Next Article in Journal
Global Warming by Geothermal Heat from Fracking: Energy Industry’s Enthalpy Footprints
Previous Article in Journal
Four Methods to Distinguish between Fractal Dimensions in Time Series through Recurrence Quantification Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight

1
School of Artificial Intelligence, Henan University, Zhengzhou 450046, China
2
School of Marine Science and Technology, Northwestern Polytechnical University, Xi’an 710072, China
*
Authors to whom correspondence should be addressed.
Entropy 2022, 24(9), 1315; https://doi.org/10.3390/e24091315
Submission received: 21 August 2022 / Revised: 16 September 2022 / Accepted: 16 September 2022 / Published: 19 September 2022
(This article belongs to the Topic Advances in Nonlinear Dynamics: Methods and Applications)

Abstract

:
In multi-sensor cooperative detection systems, to reduce target threat risk caused by attack tasks and target loss risk induced by uncertain environmental factors, this paper proposes a multi-sensor scheduling method based on joint risk assessment with variable weight. Firstly, considering the target state and prior expert experience of sensor scheduling, this paper gives a new scheme of target threat risk. Then, by combining the given target threat risk and the target loss risk, this paper constructs a joint risk model to meet the diversity of risk assessment. Secondly, a variable-weighted joint risk assessment model is given based on the adaptive weight of target loss risk and target threat risk, and the optimization problem of multi-sensor scheduling is described to minimize the multi-step prediction of the variable-weighted joint risk model. Finally, this paper relaxes above the non-convex optimization problem as a subconvex problem and designs the scheme of multi-sensor scheduling, improving the rapidity and optimization of the sensor scheduling solution. The simulation results show that the proposed method can adaptively schedule sensors and accurately track targets by using minimum sensor resources.

1. Introduction

The situation assessment of the multi-sensor cooperative system plays an important role in national defense security. In a complex dynamic environment, scheduling limited sensor resources to achieve accurate measurement of targets is important. Therefore, some sensor scheduling methods are proposed to optimize the performance of cooperative systems by scheduling sensors and assigning working parameters of sensors [1,2,3,4].
To effectively schedule sensors, some algorithms based on information theory are proposed in which information entropy was employed to evaluate the performance of sensor scheduling [5,6]. Instead of using information theory, Wang et al. proposed the linear programming method, which models sensor scheduling as an optimization problem composed by tracking accuracy and matching a matrix of sensors [7]. Without considering target tracking accuracy in the proposed scheme, the above methods experience poor detection performance. To enhance sensor tracking accuracy, a multi-sensor scheduling method based on PCRLB and interception probability factor was proposed in [8], where interception probability of the sensor was controlled within the threshold domain. However, since the objective function in the model was nonconvex, directly employing the gradient-descent method to tackle it was impracticable. As a part of the target tracking system, threat assessment is very important, it directly affects the scheduling of sensors, leading to the performance of target tracking decrease. Therefore, it is necessary to study threat assessment in the scheduling of sensors [9,10]. Unfortunately, the above methods are not involved.
To cope with the impact of risk assessment on sensor scheduling, Lan et al. proposed a scheduling method to switch sensors based on a target threat risk assessment [11]. However, Lan’s method merely focuses on a target threat risk, while ignoring the target loss risk. Pang et al. proposed a comprehensive risk assessment model firstly, in which target loss risk and sensor radiation risk are all considered, and then designed a scheme of sensor scheduling related to this model [12]. Since the ratio between target loss risk and sensor radiation risk are fixed, Pang’s method suffers performance deterioration at the ratio between target loss risk and sensor radiation risk changing. Mou et al. proposed a method to minimize target threat risk, in which an objective function of sensor scheduling was constructed by constraining higher sensor tracking accuracy and lower target threat risk [13]. Since an exhaustive search method is employed, Mou’s method suffers a heavy computational burden. Additionally, some multi-sensor scheduling methods have also been introduced to schedule sensors. Ebenezer et al. randomly assigned sensors to detect and track targets in [14], which solved the problem of multi-target tracking at a low signal-to-noise ratio (SNR). In [15], a closest scheduling method was provided, in which tracking accuracy and interception risk were considered for multi-sensor scheduling method, but selected sensors closer to the target.
So far, risk prediction is rarely involved in the above studies; thus, risk assessment performance may degrade with target maneuvering or environment changing. To cope with the problem, a myopic multi-sensor scheduling method was further introduced to reduce the target tracking risk in [16]. However, this method regards the minimization of one-step risk prediction as in the optimization rule to schedule sensors, where multi-step prediction is not be considered.
Obviously, we can find from the above analysis that target risk is single in traditional sensor scheduling methods; furthermore, the operating mode of the sensor can frequently be switched with risk change in a complex environment.
In this paper, we present a new multi-sensor scheduling method to tackle problems, including the multiple type risks, the computational burden and risk prediction. Compared with other existing methods, our method can not only combine multiple risks but also enhance multi-step prediction of risks. The main contributions are as follows.
(1)
Joint risk assessment model containing target loss risk and target threat risk with variable weight is proposed. The traditional risk assessment methods only consider single risk (for example, target threat risk), while the proposed joint risk assessment model may be suitable for describing discrete risk and continuous risk, satisfying diversity of risk assessment models.
(2)
A multi-step joint risk prediction model is introduced to smooth the vibration of risk assessment, thus frequently switching the work mode of the sensor induced by time-varying risk can be avoided, and improve the optimization solution of sensor scheduling.
(3)
Convex relaxation is introduced to handle the NP-hard problem of sensor scheduling, leading to a suboptimal scheduling scheme with relatively minor computational complexity, which rapidity improves the algorithm.
The rest of this paper is organized as follows. Section 2 introduces the research scene and system model. Section 3 gives the variable weighted joint risk assessment model. Furthermore, the optimization problem of multi-sensor scheduling based on joint risk prediction assessment model is explored, and details of the proposed algorithm are presented in Section 4. Section 5 discusses the feasibility and effectiveness of the proposed algorithm. Section 6 provides some conclusions of this paper.

