Научная статья на тему 'Разработка метода активной координации видеокамер в оптической навигации на основе мультиагентного подхода'

Разработка метода активной координации видеокамер в оптической навигации на основе мультиагентного подхода Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
45
11
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
AD HOC / МУЛЬТИАГЕНТНАЯ СИСТЕМА / MULTI-AGENT SYSTEM / АНАЛИЗ ВИДЕОПОТОКА / VIDEO STREAM ANALYSIS / СТЕГОКОНТЕЙНЕР / СНИЖЕНИЕ ЭНЕРГОПОТРЕБЛЕНИЯ БЕСПИЛОТНЫХ АППАРАТОВ / REDUCTION IN POWER CONSUMPTION BY UNMANNED VEHICLES / STEGANOCONTAINER

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Burlachenko Ivan, Zhuravska Iryna, Musiyenko Maksym

Для построения систем оптической навигации необходимо проводить анализ и оценку эффективности потоков данных в беспроводой Ad Hoc сети видеокамер. Предложен метод активной координации видеокамер в оптической навигации на основе мультиагентного подхода (MACon-MAА). В результате исследования улучшены характеристики энергопотребления мобильных агентов, повышена защищённость каналов связи, ускорен обмен таблицами маршрутизации реактивного протокола AODV

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Devising a method for the active coordination of video cameras in optical navigation based on the multi-agent approach

Here we present results of research into multi-agent approach to solving the problem of constructing a wireless Ad Hoc network to transmit video stream during optical navigation. When obtaining data from video cameras in real time, there is a problem of realization of effective coordination of video data. To improve the algorithms of capturing an object, it is necessary to improve the architecture of devices that utilize network metadata for the analysis of scenes from video surveillance. As a result of exploring the ways of solving the specified problems, we proposed a method for active coordination of video cameras based on the multi-agent approach (MAC-on-MAA). The application of this method increases efficiency of network cameras through their reconfiguration. We examined the problem of determining an adequate level of illuminance normalization of a video frame based on analysis of the modules throughput of multi-agent system for encoding transmitted video data. It was revealed that the time of analysis of video stream from a network decreases when ignoring the decoding of certain domains of graphic elements in the received video frames. The devised MAC-on-MAA method allows effective updating of routing tables in the reactive protocol AODV. We obtained analytic expressions for the assessment of quantitative characteristics of energy consumption by mobile agents. Protection of communication channels of video surveillance network is improved through the integration of steganocontainers in the free bits of RGB characteristics of video frames pixels.

Текст научной работы на тему «Разработка метода активной координации видеокамер в оптической навигации на основе мультиагентного подхода»

-□ □-

Для побудови систем оптичног навггацп необ-xidHO проводити аналiз та оцшку ефективностi потоке даних у бездротовш Ad Hoc мережi видеокамер. Запропонований метод активног коор-динаци видеокамер в оптичнш навкаци на осно-вi мультиагентного пидходу (MAC-on-MAA). В результатi дослидження покращет характеристики енергоспоживання мобшьних агентiв, пид-вищена захищетсть каналiв зв'язку, прискоре-ний обмт таблицями маршрутизаци реактивного протоколу AODV

Ключовi слова: Ad Hoc, мультиагентна система, аналiз видеопотоку, стегоконтейнер, змен-

шення енергоспоживання бестлотних апаратiв □-□

Для построения систем оптической навигации необходимо проводить анализ и оценку эффективности потоков данных в беспроводой Ad Hoc сети видеокамер. Предложен метод активной координации видеокамер в оптической навигации на основе мультиагентного подхода (MAC-on-MAA). В результате исследования улучшены характеристики энергопотребления мобильных агентов, повышена защищённость каналов связи, ускорен обмен таблицами маршрутизации реактивного протокола AODV

Ключевые слова: Ad Hoc, мультиагентная система, анализ видеопотока, стегоконтейнер, снижение энергопотребления беспилотных аппаратов

-□ □-

UDC 004.75+004.627

|DOI: 10.15587/1729-4061.2017.90863]

DEVISING A METHOD FOR THE ACTIVE COORDINATION OF VIDEO CAMERAS IN OPTICAL NAVIGATION BASED ON THE MULTIAGENT APPROACH

I. Burlachenko

Senior Lecturer* E-m8il: ivan.burlachenko2010@gmail.com I. Zhuravska PhD, Associate Professor* E-mаil: dzhin@meta.ua M. Musiyenko Doctor of Technical Sciences, Professor* E-mаil: musienko2001@ukr.net *Department of Computer Engineering Petro Mohyla Black Sea National University 68 Desantnykiv str., 10, Mykolaiv, Ukraine, 54003

1. Introduction

Modern networks of video cameras can use dynamic reconfiguration for fulfilling the tasks on video analysis of spatially-distributed objects. A characteristic problem is the limited hardware resources that have to be allocated in the course of operating a network of devices that provide for the transmission of video stream. The problem is the implementation of effective coordination of data obtained from cameras in real time. The networks of digital video cameras where the routing efficiency was assessed through the modification of standards metrics for wireless networks was examined for the first time in paper [1]. The use of network metrics allows for improvement in the algorithms of capturing the objects. But in the process of optical navigation, it is not enough to have video data from one source. Therefore, it is expedient to devise a method for coordinating the interaction of a network of video cameras in real time.

