PIR-Based WSN for Outdoor Deployment

advertisement
PIR-Based WSN for Outdoor Deployment
Arpan Chattopadhyay, Raviteja Upadrashta, Abhijit Bhattacharya, Tarun Choubisa,
Anu Krishna, V. S. Aswath, S. Vikas, Christo Thomas, Akhila Rao, Bharat Dwivedi
S. V. R. Anand, Anurag Kumar, P. Vijay Kumar
Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore, 560012, India
T. V. Prabhakar, Madhuri S. Iyer, B. S. Sudhangathan, Sripad Kowshik
Department of Electronic Systems Engineering, Indian Institute of Science, Bangalore, 560012, India
Abstract—The aim of this paper is to discuss the application of
passive infrared sensors to the problem of intrusion detection and
classification in the presence of sources of clutter. Intruders are
to be classified as being human or animal and sources of clutter
include swaying vegetation and hot-air currents. The paper
includes background on passive infrared sensing, an overview
of the past experience by the authors in building a PIR-based
intrusion detection demonstration system called SmartDetect, as
well as a description of a wildlife conservation project in which
the authors are currently engaged in. A description of some
approaches that are currently being pursued as well as current
progress is included. Several aspects of an intrusion detection
system are covered here, including signal processing algorithms
that make for reliable detection, networking algorithms that will
allow the processed signals from the sensors to be relayed back
to the base station in the presence of uncertainties in terrain and
node placement, as well as energy-efficient methods of operation
including energy harvesting.
Index Terms—Wireless sensor network, Passive Infrared sensor
review, Node placement, Intrusion detection and classification.
I. I NTRODUCTION
Passive Infra-Red (PIR) sensors have for long been used
for detecting human motion in various indoor applications
such as security [1], [2], smart homes [3], [4], health care
[5], [6], hallway monitoring [7], [8], fire detection [9], gesture
recognition [10], [11] etc. Not many attempts have been made
however, to use them for detecting human motion in outdoor
settings. The outdoor setting is known to be a challenging one
account of the fact that PIR sensors are prone to false alarms
triggered by blowing debris, birds, animals, hot-air currents
and wind blown vegetation collectively termed as clutter. Thus,
a principle challenge is of reliable detection with low falsealarm rate, of human motion in the presence of clutter in a
variety of environmental conditions. An intrusion detection
system, called SmartDetect [12], was recently developed by
some co-authors of present paper, at the Indian Institute of
Science (IISc), where reliable intrusion detection was demonstrated with low false-alarm rate in a local outdoor setting in a
variety of environments. There were environmental conditions
however, under which the false alarm rate did climb to higher,
unacceptable levels.
The authors are currently involved in a wildlife-conservation
project [13]1 with the aim of the project being the use
1 The work done on this project, was supported in part, by the Department
of Electronics and Information technology (DeitY).
of wireless sensor networks to help manage human-animal
conflicts in the vicinity of a protected area such as a national
park or wildlife sanctuary. The project team consists of an
international team with complimentary expertise in various
aspects of Wireless Sensor Networks (WSN). It is planned
to setup a WSN, consisting of a variety of several sensing
modalities, including PIR sensing. Apart from harsh environmental conditions, an additional challenge posed in the
wildlife setting is the need to distinguish human from animal
intrusion. There are also difficult challenges to be overcome
on the networking front. The network referred here is the
network which relays the information gathered and processed
by one or more sensors, back to a base station. A planned
deployment of communicating sensors with full knowledge
of propagation conditions will not be possible because of
unknown terrain, uncertainty with respect to locations of
sensors as well as communication relays as well as the need in
many situations for repaid deployment. Yet another challenge
is that of network lifetime, given that the motes used in a
sensor network are powered by cells which can supply only
limited amount of power if required cooperate for long periods
without cell replacement. Thus, there is a need to design
hardware, software and algorithms so as to minimize power
consumption. It is planned to compliment such an approach
in conjunction with energy-harvesting techniques.
In the present paper, we provide background on PIR sensing
as well as brief descriptions of the prior SmartDetect as well as
current wildlife conservation project. The challenges that need
to be overcome in setting up an effective PIR-based WSN,
both in terms of PIR sensing as well as the accompanying
networking are identified and a brief overview of our current
approaches and progress made thus far, provided.
Sections II and III discuss PIR sensing and the SmartDetect
system respectively. An overview of the wildlife conservation
project appears in Section IV. Current approaches and progress
made on the sensing front are discussed in Sections V and VI.
Progress made on the design of as-you-go network deployment
is presented in Sections VII and VIII. Energy considerations
including energy harvesting are discussed in Section IX.
II. PASSIVE I NFRARED S ENSING
PIR sensors have been used as human motion detectors over
the last 3-4 decades. An excellent account of the evolution of
the PIR sensor over the years is given in [14].
Fig. 2. The equivalent circuit of the pyroelectric crystal and the preamplifier
[16].
Fig. 1.
The physical phenomenon of pyroelectricity [15].
PIR sensors work on the principle of pyroelectricity [15].
Pyroelectricity can be described as the temperature dependence of the spontaneous polarization Ps (dipole moment
per unit volume) of a dielectric crystal. The spontaneous
polarization of the crystal can be alternately viewed as the
creation of a layer of bounded charge on opposite faces of
the crystal (Fig. 1, top). This net dipole moment exhibited
by the crystal occurs naturally even in the absence of any
applied electric field, hence, the term spontaneous polarization.
When the two faces of the crystal are connected using metal
electrodes, free ions are attracted towards the two faces of the
crystal. As long as Ps is constant (under thermal equilibrium)
there will not be any current flow in the circuit (Fig. 1,
middle). An increase in the temperature of the crystal results
in a decrease in Ps , which in turn, results in a decrease in
the amount of bounded charge. This creates free ions that
get redistributed resulting in a transient current flow (Fig. 1,
bottom). Similarly, cooling the crystal will result in a current
flow in the opposite direction.
The amount of free charge produced by a temperature
change depends on the pyroelectric coefficient p of the crystal,
where p is the ratio of change in Ps , dPs , to the change in
2
s
temperature, dT , i.e. p = dP
dT with units C/m K. Thus, the
PIR output current i(t) arising from a temperature change in
the crystal, can be calculated from
dT
,
(1)
dt
in which t denotes time and where A is the surface area of
the crystal face. The current is usually converted to a voltage
using a pre-amplifier.
Let the pyroelectric crystal have an equivalent resistance
RX and capacitance CX . Let the preamplifier have a load
resistance RL and capacitance CL . The pyroelectric crystal
can be alternately viewed as a current source I(t) in parallel
with a resistor RX and capacitor CX . The equivalent circuit
of the pyroelectric crystal is given in Fig. 2. Let w(t) be the
radiation power incident on the pyroelectric element. Let a
i(t) = pA
fraction of this power be absorbed by the crystal due to its
emissivity η. Let the crystal have a heat capacity of H and a
thermal conductance GT . From the heat balance equation we
get [17]:
dT (t)
ηw(t) = H
+ GT T (t).