2. Problem Description

A multi-sensor cooperative detection system is composed of N sensors and M air targets. For the sake of simplicity, a two-dimensional model is considered in this paper; however, our method can be easily extended to three-dimensional scenarios. In Figure 1, every sensor can measure all targets by probe links and transmit these measurements to the processing center (PC) by communication links. In addition, the PC can send sensor measurements to the control center (CC) by communication links. Finally, the sensor scheduling scheme can be obtained according to the received measurements in CC, and then they are broadcasted to every sensor by communication links.
Some constraints are described as follows:
(1)
The number N of sensors used to detect targets is greater than the number M of targets, i.e., N > M .
(2)
One target can be tracked by at least one sensor.
According to the above scenario, we state the model of the moving target as:
x k = Φ x k 1 + ω k 1
where x k and x k 1 are the target state at the moment k and k 1 , respectively. Φ = I A B O I A O O I is the transition matrix of target state, I is the unit matrix size of J × J (J is the dimension of target state), A = T × I (T is the sampling period), B = T 2 I / 2 , O = 0 J × J is zero matrix. ω k 1 is Gaussian white noise with mean 0 1 × J and variance Q k 1 = E ω k 1 ω k 1 T .
At the same time, the measurement model of the sensor is:
z k = h x k + ν k
where h x k is the measurement matrix, ν k is the Gaussian white noise with mean 0 1 × η ( η is the dimension of sensor measurement) and variance R k = E ν k ν k T . Furthermore, the measurement noise ν k and the state noise ω k are independent of each other.

3. Target Loss Risk and Target Threat Risk

The limited detection accuracy and capability of the sensor, lead to target loss. Additionally, some targets have weapon threat system security. To this end, we define risk as the product of the loss caused by the uncertain event, and the probability of the event. Thus, in this paper, risk mainly includes target loss risk caused by uncertain environmental factors, and target threat risk caused by attack tasks.

3.1. Target Loss Risk

Detection probability of the target is mainly determined by some factors, including sensor radiation power, signal-to-noise ratio, radiation time and the distance from sensor to target [17]. Therefore, target loss risk is constructed as:
W = 1 P D · r = 1 n r ε r t h r
where P D is the detection probability of the target; thus, 1 P D can be regarded as the loss probability of the target. n r is the number of target attack indicators. t h r is the target attack indicators. ε r is the weight of target attack indicators. Based on the scenario we researched, n r = 2 is given, and t h 1 and t h 2 are the nearest distance and nearest time of the target attack, respectively, while ε 1 and ε 1 are their weights.
(1)
Detection probability of target P D
Given the false alarm probability P f a of the electromagnetic detection system, the detection probability P D can be obtained as:
P D = 1 2 e r f c ln P f a S N R + 0.5
where e r f c · is a complementary error function.
Further, the signal-to-noise ratio (SNR) of the electromagnetic detection system can be described as [14]:
S N R = P a c P a c N n o i N F i N n o i N F i = P a c P a c K e T 0 B R i N F i K e T 0 B R i N F i
where N n o i = 1 1 K e T 0 B R i K e T 0 B R i is the system noise, K e is the Boltzmann constant, T 0 is the noise temperature, B R i is the receiver bandwidth. N F i is the noise factor. P a c is the radiation power of the signal received, and it is expressed as:
P a c = P p e G T G R λ 2 G I P P p e G T G R λ 2 G I P 4 π 2 R D 2 4 π 2 R D 2
where P p e is the peak power of the radiation pulse, G T is the transmitting antenna gain of the sensor, G R is the receiving gain in the target direction, λ is the sensor working wavelength, G I P is the net gain of the receiver processor, R D is the distance between the sensor platform and target.
(2) Loss related to target missing
The loss of detection system caused by target missing, in which the nearest distance t h 1 and the nearest time t h 2 of target attack are analyzed, and then they can be described as [18]:
t h 1 = 1 , d C P A d 1 1 2 d C P A d 1 d C P A d 1 d 1 d 0.5 d 1 d 0.5 2 , d 1 < d C P A d 0.5 2 d C P A d 0.5 d C P A d 0.5 d 0.5 d 0 d 0.5 d 0 2 , d 0.5 < d C P A d 0 0 , d 0 < d C P A
t h 2 = 1 , t C P A t 1 1 2 t C P A t 1 t C P A t 1 t 1 t 0.5 t 1 t 0.5 2 , t 1 < t C P A t 0.5 2 t C P A t 0.5 t C P A t 0.5 t 0.5 t 0 t 0.5 t 0 2 , t 0.5 < t C P A t 0 0 , t 0 < t C P A
where d i and t i represent the nearest distance target and the nearest time target when the loss value is i( i = 0 , 0.5 , 1 ). Additionally, d C P A and t C P A can be expressed as:
t C P A = ( p o s x · v e l x + p o s y · v e l y + p o s z · v e l z ) v e l x + p o s y v e l y + p o s z v e l z ) v e l x 2 + v e l y 2 + v e l z 2 v e l x 2 + v e l y 2 + v e l z 2 d C P A = p o s x + t C P A · v e l x 2 + p o s y + t C P A · v e l y 2 + p o s z + t C P A · v e l z 2 p o s x p o s y p o s z T = x k y k z k T x 0 y 0 z 0 T v e l x v e l y v e l z T = x ˙ k y ˙ k z ˙ k T x ˙ 0 y ˙ 0 z ˙ 0 T
where p o s x , p o s y , p o s z and v e l x , v e l y , v e l z represent the relative position and relative velocity of the x, y and z axis, x k , y k , z k and x ˙ k , y ˙ k , z ˙ k represent the distance and velocity of the x, y and z axis, x 0 , y 0 , z 0 and x ˙ 0 , y ˙ 0 , z ˙ 0 are the initial distance and velocity of a moving target, respectively.