The relevance of present research is in the development of a progressive method for managing dynamic architecture of the network of devices that use network metadata for intelligent analysis of scenes during video surveillance.

2. Literature review and problem statement

Modern video surveillance has gained features of mobility. Networks can be organized taking into account the

dynamics of video surveillance conditions. Such networks should possess substantiated benefits over wireless networks of traditional architecture. The most important advantages are less dependence of the distance of video data transmission on transmitter capacity, reliable provision of changes in the network infrastructure, the possibility of reconfiguration under critical conditions without losing video stream quality.

It is relevant to examine hardware-software implementations of video streams filters that enable the elimination of effects of noises on the quality of multimedia traffic [2, 3]. The aspects of solving the problem on the dependence of distance of transmission of these components of dynamic network and the power of signal level of the transmitter are explored by researchers in [4]. In the proposed solutions, the indicated problem is tackled by introducing intermediate transfer components and building the trajectories of data transmission. But this approach is not efficient enough during dynamic video monitoring.

Distributed network systems require efficient consumption of energy resources. Contemporary models reproduce the consumption of energy in multiprocessor systems depending on task scheduling algorithms [5]. But such models are not investigated under conditions of changing topology in Ad Hoc network.

Attention is paid to designing distributed systems using the principles of management automation. Such management is most effectively performed using the methods of parallel processing of network resources [6]. Applying the JADE

©

technology (Java Agent Development Environment) allows the use of component architecture for mobile dynamic networks based on the component multi-agent autonomy. This approach, however, does not exclude potential occurrence of "bottlenecks" and competitive data modification (Concurrent Modification Exception) under specific conditions.

[7] explores hybrid models of managing data flows in wireless networks of sensors parameters monitoring. The problems of protocols hybridization remain solved only for a narrow class of tasks. The aspects of modeling dynamic sensory networks are examined based on object-oriented and agent-oriented approaches [8]. In this case, the topology, protocols, and data transmission routes schemes are taken into account. Implementations of systems of dynamic simulation are economically beneficial. But they still are quite abstract and require an increase in the level of reliability of consumption of hardware resources of network components.

Methods of reliability provision of dynamic networks are addressed in [9]. This paper also describes peculiarities in the application of evidence theory when assessing the probabilities of failure in the network nodes.

Architectures of mobile platforms of the components of wireless video networks are examined in [10, 11]. But they additionally have to take into account the mobility of nodes. A shortcoming of this approach is an additional increase in the dynamics of network topology with regard to the probability of displacement or the occurrence of obstacles. In addition, it is necessary to take into account limited supply of power sources for mobile components in a video surveillance network. Efficient power supply for mobile agents is needed both when designing hardware means and while organizing the interaction protocols.

Authors of Ad Hoc networks studies distinguish several classes of problems:

- increasing the efficiency of energy consumption by mobile agents [12, 13];

- provision of noise immunity and transmitted data safety when using a steganographic approach [14, 15];

- increasing a network through-put [16, 17];

- provision of effectiveness of the applied routing methods [17, 18].

The indicated classes of problems were examined in mobile Ad Hoc networks, in which reactive routing protocols have been improved based on situation modeling and computational intelligence systems [19, 20]. In papers [19, 20], however, protocols do not take into account short time of building a route and warranted packets delivery under conditions of video data transmission when the network topology changes.

Insufficient effectiveness of methods for the coordination of components of mobile Ad Hoc networks calls for the development of new methods. Such methods imply an analysis of coordinate metrics Field of View (FoV) and the Quality of Service (QoS) principle with a specified probability of data packets transmission [21]. In addition, it is necessary to promptly detect and recover breaks in the route, provide high scalability, high performance of network video stream transmission at various size of network.

3. The aim and tasks of the study

The studies conducted were aimed at devising a method for improving the efficiency of a network of cameras that is capable of being auto-configured.

To achieve the set aim, the following tasks were to be solved:

- to determine a sufficient level of normalization of illuminance of video frames based on the throughput of modules of multi-agent system when encoding video data transmission in the network;

- to reduce the time of video stream analysis through canceling the decoding of specified areas of graphic attributes in the obtained video frames of the network;

- to prolong the time of operation of mobile Ad Hoc network via saving limited power resources of mobile agent, due to decreasing the volume of computing actions over video stream;

- to increase protection of communication channel so that in case of information interception, the protection breaking time would exceed the period of relevance for the limited access information;

- to improve reliability of routing protocol based on the multi-agent model of parallel processing of service data from Ad Hoc network of video cameras.

4. Materials and methods of examining active coordination of video cameras with illuminance-correction feature, compression of data and the use of tag container in the data transfer channel

4. 1. Correlation of the illuminance level of video stream frames, the level of power consumption by mobile agent and the loading of video data transmission channel

In the highly dynamic heterogeneous networks, to which Ad Hoc networks may be attributed, an unmanned aerial vehicle (UAV) may serve as the data sender. To ensure stable wireless communication, data transmission in such a network to other UAV can be carried out directly or through transfer nodes (Fig. 1). Such nodes are required if either there is no direct electromagnetic visibility between the nodes of Ad Hoc network or permissible distance between them is exceeded [22].

