Next Article in Journal
Design of High Frequency, Low Phase Noise LC Digitally Controlled Oscillator for 5G Intelligent Transport Systems
Next Article in Special Issue
Multi-Sensor Optimization Scheduling for Target Tracking Based on PCRLB and a Novel Intercept Probability Factor
Previous Article in Journal
Intelligent Airflow Controls for a Stalling-Free Operation of an Oscillating Water Column-Based Wave Power Generation Plant
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multi-Mode Sensor Management Approach in the Missions of Target Detecting and Tracking

1
Department of Electronic and Optical Engineering, Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050000, China
2
School of Mechanical Engineering, Shijiazhuang Tiedao University, Shijiazhuang 05000, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(1), 71; https://doi.org/10.3390/electronics8010071
Submission received: 11 December 2018 / Revised: 26 December 2018 / Accepted: 4 January 2019 / Published: 8 January 2019
(This article belongs to the Special Issue Radar Sensor for Motion Sensing and Automobile)

Abstract

:
In this paper, sensor management is divided into two processes: sensor deployment and sensor scheduling, after which a multi-mode sensor management approach based on risk theory is proposed. Firstly, the definition of risk is provided, on the basis of which the target detecting risk and the target tracking risk are separately presented, along with their computing methods. Secondly, when deploying sensors, the objective is to obtain the minimum target detecting risk. Similarly, when scheduling sensors, the objective is to obtain the minimal sum of target detecting risk and target tracking risk. Furthermore, to obtain sensor management schemes according to the objective functions, the improved bee colony algorithm based on double-probability and in combination with the particle swarm optimization algorithm is proposed. Finally, simulations are conducted, which indicate that the models and the algorithm in the paper possess some advantages over existing ones.

1. Introduction

Sensor networks are applied in both military and civilian domains to acquire information. Especially in combat, they play an important role in target detecting and tracking. For many years, attempts have been made by researchers worldwide to make the best of sensor resources, called sensor management [1,2,3,4,5,6].
In sensor management, two steps should be taken. The first is to establish a sensor management model—in other words, an objective function obeying some rules should be introduced. The second is to get the optimal scheme from the objective function by traversing through all potential schemes or using optimization algorithms.
When modeling the objective functions, existing approaches could be roughly classified into three types, namely, the task-based approach [7,8,9,10,11,12,13], the information-based approach [14,15,16,17,18,19,20], and the risk-based approach [21,22,23,24,25]. Utilizing the first two approaches, some important technical indicators can be obtained, for instance, the target detecting probability and the target tracking precision, but actual operational requirements are not taken into consideration. For example, when tracking targets, if all domains in which a target might appear are covered by a radar beam, the target will not be missed, even though the target tracking precision is not so accurate. Compared with the former approaches, the third comes close to meeting the actual operational needs. With the operation risk considered, this approach can better utilize the sensor resource to get required technical indicators, which has become a research focus in recent years [26,27].
As for the category of optimization algorithms, there are two main kinds, namely the centralized algorithm [28,29,30,31,32,33,34] and the distributed algorithm [35,36,37,38,39,40,41]. Compared with distributed algorithms, schemes obtained by centralized algorithms are better, but have slower computing speeds. Furthermore, they can give more communication pressures on sensor networks.
After studying the literature above, the following problems still need to be addressed:
(1)
Continuity and relevance are lacking in sensor management (including sensor deployment and sensor scheduling). For example, when conducting sensor scheduling, authors usually did not consider sensor deployment, and there are not suitable sensor networks deployed by other sensor deployment approaches to apply their sensor scheduling approaches. Obviously, sensor scheduling is based on sensor deployment and, accordingly, operates after it. In addition, when deploying sensor networks, the sensing radius of sensors must be taken into consideration. However, when scheduling sensors in reality, it is ignored.
(2)
Different kinds of combat missions (including target detecting and target tracking) are analyzed independently. In a combat, with new targets appearing and acquired targets disappearing, different kinds of missions emerge at the same time, which means that a sensor network must detect targets and track targets simultaneously. Obviously, at this point, the sensor management model is totally different from those only considering one type of combat mission. Unfortunately, multi-mission sensor management approaches are seldom reported.
To solve the problems mentioned above, the sensor management approach (supposing that the sensor is a radar and the target is an aircraft) combining target detecting and target tracking is studied based on risk theory. Risk is defined as the product of the probability of a harmful event and the loss that the event brings [21]. The rest of this paper is organized as follows. In Section 2, the problem analysis and some assumptions are provided. In Section 3, two self-defined concepts, namely the target detecting risk and the target scheduling risk, are put forward, and their computing methods are provided. Furthermore, the sensor deployment model is established based on the target detecting risk and the sensor scheduling model is established based on the target tracking risk. In Section 4, to get schemes from the models, an improved artificial bee colony algorithm is introduced. Simulations and experiments are conducted to verify the proposed model and algorithm in Section 5, and the paper is concluded in Section 6.

2. Problem Analysis and Model Hypothesis

2.1. Combat Situation

Our monitoring domain is a 200 km × 200 km square Ω 0 , and the monitoring center is the center of the square in Figure 1.
As Figure 1 shows, for the process of target detecting and warning, a sensor network should first be deployed, and then, when a target appears, sensor scheduling can operate based on the deployed sensor network, realizing target detecting and tracking. As mentioned above, sensor deployment and sensor scheduling are closely related and inseparable. When tracking a target, the sensor network must keep detecting new targets simultaneously; in other words, target detecting and target tracking should be running at the same time. Of particular note is that the sensing radius can influence the tracking performance of the sensor, indicating that there are different variances of measurement noise due to different distances from targets to the sensor.