3.2. Target Threat Risk

Comprehensively evaluating target threat risk from many aspects mainly includes two types, i.e., discrete risk and continuous risk. Discrete risk includes airborne weapons, jamming capability, category of target, and so on. Additionally, continuous risk includes heading angle, height, speed, distance, and so on. Furthermore, the above risks can be described in Figure 2.
To evaluate the target threat risk, we comprehensively consider discrete and continuous risks as:
Q = j = 1 m f j U μ j
where U is the target threat value, f j U is the probability of target threat risk level j, μ j is the loss caused by target attack with threat risk level j. More details related to (10) can be introduced as follows.
(1)
The target threat value U
By normalizing continuous risk related to target threat risk, they can be used in (10), and then normalized functions are described in Table 1.
In Table 1, f C , f A , f V and f R are the coefficient of heading angle, height, speed and distance, respectively. U C , U A , U V and U R are the heading angle, height, speed of target and distance between target and sensor, respectively. At the same time, U max A , U max V and U max R are the maximum value of given variables, respectively.
Therefore, the target threat value based on Table 1 can be expressed as:
U = ϕ C C + ϕ A A + ϕ V V + ϕ R R
where ϕ C , ϕ A , ϕ V , ϕ R are the weights of heading angle, height, speed and distance, respectively.
(2)
Probability of target threat risk f U
Given the fact that the probability of the target threat risk is discrete, it is necessary to discretize the continuous value U to calculate the probability of the target threat risk. For the sake of simplicity, we select the target threat value U at the integer moment to describe more details.
The probability of the target threat risk is defined as p = f 1 U , f 2 U , , f m U , and f j U ( j = 1 , 2 , , m ) is the j-th level probability of the target threat. Additionally, the probability of the target threat at the moment k is:
p k = p k 1 · G k
where p k 1 is the probability of the target threat risk at the moment k 1 , G k is the probability of the Markov transition at the moment k, and can be expressed as [19]:
G k = G 11 λ 1 ( k ) G 12 + λ 1 ( k ) 0 0 G 21 λ 2 ( k ) 2 G 22 + λ 2 ( k ) G 23 λ 2 ( k ) 2 0 0 G 32 λ 3 ( k ) 2 G 33 λ 3 ( k ) 0 0 0 0 G m m + λ m ( k )
here,
λ 2 r 1 ( k ) = ( G r r p 0 ) × U k λ 2 r ( k ) = G r + 1 r × U k r = 1 , 2 , , m / 2
where p 0 is the system inertia factor, U k is the target threat value, λ j ( k ) is used to adjust the probability of the Markov transition according to the target threat risk value.
(3)
Loss relating to target threat risk μ
As is known, the loss of the detection system caused by the target attack is mainly determined by the threat capability of the target. Therefore, we give the vector Γ = Γ 1 , Γ 2 , Γ 3 to describe the threat capability of the target according to prior experiences, in which Γ 1 , Γ 2 and Γ 3 are the airborne weapons, jamming capability and category of the target, respectively. Additionally, we map elements of Γ into the threat loss domain by using the normalized loss function, and then the loss of the j-th threat level is achieved by the following form:
μ j = f Γ , γ = i = 1 3 γ i · exp Γ i j 1 / 2 2 Γ i j 1 / 2 2 2 δ j 2 2 δ j 2
where γ i is the weight corresponding to Γ i . δ j is the standard variance of the j-th threat level.