In order to assess sufficient efficiency of a network of video cameras, we propose using the criterion of dynamic adaptability DAC during the process of video surveillance over objects-targets:

DAC = f(Is,BWc), (1)

where IS is the function of dependence of illuminance normalization of a frame from video stream, BWC is the coefficient of data transmission rate to the throughput:

BWc = BWMAS ■1 X ■ BWk, (2)

k k=1

where k is the number of video camera and v is the quantity of video cameras in a multi-agent network with efficient throughput BWmas.

Frame size Frs is calculated by the known formula Frs=n-m-Chr, where m, n are the width and length of the frame in pixels (that is, resolution); Chr is the number of bits of the original illuminance of frame pixels [23]. The specified formula allows us to calculate the rate of video stream data transmission BtRk=(FrR)^FrPS.

Based on the fact that the maximum transmission rate BWk=max(BtRk) is the throughput, one can determine

total coefficient of the load of transfer channel per unit of time:

1

N

FPS t=1

BtR,

BW

(3)

where t is the number of numerical value of ratio BtRk and BWk of metrics of k-th video camera; NFPS is the possible quantity of video streams proportional to FrPS.

Fig. 1. Ad Hoc network of video cameras at different types of UAV design and height of flight ceiling h: red lines — formatio of direct video streams ("object-agent"); yellow lines — wireless channels of direct communication between agents; green lines -transfer of flows through transfer nodes; blue lines outline video equipment specifications

A significant factor that affects loading of the video stream transmission channel is the illuminance IS of frames that form such flow. That is why we examined a known model of illuminance normalization [24]. It was found that this model does not take into account characteristics of the network transmission. Therefore, it is proposed to use factor Y in formula (4):

n,m _

1 -7-1 pC

IS = VR.IG.IB), IC =

IP,,

i, 1=1

(4)

where py is the sum of RGB values of a pixel; pC is the sum of RGB pixel values in the absence of specified color;

Y = -

is the coefficient of filtration of color shades of the

frame in a video stream, secured by coefficient BWC.

We consider k-th intelligent video camera, which forms video stream for transmission to another node in Ad Hoc network. Then the adjustment of illuminance level is carried

out by the results of calculations in accordance with formula (4). Thus, we obtain reduction in the current load of data transmission channel.

In addition, compression procedures should be applied to the video stream before sending it along communication channel. This will significantly reduce the volume of video stream. Along with a decrease in the required illuminance, this will significantly reduce the load on the mobile agent numerator. This approach is absolutely relevant in mobile Ad Hoc networks that use limited energy resources. The proposed approach allows fulfilling the set task of improving energy efficiency of using electric power systems of separate mobile agent. Reduction in power consumption prolongs the life cycle of such a network as a whole.

Quantitative characteristics of saving consumed electricity E can be estimated by modifying the technique, described in [13]:

E = Edyn + Estat = Isk1V2L + k2(k!V2L) = = aV2L, a = k1(IS +k2),

(5)

where Edyn, Estat are the dynamic power (active mode of power consumption) and static power (idle mode), respectively; V is the level of power supply voltage; L is the duration of processing and transmitting a specified part of the video stream at coefficient k1 of the numerator load; k2=0.3 at normal (non-correlated) power consumption.

When filtering color shades of the frame, power consumption decreases. Then formula (5) should take into account illuminance Is of frames based on filtration factor Y and takes into account the throughput metrics of a network of video cameras.

4. 2. The use of compression algorithms for video stream

Components of the data transfer process (Fig. 2) in mobile Ad Hoc networks of video surveillance make use of compression. The basic compression algorithms are based on discrete cosine transform (DCT) [24].

Pixel data of video stream frames arrive to the Throughput Analyzer module of the multi-agent system (MAS). An evaluation is conducted of metadata from the network traffic nodes that participate in the video stream transfer. Based on this evaluation, the Luminance Modifier module calculates the level of frames illuminance. The sets of pixels of geometric areas of graphic attributes of objects-targets are formed. Such sets should be considered for recognition in the process of optical navigation. That is why they are not encoded in the frame of video stream. The domains of such graphic attributes enter to steganocontainers for further transmission.

Then a node of dynamic network of video surveillance receives a video frame. After that, this node necessarily in parallel decodes a steganocontainer and the compressed data transmitted by the network. In the next step, these data are transferred to the Pattern Recognition for Optical Navigation module. It performs the recognition of specific images of objects and determines the FoV of video cameras. The obtained values are used for the correction of other video cameras in the network. FoV parameters are entered into steganocontainers and passed on to the Camera angle adjustment module. Thus, a coordination of the video surveillance process by the entire network of video cameras is performed.

"R w

P

Pisel Dita

MAS of throughput analvsis

MANET Node "B"

Pattern Recognition for Optical Navigation

FoV params

Rfstorsd pixel

data with f?atur?s blocks

Stage of decoding

Coefficients dsnormalization

Fig. 2. Encoding and decoding of video stream transfer based on the DCT algorithm and network metadata

It is necessary to determine the part of the image, which will be subsequently used in the active phase of recognition of pattern attributes. If this part is to be encoded, it will lead to a loss of time for decoding. Most of the graphic attributes are characterised by irregular geometry. For them we proposed using the identification of a set of pixels of a graphic attribute instead of using geometric ranges of pixels of such a graphic attribute. This approach is efficinet if there is a set of pixels of graphic attributes of arbitrary geometric shapes EX={p(xi,yi),...,p(xK,yK)}. Graphic attributes of objects-targets should be ignored when encoding. For the identification of blocks of such attributes at the image, we propose a modified formula of two-dimensional (2D) DCT algorithm [25]:

image will be transmitted by the network for the analysis by another node of Ad Hoc network.

- 2-, / 7 / / ¿_

( / / 7 / / Z / / Z □

/ / ¿_ z / / / ¿_ T ¿_

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

t / / 7 V / 7 t* / Z ¿U

V 7 / / 7 / / / S / ¿_ ¿_

/ / 7 / 7 / / z A_

12 m fj/ B / / ¿_

jL

C(u,v) = a(u,v) X f(x,y)ß(x,u)ß(y,v), a(u,v) =

x,y=0

1

-^,if(u,v e EX) v (u,v) = 0,

VN

—, if(u,v <t EX) A(u,v) > 0,

ß(pi,p2) = cos

n(2pi + 1)p2

2N

(6)

(7)

Modification of algorithm (5, 6) affects the compression, namely, the Zig-Zag method of recording data in the image matrix. Fig. 3 shows frames of video stream where rectangles denote graphic attributes of objects that will not be compressed. This will accelerate image recognition by the Pattern Recognition for Optical Navigation module (Fig. 2).

During optical navigation, a module of pattern recognition determines the boundaries of the domain of graphic attribute of the object of video frame (Fig. 3, a). Parameters of pixels of the object's domain are introduced into set EX in formula (5). Another part of the image is compressed by the DCT algorithm. Its pixel data are recorded in the field of the video frame. This process is schematically shown in Fig. 3, b. Compressed video frame image with highlighted areas of graphic attributes of the objects is shown in Fig. 3, c. Such

BKa&'-r"

1 j^^.^-.^.JVL',/. 1 ■..

HM^sfX ■■■■

IC l\

Fig. 3. Modified frame compression algorithm with specified domains of graphic attributes: a — in the process of recognition; b — in the process of compression; c — in the process of transfer over the network

4. 3. Formation of a steganocontainer for the transmission of indexes of non-compressed parts of video stream frames

A minimum configuration, rapid deployment and capability for self-organization allow the critical application of Ad Hoc network. These may include such emergencies as natural disasters, military conflicts, etc. We should not forget that the objects-targets defined in chapter 4.2 were ignored when encoding. In addition, they may be of interest

b

a

c

not only for an Ad Hoc network owner but also, for example, for a competitive organization. Alternatively, open broadcast of intercepted video stream can cause havoc.

Such network can exist in different states: either an open data transmission/receiving or a closed transmission/receiving of limited access information. It is necessary to ensure such conditions so that in the event of data or control signals interception, the interceptor would not even guess that the network had passed into another state. This can be achieved using steganography.

That is why it makes sense for the indexes of pixels of graphic attributes of objects, whose selection for monitoring is expedient to hide (Indices of Feature Blocks in Fig. 2), to transmit with the main video stream (Compressed Data), but applying the steganographic method. Using a stegano-container allows hiding the fact of information transfer. Such approach, on the one hand, will ensure confidentiality of information about the objects-targets, on the other hand, will facilitate for a mobile agent-receiver of information to instantaneously highlight zones for further monitoring in the frame.

Steganography requires data with a component of randomness. Since the system processes video monitoring data, then over time these data change. And if one chooses very small intervals of time, then one may see that the values of RGB values of a pixel are different each time. Thus, a minor change in the value is accepted as something normal. This very principle will be applied for the formation of a stegano-container.

In order to represent floating-point numbers, the IEEE 754-2008 standard is used. According to it, a real number is recorded according to the structure shown in Fig. 4. This standard is utilized in both software realizations of arithmetic operations and in many hardware implementations, including mobile agents' numerators.

Sign Order

11-

Mantissa

9 1 <7, % % % % % % % % °h % % % % % % % % % % % %

31 30

23 22

Fig. 4. Structure of a real number by the IEEE 754-2008 standard: "sign" is the positive or negative number; "order" is the degree of number; "mantissa" is the number itself

By examining a change in the number at the change in these parameters, it was found that younger 8 bits of the number can be used for steganography. This is due to the fact that the change in the indicated bits leads to a change in the number by 0.0000304 %. This very small magnitude practically does not affect the data integrity.

Usually, in the computing systems, RGB space is presented as a cube, with each of the coordinates representing one byte. All together, they carry 24 bits [15]. But in order to save the bit rate, usually in the cells for mobile agents they use a 16-bit color at most (with a range of shades 0-65535). Thus, in the RGB structure of pixel values, the last 8 bits can be "picked up" for steganography.

It should be noted that modern unmanned aerial vehicles use video cameras with a very high resolution of the matrix -from 9 to 50 megapixels [26]. In this study, the task was set about hidden transfer of objects' indexes, which are subject to monitoring by all Ad Hoc network agents. To solve it, we shall assume that 16 numbers x 8 bits=128 bits of steganographic data are sufficient.

This number of bits is sufficient, for example, for the transmission as GPS indices of the coordinates of objects-targets. These coordinates can be recorded in 4 real numbers, each of which contains 32 bits. Al in all, it is 4-32=128 bits of data.

An algorithm of steganography in this case takes the following form:

Step 1. Obtain (in accordance with chapter 4.2) GPS coordinates of objects at the frames of video stream, which will not be compressed.

Step 2. Map these coordinates in the form of bits sequence by using a function that interprets numbers as a sequence of bits.

Step 3. Represent rightmost 8 bits of each number of data on RGB values in the form of bits sequence.

Step 4. Obtain ith bit of the objects' GPS coordinates.

Step 5. Record this bit in ith bit of data on the pixel's RGB value.

Step 6. If there is the next bit, proceed to point 2 paragraph; otherwise, finalize the formation of data packet.

Step 7. Using the MAVLink (Micro Air Vehicle Link) protocol, forward the message to another Ad Hoc network agent (directly or through a transfer node, see Fig. 1).

Step 8. At the receiver, specified data are disclosed by the same sequence of numbers.

There is a probability that if Ad Hoc network of video cameras are discovered, the intruders would intercept hidden data to disclose them. The above described algorithm of steganography is very simple. Therefore, it will take less than half an hour for running a stego analysis of the hidden data if special forensics tools are applied [27]. In connection with this, we propose to introduce additional algorithm into the above described steganography algorithm. Using this algorithm, a sequence of bits should be wordshuffled randomly.

Steganography algorithm with the introduction of a random sequence will be complemented by the following steps:

Step 3a. Select the key by which a random sequence (seed) is built.

Step 3b. Construct a sequence from 1 to n (seq).

while(s<6){ i = 0;

t = seed+(6-s)*s; while(i<size){

if(t&27){

tmp = seq[i]; i2 = i*s+t; i2 %= size; seq[i] = seq[i2]; seq[i2] = tmp; t = roll_bits(t);

}

i++;

}

s++;

}

There are 128 data bits in total, and, using the formula of permutations when trying to run a stegoanalysis, an interceptor will need to look through 128! variants of the sequence of numbers. This would require conducting more than 3.856-10215 permutations.

In addition to the use of steganography, protection of communication channels between UAV is enhanced through the transfer of information based on the MAVLink protocol.

This protocol can communicate in the network with a number of UAVs up to 255 units [28].

5. Results of research into data transfer in mobile Ad Hoc networks

A research into routing protocols characterizes sufficient performance of the dynamic routing protocol for mobile Ad Hoc networks - AODV (Ad Hoc On-Demand Distance Vector). However, a drawback of the AODV algorithm is a long time of processing the routing tables with neighboring nodes of mobile Ad Hoc network ( Mobile Ad hoc Network, MANET) [29]. In the described method of active coordination of video cameras in optical navigation (MAC-on-MAA), we propose to use classes of the roles of agents specified in Fig. 5, for the parallelization of processing routing tables.

During reconfiguration, exchange of updated records in the routing tables between the MANET adjacent nodes of video cameras is performed periodically. With a large number of nodes, this process is critical in terms of mul-tiflow access control to the routing tables. Asynchronous

changes should be mapped along with updating adjacent nodes of the video surveillance network. SemaphoreAgent is needed when it is necessary to restrict the access to the routing table as a resource. The constructor of this class SemaphoreAgent (int permits) or SemaphoreAgent (int permits, boolean fair) necessarily receives the number of flows, to which SemaphoreAgent permits simultaneous use of this resource. A separate phase in the life of network or the stage of grouping requests from adjacent nodes on status update require corresponding changes in the routing table. Total change in records in the routing table is carried out in several flows. PhaserAgent allows the synchronization of these flows (Fig. 6).

CountDownLatchAgent should release the blocked flows when accessing the routing tables. The constructor CountDownLatchAgent necessarily receives the number of operations which must be performed prior to this. CyclicBar-rierAgent is a point of synchronization, which determines the number of parallel flows that meet and are blocked. As soon as all incoming flows of update in the routing table were registered, a notification of MANET adjacent nodes about a possible update is announced.

St'in .1 [ I ] 11 ■ r i V'rin

t-SemaplioreAgent(int)

napliorcA genUint, boo I oan ) +acqiiire():voKl t a;apn reUn n'erniptiblyl ):void

+tryAcquire():boolean

+tryAcquire(long. TimeUnit):

boolean

+rclcasc():void

+acquire( int): void

-<-a cqui ret' n i nt errupti bly ( i nt): vo i d

+tryAcquirc(int):boolean

!«yAequire(int. long, TimeUnit):

boolean

+ielease(int);void

+avai lablePermi[s():inl. +drainPermits():int +isFairO:boolean +hasQueuedThreads():boolean +gct Q n cneL cngth 0 : i nt +toSlring(): Siring

H, Synch ronfaiTAjjciH " —

t'oimtDotviil.atchApcnt

+CoumDownLatehAgent| int) +awail():void +await(long, TimeUnit): boolean

+-countDownO:void

+getCoLinlO:inl +toString(): String

K\chanj;e» Agent

+Exe h anger AgcntO

+exchange(V):V +exchange(V, long, TiineUnil):V

CvclkBarricrAgtnt

+Cy cl i c Barri or Agent( i nt, Runnable)

+CyclicBarrierAgent(int)

+getParties():illt

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

+await():in(

+awnit(long, TimeUnit):int +isBroken() boolean -i-reset():voic! ■ getN umberWaitingO: i nt

Phaser Agent

+PhaserAgent()

i l'hascrAgent(int)

+Ph aser A gent{ Phase rAgent )

^ Phaser A gcr. t( Pli a s erA go i'. . nit)

+regisier():int

+bulkRegister{int):im

+arrive():int

+arriveAndDcrcgistcr():int

+airiveAndAwaitAdvancc(): int

+a waitA dvance( int): i n t

+awa it Adva neeU ni terrnpt ib ly( int): int

+forecTerm i n at io n (): vo id

+gctPhasc():itit

+getRegisteredParties():int

+getArri vedParties{): i nt

+getUnamvedParties() : int

+get Parentf): P haserAgent

+getRoot():PhaserAgent

+isTcntninatcd():inl

+to$Ering(): String

+a wa itA dva nceU n i n lcrruptibly{ i n t,

tong, TimeUnit): int

Fig. 5. Agents class diagram for the multiflow modification of AODV protocol routing tables

b

Fig. 6. Behavioral stages of PhaserAgent when updating routing tables of adjacent nodes: a — method of partial fulfillment of

update; b — method of complete fulfillment of update transfer

a

Then the CyclicBarrierAgent is destroyed, and the flows are released. ExchangerAgent is a point of synchronization of flows pairs. The flow, which triggers the method exchange () in the ExchangerAgent, is blocked and awaits another flow. When another flow triggers the same method, the exchange of objects will be conducted. In this case, each Exchanger-Agent of adjacent nodes will receive updated entries in the routing table as an argument of the method exchange().

Multi-agent approach to the process of updating routing tables of the AODV algorithm allows reducing the recovery time of the broken route at increasing the volume of service traffic by 8 %.

The implementation of the DAC criteria provided for determining an adequate quality level of image reconstruction by the DCT algorithm during data transmission (Fig. 7). This approach ensures comprehensive adaptation of video stream metrics of the network of video cameras to the conditions of the video stream registration medium. Plane limit the domain of optimal ratio of maximal sufficient quality and maximum throughput. This reduces the time of video stream frames transfer and processing for further recognition of graphic attributes.

In the process of research, we measured indicators of energy efficiency of mobile agents without using the MAC-on-MAA method and after its introduction (Table 1).

10 MP 5 MP 3 MP 1.3 MP 1030P HD 720PHD Dl (704x480)

10

Medium Video Quality

Fig. 7. Chart of dependence of the transmission channel throughput on the image quality that defines the boundary conditions of adaptation

Table 1

Results of measuring energy consumption of mobile agents

6. Discussion of results of implementing the method of active coordination of video cameras in the optical navigation

Automatically reconfigured networks of intelligent video cameras provide for the solution of task on the coordinated functioning of devices in distributed systems. This approach might be useful when constructing different large-scale environments and applications. In this case, the problems of adaptation to the changes in topology are solved successfully, as well as of coordination of the operation of various-type devices, hierarchical effective data processing, etc. Intelligent video cameras networks that are capable of maintaining active coordination are efficient for achieving the goals of optical navigation.

The proposed MAC-on-MAA method can extend the functionality of processing video stream by nodes of dynamic network of video cameras through the analysis of additional metadata. This is relevant in situations when the video informativeness should be enhanced by a comprehensive visualization of conventional video stream. Positive results can be obtained when it is necessary to recognize the objects in the infrared range. The method would be appropriate for filtering the stream when only the contours of objects should be displayed.

The most promising is to protect the data stream from unauthorized access by hiding the very fact of transfer of the coordinates of objects-targets by means of steganographic transformation of video stream.

The proposed multi-agent approach using Ad Hoc networks of video cameras allows remote inspection of technical condition of transportation infrastructure in the gas and oil pipelines, bridges and other technical facilities. It also contributes to the development of technologies for remote probing of natural resources and photogrammetry [26]. Research results may prove useful for agricultural enterprises with clear legally defined types of crops that have to be cultivated [30]. In this case, the MAC-on-MAA method is applicable for the optical navigation of UAV monitoring group, which are used to control the types, similarity and other characteristics of farmed crops.

25

20

15

No. Resolution for MJPEG (Medium), px Bitrate, Mbps Consumed current before the implementation of MAC-on-MAA, MA Consumed current after the implementation of MAC-on-MAA, ma

1 D1, 720x480 1.2 10.4 9.8

2 720p_HD,1280x720 3.2 16.4 15.5

3 960p_HD, 1280x960 4.8 26.9 25.5

4 1080p_HD,1920x1080 6.8 31.4 27.4

5 1.3_MP,1280x1024 4.8 26.8 25.6

6 3_MP, 2048x1536 8.4 40.9 36.1

7 5_MP, 2592x1944 10.0 49.9 43.9

7. Conclusions

It was found as a result that reducing the time for analysis of graphic data by 6 %, the level of power consumption by mobile agents decreased by 8.2 %.

In the course of the study we modified the conditions of encoding and decoding 2D DCT algorithm. The principle of exchanging the routing tables of AODV reactive protocol was modified. We examined the process of video transfer in the simulated distributed network. We proposed and described a method for active coordination of video cameras in optical navigation based on the multi-agent approach (MAC-on-MAA).

The most significant are the following results:

1. We ensured reduction in the time for analysis of video stream graphic data by 2.7 s at decreasing the network throughput in the range of 5-15 %. It should be noted that this increases the amount of service traffic by 8 %.

2. Analytic expressions for the assessment of quantitative characteristics of energy consumption

by mobile agents were obtained. It was determined that these characteristics improve by 8.2 % via reducing the time for analysis and volume of encoding of the video stream.

3. The mean value of constructing a route for data exchange at the coordination of a network of video cameras does not change. But the time for complete reconfiguration of the network, which was initiated by an arbitrary node, is reduced by 37 %.

4. The application of the proposed method of active coordination of video cameras in optical navigation based on the

multi-agent approach decreases the total time for the video stream analysis by up to 6 % on average.

5. The introduction of the proposed algorithm to create a random sequence into the steganographic conversions and the application of MAVLink data transfer protocol enhance the protection of the communication channel. This is ensured by the need to perform more than 3.85640215 permutations to disclose of limited access information in the case of data interception and stegoanalysis.

References

1. Whitaker, J. C. DTV: The revolution in electronic imaging [Text] / J. C. Whitaker; National Association of broadcasters. - New York: McGraw-Hill, 1998. - 656 p.

2. Tsmots, I. Parallel algorithms and VLSI structures for median filtering of images in real time [Text] / I. Tsmots, D. Peleshko, I. Izonin // International Journal of Advanced Research in Computer Engineering & Technology (IJARCET). - 2014. - Vol. 3, Issue 8. - P. 2643-2649.

3. Musiyenko, M. P. Development of double median filter for optical navigation problems [Text] / M. P. Musiyenko, I. S. Burlachenko, O. O. Denysov, I. M. Zhuravska // 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP). -2016. doi: 10.1109/dsmp.2016.7583535

4. Musiyenko, M. P. The principles of the cyber-physical components' organization based on the methods of the multi-agent interaction of the moving objects [Text] / M. P. Musiyenko, I. M. Zhuravska, I. S. Burlachenko, O. O. Denysov // Advances in Cyber-Physical Systems. - 2016. - Vol. 1, Issue 1. - P. 51-60.

5. Savinov, V. Development of energy efficient distributed computer systems with self-contained remote modules [Text] / V. Savin-ov // 2014 IEEE 34th International Scientific Conference on Electronics and Nanotechnology (ELNANO). - 2014. doi: 10.1109/ elnano.2014.6873427

6. Burlachenko, I. Management of energy efficient distributed computer systems with self-contained remote modules using multiagent system [Text] / I. Burlachenko // 2015 IEEE 35th International Conference on Electronics and Nanotechnology (ELNANO). - 2015. doi: 10.1109/elnano.2015.7146940

7. Halkin, P. V. Analysis of models and optimization of information collection in wireless sensor networks [Text] / P. V. Hal-kin // Eastern-European Journal of Enterprise Technologies. - 2014. - Vol. 5, Issue 9 (71). - P. 24-30. doi: 10.15587/17294061.2014.28008

8. Galelyuka, I. Modelling of wireless sensor networks [Text] / I. Galelyuka // Computer means, networks and systems. - 2015. -Issue 14. - P. 141-150.

9. Shved, A. The analysis of uncertainty measures with various types of evidence [Text] / A. Shved, Y. Davydenko // 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP). - 2016. - P. 61-64. doi: 10.1109/dsmp.2016.7583508

10. Akyildiz, I. F. Wireless multimedia sensor networks: A survey [Text] / I. Akyildiz, T. Melodia, K. Chowdury // IEEE Wireless Communications. - 2007. - Vol. 14, Issue 6. - P. 32-39. doi: 10.1109/mwc.2007.4407225

11. Seema, A. Towards efficient wireless video sensor networks: a survey of existing node architectures and proposal for a flexi-WVSNP design [Text] / A. Seema, M. Reisslein // IEEE Communications Surveys & Tutorials. - 2011. - Vol. 13, Issue 3. -P. 462-486. doi: 10.1109/surv.2011.102910.00098

12. Goldsmith, A. J. Design challenges for energy-constrained ad hoc wireless networks [Text] / A. J. Goldsmith, S. B. Wicker // IEEE Wireless Communications. - 2002. - Vol. 9, Issue 4. - P. 8-27. doi: 10.1109/mwc.2002.1028874

13. Minukhin, S. Energy efficient algorithms for scaling processor speed in supercomputer [Text] / S. Minukhin // Second International Conference 'Cluster Computing' (CC'13). - 2013. - P. 131-140.

14. Vlasyuk, A. G. The ways to increase the useful volume of steganocontainer by adding artificial noises [Text] / A. G. Vlasyuk, A. A. Muzhaylo, Y. G. Savchenko // Electronics and communications. - 2015. - Vol. 20, Issue 1 (84). - P. 114-121.

15. Singh, K. U. Video steganography: text hiding in video by LSB substitution [Text] / K. U. Singh // International Journal of Engineering Research and Applications. - 2014. - Vol. 4, Issue 5. - P. 105-108.

16. Vaze, R. Two-way transmission capacity of wireless Ad-hoc networks [Text] / R. Vaze, K. T. Truong, S. Weber, R. W. Heath // IEEE Transactions on Wireless Communications. - 2011. - Vol. 10, Issue 6. - P. 1966-1975. doi: 10.1109/twc.2011.041311.101488

17. Okhrimenko, O. H. Study of bandwidth of Ad Hoc network with AODV routing protocol [Text]: conference / O. H. Okhrimenko, M. Yu. Ternovoi // Modern Challenges in Telecommunications. - Kyiv: NTUU «KPI», 2011. - C. 124.

18. Akkaya, K. A survey on routing protocols for wireless sensor networks [Text] / K. Akkaya, M. Younis // Ad Hoc Networks. -2005. - Vol. 3, Issue 3. - P. 325-349. doi: 10.1016/j.adhoc.2003.09.010

19. Younis, O. Node clustering in wireless sensor networks: recent developments and deployment challenges [Text] / O. Younis, M. Krunz, S. Ramasubramanian // IEEE Network. - 2006. - Vol. 20, Issue 3. - P. 20-25. doi: 10.1109/mnet.2006.1637928

20. Bali, R. S. Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions [Text] / R. S. Bali, N. Kumar, J. J. P. C. Rodrigues // Vehicular Communications. - 2014. - Vol. 1, Issue 3. - P. 134-152. doi: 10.1016/j.vehcom.2014.05.004

21. Manjunatha, P. A Survey of coverage analysis in wireless multimedia sensor networks [Text] / P. Manjunatha, L. S. Chethan // International Journal of Scientific Development and Research (IJSDR). - 2016. - Vol. 1, Issue 9. - P. 315-318.

22. Zhuravska, I. M. Ensuring a stable wireless communication in cyber-physical systems with moving objects [Text] / I. M. Zhuravs-ka // Technology Audit and Production Reserves. - 2016. - Vol. 5, Issue 2 (31). - P. 58-64. doi: 10.15587/2312-8372.2016.80784

23. Grossman, R. L. Simple available bandwidth utilization library for high-speed wide area networks [Text] / R. L. Grossman, M. Mazzucco, H. Sivakumar, Y. Pan, Q. Zhang // The Journal of Supercomputing. - 2005. - Vol. 34, Issue 3. - P. 231-242. doi: 10.1007/s11227-005-1167-1

24. Graham, D. Comprehensive colour image normalization [Text] / D. Graham, B. S. Finlayson, J. L. Crowley // Lecture Notes in Computer Science. - 1998. - P. 475-490. doi: 10.1007/bfb0055685

25. Makhoul, J. A fast cosine transform in one and two dimensions [Text] / J. Makhoul // IEEE Transactions on Acoustics, Speech, and Signal Processing. - 1980. - Vol. 28, Issue 1. - P. 27-34. doi: 10.1109/tassp.1980.1163351

26. Sechin, А. Yu. UAV: The use of aerial photography in order to map (part 2) [Текст] / А. Yu. Sechin, M. A. Drakin, A. S. Kiselio-va // Online Resource of Software solutions in the field of photogrammetry, GIS and remote sensing 'Racurs'. - 2011. - 12 p. -Available at: http://www.racurs.ru/www_download/articles/UAV_2.pdf

27. Sloan, T. Forensic analysis of video steganography tools [Text] / T. Sloan, J. Hernandez-Castro // PeerJ Computer Science. -2015. - Vol. 1. - P. e7. doi: 10.7717/peerj-cs.7

28. Kharchenko, V. P. Obrobka, analiz ta vizualizatsiia poliotnyh danyh bezpilotnoho litalnoho aparatu [Text] / V. P. Kharchenko, M. M. Bohunenko, N. S. Kuzmenko, O. V. Shostak, K. Yu. Sharak // Bulletin of Engineering Academy of Ukraine. - 2014. -Issue 2. - P. 20-26.

29. Rao, K. R. Discrete cosine transform: algorithms, advantages, applications [Text] / K. R. Rao, P. Yip. - San Diego: Academic Press, 1990. - 512 p. doi: 10.1016/c2009-0-22279-3

30. Nteris, A. Photomod lite contest: creating vegetation map using UAV at seaside 'Palouki' forest (Greece) by Apostolos Nteris [Text] / A. Nteris // Online Resource of Software solutions in the field of photogrammetry, GIS and remote sensing 'Ra-curs'. - 2013. - 13 p. - Available at: http://www.racurs.ru/www_download/Contest/results/PHOTOMOD_Lite_Contest_ Apostolos%20Nteris.pdf

i Надоели баннеры? Вы всегда можете отключить рекламу.