(2)
dt
Taking the Laplace transform and rearranging the terms we
get
ηW (s)
.
(3)
T (s) =
(sH + GT )
Substituting this into the Laplace transform of Eqn. 1 we get
ηpAsW (s)
.
(sH + GT )
I(s) =
(4)
Continuing in the transform domain, the output voltage
V (s) can be written as
V (s)
=
=
=
I(s)
,
Y (s)
(5)
ηpAsW (s)
HCE (s + GHT )(s +
H(s)W (s),
GE
CE )
,
(6)
(7)
where the crystal has an admittance Y (s) = sCE + GE . Thus,
"
#
ηpA
s
H(s) =
.
(8)
E
HCE (s + GHT )(s + G
CE )
Taking the inverse Laplace transform the impulse response of
the PIR element can be written as
E
ηpA
GE − G
GT − GT t
CE t
H
h(t) =
e
−
e
. (9)
GT
E
CE
H
HCE ( G
C − H )
E
Thus, the output voltage v(t) of the PIR sensor to an
input radiation w(t) incident on it can be found by simply convolving w(t) with the impulse response h(t) i.e.
v(t) = w(t) ∗ h(t). A plot of the impulse response and the
corresponding frequency response of a typical PIR element is
shown in Figs. 3(a) and 3(b) respectively.
The voltage responsivity of the PIR element is defined as
Rv
= |H(jω)| ,
=
where τT =
H
GT
(10)
ηpAω
1
1
GT GE (1 + ω 2 τT2 ) 2 (1 + ω 2 τE2 ) 2
and τE =
CE
GE
(11)
are the thermal and electrical
(a)
Fig. 4.
[20].
(b)
Fig. 3. The impulse response and the associated frequency response of the
pyroelectric crystal.
time constants respectively. Observe in Eqn. 11 that Rv → 0 as
ω → 0. This indicates that the PIR element does not respond to
a constant radiation but rather to a change in radiation incident
on it. This ability to respond to changes in incident radiation
makes it an excellent choice for detecting moving objects.
All objects above absolute zero temperature emit radiation
at all wavelengths. The radiation profile of the object (the
bandwidth it occupies) is characteristic of its temperature T
[18]. Thus, as long as there is a temperature contrast between
the moving object and the background temperature, a moving
object will effect a change in the incident radiation on the
PIR which will trigger the sensor. An optical filter is used
to reduce the influence of moving objects with temperatures
much different from that of the source of interest. The filter
limits the radiation falling on it to the bandwidth of interest.
Assuming that one can model the object as a black body, the
maximum radiation of the object is emitted at a wavelength
λmax , given by Wien’s law [19] as λmax = Tb , where b is
Wien’s displacement constant and T is the temperature of the
black body in Kelvin. The hotter the body the shorter the
wavelength λmax .
Fig. 4 compares the radiation profiles of an electric bulb
and a human represented by black bodies at temperatures 3000
K and 300 K respectively. It can be observed that the peak
emission of the human is around 10 µm wavelength. The PIR
Comparison of radiation profiles of a human and an electric bulb
sensor’s sensitivity is limited to human motion (or motion
of other mammals of similar range of body temperature) by
employing optical filters that are transparent around 10 µm
wavelength. Typical optical filters used for human motion
detection are the 8-14 µm bandpass and 5 µm high pass filters.
The fraction of the total radiation emitted by a human within
these bands can be calculated to be approximately 50% and
98% respectively2 .
The PIR sensor typically consists of several elements arranged in a 1D or 2D fashion, the most common being the
2 × 1 and the 2 × 2 arrangements. Since, each single pixel is
capable of capturing temporal variations in temperature, the
PIR sensor is susceptible to being triggered by ambient temperature changes. Pairs of pixels are typically wired together
in a differential manner as shown in Fig. 5. The output of the
sensing unit is the sum of the currents produced by each pixel
pair. Thus, any common temperature change simultaneously
perceived by two pixels having opposite polarities will not be
detected by the sensor.
Fig. 5.
Differential wiring of the quad or 2 × 2 PIR sensor [21].
A lens system is typically used to provide an optical gain
by focusing incident radiation from different directions onto
the sensor die. The lens system can consist of a single lens
or multiple lenses (referred to as multi-lens). The lens system
expands the Field of View (FoV) of the sensor and it plays a
key role in defining the sensor output signal. The FoV of the
sensor can be viewed as a set of virtual beams cast out into
space along which radiation is received and focused onto the
sensor die.
Figs. 6 illustrates the virtual beams cast out by a single
2 PIR sensors have also been used in fire detection applications in which
the optical filter used is typically in the 3-5 µm band.
Fig. 6.
frequency content of intruder and clutter waveforms (see Fig.
7(a)).
A functional block diagram of the algorithm appears in Fig.
8. A block of 128 (N) consecutive samples is transformed by
the HT. The energy in each of these transformed components
are binned into 8 frequency bins. The resultant binned vector
is passed on to a Support Vector Machine (SVM) classifier
(obtained by off-line SVM training) which classifies it as either
intruder or clutter. This entire process is repeated on a slidingwindow basis, every 16 (L) samples.
Virtual Pixel Array.
Fresnel lens, when placed in front of a quad sensor die (pixels
arranged as a 2 × 2 grid). The sensor and its associated
electronics are housed in a metal package to shield it from
Electro-Magnetic Interference (EMI). It is hermetically sealed
to protect it from humidity and pressure waves [14].
III. S MART D ETECT: A N I NTRUSION D ETECTION S YSTEM
During the period 2006-2010, a demonstrable PIR-based
intrusion detection system called SmartDetect [12] system was
developed for a local outdoor application setting. This section
will describe the intrusion detection algorithm, the field testing
results and the limitations of the system.
A. The Intrusion Detection Algorithm
The team was initially faced with a choice between digital
and analog PIR sensors. The analog PIR sensor was chosen as
the spectral signatures of intruder and clutter generated by the
analog PIR sensor were better separated when compared to
the corresponding spectral signatures produced by the digital
PIR sensor (see Figs. 7(a) and 7(b)).
(a)
Fig. 8.
Functional block diagram of the detection algorithm.
The data used for training SVM was collected in a laboratory (i.e., clutter-free) environment (see Fig. 9(a)) in the case
of intruder and across 20 outdoor locations on the forested
campus of the IISc (see Fig. 9(b)) in the case of clutter.
The training data set for intruder included data collected after
making a human walk along different straight lines oriented in
a variety of ways with respect to the sensor. The clutter data
was accumulated over several months from October 2008 to
March 2009.
(b)
Fig. 7. Spectral signatures of intruder and clutter at the output of the analog
and digital PIR sensors respectively.
For the purpose of maximizing battery life, the Walsh
Hadamard Transform (WHT) and Haar Transform (HT) were
considered for computing the spectrum of the intruder and
clutter signals in preference to the computationally intensive
Discrete Fourier Transform as only additions and subtractions
suffice to compute them. An overlapping sliding-window
based detection algorithm was adopted. The HT was preferred
as possessed the additional advantage of being able to reuse
past computed HT coefficients for the next sliding window. A
sampling frequency (fs ) of 12.5 Hz was chosen based on the
(a)
Fig. 9.
(b)
The ECE lab and lawn from where training data was collected.
B. Field-Testing Results
When tested over a period of several hours across the
week, the experimental setup successfully detected intrusions
at various speeds ranging from a slow walk to sprint with
some false alarms being registered. A detailed description of
the setup is provided below.
1) Sensor Platform Employed: The particular PIR sensor chosen for SmartDetect was the analog motion sensor
AMN24111 [21] from Panasonic. The angular field view of
each sensor is approximately 110◦ and thus, 3 sensors were
mounted oriented at 120◦ relative to each other on a single
platform, so as to obtain an omni-directional sensing range
(see Fig. 10). The data from the three sensors were fed to the
3 ADC channels of a TelosB mote [22].
(a)
Fig. 10.
SmartDetect sensor platform.
2) Network Deployment and Self-Organization: Field testing was conducted on the lawns of Electrical Communication
Engineering (ECE) Department in the IISc campus. The sensor
nodes were deployed in the form of two parallel “wireless
trip wires” (see Fig. 11(a)) spaced apart by 5m (the maximum
sensing radius was approximately 6m). The communication
nodes were placed in a semi-planned manner in which the area
of deployment was tessellated into square cells, and the nodes
were placed within these cells randomly (see Fig. 11(b)). This
approach emulates a practical setting in which the presence of
obstructions such as trees and ditches, makes it impractical to
assume that communication nodes can be placed so as to form
a perfect grid. A Graphic User Interface (GUI) was developed
to display the information regarding the network at the BaseStation (BS).
Self-organization was done via a choice of transmit power
level at each node. Each node chooses the minimum power
level so as to have at least two downstream neighbor nodes that
are closer to BS. The self-organization process starts by the
BS broadcasting the coordinates of all nodes in the network
relative to it. Each node in the network broadcasts request
packets starting with a minimum power level. All neighboring
nodes receiving this packet send acknowledgement packets
choosing the same power level. After broadcasting a predefined number of request packets, the node checks for the
existence of two downstream neighbors. If a sufficient number
of nodes in the network are not discovered then the process is
repeated by choosing the next higher power level. Each node
in the network does this process in a time-ordered fashion. By
the end of the self-organization process, every communication
node will have multiple paths to the BS, while using minimum
power. Figure 12 shows a snapshot of the GUI indicating the
power levels chosen by a network consisting of 50 nodes after
the self-organization process.
(b)
Fig. 11.
Wireless trip wire placement of sensor nodes and network
deployment.
Fig. 12. Snapshot of the GUI indicating the result of the self-organization
of a network of 50 nodes.
3) Alarm Generation and Routing: Alarm generation by the
network was done as follows: If a node detected an intruder
in its vicinity using the HT-cum-SVM based algorithm, it
would broadcast its local detection (via the Zigbee protocol
available on TelosB motes) to all of its neighbours. A node
was permitted to declare a confirmed detection if, in addition
to making a local detection, it also received news of local
detection from any other node within a distance of twice the
sensing range of each sensor. The confirmed detection was
then relayed back to the BS using an appropriately designed
network routing algorithm.
Alarm forwarding in the network involves routing of the
alarm packets from the originating node to the sink. A
geographic routing protocol called Geographyaware MAC
(GeoMac) was proposed and used for packet delivery. Geographic routing exploits the geographic information instead of
topological connectivity information to route packets to the
destination. The key parameter used here is the distance of
the nodes from the BS. Here a node with a packet to forward
initiates handshakes by broadcasting probes at regular intervals
in order to determine greedy nodes. The probes contain the
forwarding metric (distances or hop counts) and the ID of the
node broadcasting it. Nodes closer to the destination respond
with a probe ACK which contains its ID and forwarding
metric. An optimal timer starts on the reception of the first
probe ACK. All the received probe ACKs within the optimal
time period are queued. The sender now unicasts the packet
to the relay node closest to the destination. The value of the
optimal timer determines the relay node to which the packet
will be forwarded.
C. Limitations of the SmartDetect System
One limitation of the SmartDetect system is its inability to
distinguish between human and animal. This can be attributed
to the lack of spatial resolution in the AMN24111 Panasonic
PIR sensor. In addition, hot-air currents, especially at background temperatures close to the human body in the peak of
summer, and swaying short grass in the immediate vicinity of
the sensors were observed to major sources of false alarms
and pose a significant challenge that is yet to be overcome.
As observed earlier, with regard to network setup, a planned
deployment as carried out in the SmartDetect system may not
be possible in settings likely to be encountered in the wildlife
protection project. Situations will likely arise, in which there
is uncertainty with respect to location of both sensor and relay
nodes, and where the network will have to be deployed in an
as-you-go fashion.
IV. A W ILDLIFE P ROTECTION P ROJECT
The objective of the wildlife project [13] is to carry out
research and development aimed at designing a WSN to
protect humans, animals and the environment. The specific
goal is to investigate the use of a WSN to set up virtual fences
as well as identifying and monitoring selected regions of the
forest where the inhabitants of the forest or the environment
are threatened. This project puts together a global, interdisciplinary team consisting of faculty drawn from Indian Institute
of Information Technology Allahabad, Wildlife Institute of
India, Ohio State University, Cornell University, and Indian
Institute of Science, Bangalore.
Of particular concern in this project is the rapid escalation in
human-animal conflict (illegal human intrusion into the forest
and animal excursion into surrounding villages), in the vicinity
of protected areas. Fig. 13 provides a general overview of the
proposed system to address intrusion and excursion problems.
This involves the setting up three types of WSN systems
(Virtual Fences (VF), Activity Region Monitoring (ARM) and
Forest Probes (FP)). The VF is deployed on the boundary
between forest and village. It is used to detect and identify a
set of mammals entering or exiting the forest. It is planned to
deploy virtual fences in Panna Tiger Reserve with the aid of
the Wildlife Institute of India. An ARM system spans a region
where there is relevant mammal activity that is ongoing and
expected to last for some length of time. Some of these regions
could be trail-like, i.e., narrow tracks over extended portions
of the forest. The objective here is to identify and track the
mammals and notify the authority of harmful activities such
as tree felling, poaching and forest burning. The FP is aimed
at collecting information from sources like humans, wildlife
experts and long-range sensors to identify the activity regions
and their evolution and accordingly deploy an ARM system
or a VF. Thus, the aim is that these WSNs will act as an early
warning system for forest personnel.
The role of the team at IISc is to design, develop and test
a PIR-based sensor platform for detection and classification
of intruders, design a PIR sensor that will trigger a camera
trap, design algorithm that will permit as-you-go network
deployment, and investigate, low-energy approaches to sensing, detection and communication that will include energyharvesting. While we hope to leverage our past experience
with SmartDetect, there are many challenges to overcome.
One major challenge is to distinguish between human and
animal in the presence of clutter. It is planned to design
and deploy PIR sensor platform that have spatial resolution
capability. It is planned to design camera traps that are
triggered by a PIR sensor. The camera trap will help provide
the “ground truth” for verification of an event sensed by the
PIR sensor. A second challenge is to deploy a network in
a forest environment that is filled with uncertainties such as
the lack of a priori knowledge of the location of sensors
and relay nodes as well as of the nature of the propagation
terrain. There could also arise situations that demand a rapid,
as-you-go deployment of a sensor network. With regard to
working in an energy-limited environment, it was noted that
24 mA is the quiescent current of the (2 × 2) sensor platform
employed in SmartDetect and hence there is need for making
energy harvesting an integral part of sensor platform design.
Following sections will describe our current approaches at
overcoming some of these challenges.
Fig. 13.
Overview of proposed WSN system.
V. S ENSING P LATFORMS WITH I NCREASED S PATIAL
R ESOLUTION
An essential requirement on a sensor node deployed inside a
forest is the ability to distinguish between human and animal.
Our approach is to design a PIR sensor platform that has
some spatial resolution capability. This calls for an array
of sensors. We draw a parallel here between signal design
for communicating across a communication channel and lens
design for PIR sensing. It is the lens (or multi lens) that will
determine the signal registered when human, animal or clutter,
cross the virtual beam of a sensor platform. The plane where
intruder or clutter moves is called intruder plane hereafter.
Cutting virtual beams at intruder plane is equivalent to cutting
the projection of virtual beam onto the intruder plane, known
as the Virtual Pixel Array (VPA) at the intruder plane. The aim
is thus to design the VPA in such a way that the signals that
will result when the virtual beams are cut by human, animal or
clutter are easily separable. As with SmartDetect, it is planned
to use machine learning techniques to make the classification.
with Nicera’s (2 × 2) pixel package to create two rows (one
above the other) of virtual beams. While the beam pattern
obtained will naturally not overlap in azimuth, intelligent
sensor placement is called for to avoid overlap in elevation. A
simple but effective step here to avoid vertical overlap, is to
vertically offset the sensors with respect to their optical axes
as shown in Fig. 15.
Fig. 15.
Vertical stacking of sensors with and without offset.
VI. S IMULATION OF A PIR S ENSOR P LATFORM
Fig. 14. Utilizing geometry of intruder through a 4 × 4 sensor array for
classification.
Imparting a spatial resolution capability calls for an array
of PIR sensors to be used. To our knowledge, there are only a
few PIR sensor arrays that are commercially available. These
include the (4 × 4), (3 × 3) and (128 × 1) sensor arrays from
Pyreos as well as the (2×2) array (SDA02-54-P) from Nippon
Ceramic (NiCera).
The 4 × 4 sensor array from Pyreos was observed to
have small range, (less than 5m), possibly on account the
use of smaller pixel size. To improve the range further a
costly lens system would be needed. For this reason, we
are currently looking to build in-house, a sensor array out
of commercially available individual components. The array
would be composed of individual (2 × 1) pixel arrangements.
The (2×2) pixel arrangement from NiCera is actually an array
of two (2 × 1) arrangements.
Several single lenses and multi-lenses that can be used in
conjunction with the above sensor to provide the desired array
of virtual beams in the intruder plane are available from Kube
Electronics Ltd. The TR426 multi-lens from Kube electronics
[23], that provides wide horizontal coverage (110◦ ) and small
vertical coverage of (4◦ ) seems well-suited for our current
application. A total of 10 Fresnel lenses, each having a focal
length of 25mm, are arranged consecutively alongside each
other in such a manner that they all have a common focus.
It is planned to use this single multi lens in conjunction
Given that the intruders of interest include wild animals, we
foresee an inherent difficulty in obtaining training data. As a
way around this, it was decided to use techniques borrowed
from the field of animation to simulate motion of human,
animal and clutter across the virtual beam.
In technical terms, the aim of the simulation is to calculate
the radiation incident on the pixels. This is taken to be
proportional to the intersection of the image of the subject with
the VPA at the intruder plane. This radiation is then convolved
with the impulse response of the PIR pixel, described in
Section II, to generate the output signal of the PIR.
A. Virtual Pixel Array of Sensor Platform
The first step in simulation is to determine the VPA in the
intruder plane. This is done by finding the image of the sensor
die on the specified plane3 .
Fig. 16 shows the VPA at a plane 2 m away from sensor
node, with a pair of vertically stacked TR426 lenses from Kube
electronics used to image a corresponding pair of SDA02-54-P
sensors from Nicera.
B. Radiation Incident on a Pixel
The radiation power w(t) incident on the PIR at time t can
be calculated as [24]:
F Ae τ Aproj (t)M
(12)
πR2
where F is the fraction of the total power radiated by the
intruder that falls within the sensor’s optical filter bandwidth,
Ae is the effective area of the lens aperture, R is the distance
of the intruder from the detector, τ is the attenuation due to
w(t) =
3 Although, Fourier optics describes the VPA more accurately compared
to geometrical optics. We found that for this problem, geometrical optics
describes the beams with sufficient accuracy.
to find the area of intersection of the subject with the VPA
using numerical computation.
D. A Damped-Oscillator Model for the Clutter
Fig. 16.
The vegetation considered in the simulation are shrubs. The
shrub figure is made up of a set of randomly oriented stems,
branches and leaves. Branches and leaves are placed randomly
along their associated stems and branches respectively (see
Fig 18). To simulate the motion of the shrub in a gust of
wind, we model each part of the shrub as a rigid rod pivoted
at an appropriate joint whose motion is described by a second
order oscillatory system. The motion can be represented by a
Virtual pixel array at 2m.
the atmosphere τ = e−Rb , where b is the attenuation factor,
Aproj (t) is the overlapping projected area of the source with
the virtual pixel at time instant t, and M is the excitance of
the intruder given by Stefan-Boltzmann’s law [25]:
4
4
M = σ(Tint
− Tback
)
(13)
where Tint and Tback are the intruder and background temperatures in Kelvin respectively. σ is Stefan-Boltzmann constant
and is emissivity.
C. Simulating Intruder Motion through Animation
The intruder is simulated using a professional animation
technique, known as motion capture. In motion capture, key
points of the intruder body (eg. joints, pivot points) that
best represent the gait are identified and it’s 3-D position
is recorded over all frames of motion. Bio-Vision Hierarchy
(BVH)[26] is one of the popular formats used to represent
motion capture data. Free BVH files representing different
kinds of motion [27] and programs that help decode them [28]
are available. Although BVH files describing various human
motion are available in plenty, BVH files for animal subjects
are very rare.
(a)
(b)
Fig. 17. (a)Stick model obtained from motion capture data. (b) Muscles are
approximated using cylinders.
Each BVH motion capture file describes a stick figure as
shown in Fig. 17(a). The lines joining the joints represent
bones. A cylinder is erected about each bone to approximate
muscles as shown in Fig. 17(b). From here it is straightforward
Fig. 18.
Shrub figure.
differential equation given by
d2 θ(t)
dθ(t)
+ 2ζωn
+ ωn2 θ(t) = y(t)
(14)
dt
dt
where y(t) is the excitation due to the wind, ωn is the
natural oscillation frequency and ζ is the damping factor.
The differential equation was solved using Laplace-transform
techniques.
E. SVM-Based Classification Results
Intruder and clutter data for training and testing were generated. The various intruder and clutter planes were considered
at various distances and angles from the sensor, with varying
speeds.
The clutter and intruder waveforms were again found to
be separable in the frequency domain (as in the case of
SmartDetect), hence a similar Haar-SVM based algorithm was
used. Support vectors were learned using LibSVM library[29].
The training was carried out using 92 animal, 70 clutter and
100 human intrusion samples.
A two-level classification was employed. At the first level,
classification between intruder and clutter was carried out.
A second-level classifier, triggered whenever the first-level
classifier detected an intruder, was used to further classify the
intruder as human or animal.
A high classification accuracy was obtained with this classifier. Thirty clutter instances were used for testing and all of
them were successfully rejected. At the second level, 2 out of
190 human test examples were misclassified as animal and 1
out of 246 animal test examples was misclassified as human.
Further improvements are in the planning, by using a more
Potential relay locations
Known locations of
sinks, sensors, and
potential relay
placement points
Relay
Sensor
Sensor
Relay
Relay
?
Relay
Relay
?
Known locations of
sinks
Sensor
?
?
Deployment
Person
Statistical models for
trails and wireless
propagation
Relay
Relay
Relay
Relay
Base Station
(Sink)
Relay
Sensor
SmartConnect v1 can be used to
solve this relay placement
problem
?
Relay
Fig. 19. The network design problem with complete knowledge of all sensor
locations, the trails, and all potential relay placement locations.
?
?
Sensor
Sensor
Requires a statistical model for
wireless propagation in the forest:
Study under way
?
Base Station
(Sink)
Sensor
Sensor
We know there are sensor placement points along each trail, but
we do not know their coordinates; we discover them only as we
walk along the trails
Fig. 20. The network design problem with partial information. In the extreme
case (shown here) the sensor placement locations, and the trails, and the relay
placement locations have to be discovered as the terrain is explored by the
deployment personnel.
sophisticated VPA pattern using additional sensors and more
advanced feature extraction and classification.
VII. D ESIGN AND D EPLOYMENT OF W IRELESS
N ETWORKS
Wireless interconnection of sensors to the wireline communication network or to the computing infrastructure is an
important requirement. These are battery operated, resource
constrained devices. Hence, due to the physical placement
of these devices, or due to the channel conditions, a direct
one-hop link to the infrastructure “base-station” might not be
feasible. In such situations, other nodes could serve as relays
in order to realize a multi-hop path between the source device
and the infrastructure. In the wireless sensor network context,
the relays could be other wireless sensors or battery operated
radio routers deployed specifically as relays. In either case,
the relays are also resource constrained and a cost might be
involved placing them. Hence, there arises the problem of
optimal relay placement. The deployment region might be
known apriori, or the apriori knowledge about the placement
locations and the terrain might only be statistical.
In the following discussion, we assume that we use
IEEE 802.15.4 radios, operating in the 2.4 GHz band. Thus,
the channel bandwidth is 2 MHz, and the bit rate is 250 Kbps.
We also assume that the multihop networks work in the
beaconless mode.
A. Known Sensor Locations and Potential Relay Placement
Points
Figure 19 depicts the problem of deployment of a wireless
sensor network in a forest, where the locations where sensors
have to be placed are precisely known, the layout of the trails
along which relays have to be placed is known, and also the
potential locations, on the trails, where the relays can be placed
are also precisely known. In addition, we have measurements
that provide a statistical model for RF propagation in the
forested terrain.
The problem is then to place as small a number of relays as
possible at some of the potential locations on the trails, and
defining a routing topology, so that the resulting beaconless
multi-hop IEEE 802.15.4 network meets certain QoS objectives.
This problem is essentially the same as the one that is
addressed by SmartConnect our system for design and deployment of wireless sensor networks, and reported in [30].
We, henceforth, call this system SmartConnect v1 (version 1).
The algorithms reported in [30] apply only to the light traffic
situation, which we, formally, call the “lone packet” traffic
model, as the traffic is assumed to be so light that at any
instant no more than one packet traverses the network. One of
our aims is to extend the algorithms in SmartConnect v1 so
as to be able to handle positive traffic.
B. Relay Placement with Partial Information
We also propose to extend the SmartConnect system to
address the problem of of optimal sequential (“as-you-go”)
deployment of relay nodes (and perhape even sensor nodes if
their locations are not apriori given). Such problems have earlier been motivated by the need for impromptu deployment of
wireless networks by “first responders,” for situation monitoring in an emergency such as a building fire or a terrorist siege
(for reference, see [31], [32]). In the forest sensor networking
context, as-you-go deployment might become necessary when
deploying wireless sensor networks in an area where it is
difficult to plan a deployment due to the unavailability of a
precise map of the terrain, or when such networks need to
be deployed and redeployed quickly and there is little time in
between to plan, or in situations where the deployment needs
to be stealthy (for example, when deploying sensor networks
for detecting poachers or fugitives in a forest). The following
are some of the issues that will need to be addressed in order
to develop a comprehensive system for as-you-go deployment
of wireless relay networks.
1) How do we model trails, and potential relay placement
points on the trails.
Sink Node Relay
(Node 0)
1
Relay
Relay
2
Soure Node
(Node 4)
3
L
Fig. 21. Deployment of relays on a straight line path of apriori unknown
length, so as to connect a sink at the beginning of the line to a sensor at the
end of the line.
γ (4)
γ (3)
Fig. 23. A sketch of the layout ground floor of the building of the ECE
Department, IISc, Bangalore.
γ (2)
Sink Node Relay 1
γ (1)
Relay 2
Relay 3
y3
y2
y1
Current loation
y4
Fig. 22.
The network design problem with partial information. Power
measurement at a location in order to decide whether to place a relay or
not.
2) How many passes are allowed to achieve the deployment? A single pass is the most challenging, whereas if
the number of passes is unbounded, we can essentially
employ the SmartConnect v1 approach. If a few passes
are permitted, then the initial passes can be used to
make measurements for partial deployment, while the
subsequent passes can complete the deployment.
3) If several persons are together deploying the network,
how should their actions be coordinated?
4) What should be done if a sensor is required to be placed
at a particular point and the signal quality to the already
deployed relays is poor?
5) How do we incorporate positive traffic with QoS?
6) What sort of constraints should be used for the number
of relays: a bound on the average number, or a bound
on the absolute number.
[33] and [34] has made commendable attempts to address
the modeling issues (1) and (6), but still a lot more needs to
be done.
1) A Simple Model Illustrating As-You-Go Deployment:
In order to explore the issues via a simple model, we have
considered the problem of “as-you-go” deployment of relay
nodes between a sink node and a source node (see Figure 21),
along a line of random length L with known distribution.
There is a cost for placing a relay, and the communication
cost of a deployment is measured as some function of the
powers required to communicate over the links in the network.
The power required to establish a link (with a given link
quality) between any two nodes in the network is modeled
by a random variable which captures the effect of path-loss,
multipath fading and shadowing. As the deployment person
walks along the line from the sink towards the source, at
every step he measures the channel quality (required power,
to be specific) to one (or more) previously placed relays, and
places the relay nodes based on these measurements so as to
minimize the expectation of the sum of the relay cost and the
sum power/ maximum power from the source to the sink node
in the resultant network. For each of these two objectives, two
different relay selection strategies are considered: (i) each relay
communicates with the sink via its immediate previous relay,
(ii) the communication path can skip some of the deployed
relays. The first relay selection strategy allows communication
only via the solid links as shown in Figure 21, whereas for the
second strategy some of the dotted links can be used. Under
certain assumptions on the distribution of the length L and
on the statistical model of powers required at the relays, we
formulate each of these sequential placement problems as a
Markov decision process (MDP). Note that if we do not allow
the possibility of skipping any relay after deployment, then at
each step the decision will be whether to place a relay there
or not, based on the power γ (1) required to establish a link
to the previous relay and the distance y1 to the previous relay
(see Figure 22). Instead, if we allow the possibility of skipping
some relays after the deployment is over, then the decision will
be made based on the measurements to more than one previous
relays. The optimal policies for various MDPs formulated in
our work turn out to be threshold policies, indicating that a
relay can be placed at a given location if and only if either
the power required at that location is sufficiently low or the
location is already far from the previous relay. Our analysis
and numerical work also suggest that allowing the possibility
of skipping some of the deployed relays requiring high power
may result in significant reduction in the power and relay cost.
VIII. P ROPAGATION M ODELING AND A V IRTUAL T ESTBED
Sequential relay placement models, such as the one described earlier, require a statistical model for wireless propagation. Further, we need a realistic setting to experiment with
our algorithms. To both these ends, we have been exploring
the use of REMCOM’s Wireless Insite, an RF propagation
modeling tool. This tool permits a modeler to describe a
terrain, and to place transmitters and receivers in the terrain.
The tool then uses numerical electromagnetic computations to
1
ρ for InSite
ρ for actual experiment
0.8
0.6
ρ
0.4
0.2
0
−0.2
−0.4
0
Fig. 24. The layout of the ground floor of the ECE Department defined
using the Insite GUI. The dimensions and materials have matched to those in
the building.
2
4
6
8
Distance in (m)
10
12
Fig. 26. Correlation vs. distance plots: comparison between actual experimental results and InSite.
−20
RSSI from InSite
Power−law best fit for InSite (exponent=3.71)
Mean RSSI for t=150s
Power−law best fit
for measurements (exponent=3.64)
RSSI in (dBm)
−30
−40
−50
−60
−70
−80
0
5
10
distance in m
15
20
Fig. 25. Comparison between Insite and measurements using TelosB motes:
Average received power vs. distance for a receiver mote placed outside the
door of Room E (in Figure 23) and transmitters placed along the corridor
leading away from Room E, proceeding along Rooms G and H, going towards
the Foyer J. The distance from the door of Room E and the corner of Room H,
where we emerge into Foyer J, is 20 m. The curves of best-fit are obtained
by assuming a power-law path-loss model.
estimate the power received at the receivers. Outdoor terrains
can be defined using DEM (Digital Elevation Models) files,
and ground cover can be modeled using GLCC (Global Land
Cover Characterisation) files. We aim to use Insite in two
ways:
1) For propagation modeling in the specific environment of
the Panna Tiger Reserve
2) For creating a virtual testbed on the computer, in which
we can experiment with our deployment algorithms
We have been experimenting with Insite to understand how
well it can model the propagation environment in our department building. Figure 25 shows the results of measurements
using TelosB motes, and numerical computations from Insite.
The variation of the received signal strength (RSSI) in dBm
for 0 dBm (1 mW) transmit power has been plotted from
actual experiments as well as numerical computation from
InSite, for several distances between the transmitter-receiver
pair. The measured RSSI for the actual experimentation for
each distance was averaged over packets transmitted over 150
seconds, in order to average out the effect of fading. This
was not needed for InSite, since it does not model any time
variation in the channel. Clearly, the variation of the RSSI
values are due to path-loss and shadowing in both cases.
We have fitted minimum mean square-error power-law pathloss curves to the RSSI vs. distance curves, for the actual
experimentation curve as well as the curve obtained from
InSite. We observe that the average path-loss curves from
Insite and from measurements are nearly identical; the pathloss exponent from Insite was found to be 3.71 and that from
measurements was 3.64. This indicates that InSite is able to
model the average variation in RF propagation accurately at
least in the indoor environment.
The experimental data and the measurements obtained from
InSite were used to find the correlation ρ between the received
signal strengths corresponding to two different transmitters
placed at a fixed distance apart from each other. The correlation as a function of the distance between two transmitters
has been shown in Figure 26. It shows that the correlation coefficients are small for the distance more than 1 m, indicating
that the link strengths of two different links can be assumed
to be independent in analysis if either the distance between
the transmitters or that between the receivers is more that
1 m. This observation is useful in justifying the assumption
of independence between the measured required power values
in the simple formulation presented in Section VII-B1.
IX. I DEAS FOR R EDUCED P OWER C ONSUMPTION , FALSE
A LARM P ROBABILITY, E NERGY H ARVESTING AND
C AMERA -T RAP T RIGGERS
It is proposed here to investigate several hardware and
software schemes for an existing intrusion detection system
with the following goals: (a) reducing the overall power
consumption of the system, (b) proposing a triggering mechanism for a decoupled PIR - Camera Trap sensor system, (c)
reducing the false-alarm triggers and at the same time, identify
signatures of a human intrusion or otherwise, (d) investigating
energy-harvesting technologies for the system. Also in the
planning is the building of a thermal imaging camera that
would improve detection range as well as significantly reduce
false-alarm probability.
A. Motivation
PIR sensors are widely used in security applications to
detect trip wire intrusions and break-ins into homes and office
buildings. Such sensors provide an analog signal during an
intrusion event which is then supped to an electronic circuits
that converts it into a digital value. A series of such values
are processed and compared with pre-calibrated thresholds to
ascertain intrusion. An intrusion is detected through changes
in incident infrared radiation which differs from that supplied
by the surroundings. These sensors are energy efficient and are
typically, low power consuming devices. Typically 1 milliwatt
of continuous power is consumed by such devices. Usually,
the intrusion is communicated to a gateway or an aggregation
node over a low power communication device. However, the
low power radios of such devices consume typically 15 mA of
current at 3 V; resulting in a power consumption of about 45
milliwatts. Some radios such as the TI’s CC2420 support only
two degrees of freedom for the power state, namely the power
“on” and “off” states. This forces embedded programmers to
configure the radio in the “always on” state to ensure the
system’s readiness to instantly communicate intrusions. The
detection section itself has two associated problems. On the
one hand, clutter can cause false probability of detection due to
random changes in IR radiation caused by swaying vegetation
in the surroundings. Clutter can be caused by a swinging
branch of a tree or some other random movement. We will
in this section, refer to such sources of clutter as “flutter”.
Secondly, with single PIR-pixel systems, separating human
from animal is quite a challenging task.
In this work, we revisit the PIR detection mechanism to
explore the possibility of reducing energy consumption of
the system. The core idea is to ensure that the embedded
communication electronics is configured to a near power down
state. To achieve this goal, we explored an interrupt driven
system as against an “always on” system. We show by time
budget analysis that the probability of missing a detection is
near 0. Thus, this method is highly energy efficient. We also
outline an approach which can help PIRs classify the type of
intrusion as being human or otherwise.
B. Observations
Fig 27 shows the continuous current (CCl ) of 24mA consumed by the “always on” system. Given that these nodes are
powered using a 2 AA batteries connected in series, each with
a service capacity (SC) of 700mAH, a rough calculation of the
battery life using equation (15) shows that the batteries would
last for 30 hours. In practice, when the 2 batteries were used
to power these nodes we found that the batteries lasted for
a period of 42 hours possibly due to higher service capacity.
We also found that the amount of current consumed in the idle
state and during detection state is the same.
Battery Life =
SC
CCl
(15)
Fig. 27.
Current Consumption in idle and detection mode
C. Proposed changes
This section focuses on the modifications to the system
configuration and hardware changes to reduce power consumption, keeping in mind the challenges that we may face when
making the modifications.
1) Configuration related changes: The nominal operating
frequency of the microcontroller is 4.5MHz. The first proposed
change is to lower the operating frequency of the microcontroller to 1 or 2MHz during an idle state. Additionally, the
radio can be in shutdown mode. Alternately, the configuration
change can include setting the microcontroller to any of
the supported low power modes (LPMs). Changes in the
clock frequency and low power mode might help lower the
power consumption significantly. The microcontroller can be
programmed to increase its operating frequency and turn on
the radio only when there is an intrusion.
2) Hardware Changes: Presently, the PIR sensor’s analog
signal is wired to the ADC of the microcontroller. In addition
to this, we propose to wire the connection to a General Purpose
Input Output (GPIO) port, as this would facilitate interrupt
generation. Hence, we can now place the microcontroller and
radio to low power mode. In this mode, an interrupt wakes
the microcontroller and subsequently the radio to ensure the
intrusion detection and transmission is completed without
missing events and completing the tasks in real-time. We
expect a time budget of 6µs to complete this operation, which
is negligible given that an intrusion might last a few 10’s of
ms.
3) Pulse width estimation for event classification: Thus far,
we have discussed possible hardware and software changes
that could be made to lower the power consumption and
increase the lifetime of the battery. We however did not
consider the possible challenges in back-to-back interrupts that
might occur due to false detection. This would get the node to
frequently turn on and end up consuming power unnecessarily.
Furthermore, classification of humans or otherwise and thus
perhaps differentiate between a two legged and four legged
intrusions is a challenge. During our detailed signal analysis,
we found that the pulse width of the detected signal changes
is proportional to the time taken by the intruder to cross the
FOV. Figures 28 and 29 show the difference in pulse width
of a quick and slow movement in front of one PIR sensor,
respectively. We propose to carry out data analytics and signature analysis from the pulse widths. The idea is flutter, human
intrusion or otherwise should be clearly distinguishable.
Fig. 30.
Fig. 28.
sensor
Pulse width when motion of intruder is quick in front of the PIR
Current Consumption to take one picture
components of the system, starting from intrusion detection,
communication and camera traps are expected to be powered
from harvested energies. Since it is required to decide the
size of harvester including energy storage requirements, a
detailed energy budgeting will be carried out. This includes
energy for sensing, communication, camera trap and Wi-Fi
communication. For the present, we conducted an experiment
to measure the current consumption to shoot a picture with
the flash enabled. Figure 30 is an example of one energy
consuming operation of the camera trap, where a picture is
shot using the flash. The figure shows that approximately
900 mA is required; although for a short burst interval. The
complete operation seems to last at least 2 seconds. For a WiFi communication, the system power requirement is about 1.4
W at 5 V operation. It takes 0.7J to transfer each picture from
the camera to the communication system’s memory and about
2.1J to mail each picture with a good Wi-Fi connectivity.
F. Future work - Towards Thermal Imaging
Fig. 29.
sensor
Pulse width when motion of intruder is slow in front of the PIR
D. Camera Trap
Camera traps are usually accompanied with their own PIR
sensors that trigger the taking of pictures upon the detection
of an event. In our setting, the PIR sensor in the camera trap
is redundant; as the main sensor and camera are regarded
as two separate entities. The challenge now is to wirelessly
communicate the intrusion event and trigger the camera trap.
We propose to use “energy detection” between the communication module and the camera trap’s communication module.
Specifically, we propose to use IEEE 802.15.4 and Bluetooth
technologies to facilitate the communication.
E. Energy Harvesting
In this work, our overall goal is to use energy harvesting technologies to power the complete system. Thus, all
In the near future, thermal imaging cameras will start
gaining popularity both due to increased detection range as
well as lower cost of thermal sensors. A low cost open source
thermal imaging camera attachment is already available for
iPhone and Andriod based mobile phones. We propose to build
the camera for our specific requirement and thus reduce false
probabilities. Such cameras can easily detect forest fires as
well.
R EFERENCES
[1] R. P. Smurlo and H. R. Everett, “Intelligent security assessment for a
mobile robot,” Naval Command, Control and Ocean Surveillance Center,
San Diego, CA, Tech. Rep., 1993.
[2] T. Sugimoto, M. Shibata, and Y. Imuro, “Electronic security system,”
1997.
[3] B. Ivanov, H. Ruser, and M. Kellner, “Presence detection and person
identification in smart homes,” in Int. Conf. Sensors and Systems, St.
Petersburg, 2002.
[4] S. Lee, K. N. Ha, and K. C. Lee, “A pyroelectric infrared sensorbased indoor location-aware system for the smart home,” Consumer
Electronics, 2006.
[5] B. U. Toreyin, E. B. Soyer, I. Onaran, and A. E. Cetin, “Falling person
detection using multisensor signal processing,” EURASIP Journal on
Advances in Signal Processing, 2008.
[6] A. R. Kaushik, N. H. Lovell, and B. G. Celler, “Evaluation of pir detector
characteristics for monitoring occupancy patterns of elderly people living
alone at home,” in Engineering in Medicine and Biology Society, 2007.
EMBS 2007. 29th Annual International Conference, Aug. 2007, pp.
3802–3805.
[7] Q. Hao, D. J. Brady, B. D. Guenther, J. B. Burchett, M. Shankar,
and S. Feller, “Human tracking with wireless distributed pyroelectric
sensors,” Sensors Journal, IEEE, 2006.
[8] P. Zappi, E. Farella, and L. Benini, “Tracking motion direction and
distance with pyroelectric ir sensors,” Sensors Journal, IEEE, vol. 10,
no. 9, pp. 1486–1494, 2010.
[9] O. U. B. Ugur Toreyin, E. Birey Soyer and A. E. Cetin, “Flame detection
system based on wavelet analysis of pir sensor signals with an hmm
decision mechanism,” 2008.
[10] E. H. R. Fuksis, M.Greitans, “Motion analysis and remote control
system using pyroelectric infrared sensors,” Electronics and Electrical
Engineering.–Kaunas: Technologija.
[11] P. Wojtczuk, A. Armitage, D. Binnie, and T. Chamberlain, “Recognition
of simple gestures using a pir sensor array.” Sensors & Transducers
Journal, vol. 14, no. 1, pp. 83–94, 2012.
[12] T. S. P. Team, “Wireless sensor networks for human intruder detection,”
Journal of the Indian Institute of Science, Special issue on Advances in
Electrical Science, vol. 90, pp. 347–380, 2010, (invited).
[13] “Wireless sensor networks for protecting wildlife and humans,” project
funded by NSF, USA, and Department of Electronics and Information
Technology (DeitY), India, under the Pervasive Communications and
Computing Collaboration (PC3) initiative.
[14] H. Keller, “30 years of passive infrared motion detectors-a technology
review,” 2000.
[15] S. B. Lang, “Pyroelectricity: From ancient curiosity to modern imaging
tool,” Phys. Today, vol. 58, pp. 31–35, 2005.
[16] J.Cooper, “Minimum detectable power of a pyroelectric thermal receiver,” Rev.Sci.Instrum., vol. 33, pp. 92–95, 1962.
[17] A. Hossain and M. H. Rashid, “Pyroelectric detectors and their applications,” IEEE Trans. Ind. Applicat., pp. 824–829, 1991.
[18] Wikipedia, “Planck’s law.” [Online]. Available: http://en.wikipedia.org/
wiki/Planck’s law
[19] ——, “Wien’s displacement law.” [Online]. Available: http://en.
wikipedia.org/wiki/Wien’s displacement law
[20] E. I. Inc., “Introduction to infrared pyroelectric detectors,” EltecData
No. 100, 2006.
[21] Panasonic,
“AMN24111
datasheet.”
available
online
at
http://www.panasonic-electric-works.com/peweu/en/downloads/ds
61802 0002 en napion.pdf.
[22] R. S. Joseph Polastre and D. Culler, “Telos: Enabling ultra-low power
wireless research,” In Proceedings of IPSN/SPOTS, 2005.
[23] K. E. Ltd., “TR426 datasheet.” available online at http://www.kube.ch/
Lenses/TR426.pdf.
[24] “Infrared propagation and detection,” Tech. Rep., available online at
www.fas.org/man/dod-101/navy/docs/es310/IR prop/IR prop.htm.
[25] Wikipedia, “Stefan-boltzmann law.” [Online]. Available: http://en.
wikipedia.org/wiki/Stefan-Boltzmann law
[26] M. Meredith and S. Maddock, “Motion capture file formats explained,” Tech. Rep., available at http://www.dcs.shef.ac.uk/intranet/
research/public/resmes/CS0111.pdf.
[27] “CMU graphics lab motion capture database,” available at http://mocap.
cs.cmu.edu/.
[28] N. Lawrance, “Matlab motion capture toolbox version 0.136,” available
at http://www.cs.man.ac.uk/∼neill/mocap/.
[29] C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector
machines,” ACM Transactions on Intelligent Systems and Technology,
vol. 2, pp. 27:1–27:27, 2011, software available at http://www.csie.ntu.
edu.tw/∼cjlin/libsvm.
[30] A. Bhattacharya, S. Ladwa, R. Srivastava, A. Mallya, D. R. Sahib,
A. Rao, S. Anand, and A. Kumar, “Smartconnect: A system for the
design and deployment of wireless sensor networks,” in Proc. the Fifth
International Conference on Communications Systems and Networks
(COMSNETS), January 2013.
[31] S. Souryal, J. Geissbuehler, L. Miller, and N. Moayeri, “Real-time
deployment of multihop relays for range extension,” in Proc. of the ACM
International Conference on Mobile Systems, Applications and Services
(MobiSys), San Juan, Puerto Rico, June 2007.
[32] M. Howard, M. Matarić, and S. Sukhat Gaurav, “An incremental selfdeployment algorithm for mobile sensor networks,” Kluwer Autonomous
Robots, vol. 13, no. 2, pp. 113–126, 2002.
[33] P. Mondal, K. Naveen, and A. Kumar, “Optimal Deployment of Impromptu Wireless Sensor Networks,” in Proc. of the IEEE National
Conference on Communications (NCC),2012.
[34] A. Sinha, A. Chattopadhyay, K. Naveen, M. Coupechoux, and A. Kumar,
“Optimal sequential wireless relay placement on a random lattice path,”
http://arxiv.org/abs/1207.6318, 2012.
Download