4. Multi-Sensor Scheduling Based on Joint Risk Assessment

It is important to reasonably assign sensors to minimize potential risks for sensor scheduling [20,21]. Considering target loss risk and target threat risk, we propose a new scheduling method to assign sensors, ensuring risk assessment minimization.

4.1. Flow Chart of Proposed Method

Considering a variety risks, we propose the multi-sensor scheduling method, and give a joint risk assessment model with variable weight, multi-step prediction model of joint risk, multi-sensor scheduling optimization method, and so on. The flow chart of the proposed method is shown in Figure 3.
In this figure, the risk of target loss and the target threat risk can be calculated by using the detection performance of sensors, the sensor measurement information, and prior experiences, respectively. Moreover, the variable weights of all risks were adaptively given to construct the joint risk assessment. Additionally, the multi-sensor scheduling optimization model was constructed by minimizing the multi-step prediction of joint risk, and then the scheme of sensor scheduling was solved by using the convex relaxation method. More details related to the proposed method are shown as follows.

4.2. Joint Risk Assessment with Variable Weight

Supposing N sensors to track M targets ( N > M ) , the joint risk assessment is:
J k i , j ( W k , Q k ) = α ( k ) W k i , j + β ( k ) Q k i , j
where J k i , j , W k i , j and Q k i , j are joint risk, target loss risk and target threat risk of the i-th sensor w.r.t j-th target, respectively. α k and β k are adaptive risk weight about the target loss risk and the target threat risk, respectively.
The risks change with target moving, the adaptive weights α k , β k related to risks are defined as:
α ( k ) = θ 1 e 1 2 σ 2 d ( k ) D ( k ) 2 θ 1 e 1 2 σ 2 d ( k ) D ( k ) 2 + θ 2 e 1 2 σ 2 d ( k ) D ( k ) 2
β ( k ) = θ 2 e 1 2 σ 2 d ( k ) D ( k ) 2 θ 1 e 1 2 σ 2 d ( k ) D ( k ) 2 + θ 2 e 1 2 σ 2 d ( k ) D ( k ) 2
where σ 2 is the noise variance of sensor measurement. d k is the distance between a target and a sensor, and D ( k ) is the average distance between this target and all sensors. θ 1 and θ 2 are parameters related to loss risk and threat risk, respectively. Obviously, adaptive weights α k and β k also change with distance d k .

4.3. Multi-Step Prediction Model of Joint Risk Assessment

To more efficiently design the scheme of sensor scheduling, risk prediction is necessary according to the current target state. Moreover, multi-step prediction of risk more efficiently ensures security of the detection system more than that of the single-step risk prediction.
Here, we propose a multi-step prediction model of joint risk as:
J k + H i , j W k , Q k = α ( k ) W k i , j + β ( k ) Q k i , j + E h = 2 H α ( k ) W k + h 1 i , j + β ( k ) Q k + h 1 i , j
where J k + H i , j W k , Q k is the cumulative joint risk from moment to moment k + H 1 (H is the number of steps); also, ( i , j ) expresses the i-th sensor tracking the j-th target.

4.4. Multi-Sensor Scheduling Optimization

To make the scheme of sensor scheduling, a multi-sensor scheduling problem considering joint risk prediction can be constructed as:
minimize ψ k i , j i = 1 N j = 1 M ψ k i , j · α ( k ) W k i , j + β ( k ) Q k i , j + E h = 2 H α ( k ) W k + h 1 i , j + β ( k ) Q k + h 1 i , j s u b j e c t t o i = 1 N ψ k i , j 1 j = 1 M ψ k i , j 1 ψ k i , j 0 , 1 , i = 1 , , N j = 1 , , M
where ψ k with size N × M is the scheduling scheme of sensor management, and ψ k i , j is the element of ψ k with i-th row and j-th column; also, ψ k i , j = 1 expresses sensor i assigned to track target j.
Further, ψ k i , j 0 , 1 in (20) is non-convex, leading to the problem being NP-hard. To cope with the problem, we relax ψ k i , j 0 , 1 into ψ k i , j 0 , 1 , and then a convex optimization problem is reformulated as:
minimize ψ k i , j i = 1 N j = 1 M ψ k i , j · α ( k ) W k i , j + β ( k ) Q k i , j + E h = 2 H α ( k ) W k + h 1 i , j + β ( k ) Q k + h 1 i , j s u b j e c t t o i = 1 N ψ k i , j 1 j = 1 M ψ k i , j 1 0 ψ k i , j 1 , i = 1 , , N j = 1 , , M
Given the fact that the solution of (21) is not a direct solution of problem (20), to this end, we employ the discretization and legalization method (D-L) to handle [8], where the details are in Table 2.

4.5. Algorithm Implementation

According to the above analysis, more details related to the proposed multi-sensor scheduling algorithm, in which joint risk assessment with variable weight is considered, and the pseudocode is shown in Table 3.