2.2. Model Hypothesis

There are some assumptions as follows.
Assumption 1.
A sensor can work in two modes, namely ‘target detecting’ and ‘target tracking’, but the sensor can operate in only one working mode at a certain moment.
Assumption 2.
In different measuring periods, the radiating power and radiating time of a sensor remain unchanged.
Assumption 3.
During the target detecting period, the time interval is ignored, meaning that the detected domain is observed by the sensor continuously.
Assumption 4.
Divide the monitoring domain Ω 0 into small unit squares, and note that there is only one target at most in a unit square at a certain moment.

3. Sensor Management Models

3.1. Target Detecting Model and Sensor Deployment Model

3.1.1. Calculation of Target Detecting Probability

To calculate the detecting probability p d , North [42] gave a fully precise solution by the following:
p d = 0.5 e r f c ( ln p f S N R + 0.5 )
e r f c ( z ) = 1 2 π 0 z e v 2 d v
where p f is the given false alarm probability, p f = 0.01 in this paper, and S N R is the signal to noise ratio (SNR).
According to the radar equation [43], S N R can be calculated as follows:
S N R = P τ σ λ 2 G r G t ( 4 π ) 3 k T 0 F n C B r 4
where P is the radiation power of radars, τ is the radiation time, σ is the area of target reflection, λ is the radar wavelength, G r is the transmitting antenna gain, G t is the receiving antenna gain, k is the Boltzmann constant, T 0 = 273 K is the normal room temperature, F n is the noise coefficient, C B is the bandwidth correction factor, and r is the distance between the target and the sensor.
In this paper, parameters are constants, except for radar radiation time, radiation power, and the distance from sensors to targets; then, the computing method of S N R can be simplified as follows [44]:
S N R = S N R c a l ( P τ P c a l τ c a l ) ( r r c a l ) 4
where τ is the radiation time and P is the radiation power. When a sensor is working in the target detecting mode, the variable τ is approximately equal to the beam dwell time at the scanned domain in a measuring period. When a sensor is in the target tracking mode, the variable τ is approximately equal to the beam dwell time at the tracked target in a measuring period. The variable r is the distance from a radar and a target. The variable S N R c a l is a calibrated value—the S N R of the received signal on condition that a sensor radiates for τ c a l time with the radiation power P c a l and the distance r c a l . In this paper, S N R c a l = 50   dB , P c a l = 1   k W , τ c a l = 10   m s , and r c a l = 20   k m .

3.1.2. Calculation of Monitoring Priority

In this paper, the monitoring priority of a certain point (a unit square) in Ω 0 is defined as the monitoring need of this point, and is affected by two factors, namely the importance priority, marked as θ , and the initial target emergence probability, marked as p . A larger importance priority and emergence probability will result in higher monitoring priority.
Note that the coordinate of a point c in Ω 0 is ( x , y ) , the coordinate of the center o in Ω 0 is ( x 0 , y 0 ) , and the distance from c to o is calculated as follows:
d = ( x x 0 ) 2 + ( y y 0 ) 2
Suppose that the importance priority of o is 1, and the minimum safe distance from a target to o is α . The importance priority of c yields to the following:
θ = { 1 d α ,   0 d α 0 ,   d > α
Provided that the probability of a target with its initial emergence at c is p , targets move towards o from far to near, and the appearing domain is the marginal domain of Ω 0 at the beginning of a combat. Note that the margin length in Ω 0 is a 0 , and p can be calculated as follows:
p = { 1 4 a 0 , c   is   in   the   marginal   domains 0 , c   is   in   other   domains
Taking both θ and p into consideration, the monitoring priority of c can be calculated as follows:
f c = ω 1 θ + ω 2 p
where ω 1 and ω 2 are the weights of θ and p , respectively.
In this paper, ω 1 = 1 , ω 2 = 1000 , a 0 = 400 , α = 300 , o = ( 0 , 0 ) , and the width of the marginal region of Ω 0 is 20 km. The distribution of monitoring priority in domain Ω 0 is shown in Figure 2.

3.1.3. The Objective Function in Sensor Deployment

Note that the number of sensors applied to monitor the domain Ω 0 is m . Assume that the sensing domain of each sensor is regarded as a circle with the sensing radius R , and its center is exactly the sensor. If the point c is detected by m c sensors at the same time, note that the target detecting probabilities at c by the sensors are { p d ( 1 ) , p d ( 2 ) , , p d ( m c ) } ; then the joint target detecting probability at c is p d ( * m c ) = 1 i = 1 m c ( 1 p d ( i ) ) , and the false dismissal probability at c is p g ( * c ) = i = 1 m c ( 1 p d ( i ) ) .
The target detecting risk at c can be calculated according to the definition of risk as follows:
r i s k 1 c = p g * c × f c
When a sensor network is deployed, the average target detecting risk of Ω 0 should be decreased to the minimum, then the optimal sensor deployment scheme can be calculated by the following:
π = arg min E ( r i s k 1 ) = arg min Ω 0 r i s k 1 c / S Ω 0
where E ( · ) is the mean calculation, E ( r i s k 1 ) is the average target detecting risk, and S Ω 0 is the area of Ω 0 .

3.2. Target Tracking Model and Sensor Scheduling Model

3.2.1. Calculation of Target Missing Probability

Note that the motion state of target t at the time instant k is X k = [ x k , x ˙ k , y k , y ˙ k ] T .
The state transition matrix is F = [ 1 T 0 0 0 1 0 0 0 0 1 T 0 0 0 1 ] , where T is the sampling period and T = 1 s .
At the time instant k + 1 , the motion state of target t is X k + 1 = F X k + W , where W is the process evolution noise, following the Gaussian distribution; the mean value is 0; and the covariance matrix is Q = [ T 4 / 4 σ x 2 T 3 / 2 0 0 T 3 / 2 σ x 2 T 2 σ x 2 0 0 0 0 T 4 / 4 σ y 2 T 3 / 2 σ y 2 0 0 T 3 / 2 σ y 2 T 2 σ y 2 ] , where σ x and σ y are noise power spectral densities and σ x = σ y = 1 .
At the time instant k + 1 , the measurement of sensor s to target t is Y k + 1 = h ( X k + 1 ) + V k , where V k is the measurement noise, following the Gaussian distribution; the mean value is 0; and the covariance matrix is R k = d i a g ( ( σ k r ) 2 , ( σ k α ) 2 ) .
In this paper, h ( X k + 1 ) = [ d k + 1 , α k + 1 ] T , where d k + 1 = ( x k + 1 x 0 ) 2 + ( y k + 1 y 0 ) 2 is the distance from sensor s to target t , α k + 1 = arctan x k + 1 x 0 y k + 1 y 0 is the azimuth of target t , and ( x 0 , y 0 ) is the coordinate of sensor s .
The variables σ k r and σ k α are the function values of SNR, and they are given by the following [44]:
σ k r = σ c a l r S N R c a l / S N R
σ k α = σ c a l α S N R c a l / S N R
In this paper, when S N R c a l = 50   dB , P c a l = 1   k W , τ c a l = 10   m s , r c a l = 20   k m , and S N R c a l = 50   dB , σ c a l r = 200   m and σ c a l α = 0.1   r a d .
The extended Kalman filtering is used to estimate the motion state of targets as follows:
{ X ¯ k + 1 | k = F X ^ k | k P ¯ k + 1 | k = F P ^ k | k F T + Q k S k = H k P ¯ k + 1 | k H k T + R k K k = P ¯ k + 1 | k H k T S k 1 X ^ k + 1 | k + 1 = X ¯ k + 1 | k + K k ( Y k + 1 h ( X ¯ k + 1 | k ) ) P ^ k + 1 | k + 1 = ( I K k H k ) P ¯ k + 1 | k
After linearization, it can be obtained that H k = h X k , which can be calculated as follows:
H k = [ Δ x l Δ y l 0 0 Δ y l 2 Δ x l 2 0 0 ]
where Δ x = x k + 1 | k x 0 , Δ y = y k + 1 | k y 0 , and l = ( Δ x ) 2 + ( Δ y ) 2 .
During target tracking, the target missing probability is related to the target detecting probability and the precision of the motion state estimation. In other words, when the target is not missed, there are two requirements that need to be satisfied. One is that the target should be in the beam of the sensor, and the other one is that the target can be detected by the sensor.
As Figure 3 shows, the motion state estimation of target t follows the Gaussian distribution N ( X ^ k | k , P ^ k | k ) [45]. Suppose that the beam a is focused on ( x ^ k | k , y ^ k | k ) , the probability that the target is in the beam a is p g , and the sensing radius of a sensor is R . p g can be calculated as follows:
p g = Ω 1 f ( x , y ) d x d y
f ( x , y ) = 1 2 π σ ^ k | k x e ( x x ^ k | k ) 2 ( σ ^ k | k x ) 2 · 1 2 π σ ^ k | k y e ( y y ^ k | k ) 2 ( σ ^ k | k y ) 2
where Ω 1 is the covered domain by beam a .
In this paper, the width of beam a is θ = 0.1 , and R = 100   k m .
The target missing probability can be calculated by the following:
p m = 1 p d p g = 1 0.5 e r f c ( ln p f S N R + 0.5 ) Ω 1 2 π σ ^ k | k x e ( x x ^ k | k ) 2 ( σ ^ k | k x ) 2 · 1 2 π σ ^ k | k y e ( y y ^ k | k ) 2 ( σ ^ k | k y ) 2 d x d y

3.2.2. Calculation of Target Threat Priority

In this paper, the target threat priority is related to the distance from the target to the monitoring center and the velocity of the target. If the target t is in the monitoring domain Ω 0 , a shorter distance d will result in higher target threat priority. Similarly, a larger velocity | | v | | will lead to higher target threat priority. The target threat priority γ of target t can be calculated as follows:
γ = { exp ( d 2 ( k 0 | | v | | + m 0 ) 2 ) ( 0 , 1 ) , 0 d α 0 , d > α
where k 0 and m 0 are coefficients, and k 0 = 1 and m 0 = 100 in this paper.
The target threat priorities with different distances and velocities are displayed in Figure 4.

3.2.3. The Objective Function in Sensor Scheduling

In the sensor network, there are m sensors applied to defend the domain Ω 0 , and at the time instant k , n k ( m > n k ) targets are detected and tracked. Note that the sensor scheduling scheme is a m × n k matrix U k , where u k i , j is the element in the i th row and j th column. When u k i , j = 1 , sensor s i is used to track target t j at time k , and when u k i , j = 0 , this means that sensor s i is not used to track target t j at the time instant k . When j = 1 n u k i , j = 0 , sensor s i is not used to track any target, but rather to detect targets.
Once a sensor is used to track a target, the target tracking precision can be improved with the target tracking risk reducing, but the sensor cannot monitor the domain and detect other targets any longer, so the latter emerging targets may be not detected by this sensor with the target detecting risk increasing. The two kinds of risk are not independent. Therefore, when scheduling sensors, both the target detecting risk and the target tracking risk should be taken into consideration.
As the target detecting risk and the target tracking risk are both added to the objective function when conducting sensor scheduling, the optimal sensor scheduling scheme can be calculated by the following:
π = arg min { β 1 E ( r i s k 1 ) + β 2 E ( r i s k 2 ) } = arg min { β 1 ( Ω 0 r i s k 1 c / S Ω 0 ) + β 2 ( i = 1 m j = 1 n k u k i , j r i s k 2 i , j / n k ) }
where r i s k 1 c is the target detecting risk and can be calculated by Equation (9); r i s k 2 i , j = p m i , j γ j is the target tracking risk; p m i , j is the target missing probability when target t j is being tracked by sensor s i ; and β 1 and β 2 are the weights, which represent the importance of the target detecting mission and the target tracking mission, respectively. In this paper, β 1 = β 2 = 1 .
Subject to the following:
(1)
Each target is tracked by only one sensor, therefore i = 1 m u k i , j = 1 .
(2)
Each sensor processes two kinds of working mode, target detecting and target tracking, but it can select only one working mode at any moment. Furthermore, when a sensor selects the target tracking mode, it can track only one target, namely j = 1 n k u k i , j 1 .
(3)
Sensor s i can detect target t j at the time instant k only if the target emerges in the detecting area of sensor s i , namely d k i , j R .

4. Algorithm Design

The artificial bee colony (ABC) algorithm proposed by Karaboga [46] has been studied and applied widely, owning to its unique advantages like a simple form and easy implementation. However, it still has some disadvantages, including being prone to sticking into a local optimum and a slow convergence rate in late computation. By contrast, the particle swarm optimization (PSO) algorithm can effectively avoid these defects by applying the optimal value to update positions of particles. In this paper, ABC and POS are combined. To further improve the global searching capability of the algorithm, double-probability is brought in, thus the improved double-probability particle bee colony algorithm is proposed. The improved algorithm is exhibited as follows:
(1)
n 1 nectar sources (feasible schemes) are first provided, and the i th nectar source can be given utilizing the following equation:
x i j = x j min + r a n d ( 0 , 1 ) ( x j max x j min ) , i ( 1 , 2 , , n 1 ) , j ( 1 , 2 , , n 2 )
where x i j is the j th dimension value of i th nectar source; x j max and x j min are the maximum and minimum values of the j th dimension in the i th nectar source, respectively; r a n d ( 0 , 1 ) is a random number satisfying uniform distribution between 0 to 1; and n 2 is the total dimensions of a feasible scheme.
(2)
Each nectar source is assigned a searching bee and searched around n 3 times. Once the new source is better than the old one, the old source is replaced by the new one. The nectar source searching equation is shown as follows:
y i j = x i j + r a n d n ( 1 , 1 ) ( x i j x i q )
where y i j is the j th dimension value of the i th new nectar source, x i q is a random neighborhood of the current nectar source, and r a n d n ( 1 , 1 ) is a random number satisfying the uniform distribution between −1 and 1.
(3)
Calculate the fitness value of updated n 1 nectar sources according to Equation (10) or Equation (19) separately.
(4)
Searching bees return to the honeycomb and change into leading bees. n 4 and n 5 following bees choose different leading bees according to the forward probability and reverse probability separately. The following bees go after their chosen leading bees to related nectar sources and search new sources according to Equation (21). The forward probability and reverse probability are shown by Equation (22) [47] and Equation (23).
p i = f ( X i ) i = 1 n 1 f ( X i )
q i = 1 / f ( X i ) i = 1 n 1 1 / f ( X i )
where p i and q i are the chosen probabilities of i th nectar source according to the forward probability and the reverse probability, respectively.
(5)
If a nectar source has never been updated continuously up to n 6 times, this nectar source can be discarded, and a new nectar source can be obtained by Equation (20) or Equation (24) randomly.
{ x i j = x i j + v i j v i j = σ 1 v i j + c 1 r a n d ( 0 , 1 ) ( x p j x i j ) + c 2 r a n d ( 0 , 1 ) ( x g j x i j )
where v i j is the speed of j th dimension, σ 1 is the inertia weight, c 1 and c 2 are positive constants, x p j is the local optimum of j th dimension, and x g j is the global optimum of the j th dimension.
(6)
Make a judgment of whether the maximum number of iterations is reached. If reached, end the algorithm, otherwise, go back to (3).

5. Simulations

5.1. Simulations of Sensor Deployment

Before the sensor network is optimized, sensors in the networks are ordered as shown in Figure 5a. It can be found that in Figure 5a, 12 sensors are uniformly distributed in a 100 km radius circle. During each scanning period, the radiation time and radiation power are τ c a l = 10   m s and P c a l = 1   k W , respectively. The target detecting probability in Ω 0 is distributed as shown in Figure 5a, and the target detecting risk in Ω 0 is distributed as shown in Figure 5b. Before optimization, the average target detecting risk of Ω 0 is 0.2922.
Three different algorithms are applied to optimize the sensor distribution, and the three algorithm iteration curves are shown in Figure 6. It should be noted that algorithm 1 denotes the double-probability particle bee colony algorithm, algorithm 2 denotes the basic artificial bee colony algorithm, and algorithm 3 denotes the improved bee colony algorithm in another paper [47]. In the calculations, the number of leading bees is 10, the number of following bees is 50, and the number of calculation iterations is 100.
It can be seen from Figure 6 that algorithm 1 outperforms algorithm 2 and algorithm 3 in convergence speed and solution quality. After optimization, the average target detecting risk of Ω 0 is 0.2658, and the optimized sensor deployment (target detecting probability distribution) and detecting risk distribution are shown in Figure 7.
The sensor deployment scheme (coordinates of 12 sensors) calculated by algorithm 1 is shown as follows:
s 1 (115, 112), s 2 (138, −124), s 3 (−128, −121), s 4 (−118, 131), s 5 (3, 118), s 6 (132, −8), s 7 (10, −113), s 8 (−126, 5), s 9 (10, −2), s 10 (−1, 14), s 11 (12, −96), s 12 (85, 78).
From the comparison of Figure 5 and Figure 7, it can be concluded that after optimization, except for gathering at the center of the domain, sensors also tend to move to margins where monitoring priorities are also pretty high.

5.2. Simulations of Sensor Scheduling

At the time instant k = 0 , four targets were detected in the domain Ω 0 , and their initial motion states are as follows:
x ^ 0 | 0 1 = ( 168 , 0.3 , 48 , 0.4 ) T ; x ^ 0 | 0 2 = ( 81 , 0.5 , 154 , 0.5 ) T ; x ^ 0 | 0 3 = ( 176 , 0.7 , 38 , 0.1 ) T ; x ^ 0 | 0 4 = ( 32 , 0 , 165 , 0.5 ) T .
Applying the three algorithms to calculate sensor scheduling scheme, the calculation results are shown in Figure 8. In the calculations, the number of leading bees is 10, the number of following bees is 50, and the number of calculation iterations is 15.
It can be seen from Figure 8 that algorithm 1 outperforms algorithm 2 and algorithm 3 in convergence speed and solution quality. The numbers of iterations in solving the problem of sensor scheduling is greatly reduced in comparison with that in solving the problem of sensor deployment. The reason for this is that while conducting sensor scheduling, sensors can only detect targets that are in their sensing domains. Therefore, although the total number of different kinds of sensor scheduling schemes is 12 ! / 8 ! using 12 sensors to detect 4 targets, most of the schemes can be kicked off. At the time instant k = 0 , target t 1 can be detected by sensors { s 4 , s 8 } , target t 2 can be detected by sensors { s 3 , s 7 } , target t 3 can be detected by sensors { s 2 , s 6 } , and target t 4 can be detected by sensors { s 1 , s 5 , s 12 } . The number of choices in sensor scheduling is actually only 24.
While sensors are scheduled to track targets, the average target detecting risk of Ω 0 is 0.3605, the average target tracking risk is 0.2201, and the total risk is 0.5806. The sensor–target allocation scheme is as follows: t 1 s 8 , t 2 s 3 , t 3 s 2 , t 4 s 5 .
The target detecting probability in Ω 0 is shown in Figure 9a, and the target detecting risk in Ω 0 is distributed as shown in Figure 9b.
Comparing Figure 7 and Figure 9, it can be discovered that with the appearance of the target, the detecting capability of the sensor network decreases and the target detecting risk increases due to undertaking the mission of target tracking.

5.3. Simulations of Sensor Scheduling during a Time Period

In a time period k [ 0 , 50 T ] ( T = 1 s ) , the sensor scheduling schemes vary as shown in Figure 10. Figure 10a–d show the target trajectories, sensor–target allocations, target threat priorities, and risks in the mentioned time period of k [ 0 , 50 T ] , respectively.
Comparing Figure 10a and Figure 10c, as the targets move close to the monitoring center, the target threat priorities increase. In the comparison of Figure 10b and Figure 10d, once the sensor–target allocation scheme changes, the sensor detecting risk changes as well, and when targets are close to the monitoring center, sensors near the monitoring center are used to track targets, thus the target detecting risk increases prominently. From Figure 10d, compared with the target detecting risk, the target tracking risk performs more randomly. The reason for this is that the tracking risk is not only related to the target detecting probability, but also to the precision of target motion state estimation, which performs more randomly. It will also be transmitted to the total risk (the sum of the target detecting risk and the target tracking risk).

5.4. Influences of the Weights to Sensor Scheduling Schemes

In the above simulations, the weights are set as β 1 = β 2 = 1 , that is to say, the target detecting risk and the target tracking risk are of equal importance. In this section, the influences of weights on sensor scheduling schemes are studied.
The initial motion state of target t 5 is x ^ 0 | 0 5 = ( 40 , 0 , 200 , 1 ) T at the time instant k = 0 . In the simulation, three different cases in which β 1 = 1 β 2 = 0 , β 1 = 0 β 2 = 1 , and β 1 = β 2 = 1 are considered. In these cases, sensor scheduling processes during the time period of k [ 0 , 400 ] are shown in Figure 11.
Figure 11a–d show the target trajectory, sensor–target allocations, target tracking risks, and target detecting risks in the time period of k [ 0 , 400 ] , respectively.
From Figure 11, when β 1 = 1 β 2 = 0 , sensors are scheduled in obedience with the minimum target detecting risk rule, and in this case, the target detecting risk is the minimum, but the target tracking risk is not the most optimal. When β 1 = 0 β 2 = 1 , sensors are scheduled in obedience with the rule of the minimum target tracking risk, and in this case, the target tracking risk is minimal, but the target detecting risk is not the most optimal. When β 1 = β 2 = 1 , sensors are scheduled in obedience with the minimum total risk rule (the sum of the target detecting risk and the target tracking risk), and the target tracking risk and the target detecting risk are taken into account at the same time.
Furthermore, in contrast, sensor scheduling models are established for individual combat missions in the literature [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25], belonging to the first two sensor scheduling approaches mentioned in the introduction. However, obviously, because of the various situations in the battle field, targets do not reach the monitoring domain simultaneously. All targets must be detected and tracked upon arriving. Therefore, during target-tracking missions, the sensor network should also keep watching to capture unknown targets simultaneously—only by doing so, targets can be detected and tracked in real time. As for target detecting and tracking discussed in this paper, taking the first two sensor scheduling approaches, utilizing the technical indicators—which are target detecting probability and target tracking precision in these cases—to model the objective function following a weighted-sum approach, the combination cannot make physical or operational sense [26]. Only the risk-based sensor approach can be better applied to sensor scheduling in the case of multi-missions, with their physical sense being risk.

6. Conclusions

In this paper, a sensor management (including sensor deployment and sensor scheduling) approach based on risk theory is proposed, considering both the target detecting and tracking. Firstly, the sensor deployment approach is studied. The target detecting risk is defined and its computing method is provided. The minimum target detecting risk rule is employed to establish the sensor deployment model. Secondly, the sensor scheduling approach is studied, with the target tracking risk defined and its computing method proposed. The sensor scheduling model is established, combining both the target detecting risk and the target tracking risk. Furthermore, in order to solve the sensor deployment and scheduling objective functions, an improved artificial bee colony algorithm, namely the double-probability particle bee colony algorithm, is designed. Finally, simulations are conducted and the experiment results indicate that the models and the algorithm in this paper have some advantages over the existing ones. With combat situations becoming more complex and more diverse, sensor scheduling models aiming at an individual combat missions seem to struggle to meet current requirements. Therefore, increasing attention is being paid by researchers across the world to solve the fairly difficult problem. In the future, further study will be conducted on combinations of target tracking, target recognition, and target threat priority assessment.

Author Contributions

All authors contributed significantly to the writing and/or final editing of the manuscript. C.P. conceived the ideas of theory and wrote the paper. G.S. final edited the paper. X.D. and G.X. Checked and corrected the paper.

Funding

This research was funded by DPRFC (Defense Pre-Research Fund Project of China), grant number 012015012600A2203, and NSFC (Natural Science Foundation of China), grant number 61573374.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nash, J.M. Optimal allocation of tracking resource. In Proceedings of the IEEE Conference on Decision and Control, New Orleans, LA, USA, 7–9 December 1977; pp. 1177–1180. [Google Scholar]
  2. Evans, J.; Krishnamurthy, V. Optimal sensor scheduling for Hidden Markov Model state estimation. Int. J. Control 2001, 74, 1737–1742. [Google Scholar] [CrossRef]
  3. Chhetri, A.S.; Orrell, D.; Papandreou, S.A. On the use of binary programming for sensor scheduling. IEEE Trans. Signal Process. 2007, 55, 2826–2839. [Google Scholar] [CrossRef]
  4. Ahmad, B.A.; Syed, T.J.; Stephen, L.S. A complete greedy algorithm for infinite-horizon sensor scheduling. Automatica 2017, 281, 335–341. [Google Scholar]
  5. Castanon, D.A. Approximate dynamic programming for sensor management. In Proceedings of the 36th IEEE Conference on Decision and Control, New Orleans, LA, USA, 7–9 December 1977; Volume 2, pp. 1202–1207. [Google Scholar]
  6. Hoang, H.G.; Vo, B.T. Sensor management for multi-target tracking via multi-Bernoulli filtering. Automatica 2014, 50, 1135–1142. [Google Scholar] [CrossRef] [Green Version]
  7. Kevin, M.N.; Jonathan, T.B. An autonomous sensor management strategy for monitoring a dynamic space domain with diverse sensors. In Proceedings of the 2018 AIAA Information Systems, Kissimmee, FL, USA, 8–12 January 2018; pp. 1–29. [Google Scholar]
  8. Fang, D.L.; Ren, X.M.; Li, O. Energy efficient distributed sensor management algorithm. J. Xidian Univ. 2017, 44, 171–177. [Google Scholar]
  9. Saurav, S.; Yimin, D.Z.; Moeness, G.A. Cramer–Rao type bounds for sparsity-aware multi-sensor multi-target tracking. Signal Process. 2018, 145, 68–77. [Google Scholar]
  10. Yang, C.; Kaplan, L.; Blasch, E. Performance measures of covariance and information matrices in resource management for target state estimation. IEEE Trans. Aerosp. Electron. Syst. 2012, 48, 2594–2613. [Google Scholar] [CrossRef]
  11. Siddharth, J.; Stephen, B. Sensor selection via convex optimization. IEEE Trans. Signal Process. 2009, 57, 451–462. [Google Scholar]
  12. Wayes, T.; Nipun, W.; Wen, T.L.; Chau, Y.H.; Vincent, P.; Tapan, K.S.; Kristin, L.W. Internet of things for green building management: Disruptive innovations through low-cost sensor technology and artificial intelligence. IEEE Signal Process. Mag. 2018, 3, 100–110. [Google Scholar]
  13. Yan, T.; Han, C.Z. Sensor management for multi-target detection and tracking based on PCRLB. In Proceedings of the 2017 20th International Conference on Information Fusion, Xi’an, China, 10–13 July 2017. [Google Scholar]
  14. Hong, H.G.; Maule, R. The Cauchy-Schwarz divergence for Poisson point process. IEEE Trans. Aerosp. Electron. Syst. 2015, 61, 4475–4485. [Google Scholar]
  15. Tharmarasa, R.; Kirubajan, T. Decentralized sensor selection for large-scale multisensor-multitarget tracking. IEEE Trans. Aerosp. Electrion. Syst. 2011, 47, 1307–1324. [Google Scholar] [CrossRef]
  16. Mario, B.I.M.; Ivan, P. Score matching based assumed fensity filtering with the von mises-Fisher distributed. In Proceedings of the 2017 20th International Conference on Information Fusion, Xi’an, China, 10–13 July 2017; pp. 433–438. [Google Scholar]
  17. Sayin, M.O.; Lin, C.W.; Shiraishi, S.; Shen, J.; Başar, T. Information-driven autonomous intersection control via incentive compatible mechanisms. IEEE Trans. Intell. Transp. Syst. 2018, 99, 1–13. [Google Scholar] [CrossRef]
  18. Ferri, G.; Andera, M.; Kevin, D.L. An autonomous underwater vehicle data-driven control strategy for target tracking. IEEE J. Ocean. Eng. 2018, 43, 323–343. [Google Scholar] [CrossRef]
  19. Li, Y.; Devesh, K.; Jha, A.R.; Thomas, A.W. Information-theoretic performance analysis of sensor networks via Markov modeling of time series data. IEEE Trans. Cybern. 2018, 48, 1898–1909. [Google Scholar] [CrossRef] [PubMed]
  20. Li, W.; Han, C.Z. Dual sensor control scheme for multi-target tracking. Sensors 2018, 18, 1653. [Google Scholar] [CrossRef] [PubMed]
  21. Bolderheij, F.; Absil, F.; Van, G.P. A risk-based object-oriented approach to sensor management. In Proceedings of the 8th International Conference on Information Fusion, Philadelphia, PA, USA, 25–29 July 2005; Volume 1, p. 8. [Google Scholar]
  22. Wang, Y.; Hussein, I.I.; Erwin, R.S. Risk-based sensor management for integrated detection and eistimation. In Proceedings of the 2011 American Control Conference, San Francisco, CA, USA, 29 June 29–1 July 2011; pp. 168–189. [Google Scholar]
  23. Sean, M. Risk-based sensor resource management for field of view constraint sensor. In Proceedings of the 18th International Conference on Information Fusion, Washington, DC, USA, 6–9 July 2015; pp. 2041–2048. [Google Scholar]
  24. Marcos, E.G.B.; Dominique, M.; Philippe, V. Sensor management using expected risk reduction approach. In Proceedings of the 19th International Conference on Information Fusion, Heidelberg, Germany, 5–8 July 2016; pp. 2050–2058. [Google Scholar]
  25. Marcos, E.G.B.; Dominique, M.; Philippe, V. A risk-based sensor management using random finite sets and POMDP. In Proceedings of the 20th International Conference on Information Fusion, Xi’an, China, 10–13 July 2017; pp. 1588–1596. [Google Scholar]
  26. Fptios, K.; Hans, D.; Alexander, Y. Threat-based sensor management for target tracking. IEEE Trans. Aerosp. Electron. Syst. 2015, 51, 2772–2784. [Google Scholar]
  27. Gostar, A.; Hoseinnezhad, R.; Weifebg, L. Sensor-management for multi-target filters via minimization of posterior dispersion. IEEE Trans. Aerosp. Electron. Syst. 2017, 53, 2877–2884. [Google Scholar] [CrossRef]
  28. Ozturk, O.; Begen, M.A.; Zaric, G.S. A branch and bound algorithm for scheduling unit dize jobs on parallel batching machines to minimize makespan. Int. J. Prod. Res. 2017, 55, 1815–1831. [Google Scholar] [CrossRef]
  29. Stiven, S.D.; Marcelo, G.S.B. Cooperative target tracking using decentralized particle filtering and RSS sensors. IEEE Trans. Signal Process. 2013, 61, 3632–3646. [Google Scholar]
  30. Mohammed, A.Z.; Nabil, Z.S.; Shigenobu, S.; Sabah, M.A. A centralized immune-voronoi deployment algorithm for coverage maximization and energy conservation in mobile wireless sensor networks. Information Fusion. 2016, 30, 36–51. [Google Scholar]
  31. Tkach, I.; Jevtić, A.; Nof, S.Y.; Edan, Y. A modified distributed bees algorithm for multi-sensor task allocation. Sensors 2018, 18, 759. [Google Scholar] [CrossRef] [PubMed]
  32. Sang, J.Y.; Anish, P.S.; Seo, M.; Han, C.H.; Minho, P.; Lee, K.E. Joint spectrum sensing and resource allocation optimization using genetic algorithm for frequency hopping–based cognitive radio networks. Int. J. Commun. Syst. 2018, 31, e3733. [Google Scholar]
  33. Vaishali, R.; Kulkarni, V.D. Computational intelligence for localization of mobile wireless sensor networks. Adv. Intell. Syst. Comput. 2018, 2, 449–463. [Google Scholar]
  34. Liu, X.M.; Guo, Y.; Li, W.; Hua, M.; Ding, E.J. A complete feasible and nodes-grouped scheduling algorithm for wireless rechargeable sensor networks in tunnels. Sensors 2018, 18, 3410. [Google Scholar] [CrossRef] [PubMed]
  35. Enrique, C.N.; Alfredo, G.; Lin, C.Y. A game-theoretic approach to efficient power management in densor networks. Oper. Res. 2008, 56, 552–556. [Google Scholar]
  36. Fu, Y.F.; Ling, Q.; Tian, Z. Distributed sensor allocation for multi-target tracking in wireless sensor networks. IEEE Trans. Aerosp. Electron. Syst. 2012, 48, 3538–3553. [Google Scholar] [CrossRef]
  37. Severson, T.A.; Derek, A.P. Distributed multitarget search and track assignment with consensus-based coordination. IEEE Sens. J. 2015, 15, 864–875. [Google Scholar] [CrossRef]
  38. Peyman, N.; Mahmoud, N.Z.; Saeid, A.; Yaghmaee, M.H. Distributed clustering-task scheduling for wireless sensor networks using dynamic hyper round policy. IEEE Trans. Mob. Comput. 2018, 17, 334–347. [Google Scholar]
  39. Jia, B.; Pham, K.D.; Blasch, E.; Shen, D. Consensus-based auction algorithm for distributed sensor management in space object tracking. In Proceedings of the 2017 IEEE Aerospace Conference, Big Sky, MT, USA, 4–11 March 2017; pp. 1–8. [Google Scholar]
  40. Hemalatha, S.V.; Malathi, S.; Scholar, P.G. Auction based patient health detection scheme using group management techniques in wireless sensor networks. Int. J. Eng. Sci. Comput. 2018, 8, 18342–18345. [Google Scholar]
  41. Rahmani, H.A.A.; Babaee, T.E. A gravitational emulation local search algorithm for task scheduling in multi-agent system. Int. J. Appl. Optim. Stud. 2018, 1, 11–24. [Google Scholar]
  42. Mahafza, B.R. Radar Systems Analysis and Design Using MATLAB, 2nd ed.; Publishing House of Electronics Industry: Beijing, China, 2008; pp. 201–231. [Google Scholar]
  43. Alexander, G.; Voronovich; Valery, U.Z. Bistatic radar equation for signals of opportunity revisited. IEEE Trans. Geosci. Remote Sens. 2018, 56, 1959–1968. [Google Scholar]
  44. Alexey, S.; Narykov; Alexander, Y. Sensor selection algorithm for optimal management of the tracking capability in multisensor radar system. In Proceedings of the 2013 European Microwave Conference, Nuremberg, Germany, 6–10 October 2013; pp. 499–502. [Google Scholar]
  45. James, Z.; Hare, S.G.; Thomas, A. POSE: Prediction-based opportunistic sensing for energy efficiency in sensor networks using distributed supervisors. IEEE Trans. Cybern. 2017, 48, 2114–2127. [Google Scholar]
  46. Kanaboga, D.; Basturk, B. A comparative study of artificial bee colony algorithm. Appl. Soft Comput. 2008, 8, 687–696. [Google Scholar] [CrossRef]
  47. Ning, J.; Liu, T.T.; Zhang, C.; Zhang, B. Source-updating information-guided artificial bee colony algorithm. Neural Comput. Appl. 2018, 30, 775–787. [Google Scholar] [CrossRef]
Figure 1. The monitoring domain.
Figure 1. The monitoring domain.
Electronics 08 00071 g001
Figure 2. The distribution of the monitoring priority in domain Ω0.
Figure 2. The distribution of the monitoring priority in domain Ω0.
Electronics 08 00071 g002
Figure 3. The domain covered by beam a and the position distribution of target t .
Figure 3. The domain covered by beam a and the position distribution of target t .
Electronics 08 00071 g003
Figure 4. The target threat priorities with different distances and velocities.
Figure 4. The target threat priorities with different distances and velocities.
Electronics 08 00071 g004
Figure 5. Sensor deployment before optimization. (a) Target detecting probability distribution; (b) target detecting risk distribution.
Figure 5. Sensor deployment before optimization. (a) Target detecting probability distribution; (b) target detecting risk distribution.
Electronics 08 00071 g005aElectronics 08 00071 g005b
Figure 6. Algorithm iteration curves.
Figure 6. Algorithm iteration curves.
Electronics 08 00071 g006
Figure 7. Sensor deployment after optimization. (a) Target detecting probability distribution; (b) target detecting risk distribution.
Figure 7. Sensor deployment after optimization. (a) Target detecting probability distribution; (b) target detecting risk distribution.
Electronics 08 00071 g007
Figure 8. Algorithm iteration curves.
Figure 8. Algorithm iteration curves.
Electronics 08 00071 g008
Figure 9. Sensor deployment after scheduling. (a) Target detecting probability distribution; (b) target detecting risk distribution.
Figure 9. Sensor deployment after scheduling. (a) Target detecting probability distribution; (b) target detecting risk distribution.
Electronics 08 00071 g009
Figure 10. Sensor scheduling process.
Figure 10. Sensor scheduling process.
Electronics 08 00071 g010
Figure 11. Comparisons of sensor scheduling in different sensor weights.
Figure 11. Comparisons of sensor scheduling in different sensor weights.
Electronics 08 00071 g011

Share and Cite

MDPI and ACS Style

Pang, C.; Shan, G.; Duan, X.; Xu, G. A Multi-Mode Sensor Management Approach in the Missions of Target Detecting and Tracking. Electronics 2019, 8, 71. https://doi.org/10.3390/electronics8010071

AMA Style

Pang C, Shan G, Duan X, Xu G. A Multi-Mode Sensor Management Approach in the Missions of Target Detecting and Tracking. Electronics. 2019; 8(1):71. https://doi.org/10.3390/electronics8010071

Chicago/Turabian Style

Pang, Ce, Ganlin Shan, Xiusheng Duan, and Gongguo Xu. 2019. "A Multi-Mode Sensor Management Approach in the Missions of Target Detecting and Tracking" Electronics 8, no. 1: 71. https://doi.org/10.3390/electronics8010071

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop