A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement

Journal article


Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement. Wireless Personal Communications. 105, pp. 1143-1167. https://doi.org/10.1007/s11277-019-06140-4
AuthorsKaushik, A., Indu, S. and Gupta, D.
Abstract

Camera placement is very important for surveillance applications. Proposed work presents a new method of optimum placement of visual sensors for maximum coverage of the predefined surveillance space. The surveillance space is modeled as priority areas (PAs), obstacles and feasible locations for placement of cameras. We are using PTZ (pan, tilt, zoom) cameras, which not only reduces occlusion due to randomly moving objects in the PA but also increases the covered area compared to pin hole cameras. The proposed approach will be useful for crowd monitoring in a big surveillance space holding multiple events and having multiple entrances. The problem of optimum camera placement for maximum coverage considering both static and randomly moving obstacles is mapped as a Grey Wolf Optimization (GWO) problem. The proposed algorithm is computationally lighter and converges faster as compared to Genetic Algorithm (GA) based camera placement and Particle Swarm Optimization (PSO) based camera placement algorithm. The concept is validated using simulation as well as the experimental results.

KeywordsCamera placement; Visual sensors; Surveillance
Year2019
JournalWireless Personal Communications
Journal citation105, pp. 1143-1167
PublisherSpringer
ISSN0929-6212
1572-834X
Digital Object Identifier (DOI)https://doi.org/10.1007/s11277-019-06140-4
Web address (URL)http://dx.doi.org/10.1007/s11277-019-06140-4
Output statusPublished
Publication dates07 Feb 2019
Publication process dates
Deposited10 Jul 2024
Permalink -

https://repository.derby.ac.uk/item/q743w/a-grey-wolf-optimization-based-algorithm-for-optimum-camera-placement

  • 18
    total views
  • 0
    total downloads
  • 4
    views this month
  • 0
    downloads this month

Export as

Related outputs

A Sign Language Recognition System Using Artificial Intelligence
Dahiya, R., Dwivedi, N., Singh Rathore, A., Kalra, M., Chauhan, P., Ajay Kaushik and Sharma, R. 2024. A Sign Language Recognition System Using Artificial Intelligence. ISBM: World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_7
Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm
Parashar, K., Ajay Kaushik, Sharma, R. and Aman 2024. Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm. in: So In, C., Londhe, N. D., Bhatt, N. and Kitsing, M. (ed.) Information Systems for Intelligent Systems: Proceedings of ISBM 2023 Singapore Springer. pp. 167-180
An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis
Anil Tak, Sarthak Jain, B. N. V. Gnandeep, Mradul, Nikhil Kaushik, Yogendra, Ajay Kaushik, Ritu Sharma and Aman 2024. An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis. World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_8
A novel intrusion detection system for internet of things devices and data
Kaushik, A. and Al-Raweshidy, H. 2023. A novel intrusion detection system for internet of things devices and data. Wireless Networks. 30, pp. 285-294. https://doi.org/10.1007/s11276-023-03435-0
A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems
Kaushik, A. and Al-Raweshidy, H. 2022. A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems. IEEE Access. 10, pp. 87974 - 87989. https://doi.org/10.1109/access.2022.3200035
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik 2022. Post Quantum Public and Private Key Cryptography Optimized for IoT Security. Wireless Personal Communications. 129, pp. 893-909. https://doi.org/10.1007/s11277-022-10162-w
A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems
Ajay Kaushik and Raj, S. V. 2022. A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems. The 5th International Conference on Research in Humanities. Diamond Scientific Publishing . https://doi.org/10.33422/5th.icrhconf.2022.08.200
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices
Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik and Alok Kumar Singh 2020. Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices. International Conference on Information and Communication Technology for Intelligent Systems. Springer. https://doi.org/10.1007/978-981-15-7062-9_54
A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks
Ajay Kaushik, Goswami, M., Manuja, M., Sreedevi, I. and Gupta, D. 2020. A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 113, pp. 263-297. https://doi.org/10.1007/s11277-020-07188-3
Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization. International Journal of Mobile Computing and Multimedia Communications. 10 (3), pp. 1-22. https://doi.org/10.4018/ijmcmc.2019070101
A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks
Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 106, pp. 1429-1449. https://doi.org/10.1007/s11277-019-06223-2
A Self-Configurable Event Coverage Approach for Wireless Sensor Networks
Ajay Kaushik, Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R. and Yadav, S. 2019. A Self-Configurable Event Coverage Approach for Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications. 10 (2), pp. 1-18. https://doi.org/10.4018/ijmcmc.2019040101
Nature-Inspired Algorithms in Wireless Sensor Networks
Ajay Kaushik, Indu, S. and Gupta, D. 2019. Nature-Inspired Algorithms in Wireless Sensor Networks. in: Banati, H., Mehta, S. and Kaur, P. (ed.) Nature-Inspired Algorithms for Big Data Frameworks Hershey, Pennsylvania IGI Global. pp. 75-92
Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2018. Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization. Applications of Computing and Communication Technologies First International Conference, ICACCT 2018. Springer. https://doi.org/10.1007/978-981-13-2035-4_23
A novel load balanced energy conservation approach in WSN using biogeography based optimization
Ajay Kaushik, Indu, S. and Gupta, D. 2017. A novel load balanced energy conservation approach in WSN using biogeography based optimization. THE 2ND INTERNATIONAL CONFERENCE ON ENERGY ENGINEERING AND SMART MATERIALS: ICEESM 2017. AIP Publishing. https://doi.org/10.1063/1.5002507
Technology transfer: enablers and barriers - a review
Ajay Kaushik, Kumar, S., Luthra, S. and Haleem, A. 2014. Technology transfer: enablers and barriers - a review. International Journal of Technology, Policy and Management. 14 (2), pp. 133-159. https://doi.org/10.1504/ijtpm.2014.060152