5. Simulation and Analysis

5.1. Scene and Parameters

To evaluate the effectiveness of the proposed scheduling algorithm (PMA), three existing approaches are selected to compare with the PMA algorithm, in which the characteristics are as follows:
(1)
The random scheduling approach (RMA) [14]: it randomly assigns sensors to detect and track targets, leading to its main application in the case where unknown variables cannot be solved immediately.
(2)
The closest scheduling approach (CMA) [15]: it selects sensors closer to the target to detect and track targets. Therefore, the better estimation accuracy of the target state can be obtained.
(3)
The myopic scheduling approach (MMA) [16]: it regards minimization of one-step joint risk prediction as the optimization rule of multi-sensor scheduling, in which schemes of sensor scheduling are obtained according ahead of time.
In this paper, the target state model and sensor measurement model are (1) and (2), respectively. The parameters of four sensors ( S 1 , S 2 , S 3 , S 4 ) are shown in Table 4, which are employed to track the moving target. The initial state estimations of three targets are position ( 50 , 3 , 0.4 ) km , velocity ( 0.005 , 0.002 , 0 ) km / s and acceleration 0.0001 , 0 , 0 km / s 2 , respectively. The parameters related to loss risk and threat risk are θ 1 = 0.15 , θ 2 = 0.4 . The level of target threat is m = 2 , the initial target threat probability is p = [ 0.9 , 0.1 ] , the initial Markov transition probability is G i j = [ 0.9 , 0.1 ; 0.1 , 0.9 ] . At the same time, simulation time is 1200 s.
Here, simulation software is MATLAB R2016a, and configuration of computer core hardware: CPU Inter(R) Core(TM) i5-9500U 3.00 GHz, 16 G memory.

5.2. Results and Analysis

The efficiency of risk control and the accuracy of risk prediction are verified in this section. Furthermore, the performance of PMA and the comparison with three other methods are simulated and analyzed as follows.

5.2.1. Simulation of PMA

(1) Determine the number of steps H
Calculation accuracy and time complexity are influenced by the number of steps H in (19). According to analysis, the larger the number of steps H, the more the cumulative joint risk, the better the multi-step risk prediction, but the time complexity increases. To this end, it is important to select the right number of steps H for balancing time complexity and calculation accuracy. The change of the cumulative joint risk with number of steps H is shown in Figure 4.
In Figure 4, it is obvious that the cumulative joint risk decreases with the increase of the number of steps H. It can be found that the cumulative joint risk happens with a small change from step H = 5 to H = 8, meaning fewer optimizations in the sensor scheduling scheme. Considering time complexity increases with a bigger number of steps H, this paper takes the number of steps H = 5.
(2)
Solution of joint risk
The joint risk assessment changes with a target move. The joint risk comparison of the real and prediction value is shown in Figure 5.
In Figure 5, the prediction risk and the real risk describe the change of joint risk. In Figure 5a,b, symbol “A” expresses the same turning point under two different physical indicators (time, distance). Moreover, before “A”, there is a greater distance between sensors and the target is longer, as expected. The loss risk of the target is the main factor of the joint risk. However, with the distance between sensor and target gradually decreasing, the loss risk probability of the target decreases, resulting in a downward trend of the joint risk. Similarly, after “A”, the loss risk probability of the target decreases too, while the threat risk of the target is the main factor of the joint risk. Additionally, the threat risk probability of the target keeps increasing, leading to an increasing trend of the joint risk. It can be seen that the curves of risk prediction and real risk are roughly the same, it can reasonably explain the risk assessment problems; moreover, it can verify the accuracy of risk prediction.
(3)
Scheme of sensor scheduling
Through the convex optimization, the minimization problem of joint risk is solved; however, the solution is a discrete 0–1 scheme. To cope with the problem, the D-L method is necessary to obtain an optimal scheme of sensor scheduling. As an example, the sensor scheduling matrix is discretized by threshold by using the D-L method as:
It can be seen in Figure 6, the elements in the matrix that are greater than or equal to the threshold are set to 1, otherwise 0. Therefore, a continuity matrix is transformed into a discrete 0–1 matrix. According to the given constraint, in which a sensor can only track one target and a target can only be tracked by one sensor, the sensor scheduling matrix is also legitimized. Since the elements of the first and second row in the first column are both 1, and the corresponding optimization value 0.6 < 0.8 , the first-row element in the first column is set to 0, so as to complete the legalization.
After D-L processing, the sensor scheduling scheme can be obtained by solving the optimization problem. As expected, some sensors can be scheduled to track the target scheme as shown in Figure 7.
In this figure, taking the period from 40 s to 50 s as an example, during the moment of 40–41 s, 42–43 s, 44–45 s, 46–47 s and 48–50 s, S 1 , S 4 , S 1 , S 2 and S 3 were assigned to detect and track target, respectively. Indeed, the above scheme of sensor scheduling can be obtained in real time by solving the minimum multi-step prediction joint risk problem, leading to reduced joint risk of the detection system.

5.2.2. Comparison of Different Methods

(1)
Joint risk comparison
Comparing the proposed method PMA with the other three methods CMA, RMA and MMA, we analyze their joint risk assessment, which can be seen in Figure 8 and Figure 9. Here, Figure 8 is the joint risk comparison of four methods, and Figure 9 is the comparison of cumulative joint risk, cumulative threat risk and cumulative loss risk.
In Figure 8, the cumulative risk of PMA is lower than other methods (RMA, CMA and MMA) during the total simulation time. Taking the moment 60 s as an example, compared with methods RMA, CMA and MMA, the joint risk of method PMA reduces by 30.43%, 11.24% and 7.18%, respectively. Moreover, it can be seen from Figure 9, compared with three methods, the cumulative joint risk of method PMA is reduced by 10.05%, 12.96% and 3.14%, the cumulative threat risk reduced by 6.63%, 9.21% and 1.95%, the cumulative loss risk reduced by 47.81%, 56.57% and 20.34%, respectively. The reason behind this observation is that the method RMA randomly assigns sensors. The risk prediction model is not considered to control the risk, leading to the highest risk. Although the CMA method can guarantee better sensor measurement information, it has high threat risk. Moreover, the risk prediction model is also not considered, the resulting risk is controlled with delay. The MMA method considers risk as a one-step prediction model to better predict and control risk, but it is not considered to estimate risk, leading to the best risk control effect hardly being obtained. According to the above analysis, compared with methods RMA, CMA and MMA, the PMA method can better balance the target threat risk and target loss risk, controlling joint risk and improving system safety.
To better illustrate the advantage of the PMA method, Figure 10 shows the cumulative risk comparison of four methods on the joint risk, loss risk and threat risk.
As expected, the PMA method has the smallest cumulative joint risk, cumulative loss risk and cumulative threat risk in Figure 10. For example, at moment 60 s, compared with methods RMA, CMA and MMA, the cumulative loss risk of PMA reduces by 68.29%, 43.72% and 11.59%, respectively. Moreover, the cumulative threat risk of PMA respectively reduces by 11.23%, 6.72% and 1.91%, and the cumulative joint risk of PMA respectively reduces by 17.29%, 11.32% and 3.73%. These results show that the PMA method is effective in risk assessment, controlling the joint risk and providing a better scheme of sensor scheduling.
(2)
Tracking error comparison
Obviously, the tracking error of the sensor is one important indicator to evaluate the scheme of sensor scheduling, i.e., the smaller the tracking error, the higher the tracking accuracy of the sensor. We regard the maximum tracking error (MTE) and average tracking error (ATE) as indicators to evaluate four methods, which can be seen in Table 5.
It can be seen from this table, compared with the other three methods, the proposed PMA method is not minimum at MTE. However, compared with RMA, CMA and MMA, the average tracking error of PMA reduces by 51.9%, 7.4% and 22.2%, respectively. Moreover, compared with the RMA method, the PMA method decreased by 34.1% with respect to ATE. These results illustrate that the PMA method does not reduce target tracking accuracy, while emphasizing risk control.
(3)
Complexity analysis
The complexity of the proposed PMA method is mainly determined by the number of sensors and targets. The optimization problem (21) contains N sensors and M targets, and the complexity of multi-sensor scheduling by convex optimization theory is O N × M N × M . Since the CMA and MMA methods use exhaustive methods to solve sensor scheduling, their complexity both are O N × M 2 . Therefore, the complexity of the PMA method is significantly lower than that of CMA and MMA. Furthermore, the RMA method randomly schedules sensor resources, in which the optimization problem of multi-sensor scheduling is not involved, leading to complexity, is the lowest. However, it can be analyzed from (1) and (2) mentioned above that compared with RMA, PMA has a great improvement in risk control and target tracking accuracy. For comparison, the complexities of the proposed PMA method and the other three methods are shown in Table 6.

6. Conclusions

In this paper, a multi-sensor scheduling method based on joint risk assessment is presented. We combine target loss risk and target threat risk by variable weights to construct a joint risk model. We employ the multi-sensor scheduling problem minimizing multi-step joint risk prediction, by which the suboptimal scheme of sensor scheduling and more accurate prediction of joint risk can be achieved, leading to reduced potential task risk caused by the sensor tracking target. In our future work, it would be interesting to further narrow the performance gap between the approximate solution and the optimal solution of the original optimization problem in (20).

Author Contributions

Conceptualization, L.Z.; methodology, L.Z. and J.W.; validation, Y.J.; formal analysis, Q.W.; writing—original draft preparation, J.W.; writing—review and editing, W.S.; funding acquisition, Y.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Science Foundation Council of China (61976080, 61771006), the Key Research Projects of the University in Henan Province, China (21A413002, 20B510001), the Programs for Science and Technology Development of Henan Province, China (212102310298, 222102210002, 222102210004, 222102220028, 222102210088), Graduate Education Innovation and Quality Improvement Action Plan project (SYLKC2022013).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, C.; Hwang, I. Multi-target identity management with decentralized optimal sensor scheduling. Eur. J. Control. 2020, 56, 10–37. [Google Scholar]
  2. Shi, Y.; Choi, J.W.; Xu, L.; Kim, H.J.; Ullah, I.; Khan, U. Distributed target tracking in challenging environments using multiple asynchronous bearing-only sensors. Sensors 2021, 20, 2671. [Google Scholar] [CrossRef] [PubMed]
  3. Anvaripour, M.; Saif, M.; Ahmadi, M. A novel approach to reliable sensor selection and target tracking in sensor networks. IEEE Trans. Ind. Inform. 2020, 16, 171–182. [Google Scholar] [CrossRef]
  4. Pang, C.; Shan, G. The prediction formula and a risk-based sensor scheduling method in target detection with guiding information. Def. Technol. 2020, 16, 447–452. [Google Scholar] [CrossRef]
  5. Shen, X.; Varshney, P.K. Sensor selection based on generalized information gain for target tracking in large sensor networks. IEEE Trans. Signal Process. 2014, 62, 363–375. [Google Scholar] [CrossRef]
  6. Wang, H.; Ge, J.; Zhang, D.; Liu, G. Sensor selection for target tracking based on single dimension information gain. J. Eng. 2019, 2019, 6562–6565. [Google Scholar] [CrossRef]
  7. Wang, N.; Xu, Y.S. The sensors’ spatial-temporal allocation by linear programming in multi-fighter cooperative detection. In Proceedings of the 2018 IEEE 4th International Conference on Control Science and Systems Engineering, Wuhan, China, 21–23 August 2018; pp. 183–187. [Google Scholar]
  8. Xu, G.; Pang, C.; Duan, X.; Shan, G. Multi-sensor optimization scheduling for target tracking based on PCRLB and a novel intercept probability factor. Electronics 2019, 8, 140. [Google Scholar] [CrossRef]
  9. Luo, R.; Huang, S.; Zhao, Y.; Song, Y. Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP. Entropy 2021, 23, 1292. [Google Scholar] [CrossRef] [PubMed]
  10. Dong, Q.; Pang, C. Risk-Based Non-Myopic Sensor Scheduling in Target Threat Level Assessment. IEEE Access 2021, 9, 76379–76394. [Google Scholar] [CrossRef]
  11. Lan, Y.; Liang, J. Threat-based sensor management for multi-target tracking. In Proceedings of the International Conference in Communications, Signal Processing, and Systems, Singapore, 4–6 April 2019; pp. 2147–2154. [Google Scholar]
  12. Pang, C.; Shan, G. Risk-based sensor scheduling for target detection. Comput. Electr. Eng. 2019, 77, 179–190. [Google Scholar] [CrossRef]
  13. Mou, Z.; Tang, S.; Du, Q.; Wang, S.; Wang, N. Airborne sensor management algorithm based on targets threat evaluation. In Proceedings of the 2017 13th IEEE International Conference on Electronic Measurement & Instruments, Yangzhou, China, 20–23 October 2017; pp. 163–167. [Google Scholar]
  14. Ebenezer, S.P.; Papandreou-Suppappola, A. Generalized recursive track-before-detect with proposal partitioning for tracking varying number of multiple targets in low SNR. IEEE Trans. Signal Process. 2016, 64, 2819–2834. [Google Scholar] [CrossRef]
  15. Zhang, Z.; Shan, G. UTS-based foresight optimization of sensor scheduling for low interception risk tracking. Int. J. Adapt. Control. Signal Process. 2014, 28, 921–931. [Google Scholar] [CrossRef]
  16. Gomes-Borges, M.; Maltese, D.; Vanheeghe, P.; Sella, G.; Duflos, E. Sensor management using expected risk reduction approach. In Proceedings of the 2016 19th International Conference on Information Fusion, Heidelberg, Germany, 5–8 July 2016; pp. 2050–2058. [Google Scholar]
  17. Shan, G.; Pang, C. Distributed Sensor management Based on Target Losing Probability for Maneuvering Multi-Target Tracking. IEEE Access 2020, 8, 113610–113623. [Google Scholar] [CrossRef]
  18. Fotios, K.; Hans, D.; Alexander, Y. Threat-based sensor management for target tracking. IEEE Trans. Aerosp. Electron. Syst. 2015, 51, 2772–2785. [Google Scholar]
  19. Li, W.; Jia, Y. An information theoretic approach to interacting multiple model estimation. IEEE Trans. Aerosp. Electron. Syst. 2015, 51, 1811–1825. [Google Scholar] [CrossRef]
  20. Pang, C.; Shan, G.; Duan, X.; Xu, G. A multi-mode sensor management approach in the missions of target detecting and tracking. Electronics 2019, 8, 71. [Google Scholar] [CrossRef] [Green Version]
  21. Xu, G.; Shan, G.; Duan, X. Non-myopic scheduling method of mobile sensors for maneuvering target tracking. IET Radar Sonar Navig. 2019, 13, 1899–1908. [Google Scholar]
Figure 1. Multi-sensor cooperative detection system.
Figure 1. Multi-sensor cooperative detection system.
Entropy 24 01315 g001
Figure 2. Composition of target threat risk.
Figure 2. Composition of target threat risk.
Entropy 24 01315 g002
Figure 3. Flow chart of the proposed method.
Figure 3. Flow chart of the proposed method.
Entropy 24 01315 g003
Figure 4. The cumulative joint risk change.
Figure 4. The cumulative joint risk change.
Entropy 24 01315 g004
Figure 5. Comparison of real and joint prediction. (a) Change with moment; (b) change with distance.
Figure 5. Comparison of real and joint prediction. (a) Change with moment; (b) change with distance.
Entropy 24 01315 g005
Figure 6. An example of D-L.
Figure 6. An example of D-L.
Entropy 24 01315 g006
Figure 7. Scheme of sensor scheduling.
Figure 7. Scheme of sensor scheduling.
Entropy 24 01315 g007
Figure 8. Different joint risks of four methods.
Figure 8. Different joint risks of four methods.
Entropy 24 01315 g008
Figure 9. Cumulative risk of four methods.
Figure 9. Cumulative risk of four methods.
Entropy 24 01315 g009
Figure 10. The cumulative risk comparison of four methods. (a) The cumulative loss risk; (b) the cumulative threat risk; (c) the cumulative joint risk.
Figure 10. The cumulative risk comparison of four methods. (a) The cumulative loss risk; (b) the cumulative threat risk; (c) the cumulative joint risk.
Entropy 24 01315 g010
Table 1. Normalized function.
Table 1. Normalized function.
Continuous VariablesNormalized FunctionsDomain
Heading angle C = exp f C U C 2 0 U C 180
Height A = 1 exp f A U A U max A 2 0 < U A U max A
Speed V = exp f V U V U max V 2 0 < U V U max V
Distance R = 1 exp f R U R U max R 2 0 < U R U max R
Table 2. Multi-sensor scheduling based on joint risk prediction (SMBRP).
Table 2. Multi-sensor scheduling based on joint risk prediction (SMBRP).
Input Multi-step risk prediction J k + H i , j W k , Q k
Output Scheme of sensor scheduling ψ k *
(1) Initializing parameters;
(2) Constructing multi-sensor scheduling optimization problem based on joint risk prediction is
according to (20);
(3) Relaxing ψ k i , j 0 , 1 into ψ k i , j 0 , 1 , then getting (21);
(4) Calculating ψ k according to (21);
(5) Computing ψ k by using D-L method and getting suboptimal scheduling scheme ψ k * of (20).
Table 3. Algorithm pseudocode.
Table 3. Algorithm pseudocode.
Input Sensors measurements z k , target threat capability Γ
Output Scheme of sensor scheduling ψ k *
(1) Initializing parameters;
(2) For  k = 1 : k max  do
(3) Calculating the target loss risk W k according to (3);
(4) Calculating the target threat risk Q k according to (10);
(5) Calculating the adaptive weight of target loss risk and target threat risk α ( k ) , β ( k ) based on (17) and (18);
(6) Calculating the joint risk J k i , j ( W k , Q k ) according to (16);
(7) Calculating the multi-step prediction of joint risk J k + H i , j W k , Q k by using (19);
(8) Constructing the optimization problem of joint risk-based multi-sensor scheduling according to (20);
(9) Using SMBRP to solve the optimization problem (21), and getting the scheme of sensor scheduling ψ k * ;
(10) End for
Explain: The specific algorithm flow of SMBRP is shown in Table 2.
Table 4. Related parameters of sensors.
Table 4. Related parameters of sensors.
SensorsPosition/kmDetection PowerSampling period/sMeasurement noise/kmFalse Alarm Probability
S 1 (0,0,0)24.4100.61 10 8
S 2 (0.1,0,0)25.4100.60 10 8
S 3 (0,0.1,0)24.8100.59 10 8
S 4 (0.1,0.1,0)26.1100.60 10 8
Table 5. Comparison of tracking error.
Table 5. Comparison of tracking error.
MethodMTE (km)ATE (km)The Percentage Reduction of RMA in ATE
CMA0.500.2929.3%
MMA0.610.3319.5%
RMA0.690.41-
PMA0.520.2734.1%
Table 6. Comparison of complexity.
Table 6. Comparison of complexity.
MethodComplexity in General
CMA O N × M 2
MMA O N × M 2
RMA O N × M
PMA O N × M N × M
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhou, L.; Wu, J.; Wei, Q.; Shi, W.; Jin, Y. Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight. Entropy 2022, 24, 1315. https://doi.org/10.3390/e24091315

AMA Style

Zhou L, Wu J, Wei Q, Shi W, Jin Y. Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight. Entropy. 2022; 24(9):1315. https://doi.org/10.3390/e24091315

Chicago/Turabian Style

Zhou, Lin, Jiawei Wu, Qian Wei, Wentao Shi, and Yong Jin. 2022. "Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight" Entropy 24, no. 9: 1315. https://doi.org/10.3390/e24091315

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop