An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 8
Abstract
Wireless sensor networks (WSN) have been considered as a promising system for area surveillance applications. As it moves through a sensor network target tracking has become an increasingly important application in Wireless Sensor Networks. Target detection deals with finding spatial coordinates of a moving object and tracking deals with finding the coordinates and being able to track its movements. Tracking mobile targets using sensor networks is a challenging task. Existing work mostly requires organizing groups of sensor nodes with measurements of a target’s movements or accurate distance measurements from the nodes to the target, and predicting those movements. These are, however, often difficult to accurately achieve in practice, especially in the case of unpredictable environments, sensor faults, etc .In such cases the new tracking framework, called FaceTrack, suits best. FaceTracking employs the nodes of a spatial region surrounding a target, called a face. If a target is detected by a node after a time window, a target is detected by another node. It is assumed to be the same target or single object in FaceTracking method. But it achieves better tracking accuracy and energy efficiency for detecting and tracking single object. This paper proposes a new approach for multi target detection using FaceTracking or polygon tracking method. Simulations are carried out to underline the energy efficiency of the proposed method using NS2
Authors and Affiliations
Josna Jose Vadakkan
Turbo-matching of A58N70 Turbo-charger for a Commercial Vehicle Engine
Turbocharger is a Charge booster, which helps the automobiles, especially at higher loads by providing best operating performance. The adaption of such turbocharger for the desired engine is a tedious job and requires in...
Security to Anonymous Network
In the today’s world there is mainly people are concentrate on the security and privacy of the data. As there is some change in security system behavior it not as per user intension. In the network some people make unint...
Survey Of Enterprise Content Managemnet On Cloud
At present, the attention of many organizations concentrates on the Enterprise Content Management System (ECM). Unstructured content grows exponentially, and Enterprise Content Management system helps to capture, store,...
Investigation on Three-dimensional viscoelastic nanofluid with Newtonian heating and binary chemical reaction
This paper investigated the steady three dimensional boundary layer flow of an incompressible viscoelastic nanofluid in the presence of Newtonian heating and chemical reaction. A mathematical formulation has designed for...
Passive IP Traceback: Tracing spoofer IP and Blocking IP spoofer from Data access using Greedy Algorithm
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Internet Service Providers (ISPs). This article...