [CrossRef]
Figure 1. Low-visibility target detection by a sensor network where the reflected signal of the target is aspect and distance dependent.
Figure 1. Low-visibility target detection by a sensor network where the reflected signal of the target is aspect and distance dependent.
Sensors 18 02810 g001
Figure 2. Receiver operating characteristic curves when the signal-noise-ratio (SNR) was 8 dB, and different sensor deployments were employed: (a) a sensor field consisting of 3 rows and 21 columns of sensors; (b) a sensor field consisting of 4 rows and 31 columns of sensors.
Figure 2. Receiver operating characteristic curves when the signal-noise-ratio (SNR) was 8 dB, and different sensor deployments were employed: (a) a sensor field consisting of 3 rows and 21 columns of sensors; (b) a sensor field consisting of 4 rows and 31 columns of sensors.
Sensors 18 02810 g002
Figure 3. Detection probability versus SNR under fixed false alarm probabilities where the sensor field consists of 4 rows and 31 columns of sensors (i.e., D min = 80 ).
Figure 3. Detection probability versus SNR under fixed false alarm probabilities where the sensor field consists of 4 rows and 31 columns of sensors (i.e., D min = 80 ).
Sensors 18 02810 g003
Figure 4. Root-mean-square-error (RMSE) under different SNR conditions where the sensor field consists of 4 rows and 31 columns of sensors.
Figure 4. Root-mean-square-error (RMSE) under different SNR conditions where the sensor field consists of 4 rows and 31 columns of sensors.
Sensors 18 02810 g004
Figure 5. RMSE under various sensor deployments, where SNR = 8 dB.
Figure 5. RMSE under various sensor deployments, where SNR = 8 dB.
Sensors 18 02810 g005
Table 1. Proposed Encoding Scheme.
Table 1. Proposed Encoding Scheme.
m k 012345 2 Q 2 2 Q 1 2 Q + 1 3
q k 12Q
w k 0100011011 00 00 Q 00 0 Q 1 1 11 11 Q
Note: m k , q k , and w k denote the input message, codeword length, and output codeword, respectively.
Table 2. Expected communication overhead under different sensor deployments (SNR = 8 dB).
Table 2. Expected communication overhead under different sensor deployments (SNR = 8 dB).
Sensor
Field
Field (a): 3 × 21 Field (b): 4 × 31
Schemes1-bit GLRT/
SS/Counting
2-bit
Adaptive
2-bit
Typical
3-bit
Adaptive
3-bit
Typical
1-bit GLRT/
SS/Counting
2-bit
Adaptive
2-bit
Typical
3-bit
Adaptive
3-bit
Typical
Overhead
under H 1
6364.7812665.05189124127.77248128.35372
Overhead
under H 0
6363.1612663.16189124124.31248124.31372
Table 3. Computational time of different detection schemes for 10 6 Monte Carlo runs (Unit: Seconds).
Table 3. Computational time of different detection schemes for 10 6 Monte Carlo runs (Unit: Seconds).
CountingSS1-bit GLRT2-bit
Adaptive
2-bit
Typical
3-bit
Adaptive
3-bit
Typical
Field (a): 3 × 21 1728.61746.779,58187,64386,88787,63289,267
Field (b): 4 × 31 1752.82574.1126,189136,617136,390136,146134,108
Table 4. Expected communication overhead under different SNRs, where D min = 80 .
Table 4. Expected communication overhead under different SNRs, where D min = 80 .
SNR (dB)67891011
2-bit adaptive: H 1 126.58127.15127.77128.42129.08129.74
2-bit adaptive: H 0 124.31
1-bit GLRT/Scan
statistic: H 1 & H 0
124
2-bit typical: H 1 & H 0 248

Share and Cite

MDPI and ACS Style

Hu, L.; Wang, S.; Zhang, E. Aspect-Aware Target Detection and Localization by Wireless Sensor Networks. Sensors 2018, 18, 2810. https://doi.org/10.3390/s18092810

AMA Style

Hu L, Wang S, Zhang E. Aspect-Aware Target Detection and Localization by Wireless Sensor Networks. Sensors. 2018; 18(9):2810. https://doi.org/10.3390/s18092810

Chicago/Turabian Style

Hu, Li, Shilian Wang, and Eryang Zhang. 2018. "Aspect-Aware Target Detection and Localization by Wireless Sensor Networks" Sensors 18, no. 9: 2810. https://doi.org/10.3390/s18092810

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop