MULTI TARGET TRACKING USING IDOL IN SENSOR NETWORKS?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)Publication Date: 2014-04-30
Authors : M.Navanidha; V.Nirosha;
Page : 874-878
Keywords : Sensor Networks; Localization; Energy Efficiency; Network Lifetime;
Abstract
The target tracking is one of the most important applications of wireless sensor networks. When nodes operate in a duty cycling mode, tracking performance can be improved if the target motion can be predicted and nodes along the trajectory can be proactively awakened. This will negatively influence the energy efficiency and constrain the benefits of duty cycling. A Probability-based Prediction and Sleep Scheduling protocol (PPSS) to improve energy efficiency of proactive wake-up. Based on the prediction results, PPSS then precisely selects the nodes to awaken and reduces their active time. A target prediction scheme based on both kinematics rules and theory of probability, PPSS not only predicts a target?s next location, but also describes the probabilities with which it moves along all the directions. The single target tracking is carried out. Multi Targets are to be tracked in next phase. Using Centralized Device, the Network is to be monitor and the security is to be provided.when nodes operate in single target tracking,the tracking performance can be low transmission delay, high energy consumption and less network lifetime. In the proposed system, multi target tracking are used. The IDOL techniques is used to identify, detect and localize the target.Two sensor nodes are used easy to sensing and to detect the target.By using these technique to improve the energy efficiency and network lifetime. The result revealed that the proposed methods effectively to increase the energy efficiency compared to the existing methods. IDOL system is to localize attackers. Simulation is performed in Network Simulator.Spoofing prevention mechanism will be incorporated in future.
Other Latest Articles
- IMAGE RECOGNITION BASED CROP DISEASE IDENTIFICATION SYSTEM: A SURVEY
- Correlation Based Feature Selection with Irrelevant Feature Removal?
- BIRCH and DB-scan Techniques in Phishing and Malware Detection?
- PEER-TO-PEER AD HOC NETWORK: AN OVERVIEW?
- ANALYSIS OF FIREWALL TECHNOLOGY IN COMPUTER NETWORK SECURITY
Last modified: 2014-04-26 02:02:06