USRE44807E1 - Method and system for tracking multiple regional objects by multi-dimensional relaxation - Google Patents
Method and system for tracking multiple regional objects by multi-dimensional relaxation Download PDFInfo
- Publication number
- USRE44807E1 USRE44807E1 US09/865,469 US86546901A USRE44807E US RE44807 E1 USRE44807 E1 US RE44807E1 US 86546901 A US86546901 A US 86546901A US RE44807 E USRE44807 E US RE44807E
- Authority
- US
- United States
- Prior art keywords
- dimensional
- tracks
- track
- assignment
- solution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/66—Radar-tracking systems; Analogous systems
- G01S13/72—Radar-tracking systems; Analogous systems for two-dimensional tracking, e.g. combination of angle and range tracking, track-while-scan radar
- G01S13/723—Radar-tracking systems; Analogous systems for two-dimensional tracking, e.g. combination of angle and range tracking, track-while-scan radar by using numerical data
- G01S13/726—Multiple target tracking
Definitions
- the invention relates generally to computerized techniques for processing data obtained from radiation reflections used to track multiple discrete object.
- the invention relates generally to computerized techniques for processing data obtained from radar to track multiple discrete objects.
- radar is used to scan the region and generate discrete images or “snapshots” based on sets of returns or observations.
- all the returns from any one object are represented in an image as a single point unrelated to the shape or size of the objects.
- “Tracking” is the process of identifying a sequence of points from a respective sequence of the images that represents the motion of an object.
- the tracking problem is difficult when there are multiple closely spaced objects because the objects can change their speed and direction rapidly and move into and out of the line of sight for other objects.
- the problem is exacerbated because each set of returns may result from noise as well as echoes from the actual objects.
- the returns resulting from the noise are also called false positives.
- the radar will not detect all echoes from the actual objects and this phenomena is called a false negative or “missed detect” error.
- a large distance between the radar and the objects diminishes the signal to noise ratio so the number of false positives and false negatives can be high.
- the power of the radar is low and as a result, the signal to noise ratio can also be low and the number of false positives and false negatives high.
- a kinematic model may be generated describing the object's location, velocity and acceleration may be generated of the object.
- a model provides the means by which the object's future motion of the object can be predicted. Based upon such a prediction, appropriate action may be initiated. For example, in a military application there is a need to track multiple enemy aircraft or missiles in a region to predict their objective, plan responses and intercept them. Alternatively, in a commercial air traffic control application there is a need to track multiple commercial aircraft around an airport to predict their future courses and avoid collision. Further, in these and other applications, such as robotic applications, may use radar, sonar, infrared or other object detecting radiation bandwidths for tracking objects. In particular, in robotic applications reflected radiation can be used to track a single object which moves relative to the robot (or vice versa) so the robot can work on the object.
- the radar after scanning at time t 1 , reports objects at two locations in a first observation set. That is, it returns a set of two observations ⁇ o 11 , o 12 ⁇ . At time t 2 it returns a similar set of two observations ⁇ o 21 , o 22 ⁇ from a second observation set.
- track data for two tracks T 1 and T 2 includes the locations at t 0 of two objects.
- Track T 1 may be extended through the points in the two sets of observations in any of four ways, as may track T 2 .
- T 1 can be described as: ⁇ T 1 , o 11 , o 21 ⁇ , ⁇ T 1 , o 11 , o 22 ⁇ , ⁇ T 1 , o 12 , o 21 ⁇ and ⁇ T 1 , o 12 , o 22 ⁇ .
- Tracks can likewise be extended from T 2 in four possible ways, including, ⁇ T 2 , o 12 , o 21 ⁇ .
- FIG. 1 illustrates these five (out of eight) possible tracks (to simplify the problem for purposes of explanation) .
- the five track extensions are labeled h 11 , h 12 , h 13 , h 14 , and h 21 wherein h 11 is derived from ⁇ T 1 , o 11 , o 21 ⁇ , h 12 is derived from ⁇ T 1 , o 11 , o, 22 ⁇ , h 13 is derived from ⁇ T 1 , o 12 , o 21 ⁇ , h 14 is derived from ⁇ T 1 , o 12 , o 22 ⁇ , and h 21 is derived from ⁇ T 2 , o 11 , o 21 ⁇ .
- the problem of determining which such track extensions are the most likely or optimal is hereinafter known as the assignment problem.
- FIG. 1 illustrates costs ⁇ 21 ⁇ 22 21 modeled target characteristics.
- the function to calculate the cost will normally incorporate detailed characteristics of the sensor, such as probability of measurement error, and track characteristics, such as likelihood of track maneuver.
- FIG. 2 illustrates a two by two by two matrix, c, that contains the costs for each point in relation to each possible track.
- the cost matrix is indexed along one axis by the track number, along another axis by the image number and along the third axis by a point number.
- each position in the cost matrix lists the cost for a unique combination of points and a track, one point from each image.
- FIG. 2 also illustrates a ⁇ 0, 1 ⁇ assignment matrix, z, which is defined with the same dimensions as the cost matrix. Setting a position in the assignment matrix to “one” means that the equivalent position in the cost matrix is selected into the solution.
- the illustrated solution matrix selects the ⁇ h 14 , h 21 ⁇ solution previously described.
- the resulting cost and assignment matrices are three dimensional three-dimensional.
- dimension means the number of axes in the cost or assignment matrix while size refers to the number of elements along a typical axis.
- the costs and assignments have been grouped in matrices to facilitate computation.
- a solution to the assignment problem satisfies two constraints—first, the sum of the associated costs for assigning points to a track extension is minimized and, second, if no false positives or false negatives exist, then each point is assigned to one and only one track.
- Equation [1.0] (a) (0.1 (a)) specifies the sum of the element by element product of the c and z matrices.
- the summation includes hypothesis representations Z i 1 i 2 i 3 with observation number zero being the gap filler observation.
- Equation [1.01] (b) (0.1 (b)) requires that each of the tracks T 1 , . . . , T N 1 be extended by one and only one hypothesis.
- Equation [1.0](c) (0.1 (c)) relates to each point or observation in the first observation set and requires that each such observation, except the gap filler, can only associate with one track but, because of the “less than” condition, it might not associate with any track.
- Equation [1.01] (d) (0.1 (d)) is like [1.0] (c) (0.1 (c)) except that it is applicable to the second observation set. Equation [1.0] (e) (0.1 (e)) requires that elements of the solution matrix z be limited to the zero and one values.
- FIGS. 1 and 2 illustrate an example where “look ahead” data from the second image improved the assignment accuracy for the first image. Without the look ahead, and based only upon a simple nearest neighbor approach, the assignments in the first set would have been reversed.
- Problem Formulation [1.0] (1.0) and the prior art only permit looking ahead one image. In the prior art it was known that the accuracy of assignments will improve if the process looks further ahead, however no practical method to optimally incorporate look ahead data existed.
- Many real radar tracking problems involve hundreds of tracks, thousands of observations per observation set and matrices with dimensions in the range of 3 to 25 including many images of look ahead.
- the data assignment problem may be simplified (without reducing the dimension of the assignment problem) by eliminating from consideration for each track those points which, after considering estimated limits of speed and turning ability of the objects, could not physically be part of the track.
- One such technique denoted hereinafter the “cone method,” defines a cone as a continuation of each previously determined track with the apex of the cone at the end of the previously defined track. The length of the cone is based on the estimated maximum speed of the object and the size of the arc of the cone is based on the estimated maximum turning ability of the object. Thus, the cone defines a region outside of which no point could physically be part of the respective track.
- one or more tracks which are substantially separated geographically from the other tracks can be separated also in the assignment problem. This is done by examining the distances from each point to the various possible tracks. If the distances from one set of points are reasonably short only in relation to one track, then they are assigned to that track and not further considered with the remainder of the points. Similarly, if a larger group of points can only be assigned to a few tracks, then the group is considered a different assignment problem. Because the complexity of assignment problems increases dramatically with the number of possible tracks and the total number of points in each matrix, this partitioning of the group of points into a separate assignment problem and removal of these points from the matrices for the remaining points, substantially reduces the complexity of the overall assignment problem.
- MHT Multiple Hypothesis Testing
- the MHT procedure uses the extendable costing procedure to defer assignment decision until the accumulated evidence supporting the assignment becomes overwhelming. When it makes the assignment decision, it then eliminates all potential assignments invalidated by the decision in a process called “pruning the tree.”
- pruning the tree In practice, the MHT hypothesis tree is limited to a fixed number of generations and the overwhelming evidence rule is replaced by a most likely and feasible rule. This rule considers each track independently of others and is therefore a local decision rule.
- a general object of the present invention is to provide an efficient and accurate process for assigning each point object in a region from multiple images to a proper track and then taking an action based upon the assignments.
- a more specific object of the present invention is to provide a technique of the foregoing type which determines the solution of a k-dimensional assignment problem where “k” is greater than or equal to three.
- the present invention relates to a method and apparatus for tracking objects.
- the present invention tracks movement or trajectories of objects by analyzing radiation reflected from the objects, the invention being especially useful for real-time tracking in noisy environments.
- a region containing the objects is repeatedly scanned to generate a multiplicity of sequential images or data observation sets of the region.
- One or more points (or equivalently observations), in each of the images or observation sets are detected wherein each such observation either corresponds to an actual location of an object or is an erroneous data point due to noise.
- figures of merit or costs are determined for assigning the observation to each of a plurality of previously determined tracks.
- the first optimization problem is formulated, generated or defined as an M-dimensional assignment problem wherein there are M constraint sets in the first collection of constraint sets (i.e., there are M scans being examined) and the first objective function minimizes a total cost for assigning observations to various track extensions wherein terms are included in the cost, such that the terms have the figures of merit or costs for hypothesized combinations of assignments of the observations to the tracks.
- the formulated M-dimensional assignment problem is solved by reducing the complexity of the problem by generating one or more optimization problems each having a lower dimension and then solving each lower dimension optimization problem. That is, the M-dimensional assignment problem is solved by solving a plurality of optimization problems each having a lower number of constraint sets.
- the reduction of the M-dimensional assignment problem to a lower dimensioned problems is accomplished by relaxing the constraints on the points of one or more scans thereby permitting these points to be assigned to more than one track extension.
- terms having penalty factors are added into the objective function thereby increasing the total cost of an assignment when one or more points are assigned to more than one track.
- an auxiliary function In performing each recovery step (of obtaining a solution to a k-dimensional problem using a solution to a (k ⁇ 1)-dimensional problem), an auxiliary function, is utilized.
- a region or domain is determined wherein this function is maximized, whereby values of the region determine the penalty factors of the (k ⁇ 1)-dimensional problem such that another 2-dimensional two-dimensional problem can be formulated which determines a solution to the k-dimensional problem using the penalty factors of the (k ⁇ 1)-dimensional problem.
- a preliminary auxiliary function is defined for each of the lower dimensional problems having a dimension equal or one greater than the dimension at which the penalized cost function is solved directly.
- the preliminary auxiliary function is a function of lower order penalty values and a solution at the dimension at which the penalized cost function was solved directly.
- step in the direction of the gradient to identify a peak region of the preliminary auxiliary function and determine penalty factors at the peak region. Iteratively repeat the defining, gradient determining, stepping and peak determining steps to define auxiliary functions at successively higher dimensions until the auxiliary function at 6-18 (k ⁇ 1) dimension (k ⁇ 1) is determined.
- the second embodiment solves the first optimization problem (i.e., the M-dimensional assignment problem) by specifying (i.e., creating, generating, formulating and/or defining) a second optimization problem.
- the second optimization problem includes a second objective function and a second collection of constraint sets wherein:
- FIG. 1 is a graph of images or data sets generated by a scan of a region and possible tracks within the images or data sets according to the prior art.
- FIG. 2 illustrates cost and assignment matrices for the data sets of FIG. 1 according to the prior art.
- FIG. 3 is a block diagram of the present invention.
- FIG. 4 is a flow chart of a process according to the prior art for solving a 3-dimensional three-dimensional assignment problem.
- FIG. 5 Isis a flow chart of a process according to the present invention for solving a k-dimensional assignment problem where “k” is greater than or equal to 3.
- FIG. 6 is a graph of various functions used to explain the present invention.
- FIG. 7 is another block diagram of the present invention for solving the k-dimensional assignment problem where “k” is greater than or equal to 3 three (3).
- FIG. 8 is a flowchart describing the procedure for solving a an n-dimensional assignment problem according to the second embodiment of the invention.
- FIG. 3 illustrates a system generally designated 100 for implementing the present invention.
- System 100 comprises, for example, a radar station 102 (note sonar, microwave, infrared and other radiation bandwidths are also contemplated) for scanning a region which may be, for example, an aerial region (in aerial surveillance applications) or a work region (in robotic applications) and generating signals indicating locations of objects within the region.
- the signals are input to a converter 104 which converts the signals to data points or observations in which each object (or false positive) is represented by a single point.
- the output of the converter is input to and readable by a computer 106 .
- the computer 106 assigns the points to respective tracks, and then displays the tracks and extrapolations of the tracks on a monitor 110 . Also, the computer 106 determines an appropriate action to take based on the tracks and track extensions. For example, in a commercial application at an airport, the computer can determine if two aircraft being tracked are on a collision course and if so, signal a transmitter 112 to warn each aircraft, or if a scheduled take-off will pose the risk of collision, delay the take-off. For a military application on a ship or base, the computer can determine subsequent coordinates of enemy aircraft and send the coordinates to an antiaircraft gun or missile 120 via a communication channel 122 . In a robotic application, the computer controls the robot to work on the proper object or portion of the object.
- the invention generates k-dimensional matrices where k is the number of images or sets of observation data in the look ahead window plus one. Then, the invention formulates a k-dimensional assignment problem as in [1.0] (0.1) above.
- the k-dimensional assignment problem is subsequently relaxed to a (k ⁇ 1)-dimensional problem by incorporating one set of constraints into the objective function using a Lagrangian relaxation of this set. Given a solution of the (k ⁇ 1)-dimensional problem, a feasible solution of the k-dimensional problem is then reconstructed. The (k ⁇ 1)-dimensional problem is solved in a similar manner, and the process is repeated until it reaches the two-dimensional problem that can be solved exactly.
- the ideas behind the Lagrangian relaxation scheme are outlined next.
- L C T z+u T (Bz ⁇ d)
- ⁇ ( ⁇ ) is usually strictly less than v( z ).
- the difference v( z ) ⁇ ( ⁇ ) is called the “duality gap,” which can be estimated by comparing the best relaxed and recovered solutions computed in the course of maximizing ⁇ (u).
- the constraint sets have been modified, as indicated above, to incorporate a gap filler in each observation set to account for false positives.
- a zero for an index, i p , l ⁇ p ⁇ k in z k i 1 . . . i k in problem [1.1] (0.4) below indicates that the track extension represented by z k i 1 . . . i k includes a false positive in the p th observation set.
- the present invention solves the resulting problem so as to generate the outputs required by devices 110 , 112 , 122 and 130 .
- the computer processes O i in a batch together with the other observation sets O i ⁇ k+1 , . . . , O i and the track T i ⁇ k , i.e., T j is the set of all tracks that have been defined up to but not including O j .
- the result of this processing is the new set of tracks T i ⁇ k+1 and a set of cost weighted possible solutions indicating how the tracks might extend to the current time t i .
- the batch process is repeated using the newest observation set and deleting the oldest.
- there is a moving window of observation sets which is shifted forward to always incorporate the most recent observation set.
- the effect is that input observation sets are reused for k ⁇ 1 (k ⁇ 1) cycles and then on the observation set's k-th k th reuse each observation within the observation set is integrated into a track.
- FIG. 7 illustrates various processes implemented upon receipt of each observation set. Except for the addition of the k-dimensional assignment solving process 300 and the modification to scoring process 154 to build data structures suitable for process 300 , all processes in FIG. 7 are based upon prior art.
- the following processes 150 and 152 extend previously defined tracks h i ⁇ 1 . based on new observations.
- Gate formulation and output process 156 determines, for each of the previously defined tracks, a zone wherein the track may potentially extend based on limits of velocity, maneuverability and radar precision. One such technique to accomplish this is the cone method described previously. The definition of the zone is passed to gating process 150 .
- the gating process 150 will match each member observation with the zone for each member of the hypothetical set h i ⁇ 1 .
- the new hypothesis set h i is generated by extending each track of the prior set of hypothetical tracks h i ⁇ 1 either with missed detect gap fillers or with all new observation elements satisfying the track's zone. This is a many to many many-to-many matching in that each hypothesis member can be extended to many new observations and each new observation can be used to extend many hypotheses. It, however, is not a full matching in that any hypothesis will neither be matched to all observations nor vice versa. It is this matching characteristic that leads to the sparse matrices involved in the tracking process.
- gating 150 forwards the new hypothesis set h i to filtering process 152 .
- Filtering process 152 determines a smooth curve for each member of h i . Such a smooth curve is more likely than a sharp turn from each point straight to the next point. Further, the filtering process 152 removes small errors that may occur in generating observations. Note that in performing these tasks, the filtering process 152 preferably utilizes a minimization of a least squares test of the points in a track hypothesis or a Kalman Filtering filtering approach.
- the foregoing track extension process requires knowledge of a previous track.
- the following gating process 158 and filtering process 160 determine the “previous track” based on initial observations.
- the points from the first observation set form the beginning points of all possible tracks.
- sets of simple two point two-point straight line tracks are defined.
- promotion, gate formulation, and output step 162 determines a zone in which future extensions are possible.
- filtering step 160 uses curve fitting techniques to smooth the track extensions depending upon the number of prior observations that have accumulated in each hypothesis. Further note that promotion, gate formulation and output process 162 also determines when sufficient observations have accumulated to form a basis for promoting the track to processes 150 and 152 as described above.
- the output of each of the filtering processes 152 and 160 is a set of hypothetical track extensions.
- Each such extension contains the hypothetical initial conditions (from the previous track), the list of observations incorporated in the extension, and distance between each observation and the filtered track curve.
- Scoring process 154 determines the figure of merit or cost of an observation being an extension of a track. In one embodiment, the cost is based on the above-mentioned distance although the particular formula for determining the cost is not critical to the present invention.
- a preferred formula for determining the cost utilizes a negative log likelihood function in which the cost is the negative of the sum of: (a) the logs of the distances normalized by sensor standard deviation parameters, and (b) the log likelihoods for events related to: track initiation, track termination, track maneuver, false negatives and false positives. Note that track maneuvers are detected by comparing the previous track curve with the current extension. Further note that some of the other events related to, for example, false negatives and false positives are detected by analyzing the relative relationship of gap fillers in the hypothesis. Thus, after determining that one of these events occurred, a cost for it can be determined based upon suitable statistics tables and system input parameters.
- the negative log likelihood function is desirable because it permits effective integration of the useful components.
- Copies of the set of hypothetical track extensions which are scored are subsequently passed directly to one of the gate formulation and output steps 156 and 162 .
- the scoring process 154 also arranges the actual scores in a sparse matrix based upon observation identifiers, and passes them to k-dimensional assignment problem solving process 300 .
- the assignment solving process 300 is described below. Its output is simply the list of assignments which constitute the most likely solution of the problem described by Equation [1.1] (0.4). Note that both gate formulation and output processes 156 and 162 use (at different times) the list of assignments to generate the updated track history T i to eliminate or prune alternative previous hypotheses that are prohibited by the actual assignments in the list, and, subsequently, to output any required data. Also note that when one of the gate formulation and output processes 156 and 162 accomplish these tasks, the process will subsequently generate and forward the new set of gates for each remaining hypothesis and the processes will then be prepared to receive the next set of observations. In one embodiment, the loop described here will generate zones for a delayed set of observations rather than the subsequent set. This permits processes 156 and 162 to operate on even observation sets while the scoring step 154 and k-dimensional solving process operate on odd sets of observations, or vice versa.
- the assignment solving process 300 permits the present invention to operate with a window size of dimension k ⁇ 1 for some k ⁇ 3.
- the upper limit on k depends only upon the computational power of the computer 106 and the response time constraints of system 100 .
- the k ⁇ 1 observation sets within the processing window plus the prior track history result in a k-dimensional Assignment Problem as described by Problem Formulation [1.1] (0.4).
- the present invention solves this generalized problem including the processes required to consider false positives and negatives, and also the processes required to consider sparse matrix problem formulations.
- FIG. 4 illustrates use of the Frieze and Yadagar process as shown in prior art for transforming a 3-dimensional three-dimensional assignment problem into a 2-dimensional two-dimensional assignment problem and then use a hill climbing algorithm to solve the 3-dimensional three-dimensional assignment problem.
- the solver 300 uses a Lagrangian Relaxation technique (well known in the art) to reduce the dimension of an original k-dimensional assignment problem (k>3) down to a 3-dimensional three-dimensional problem and then use the process of FIG. 4 to solve the 3-dimensional three-dimensional problem. Further note that the Lagrangian Relaxation technique is also utilized by the process of FIG.
- an additional cost which is equal to a respective Lagrangian Coefficient “u” u, is added to the cost or objective function [1.0] (0.1) (a) whenever a point is assigned to more than one track.
- This additional cost can be picked to weight the significance of each constraint violation differently, so this additional cost is represented as a vector of coefficients u which are correlated with respective observation points.
- Hill climbing will then develop a sequence of Lagrangian Coefficients sets designated (u 0 , . . . , u j , u j+1 , . . . , u p ). That correspond to an optimum solution of the 2-dimensional two-dimensional assignment problem.
- the assignments at this optimum solution are then used to “recover” the assignment solution of the 3-dimensional three-dimensional assignment problem.
- Step 204 then generates from the 3-dimensional three-dimensional problem described by Problem Formulation [1.0] (0.1) a new 2-dimensional two-dimensional problem formulation which will have the same solution for the first two indices.
- Problem Formulation [2.1] (1.1) has no constraints on the 3 rd axis, any value within a particular 3 rd axis can be used in a solution, but using anything other than the minimum value from any 3-rd 3 rd axis has the effect of increasing solution cost.
- step 204 is to change the 3-dimensional three-dimensional arrays in Problem Formulation [2.1] (1.1) into 2-dimensional two-dimensional arrays as shown in Problem Formulation [2.2] (1.2) and to generate the new 2-dimensional two-dimensional matrix m i 1 i 2 defined as shown in Equation [2.3] (1.3).
- This surface is referred to as ⁇ u ⁇ (u) and is non-smooth but provably convex (i.e., it has a single peak and several other critical characteristics which form terraces). Due to the convex characteristics of ⁇ (u), the results from solving Problem Formulation (1.2) at any particular u j can be used to generate a new set of
- step 206 the two dimensional (two-dimensional) problem is solved directly using a technique known to those skilled in the art such as Reverse Auction for the corresponding cost and solution values. This is the evaluation of one point on the surface or for the first iteration ⁇ U 0 ⁇ (u 0 ).
- Step 208 determines whether the points have been properly assigned after the first iteration by determining if for this set of assignments whether a different set of “u” values could result in a higher total cost. Thus, step 208 is implemented by determining the gradient of objective function [2.2] (1.2 (a) with respect to u j . If the gradient is substantially non-zero (greater than a predetermined limit) then the assignments are not at or near enough to the peak of the ⁇ u
- Hill climbing Step 212 determines the u j+1 values based upon the u j values, the direction resulting from protecting the previous gradient into the U 3 domain, and a step size.
- the solution value of the 2-dimensional two-dimensional problem is the set of coefficients that minimize the 2-dimensional two-dimensional problem and the actual cost at the minimum. Those coefficients augmented by the coefficients stored in m i 1 i 2 permit the evaluation (but not the minimization) of the cost term in Problem Formulation [2.1] (1.1). These two cost terms are lower and upper bounds on the actual minimized cost of the 3-dimensional three-dimensional problem, and the difference between them in combination with the gradient is used to compute the step size.
- steps 202 - 210 are repeated as a second iteration.
- steps 212 and 202 - 210 are repeated until the gradient as a function of u determined in step 208 is less than the predetermined limit. This indicates that the up u p values which locate the peak area of the ⁇ u ⁇ (u) surface are determined and that the corresponding Problem Formulation [2.2] (1.2) has been solved.
- Step 214 will attempt to use the assignments that resulted from this particular 2-dimensional two-dimensional assignment problem to recover the solution of the 3-dimensional three-dimensional assignment problem as described below.
- Step 214 recovers the 3-dimensional three-dimensional assignment solution by using the assignment values determined on the last iteration through step 208 .
- This stage of the recovery process is formulated as a 2-dimensional two-dimensional assignment problem: as follows.
- the result of the scoring step 154 is a M-dimensional Cost Matrix which is structured as a sparse matrix (i.e., only a small percentage of the entries in the cost and assignment matrices are filled or non-zero).
- Individual cost elements represent the likelihood that a track T i as extended by the set of observations ⁇ o ⁇
- i 1, . . . , M ⁇ 1 ⁇ , is not valid. Because the matrix is sparse the list of cost elements is stored as a packed list, and then for each dimension of the matrix, a vector of a variable length list of pointers to the cost elements is generated and stored.
- the notation is used to reference data from levels relatively removed as in c k+1 are the cost coefficients which existed prior to this level of relaxed coefficients c k .
- actual observations are numbered from 1 to N i , where N i is the number of observations in observation set i.
- the added 0 O observation in each set of observations is the unconstrained “gap filler.” This element serves as a filler in substituting for missed detects, and a sequence of these elements including only one true observation represents the possibility that the observation is a false positive.
- a gap filler may be used in as many hypotheses as required.
- the first step in solving the problem indirectly is to reduce the complexity of the problem by the previously known and discussed Lagrangian Relaxation technique.
- the Lagrangian Relaxation technique the absolute requirement that each point is assigned to one and only one track is relaxed such that for some one image, points can be assigned to more than one track.
- a penalty based on a respective Lagrangian Coefficient u k is added to the cost function when a point in the image is assigned to more than one track.
- the Lagrangian Relaxation technique reduces the complexity or “dimension” of the formulation of the assignment problem because constraints on one observation set are relaxed.
- the Lagrangian Relaxation is performed iteratively to repeatedly reduce the dimension until a 2-dimensional two-dimensional penalized cost function problem results as in Problem Formulation [2.1] (1.1).
- This 2-dimensional two-dimensional problem is solved then directly by a previously known technique such as Reverse Auction.
- the penalized cost function for the 2-dimensional two-dimensional problem defines a valley or convex shaped surface which is a function of various sets of ⁇ u k
- k 3, . . . ,M ⁇ penalty values and one set of assignments for the points in two dimensions. That is, for each particular u 3 there is a corresponding 2-dimensional two-dimensional penalized cost function problem and its solution.
- the solution of the 2-dimensional two-dimensional penalized cost function problem identifies the set of assignments for the particular u 3 values that minimize the penalized cost function.
- these assignments are not likely to be optimum for any higher dimensional problem because they were based on an initial arbitrary set of u k values. Therefore, the next step is to determine the optimum assignments for the related 3-dimensional three-dimensional penalized cost function problem.
- the solution of the corresponding two-dimensional problem is the proper values for two of the three sets of indices in the three-dimensional problem. These solution indices can select a subsection of the cost array which maps to a two-dimensional array. The set of indices which minimize the two-dimensional assignment problems based on that array corresponds to the proper assignment of points in the third dimension.
- the foregoing “recovery” process was known in the prior art, but it is modified here to adjust for the sparse matrix characteristic. The next task is to recover the solution of the proper u 4 values for the 4-dimensional four-dimensional problem.
- Another three-dimensional function ⁇ is defined which is a “less than approximation” the three-dimensional function ⁇ and which can be defined based on the solution to the two-dimensional penalized cost function and the previously assigned and determined u k values.
- the gradient of the function ⁇ is found and hill climbing technique used to determine the u 4 values at the peak.
- Each selected u 4 set results in a new 3-dimensional three-dimensional problem and requires the 2-dimensional two-dimensional hill climbing based upon new 2-dimensional two-dimensional problems.
- the solution values are a subset of the values required for the four-dimensional solution.
- Recovery processing extends the subset to a complete solution. This process is repeated iteratively until the u k values that result in a corresponding solution at the peak of the highest order ⁇ ⁇
- FIG. 5 illustrates process 300 in more detail.
- problem formulation step 310 all data structures for the subsequent steps are allocated and linked by pointers as required for execution efficiency.
- the incoming problem is partitioned as described in the subsequent section. This partitioning has the effect of dividing the incoming problem into a set of independent problems and thus reducing the total workload.
- the partitioning process depends only on the actual cost matrix so the partitioning can and is performed for all levels of the relaxation process.
- Step 320 begins the Lagrangian Relaxation process for reducing the M-dimensional problem by selecting all Lagrangian Coefficient u M penalty values initially equal to zero.
- the Lagrangian Coefficients associated with the M th constraint set are a N M+1 elementan (N M +1)-element vector.
- N M +1 elementan
- M ⁇ 1 M ⁇ 1 dimensional
- Equations [3.3] (1.6) this is done by selecting the smallest cost element from each of the M th axis vectors of the cost matrix. Reduction in this manner yields a new, lower order lower-order penalized cost function defined by Equations [3.3] (1.6) which has the same minimum cost as does the objective function defined by [3.2] (1.5) (a) above.
- the cost vectors are selected as follows. Define an index array m k i 1 . . . i k ⁇ 1 and a new cost array c k ⁇ 1 i 1 . . . ,i k ⁇ 1 by:
- step 208 according to the prior art, solution z 2 values are substituted into the 2-dimensional two-dimensional derivative of the surface ⁇ 2 .
- the result indicates how the value of u 3 should be adjusted so as to perform the hill climbing function.
- the objective is to produce a sequence of u 3 i values which ends when the U 3 p u 3 p value is in the domain of the peak of the surface ⁇ .
- the section “Determining Effective Gradient” describes how new values are computed and how it is determined that the current u i k points
- the present invention defines a new function based on known information which is useful for hill climbing from the third to the fourth and above dimensions, i.e., u k values which result in z values that are closer to the proper z values for the highest k-dimension.
- This hill climbing process (which is different than that used in the prior art of FIG. 4 for recovering only the three dimensional three-dimensional solution) is used iteratively at all lower dimensions k of the M-dimensional problem (including the 3-dimensional three-dimensional level where it replaces prior art) even when k is much larger than three.
- FIG. 6 helps to explain this new hill climbing technique and illustrates the original k-dimensional cost function v k of Problem Formulation [3.1] (1.4).
- the actual k-dimensional cost surface v k defined by [3.1] (1.4) (a) comprises scalar values at each point described by k-dimensional vectors and as such can not be drawn. Nevertheless, for illustration purposes only, FIG. 6 ignores the reality of ordering vectors and illustrates a concave function v k (z k ) to represent Equation 3.1. (1.4).
- the v k surface v k is illustrated as being smooth to simplify the explanation although actually it can be imagined to be terraced. The goal of the assignment problem is to find the values of z k ; these values minimize the k-dimensional cost function v k .
- ⁇ 1 (k ⁇ 1 i ) i each generated from a different u 3 are shown.
- the particular series illustrates the process of locating the peak of ⁇ (k ⁇ 1) i .
- the 2-dimensional two-dimensional penalized cost functions ⁇ j (k ⁇ 1) i , . . . , ⁇ 1 (k ⁇ 1) i can be solved directly. Each such solution provides the information required to calculate the next u 3 value.
- Each iteration of the hill climbing improves the selection of u 3 values, i.e., yields ⁇ 2 solution is closer to those at the solution of the ⁇ 3
- the result of solving ⁇ 1 (k ⁇ 1) i is values that are on both ⁇ (k ⁇ 1) i and ⁇ k ⁇ k .
- FIG. 6 illustrates the surface ⁇ k which comprises the minimums of all k-dimensional penalized cost function surfaces ⁇ k , i.e., if the Problem Formulations (1.5) and [3.4] (1.7) were solved at all possible values of u k the function ⁇ k k ⁇ k (u k ) would result.
- the surface ⁇ k is always less than the v k surface v k except at the peak as described in Equation 3.5 (1.8) and its maximum occurs where the v k surface v k is minimum. Because the ⁇ k the ⁇ k ⁇ k v k surface.
- the ⁇ k represents the minimum of the surface ⁇ k , any point on the surface ⁇ k can mapped to the surface v k .
- the function ⁇ k provides a lower bound on the minimization problem described by [3.1] (1.4) (a).
- z k be the unknown solution to Problem Formulation [3.1] (1.4) and note that: ⁇ k (u k ) ⁇ v k ( z i k ) ⁇ v k ⁇ 1 (z k ) [3.5] (1.8) Consequently, the z k values z k at the peak of ⁇ k (i.e., the greatest lower bound on the cost of the relaxed problem), can be substituted into the k-dimensional penalized cost function to determine the proper assignments.
- the present invention attempts to find the maximum on the ⁇ k surface ⁇ k .
- ⁇ k i in that higher order u values of u are not yet optimized, its value can be larger than the true peak of ⁇ k lower bound on v k and it can not be used to recover the required solution.
- the present invention defines all auxiliary function functions ⁇ k dimensional penalized cost function problem, lower order z k values and u k values determined previously by the reduction process.
- the ⁇ k ⁇ k and its gradient is used for hill climbing to its peak.
- the z k values z k at the peak of the ⁇ k into Problem Formulation [3.2](1.5) to determine the proper assignments.
- To define the ⁇ k explicitly makes the function ⁇ k U k order sets of Lagrangian Coefficients with the expanded notation: ⁇ k U k U k+1 U k ⁇ ⁇ k (u k ; u k+1 , . . . ,u k ). Then, a new set of functions ⁇ , is defined recursively, using the ⁇ k ⁇ k 's domain:
- v 2 is the solution value for the most recent 2-dimensional two-dimensional penalized cost function problem.
- Equation 3.5 (1.8) is extended to: ⁇ k (u 3 , . . . , u k ⁇ 1 ;u k ) ⁇ k (u k ;u k+1 , . . .
- the next steps of hill climbing/peak detection are to determine the gradient of the ⁇ k function ⁇ k , determine an increasing portion of the gradient and then move up the ⁇ k surface ⁇ k in the direction of this increasing portion of the gradient.
- any upward step on the ⁇ k the ⁇ kj U k ⁇ ⁇ surface ⁇ k will yield a new set of values u k (to the “left”) that is closer to the ideal set of values u k values which correspond to the minimum of the v k function v k .
- the present invention optimizes this process by determining the single step size from the starting point at the minimum of ⁇ k i ⁇ k i that will jump to the peak and then calculating calculate the values u k values at the peak. Once the f. “u”s values u at the peak at of ⁇ k are determined, then the values u k values can be substituted into Problem Formulation [3.2] (1.5) to determine the proper assignment.
- each surface ⁇ is non-smooth. Therefore, if a gradient was taken at a single point, the gradient may not point toward the peak. Therefore, several gradients (a “bundle”) are determined at several points on the surface ⁇ k in the region of the starting point (i.e., minimum of ⁇ k i ) and then averaged. Statistically, the averaged result should point toward the peak of the surface ⁇ k .
- Wolfe's Conjugate Subgradient Algorithm Wilfe75, Wolfe79 P. Wolfe. A method of conjugate subgradients for minimizing non-differentialbe functions. Mathematical Programming Study, 3:145-173, 1975; P. Wolfe.
- ⁇ k (u) ⁇ v ⁇ R A ⁇ k +1
- the next step is to determine a single step that will jump to the peak of the surface ⁇ k .
- the basic strategy is to first to specify an arbitrary step size, and then calculate the value of ⁇ k at this step size in the direction of the gradient. If the ⁇ k value of ⁇ k is larger than the previous one, this probably means that the step has not yet reached the peak. Consequently, the step size is doubled and a new ⁇ k value of ⁇ k is determined and compared to the previous one. This process is repeated until the new value of ⁇ k is less than the previous one. At that time, the step has gone too far and crossed over the peak.
- the last doubling is rolled-back and that step size is used for the iteration. If the initial estimated ⁇ k is less than previous value then the step size is decreased by 50%. If this still results in a smaller value of ⁇ k , then the last step is rolled back and the previous step size is decreased by 25%. The following is a more detailed description of this process.
- the doubling or halving continues until the step becomes too large to improve the result, or until it becomes small enough to not degrade the result.
- the resulting suitable step size is saved with d as part of the subgradient bundle.
- the last acceptable u + is assigned to u k j+1 .
- limits on the iteration are particularly effective for iterations at the level 3 through (n ⁇ 1 levels,) as these iterations will be repeated so as to resolve higher order coefficient sets.
- the process is in general robust enough to improve the estimate of upper order Lagrangian Coefficients.
- the total processing time for the algorithm becomes deterministic. That characteristic means the process can be effective for real time problems such as radar, where the results of the last scan of the environment must be processed prior to the next scan being received.
- the following process determines if the u k values at what is believed to be the peak of the function ⁇ k adequately approximate the u k values at the peak of the corresponding ⁇ k function ⁇ k . This is done by determining if the corresponding penalized cost function is minimized.
- the u k values at the peak of the function ⁇ k are first substituted into Problem Formulation [3.2] (1.5) to determine a set of z assignments for k ⁇ 1 points.
- Problem Formulation [3.4] (1.7) yielded a tentative list of k selected z points that can be described by their indices as: ⁇ (i j i . . .
- the second index of the solution to the recovery problem is the k th index of the solution. Together these indexes specify the values of z k that solve Problem Formulation [3.1] (1.4) at the k th level.
- a partitioning process is used to divide the cost matrix that results from the Scoring step 154 into as many independent problems as possible prior to beginning the relaxation solution.
- the partitioning process is included with the Problem Formulation Step 310 .
- the result of partitioning is a set of problems to be solved, i.e., there will be p 1 problems that consist of a single hypothesis, p 2 problems that consist of two hypothesis, etc.
- Each such problem is a group in that one or more observations or tracks are shared between members of the group.
- the result of partitioning at level M is the set of problems described as ⁇ P ij
- 1, . . . , p 1 ⁇ are the cases where their there is only one choice for the next observation at each scan and that observation could be used for no other track, i.e., it is a single isolated track.
- the hypothesis must be in included in the solution set and no further processing is required.
- the first element is used to refer to the track id ID.
- Any problem in the partitioned set which does not have shared costs in the first scan represent a case where a track could be extended in several ways but none of the ways share an observation with any other track.
- the required solution hypothesis for this case is the particular hypothesis with the maximum likelihood. For this case all likelihoods are determined as was described in Scoring and the maximum is selected.
- k 1, . . . , M i ⁇ 1, . . . , N k ⁇ , i.e., cost, selection variable and observations in the hypothesis.
- some action is taken such as controlling take-offs and landings to avoid collision, advising airborne aircraft to change course, warning airborne aircraft of an adjacent aircraft in a commercial environment, or aiming and firing an anti-aircraft (or anti-missile) missile, rocket or projectile, or taking evasive action in a military environment.
- the tracking can be used to position a robot to work on an object. For some or all of these applications, usually the tracks which have just been identified are extended or extrapolated to predict a subsequent position of the aircraft or other object.
- the extrapolation can be done in a variety of prior art ways: for example, straight line extensions of the most likely track extension hypothesis, parametric quadratic extension of the x versus time, y versus time, etc. functions that are the result of the filtering process described earlier, least square path fitting or Kalman filtering of just the selected hypothesis.
- ⁇ can also be defined as recursive approximation problem in which several values of higher order u k values are used to eliminate the higher than approximation characteristic of the ⁇ k
- the goal of this section is to explain the formulation of the data association problems, and more particularly multi-dimensional assignment problems, that govern large classes of problems in centralized or hybrid centralized-sensor level multisensor/multitarget tracking.
- the presentation is brief; technical details are presented for both track initiation and maintenance in (A. B. Poore, Multi-dimensional. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion,. Computational Optimization and Applications, 3 (1994), pp.: 27-57, for nonmaneuvering non-maneuvering targets and in Ingmar J. Cox, Pierre Hansen, and Beta Julesz, eds., Partitioning Data Sets, (A. B. Poore. Multidimensional assignments and multitarget tracking: Partitioning data sets.
- P. B. Poore. Multidimensional assignments and multitarget tracking Partitioning data sets.
- the data assignment problems for multisensor and multitarget tracking considered here are generally posed as that of maximizing the posterior probability of the surveillance region (given the data) according to
- observation sets will be measurements which are: (a) assigned to existing tracks, (b) designated as false measurements, or (c) used for initiating tracks.
- alternative data objects instead of observation sets may also be fused such as in sensor level tracking wherein each sensor forms tracks from its own measurements and then the tracks from the sensors are fused in a central location. Note that, as one skilled in the art will appreciate, both embodiments of the present invention may be used for this type of data fusion.
- the data assignment problem considered presently is represented as a case of set partitioning defined in the following way.
- a zero index is added to each of the index sets in [5.2] (2.2)
- a gap filler Z k o is added to each of the data sets Z(k) in [5.2] (2.2)
- a “track of data” is defined as (z 1 i 1 , . . . , z N i N ), where i k and z k i k can now assume the values of 0 and z k o , respectively.
- a partition of the data will refer to a collection of tracks of data or track extensions wherein each observation occurs exactly once in one of the tracks of data and such that all data is used up.
- the gap filler z k o serves several purposes in the representation of missing data, false observations, initiating tracks, and terminating tracks.
- a “reference partition” may be defined which is a partition in which all observations are declared to be false.
- each group of sums in the constraints [5.5] (b)-[5.5] (e)(2.5) (b)-(2.5) (e) represents the fact that each non-gap filler observation occurs exactly once in a “track of data.”
- the assignment problem [5.5] (2.5) is changed accordingly.
- Multidimensional assignments and multitarget tracking Partitioning data sets.
- the likelihood ratios are easily modified to include target features and to account for different sensor types.
- the M observation sets provide observations from M sensors, possibly all the same.
- a sliding window of M observation sets and one data set containing established tracks may be used. In this latter case, the formulation is the same as above except that the dimension of the assignment problem is now M+1.
- the n-dimensional assignment problem [6.1] (2.6) has n sets of constraints.
- the n-dimensional assignment problem [6.1] (2.6) is relaxed to an m-dimensional assignment problem by incorporating n-m of the n sets of constraints into the objective function [6.1] (2.6) (a). Although any constraint set can be relaxed, the description of the relaxation procedure for [6.1] (2.6) will be based on the relaxation of the last n-m sets of constraints. The relaxed problem is
- An optimal (or suboptimal) solution of [6.2] (2.7) can be constructed from that of an m-dimensional assignment problem.
- def ine f or each (i 1 , . . . , i m ) an index (j m+1 , . . . , j n ) (j m+1 (i 1 , . . . , im ), . . . , j n (i 1 , . . . , i m )) and a new cost function c m i 1 . . . i m by
- w m is optimal for [6.4] (2.9)
- the next objective is to explain a recovery procedure or method for recovering a solution to the n-dimensional problem of [6.1] (2.6) from a relaxed problem having potentially substantially fewer dimensions than [6.1] (2.6).
- this aspect of the alternative embodiment of the present invention is substantially different from the method disclosed in the first embodiment of the multi-dimensional assignment solving process of section I.1 of this specification. Further, this alternative embodiment provides substantial benefits in terms of computational efficiency and accuracy over the first embodiment, as will be discussed.
- variables z n 0 . . . 0i m+1 . . . i n will be treated differently in the recovery procedure in that they can be assigned 0 or 1 independent of the value w m 0 . . . 0 . This increases the feasible set of the recovery problem, leading to a potentially better solution.
- c nj i 1 . . .i j mi m+1 . . . i n c n i 1 j . . . i m j i m+1 . . . i n is well defined and the zero-one variable z nj i 1 . . . i j m i m+1 . . . i n c n i j 1 . . . i j m i m+1 . . . i n /n is free to be assigned to zero or one, then define c n ⁇ m+1 ji m+1 .
- FIG. 8 presents a flowchart of a procedure embodying the multi-dimensional relaxation algorithm, referred to immediately above.
- This procedure denoted MULTI 13 DIM_RELAX in FIG. 8 , has three formal parameters, n, PROB_FORMULATION and ASSIGNMT_SOLUTION, which are used to transfer information between recursive instantiations of the procedure.
- the parameter, n is an input parameter supplying the dimension for the multi-dimensional assignment problem (as in [6.1] (2.6)) which is to be solved (i.e., to obtain an optimal or near-optimal solution).
- the parameter is an input parameter supplying the dimension for the multi-dimensional assignment problem (as in [6.1] (2.6)) which is to be solved (i.e., to obtain an optimal or near-optimal solution).
- PROB_FORMULATION is also an input parameter supplying the data structure(s) used to represent the n-dimensional assignment problem to be solved. Note that PROB_FORMULATION at least provides access to the cost matrix, [cnu n ], and the observation sets whose observations are to be assigned. Additionally, the parameter, ASSIGNMT_SOLUTION, is used as an output parameter for returning a solution of a lower dimensioned assignment problem to an instantiation of MULTI_DIM_RELAX which is processing a higher dimensioned assignment problem.
- step 500 an integer m, 2 ⁇ m ⁇ n is chosen such that the constraint sets or corresponding to dimensions m+1, . . . , n are to be relaxed so that an m-dimensional problem formulation as in [6.21] (2.7) results.
- step 504 an initial approximation is provided for ⁇ u m+1 0 , . . . , u n 0 56 .
- a non-smooth optimization technique is used here and that a preferred method of determining a maximum in step 508 is the bundle-trust method of Schramm and Zowe as described in (H. Schramm and J. Zowe,. A version of the bundle idea for minimizing a non-smooth function: Conceptual idea, convergence analysis, numerical results,. SIAM Journal on Optimization, 2 (1992), pp. 121-152 No. 1:121-152, February, 1992). This method, along with various other methods for determining the maximum in step 508 , are discussed below.
- a solution to the optimization problem of step 508 is NP-hard and therefore cannot be solved optimally. That is, there is no known computationally tractable method for guarantying an optimal solution.
- there are two possibilities: either (a) allow m to be greater than 2 and use auxiliary functions similar to those disclosed in the first embodiment of the k-dimensional assignment solver 300 in section I to compute a near-optimal solution, or (b) make m 2 wherein algorithms such as the forward/reverse auction algorithm of D. P. Bertsekas and D. A. Casta ⁇ on in their paper (D. P. Bertsekas and D. A. Casta ⁇ on. A forward/reverse auction algorithm for asymmetric assignment problems,. Computational Optimization and Applications, 1 (1992), pp.: 277-298, 1992) provides an optimal solution.
- auxiliary functions are used as approximation functions for obtaining at least a near-optimal solution to the optimization problem of step 508 .
- the auxiliary functions used depend on the value of m.
- the optimization procedure is guided by using the merit function, ⁇ 2n (u 3 , . . . , u n ), which can be computed exactly via a 2-dimensional two-dimensional assignment problem for guiding the maximization process.
- step 508 can be always solved optimally and without using auxiliary approximation functions.
- the processing in step 508 is both conceptually easier to follow and more efficient.
- step 512 of FIG. 8 the solution ( ⁇ m+1 , . . . , ⁇ ) n and w n is used in determining an optimal solution, w m to Problem Formulation [6.4] (2.9) as generated according to [6.3] (2.8) and Fact A.3.
- step 536 the data structure(s) representing a problem formulation as in [6.8] (2.13) is generated and assigned to the parameter, PROB_FORMULATION.
- step 540 a recursive copy of MULTI_DIM_RELAX is invoked to solve the lower dimensional assignment problem represented by PROB_FORMULATION.
- the parameter, ASSIGNMT_SOLUTION contains the solution to the n ⁇ m+1 dimensional (n ⁇ m+1)-dimensional assignment problem.
- step 544 the n ⁇ m+1 (n ⁇ m+1) th solution is used to solve the n-dimensional assignment problem as discussed regarding equations [6.9] (2.14).
- steps 548 and 552 the solution to the n-dimensional assignment problem is returned to the calling program so that, for example, it may be used in taking one or more actions such as (a) sending a warning to aircraft or sea facility; (b) controlling air traffic; (c) controlling anti-aircraft or anti-missile equipment; (d) taking evasive action; or (e) surveilling an object.
- FIG. 8 There are many procedures described by FIG. 8 .
- the second procedure provided by FIG. 8 is a novel approach which is not suggested by the first embodiment of section I.1.
- a feasible solution to the n-dimensional problem is then recovered using a recursively obtained solution to an n ⁇ 1 dimensional (n ⁇ 1)-dimensional problem via step 540 .
- the function values and subgradients of ⁇ 2n ⁇ 3 n optimally via a two dimensional two-dimensional assignment problem.
- At u (u m+1 , . . . ,u n ) the set ⁇ mn ⁇ subdifferential of ⁇ mn and defined by ⁇ mn ⁇ R M m+1 1x. . . xR M n+ 1
- a vector q ⁇ mn (u) is called a subgradient.
- z n is an optimal solution of [6.2] (2.7) computed during evaluation of ⁇ mn ⁇ mn i n n ⁇ mn (u), differentiating ⁇ mn with respect to u n i n yields the following i n -th i n th component of a subgradient g of for ⁇ mn ⁇ ⁇ mn (u)
- step 508 For real-time needs, one must address the fact that the non-smooth optimization problem of step 508 ( FIG. 8 ) requires the solution of an NP-hard problem for m>2.
- One approach to this problem is to use the following merit or auxiliary function to decide whether a function value has increased or decreased sufficiently in the line search or trust region methods:
- bundle algorithms take a “null” step, wherein the bundle is enriched by a subgradient close to u k .
- bundle methods are non-ascent methods which satisfy the relaxed descent condition ⁇ mn ⁇ k+1 ⁇ mn ⁇ k ⁇ k+1 ⁇ u k . These methods have been shown to have good convergence properties.
- bundle method variants have been proven to converge in a finite number of steps for piecewise affine convex functionals in (K.. Kiwiel,.
- the forward/reverse auction algorithm of Bertsekas and Casta ⁇ on (as described in D. P. Bertsekas and D. A. Castafion,. A forward/reverse auction algorithm for asymmetric assignment problems,. Computational Optimization and Applications, 1 (1992), pp.: 277-298, 1992) is used to solve the many relaxed two dimensional two-dimensional problems that occur in the course of execution.
- multipliers can be reused.
- relaxation provides the multiplier set ⁇ u m+1 , u m+2 , . . . ,u n ⁇ .
- These can be used as the initial multipliers for the n ⁇ m+1 dimensional (n ⁇ m+1)-dimensional recovery problem for n ⁇ m+1>2. This approach has also worked well to reduce the number of non-smooth iterations during recovery.
- initial feasible solutions are generated as follows.
- a new scan of information (a new observation set) arrives from a sensor
- TWS track-while-scan
- multipliers are available from a previously solved and closely related multi-dimensional multidimensional assignment problems for all but the new observation set.
- a local search that may be more promising is to use the two dimensional two-dimensional assignment solver in the following way.
- the indices that correspond to active arcs in the solution are enumerated.
- one coordinate is freed to formulate a two dimensional two-dimensional assignment problem with one index corresponding to the enumeration and the other to the freed coordinate, and then solve a two dimensional two-dimensional assignment problem to improve the freed index position.
- A ⁇ (z j n n ,z j 1 1 )[
- the original relaxation problem is decomposed first. All relaxed assignment problems can be decomposed a priori and all recovery problems can be decomposed only after they are formulated.
- All relaxed assignment problems can be decomposed a priori and all recovery problems can be decomposed only after they are formulated.
- n-to-(n ⁇ 1) we have n ⁇ 2 relaxed problems that can all be decomposed initially, and the recovery problems that are not decomposed (since they are all two dimensional two-dimensional).
- n-to-2 case we have only one relaxed problem that can be decomposed initially. This case yields n ⁇ 3 recovery problems, which can be decomposed only after they are formulated.
- MHT multiple hypothesis tracking
- Tracking and data fusion are complex subjects of specialization that can only be briefly summarized as they are related to the subject of this paper.
- the processing of track multiple targets using data from one or more sensors is typically partitioned into two stages or major functional blocks, namely, signal processing and data process processing (Y.Bar-Shalom, Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Dedham, Mass., 1990; Y.Bar-Shalom and T. E. Fortmann, Tracking and Data Association, Academic Press, Boston, Mass., 1988; S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, Mass., 1986).
- the first stage is the signal processing that takes raw sensor data and outputs reports.
- Reports are sometimes called observations, threshold exceedances, plots, hits, or returns, depending on the type of sensor.
- the true source of each report is usually unknown and can be due to a target of interest, a false signal, or persistent background objects that can be moving in the field of view of the sensor.
- the discrimination or target identification function distinguishes between tracks that are for targets of interest and other tracks such as those due to background. Also, if there is enough information, each track is classified as to the type of target it appears to represent. Target identification and discrimination will not be discussed further in this paper except to comment here on the use of attributes (including identification information) in the data association.
- attributes or features There are two types of attributes or features, namely, discrete valued variables and continuous valued variables. Available attributes of either or both types should be used in computing the log likelihoods or scores for data association. In discussing tracking in this paper, the attributes will not be mentioned explicitly but it should be understood that some reports and some tracks may include attributes information that should be and can be used in the track processing (both data association and filtering) if it is useful.
- the tracking function accepts reports for each frame of data and constructs or maintains a target state estimate, the variance-covariance matrix of the state estimation error, and refined estimates (or probabilities) of the target attributes.
- the state estimate typically includes estimates of target position and velocity in three dimensions and possibly also acceleration and other variables of interest.
- the tracking function is typically viewed in two stages, namely, data association and filtering. Also, the process of constructing new tracks, called track initiation, is different from the process of updating existing tracks, called track maintenance.
- the data association function decides how to relate the reports from the current frame of data to the previously computed tracks. In one approach, at most one report is assigned to each track, and in other approachesm, weights are assigned to the pairings of reports to a track.
- the filter function updates each target state estimate using the one or more (with weights) reports that were determined by the data association function.
- a filter commonly used for multiple target tracking and data fusion is the well know Kalman filter (or the extended Kalman filter in the case of nonlinear problems) or a simplified version of it (Y.Bar-Shalom, Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Mass., 1990; Y.Bar-Shalom and T. E. Fortmann, Tracking and Data Association, Academic Press, Boston, Mass., 1988; S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, Mass., 1986).
- a sequence of reports is selected (one from each of a few frames of data) to construct a new track.
- the filtering function constructs a target state estimate and related information based on the selected sequence of reports.
- the new track is later updated by the track maintenance processing of the subsequent frames of reports.
- Data association approaches can be classified in a number of ways. On One way to classify data association approaches is based on the number of data frames used in the association process (O. E. Drummond. Multiple sensor tracking with multiple frame, probabilistic data association. In Signal and Data Processing of Small Targets, SPIE Proceedings, volume 2561, pages 322-336, 1995). In single frame data association for track maintenance, “hard decisions” are made each frame as to how the on the assignment of reports are to be related to the tracks.
- Some single frame approaches include: individual nearest neighbor, FDA, JPDA, and global nearest neighbor (sequential most probable hypothesis tracking), which uses a two dimensional two-dimensional assignment algorithm (Y. Bar-Shalom. Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Mass., 1990; Y. Bar-Shalom and T. E. Fortmann. Tracking and Data Association. Academic Press, Boston, Mass., 1988; S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, Mass., 1986). In most single frame data association approaches, only one track per object is carried forward to be used in processing the next frame of reports.
- Multiple frame data association is more complex and frequently involves purposely carry carrying forward more than one track per target to be used in processing the next frame of reports. By retaining more than one track per target, the tracking performance is improved at the cost of increased processing load.
- the best known multiple frame data association approach is an enumerative technique called multiple hypothesis tracking (MHT) which enumerates all the global hypothesis with various pruning rules.
- MHT multiple hypothesis tracking
- the log likelihood of the probability of a global hypothesis can be decomposed into the sum of scores of each track that is contained in the hypothesis.
- the most probable hypothesis can be identified with the aid of a non-enumerative algorithm for the assignment so formulated.
- One approach is to treat these two functions sequentially, by first assigning reports to tracks and then using the information that remains to form new tracks.
- a better approach is to integrate both processes where initiating tracks compete for the new frame of reports on an equal basis, i.e., at the same time.
- One assignment array is created that includes the track scores for potential tracks for both track initiation and track maintenance.
- the first dimension of the assignment problem includes only all the tracks either created or updated in the processing of the prior frames of reports. Each of the remaining dimensions accommodates one frame of reports.
- each of the previously established tracks are updated with the report assigned to it from the second dimension of the assignment array.
- the remaining reports in the second dimension that were in the assignment solution are firmly established as track initiators.
- the unassigned reports in the second dimension of the assignment array are discarded as false signals.
- the processing of the next frame of reports repeats this process using these updated tracks and the newly identified initiators in the first dimension of the cost array for processing the new frame of reports. Details of this approach are discussed hereinafter.
- the integrated approach just discussed uses the same number of frames of reports for both track initiation and track maintenance.
- the goal in using the multi-dimensional assignment algorithm is to provide improved performance while minimizing the amount of processing required.
- track initiation will benefit from more frames of reports than will track maintenance.
- a second approach that integrates track initiation and track maintenance is discussed hereinafter, wherein the number of frames of reports is not the same for these two functions. This is a novel approach that is introduced in this paper.
- This algorithmic architecture is also called Central Level Tracking, Centralized Algorithmic Architecture, or simply the Type IV algorithmic architecture.
- track maintenance for example, if a single frame data association is used, then for data association a frame of reports from one sensor is processed with the latest global tracks; then the global tracks are updated by the filter function. After the processing of this frame of reports is completed, a frame of the reports from another (or the same) sensor is processed with these updated global tracks. This process is continued as new frames of data become available to the system as a whole.
- the second pertinent algorithmic architecture is Track Fusion.
- This approach is also called the Hierarchical or Federated algorithmic architecture, sensor level tracking or simply the Type II algorithmic architecture.
- track maintenance for example, a processor for each sensor computes single sensor tracks; these tracks are then forwarded to the global tracker to compute global tracks based on data from all sensors.
- a sensor processor forwards tracks to the global tracker, then subsequent tracks for the same targets are cross-correlated with the existing global tracks.
- This track-to-track cross-correlation is due to the common history of the current sensor tracks and the tracks from the same sensor that were forwarded earlier to the global tracker.
- the processing must take this cross-correlation into account and there are a number of ways of compensating for this-cross-correlations.
- One method for dealing with this cross-correlation is to decorrelate the sensor tracks that are sent to the global tracker. There are a variety of ways to achieve this decorrelation and some are summarized in Drummond, 1996, Signal Data Proc.recent paper (O. E. Drummond, Feedback in track fusion without process noise. In Signal and Data Processing of Small Targets 1995, SPIE Proceedings, -2561:369-383 volume 2561, pages 369-383, 1995.
- the global tracker can process the tracks from the various sensor processors in much the same way that the global tracker of Centralized Fusion processes reports. Accordingly the methods described in this paper can be readily extended to processing data from multiple sensors using either the Centralized Fusion or Track Fusion or even a hybrid combination of both algorithmic architectures.
- the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors.
- the objects are reports that must be partitioned into tracks and false alarms.
- track maintenance which uses a moving window, one data set will be tracks and remaining data sets will be reports which are assigned to existing tracks, as false reports, or to initiating tracks.
- a partition of the data will refer to a collection of tracks of data wherein each report occurs exactly once in one of the tracks of data and such that all data is used up; the occurrence of dummy report is unrestricted.
- the reference partition ⁇ o is that in which all reports are declared to be false.
- L i 1 . . . iN+ 1 is a likelihood ratio containing probabilities for detection, maneuvers, and termination as well as probability density functions for report errors, track initiation and termination.
- each group of stuns in the constraints represents the fact that each non-dummy report occurs exactly once in a “track of data.”
- the first method as explained in this section is an improved version of our first track maintenance scheme (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994) and uses the same window length for track initiation and maintenance after the initialization step.
- the process is to start with a window of length N+1 anchored at frame one.
- N+1 anchored at frame one.
- N+1 there is only one track initiation in that we assume no prior existing tracks.
- the second and all subsequent frames there is a window of length N anchored at frame k plus a collection of tracks up to frame k. This window is denoted by ⁇ k;, k+1, . . . , k+N ⁇ .
- the following explanation of the steps is much like mathematical induction in that we explain the first step and then step k to step k+1.
- Step k At the beginning of the k th step, we solve the following (N+1)-dimensional assignment problem.
- the (N+1)-tuple ⁇ T k+1 (0),z i k+2 k+2 , . . . ,z i k+1+N k+1+N ⁇ will denote a track that initiates in the sliding window, i.e., on subsequent frames.
- said at least one inert gas has an amount, on a molar basis, that is greater than the amount of said oxygen in said pressurized medium
- the General Step k To formulate a problem for track initiation and maintenance we consider a moving window centered as frame k of length I+J+1 denoted by [k ⁇ I, . . . ,k, . . . ,k+J.
- the window length for track maintenance is J and that for initiation, I+J+1.
- the objective will be to explain the situation at this center and then the move to the same length window at center k+1 denoted by [k+1 ⁇ I k+1 ⁇ I, . . . ,k+1, . . . ,k+1+J], i.e., by moving the frame window to the right one frame at time to the right.
- the explanation from the first step follows hereinafter.
- T p,k (l k ) to denote the sequence of reports belonging to track T k (l k ) but restricted to frames prior to and including p.
- L T p,k )l k ) will denote the accumulated likelihood ratio up to and including frame p(p ⁇ k) for a track that is declared as existing on frame k as a solution of the assignment problem.
- T p , k ⁇ i p ⁇ z i p p ⁇ ⁇ belongs ⁇ ⁇ to ⁇ ⁇ one ⁇ ⁇ of ⁇ ⁇ the ⁇ ⁇ tracks listed ⁇ ⁇ on ⁇ ⁇ frame ⁇ ⁇ k , i . e .
- a primary objective in this work has been to demonstrate how multidimensional assignment problems arise in the tracking environment.
- the problem of track initiation and maintenance has been formulated within the framework of a moving window over the frames of data.
- the solution of these NP-hard, noisy, large scale, and sparse problems to the noise level in the problem is fundamental to superior track estimation and identification.
- these moving windows are overlapping, there are some algorithm efficiencies that can be identified and that take advantages of the overlap in the windows from one frame of reports to the next.
- a primal solution of one problem to warm start the solution of the next problem in the sequence.
- Multidimensional assignment problems govern the central problem of data association in multisensor and multitarget tracking. i.e., the problem of partitioning observations from multiple scans of the surveillance region and from either single or multiple sensors into tracks and false alarms.
- This fundamental problem can be stated as (A. B. Poore, Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Lexington, R.I., 19:169-198, 1995; A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994)
- c o . . . o is arbitrarily defined to be zero and is included for notational convenience.
- the zero index is used in representing missing data, false alarms, initiating and terminating tracks as described in (A. B. Poore, Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Buffalo, R.I., 19:169-198, 1995; A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion.
- the formulation is of sufficient generality to cover the MHT work of Reid, Blackman and Stein (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech. House, Norwood, Mass., 1986) and modifications by Kurien (T.Kurien. Issues in the designing of practical multitarget tracking algorithms. In Multitarget-Multisensor Tracking: Advanced Applications by Y. Bar-Shalom. Artech House, Mass., 1990) to include maneuvering targets. As suggested by Blackman (S. S. Blackman, Multiple Target Tracking with Radar Applications, Artech House, Norwood, Mass., 1986), this formulation can also be modified to include target features (e.g., size and type) into the scoring function. The recent work of Poore and Drummond (A. B. Poore and O. E.
- ⁇ is a partition of indices of the data (and thus induces a partition of the data).
- partition is defined below; however, this framework is currently sufficiently general to cover set packings and coverings (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Buffalo, R.I., 19:169-198, 1995).
- Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Lexington, R.I., 19:169-198, 1995), which uses a moving window over time, one data set will be tracks and remaining data sets will be measurements which are assigned to existing tracks, as false measurements, or to initiating tracks.
- the objects to be fused are tracks (S. S. Blackman. Multiple Target Tracking with Radar Applications.
- the dummy report z o k serves several purposes in the representation of missing data, false reports, initiating tracks, and terminating tracks (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Buffalo, R.I., 19:169-198, 1995).
- the reference partition is that in which all reports are declared to be false.
- each group of sums in the constraints represents the fact that each-non-dummy report occurs exactly once in a “track of data.”
- This formulation can modify this formulation to include multiassignments multi-assignments of one, some, or all the actual reports.
- Multitarget-Multisensor Tracking Advanced Applications by Y. Bar-Shalom. Artech House, Mass., 1990), and Stein and Blackman (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Norwood, Mass., 1986). What's more, they are easily modified to include target features and to account for different sensor types.
- the N data sets all represent reports from N sensors, possibly all the same.
- Step k At the beginning of the k th step. we solve the following (N+1)-dimensional assignment problem.
- the General Step k To formulate a problem for track initiation and maintenance we consider a moving window centered as frame k of length I+J+1 denoted by [k ⁇ I, . . . , k, . . . ,k+J].
- the window length for track maintenance is J and that for initiation, I+J+1.
- the objective will be to explain the situation at this center and then the move to the same length window at center k+1 denoted by [k+1 ⁇ I, . . . ,k+1, . . . . ,k+1+J], i.e., by moving the frame one frame at time to the right.
- the explanation from the first step follows hereinafter.
- T p,k (l k ) to denote the sequence of reports belonging to track T k (l k ) but restricted to frames prior to and including p.
- L T p,k (I k ) will denote the accumulated likelihood ratio up to and including frame p(p ⁇ k) for a track that is declared as existing on frame k as a solution of the assignment problem.
- the likelihood for T p,k (l k ) and that of the association of ⁇ z i k+1 k+1 , . . . ,z i k+n k+N ⁇ with with track T k (l k ) is given by
- a primary objective in this work has been to demonstrate how multidimensional assignment problems arise in the tracking environment.
- the problem of track initiation and maintenance has been formulated within the framework of a moving window over the frames of data.
- the solution of these NP-hard, noisy, large scale, and sparse problems to the noise level in the problem is fundamental to superior track estimation and identification.
- these moving windows are overlapping, there are some algorithm efficiencies that can been identified and that take advantages of the overlap in the windows from one frame of reports to the next.
- a primal solution of one problem to warm start the solution of the next problem in the sequence.
- Multidimensional assignment problems govern the central problem of data association in multisensor and multitarget tracking, i.e., the problem of partitioning observations from multiple scans of the surveillance region and from either single or multiple sensors into tracks and false alarms.
- . . 0 is arbitrarily defined to be zero and is included for notational convenience.
- the zero index is used in representing missing data, false alarms, initiating and terminating tracks.
- all zero-one variables z ij . . . i N with precisely one nonzero index are free to be assigned and that the corresponding cost coefficients are well-defined. (This is a valid assumption in the tracking environment.) Although not required, these cost coefficients with exactly one nonzero index can be translated to zero by cost shifting without changing the optimal assignment.
- this formulation is of sufficient generality to include the symmetric problem and the asymmetric inequality problem.
- Frieze and Yadegar introduced a method based on Lagrangian relaxation in which a feasible solution is recovered using information provided by the relaxed solution. Our choice of approaches is strongly influenced by the need to balance real-time performance and solution quality. Lagrangian relaxation based methods have been used successfully in prior tracking applications. An advantage of these methods is that they provide both an upper and lower bound on the optimal solution, which can then be used to measure the solution quality. These works extend the method of Frieze and Yadegar to the multidimensional case.
- ABSP Probabilistic Framework for Data Association
- the goal of this section is to explain the formulation of the data association problems that governs large classes of data association problems in centralized or hybrid centralized-sensor level multisensor/multitarget tracking.
- the presentation is brief; technical details are presented for both track initiation and maintenance in the work of Poore.
- the formulation is of sufficient generality to cover the MHT work of Reid, Blackman and Stein and modifications by Kurien to include maneuvering targets.
- this formulation can also be modified to include target features (e.g., size and type) into the scoring function.
- target features e.g., size and type
- Z N ) is the posterior probability of a partition ⁇ true given the data Z N .
- the term partition is defined below; however, this framework is currently sufficiently general to cover set packings and coverings.
- one data set will be tracks and remaining data sets will be measurements which are assigned to existing tracks, as false measurements, or to initiating tracks.
- the objects to be fused are tracks.
- the objects may all be measurements that represent targets or false reports, and the problem is to determine which measurements emanate from a common source.
- a partition of the data will refer to a collection of tracks of data wherein each report occurs exactly once in one of the tracks of data and such that all data is used up; the occurrence of dummy report is unrestricted.
- the dummy report z O k serves several purposes in the representation of missing data, false reports, initiating tracks, and terminating tracks.
- the reference partition is that in which all reports are declared to be false.
- each group of sums in the constraints represents the fact that each-non-dummy report occurs exactly once in a “track of data.”
- Subsection 3.1Section IV.3.1 presents some of the properties associated with the Lagrangian relaxation of (3.1)(4.7) based on relaxing the last (N ⁇ k)-sets of constraints to a two-dimensional one.
- a Section IV.3.2 describes a new approach to the problem of recovering a high quality feasible solution of the original (N ⁇ k+1)-dimensional problem given a feasible solution (optimal or suboptimal) of the relaxed two-dimensional problem is described hereinafter.
- a summary of the relaxation algorithm is given hereinafter in Section IV.3.3, following which and in Section IV.3.4, we establish the maximization of the Lagrangian dual (an important aspect of the relaxation 3 procedure) to be an unconstrained nonsmooth optimization problem and then present a method for computing the subgradients.
- the (N ⁇ k+1)-dimensional problem (3.1) (4.7) has (N ⁇ k+1) sets of constraints.
- Theorem 3.1 4.1 gives a method for evaluating ⁇ N ⁇ k+1 and states that an optimal solution of (3.2) (4.10) can be computed from that of (3.4) (4.10). Furthermore, if the solution of either of these two problems is ⁇ -optimal, then so is the other. The converse is contained in Theorem 3.2 (4.2).
- w 2 is optimal for the two-dimensional problem
- w N ⁇ k+1 is an optimal solution of (4.8).
- theorem is a converse of Theorem 4.1.
- ⁇ N - k + 1 ⁇ ( w _ N - k + 1 ; u k + 2 , ... ⁇ , u N ) ⁇ ⁇ ′ N - k + 1 ⁇ ( w 2 ; u k + 2 , ... ⁇ , u N ) ⁇ ⁇ ⁇ N - k + 1 ⁇ ( w N - k + 1 ; u k + 2 , ... ⁇ , u N ) .
- Optimality of w N ⁇ k+1 then implies the last inequality is in fact an equality. This proves the theorem.
- ⁇ N ⁇ k+1 ⁇ k+2 ⁇ N ⁇ ⁇ N ⁇ k+1 (u k+2 , . . . ,u N ) is piecewise affine, concave and continuous in ⁇ k+2 ⁇ N ⁇ u k+2 , . . . ,u N ⁇ and ⁇ N ⁇ k+1 (u k+2 , . . . ,u N ) ⁇ V N ⁇ k+I ( N ⁇ k+1 ) ⁇ V N ⁇ k+1 ( N ⁇ k+1 ).
- Most of the algorithms for nonsmooth optimization are based on generalized gradients, called subgradients, given by the following definition for a concave function. Definition 3.5. 4.1.
- a vector ge ⁇ N ⁇ k+1 is called a subgradient.
- the subdifferential ⁇ (u) is the convex hull of ⁇ g( 1 ) g(m) ⁇ (J. L. Goffin. On convergence rates of subgradient optimization methods, mathematical programming. Mathematical Programming, 13:329-347, 1977).
- These nonunique solutions arise in two ways. First, if the optimal solution of the two dimensional two-dimensional assignment problem is not unique, then one can general generate all optimal solutions of the two dimensional two-dimensional assignment problem (3.4) (4.10). Corresponding to each of these solutions and to each index pair (l k ,i k+1 )in each solution, compute the indices (j k+2 , . . .
- the next objective is to explain a recovery procedure, i.e., given a feasible (optimal or suboptimal) solution ⁇ 2 ⁇ N ⁇ k+1 ⁇ w 2 of (4.10) (or w N ⁇ k+1 of (4.8) constructed via Theorem 3.1 4.1), generate a feasible solution z N ⁇ k+1 of equation (3.1) which is close to ⁇ 2 w 2 in a sense to be specified.
- a feasible solution ⁇ 2 ⁇ N ⁇ k+1 ⁇ w 2 of (4.10) or w N ⁇ k+1 of (4.8) constructed via Theorem 3.1 4.1
- variables z ooi k+2 . . . i N N ⁇ k+1 will be treated differently in the recovery procedure in that they can be assigned either zero or one independent of the value of ⁇ oo 2 w 00 2 . This increases the feasible set of the recovery problem, leading to a potentially better solution.
- the next objective is to remove the asumption assumption that all cost coefficients are defined and all zero-one variables are free to be assigned.
- a reduced dimension assignment problem (3.14) (4.20) is valid as long as all cost coefficients c N ⁇ k are defined and all zero-one variables in z N ⁇ k are free to be assigned. Modifications are necessary for sparse problems. If the cost coefficient c l k (l k+1 ) i k+1 (l k+1 )i k+2 . . . i N N ⁇ k+1 is well-defined and the zero-one variable Z i k (l k+1 )i k+1 (l k+1 )i k+2 . . .
- c l k+1 i k+2 . . . l N N ⁇ k c l k (l k+1 )l k+1 (l k+1 )l k+2 . . . i N N ⁇ k+1 as in (3.12) (4.18) with z l k+1 i k+2 . . . l N N ⁇ k being free to be assigned. Otherwise, z i k+1 l k+2 . . . l N N ⁇ k is preassigned to zero or the corresponding arc is not allowed in the feasible set of arcs.
- V N ⁇ ( z ⁇ N ) ⁇ i 1 ⁇ ... ⁇ ⁇ i N ⁇ ⁇ c i 1 ⁇ ... ⁇ ⁇ i N N ⁇ z ⁇ i 1 ⁇ ... ⁇ ⁇ i N N ( [ [ ⁇ 3.21 ] ] ⁇ ⁇ 4.26 ) and the lower by ⁇ N ⁇ 3 . . . ,u N ) for any multiplier value (u 3 , . . . , u N ).
- V N ( ⁇ circumflex over (z) ⁇ ) V 2 (Y) where Y is the optimal solution of (3.17) (4.23) used in the construction of ⁇ circumflex over (z) ⁇ in equations (3.18) (4.24)-(3.20) (4.26).
- . o N is arbitrarily defined to be zero and is included for notational convenience and where the superscript N on both c and z is not an exponent, but denotes the dimension of the subscripts and the assignment problem as stated in (2.5) (3.5).
- c o . . . o N need not be zero!
- all zero-one variables z i 1 . . . i N N with precisely one nonzero index are free to be assigned and that the corresponding cost coefficients are well-defined. (This is a valid assumption in the tracking environment (A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B.
- Algorithm 4.1 5.1 (Lagrangian Relaxation Algorithm). To construct a high quality feasible solution, enoted denoted by ⁇ circumflex over (z) ⁇ N , of the assignment problem (4.1) (5.1), proceed as follows:
- Step 2 is the computational part of the algorithm. Evaluating ⁇ N ⁇ k+1 search procedure requires 99% of the computing time in the algorithm. This part uses two dimensional two-dimensional assignment algorithms, a search over a large number of indices, and a nonsmooth optimization algorithm. It is the second part (the search) that consumes 99% of the computational time and this is almost entirely parallelizable.
- the three dimensional three-dimensional assignment problem (5.1) (6.1) has three sets of constraints and one can describe the relaxation by relaxing any of the three sets of constraints, the description here is based on relaxing the last set of constraints.
- ⁇ 3 is a concave, continuous, and piecewise affine function of the multiplier vector u 3 , so that the maximization of ⁇ 3 is a problem of nonsmooth optimization. Since many of these algorithms require a function value and a subgradient of ⁇ 3 ⁇ 3 ⁇ ⁇ 3 at any required multiplier value (u 3 ), we address this problem in the next subsection. We note, however, that there are other ways to maximize ⁇ 3 and the next subsection addresses but one such method.
- the first is that the search procedure needed for the computation of the relaxed cost coefficients in (5.3) (6.3) is the most computationally intensive part of the entire relaxation algorithm.
- the second is that a feasible solution z 3 of a sparse problem (5.1) (6.1) yields a feasible solution z 2 of (5.4) (6.4) via the construction
- Theorem 5.1 6.1 states that an optimal solution of (5.2) (6.2) can be computed from that of (5.4) (6.4). Furthermore, if the solution of either of these two problems is ⁇ ⁇ then so is the other. The converse is contained in Theorem 5.2 6.2.
- the next objective is to explain a recovery procedure, i.e., given a feasible (optimal or suboptimal) solution w 2 of (5.4) (6.4) (or w 3 of (5.2) (6.2) constructed in Theorem 5.1 6.1), generate a feasible solution z 3 of equation (5.1) (6.1) which is close to w 2 in a sense to be specified.
- a feasible solution w 2 of (5.4) (6.4) or w 3 of (5.2) (6.2) constructed in Theorem 5.1 6.1
- a feasible solution z 3 of equation (5.1) (6.1) which is close to w 2 in a sense to be specified.
- variables z OOi 3 3 will be treated differently in the recovery procedure in that they can be assigned either zero or one independent of the value w OO 2 . This increases the feasible set of the recovery problem, leading to a potentially better solution.
- the next objective is to remove the assumption that all cost coefficients are defined and all zero-one variables are free to be assigned.
- a reduced dimension two-dimensional assignment problem (5.13) (6.11) is valid as long as all cost coefficients c 2 are defined and all zero-one variables in z 2 are free to be assigned. Modifications are necessary for sparse problems.
- each group of sums in the constraints represents the fact that each non-dummy report occurs exactly once in a “track of data”.
- the complete dual problem is another way of solving the LP problem and may indeed be more efficient in certain applications.
- the solution of this dual problem may provide excellent initial approximations to the multipliers for Lagrangian relaxations.
- ABSIX Adaptive Window Size Selection
- ABSP Algorithm Enhancements due to Data Structures
- the basic algorithm can perform the same sensitivity analysis at each stage (loop) of the algorithm as is done in the two dimensional two-dimensional assignment problem since the evaluation of function ⁇ N ⁇ k+1 is equivalent to a two dimensional two-dimensional assignment: problem.
- the basic algorithm can perform the same sensitivity analysis at each stage (loop) of the algorithm as is done in the two dimensional two-dimensional assignment problem since the evaluation of function ⁇ N ⁇ k+1 is equivalent to a two dimensional two-dimensional assignment: problem.
- Theorem ⁇ -CS preserved during every forward and reverse iteration.
- Step 2 is the computational part of the algorithm. Evaluating ⁇ N ⁇ k+1 ⁇ and computing a subgradient use in the search procedure requires 99% of the computing time in the algorithm.
- This part uses two dimensional two-dimensional assignment algorithms, a search over a large number of indices, and a nonsmooth optimization algorithm. It is the second part (the search) that consumes 99% of the computational time and this is almost entirely parallelizable. Indeed, there are two dimensional two-dimensional assignment solvers that are highly parallelizable. Thus, we need but parallelize the nonsmooth optimization solver to have a reasonably complete parallelization.
Landscapes
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
A method and system for real-time tracking of objects is are disclosed. A region is repeatedly scanned providing a plurality of images or data sets having points corresponding to ojbects objects in the region to be tracked. Given a previously determined track for each object in the region, an M-dimensional combinatorial optimization assignment problem is formulated using the points from M-1 of the images or data sets, wherein each point is preferably used in extending at most one track. The M-dimensional problem is subsequently solved for an optimal or near-optimal assignment of the points to the tracks, extending the tracking of the objects so that a response to each object can be initiated by the system in real-time. Speed and accuracy is provided by an iterative Lagrangian Relaxation technique wherein a plurality of constraint dimensions are relaxed simultaneously to yield a reduced dimensional optimization problem whose solution is used to formulate an assignment problem of dimensionality less than M. The iterative reducing of dimensions terminates when exact solutions are determined for two-dimensional cases. A recovery procedure is used for determining a higher dimensional assignment problem solution from a problem having one less dimension. The procedure is useful when the reduced dimensional optimizational problem has two constraint dimensions.
Description
This application is a reissue of U.S. Pat. No. 5,959,574 which is a continuation-in-part of U.S. patent application Ser. No. 08/404,024, filed Mar. 14, 1995 and issued Jul. 16, 1996 as U.S. Pat. No. 5,537,119, which is a continuation-in-part of U.S. patent application Ser. No. 08/171,327 filed Dec. 21, 1993, now U.S. Pat. No. 5,406,289.
This invention was made with government support under Grant Nos. F49620-00-1-0108, F49620-93-1-0133, F49620-95-1-0136, and F49620-97-1-0273 awarded by the U.S. Air Force Office of Scientific Research to Colorado State University Research Foundation. The government has certain rights in the invention.
The invention relates generally to computerized techniques for processing data obtained from radiation reflections used to track multiple discrete object.
a. Field of the Invention
The invention relates generally to computerized techniques for processing data obtained from radar to track multiple discrete objects.
b. Description of the Background
There are many situations where the courses of multiple objects in a region must be tracked. Typically, radar is used to scan the region and generate discrete images or “snapshots” based on sets of returns or observations. In some types of tracking systems, all the returns from any one object are represented in an image as a single point unrelated to the shape or size of the objects. “Tracking” is the process of identifying a sequence of points from a respective sequence of the images that represents the motion of an object. The tracking problem is difficult when there are multiple closely spaced objects because the objects can change their speed and direction rapidly and move into and out of the line of sight for other objects. The problem is exacerbated because each set of returns may result from noise as well as echoes from the actual objects. The returns resulting from the noise are also called false positives. Likewise, the radar will not detect all echoes from the actual objects and this phenomena is called a false negative or “missed detect” error. For tracking airborne objects, a large distance between the radar and the objects diminishes the signal to noise ratio so the number of false positives and false negatives can be high. For robotic applications, the power of the radar is low and as a result, the signal to noise ratio can also be low and the number of false positives and false negatives high.
In view of the proximity of the objects to one another, varied motion of the objects and false positives and false negatives, multiple sequential images should be analyzed collectively to obtain enough information to properly assign the points to the proper tracks. Naturally, the larger the number of images that are analyzed, the greater the amount of information that must be processed.
While identifying the track of an object, a kinematic model may be generated describing the object's location, velocity and acceleration may be generated of the object. Such a model provides the means by which the object's future motion of the object can be predicted. Based upon such a prediction, appropriate action may be initiated. For example, in a military application there is a need to track multiple enemy aircraft or missiles in a region to predict their objective, plan responses and intercept them. Alternatively, in a commercial air traffic control application there is a need to track multiple commercial aircraft around an airport to predict their future courses and avoid collision. Further, in these and other applications, such as robotic applications, may use radar, sonar, infrared or other object detecting radiation bandwidths for tracking objects. In particular, in robotic applications reflected radiation can be used to track a single object which moves relative to the robot (or vice versa) so the robot can work on the object.
Consider the very simple example of two objects being tracked and no false positives or false negatives. The radar, after scanning at time t1, reports objects at two locations in a first observation set. That is, it returns a set of two observations {o11, o12}. At time t2 it returns a similar set of two observations {o21, o22} from a second observation set. Suppose from prior processing that track data for two tracks T1 and T2 includes the locations at t0 of two objects. Track T1 may be extended through the points in the two sets of observations in any of four ways, as may track T2. The possible extensions of T1 can be described as: {T1, o11, o21}, {T1, o11, o22}, {T1, o12, o21} and {T1, o12, o22}. Tracks can likewise be extended from T2 in four possible ways, including, {T2, o12, o21}. FIG. 1 illustrates these five (out of eight) possible tracks (to simplify the problem for purposes of explanation) . The five track extensions are labeled h11, h12, h13, h14, and h21 wherein h11 is derived from {T1, o11, o21}, h12 is derived from {T1, o11, o,22}, h13 is derived from {T1, o12, o21}, h14 is derived from {T1, o12, o22}, and h21 is derived from {T2, o11, o21}. The problem of determining which such track extensions are the most likely or optimal is hereinafter known as the assignment problem.
It is known from prior art to determine a figure of merit or cost for assigning each of the points in the images to a track. The figure of merit or cost is based on the likelihood that the point is actually part of the track. For example, the figure of merit or cost may be based on the distance from the point to an extrapolation of the track. FIG. 1 illustrates costs δ21 δ22 21 modeled target characteristics. The function to calculate the cost will normally incorporate detailed characteristics of the sensor, such as probability of measurement error, and track characteristics, such as likelihood of track maneuver.
A solution to the assignment problem satisfies two constraints—first, the sum of the associated costs for assigning points to a track extension is minimized and, second, if no false positives or false negatives exist, then each point is assigned to one and only one track.
When false positives exist, however, additional hypothetical track extensions incorporating the false positives will be generated. Further note that the random locations of false positives will, in general, not fit well with true data and such additional hypothetical track extensions will result in higher costs. Also note that when false negative errors exist, then the size of the cost matrix must grow to include hypothetical track extensions formulated with “gaps” (i.e., data omissions where there should be legitimate observation data) for the false negatives. Thus, the second criteria must be weakened to reflect false positives not being as signed and also to permit the gap filler to be multiply assigned. With hypothetical cost calculated in this manner then the foregoing criteria for minimization will tend to materialize the false negatives and avoid the false positives.
For a 3-dimensional three-dimensional problem, as is illustrated in FIG. 1 , but with N1 (initial) tracks, N2 observations in scan 1, N3 observations in scan 2, false positives and negatives assumed, the assignment problem can be formulated as:
where “c” is the cost and “z” is a point or observation assignment, as in
The minimization equation or equivalently objective function [1.0] (a) (0.1 (a)) specifies the sum of the element by element product of the c and z matrices. The summation includes hypothesis representations Zi 1 i 2 i 3 with observation number zero being the gap filler observation. Equation [1.01] (b) (0.1 (b)) requires that each of the tracks T1, . . . , TN 1 be extended by one and only one hypothesis. Equation [1.0](c) (0.1 (c)) relates to each point or observation in the first observation set and requires that each such observation, except the gap filler, can only associate with one track but, because of the “less than” condition, it might not associate with any track. Equation [1.01] (d) (0.1 (d)) is like [1.0] (c) (0.1 (c)) except that it is applicable to the second observation set. Equation [1.0] (e) (0.1 (e)) requires that elements of the solution matrix z be limited to the zero and one values.
The only known method to solve Problem Formulation [1.0] (1.0) exactly is a method called “Branch and Bound.” This method provides a systematic ordering of the potential solutions so that solutions with a same partial solution are accessible via a branch of a tree describing all possible solutions whereby the cost of unexamined solutions on a branch are incrementally developed as the cost for other solutions on the branch are determined. When the developing cost grows to exceed the previously known minimal cost (i.e., the bound) then enumeration of the tree branch terminates. Evaluation continues with a new branch. If evaluation of the cost of a particular branch completes, then that branch has lower cost than the previous bound so the new cost replaces the old bound. When all possible branches are evaluated or eliminated then the branch that had resulted in the last used bound is the solution. If we assume that N1=N2=N3=n and that branches typically evaluate to half there full length, then workload associated with “branch and bound” is proportional to (n!|n/2)!)2. This workload is unsuited to real time evaluation.
The Branch and Bound algorithm has been used in past research on the Traveling Salesman Problem. Messrs. Held and Karp showed that if the set of constraints was relaxed by a method of Lagrangian Multipliers (described in more detail below) then tight lower bounds could be developed in advance of enumerating any branch of the potential solution. By initiating the branch and bound algorithm with such a tight lower bound, significant performance improvements result in that branches will typically evaluate to less than half their full length.
Messrs. Frieze and Yadagar in dealing with a problem related to scheduling combinations of resources, as in job, worker and work site, showed that Problem Formulation [1.0] (1.0) applied. They further described a solution method based upon an extension of the Lagrangian Relaxation previously mentioned. The two critical extensions provided by Messrs. Frieze and Yadagar were: (1) an iterative procedure that permitted the lower bound on the solution to be improved (by “hill climbing” described below) and (2) the recognition that when the lower bound of the relaxed problem was maximized, then there existed a method to recover the solution of the non-relaxed problem in most cases using parameters determined at the maximum. The procedures attributed to Messrs. Frieze and Yadagar are only applicable to the 3-dimensional three-dimensional problem posed by Problem Formulation [1.0] (1.0) and where the cost matrix is fully populated. However, tracking multiple airborne objects usually requires solution of a much higher dimensional problem.
It was also known that the data assignment problem may be simplified (without reducing the dimension of the assignment problem) by eliminating from consideration for each track those points which, after considering estimated limits of speed and turning ability of the objects, could not physically be part of the track. One such technique, denoted hereinafter the “cone method,” defines a cone as a continuation of each previously determined track with the apex of the cone at the end of the previously defined track. The length of the cone is based on the estimated maximum speed of the object and the size of the arc of the cone is based on the estimated maximum turning ability of the object. Thus, the cone defines a region outside of which no point could physically be part of the respective track. For any such points outside of the cones, an infinite number could be put in the cost matrix and a zero could be preassigned in the assignment matrix. It was known for the tracking problem that these elements will be very common in the cost and selection matrices (so these matrices are “sparse”).
It was also known in the prior art that one or more tracks which are substantially separated geographically from the other tracks can be separated also in the assignment problem. This is done by examining the distances from each point to the various possible tracks. If the distances from one set of points are reasonably short only in relation to one track, then they are assigned to that track and not further considered with the remainder of the points. Similarly, if a larger group of points can only be assigned to a few tracks, then the group is considered a different assignment problem. Because the complexity of assignment problems increases dramatically with the number of possible tracks and the total number of points in each matrix, this partitioning of the group of points into a separate assignment problem and removal of these points from the matrices for the remaining points, substantially reduces the complexity of the overall assignment problem.
A previously known Multiple Hypothesis Testing (MHT) algorithm (see Chapter 10 of S.S. Blackman,. Multiple-Target Tracking with Radar Applications, Chapter 10,. Artech House, Norwood, MA, 1986.) related to formulation and scoring. The MHT procedure describes how to formulate the sparse set of all reasonable extension hypothesis (for FIG. 1 the set {h11 . . . h24}) and how to calculate a cost of the hypothesis {Ti, o1j, o2k} based upon the previously calculated cost for hypothesis {Ti, o1j}. The experience with the MHT algorithm, known in the prior art, is the basis for the assertion that look ahead through k sets of observations results in improved assignment of observations from the first set to the track.
In theory, the MHT procedure uses the extendable costing procedure to defer assignment decision until the accumulated evidence supporting the assignment becomes overwhelming. When it makes the assignment decision, it then eliminates all potential assignments invalidated by the decision in a process called “pruning the tree.” In practice, the MHT hypothesis tree is limited to a fixed number of generations and the overwhelming evidence rule is replaced by a most likely and feasible rule. This rule considers each track independently of others and is therefore a local decision rule.
A general object of the present invention is to provide an efficient and accurate process for assigning each point object in a region from multiple images to a proper track and then taking an action based upon the assignments.
A more specific object of the present invention is to provide a technique of the foregoing type which determines the solution of a k-dimensional assignment problem where “k” is greater than or equal to three.
The present invention relates to a method and apparatus for tracking objects. In particular, the present invention tracks movement or trajectories of objects by analyzing radiation reflected from the objects, the invention being especially useful for real-time tracking in noisy environments.
In providing such a tracking capability, a region containing the objects is repeatedly scanned to generate a multiplicity of sequential images or data observation sets of the region. One or more points (or equivalently observations), in each of the images or observation sets are detected wherein each such observation either corresponds to an actual location of an object or is an erroneous data point due to noise. Subsequently, for each observation detected, figures of merit or costs are determined for assigning the observation to each of a plurality of previously determined tracks. *Afterwards, a first optimization problem is specified which includes:
-
- (a) a first objective function for relating the above mentioned costs to potential track extensions through the detected observations (or simply observations); and
- (b) a first collection of constraint sets wherein each constraint set includes constraints to be satisfied by the observations in a particular scan to which the constraint set is related. In general, there is a constraint for each observation of the scan, wherein the constraint indicates the number of track extensions to which the observation may belong.
In particular, the first optimization problem is formulated, generated or defined as an M-dimensional assignment problem wherein there are M constraint sets in the first collection of constraint sets (i.e., there are M scans being examined) and the first objective function minimizes a total cost for assigning observations to various track extensions wherein terms are included in the cost, such that the terms have the figures of merit or costs for hypothesized combinations of assignments of the observations to the tracks. Subsequently, the formulated M-dimensional assignment problem is solved by reducing the complexity of the problem by generating one or more optimization problems each having a lower dimension and then solving each lower dimension optimization problem. That is, the M-dimensional assignment problem is solved by solving a plurality of optimization problems each having a lower number of constraint sets.
The reduction of the M-dimensional assignment problem to a lower dimensioned problems is accomplished by relaxing the constraints on the points of one or more scans thereby permitting these points to be assigned to more than one track extension. In relaxing the constraints, terms having penalty factors are added into the objective function thereby increasing the total cost of an assignment when one or more points are assigned to more than one track. Thus, the reduction in complexity by this relaxation process is iteratively repeated until a sufficiently low dimension is attained such that the lower dimensional problem may be solved directly by known techniques.
In one embodiment of the invention, each k-dimensional assignment problem 2<k≦M, (2<k≦M) is iteratively reduced to a k−1 dimensional (k−1)-dimensional problem until a 2-dimensional two-dimensional problem is specified or formulated. Subsequently, the 2-dimensional two-dimensional problem formulated is solved directly and a “recovery” technique is used to iteratively recover an optimal or near-optimal solution to each k-dimensional problem from a derived (k−1) dimensional (k−1)-dimensional problem k=2, 3, 4, . . . M.
In performing each recovery step (of obtaining a solution to a k-dimensional problem using a solution to a (k−1)-dimensional problem), an auxiliary function, is utilized. In particular, to recover an optimal or near-optimal solution to a k-dimensional problem, an auxiliary function, Ψk−1, k=4, 5, . . . , M), is specified and a region or domain is determined wherein this function is maximized, whereby values of the region determine the penalty factors of the (k−1)-dimensional problem such that another 2-dimensional two-dimensional problem can be formulated which determines a solution to the k-dimensional problem using the penalty factors of the (k−1)-dimensional problem.
Each Auxiliary function Ψk, k=3, . . . , M−1, is a function of of both lower dimensional problem problems, penalty factors, and a solution at the dimension k at which the penalized cost function is solved directly (typically a 2-dimensional two-dimensional problem). Further, in determining, for auxiliary function Ψk, a peak region, a gradient of the auxiliary function is determined, and utilized to identify the peak region. Thus, gradients are used for each of the approximation functions Ψ3, Ψ4,. . . , ΨM−1 determining penalty factors penalty factors until tm−1 M−1 is used in determining the penalty factors for the M−1 dimensional (M−1)-dimensional problem. Subsequently, once the M-dimensional problem is solved (using a 2-dimensional two-dimensional problem to go from an (M−1) dimensional (M−1)-dimensional solution to an M-dimensional solution), one or more of the following actions are taken based on the track assignments: sending a warning to aircraft or a ground or sea facility, controlling air traffic, controlling anti-aircraft or anti-missile equipment, taking evasive action, working on one of the objects.
According to one feature of this first embodiment of the present invention, the following steps are also performed before the step of defining the auxiliary function. A preliminary auxiliary function is defined for each of the lower dimensional problems having a dimension equal or one greater than the dimension at which the penalized cost function is solved directly. The preliminary auxiliary function is a function of lower order penalty values and a solution at the dimension at which the penalized cost function was solved directly. In determining a gradient of the preliminary auxiliary function, step in the direction of the gradient to identify a peak region of the preliminary auxiliary function and determine penalty factors at the peak region. Iteratively repeat the defining, gradient determining, stepping and peak determining steps to define auxiliary functions at successively higher dimensions until the auxiliary function at 6-18 (k−1) dimension (k−1) is determined. In an alternative second embodiment of the present invention, instead of reducing the dimentiality of the M-dimensional assignment problem by a single dimension at a time, a plurality of dimensions are relaxed simultaneously. This new strategy has the advantage that when the M-dimensional problem is relaxed directly to a 2-dimensional two-dimensional assignment problem, then all computations may be performed precisely without utilizing an auxiliary function such as Ψk as in the first embodiment. More particularly, the second embodiment solves the first optimization problem (i.e., the M-dimensional assignment problem) by specifying (i.e., creating, generating, formulating and/or defining) a second optimization problem. The second optimization problem includes a second objective function and a second collection of constraint sets wherein:
-
- a) the second objective function is a combination of the first objective function and penalty factors or terms determined for incorporating M-m constraint (M−m)-constraint sets of the first optimization problem into the second objective function;
- b) the constraint sets of the second collection include only m of the constraint sets of the first collection of constraints,
wherein 2≦m≦M−1. Note that, once the second optimization problem has been specified or formulated, an optimal or near-optimal solution is determined and that solution is used in specifying (i.e., creating, generating, formulating and/or defining) a third optimization problem of M-m (M-m) dimensions (or equivalently constraint sets). The third optimization problem is subsequently solved by decomposing it using the same procedure of this second embodiment as was used to decompose the first optimization problem above. Thus, a plurality of instantiations of the third optimization problem are specified, each successive instantiation having a lower number of dimensions, until an instance of the third optimization problem is a two dimensional two-dimensional assignment problem which can be solved directly. Subsequently, whenever an instance of the third optimization problem is solved, the solution is used to recover a solution to the instance of the first optimization problem from which this instance of the third optimization was derived. Thus, an optimal or near-optimal solution to the original first optimization problem may be recovered through iteration of the above steps.
As mentioned above, the second embodiment of the present invention is especially advantageous when m=2, since in this case all computations may be performed precisely and without utilizing auxiliary functions.
Other features and benefits of the present invention will become apparent from the detailed description with the accompanying drawings contained hereinafter.
Referring now to the other figures in detail wherein like reference numerals indicate like elements throughout the several views, FIG. 3 illustrates a system generally designated 100 for implementing the present invention. System 100 comprises, for example, a radar station 102 (note sonar, microwave, infrared and other radiation bandwidths are also contemplated) for scanning a region which may be, for example, an aerial region (in aerial surveillance applications) or a work region (in robotic applications) and generating signals indicating locations of objects within the region. The signals are input to a converter 104 which converts the signals to data points or observations in which each object (or false positive) is represented by a single point. The output of the converter is input to and readable by a computer 106. As described in more detail below, the computer 106 assigns the points to respective tracks, and then displays the tracks and extrapolations of the tracks on a monitor 110. Also, the computer 106 determines an appropriate action to take based on the tracks and track extensions. For example, in a commercial application at an airport, the computer can determine if two aircraft being tracked are on a collision course and if so, signal a transmitter 112 to warn each aircraft, or if a scheduled take-off will pose the risk of collision, delay the take-off. For a military application on a ship or base, the computer can determine subsequent coordinates of enemy aircraft and send the coordinates to an antiaircraft gun or missile 120 via a communication channel 122. In a robotic application, the computer controls the robot to work on the proper object or portion of the object.
The invention generates k-dimensional matrices where k is the number of images or sets of observation data in the look ahead window plus one. Then, the invention formulates a k-dimensional assignment problem as in [1.0] (0.1) above.
The k-dimensional assignment problem is subsequently relaxed to a (k−1)-dimensional problem by incorporating one set of constraints into the objective function using a Lagrangian relaxation of this set. Given a solution of the (k−1)-dimensional problem, a feasible solution of the k-dimensional problem is then reconstructed. The (k−1)-dimensional problem is solved in a similar manner, and the process is repeated until it reaches the two-dimensional problem that can be solved exactly. The ideas behind the Lagrangian relaxation scheme are outlined next.
Consider the integer programming problem
where the partitioning of the constraints is natural in some sense. Given a multiplier vector u≧0, the Lagrangian relaxation of [1.0.1] (0.2) relative to the constraints Bz≦d is defined to be
-
- ΦΦTT
If the constraint set Bz≦d is replaced by Bz=d, the nonnegativity non-negativity constraint on u is removed. L=CTz+uT(Bz−d) L=cTz+uT(Bz−d) is the Lagrangian relative to the constraints Bz≦d, and hence the name Lagrangian relaxation. The following fact gives the relationship between the objective functions of the original and relaxed problems.
FACT A.1. If z is an optimal solution to [1.0.1] (0.2), then Φ≦v( z ) Φ(u)≦v( z ) for all u≧0. If an optimal solution {circumflex over (z)} of [1.0.2] (0.3) is feasible for [1.0.2] (0.3), then {circumflex over (z)} is an optimal solution for [1.0.1] (0.2) and Φ Algor ithm Φ(u)=v({circumflex over (z)}).
kk ∞=0
kk ∞=0
This leads to the following algorithm:
Algorithm. Construct a sequence of multipliers {uk}∞ k=0 converging to the solution ū of Maximize {Φ≧0} {Φ(u):u≧0} and a corresponding sequence of feasible solutions {Zk}k=0of [1.0.1] (0.2) as follows:
-
- 1. Generate in an initial approximation u0.
- 2. Given uk, choose a search direction sk and a search distance αk Ψk αk k Ψk so that Φ(uk+αksk)>Φ(u k). Update the multiplier estimate uk by uk+1=uk+αk k uk+1=uk+αksk.
- 3. Given uk+1 and a feasible solution {circumflex over (Z)}k+1 (uk+1){circumflex over (z)}k+1 (uk+1) of [1.0.2](0.3), recover a feasible solution zk+1 (uk+1) of the integer programming problem [1.0.1](0.2).
- 4. Check the termination criteria. If the algorithm is not finished, set k=k+1 and return to
Step 2. Otherwise, terminate the algorithm.
If z is an optimal solution of [1.0.1] (0.2), then
-
- Ψk≦Ψ≦V (
z )≦(zk)
Since the optimal solution {circumflex over (z)}={circumflex over (z)}(u) of [1.0.2] (0.3) is usually not a feasible solution of [1.0.1] (0.2) for any choice of the multipliers,
- Ψk≦Ψ≦V (
Φ(ū) is usually strictly less than v(
-
- p≦p≦k
Thus, to eliminate the “<” in the constraint formulations (e.g., (0.1)(a)-(0.1)(d)) that resulted from false positives, the constraint sets have been modified, as indicated above, to incorporate a gap filler in each observation set to account for false positives. Thus, a zero for an index, ip, l≦p≦k in zk i 1 . . . i k in problem [1.1] (0.4) below indicates that the track extension represented by zk i 1 . . . i k includes a false positive in the pth observation set. Note that this implies that a hypothesis be formed incorporating an observation with k−1 gap fillers, e.g., z0 . . . 0i p . . . 0, ip≠0. Thus, the resulting generalization of Problem Formulation [1.0] (0.1) without the “less than” complication within the constraints is the following k-Dimensional Assignment Problems in which k≦3:
where c and z are similarly dimensioned matrices representing costs and hypothetical assignments. Note, in general, for tracking problems these matrices are sparse.
After formulating the k-dimensional assignment problem as in [1.1] (0.4), the present invention solves the resulting problem so as to generate the outputs required by devices 110, 112, 122 and 130. For each observation set oi received from converter 104 at time ti where i=1 . . . , N1, the computer processes Oi in a batch together with the other observation sets Oi−k+1, . . . , Oi and the track Ti−k, i.e., Tj is the set of all tracks that have been defined up to but not including Oj. (Note, bold type designations refer to the vector of elements for the indicated time, i.e., the set of all observations in the scan or tracks existing at the time, etc.) The result of this processing is the new set of tracks Ti−k+1 and a set of cost weighted possible solutions indicating how the tracks might extend to the current time ti. At time ti+1 the batch process is repeated using the newest observation set and deleting the oldest. Thus, there is a moving window of observation sets which is shifted forward to always incorporate the most recent observation set. The effect is that input observation sets are reused for k−1 (k−1) cycles and then on the observation set's k-th kth reuse each observation within the observation set is integrated into a track.
As noted above, the foregoing track extension process requires knowledge of a previous track. For the initial observations, the following gating process 158 and filtering process 160 determine the “previous track” based on initial observations. In determining the initial tracks, the points from the first observation set form the beginning points of all possible tracks. After observation data from the next observation set is received, sets of simple two point two-point straight line tracks are defined. Then, promotion, gate formulation, and output step 162 determines a zone in which future extensions are possible. Note that filtering step 160 uses curve fitting techniques to smooth the track extensions depending upon the number of prior observations that have accumulated in each hypothesis. Further note that promotion, gate formulation and output process 162 also determines when sufficient observations have accumulated to form a basis for promoting the track to processes 150 and 152 as described above.
The output of each of the filtering processes 152 and 160 is a set of hypothetical track extensions. Each such extension contains the hypothetical initial conditions (from the previous track), the list of observations incorporated in the extension, and distance between each observation and the filtered track curve. Scoring process 154 determines the figure of merit or cost of an observation being an extension of a track. In one embodiment, the cost is based on the above-mentioned distance although the particular formula for determining the cost is not critical to the present invention. A preferred formula for determining the cost utilizes a negative log likelihood function in which the cost is the negative of the sum of: (a) the logs of the distances normalized by sensor standard deviation parameters, and (b) the log likelihoods for events related to: track initiation, track termination, track maneuver, false negatives and false positives. Note that track maneuvers are detected by comparing the previous track curve with the current extension. Further note that some of the other events related to, for example, false negatives and false positives are detected by analyzing the relative relationship of gap fillers in the hypothesis. Thus, after determining that one of these events occurred, a cost for it can be determined based upon suitable statistics tables and system input parameters. The negative log likelihood function is desirable because it permits effective integration of the useful components. Copies of the set of hypothetical track extensions which are scored are subsequently passed directly to one of the gate formulation and output steps 156 and 162. Note that the scoring process 154 also arranges the actual scores in a sparse matrix based upon observation identifiers, and passes them to k-dimensional assignment problem solving process 300.
The assignment solving process 300 is described below. Its output is simply the list of assignments which constitute the most likely solution of the problem described by Equation [1.1] (0.4). Note that both gate formulation and output processes 156 and 162 use (at different times) the list of assignments to generate the updated track history Ti to eliminate or prune alternative previous hypotheses that are prohibited by the actual assignments in the list, and, subsequently, to output any required data. Also note that when one of the gate formulation and output processes 156 and 162 accomplish these tasks, the process will subsequently generate and forward the new set of gates for each remaining hypothesis and the processes will then be prepared to receive the next set of observations. In one embodiment, the loop described here will generate zones for a delayed set of observations rather than the subsequent set. This permits processes 156 and 162 to operate on even observation sets while the scoring step 154 and k-dimensional solving process operate on odd sets of observations, or vice versa.
The assignment solving process 300 permits the present invention to operate with a window size of dimension k−1 for some k≧3. The upper limit on k depends only upon the computational power of the computer 106 and the response time constraints of system 100. The k−1 observation sets within the processing window plus the prior track history result in a k-dimensional Assignment Problem as described by Problem Formulation [1.1] (0.4). The present invention solves this generalized problem including the processes required to consider false positives and negatives, and also the processes required to consider sparse matrix problem formulations.
I. A FIRST EMBODIMENT OF THE k-DIMENSIONAL ASSIGNMENT SOLVER 300
In describing a first embodiment of the k-dimensional assignment solver 300, it is worthwhile to also discuss the process of FIG. 4 which is used by the solver 300. FIG. 4 illustrates use of the Frieze and Yadagar process as shown in prior art for transforming a 3-dimensional three-dimensional assignment problem into a 2-dimensional two-dimensional assignment problem and then use a hill climbing algorithm to solve the 3-dimensional three-dimensional assignment problem. The solver 300 uses a Lagrangian Relaxation technique (well known in the art) to reduce the dimension of an original k-dimensional assignment problem (k>3) down to a 3-dimensional three-dimensional problem and then use the process of FIG. 4 to solve the 3-dimensional three-dimensional problem. Further note that the Lagrangian Relaxation technique is also utilized by the process of FIG. 4 and that in using this technique the requirement that each point is assigned to one and only one track is relaxed. Instead, an additional cost, which is equal to a respective Lagrangian Coefficient “u” u, is added to the cost or objective function [1.0] (0.1) (a) whenever a point is assigned to more than one track. This additional cost can be picked to weight the significance of each constraint violation differently, so this additional cost is represented as a vector of coefficients u which are correlated with respective observation points. Hill climbing will then develop a sequence of Lagrangian Coefficients sets designated (u0, . . . , uj, uj+1, . . . , up). That correspond to an optimum solution of the 2-dimensional two-dimensional assignment problem. The assignments at this optimum solution are then used to “recover” the assignment solution of the 3-dimensional three-dimensional assignment problem.
In step 200 of FIG. 4 , initial values are selected for the u0 coefficients. Because the Lagrangian Relaxation process is iterative, the initial values are not critical and are all initially selected as zero. In step 202, these additional costs are applied to the objective function [1.0] (0.1 (a). With the addition of the costs “u” u, the goal is still to assign the points which minimize the total cost. This transforms Equation [1.0] (0.1 (a), written for k=3 and altered to exclude mechanisms related to false positives and negatives, into objective function [2.1] (1.1) (a). In the first iteration it is not necessary to consider the “u” u matrix because all “u” u values are set to zero. To relax the requirement that each point be assigned to one and only one track, the constraint Equation [1.0] (0.1 (d) is deleted, thereby permitting points from the last image to be assigned to more than one track. Note that while any axis can be chosen for relaxation, observation constraints are preferably relaxed. The effect of this relaxation is to create a new problem which must have the same solution in the first two axes but which can have a differing different solution in the third axis. The result is constraints [2.1] (1.1) (b-d).
Step 204 then generates from the 3-dimensional three-dimensional problem described by Problem Formulation [1.0] (0.1) a new 2-dimensional two-dimensional problem formulation which will have the same solution for the first two indices. As Problem Formulation [2.1] (1.1) has no constraints on the 3rd axis, any value within a particular 3rd axis can be used in a solution, but using anything other than the minimum value from any 3-
The cost or objective function for the reduced problem as defined by [2.2] (1.2) (a), if evaluated at all possible values of u is a surface over the domain of U3 u. This surface is referred to as Φu Φ(u) and is non-smooth but provably convex (i.e., it has a single peak and several other critical characteristics which form terraces). Due to the convex characteristics of Φ(u), the results from solving Problem Formulation (1.2) at any particular uj can be used to generate a new set of
coefficients uj+1, whose corresponding Problem Formulation [2.2] problem solution is a cost value is closer to the peak of Φ u UPdimensional Φ(u). The particular set of Lagrangian Coefficients that will generate the two-dimensional problem resulting in the maximum cost is designated up. To recover the solution to the three-dimensional assignment problem requires solving the Equation 2.2 (1.2) problem corresponding to up.
In step 206, the two dimensional (two-dimensional) problem is solved directly using a technique known to those skilled in the art such as Reverse Auction for the corresponding cost and solution values. This is the evaluation of one point on the surface or for the first iteration ΦU0 Φ(u0).
Thus, after this first iteration, the points have been assigned based on all “u” values being arbitrarily set to zero. Because the “u” values have been arbitrarily assigned, it is unlikely that these assignments are correct and it is likely that further iterations are required to properly assign the points. Step 208 determines whether the points have been properly assigned after the first iteration by determining if for this set of assignments whether a different set of “u” values could result in a higher total cost. Thus, step 208 is implemented by determining the gradient of objective function [2.2] (1.2 (a) with respect to uj. If the gradient is substantially non-zero (greater than a predetermined limit) then the assignments are not at or near enough to the peak of the Φu
-
- Uj+1
surface Φ(u) (decision 210), and the new set of Lagrangian Coefficients uj+1 is determined.
- Uj+1
With this new set of “u” u values, steps 202-210 are repeated as a second iteration. Steps 212 and 202-210 are repeated until the gradient as a function of u determined in step 208 is less than the predetermined limit. This indicates that the up up values which locate the peak area of the Φ u Φ(u) surface are determined and that the corresponding Problem Formulation [2.2] (1.2) has been solved. Step 214 will attempt to use the assignments that resulted from this particular 2-dimensional two-dimensional assignment problem to recover the solution of the 3-dimensional three-dimensional assignment problem as described below. If the limit was chosen properly so that the “u” u values are close enough to the peak, this recovery will yield the proper set of assignments that rigidly satisfies the constraint that each point be assigned to one and only one track. However, if the “u” u values are not close enough to the peak, then the limit value for decision 210 is reduced and the repetition of steps 212 and 202-210 is continued.
Step 214 recovers the 3-dimensional three-dimensional assignment solution by using the assignment values determined on the last iteration through step 208. Consider the 2-dimensional two-dimensional z assignment matrix to have 1's in the locations specified by the list L1=(ai, bi)N i=1. If the 3-dimensional three-dimensional z matrix is specified by placing 1's at the location indicated by the list L2=(ai, bi, ma i b i )N=1 L2=(ai, bi, ma i b i )N i−1 then the result is a solution of Problem Formulation [2.1] (1.1). Let L3=(ma i b i )N=1 L3=(ma i b i )N i=1 be the list formed by the third index. If each member of L3 is unique then the L2 solution satisfies the third constraint so it is a solution to Problem Formulation [1.0] (0.1). When this is not the case, recovery determines the minimal substitutions required within list L3 so that it plus L1 will be a feasible solution, i.e., a solution which satisfies the constraints of a problem formulation, but which may not optimize the objective function of the problem formulation. This stage of the recovery process is formulated as a 2-dimensional two-dimensional assignment problem: as follows. Form a new cost matrix [ci,j]N i,j=1 where ci,j=ca i b i ,j for j=1 . . . Ni and the Ni term is the total number of cost elements in the selected row of the 3-dimensional three-dimensional cost matrix. Attempt to solve this 2-dimensional two-dimensional problem for the minimum using two constraints sets. If a feasible solution is found then the result will have the same form as list L1. Replace the first set of indexes indices by the indicated (ai, bi) pairs taken from list L1 and the result will be a feasible solution of Problem Formulation [1.1] (0.4). If no feasible solution to the new 2-dimensional two-dimensional problem exists then further effort to locate the peak of Φ u Φ(u) is required.
I.1. Generalization to a Multi-Dimensional Assignment Solving Process
Let M be a fixed integer and assume that M is the dimension of the initial assignment problem to be solved. Thus, initially, the result of the scoring step 154 is a M-dimensional Cost Matrix which is structured as a sparse matrix (i.e., only a small percentage of the entries in the cost and assignment matrices are filled or non-zero). Individual cost elements represent the likelihood that a track Ti as extended by the set of observations {oÿ|i=1, . . . , M−1}, is not valid. Because the matrix is sparse the list of cost elements is stored as a packed list, and then for each dimension of the matrix, a vector of a variable length list of pointers to the cost elements is generated and stored. This organization means that for a particular observation o y Oij for the jth list in the ith vector will be a list of pointers to all hypotheses in which o y Oij participates. This structure is further explained in the following section dealing with problem partitioning.
The objective of the assignment solving process is to select from the set of all possible combinations of track extensions a subset that satisfies two criteria. First, each point in the subset of combinations should be assigned to one and only one track and therefore, included in one and only one combination of the subset, and second, the total of the scoring sums for the combinations of the subset should be minimized. This yields the following M-dimensional equations where k=Mk=M:
and where ck is the cost matrix [ck i
While direct solution to [3.1] (0.4) would give the precise assignment, the solution of k-dimensional equations directly for large k is too complex and time consuming for practice. Thus, the present invention solves this problem indirectly.
The following is a short description of many aspects of the present invention and includes some steps according to the prior art. The first step in solving the problem indirectly is to reduce the complexity of the problem by the previously known and discussed Lagrangian Relaxation technique. According to the Lagrangian Relaxation technique, the absolute requirement that each point is assigned to one and only one track is relaxed such that for some one image, points can be assigned to more than one track. However, a penalty based on a respective Lagrangian Coefficient uk is added to the cost function when a point in the image is assigned to more than one track. The Lagrangian Relaxation technique reduces the complexity or “dimension” of the formulation of the assignment problem because constraints on one observation set are relaxed. Thus, the Lagrangian Relaxation is performed iteratively to repeatedly reduce the dimension until a 2-dimensional two-dimensional penalized cost function problem results as in Problem Formulation [2.1] (1.1). This 2-dimensional two-dimensional problem is solved then directly by a previously known technique such as Reverse Auction. The penalized cost function for the 2-dimensional two-dimensional problem defines a valley or convex shaped surface which is a function of various sets of {uk|k=3, . . . ,M} penalty values and one set of assignments for the points in two dimensions. That is, for each particular u3 there is a corresponding 2-dimensional two-dimensional penalized cost function problem and its solution. Note that the solution of the 2-dimensional two-dimensional penalized cost function problem identifies the set of assignments for the particular u3 values that minimize the penalized cost function. However, these assignments are not likely to be optimum for any higher dimensional problem because they were based on an initial arbitrary set of uk values. Therefore, the next step is to determine the optimum assignments for the related 3-dimensional three-dimensional penalized cost function problem. There exists a 2-dimensional two-dimensional hill shaped function
Φ which is a graph of the minimums of all penalized cost functions at various sets of assignments in two dimensions. For the three-dimensional problem, the function Φ can be defined based on the solution to the foregoing two-dimensional penalized cost function. By using the current u3 values and the {uk|k>3} values originally assigned. Then, the gradient of the hill-shaped Φ
u3
function Φ is determined, which points toward the peak of the hill. By usin the gradient and u3 values previously selected for the one point on the hill (corresponding to the minimum of the penalized cost Φ
-
- U3
function Φ) as a starting point, the u3 values can be found for which the corresponding problem will result in the peak of the
- U3
function Φ. The solution of the corresponding two-dimensional problem is the proper values for two of the three sets of indices in the three-dimensional problem. These solution indices can select a subsection of the cost array which maps to a two-dimensional array. The set of indices which minimize the two-dimensional assignment problems based on that array corresponds to the proper assignment of points in the third dimension. The foregoing “recovery” process was known in the prior art, but it is modified here to adjust for the sparse matrix characteristic. The next task is to recover the solution of the proper u4 values for the 4-dimensional four-dimensional problem. The foregoing hill climbing process will not work again because the foregoing hill climbing process when required to locate the 4-dimensional four-dimensional u4 values for the peak of Φ3 exact definition of the Φ3 case of Φ2 Φ3 requires the exact definition of the function Φ3 (as was available in the case of Φ2) or an always less than approximation of Φ3, whereas the iteration can result in a greater than approximation of Φ3
Φ3. According to the present invention, another three-dimensional function Ψ is defined which is a “less than approximation” the three-dimensional function Φ and which can be defined based on the solution to the two-dimensional penalized cost function and the previously assigned and determined uk values. Next, the gradient of the function Ψ is found and hill climbing technique used to determine the u4 values at the peak. Each selected u4 set results in a new 3-dimensional three-dimensional problem and requires the 2-dimensional two-dimensional hill climbing based upon new 2-dimensional two-dimensional problems. At the peak of the 3-dimensional Ψ three-dimensional function Ψ, the solution values are a subset of the values required for the four-dimensional solution. Recovery processing extends the subset to a complete solution. This process is repeated iteratively until the uk values that result in a corresponding solution at the peak of the highest order Ψ Φ
Φfunctions Ψ and Φ are found. The final recovery process then results in the solution of k-dimensional problem. FIG. 5 illustrates process 300 in more detail.
I.2. Problem Formulation
In problem formulation step 310, all data structures for the subsequent steps are allocated and linked by pointers as required for execution efficiency. The incoming problem is partitioned as described in the subsequent section. This partitioning has the effect of dividing the incoming problem into a set of independent problems and thus reducing the total workload. The partitioning process depends only on the actual cost matrix so the partitioning can and is performed for all levels of the relaxation process.
I.2.1. Relaxation and Recovery
Step 320 begins the Lagrangian Relaxation process for reducing the M-dimensional problem by selecting all Lagrangian Coefficient uM penalty values initially equal to zero. The Lagrangian Coefficients associated with the Mth constraint set are a NM+1 elementan (NM+1)-element vector. The reduction of this M-dimensional problem in step 322 to a M−1 dimensional (M−1)-dimensional problem uses the two step process described above. First, a penalty based on the value of the respective uM coefficient is added to the cost function when a point is assigned to more than one track and then the resultant cost function is minimized. However, during the first iteration, the penalty is zero because all uM values are initially set to zero. Second, the requirement that no point from any image can be assigned to more than one track is relaxed for one of the images. In the extreme this would allow a point from the relaxed image to be associate with every track. However, the effect of the previous penalty would probably mean that such an association would not minimize the cost. The effect of the two steps in combination is to remove a hard constraint while adding the penalty to the cost function so that it operates like a soft constraint. For step 322 this two step two-step process results in the following penalized cost function problem with k=M:
Because the constraint on single assignment of elements from the last image has been eliminated, a M−1 dimensional an (M−1)-dimensional problem can be developed by eliminating some of the possible assignments. As shown in Equations [3.3] (1.6), this is done by selecting the smallest cost element from each of the Mth axis vectors of the cost matrix. Reduction in this manner yields a new, lower order lower-order penalized cost function defined by Equations [3.3] (1.6) which has the same minimum cost as does the objective function defined by [3.2] (1.5) (a) above.
The cost vectors are selected as follows. Define an index array mk i 1 . . . i k− 1 and a new cost array ck−1 i 1 . . . ,i k−1 by:
The resulting M−1 dimensional (M−1)-dimensional problem is (where k=M):
Assignment Problem [3.1] (1.4) and Problem Formulation [3.4] (1.7) differ only in the dimension M vs. M−1, respectively. An optimal solution to [3.4] (1.7) is also an optimal solution to equation [3.2] (1.5). This relationship is the basis for an iterative sequence of reductions indicated by steps 320-332 through 330-332 and 200-204 in which the penalized cost function problem is reduced to a two dimensional two-dimensional problem. As these formula will be used to describe the processing at all levels, the lowercase k is used except where specific reference to the top level is needed. In
In step 208, according to the prior art, solution z2 values are substituted into the 2-dimensional two-dimensional derivative of the surface Φ2. The result indicates how the value of u3 should be adjusted so as to perform the hill climbing function. As was previously described the objective is to produce a sequence of u3 i values which ends when the U3 p u3 p value is in the domain of the peak of the surface Φ. The section “Determining Effective Gradient” describes how new values are computed and how it is determined that the current ui k points
to the peak of Φ2. When no further adjustment is required the flow moves to step 214 which will attempt to recover the 3-dimensional three-dimensional solution as previously described. When further adjustment is required then the flow progresses to step 212 and the new values of Uk are computed. At the 2-dimensional three-dimensional level the method of the prior art could be used for the hill climbing procedure. However, it is not practical to use this prior art hill climbing technique to determine the updated Lagrangian Coefficients uk or the Max on the next (or any) higher order surface Φbecause the next (or any) higher dimensional function Φ cannot be defined based on known information.
Instead, the present invention defines a new function based on known information which is useful for hill climbing from the third to the fourth and above dimensions, i.e., uk values which result in z values that are closer to the proper z values for the highest k-dimension. This hill climbing process (which is different than that used in the prior art of FIG. 4 for recovering only the three dimensional three-dimensional solution) is used iteratively at all lower dimensions k of the M-dimensional problem (including the 3-dimensional three-dimensional level where it replaces prior art) even when k is much larger than three. FIG. 6 helps to explain this new hill climbing technique and illustrates the original k-dimensional cost function vk of Problem Formulation [3.1] (1.4). However, the actual k-dimensional cost surface vk defined by [3.1] (1.4) (a) comprises scalar values at each point described by k-dimensional vectors and as such can not be drawn. Nevertheless, for illustration purposes only, FIG. 6 ignores the reality of ordering vectors and illustrates a concave function vk(zk) to represent Equation 3.1. (1.4). The vk surface vk is illustrated as being smooth to simplify the explanation although actually it can be imagined to be terraced. The goal of the assignment problem is to find the values of z k; these values minimize the k-dimensional cost function vk.
For purposes of explanation, assume that in FIG. 6 , k=4 (the procedure is used for all k≦3). This problem is reduced by two iterations of Lagrangian Relaxation to a 2-dimensional two-dimensional penalized cost function Φ j (k−1) i . This cost function, and all other cost functions described below, are also non-smooth and continuous but are illustrated in FIG. 6 as smooth for explanation purposes. Solving the Φj (k−1) i problem results in one set of z2 assignments and the value of Φ(k−1) i at the point u2 ij. A series of functions Φj (k−1) i , . . . , Φ1 (k−1 i ) i each generated from a different u3 are shown. The particular series illustrates the process of locating the peak of Φ(k−1) i . The 2-dimensional two-dimensional penalized cost functions Φj (k−1) i , . . . , Φ1 (k−1) i can be solved directly. Each such solution provides the information required to calculate the next u3 value. Each iteration of the hill climbing improves the selection of u3 values, i.e., yields Φ2 solution is closer to those at the solution of the Φ3 The result of solving Φ1 (k−1) i is values that are on both Φ(k−1) i and Φk Φk. FIG. 6 illustrates the surface Φk which comprises the minimums of all k-dimensional penalized cost function surfaces Φk, i.e., if the Problem Formulations (1.5) and [3.4] (1.7) were solved at all possible values of uk the function Φk k Φk (uk) would result. The surface Φk is always less than the vk surface vk except at the peak as described in Equation 3.5 (1.8) and its maximum occurs where the vk surface vk is minimum. Because the Φk the Φk Φk vk surface. The Φk represents the minimum of the surface Φk, any point on the surface Φk can mapped to the surface vk. The function Φk provides a lower bound on the minimization problem described by [3.1] (1.4) (a). Let z k be the unknown solution to Problem Formulation [3.1] (1.4) and note that:
Φk(uk)≦vk(z i k)≦vk−1(zk) [3.5] (1.8)
Consequently, the zk values zk at the peak of Φk (i.e., the greatest lower bound on the cost of the relaxed problem), can be substituted into the k-dimensional penalized cost function to determine the proper assignments. Consequently, the present invention attempts to find the maximum on the Φk surface Φk. However, it is not possible to use the prior art hill climbing to hill climb to the peak of Φk definition of Φk functions Φ. As the solution of Φk i in that higher order u values of u are not yet optimized, its value can be larger than the true peak of Φk lower bound on vk and it can not be used to recover the required solution.
Φk(uk)≦vk(
Consequently, the zk values zk at the peak of Φk (i.e., the greatest lower bound on the cost of the relaxed problem), can be substituted into the k-dimensional penalized cost function to determine the proper assignments. Consequently, the present invention attempts to find the maximum on the Φk surface Φk. However, it is not possible to use the prior art hill climbing to hill climb to the peak of Φk definition of Φk functions Φ. As the solution of Φk i in that higher order u values of u are not yet optimized, its value can be larger than the true peak of Φk lower bound on vk and it can not be used to recover the required solution.
Instead, the present invention defines all auxiliary function functions Ψk dimensional penalized cost function problem, lower order zk values and uk values determined previously by the reduction process. The Ψk Φk and its gradient is used for hill climbing to its peak. The zk values zk at the peak of the Ψk into Problem Formulation [3.2](1.5) to determine the proper assignments. To define the Ψk explicitly makes the function Φk Uk order sets of Lagrangian Coefficients with the expanded notation: Φk Uk Uk+1 Uk Ψ Φk(uk; uk+1, . . . ,uk). Then, a new set of functions Ψ, is defined recursively, using the Φk Φk's domain:
where v2 is the solution value for the most recent 2-dimensional two-dimensional penalized cost function problem. For k>3
From the definition definitions of Φk k Φk and vk (Problem Formulation (1.7) compared with Problem Formulation [3.2] (1.5)):
it follows that:
and with that Equation 3.5 (1.8) is extended to:
Ψk(u3, . . . , uk−1;uk)≦Φk(uk;uk+1, . . . , uM≦vk(ūk)≦vk(uk) [3.7] (1.11)
This relationship means that either Φk or Ψk may be used in hill climbing to update the Lagrangian Coefficients u. Φk is the preferred choice, however it is only available when the solution to Problem Formulation [3.2] (1.5) is a feasible solution to Problem Formulation [3.1] (1.4) (as in hill climbing from the second to third dimension which is why prior art worked). For simplicity in implementation, the function Ψk is defined so that it equals Φk when either function could be used. It is therefore always used, even for hill climbing from the second dimension. The use of the function Ψ which is based on previously assigned or determined u values and not higher order u values which are not yet determined, is an important feature of the present invention.
I.2.2. Determining Effective Gradient
After the function Ψk is defined, the next steps of hill climbing/peak detection are to determine the gradient of the Ψk function Ψk, determine an increasing portion of the gradient and then move up the Ψk surface Ψk in the direction of this increasing portion of the gradient. As shown in FIG. 6 , any upward step on the Ψk the Φkj Uk α α surface Ψk, for example, to the minimum of the Φk j will yield a new set of values uk (to the “left”) that is closer to the ideal set of values uk values which correspond to the minimum of the vk function vk. While it is possible to iteratively step up this Ψk surface Ψk with steps of fixed size and then determine if the peak has been reached, the present invention optimizes this process by determining the single step size from the starting point at the minimum of Φk i Φk i that will jump to the peak and then calculating calculate the values uk values at the peak. Once the f. “u”s values u at the peak at of Ψk are determined, then the values uk values can be substituted into Problem Formulation [3.2] (1.5) to determine the proper assignment. (However, in a more realistic example, where k is much greater than three, then the values uk values at the peak of the function Ψ along with the lower order lower-order values uk values and those assigned and yielded by the reduction steps are used to define the next higher level function Ψ. This definition of a higher order function Ψ and hill climbing process are repeated iteratively until Ψk, the peak of Ψk, and the values uk at the peak of Ψk are identified.) The following is a description of how to determine the gradient of each surface Ψ and how to determine the single step size to jump to the peak from the starting point on each surface Ψ.
determine the gradient of each Ψ
As noted above, each surface Ψ is non-smooth. Therefore, if a gradient was taken at a single point, the gradient may not point toward the peak. Therefore, several gradients (a “bundle”) are determined at several points on the surface Ψk in the region of the starting point (i.e., minimum of Φk i ) and then averaged. Statistically, the averaged result should point toward the peak of the surface Ψk. Wolfe's Conjugate Subgradient Algorithm (Wolfe75, Wolfe79 P. Wolfe. A method of conjugate subgradients for minimizing non-differentialbe functions. Mathematical Programming Study, 3:145-173, 1975; P. Wolfe. Finding the nearest point in a polytope. Mathematical Programming Study, 11:128-149, 1976) for minimization was previously known in another environment to determine a gradient of a non-smooth surface using multiple subgradients and can be used with modification in the present invention. Wolfe's algorithm is further described in “A Method of Conjugate Subgradients for Minimizing Nondifferentiable Functions” page 147-173 published by Mathematical Programming Study 3 in 1975 and “Finding the Nearest Point in a Polytope” page 128-149 published by Mathematical Programming Study 11 in 1976. The modification to Wolfe's algorithm uses the information generated for Ψk Uk3 Ukk−2 Ukk−1 for calculating the subgradients. The definition of a subgradient v of Ψk Uk3 Ukk subdifferential set defined as:
δΨk(u)=}vεRA−k +1|(Ψk(Uk3, . . . , Ukk−1;U′)−Ψk(Uk3, . . . , Uj−1;Uk))≧vT(U′−Uk) ∀U′εRN k +1}
(where vT is the transpose of v) where vT is the transpose of v.
δΨk(u)=}vεRA
(where vT is the transpose of v) where vT is the transpose of v.
Next, a subgradient vector is determined from this function. If zh is the solution of Problem Formulation [3.2] (1.5), then differentiating Ψk U3 Uk−1 Uk Uk ik evaluating the result with respect to the current selection matrix zk yields a subgradient vector:
The iterative nature of the solution process at each dimension yields a set of such subgradients. Except for a situation described below where the resultant averaged gradient does not point toward the peak, the most recent set of such subgradients are saved and used as the “bundle” for the peak finding process for this dimension. For example, at the k level k there is a bundle of subgradients of the surface Ψk near the minimum of the Φk
I.2.3. Step Size and Termination Criterion
After the average gradient of the surface Ψk is determined, the next step is to determine a single step that will jump to the peak of the surface Ψk. The basic strategy is to first to specify an arbitrary step size, and then calculate the value of Ψk at this step size in the direction of the gradient. If the Ψk value of Ψk is larger than the previous one, this probably means that the step has not yet reached the peak. Consequently, the step size is doubled and a new Ψk value of Ψk is determined and compared to the previous one. This process is repeated until the new value of Ψk is less than the previous one. At that time, the step has gone too far and crossed over the peak. Consequently, the last doubling is rolled-back and that step size is used for the iteration. If the initial estimated Ψk is less than previous value then the step size is decreased by 50%. If this still results in a smaller value of Ψk, then the last step is rolled back and the previous step size is decreased by 25%. The following is a more detailed description of this process.
With a suitable bundle of subgradients determined as just described, . Wolfe's algorithm can be used to determine the effective subgradient (d) d and the Upgraded upgraded value Uk j+1. From the previous iteration, or from an initial condition, there exists a step length value (t) t. The value,
u+=uk j+td
is calculated as an estimate of uk j+1. To determine if the current step size is valid the we evaluate Ψk u3 uk−2u+ If the result represents an improvement then we double the step size. Otherwise we halve the step size. In either case a new u+ is calculated. The doubling or halving continues until the step becomes too large to improve the result, or until it becomes small enough to not degrade the result. The resulting suitable step size is saved with d as part of the subgradient bundle. The last acceptable u+ is assigned to uk j+1.
u+=uk j+td
is calculated as an estimate of uk j+1. To determine if the current step size is valid the we evaluate Ψk u3 uk−2u+ If the result represents an improvement then we double the step size. Otherwise we halve the step size. In either case a new u+ is calculated. The doubling or halving continues until the step becomes too large to improve the result, or until it becomes small enough to not degrade the result. The resulting suitable step size is saved with d as part of the subgradient bundle. The last acceptable u+ is assigned to uk j+1.
Three distinct criterion criteria are used to determine when uk j is close enough to ūk:
-
- 1. The Wolfe's algorithm criterion of d=0 given that the test has been repeated with the bundle containing only the most recent subgradient.
- 2. The difference between the lower bound Φk uk upper bound vk (zk, ukk) being less than a preset relative threshold. (Six percent was found to be an effective threshold for radar tracking problems.)
- 3. An iteration count being exceeded.
The use of limits on the iteration are particularly effective for iterations at the level 3 through (n−1 levels,) as these iterations will be repeated so as to resolve higher order coefficient sets. With limited iterations the process is in general robust enough to improve the estimate of upper order Lagrangian Coefficients. By limiting the iteration counts then the total processing time for the algorithm becomes deterministic. That characteristic means the process can be effective for real time problems such as radar, where the results of the last scan of the environment must be processed prior to the next scan being received.
I.2.4. Solution Recovery
The following process determines if the uk values at what is believed to be the peak of the function Ψk adequately approximate the uk values at the peak of the corresponding Φk function Φk. This is done by determining if the corresponding penalized cost function is minimized. Thus, the uk values at the peak of the function Ψk are first substituted into Problem Formulation [3.2] (1.5) to determine a set of z assignments for k−1 points. During the foregoing reduction process, Problem Formulation [3.4] (1.7) yielded a tentative list of k selected z points that can be described by their indices as: {(ij i. . . ij k−1)}N 0 where N0 is the number of cost elements selected into the solution. One possible solution of Problem Formulation [3.1] (1.4) is the solution of Problem Formulation [3.2] (1.5) which is described as {(ij i. . . ij k−1mk i 1 . . . ik−1)}N j=1 [3.3] (1.6). If this solution satisfies the k-th kth constraint set, then it is the optimal solution.
However, if the solution for Problem Formulation [3.2] (1.5) is not feasible (decision 355), then the following adjustment process determines if a solution exists which satisfies the k-th kth constraint while retaining the assignments made in solving Problem Formulation [3.4] (1.7). To do this, a 2-dimensional two-dimensional cost matrix is defined based upon all observations from the k-th kth set which could be used to extend the relaxed solution.:
If the resulting 2-dimensional two-dimesional assignment problem,
has a feasible solution, then the indices of that solution map to the solution of Problem Formulation [3.1] (1.4) for the k-dimensional problem. The first index in each resultant solution entry is the pointer back to an element of the {(ij i, . . . ij k−imk i
If Problem Formulation [3.9] (1.13) does not have a feasible solution, then the value of uki which was thought to represent uk p is not representative of the actual peak and further iteration at the kth level is required. This decision represent the branch path from step 214 and equivalent steps.
I.3. Partitioning
A partitioning process is used to divide the cost matrix that results from the Scoring step 154 into as many independent problems as possible prior to beginning the relaxation solution. The partitioning process is included with the Problem Formulation Step 310. The result of partitioning is a set of problems to be solved, i.e., there will be p1 problems that consist of a single hypothesis, p2 problems that consist of two hypothesis, etc. Each such problem is a group in that one or more observations or tracks are shared between members of the group.
In partitioning to groups no consideration is given to the actual cost values. The analysis depends strictly on the basis of two or more cost elements sharing the same specific axis of the cost matrix. In a 2-dimensional two-dimensional case two cost elements must be in the same group if they share a row or a column. If the two elements are in the same row, then each other cost element that is also in the same row, as well as any cost elements that are in columns occupied by members of the row must be included in the group. The process continues recursively. In literature it is referred to as “Constructing a Spanning Forest.” The k-dimensional case is analogous to the 2-dimensional two-dimensional case. The specific method we have incorporated is a depth first search, presented by Aho, Hopecraft, and Ullman (A. V. Aho, in “Design J. E. Hopcroft, and J. D. Ullman. Design and Analysis of Computer Algorithms.” section 5.2, published by Addison-Westley Addison-Wesley, Mass., 1974).
The result of partitioning at level M is the set of problems described as {Pij|i=1, . . . , pj and j=1, . . . N}, where N is the total number of hypothesis. The problems labeled {P ij|i=1, . . . , pj and j=1, . . . , N} {Pi1|=1, . . . , p1}are the cases where their there is only one choice for the next observation at each scan and that observation could be used for no other track, i.e., it is a single isolated track. The hypothesis must be in included in the solution set and no further processing is required.
As hypothesis hypotheses are constructed the first element is used to refer to the track id ID. Any problem in the partitioned set which does not have shared costs in the first scan represent a case where a track could be extended in several ways but none of the ways share an observation with any other track. The required solution hypothesis for this case is the particular hypothesis with the maximum likelihood. For this case all likelihoods are determined as was described in Scoring and the maximum is selected.
In addition to partitioning at the M level M, partitioning is applied to each subsequent level M−1, . . . , 2. For each problem that was not eliminated by either by the prior selection, partitioning is repeated, ignoring observations that are shared in the last set of observations. Partitioning recognizes that relaxation will eliminate the last constraint set and thus partitioning is feasible for the lower level problems that will result from relaxation. This process is repeated for all levels down to k=3. The full set of partitionings can be performed in the Problem Formulation Step 310, prior to initiating the actual relaxation steps. The actual 2-dimensional two-dimensional solver used in step 206 includes an equivalent process so no advantage would be gained by partitioning at the k=2 level.
There are two possible solution methods for the remaining problems. “Branch and Bound” as was previously described, or the relaxation method that this invention describes. If any of the partitions have 5-10 possible tracks and less than 50 to 20 hypotheses, then the prior art “Branch and Bound” algorithm generally executes faster than does the relaxation due to its reduced level of startup overhead. The “Branch and Bound” algorithm is executed against all remaining M level problems that satisfy the size constraint. For the remainder the Relaxation algorithm is used. The scheduling done in Problem Formulation allows each Problem Formulation [3.2] (1.5) cost matrix resulting from the first step of relaxation to be partitioned. The resulting partitions can be solved by any of the four methods,: isolated track direct inclusion, isolated track tree evaluation, small group “Branch and Bound” or an additional stage of relaxation as has been fully described.
The partitioning after each Level of Lagrangian Relaxation is effective because when a problem is relaxed, the constraint that requires each point to be assigned to only one track is eliminated (for one image at a time) . Therefore, two tracks previously linked by contending for one point will be unlinked by the relaxation which permits the point to be assigned to both tracks. The fruitfulness of partitioning increases for lower and lower levels of relaxation.
The following is a more detailed description of the partitioning method. Its application at all but the M level M depends upon the relaxation process described in this invention. The recursive partitioning is therefore a distinct part of this invention. The advantage of this method is greatly enhanced by the sparse cost matrix resulting from tracking problems. However the sparse nature of the problem requires special storage and search techniques.
A hypothesis is the combination of the cost element cn the selection variable zn and all observations that made up the potential track extension. It can be written as, hn={cn, zn, {on k =oki|k=1, , . . . , Miε{1, . . . , Nk}}} hn={cn, zn, {on k =ok i |k=1, . . . , Miε{1, . . . , Nk}}}, i.e., cost, selection variable and observations in the hypothesis. nε{1, . . . , N} Here nε{1, . . . , N}, where N is the total number of hypotheses in the problem. While the cost and assignment matrices were previously referenced. these matrices are not effective storage mechanisms for tracking applications. Instead the list of all hypothesis and sets of lists for each dimension that reference the hypothesis set are stored. The hypothetical set in list form is:
{hn}n+N n=1
{hn}n+N n=1
For each dimension k=1M there exists a set of lists, with each list element being a pointer to a particular hypothesis:
Lki ={pk j |kj=1, . . . , Nk i }i=N k ,k=M i=1,k=1
where Nki is a number of hypothesis containing the i-th ith observation from scan k. This structure is a multiply linked list in that any observation is associated with a set of pointer to all hypothesis it participates in, and any hypothesis has a set of pointers to all observations that formed it. (These pointers can be implemented as true pointers or indices depending upon the particular programming language utilized.)
Lk
where Nk
Given this description of the matrix storage technique then the partitioning technique is as follows: Mark the first list Lk i and follow out all pointers in that list to the indicated hypothesis hpk i for i=1, . . . , Nki Nk i . Mark all located hypothesis, and for each follow pointers back the particular Lok Lk for k=1, . . . , M. Those L's if not previously marked get marked and also followed out to hypothesis elements and back to L's. When all such L's or h's being located are marked, then an isolated sub-problem has been identified. All marked elements can be removed from the lists and stored as a unique problem to be solved. The partitioning problem then continues by again starting at the first residual L set L. When none remain, the original problem is completely partitioned.
Isolated problems can result from one source track having multiple possible extensions or from a set of source tracks contending for some observations. Because one of the indices of k (in our implementation it is k=1) indicate indicates the source track then it is possible to categorize the two problem types by observing if the isolated problem includes more than one L-list from the index level associated with tracks.
I.4. Subsequent Track Prediction
As noted above, after the points are assigned to the respective tracks, some action is taken such as controlling take-offs and landings to avoid collision, advising airborne aircraft to change course, warning airborne aircraft of an adjacent aircraft in a commercial environment, or aiming and firing an anti-aircraft (or anti-missile) missile, rocket or projectile, or taking evasive action in a military environment. Also, the tracking can be used to position a robot to work on an object. For some or all of these applications, usually the tracks which have just been identified are extended or extrapolated to predict a subsequent position of the aircraft or other object. The extrapolation can be done in a variety of prior art ways: for example, straight line extensions of the most likely track extension hypothesis, parametric quadratic extension of the x versus time, y versus time, etc. functions that are the result of the filtering process described earlier, least square path fitting or Kalman filtering of just the selected hypothesis.
The process of gating, filtering, and gate generation as they were previously described require that a curve be fit through observations such that fit of observations to the likely path can be scored and further so that the hypothetical target future location can be calculated for the next stage of gating. In the implementation existing, quadratic functions have been fit through the measurements that occur within the window. A set of quadratics is used, one per sensor measurement. To calculate intercept locations these quadratics can be converted directly into path functions. Intercept times are then calculated by prior methods based upon simultaneous solution of path equations.
The use of the fitted quadratics is not as precise as more conventional filters like the Kalman Filter. They are however much faster and sufficiently accurate for the relative scores required for the Assignment problem. When better location prediction is required then the assignment problem is executed to select the solution hypothesis and based upon the observations in those hypothesis the more extensive Kalman filter is executed. The result is tremendous computation savings when compared with the Kalman Filter being run on all hypothetical tracks.
Based on the foregoing, apparatus and methods have been disclosed for tracking objects. However, numerous modifications and substitutions can be made without deviating from the scope of the present invention. For example, the foregoing functions Ψ can also be defined as recursive approximation problem in which several values of higher order uk values are used to eliminate the higher than approximation characteristic of the Φk
function Φk. The hill climbining of the function Ψ can be implemented by a high order hill climbing using the enhanced function Φ. Although the result would not be as efficient it seems likely that the method would converge. Therefore, the invention has been disclosed by way of example and not limitation, and reference should be made to the following claims to determine the scope of the present invention.
The following description provides an alternative second embodiment of the multi-dimensional assignment solving process of section I.1. However, in order to clearly describe the present alternative embodiment, further discussion is first presented regarding the data assignment problem of partitioning measurements into tracks and false alarms and, in particular, the representation of multi-dimensional assignment problems.
II.1. Formulation of the Assignment Problem
The goal of this section is to explain the formulation of the data association problems, and more particularly multi-dimensional assignment problems, that govern large classes of problems in centralized or hybrid centralized-sensor level multisensor/multitarget tracking. The presentation is brief; technical details are presented for both track initiation and maintenance in (A. B. Poore, Multi-dimensional. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion,. Computational Optimization and Applications, 3 (1994), pp.: 27-57, for nonmaneuvering non-maneuvering targets and in Ingmar J. Cox, Pierre Hansen, and Beta Julesz, eds., Partitioning Data Sets, (A. B. Poore. Multidimensional assignments and multitarget tracking: Partitioning data sets. In P. Hansen, I. J. Cox, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, volume 19, pages 169-198, Providence, R.I., 1995. American Mathematical Society, Providence, R.I., v. 19, Feb. 1995, pp. 169-198) for maneuvering targets. Note that the present formulation can also be modified to include target features (e.g., size and type) into the scoring process 154.
The data assignment problems for multisensor and multitarget tracking considered here are generally posed as that of maximizing the posterior probability of the surveillance region (given the data) according to
where ZM represents M data sets, γ is a partition of indices of the data (and thus induces a partition of the data), Γ* is the finite collection of all such partitions, Γ
*γ0
Γ is a discrete random element defined on Γ*, γ0 is a reference partition, and P(Γ=γ|ZM) is the posterior probability of a partition γ true given the data ZM. The term partition is defined below.
Consider M observation sets Z(k) (k=1, . . . , N) each of Nk observations {zk i k }N k i k −1 , and let ZM denote the cumulative data set defined by
z(k)={zk ik }N k i k −1 and ZM={Z(1), . . . , Z(M)}, [5.2]
respectively. In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are measurements that must be partitioned into tracks and false alarms. In the formulation of track extensions a moving window over time of observations sets is used. The observation sets will be measurements which are: (a) assigned to existing tracks, (b) designated as false measurements, or (c) used for initiating tracks. However, note that alternative data objects instead of observation sets may also be fused such as in sensor level tracking wherein each sensor forms tracks from its own measurements and then the tracks from the sensors are fused in a central location. Note that, as one skilled in the art will appreciate, both embodiments of the present invention may be used for this type of data fusion.
z(k)={zk i
respectively. In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are measurements that must be partitioned into tracks and false alarms. In the formulation of track extensions a moving window over time of observations sets is used. The observation sets will be measurements which are: (a) assigned to existing tracks, (b) designated as false measurements, or (c) used for initiating tracks. However, note that alternative data objects instead of observation sets may also be fused such as in sensor level tracking wherein each sensor forms tracks from its own measurements and then the tracks from the sensors are fused in a central location. Note that, as one skilled in the art will appreciate, both embodiments of the present invention may be used for this type of data fusion.
The data assignment problem considered presently is represented as a case of set partitioning defined in the following way. First, for notational convenience in representing tracks, a zero index is added to each of the index sets in [5.2] (2.2), a gap filler Zk o is added to each of the data sets Z(k) in [5.2] (2.2), and a “track of data” is defined as (z1 i 1 , . . . , zN i N ), where ik and zk i k can now assume the values of 0 and zk o, respectively. A partition of the data will refer to a collection of tracks of data or track extensions wherein each observation occurs exactly once in one of the tracks of data and such that all data is used up. Note that the occurrence of the gap filler is unrestricted. The gap filler zk o serves several purposes in the representation of missing data, false observations, initiating tracks, and terminating tracks. Note that a “reference partition” may be defined which is a partition in which all observations are declared to be false.
Next under appropriate independence assumptions it can be shown that:
where Lk i
Using [5.3] and the zero-one variable zk i
Using (2.3) and the zero-one variable zi 1 . . . i N k=1 if (i1, . . . , iM)εγ and 0 otherwise, one can then write the problem (2.1) as the following M-dimensional assignment problem (as also presented in section Problem Formulaion (1.4) with k=M):
where co . . . o is arbitrarily defined to be zero. Here, each group of sums in the constraints [5.5] (b)-[5.5] (e)(2.5) (b)-(2.5) (e) represents the fact that each non-gap filler observation occurs exactly once in a “track of data.” One can modify this formulation to include multiassignments of one, some, or all the actual observations. The assignment problem [5.5] (2.5) is changed accordingly. For example, if zk i
Expressions for the likelihood ratios Lk i 1 . . . i M such as [5.5] appearing in the costs ci 1 . . . i M =−1n(Li 1 . . . i M ) are well known well-known. In particular, discussions of these ratios may be found in: (A.B. Poore, Multi-dimensional. Multi-dimensinal assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion, Computational Optimization and Applications, 3 (1994), pp. 27-57; and Ingemar J. Cox, Pierre Hansen, and Beta Julesz, eds., Partitioning Data Sets,, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking: Partitioning data sets. In P. Hansen, I. J. Cox, B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, volume 19, pages 169-198, Providence, R.I., 1995. American Mathematical Society, Providence, R.I. v. 19, 1995. pp. 169-198.) Furthermore, the likelihood ratios are easily modified to include target features and to account for different sensor types. Also note that in track initiation, the M observation sets provide observations from M sensors, possibly all the same. Additionally note that for track maintenance, a sliding window of M observation sets and one data set containing established tracks may be used. In this latter case, the formulation is the same as above except that the dimension of the assignment problem is now M+1.
II.2. Overview of the New Lagrangian Relaxation Algorithms
Having formulated an M-dimensional assignment problem [5.5] (2.5), we now turn to a description of the Lagrangian relaxation algorithm. Subsection II.2.1 below presents many of the relaxation properties associated with the relaxation of an n-dimensional assignment problem to an m-dimensional one via a Lagrangian relaxation of n-m sets of constraints wherein m<n<M m<n≦M and preferably in the present invention embodiment n−m>1. Although any n-m constraint sets can be relaxed, the description here is based on relaxing the last n-m sets of constraints and keeping the first m sets. Given either an optimal or suboptimal solution of the relaxed problem, a technique for recovering a feasible solution of the n-dimensional problem is presented in subsection II.2.2 below and an overview of the Lagrangian relaxation algorithm is given in subsection II.2.3.
The following notation will be used throughout the remainder of the work. Let M be an integer such that M≧3 and let nε{3, . . . ,M}. The n-dimensional assignment problem is
To ensure that a feasible solution of [6.1] (2.6) always exists, all variables with exactly one nonzero index (i.e., variables of the form zn o . . . oi
II 2.1. The Lagrangian Relaxed Assignment Problem
The n-dimensional assignment problem [6.1] (2.6) has n sets of constraints. A (Nk+1)-dimensional multiplier vector associated with the k-th kth constraint set will be denoted by uk=(uk 0, uk 1, . . . , ukMk)T with uk 0=0 and k=1, . . . , n. The n-dimensional assignment problem [6.1] (2.6) is relaxed to an m-dimensional assignment problem by incorporating n-m of the n sets of constraints into the objective function [6.1] (2.6) (a). Although any constraint set can be relaxed, the description of the relaxation procedure for [6.1] (2.6) will be based on the relaxation of the last n-m sets of constraints. The relaxed problem is
wherein we have added the multiplier uk 0 k=0 for notational convenience. Thus, the multiplier R with uk 0=0 is fixed.
An optimal (or suboptimal) solution of [6.2] (2.7) can be constructed from that of an m-dimensional assignment problem. To show this, def ine f or each (i1, . . . , im) an index (jm+1, . . . , jn)=(jm+1(i1 , . . . , im), . . . , jn(i1, . . . , im)) and a new cost function cm i 1 . . . i m by
(If (jm+1, . . . , jnn) is not unique, choose the smallest such jm+1, amongst those (n-m)-tuples with the same jm+1 choose the smallest jm+2, etc., so that (jm+1, . . . , jn) is uniquely defined.) Using the cost coefficients defined in this way, the following m-dimensional assignment problem is obtaIned obtained:
As an aside, observe that any feasible solution zn of [6.1] (2.6) yields a feasible solution zm of [6.4] (2.9) via the construction
Thus, the mn-dimensional assignment problem 6.4] (2.9) has at least as many feasible solutions of the constraints as the original problem [6.1] (2.6).
The following Fact A.2 has been shown to be true. It states that an optimal solution of Problem Formulation [6.2] (2.7) can be computed from that of Problem Formulation [6.4] (2.9). Furthermore, the converse to this fact is provided in Fact A.3. Moreover, if the solution of either of these two problems [6.2] (2.9) or [6.4] (2.0) is ε-optimal (i.e., the objective function associated with the suboptimal solution is within “ε”, of the objective function associated with the optimal solution), then so is the other.
Fact A.2. Let wm be a feasible solution to problem [6.4] (2.9) and define wn by
Then wn is a feasible solution of the Lagrangian relaxed problem [6.2] (2.7) and
Φmnγn m+1 n {circumflex over (Φ)}minwm;um+1, . . . , un)−Σn k=m+1ΣMk i
If, in addition, wm is optimal for [6.4] (2.9), then wn is an optimal solution of [6.2] (2.7) and
Φmnγm+1 n {circumflex over (Φ)}mn(um+1, . . . , un)−Σn k=m+1ΣMk i
With the exception of one equality being converted to an inequality, the following Fact is a converse of Fact A.2 and has also been shown to be true.
Fact A.3. Let wn be a feasible solution to problem [6.2] (2.7) and define Wm by
Then wm is a feasible solution of the problem [6.4] (2.9) and
If, in addition, wn is optimal for [6.2] (2.7), then wm is an optimal solution of [6.4] (2.9), Φmnγn m+1
{circumflex over (Φ)}mn(wm;um+1, . . . , un)−Σn k=m+1ΣMk i
{circumflex over (Φ)}mn(um+1, . . . , un)−Σn k=m+1ΣM
II.2.2. The Recovery Procedure
The next objective is to explain a recovery procedure or method for recovering a solution to the n-dimensional problem of [6.1] (2.6) from a relaxed problem having potentially substantially fewer dimensions than [6.1] (2.6). Note that this aspect of the alternative embodiment of the present invention is substantially different from the method disclosed in the first embodiment of the multi-dimensional assignment solving process of section I.1 of this specification. Further, this alternative embodiment provides substantial benefits in terms of computational efficiency and accuracy over the first embodiment, as will be discussed. Thus, given a feasible (optimal or suboptimal) solution wm of [6.4] (2.9) (or wn if Problem Formulation [6.2] (2.7) is constructed via Fact A.2), an explanation is provided here regarding how to generate a feasible solution zn of [6.1] (2.6) which is close to wm in a sense to be specified. We first assume that no variables in [6.1] (2.6) are preassigned to zero (this assumption will be removed shortly). The difficulty with the solution wn is that it need not satisfy the last n-m sets of constraints in [6.1] (2.6). Note, however, that if wm is an optimal solution for [6.4] (2.9) and wn (constructed as in Fact A.2) satisfies the relaxed constraints, then wn is optimal for [6.1] (2.6). The recovery procedure described here is designed to preserve the 0-1 character of the solution wm of [6.4] (2.9) as far as possible. That is, if wm i 1 . . . im=1 and i1w≠0 for at least one 1=1, . . . , m, then the corresponding feasible solution zn of [6.1] (2.6) is constructed so that zn i 1 . . . in=1 for some (im+1, . . . ,in). Note that by this reasoning, variables of the form zn 0 . . . 0t m+1 . . . i n can be assigned to a value of 1 in the recovery problem only if w m 0 . . . 0= 1. However, variables zn 0 . . . 0i m+1 . . . i n will be treated differently in the recovery procedure in that they can be assigned 0 or 1 independent of the value wm 0 . . . 0. This increases the feasible set of the recovery problem, leading to a potentially better solution.
Let {(ij 1, . . . ,ij m)}N 0 j=1 be an enumeration of indices of wm (or the first m indices of w1 constructed as in Fact A.2) such that wm j i 1 . . . jj=1 m and (ij 1, . . . , ij m)≠(0, . . . , 0). Set (i0 1, . . . i0 m)=(0, . . . , 0) for j=0 and define
Let Y denote the solution of the (n−m+1)-dimensional assignment problem:
The recovered feasible solution zn of [6.1] (2.6) corresponding to the multiplier set {um, . . . , un} is then defined by
This recovery procedure is valid as long as all cost coefficients cn are defined and all zero-one variables in zn are free to be assigned. Note that modifications are necessary for sparse problems. If the cost coefficient cnj i
II.3. The Multi-Dimensional Lagrangian Relaxation Algorithm for the n-Dimensional Assignment Problem
Starting with the M-dimensional assignment problem [6.1] (2.6), i.e., n=M, the algorithm described below is recursive in that the M-dimensional assignment problem is relaxed to an m-dimensional problem by incorporating (n-m) sets of constrains into the objective function using Lagrangian relaxation of this set. This problem is maximized with respect to the Lagrange multipliers, and a good suboptimal solution to the original problem is recovered using an (n−m+1) -dimensional assignment problem. Each of these two (the m-dimensional and the (n−m+1) -dimensional assignment problems) can be solved in a similar manner.
More precisely, reference is made to FIG. 8 which presents a flowchart of a procedure embodying the multi-dimensional relaxation algorithm, referred to immediately above. This procedure, denoted MULTI13 DIM_RELAX in FIG. 8 , has three formal parameters, n, PROB_FORMULATION and ASSIGNMT_SOLUTION, which are used to transfer information between recursive instantiations of the procedure. In particular, the parameter, n, is an input parameter supplying the dimension for the multi-dimensional assignment problem (as in [6.1] (2.6)) which is to be solved (i.e., to obtain an optimal or near-optimal solution). The parameter. PROB_FORMULATION, is also an input parameter supplying the data structure(s) used to represent the n-dimensional assignment problem to be solved. Note that PROB_FORMULATION at least provides access to the cost matrix, [cnun], and the observation sets whose observations are to be assigned. Additionally, the parameter, ASSIGNMT_SOLUTION, is used as an output parameter for returning a solution of a lower dimensioned assignment problem to an instantiation of MULTI_DIM_RELAX which is processing a higher dimensioned assignment problem.
A description of FIG. 8 follows. Assuming MULTI_Dim_RELAX is initially invoked with M as the value for the parameter n and the PROB_FORMULATION having a data structure(s) representing an M-dimensional assignment problem as in [5.51] (2.5), in step 500 an integer m, 2≦m<n is chosen such that the constraint sets or corresponding to dimensions m+1, . . . , n are to be relaxed so that an m-dimensional problem formulation as in [6.21] (2.7) results. In step 504 an initial approximation is provided for {um+1 0, . . . , un 0 56 . Subsequently, in step 508 the above initial values for {um+1 0, . . . ,un 0} are used in an iterative process in determining (ūm+1, . . . ,ūn) which maximizes {Φmnγm+1 n kεRM k+i and k=m+1, . . . ,n} for a feasible solution wn subject to the constraints of Problem Formulation [6.2] (2.7). Note that by maximizing Φmnγm+1 n constraints that were relaxed are being forced to be satisfied and in so doing information is built into a solution of this function for solving the input assignment problem in “PROB_FORMULATION.” Further note that a non-smooth optimization technique is used here and that a preferred method of determining a maximum in step 508 is the bundle-trust method of Schramm and Zowe as described in (H. Schramm and J. Zowe,. A version of the bundle idea for minimizing a non-smooth function: Conceptual idea, convergence analysis, numerical results,. SIAM Journal on Optimization, 2 (1992), pp. 121-152 No. 1:121-152, February, 1992). This method, along with various other methods for determining the maximum in step 508, are discussed below.
Also note that for m>2, a solution to the optimization problem of step 508 is NP-hard and therefore cannot be solved optimally. That is, there is no known computationally tractable method for guarantying an optimal solution. Thus, there are two possibilities: either (a) allow m to be greater than 2 and use auxiliary functions similar to those disclosed in the first embodiment of the k-dimensional assignment solver 300 in section I to compute a near-optimal solution, or (b) make m=2 wherein algorithms such as the forward/reverse auction algorithm of D. P. Bertsekas and D. A. Castañon in their paper (D. P. Bertsekas and D. A. Castañon. A forward/reverse auction algorithm for asymmetric assignment problems,. Computational Optimization and Applications, 1 (1992), pp.: 277-298, 1992) provides an optimal solution.
If option (a) immediately above is chosen, then the auxiliary functions are used as approximation functions for obtaining at least a near-optimal solution to the optimization problem of step 508. Note that the auxiliary functions used depend on the value of m. Thus, auxiliary functions used when m=3 will likely be different from those for m=4. But in any case, the optimization procedure is guided by using the merit function, Φ2n(u3, . . . , un), which can be computed exactly via a 2-dimensional two-dimensional assignment problem for guiding the maximization process.
Alternatively, if option (b) above is chosen, then two important advantages result:, namely, the optimization problem of step 508 can be always solved optimally and without using auxiliary approximation functions. Thus, better solutions to the original M-dimensional assignment problem are likely since there is no guarantee that when the non-smooth optimization techniques are applied to the auxiliary functions the techniques will yield an optimal solution to step 508. Furthermore, it is important to note that without auxiliary functions, the processing in step 508 is both conceptually easier to follow and more efficient.
Subsequently, in step 512 of FIG. 8 , the solution (ūm+1, . . . , ū)n and wn is used in determining an optimal solution, wm to Problem Formulation [6.4] (2.9) as generated according to [6.3] (2.8) and Fact A.3.
In step 516, the solution wn is used in defining the cost matrix Cn−m+1 as in [6.7] (2.12). Subsequently, if n−m+1=2, then the assignment problem [6.8] (2.13) may be solved straightforwardly using known techniques, such as forward/reverse auction algorithms. Following this, in step 528, the solution to the 2-dimensional two-dimensional assignment problem is assigned to the variable ASSIGNMT_SOLUTION and in step 532 ASSIGNMT_SOLUTION is returned to a dimension three level recursion of MULTI_DIM_RELAX for solving a 3-dimensional three-dimensioanl assignment problem.
Alternatively, if in step 520, n−m+ 1>2, then in step 536 the data structure(s) representing a problem formulation as in [6.8] (2.13) is generated and assigned to the parameter, PROB_FORMULATION. Subsequently, in step 540 a recursive copy of MULTI_DIM_RELAX is invoked to solve the lower dimensional assignment problem represented by PROB_FORMULATION. Upon the completion of step 540, the parameter, ASSIGNMT_SOLUTION, contains the solution to the n−m+1 dimensional (n−m+1)-dimensional assignment problem. Thus, in step 544, the n−m+1 (n−m+1)th solution is used to solve the n-dimensional assignment problem as discussed regarding equations [6.9] (2.14). Finally, in steps 548 and 552 the solution to the n-dimensional assignment problem is returned to the calling program so that, for example, it may be used in taking one or more actions such as (a) sending a warning to aircraft or sea facility; (b) controlling air traffic; (c) controlling anti-aircraft or anti-missile equipment; (d) taking evasive action; or (e) surveilling an object.
II.3.1. Comments on the Various Procedures Provided by FIG. 8
There are many procedures described by FIG. 8 . One such procedure is the first embodiment of the multi-dimensional assignment solving process of section I.1. That is, by specifying m=n−1 in step 500, a single set of constraints is relaxed in step 508. Thus, one set of constraints is incorporated is into the objective function via the Lagrangian problem formulation, resulting in an m=n−1 dimensional (m=n−1)-dimensional problem. The relaxed problem is subsequently maximized in step 512 with respect to the corresponding Lagrange multipliers and then a feasible solution is reconstructed for the n-dimensional problem using a two-dimensional assignment problem. The second procedure provided by FIG. 8 is a novel approach which is not suggested by the first embodiment of section I.1. In fact, the second procedure is somewhat of a mirror image of the first embodiment in that n-2 sets of constraints are simultaneously relaxed, yielding immediately an m=2 dimensional (m=2)-dimensional problem in step 512. Thus, a feasible solution to the n-dimensional problem is then recovered using a recursively obtained solution to an n−1 dimensional (n−1)-dimensional problem via step 540. In this case, the function values and subgradients of Φ2nγ3 n optimally via a two dimensional two-dimensional assignment problem. The significant advantage here is, that there is no need for the merit or auxiliary functions, Ψk embodiment of the multi-dimensional assignment solving process of section I.1 above and also there is no need for the more general merit or auxiliary functions Ψmn subsection II.4.2 below. Further, note that all function values and subgradients used in the non-smooth nonsmooth maximization process are computed exactly (i.e., optimally) in this second procedure. Moreover, problem decomposition is now carried out for the n-dimensional problem; however, decomposition of the n−1 dimensional (n−1)-dimensional recovery problem (and all lower recovery problems) is performed only after the problem is formulated.
Between these two procedures are a host of different relaxation schemes based on relaxing n-m sets of constraints to an m-dimensional problem (2<m<n), but these all have the same difficulties as the procedure for the first embodiment of section I.1 in that the relaxed problem is an NP-hard problem. To resolve this difficulty, we use an auxiliary or merit function Ψnm γnotation ΨkΨn−1,nm<n−1, the recovery procedure is still based on an NP-hard n-m+1 dimensional n-m+1)-dimensional assignment problem. Note that the partitioning techniques similar to those discussed in Section I.3 may be used to identify the assignment problem with a layered graph and then to find the disjoint components of this graph. In general, all relaxed problems can be decomposed prior to any non-smooth nonsmooth computations because their structure stays fixed throughout the-algorithm of FIG. 8 . However, all recovery problems cannot be decomposed until they are formulated, as their structure changes as the solutions to the relaxed problems change.
II.4. Details, and Refinements Relating to the Flowchart of FIG. 8
Further explanation is provided here on how various steps of FIG. 8 are solved. Note that the refinements presented here can significantly increase the speed of the relaxation procedure of step 508.
II.4.1 Maximization of the Non-smooth Function
One of the key steps in the Lagrangian relaxation algorithm in section II.3 is the solution of the problem
Maximize {Φmnγn+1 n kRMk+ 1; k=m+1, . . . , n } [7.1]
where uo k=0 for all k=m+1, . . . ,n. The evaluation of Φnmγm+1 n corresponding minimization problem [6.2]Zn varies for each instance of (um+1, . . . ,un) (2.7). The following discussion provides some properties of these functions.
Maximize {Φmnγn+1 n kRM
where uo k=0 for all k=m+1, . . . ,n. The evaluation of Φnmγm+1 n corresponding minimization problem [6.2]Zn varies for each instance of (um+1, . . . ,un) (2.7). The following discussion provides some properties of these functions.
Fact A.4. Let um+1, . . . ,un be multiplier vectors associated with the (m+1)st through the nth set of constraints [6.1] (2.6), let Φmn γnn objective function value of the n-dimensional assignment problem in equation [6.1] (2.6), let zn be any feasible solution of [6.1] (2.6), and let z n be an optimal solution of [6.1] (2.6). Then, Φmnγm+1 n {um+1, . . . , un}and
Φmnγm+1 n≧Vn(z n)≧Vn(zn) [7.2a] (2.16)
Furthermore,
Φm−1nγm m+1 n≧Φ mnγn+1 n [7.2a] (2.17)
for all ukRMk+1 with uo k=0 and k=m, . . . n.
Φmnγm+1 n≧Vn(
Furthermore,
Φm−1nγm m+1 n≧Φ mnγn+1 n [7.2a] (2.17)
for all ukRM
Most of the procedures for non-smooth optimization are based on generalized gradients called subgradients, given by the following definition.
Definition. At u=(um+1, . . . ,un) the set δΦmnγ subdifferential of Φmn and defined by
δΦmnγεRMm+1 1x. . . xR M n+ 1|ΦmnγΦmnγ≧qT(w0u)∀wεR M n+ 1+1x. . . xRM n+ 1} [7.3]
A vector qεδΦmnγ A vector qεδΦmn(u) is called a subgradient.
If zn is an optimal solution of [6.2] (2.7) computed during evaluation of ΦmnγΦmn in nΦmn(u), differentiating Φmn with respect to un i n yields the following in-th in th component of a subgradient g of for Φmnγ Φmn(u)
δΦmnγεRM
A vector qεδΦmnγ A vector qεδΦmn(u) is called a subgradient.
If zn is an optimal solution of [6.2] (2.7) computed during evaluation of ΦmnγΦmn i
If zn is the unique optimal solution of [6.2] (2.7), δΦmnγ Φmn ∂Φmn(u)={g}and Φmn unique, then there are finitely many such solutions, say zn(1), . . . ,zn(K). Given the corresponding subgradients, g1, . . . , gK, the subdifferential δΦγ δΦ(u) is the convex hull of {g1, . . . , gK}.
II.4.2 Mathematical Description of a Merit or Auxiliary Function
For real-time needs, one must address the fact that the non-smooth optimization problem of step 508 (FIG. 8 ) requires the solution of an NP-hard problem for m>2. One approach to this problem is to use the following merit or auxiliary function to decide whether a function value has increased or decreased sufficiently in the line search or trust region methods:
where the multipliers ū3, . . . ,ūm that appear in lower order relaxations used to construct (suboptimal) solutions of the m-dimensional relaxed problem (6.2) (2.7) have been explicitly included. Note that Ψmnγ Ψmn is well-defined since (2.7) can always be solved optimally if m=2. For sufficiently small problems (6.2) (2.7) or (6.4) (2.9), one can more efficiently solve the NP-hard problem by branch and bound. This is the reason for the inclusion of the first case; otherwise, the relaxed function Φ2n is used to guide the nonsmooth optimization phase. That the merit function provides a lower bound for the optimal solution follows directly from Fact A.4 and the following fact.
Fact A.5. Given the definition of Ψmnγ Ψmn in (2.20) above,
Ψmnγ 3 m m+1 n≦Φmnγm+1 nū3, . . . , ūm, um+1, . . . ,un [7.6] (2.21)
The actual function value used in the optimization phase is Ψmnγ Ψmn; however, the subgradients are computed as in (2.19), but with the solution zi1 n . . . in being a suboptimal solution constructed from a relaxation procedure applied to the m-dimensional problem. Again, the use of these lower order relaxed problems is the reason for the inclusion of the multipliers ū3 . . . , ūm.
Ψmnγ 3 m m+1 n≦Φmnγm+1 nū3, . . . , ūm, um+1, . . . ,un [7.6] (2.21)
The actual function value used in the optimization phase is Ψmnγ Ψmn; however, the subgradients are computed as in (2.19), but with the solution zi
To explain how the merit function is used, suppose there is a current multiplier set (uold m+1, . . . , uold n) and it is desirable to update to a new multiplier set (unew m+1, . . . , ΔnΨmnγold 3 old m old m+1 old nΔγold 3 old mΔ obtained during the relaxation process used to compute a high quality solution to the relaxed m-dimensional assignment problem (6.2) at (um+1, . . . ,un)=(uold m+1, . . . ,uold n). The decision to accept (un m+1ew. . . ,un new) is then based on Ψγmn 3oldm olduold m+1, . . . , uold n)>Ψmnγnew 3 new m new m+1 new nΔ stopping criteria commonly used in line searches. Again, (ūnew 3, . . . ,ūnew m) represents the multiplier set used in the lower level relaxation procedure to construct a high quality feasible solution to the m-dimensional relaxed problem (6.2) at (um+1, . . . , un)=(unew m+1, . . . , unew n). The point is that each time one changes (um+1, . . . , un) and uses the merit function Ψmnγ3 m m+1 nΔ generally change the lower level multipliers (ū×3, . . . , ūm). To explain how the merit function is used, suppose there is a current multiplier set (uold m+1, . . . ,uold n) and it is desirable to update to a new multiplier set (unew m+1, . . . ,unew n) via (unew m+1, . . . ,unew n)=(uold m+1, . . . ,uold n)+(Δum+1, . . . ,Δun). Then Ψmn (ūold 3, . . . ,ūold m; uold m+1, . . . ,uold n) is computed where (ūold 3, . . . ,ūold m) is obtained during the relaxation process used to compute a high quality solution to the relaxed m-dimensional assignment problem (2.7) at (um+1, . . . ,un)=(uold m+1, . . . ,uold n). The decision to accept (unew m+1, . . . ,unew n) is then based on Ψmn(ūold 3, . . . ,ūold m; uold m+1, . . . ,uold n)<Ψmn (ūnew 3, . . . ,ūnew m; unew m+1, . . . ,unew n) or some other stopping criteria commonly used in line searches. Again, (ūnew 3, . . . ,ūnew m) represents the multiplier set used in the lower level relaxation procedure to construct a high quality feasible solution to the m-dimensional relaxed problem (2.7) at (um+1, . . . ,un)=(unew m+1, . . . ,unew n). The point is that each time one changes (um+1, . . . ,un) and uses the merit function Ψmn (ū3, . . . ,ūm; um+1, . . . ,un) for comparison purposes, one must generally change the lower level multipliers (ū3, . . .,ūm).
An illustration of this merit function for m=n−1 is given in “PARTITIONING MULTIPLE DATA SETS. MULTIDIMENSIONAL ASSIGNMENTS AND LAGRANGIAN RELAXATION”, by Aubrey B. Poore and Nenad Rijavec, and in “QUADRATIC ASSIGNMENT AND RELATED PROBLEMS, DIMACS SERIES IN DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE”, in American Mathematical Society, Providence, R.I., Vol. 16, 1994, pp. 25-37 edited by Panos M. Pardalos and Henry Wolkowicz (A. B. Poore and N. Rijavec. Partitioning Multiple Data Sets, Multidimensional Assignments and Lagrangian Relaxation. In P. M. Pardalos and H. Wolkowicz, editors, Quadratic Assignment and Related Problems: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, volume 16, pages 25-37, 1994).
II.4.3 Non-smooth Optimization Methods
By Fact A.4 the function ΦmnγΔ Φmn(u) is a continuous, piecewise affine, and concave, so that the negative of ΦmnγΔ Φmn(u) is convex. Thus the problem of maximizing ΦmnγΔ Φmn(u) is one of nonsmooth optimization. Since there is a large literature on such problems, only a brief discussion of the primary classes of methods for solving such problems is provided. A first class of methods, known as subgradient methods, are reviewed and analyzed in the book by (N. Z. Shor, . Minimization Methods for Non-Differentiable Functions, Springer-Verlag, New York, 1985). Despite their relative simplicity, subgradient methods have some drawbacks that make them inappropriate for the tracking problem. They do not guarantee a descent direction at each iteration, they lack a clear stopping criterion, and exhibit poor convergence (less than linear).
A more recent and sophisticated class of methods are the bundle methods; excellent developments are presented in the books of Hiriart-Urruty and Lemarechal: (J.-B. Hiriart-Urruty and C. Lemarechal,. Convex Analysis and Minimization Algorithms I and II,. Springer-Verlag, Berlin, 1993; and the book of K. C. Kiwiel: . Methods of Descent for Non-Differentiable Optimization. In A. Dold and B. Eckman, editors, Lecture Notes in Mathematics, Vol. volumen 1133, Berlin, 1985. Springer-Verlag, Berlin, 1985). Bundle methods retain a set (or bundle) of previously computed subgradients to determine the best possible descent direction at the current iteration. Because of the non-smoothness nonsmoothness of Φmn, the resulting direction may not provide a “sufficient” decrease in Φmn. In this case, bundle algorithms take a “null” step, wherein the bundle is enriched by a subgradient close to uk. As a result, bundle methods are non-ascent methods which satisfy the relaxed descent condition Φmnγk+1ΔΦmnγkΔk+1≠uk. These methods have been shown to have good convergence properties. In particular, bundle method variants have been proven to converge in a finite number of steps for piecewise affine convex functionals in (K.. Kiwiel,. An Aggregate Subgradient Method for Non-smooth Convex Minimization, aggregate subgradient method for non-smooth convex minimization. Mathematical Programming, 27, (1983) pp. : 320-341, and 1983; H. Schramm and J. Zowe,. A version of the bundle idea for minimizing a non-smooth function: Conceptual idea, convergence analysis, numerical results,. SIAM Journal on Optimization, 2 (1992), pp. No. 1:121-152, February, 1992).
All of the above non-smooth optimization methods require the computation ΦmnγΔεδΦmnγΔ of Φmn(u) and a g εδΦmn(u). These in turn require the computation of the relaxed cost coefficients [6.3] (2.8). In both the first and second procedures discussed in section II.3.1, maximization of Φ2nγΔ Φ2n(u) must be repeatedly evaluated. In the most efficient implementations presently known of these two procedures, it was found that at least 95% of the computational effort of the entire procedure is spent in the evaluation of the relaxed cost coefficients [6.3] (2.8) as part of computing Φ2nγΔ Φ2n(u). Thus, generally a method should be chosen that makes as efficient use of the subgradients and function values as is possible, even at the cost sophisticated manipulation of the subgradients. In evaluating three different bundle procedures: (a) the conjugate subgradient method of Wolfe used in section I.1 of the first embodiment of the present invention; (b) the aggregate subgradient method of Kiwiel (described in K. C. Kiwiel,. An Aggregate Subgradient Method for Non-smooth Convex Minimization, aggregate subgradient method for non-smooth convex minimization. Mathematical Programming, 27, (1983) pp.: 320-341, 1083); and (c) the bundle trust method of Schramm and Zowe (described in H. Schramm and J. Zowe,. A version of the bundle idea for minimizing a non-smooth function: Conceptual idea, convergence analysis, numerical results,. SIAM Journal on Optimization, 2 (1992), pp. No. 1:121-152, February, 1992), it was determined that for a fixed number of non-smooth iterations, say, ten, the bundle-trust method provides good quality solutions with the fewest number of function and subgradient evaluations of all the methods, and is therefore the preferred method.
II.4.4 The Two Dimensional Assignment Problem
The forward/reverse auction algorithm of Bertsekas and Castañon (as described in D. P. Bertsekas and D. A. Castafion,. A forward/reverse auction algorithm for asymmetric assignment problems,. Computational Optimization and Applications, 1 (1992), pp.: 277-298, 1992) is used to solve the many relaxed two dimensional two-dimensional problems that occur in the course of execution.
II.4.5. Initial Multipliers and Hot Starts
The effective use of “hot starts” is fundamental for real-time applications. A good initial set of multipliers can significantly reduce the number of non-smooth iterations (and hence the number of ΦmnΔ Φmn evaluations) required for a high quality recovered solution. Further, there are several ways that multipliers can be reused. First, if a an n-dimensional problem is relaxed to a an m-dimensional problem, relaxation provides the multiplier set {um+1, um+2, . . . ,un}. These can be used as the initial multipliers for the n−m+1 dimensional (n−m+1)-dimensional recovery problem for n−m+1>2. This approach has also worked well to reduce the number of non-smooth iterations during recovery.
Further, for track maintenance, initial feasible solutions are generated as follows. When a new scan of information (a new observation set) arrives from a sensor, one can obtain an initial primal feasible solution by matching new reports to existing tracks via a two dimensional two-dimensional assignment problem. This is known as the track-while-scan (TWS) approach. Thus, an initial primal solution exists and then we use the above relaxation procedure is to make improvements to this TWS solution. Also for track maintenance, multipliers are available from a previously solved and closely related multi-dimensional multidimensional assignment problems for all but the new observation set.
II.4.6. Local Search Methods
Given a feasible solution of the multi-dimensional multidimensional assignment problem, one can consider local search procedures to improve this result, as described in (C. H. Papadimitriou and K. Steiglitz,. Combinatorial Optimization: Algorithms and Complexity,. Prentice-Hall, Inc., Englewood Cliffs, N.J., 1982, and; J. Pearl,. Heuristics: intelligent search strategies for computer problem solving, Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley, Reading, Mass., 1984). One method is the idea of k-interchanges k interchanges. Since for sparse problems only those active arcs that participate in the solution are stored, it is difficult to efficiently identify eligible variable exchange sets with some data structures for solving the assignment problem. However, a local search that may be more promising is to use the two dimensional two-dimensional assignment solver in the following way. Given a feasible solution to the multi-dimensional multidimensional assignment problem, the indices that correspond to active arcs in the solution are enumerated. Subsequently, one coordinate is freed to formulate a two dimensional two-dimensional assignment problem with one index corresponding to the enumeration and the other to the freed coordinate, and then solve a two dimensional two-dimensional assignment problem to improve the freed index position.
II.4.7. Problem Decomposition
The procedures described thus far are all based on relaxation. Due to the sparsity of assignment problems, however, frequently a decomposition of the problem into a collection of disjoint components can be done wherein each of the components can be solved independently. Due to the setup costs of Lagrangian relaxation, a branch and bound procedure is generally more efficient for small components, say ten to twenty feasible 0-1 variables (i.e., zi 1 . . . i n ). Otherwise, the relaxation procedures described above are used. Perhaps the easiest way to view the decomposition method is to view the reports or measurements as a layered graph. A vertex is associated with each observation point, and an edge is allowed to connect two vertices only if the two observations belong to at least one feasible track of observations. Given this graph, the decomposition problem can then be posed as that of identifying the connected subcomponents of a graph which can be accomplished by constructing a spanning forest via a depth first search algorithm, as described in (A. V. Aho, J. E. Hopcroft, and J. D. Ullman,. he Design and Analysis of Computer Algorithms,. Addison-Wesley Publishing Company, Reading, Mass., 1974). Additionally, decomposition of a different type might be based on the identification of bi- and tri-connected components of a graph and enumerating on the connections. Here is a technical explanation. Let
Z-={zi1 , 2 . . . i n |zi1i2 . . . in is not preassigned to zero}
denote the set of assignable variables. Define an undirected graph G(N,A) where the set of nodes is
N={zin min=1, . . . ,n; in=1, . . . , Nm}
and arcs,
A={(zjn n,zj11)|n≠1, jn≠0, j1≠0 and there exists zi1i2 . . . inεZ such that jn=in and j1−i1}.
A={(zjn n,zj 1 1)[|n≠1]|n≠1, jn≠0, j1≠0 and there exists zi 1 i 2 . . . i n εZ-.
Z-={zi
denote the set of assignable variables. Define an undirected graph G(N,A) where the set of nodes is
N={zi
and arcs,
A={(zj
A={(zj
Note that the nodes corresponding to zero index have not been Included in the above defined graph, since two variables that have only the zero index in common can be assigned independently. Connected components of the graph are then easily found by constructing a spanning forest via a depth first search. (A detailed algorithm can be found in the book by Aho, Hopcroft and Ullman cited above). Furthermore, this procedure is used at each level in the relaxation. i.e., is applied to each assignment problem [3.1] (1.4) for n=3, . . . ,M.
The original relaxation problem is decomposed first. All relaxed assignment problems can be decomposed a priori and all recovery problems can be decomposed only after they are formulated. Hence, in the n-to-(n−1) case, we have n−2 relaxed problems that can all be decomposed initially, and the recovery problems that are not decomposed (since they are all two dimensional two-dimensional). In the n-to-2 case, we have only one relaxed problem that can be decomposed initially. This case yields n−3 recovery problems, which can be decomposed only after they are formulated.
III. New Approaches to Track Initiation and Maintenance Using Multidimensional Assignment Problems
The ever-increasing demand for sensor surveillance systems is to accurately track and identify objects in real-time, even for dense target scenarios and in regions of high track contention. The use of multiple sensors, through more varied information, has the potential to greatly improve target state estimation and identification. However, to take full advantage of the available data, a multiple frame data association approach is needed. The most popular such approach is an enumerative technique called multiple hypothesis tracking (MHT). As an enumerative technique, MHT can be too computationally intensive for real-time needs because this problem is NP-hard. A promising approach is to utilize the recently developed Lagrangian relaxation algorithms (K. P.Pattipati, S. Deb, and Y.Bar-Shalom. A multisensor-multitarget data association algorithm for heterogeneous sensors. IEEE Transactions on Aerospace and Electronic Systems, 29, No. 2:560-568, April 1993; A. B. Poore and N.Rijavec. Partitioning multiple data sets: multidimensional assignments and lagrangian relaxation, in quadratic assignment and related problems, P. M. Pardalos and H.Wolkowicz, editors, DIMACS series in Discrete Mathematics and Theoretical Computer Science, 16:25-37, 1994; A. J. Robertson III. A class of lagrangian relaxation algorithms for the multidimensional problem. Ph.D. Thesis, Colorado State University, Ft. Collins, Colo., 1995) for the multidimensional assignment problem; however, there are many other potentially good approaches to these assignment problems such as LP relaxation combined with an interior point method, GRASP, and parallelization.
These data association problems are fundamentally important in tracking. Thus, our first objective is to present an overview of the tracking problem and the context within which these data association problems fit. Following a brief review of the probabilistic framework for data association, the second objective is to formulate two models for track initiation and maintenance as multidimensional assignment problems. This formulation is based on a window moving over the frames of data. The first and simpler model uses the same window length for track initiation and maintenance, while the second model uses different lengths. As the window moves over the frames of data, one creates a sequence of these multidimensional assignment problems and there is an overlap region of frames common to adjacent windows. Thus, given the solution of one problem, one can develop a warm start for the solution to the next problem in the sequence, as shown hereinafter. Such information is critically important to the design of real-time algorithms.
III.2. Overview of the Tracking Problem
Tracking and data fusion are complex subjects of specialization that can only be briefly summarized as they are related to the subject of this paper. The processing of track multiple targets using data from one or more sensors is typically partitioned into two stages or major functional blocks, namely, signal processing and data process processing (Y.Bar-Shalom, Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Dedham, Mass., 1990; Y.Bar-Shalom and T. E. Fortmann, Tracking and Data Association, Academic Press, Boston, Mass., 1988; S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, Mass., 1986). The first stage is the signal processing that takes raw sensor data and outputs reports. Reports are sometimes called observations, threshold exceedances, plots, hits, or returns, depending on the type of sensor. The true source of each report is usually unknown and can be due to a target of interest, a false signal, or persistent background objects that can be moving in the field of view of the sensor.
Two principal functions of data processing are tracking and discrimination or target identification. The discrimination or target identification function distinguishes between tracks that are for targets of interest and other tracks such as those due to background. Also, if there is enough information, each track is classified as to the type of target it appears to represent. Target identification and discrimination will not be discussed further in this paper except to comment here on the use of attributes (including identification information) in the data association.
There are two types of attributes or features, namely, discrete valued variables and continuous valued variables. Available attributes of either or both types should be used in computing the log likelihoods or scores for data association. In discussing tracking in this paper, the attributes will not be mentioned explicitly but it should be understood that some reports and some tracks may include attributes information that should be and can be used in the track processing (both data association and filtering) if it is useful.
III.2.1 Tracking Functions
The tracking function accepts reports for each frame of data and constructs or maintains a target state estimate, the variance-covariance matrix of the state estimation error, and refined estimates (or probabilities) of the target attributes. The state estimate typically includes estimates of target position and velocity in three dimensions and possibly also acceleration and other variables of interest.
The tracking function is typically viewed in two stages, namely, data association and filtering. Also, the process of constructing new tracks, called track initiation, is different from the process of updating existing tracks, called track maintenance.
In track maintenance, the data association function decides how to relate the reports from the current frame of data to the previously computed tracks. In one approach, at most one report is assigned to each track, and in other approachesm, weights are assigned to the pairings of reports to a track. After the data association, the filter function updates each target state estimate using the one or more (with weights) reports that were determined by the data association function. A filter commonly used for multiple target tracking and data fusion is the well know Kalman filter (or the extended Kalman filter in the case of nonlinear problems) or a simplified version of it (Y.Bar-Shalom, Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Mass., 1990; Y.Bar-Shalom and T. E. Fortmann, Tracking and Data Association, Academic Press, Boston, Mass., 1988; S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, Mass., 1986).
In track initiation, typically a sequence of reports is selected (one from each of a few frames of data) to construct a new track. In track initiation, the filtering function constructs a target state estimate and related information based on the selected sequence of reports. The new track is later updated by the track maintenance processing of the subsequent frames of reports.
In some trackers, there is also a tentative tracking function for processing recently established tracks until there is enough confidence to include them in track maintenance. While for simplicity of presentation, tentative tracking will not be included in the processing discussed in this paper, the techniques discussed could readily include one or more tentative tracking functions.
There have been numerous approaches developed to perform the data association function. Since optimal data association is far too complex to implement, good but practical sub-optimal approaches are pursued. Data association approaches can be classified in a number of ways. On One way to classify data association approaches is based on the number of data frames used in the association process (O. E. Drummond. Multiple sensor tracking with multiple frame, probabilistic data association. In Signal and Data Processing of Small Targets, SPIE Proceedings, volume 2561, pages 322-336, 1995). In single frame data association for track maintenance, “hard decisions” are made each frame as to how the on the assignment of reports are to be related to the tracks. Some single frame approaches include: individual nearest neighbor, FDA, JPDA, and global nearest neighbor (sequential most probable hypothesis tracking), which uses a two dimensional two-dimensional assignment algorithm (Y. Bar-Shalom. Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Mass., 1990; Y. Bar-Shalom and T. E. Fortmann. Tracking and Data Association. Academic Press, Boston, Mass., 1988; S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, Mass., 1986). In most single frame data association approaches, only one track per object is carried forward to be used in processing the next frame of reports.
Multiple frame data association is more complex and frequently involves purposely carry carrying forward more than one track per target to be used in processing the next frame of reports. By retaining more than one track per target, the tracking performance is improved at the cost of increased processing load. The best known multiple frame data association approach is an enumerative technique called multiple hypothesis tracking (MHT) which enumerates all the global hypothesis with various pruning rules.
As shown hereinafter, the log likelihood of the probability of a global hypothesis can be decomposed into the sum of scores of each track that is contained in the hypothesis. As a consequence, the most probable hypothesis can be identified with the aid of a non-enumerative algorithm for the assignment so formulated.
Interface Between Track Initiation And Track Maintenance
There are a number of ways that track initiation and track maintenance functions can interact. Two ways that are especially pertinent to the methods of this paper will be discussed in this section.
One approach is to treat these two functions sequentially, by first assigning reports to tracks and then using the information that remains to form new tracks. A better approach is to integrate both processes where initiating tracks compete for the new frame of reports on an equal basis, i.e., at the same time.
In the integrated approach, the data association for track initiation and track maintenance processing are combined and conducted simultaneously. One assignment array is created that includes the track scores for potential tracks for both track initiation and track maintenance. The first dimension of the assignment problem includes only all the tracks either created or updated in the processing of the prior frames of reports. Each of the remaining dimensions accommodates one frame of reports.
After the assignment algorithm finds a solution, each of the previously established tracks are updated with the report assigned to it from the second dimension of the assignment array. The remaining reports in the second dimension that were in the assignment solution are firmly established as track initiators. The unassigned reports in the second dimension of the assignment array are discarded as false signals. The processing of the next frame of reports repeats this process using these updated tracks and the newly identified initiators in the first dimension of the cost array for processing the new frame of reports. Details of this approach are discussed hereinafter.
The integrated approach just discussed, uses the same number of frames of reports for both track initiation and track maintenance. The goal in using the multi-dimensional assignment algorithm is to provide improved performance while minimizing the amount of processing required. Typically, track initiation will benefit from more frames of reports than will track maintenance. Thus, a second approach that integrates track initiation and track maintenance is discussed hereinafter, wherein the number of frames of reports is not the same for these two functions. This is a novel approach that is introduced in this paper.
Multiple Sensor Processing
There are many advantages and many ways to of combining data from multiple sensors. There are also many ways of categorizing the different algorithmic architectures for processing data from multiple sensors. One approach outlines four generic algorithmic architectures (O. E. Drummond. Multiple sensor tracking with multiple frame, probabilistic data association. In Signal and Data Processing of Small Targets, SPIE Proceedings, volume 2561, pages 322-336, 1995). Two of these generic architectures are especially pertinent to this paper and are summarized briefly.
In the Centralized Fusion algorithmic architecture, reports are combined from the various sensors to form global tracks. This algorithmic architecture is also called Central Level Tracking, Centralized Algorithmic Architecture, or simply the Type IV algorithmic architecture. In track maintenance, for example, if a single frame data association is used, then for data association a frame of reports from one sensor is processed with the latest global tracks; then the global tracks are updated by the filter function. After the processing of this frame of reports is completed, a frame of the reports from another (or the same) sensor is processed with these updated global tracks. This process is continued as new frames of data become available to the system as a whole.
In Centralized Fusion, using the multi-dimensional assignment algorithm for the data association with multiple sensors is similar to the processing of data from a single sensor. Instead of using multiple frames of reports from a single sensor, the multiple frames of reports come from multiple sensors. The frames of reports from all the sensors are ordered based on the nominal time each frame of reports is obtained and independent of which sensor provided the reports. In this way the approaches discussed in this paper can be extended to process reports from multiple sensors using the Centralized Fusion algorithmic architecture.
The second pertinent algorithmic architecture is Track Fusion. This approach is also called the Hierarchical or Federated algorithmic architecture, sensor level tracking or simply the Type II algorithmic architecture. In track maintenance, for example, a processor for each sensor computes single sensor tracks; these tracks are then forwarded to the global tracker to compute global tracks based on data from all sensors.
After the first time a sensor processor forwards tracks to the global tracker, then subsequent tracks for the same targets are cross-correlated with the existing global tracks. This track-to-track cross-correlation is due to the common history of the current sensor tracks and the tracks from the same sensor that were forwarded earlier to the global tracker. The processing must take this cross-correlation into account and there are a number of ways of compensating for this-cross-correlations. One method for dealing with this cross-correlation is to decorrelate the sensor tracks that are sent to the global tracker. There are a variety of ways to achieve this decorrelation and some are summarized in Drummond, 1996, Signal Data Proc.recent paper (O. E. Drummond, Feedback in track fusion without process noise. In Signal and Data Processing of Small Targets 1995, SPIE Proceedings, -2561:369-383 volume 2561, pages 369-383, 1995.
Once the sensor tracks are decorrelated they can be processed by the global tracker in almost the same way as reports are processed. In the case of track fusion the association process is referred to as track (or track-to-track) association rather than data (or report-to-track) association. If the sensor tracks are decorrelated, the global tracker can process the tracks from the various sensor processors in much the same way that the global tracker of Centralized Fusion processes reports. Accordingly the methods described in this paper can be readily extended to processing data from multiple sensors using either the Centralized Fusion or Track Fusion or even a hybrid combination of both algorithmic architectures.
III.3 Formulation of the Data Association Problem
The goal of this section is to briefly outline the probabilistic framework for the data association problems presented in this work. The technical details are presented elsewhere (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994). The data association problems for multisensor and multitarget tracking considered in this work are generally posed (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994) as that of maximizing the posterior probability of the surveillance region (given the data) according to
Maximize {P(Γ=γ|ZN+1)|γεΓ*} (3.1)
where ZN+1 represents N+1 data sets, γ is a partition indices of the data (and thus induces a partition of the data) T* is the finite collection of all such Partitions, F is a discrete random element defines on F*, partition,and P(Γγ|ZN+1) is the posterior probability of a partition γ N+1 is defined below; being true given the data ZN+1. The term partition is defined below; however, this framework is currently sufficiently general to cover set packings and coverings.
Maximize {P(Γ=γ|ZN+1)|γεΓ*} (3.1)
where ZN+1 represents N+1 data sets, γ is a partition indices of the data (and thus induces a partition of the data) T* is the finite collection of all such Partitions, F is a discrete random element defines on F*, partition,and P(Γγ|ZN+1) is the posterior probability of a partition γ N+1 is defined below; being true given the data ZN+1. The term partition is defined below; however, this framework is currently sufficiently general to cover set packings and coverings.
Consider N+1 data sets Z(k)(k=1, . . . , N+1), each consisting of Mk actual reports and a dummy report zo k, and let denote the cumulative data set defined by
Z(k)={zik k}i k M k =0 and ZN+1={Z(1), . . . , Z(N+1)}, (3.2)
respectively. (The dummy report zo k serves several purposes in the representation of missing data, false reports, initiating tracks, and terminating tracks (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994).) In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are reports that must be partitioned into tracks and false alarms. In our formulation of track maintenance, which uses a moving window, one data set will be tracks and remaining data sets will be reports which are assigned to existing tracks, as false reports, or to initiating tracks.
Z(k)={zi
respectively. (The dummy report zo k serves several purposes in the representation of missing data, false reports, initiating tracks, and terminating tracks (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994).) In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are reports that must be partitioned into tracks and false alarms. In our formulation of track maintenance, which uses a moving window, one data set will be tracks and remaining data sets will be reports which are assigned to existing tracks, as false reports, or to initiating tracks.
We specialize the problem to the case of set partitioning (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994) defined in the following way. Define a “track of data” as {zi 1 1, . . . , zi N+1 N+1} where each ik and zi k k can assume the zero or nonzero values of 0 and zo k, respectively. A partition of the data will refer to a collection of tracks of data wherein each report occurs exactly once in one of the tracks of data and such that all data is used up; the occurrence of dummy report is unrestricted. The reference partition γo is that in which all reports are declared to be false.
Next, under appropriate independence assumptions one can show
Then, recognizing that
the problem (3.1) can be expressed as the N+1-dimensional (N+1)-dimensional assignment problem
where cO . . . O is arbitrarily defined to be zero. Here, each group of stuns in the constraints represents the fact that each non-dummy report occurs exactly once in a “track of data.” One can modify this formulation to include multiassignments multi-assignments of one, some, or all the actual reports. The assignment problem (3.5) is changed accordingly. For example, if zi
III.4. Track Initiation and Maintenance
In this section we explain two multiframe assignment formulations to the track initiation and maintenance problem. The continued use of all prior information is computationally intensive for tracking, so that a window sliding over the frames of reports is used as the framework for track maintenance and track initiation within the window. The objectives are to describe an improved version of a simple method and then to put this into a more general framework in which track initiation and maintenance have different length moving windows.
III.4.1 The First Approach to Track Maintenance and Initiation
The first method as explained in this section is an improved version of our first track maintenance scheme (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994) and uses the same window length for track initiation and maintenance after the initialization step. The process is to start with a window of length N+1 anchored at frame one. In the first step one there is only one track initiation in that we assume no prior existing tracks. In the second and all subsequent frames, there is a window of length N anchored at frame k plus a collection of tracks up to frame k. This window is denoted by {k;, k+1, . . . , k+N}. The following explanation of the steps is much like mathematical induction in that we explain the first step and then step k to step k+1.
Track Maintenance and Initiation: Step 1. Let
{i1(l2),i2(l2) . . . , iN(l2),iN+1(l2)}l2 L 2 =1 (4.1) (3.6)
be an enumeration of all those zero-one variables in the solution of the assignment problem (3.5) (i.e., zi1 i 2 . . . i N+1 =1) excluding all the false reports in the solution (i.e., all those zero-one variables with exactly one nonzero index) and zero-one variables in the solution for which (i1,i2)=(0,0). (The latter can correspond to tracks that initiate on frames three and higher.) These denote our initial tracks.
{i1(l2),i2(l2) . . . , iN(l2),iN+1(l2)}l
be an enumeration of all those zero-one variables in the solution of the assignment problem (3.5) (i.e., zi
Consider only the first two index sets in this enumeration (4.1) (3.6) and add the zero index l2=0 with the corresponding values of i1 and i2 being zero. Thus, the enumeration is now {i1(l2),i2(l2)}l 2 L 2 =0. The notation T2(l2)≡(zi 1 (l 2 ),Zl 2 (l 2 )) will be used for this pairing. Suppose now that the next data set, i.e., the (N+2)th set, is added to the problem.
To explain the costs for the new problem, one starts with the hypothesis that a partition γεΓ* being true is now conditioned on the truth of the pairings on the first two frames being correct. Corresponding to the sequence {T2, (l2),zi 3 , . . . ,zi n+2 }, the likelihood function is then given by
Next, define the cost and the corresponding zero-one variable
respectively. Then the track maintenance problem Maximize {Lγ|γεΓ* assignment
Track Maintence Maintenance and Initiation: Step k. At the beginning of the kth step, we solve the following (N+1)-dimensional assignment problem.
where for the first stepli and L1 are replaced by i1 and M1, respectively. The first index lk in the subscripts corresponds to the sequence of tracks {Tk(lk)}l
Basic Assumption. Suppose problem (4.4)(3.10) has been solved and let the solution, i.e., those zero-one variables equal to one, be enumerated by
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))}lk+1 L k+1 =1 (4.5) (3.11)
with the following excpetions.
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))}l
with the following excpetions.
a. All zero one zero-one variables for which (lk,ik+1)=(0,0) are excluded. Thus, tracks that initiate on frames after the (k+1)th are not included in the list.
b. All zero-one variables whose subscripts have the form lk=0 and exactly one nonzero index in the remaining indices {ik+1, . . . ,ik+N} are excluded These correspond to false reports on frames p=k+1, . . . ,k+N.
c. All variables (zi k j k+1 . . . l k+N ) zl k j k+1 . . . i k+N for which (ik+1, . . . , ik+N)=(0,0, . . . ,0) and lk(lk)=0 in (4.5) are excluded from (1.11). In other words, the reports on the last N+1 frames in the {Tk(lk),i k+N z k+1 } are all dummy. Any solution with this feature corresponds to a terminated track.
Given the enumeration (4.5) (3.11), one now fixes the assignments on the first two index sets in the list (4.5) (3.11). The zero index lk+1=0 is added to the enumeration to specify (lk(0),ik+1(0))=(0,0) that is used to represent false reports and tracks that initiate on frame k+2 or later, so that the enumeration (4.5) (3.11) is now
{(lk(lk+1),ik+1(lk+1))}lk+1 L k+1 =0 (4.6)
{(lk(lk+1),ik+1(lk+1))}l
Then, for lk+1=1, . . . ,Lk+1, the 1l k+1 th such track is denoted by {Tk+1(lk+1)={Tk(lk(lk+1)),zk+1i k+1 (lk+1)} and the (N+1)-tuple {Tk+1(1k+1),zi k+2 k+2, . . . ,zl k+1+N k+1+N} will denote a track Tk+1(1k+1) plus a set of reports {zl k+2 k+2, . . . ,zi k+1+N k+1+N}, actual or dummy, that are feasible with the track Tk+1(1k+1). The (N+1)-tuple {Tk+1(0),zi k+2 k+2, . . . ,zi k+1+N k+1+N} will denote a track that initiates in the sliding window, i.e., on subsequent frames. A false report in the sliding window is one with all but one non-zero index ip for some p=k+2, . . . , k+1+N in the (N+1)-tuple {Tk+1(0),zi k+2 k+2, . . . ,zi k+1+N k+1+N}.
The corresponding hypothesis about a partition γεΓ* being true is now conditioned on the truth of the Lk+1 tracks existing at the beginning of the N-frame window. (Thus the assignments prior to this sliding window are fixed.) The likelihood function is given by
Next, define the cost and the zero-one variable by
said at least one inert gas has an amount, on a molar basis, that is greater than the amount of said oxygen in said pressurized medium;
respectively, so that the track extension problem, which was originally formulated as Maximize {Lγ|γεΓ*}, can be expressed as exactly the same multi-dimensional assignment in (3.4) but with k replaced by k+1. Thus, we do not repeat it here.
III.4.2. The Second Approach to Track Maintenance and Initiation
In the first approach the window lengths were the same for both track maintenance and initiation. This can be inefficient in that one can usually use a shorter window for track maintenance than for track initiation. This section addresses such a formulation.
The General Step k. To formulate a problem for track initiation and maintenance we consider a moving window centered as frame k of length I+J+1 denoted by [k−I, . . . ,k, . . . ,k+J. In this representation, the window length for track maintenance is J and that for initiation, I+J+1. The objective will be to explain the situation at this center and then the move to the same length window at center k+1 denoted by [k+1−I k+1−I, . . . ,k+1, . . . ,k+1+J], i.e., by moving the frame window to the right one frame at time to the right. The explanation from the first step follows hereinafter.
The notation for a track of data is
Tk(lk)={zi1 1(lk), . . . ,zi p p(lk), . . . ,zi k k(lk)} (4.8) (3.14)
where the index lk is used for an enumeration of those reports paired together. We also use the notation Tp,k(lk) to denote the sequence of reports belonging to track Tk(lk) but restricted to frames prior to and including p. Thus,
Tk(lk)=Tk,k(lk)
Tk(lk)={zi1 1(lk), . . . ,zi p p (l k )}
Tk,k(lk)=Tp,k(lk)∪{zip+1 p+1, . . . ,zi k−1 k−1 (l k ),zi k k (l k )} for p≦k−1. (4.9) (3.15)
Given this notation for the tracks and partition of the data in the frames {k−I, . . . ,k, . . . ,k+J}. LTp,k )l k ) will denote the accumulated likelihood ratio up to and including frame p(p≦k) for a track that is declared as existing on frame k as a solution of the assignment problem. In this notation, the likelihood for Tp,k(lk) and that of the association of {zl k+1 k+1, . . . , zl k+N k+N} with track Tk(lk) is given by
Ltk (l k )=LT p,k (l k )Li p+1 (l k ) . i k (i k ) for any p≦k−1,
LTk (l k ) k+1 i k+N =LT pk (l k )Li p+1 (l k ) i k (i k ) i+N for any p≦k−1, (4.10) (3.16)
respectively.
Tk(lk)={zi
where the index lk is used for an enumeration of those reports paired together. We also use the notation Tp,k(lk) to denote the sequence of reports belonging to track Tk(lk) but restricted to frames prior to and including p. Thus,
Tk(lk)=Tk,k(lk)
Tk(lk)={zi
Tk,k(lk)=Tp,k(lk)∪{zi
Given this notation for the tracks and partition of the data in the frames {k−I, . . . ,k, . . . ,k+J}. LT
Lt
LT
respectively.
The cost for the assignment of {kl k+1 k+1, . . . ,zl k+N k+N} to track Tk(lk) and the corresponding zero one zero-one variable are given by
respectively. Likewise, for costs associated with the false reports on the frames k−I to k and as associated with {zi
For the window of frames in the range [k−I, . . . ,k] {k−I, . . . ,k}, the easiest explanation of the partition of the reports is based on the definitions
so that all of those reports not used in the tracks Tk(lk) on frame p are put into the set of available reports Fp,k for the formation of tracks over the entire window. Thus, we formulate the assignment problem as
Basic Assumptions. Suppose problem (4-14)(1.20) has been solved and let the solution, i.e., those zero-one variables equal to one, be
with the following exceptions.
a. All zero one zero-one variables in the second list for which (ik−1, . . . ,ik,ik+1)=(0, . . . , 0,0) are excluded. Thus, tracks that initiate on frames after the (k+1)th are not included in the list.
b. All false reports axe are excluded, i.e., all zero-one variables in the second list whose subscripts have exactly one nonzero index.
c. All variables zl k l k+1 . . . i k+N T for which (ik+1, . . . ,iK+N)=(0,0, . . . ,0) and z(p)∩Tk(lk)=0 for p=k−K, . . . ,k where K≧0 is user specified. Thus the track Tk(lk) is terminated if it is not observed over K+J+1 frames.
Given the enumeration (4.15) (3.20), one now fixes the assignments on the all index sets up to and including the (k+1)th index sets.
Thus one can now formulate the assignment problem for the next problem exactly as in (4-14) (3.20) but with k replaced by k+1. Thus, we do not repeat it here.
The Initial Step. Here is one explanation for the initial step. First, assume that N=I+J. In this case, we start the track initiation with a solution of (3.5). Let
{i1(l2),l2(l2) . . . iN(l2),iN+1(l2)}l2 L 2 =0
be an enumeration of the solution set of (3.5), i.e., those zero-one variables zi1 (l 2 )i 2 (l 2 ) . . . i N+1 (l 2 )=1, including zOO . . . O=1 corresponding to l2=0, but excluding all those zero-one variables that are assigned to one and correspond to false reports (i.e.. there is exactly one nonzero index in the subscript of zi 1 i 2 . . . i N+1 ), all those zero-one variables that are assigned to one and correspond to tracks that initiate on frames higher than I+2. Then we fix the data association decisions corresponding to the reports in our list of tracks prior to and including frame k+1=I+2. This defines the k for problem (4.4) and one can then continue the development by adding a frame to the window as in the general case.
{i1(l2),l2(l2) . . . iN(l2),iN+1(l2)}l
be an enumeration of the solution set of (3.5), i.e., those zero-one variables zi
If I+J>N, then one possibility is to start the process with N+1 frames, and assuming J≦N, proceed as before replacing I by N−J for the moment, and continue to add frames without lopping off the first frame in the window until reaches a window of length I+J+1. Then we proceed as in the previous paragraph.
If I+J<N, then one can solve the track initiation problem (3.5), formulate the problem with the center of the window at k+1=N+1−J, enumerate the solutions as above, and lop off the first N−J−I frames. Then, we proceed just as in the case I+J=N.
A primary objective in this work has been to demonstrate how multidimensional assignment problems arise in the tracking environment. The problem of track initiation and maintenance has been formulated within the framework of a moving window over the frames of data. The solution of these NP-hard, noisy, large scale, and sparse problems to the noise level in the problem is fundamental to superior track estimation and identification. Thus, one must utilize the special structure in the problems as well take advantage of special information that is available. Since these moving windows are overlapping, there are some algorithm efficiencies that can be identified and that take advantages of the overlap in the windows from one frame of reports to the next. Here is an example of the use of a primal solution of one problem to warm start the solution of the next problem in the sequence.
Suppose we have solved problem (4.4) (3.10) and have enumerated all those zero-one variables in the solution of (4.4) (3.10) as in (4.5) (3.11). Add the zero index lk+1=0, so that the enumeration is
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))} (5.1) (3.23)
With this enumeration one can define the cost by
clk+1 J k+1+N =ci k (i k+1 ),j k+1 (l k+1 ), . . . , i N+1 (j k+1 )i k+1+N (5.2) (3.24)
and the two dimensional two-dimensional assignment problem
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))} (5.1) (3.23)
With this enumeration one can define the cost by
cl
and the two dimensional two-dimensional assignment problem
Let w be an optimal or feasible solution of two two-dimensional assignment problem and define
This need not satisfy the constraints in that there are usually many objects left unassigned. Thus. one can complete the assignment by using the zero-one variables in (4.4) (3.10) with k replaced by k+1 with exactly one nonzero index corresponding to any unassigned object or data report.
For the dual solutions, the multipliers arising from the solution of the two dimensional two-dimensional assignment problem (5.3) (3.25) corresponding to the second variable, i.e., {ul k+1+N k+1+N}l k+1+N M k+1+N =0. These are good initial values for to use in a relaxation scheme [11.12] (A. B. Poore and N. Rijavec. Partitioning multiple data sets: multidimensional assignments and Lagrangian relaxation, in quadratic assignment and related problems; P. M. Pardalos and H. Wolkowicz, editors, DIMACS series in Discrete Mathematics and Theoretical Computer Science, 16:25-37, 1994; A. J. Robertson III. A class of lagrangian relaxation algorithms for the multidimensional assignment problem. Ph.D. Thesis, Colorado State University, Ft. Collins, Colo., 1995). Finally, note that one can also develop a warm start for problem (4.14) (3.20) in a similar fashion.
IV.1. Introduction
Multidimensional assignment problems govern the central problem of data association in multisensor and multitarget tracking. i.e., the problem of partitioning observations from multiple scans of the surveillance region and from either single or multiple sensors into tracks and false alarms. This fundamental problem can be stated as (A. B. Poore, Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995; A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994)
where co . . . o is arbitrarily defined to be zero and is included for notational convenience. One can modify this formulation to include multiassignments multi-assignments of one, some, or all of the actual reports. The zero index is used in representing missing data, false alarms, initiating and terminating tracks as described in (A. B. Poore, Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995; A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994). In these problems, we assume that all zero-one variables zi 1 . . . iN with precisely one nonzero index are free to be assigned and that the corresponding cost coefficients are well-defined. (This is a valid assumption in the tracking environment (A. B. Poore, Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995; A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994).) Although not required, these cost coefficients with exactly one nonzero index can be translated to zero by cost shifting (A. B. Poore and N. Rijavec. A lagrangian relaxation algorithm for multidimensional assignment problems arising from multitarget tracking. SIAM Journal of Optimization, 3, No. 3:544-563, 1993) without changing the optimal assignment. Finally, this formulation is of sufficient generality to include the symmetric problem and the asymmetric inequality problem (A. J. Robertson III. A class of lagrangian algorithms for the multidimensional assignment problem. Ph.D. Thesis, Colorado State University, Ft. Collins, Colo. 1995).
The data association problems in tracking that are formulated as (1.1) Equation (4.1) have several characteristics. They are normally sparse, the cost coefficients are noisy and the problem is NP-hard (M. R. Galey and D. S. Johnson. Computers and Intractability. W. H. Freeman and Company, San Francisco, Calif., 1979), but it must be solved in real-time. The only known methods for solving this NP-hard problem optimally are enumerative in nature, with branch-and-bound being the most efficient; however, such methods are much too slow for real-time applications. Thus one must resort to suboptimal approaches. Ideally, any such algorithm should solve the problem to within the noise level, assuming, of course, that one can measure this noise level in the physical problem and that the mathematical method provides a way to decide if the criterion has been met.
There are many algorithms that can be used to construct suboptimal solutions to NP-hard combinatorial optimization problems. These include greedy (and its many variants), relaxation, simulated annealing, tabu search, genetic algorithms, and neural netork algorithms (C. H. Papadimitriou and K. Steiglitz. Combinatorial Optimization: Algorithm and Complexity. Prentice-Hall, Inc., Englewood Cliffs, N.J., 1982; J. Pearl. Heuristics: Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley, Reading, Mass., 1984; C. R. Reeves ed. Modern Heuristic Techniques for Combinatorial Problems. Halstead Press, Wiley, N.Y., 1993). For the three dimensional three-dimensional assignment problem. Pierskalla (W. Pierskalla. The tri-substitution for three-dimensional assignment problem. Journal du CORS, 5:71-81, 1967) developed the tri-substitution method. which is a variant of the simplex method. Frieze and Yadegar (A. M. Frieze and J. Yadegar, An algorithm for solving 3-dimensional assignment problems with application to scheduling a teaching practice. Journal of the Operational Research Society, 39:989-955, 1981)introduced a method based on Lagrangian relaxation in which a feasible solution is recovered using information provided by the relaxed solution. Our choice of approaches is strongly influenced by the need to balance real-time performance and solution quality. Lagrangian relaxation based methods have been used successfully in prior tracking applications (K. R. Pattipati, S. Deb, and Y. Bar-Shalom. A s-dimensional assignment algorithm for track initiation. In Proceedings of the IEEE Systems Conference, Kobe, Japan, pages 127-130, 1992; Y. Bar-Shalom, S. Deb, K. R. Pattipati, and H. Tsanakis. A new algorithm for the generalized multidimensional assignment problem. In Proceedings of the IEEE International Conference on Systems, Math, and Cybernetics, Chicago, pages 132-136, 1992; A. B. Poore and N. Rijavec. A numerical study of some data association problems arising in multitarget tracking. Large Scale Optimization: State of the Art, W. W. Hager, D. W. Hearn and P. M. Pardalos, editors. Kluwer Academic Publishers B.V., Boston, pages 339-361, 1994; A. B. Poore and N.Rijavec. Partitioning multiple data sets: multidimensional assignments and lagrangian relaxation. In P. M. Pardalos and H. Wolkowicz, editors, Quadratic assignment and related problems: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, volume 16, pages 25-37, 1994; A. B. Poore and N. Rijavec. A lagrangian relaxation algorithm for multidimensional assignment problems from multitarget tracking. SIAM Journal of Optimization,3, No. 3:544-563, 1993). An advantage of these methods is that they provide both an upper and lower bound on the optimal solution, which can then be used to measure the solution quality. These works extend the method of Frieze and Yadegar (A. M. Frieze and J. Yadegar. An algorithm for solving 3-dimensional assignment problems with application to scheduling a teaching practice. Journal of the Operational Research Society, 32:989-995, 1981) to the multidimensional case.
IV.2. Probabilistic Framework for Data Association. (ABP)
The goal of this section is to explain the formulation of the data association problems that governs large classes of data association problems in centralized or hybrid centralized-sensor level multisensor/multitarget tracking. The presentation is brief; technical details are presented for both track initiation and maintenance in the work of Poore (A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995; A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994). The formulation is of sufficient generality to cover the MHT work of Reid, Blackman and Stein (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech. House, Norwood, Mass., 1986) and modifications by Kurien (T.Kurien. Issues in the designing of practical multitarget tracking algorithms. In Multitarget-Multisensor Tracking: Advanced Applications by Y. Bar-Shalom. Artech House, Mass., 1990) to include maneuvering targets. As suggested by Blackman (S. S. Blackman, Multiple Target Tracking with Radar Applications, Artech House, Norwood, Mass., 1986), this formulation can also be modified to include target features (e.g., size and type) into the scoring function. The recent work of Poore and Drummond (A. B. Poore and O. E. Drummond. Track initiation and maintenance using multidimensional assignment problems. In D. W. Hearn, W. W. Hager, and P. M. Pardalos, editors, Network Optimization, volume 450, pages 407-422, Boston, 1996. Kluwer Academic Publishers B.V.) significantly extends the work of this section to new approaches for multiple sensor centralized tracking. Future work will involve extensions to track-to-track correlation.
The data association problems for multisensor and multitarget tracking considered in this work are generally posed as that of maximizing the posterior probability of the surveillance region (given the data) according to
Maximize ΔP(Γ=γ|ZN)|γΓ*} (2.1) (4.2)
where ZN represents N data sets. γ is a partition of indices of the data (and thus induces a partition of the data). Γδ
Maximize ΔP(Γ=γ|ZN)|γΓ*} (2.1) (4.2)
where ZN represents N data sets. γ is a partition of indices of the data (and thus induces a partition of the data). Γδ
P(Γ γ|ZN) Γ* is the finite collection of all such partitions, Γ is a discrete random element defined on Γ*, and P(Γ=γ|ZN) is the posterior probability of a partition γ being true given the data ZN. The term partition is defined below; however, this framework is currently sufficiently general to cover set packings and coverings (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995).
Consider N data sets Z(k) (k=I, . . . ,N) each of Mk reports {zi k k}i k M k =1, and let ZN denote the cumulative data set defined by
Z(k)={zik k}i k Mk=1 and ZN={Z(1), . . . ,Z(N)} (2.2) (4.3)
respectively. In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are measurements that must be partitioned into tracks and false alarms. In our formulation of track maintenance (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995), which uses a moving window over time, one data set will be tracks and remaining data sets will be measurements which are assigned to existing tracks, as false measurements, or to initiating tracks. In sensor level tracking, the objects to be fused are tracks (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Norwood, Mass., 1986). In centralized fusion (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artec House, Norwood, Mass., 1986), the objects may all be measurements that represent targets or false reports, and the problem is to determine which measurements emanate from a common source.
Z(k)={zi
respectively. In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are measurements that must be partitioned into tracks and false alarms. In our formulation of track maintenance (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995), which uses a moving window over time, one data set will be tracks and remaining data sets will be measurements which are assigned to existing tracks, as false measurements, or to initiating tracks. In sensor level tracking, the objects to be fused are tracks (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Norwood, Mass., 1986). In centralized fusion (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artec House, Norwood, Mass., 1986), the objects may all be measurements that represent targets or false reports, and the problem is to determine which measurements emanate from a common source.
We specialize the problem to the case of set partitioning (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. Cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995) defined in the following way. First, for notational convenience in representing tracks, we add a zero index to each of the index sets in (2.2) Equation (4.3), a dummy report zo k to each of the data sets Z(k) in (2.2) Equation (4.3), and define a “track of data” as (zi j 1,zi N N) where ik and zi i k can now assume the values value of 0 and zO k respectively. A partition of the data will refer to a collection of tracks of data wherein each report occurs exactly once in one of the tracks of data and such that all data is used up; the occurrence of dummy report is unrestricted. The dummy report zo k serves several purposes in the representation of missing data, false reports, initiating tracks, and terminating tracks (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995). The reference partition is that in which all reports are declared to be false.
Next under appropriate independence assumptions one can show (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995).
where γ0 is a reference partition, Li
Using (2.3) Equation (4.4) and the zero-one variable zi
where co . . . o is arbitrarily defined to be zero. Here, each group of sums in the constraints represents the fact that each-non-dummy report occurs exactly once in a “track of data.” One can modify this formulation to include multiassignments multi-assignments of one, some, or all the actual reports. The assignment problem (2.5) Equation (4.6) is changed accordingly. For example, if zi k k is to be assigned no more than, exactly, or no less than ni k k times, then the “=1” in the constraint (2.5) (4.6) is changed to ≦, =, ≧ni k k,” respectively. Modifications for group tracking and multiresolution features of the surveillance region will be addressed in future work. In making these changes, one must pay careful attention to the independence assumptions that need not be valid in many applications.
Expressions for the likelihood ratios Li 1 , . . . ,l N , can be found in the work of Poore (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995). These expressions include the developments of Reid, Kurien (T. Kurien, Issues in the designing of practical multitarget tracking algorithms. In Multitarget-Multisensor Tracking: Advanced Applications by Y. Bar-Shalom. Artech House, Mass., 1990), and Stein and Blackman (S. S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Norwood, Mass., 1986). What's more, they are easily modified to include target features and to account for different sensor types. In track initiation, the N data sets all represent reports from N sensors, possibly all the same. For track maintenance, we use a sliding window of N data sets and one data set containing established tracks. (A. B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994; A. B. Poore. Multidimensional assignments and multitarget tracking, partitioning data sets, I. J. cox, P. Hansen, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, Providence, R.I., 19:169-198, 1995). The formulation is the same as above except that the dimension of the assignment problem is now N+1. @@@
To explain the costs for the new problem, one starts with the hypothesis that a partition γεΓ* conditioned on the truth of the pairings on the first two frames being correct. Corresponding to the sequence {T2(l2), zi 3 , . . . zj N+2 }, the likelihood function is then given by
Next, define the coset and the corresponding zero-one variable
respectively. Then the track maintenance problem Maximize {Lγ|γεΓ* assignment
Track Maintence and Initiation: Step k. At the beginning of the kth step. we solve the following (N+1)-dimensional assignment problem.
where for the first step l1 and L1 are replaced by i1 and M1, respectively. The first index lk in the subscripts corresponds to the sequence of tracks {Tk(lk)}l
Suppose problem (4.4) has been solved and let the solution, i.e., those zero-one variables equal to one, be enumerated by
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))}lk+1 Lk+1=1 (4.5)
with the following exceptions.
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))}l
with the following exceptions.
a. All zero one variables for which (lk,lk+1)=(0,0) are excluded. Thus, tracks that initiate on frames after the (k+1)th are not included in the list.
b. All zero-one variables whose subscripts have the form lk=3 and exactly one nonzero index in the remaining indices {ik+1, . . . ,ik+N} are excluded. These correspond to false reports on frames p=k+1, . . . ,k+N.
c. All variables Zl k i k +l . . . ik+N) for which (ik+1, . . . , ik+N)=(0,0, . . . ,0) and ik(Ik)=0 in (4.5). In other words, the reports on the last N+1 frames in the {Tk(lk), zi k+N k+1} are all dummy. Any solution with this feature corresponds to a terminated track.
Given the enumeration (4.5), one now fixes the assignments on the first two index sets in the list (4.5). The zero index lk+1=0 is added to the enumeration to specify (lk(0),ik+1(0))=(0,0) that is used to represent false reports and tracks that initiate on frame k+2 or later, so that the enumeration (4.5) is now
{(lk(lk+1),ik+1(lk+1))}lk+1 Lk+1=0 (4.6)
{(lk(lk+1),ik+1(lk+1))}l
Then, for lk+1=1, . . . ,Lk+1, the lk+1 th such track is denoted by Tk+1(lk+1={Tk(lk(lk+1)),zi k+1 k k+1}, and the (N+1)-tuple {Tk+1(lk+1),zi k+2 k+1, . . . ,zl k+1+N k+1+N} will denote a track Tk+1(Ik+1) plus a set of reports {l k+2 k+2, . . . ,zi k+1+N k+1+N}, actual or dummy. that are feasible with the track Tk+1(lk+1). The (N+1)-tuple {Tk+1(0), zl k+2 k+2, . . . ,zi k+1+N k+1+N}, will denote a track that initiates in 2the sliding window, i.e., on subsequent frames. A false report in the sliding window is one with all but one non-zero index iP for some p=k+2, . . . , k+1+N in the (N+1)-tuple {Tk+1(0), zl k+2 k+2, . . . ,zl k+1+N k+i+N}.
The corresponding hypothesis about a partition γεΓ* being true is now conditioned on the truth of the Lk+1 tracks existing at the beginning of the N-frame window. (Thus the assignments prior to this sliding window are fixed.) The likelihood function is given by
Next, define the cost and the zero-one variable by
respectively, so that the track extension problem, which was originally formulated as Maximize {Lγ|γεΓδ as exactly the same multi-dimensional assignment in (3.4) but with k replaced by k+1. Thus, we do not repeat it here.
The Second Approach to Track Maintenance and Initiation
In the first approach the window lengths were the same for both track maintenance and initiation. This can be inefficient in that one can usually use a shorter window for track maintenance than for track initiation. This section addresses such a formulation.
The General Step k. To formulate a problem for track initiation and maintenance we consider a moving window centered as frame k of length I+J+1 denoted by [k−I, . . . , k, . . . ,k+J]. In this representation, the window length for track maintenance is J and that for initiation, I+J+1. The objective will be to explain the situation at this center and then the move to the same length window at center k+1 denoted by [k+1−I, . . . ,k+1, . . . . ,k+1+J], i.e., by moving the frame one frame at time to the right. The explanation from the first step follows hereinafter.
The notation for a track of data is
Tk(lk)={zi 1 1(lk), . . . ,zip p(lk), . . . , zi k k(lk)} (4.8)
where the index lk is used for an enumeration of those reports paired together. We also use the notation Tp,k(lk) to denote the sequence of reports belonging to track Tk(lk) but restricted to frames prior to and including p. Thus,
Tk(lk)=Tk,k(lk)
Tk(li)={zij 1(lk), . . . ,zi p p(lk)}
Tk,k(lk)=Tp,k(lk)∪{zip+1 (l k ) p+1, . . . ,zi k−1 (l k ) k−1,zi k (l k ) 5} for p≦k−1.(4.9)
Given this notation for the tracks and partition of the data in the frames {k−I, . . . ,k, . . . , k+J}. LTp,k(Ik) will denote the accumulated likelihood ratio up to and including frame p(p≦k) for a track that is declared as existing on frame k as a solution of the assignment problem. In this notation, the likelihood for T p,k(lk) and that of the association of {zik+1 k+1, . . . ,zi k+n k+N} with with track Tk(lk) is given by
Tk(lk)={zi 1 1(lk), . . . ,zi
where the index lk is used for an enumeration of those reports paired together. We also use the notation Tp,k(lk) to denote the sequence of reports belonging to track Tk(lk) but restricted to frames prior to and including p. Thus,
Tk(lk)=Tk,k(lk)
Tk(li)={zi
Tk,k(lk)=Tp,k(lk)∪{zi
Given this notation for the tracks and partition of the data in the frames {k−I, . . . ,k, . . . , k+J}. LTp,k(Ik) will denote the accumulated likelihood ratio up to and including frame p(p≦k) for a track that is declared as existing on frame k as a solution of the assignment problem. In this notation, the likelihood for T p,k(lk) and that of the association of {zi
respectively.
The cost for the assignment of {zi k+1 k+1, . . . ,zi k+N k+N} to track Tk(lk) and the corresponding zero one variable are given by
is assigned to track Tλ(lk), respectively. Likewise, for costs associated with the false reports on the frames k−I to k and as associated with {zl k+1 k+1, . . . ,zi k+j k+J} and the corresponding zero-one variable are given by:
For the window of frames in the range [k−I, . . . ,k], the easiest explanation of the partition of the reports is based on the definitions
so that all of those reports not used in the tracks Tk(Ik) on frame p are put into the set of available reports Fp,k for the formation of tracks over the entire window. Thus, we formulate the assignment problem as
Suppose problem (4.14) has been solved and let the solution, i.e., those zero-one variables equal to one, be enumerated by
with the following exceptions.
a. All zero one variables in the second list for which (ik−1, . . . , k k ,ik+1)=(0, . . . ,0,0) are excluded. Thus, tracks that initiate on frames after the (k+1)th are not included in the list.
b. All false reports are excluded, i.e., all zero-one variables in the second list whose subscripts have exactly one nonzero index.
c. All variables zi k 1 k+1 . . . l k+N for which (ik+1, . . . ,ik+N=(0, 0, . . . ,0) and Z(p)∩Tk(lk)={0} for p=k−K, . . . ,k where K≧0 is user specified. Thus the track Tk(Ik) is terminated if it is not observed over K+J+1 frames.
Given the enumeration (4.15), one now fixes the assignments on the all index sets up to and including the (k+1)th index sets.
Thus one can now formulate the assignment problem for the next problem exactly as in (4.14) but with k replaced by k+1. Thus, we do not repeat it here.
The Initial Step. Here is one explanation for the initial step. First, assume that N=I+J. In this case, we start the track initiation with a solution of (3.5). Let
{i2(l2),i2(l2) . . . ,iN(l2),iN+1(l2)}l2 L 2 =0
be an enumeration of the solution set of (3.5), i.e., those zero-one variables z i 1 (l 2 )i 2 (l 2 ) . . . i N+1 (l 2 )=1, including zOO . . . O=1 corresponding to l2=0, but excluding all those zero-one variables that are assigned to one and correspond to false reports (i.e., there is exactly one nonzero index in the subscript of zi 1 i 2 . . . iN+1), all those zero-one variables that are assigned to one and correspond to tracks that initiate on frames higher than I+2. Then we fix the data association decisions corresponding to the reports in our list of tracks prior to and including frame k+1=I+2. This defines the k for problem (4.4) and one can then continue the development by adding a frame to the window as in the general case.
{i2(l2),i2(l2) . . . ,iN(l2),iN+1(l2)}l
be an enumeration of the solution set of (3.5), i.e., those zero-
If I+J>N, then one possibility is to start the process with N+1 frames, and assuming J≦N, proceed as before replacing I by N−J for the moment, and continue to add frames without lopping off the first frame in the window until reaches a window of length I+J+1. Then we proceed as in the previous paragraph.
If I+J<N, then one can solve the track initiation problem (3.5), formulate the problem with the center of the window at k+1=N+1−J, enumerate the solutions as above, and lop off the first N−J−I frames. Then, we proceed just as in the case I+J=N.
A primary objective in this work has been to demonstrate how multidimensional assignment problems arise in the tracking environment. The problem of track initiation and maintenance has been formulated within the framework of a moving window over the frames of data. The solution of these NP-hard, noisy, large scale, and sparse problems to the noise level in the problem is fundamental to superior track estimation and identification. Thus, one must utilize the special structure in the problems as well take advantage of special information that is available. Since these moving windows are overlapping, there are some algorithm efficiencies that can been identified and that take advantages of the overlap in the windows from one frame of reports to the next. Here is an example of the use of a primal solution of one problem to warm start the solution of the next problem in the sequence.
Suppose we have solved problem (4.4) and have enumerated all those zero-one variables in the solution of (4.4) as in (4.5). Add the zero index lk+1=0, so that the enumeration is
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))}ik+1 Lk+1=0 (5.1)
With this enumeration one can define the cost by
cik+1 i k+1+N =ci k (l k+1 ) k+1 (l k+1 ), . . . , i N+1 (l k+i )i k+1+N (5.2)
and the two dimensional assignment problem
{(lk(lk+1),ik+1(lk+1), . . . ,ik+N(lk+1))}i
With this enumeration one can define the cost by
ci
and the two dimensional assignment problem
Let w be an optimal or feasible solution to this two-dimensional assignment problem and define
This need not satisfy the constraints in that there are usually many objects left unassigned. Thus, one can complete the assignment by using the zero-one variables in (4.4) with k replaced by k+1 with exactly one nonzero index corresponding to any unassigned object or data report.
For the dual solutions, the multipliers arising from the solution of the two dimensional assignment problem (5.3) corresponding to the second variable. i.e., {ui k+1+N k+1+N}i k+1+N M k+1+N =0. These are good initial values for use in a relaxation scheme [11.12]. Finally, note that one can also develop a warm start for problem (4.14) in a similar fashion.
Multidimensional assignment problems govern the central problem of data association in multisensor and multitarget tracking, i.e., the problem of partitioning observations from multiple scans of the surveillance region and from either single or multiple sensors into tracks and false alarms. This fundamental problem can be stated as
where cO . . . 0 is arbitrarily defined to be zero and is included for notational convenience. One can modify this formulation to include multiassignments of one, some, or all of the actual reports. The zero index is used in representing missing data, false alarms, initiating and terminating tracks. In these problems, we assume that all zero-one variables zij . . . iN with precisely one nonzero index are free to be assigned and that the corresponding cost coefficients are well-defined. (This is a valid assumption in the tracking environment.) Although not required, these cost coefficients with exactly one nonzero index can be translated to zero by cost shifting without changing the optimal assignment. Finally, this formulation is of sufficient generality to include the symmetric problem and the asymmetric inequality problem.
The data association problems in tracking that are formulated as (1.1) have several characteristics. They are normally sparse, the cost coefficients are noisy and the problem is NP-hard, but it must be solved in real-time. The only known methods for solving this NP-hard problem optimally are enumerative in nature, with branch-and-bound being the most efficient; however, such methods are much too slow for real-time applications. Thus one must resort to suboptimal approaches. Ideally, any such algorithm should solve the problem to within the noise level, assuming, of course, that one can measure this noise level in the physical problem and the mathematical method provides a way to decide if the criterion has been met.
There are many algorithms that can be used to construct suboptimal solutions to NP-hard combinatorial optimization problems. These include greedy (and its many variants), relaxation, simulated annealing. tabu search, genetic algorithms, and neural netork algorithms. For the three dimensional assignment problem. Pierskalla developed the tri-substitution method, which is a variant of the simplex method. Frieze and Yadegar introduced a method based on Lagrangian relaxation in which a feasible solution is recovered using information provided by the relaxed solution. Our choice of approaches is strongly influenced by the need to balance real-time performance and solution quality. Lagrangian relaxation based methods have been used successfully in prior tracking applications. An advantage of these methods is that they provide both an upper and lower bound on the optimal solution, which can then be used to measure the solution quality. These works extend the method of Frieze and Yadegar to the multidimensional case.
Probabilistic Framework for Data Association. (ABP)
The goal of this section is to explain the formulation of the data association problems that governs large classes of data association problems in centralized or hybrid centralized-sensor level multisensor/multitarget tracking. The presentation is brief; technical details are presented for both track initiation and maintenance in the work of Poore. The formulation is of sufficient generality to cover the MHT work of Reid, Blackman and Stein and modifications by Kurien to include maneuvering targets. As suggested by Blackman, this formulation can also be modified to include target features (e.g., size and type) into the scoring function. The recent work of Poore and Drummond significantly extends the work of this section to new approaches for multiple sensor centralized tracking. Future work will involve extensions to track-to-track correlation.
The data association problems for multisensor and multitarget tracking considered in this work are generally posed as that of maximizing the posterior probability of the surveillance region (given the data) according to
Maximize {P(Γ=γ|ZN)|γεΓ*} (2.1)
where ZN represents N data sets, γ of the data (and thus induces a partition of the data), Γγ
Maximize {P(Γ=γ|ZN)|γεΓ*} (2.1)
where ZN represents N data sets, γ of the data (and thus induces a partition of the data), Γγ
P(Γ γ|ZN) is the posterior probability of a partition γ true given the data ZN. The term partition is defined below; however, this framework is currently sufficiently general to cover set packings and coverings.
Consider N data sets Z(k) (k=I, . . . ,N) each of Mk reports {zi k k}i k M k =1, and let ZN denote the cumulative data set defined by
Z(k)={zik k}i k Mk=1 and ZN={(Z(I), . . . ,Z(N)} (2.2)
respectively. In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are measurements that must be partitioned into tracks and false alarms. In our formulation of track maintenance, which uses a moving window over time, one data set will be tracks and remaining data sets will be measurements which are assigned to existing tracks, as false measurements, or to initiating tracks. In sensor level tracking, the objects to be fused are tracks. In centralized fusion, the objects may all be measurements that represent targets or false reports, and the problem is to determine which measurements emanate from a common source.
Z(k)={zi
respectively. In multisensor data fusion and multitarget tracking the data sets Z(k) may represent different classes of objects, and each data set can arise from different sensors. For track initiation the objects are measurements that must be partitioned into tracks and false alarms. In our formulation of track maintenance, which uses a moving window over time, one data set will be tracks and remaining data sets will be measurements which are assigned to existing tracks, as false measurements, or to initiating tracks. In sensor level tracking, the objects to be fused are tracks. In centralized fusion, the objects may all be measurements that represent targets or false reports, and the problem is to determine which measurements emanate from a common source.
We specialize the problem to the case of set partitioning defined in the following way. First, for notational convenience in representing tracks, we add a zero index to each of the index sets in (2.2), a dummy report zo k to each of the data sets Z(k) in (2.2), and define a “track of data” as (zi 1 i,zi N N) where @@ik and zi k k can now assume the values of 0 and zO k, respectively. A partition of the data will refer to a collection of tracks of data wherein each report occurs exactly once in one of the tracks of data and such that all data is used up; the occurrence of dummy report is unrestricted. The dummy report zO k serves several purposes in the representation of missing data, false reports, initiating tracks, and terminating tracks. The reference partition is that in which all reports are declared to be false.
Next under appropriate independence assumptions one can show
Li
Using (2.3) and the zero-one variable zi 1 . . . N ==1 i1, . . . N)
where cO . . . O is arbitrarily defined to be zero. Here, each group of sums in the constraints represents the fact that each-non-dummy report occurs exactly once in a “track of data.” One can modify this formulation to include multiassignments of one, some, or all the actual reports. The assignment problem (2.5) is changed accordingly. For example, if zl
Expressions for the likelihood ratios Ll 1. ,iN, can be found in the work of Poore. These expressions include the developments of Reid, Kurien, and Stein and Blackman. What's more, they are easily modified to include target features and to account for different sensor types. In track initiation, the N data sets all represent reports from N sensors, possibly all the same. For track maintenance, we use a sliding window of N data sets and one data set containing established tracks. The formulation is the same as above except that the dimension of the assignment problem is now N+1.
Overview of the Lagrangian Relaxation Algorithm. (ABP)
Having discussed the N-dimensional assignment problem (1.1) (3.1), we now turn to a description of the Lagrangian relaxation algorithm. The algorithm will proceed iteratively for a loop k=1, . . . , N−2. At the completion, there remains one two-dimensional assignment problem that provides the last step which yields an optimal (sometimes) or near-optimal solution to the original N-dimensional assignment problem. In step k of this loop (summarized in Section 4 IV.3) one starts with the following (N−k+1)-dimensional assignment problem with one change in notation. If k=1, then the index notation l1 and L1 are to be replaced by i1 and M1, respectively.
To ensure that a feasible solution of (3.1) Equation (4.7) always exists for is a sparse problem, all variables with exactly one nonzero index (i.e., variables of the form zl
Subsection 3.1Section IV.3.1 presents some of the properties associated with the Lagrangian relaxation of (3.1)(4.7) based on relaxing the last (N−k)-sets of constraints to a two-dimensional one. A Section IV.3.2 describes a new approach to the problem of recovering a high quality feasible solution of the original (N−k+1)-dimensional problem given a feasible solution (optimal or suboptimal) of the relaxed two-dimensional problem is described hereinafter. A summary of the relaxation algorithm is given hereinafter in Section IV.3.3, following which and in Section IV.3.4, we establish the maximization of the Lagrangian dual (an important aspect of the relaxation 3procedure) to be an unconstrained nonsmooth optimization problem and then present a method for computing the subgradients.
IV.3.1 The Lagrangian Relaxed Assignment Problem.
The (N−k+1)-dimensional problem (3.1) (4.7) has (N−k+1) sets of constraints. A (Mp+1)-dimensional multiplier vector (i.e., νp ε RM p +1) associated with the p-th pth constraint set will be denoted by up=(u0 p,u1 p, . . . ,uM p p)T with uO p=0 being fixed for each p=k+2, . . . , N and included for notational convenience only. Now, the (N−k+1)dimensional (N−k+1)-dimensional assignment problem (3.1) (4.7) is relaxed to a two-dimensional assignment problem by incorporating (N−k−1) sets of constraints into the objective function via the Lagrangian. Although any (N−k−1) constraint sets can be relaxed, we choose the last (N−k−1) sets of constraints for convenience. The relaxed problem is
One of the major steps in the algorithm is the maximization of ΦN−k+1(uk+2, . . . ,uN) with respect to the multipliers (uk+2, . . . ,uN). It turns out that ΦN−k+1 is a concave, continuous, and piecewise affine function of the multipliers (uk+2, . . . ,uN), so that the maximization of ΦN−k+1 is a problem of nonsmooth optimization. Since many of these algorithms [???] require a function value and a subgradient of ΦN−k+1 at any required multiplier value (uk+2, . . . ,uN), we address this problem in the next subsection. We note, however, that there are other ways to maximize ΦN−k+1 and the next subsection just addresses one such method.
IV.3.2 Properties of the Lagrangian Relaxed Assignment Problem
For a function evaluation of ΦN−k+1 ΦN−k+1, we show that an optimal (or suboptimal) solution of this relaxed problem (3.2) (4.8) can be constructed from that of a two-dimensional assignment problem. Then, the nonsmooth characteristics of ΦN−k+1 are addressed, followed by a method for computing the function value and a subgradient.
Evaluation of ΦN−k+1. Define for each (lk,ik+1) an index (jk+2, . . . , jN)=(jk+2(lk,ik+1), . . . ,jN(lk,ik+1)) and a new cost function cl k i k+1 2 by
Given an index pair (Ik,ik+1),(jk+2, . . . , jN) need not be unique, resulting in the potential generation of several subgradients (3.11) (4.17).
Then,
As an aside, two observations are in order. The first is that the search procedure needed for the computation of the relaxed cost coefficients in (3.3) (4.9) is the most computationally intensive part of the entire relaxation algorithm. The second is that a feasible solution zN−k+1 of a sparse problem (3.1) (4.7) yields a feasible solution z2 of (3.4) (4.10) via the construction
thus, there are generally solutions other than the one nonzero index solution.
The following Theorem 3.1 4.1 gives a method for evaluating ΦN−k+1 and states that an optimal solution of (3.2) (4.10) can be computed from that of (3.4) (4.10). Furthermore, if the solution of either of these two problems is ε-optimal, then so is the other. The converse is contained in Theorem 3.2 (4.2).
Theorem 3.1. Let ω2 dimensional assignment problem (3.4) and define ωN−k+1
Then ωN−k+1 ν problem and ΦN−k+1γωN−k+1νk+2 . . . , νN {circumflex over (Φ)}N−k−1γω2 νk+2 νNΔ addition, ω2ωN=k+1 ΦN−k+1γνk+2 νNΔ {circumflex over (Φ)}N−k+1γνk+2 νNΔ
Proof. Let ωN−k+1 ω2 ΦN−k+1γωN−k+1 νk+2 νNΔ {circumflex over (Φ)} γN−k+1 2νk+2 νN) objective function values of (3.2) and (3.4), respectively. Direct verification shows that ωn−k+1 in (3.2) and ΦN−k+1γωN−k+1 νk+2νN{circumflex over (Φ)}N−k+1γω2νk+2, . . . ,νN remainder of the proof, assume that ω−γΔ
Let χN−k+1 γΔ
Note that χ2γΔΦN−k+1γχN−k+1νk+2νNΔ≧{circumflex over (Φ)}N−k+1(χ2νk+2 νNΔ≧ {circumflex over (Φ)}N−k+1 (ω2 νk+2 νNΔ ΦN−k+1γωN−k+1 νk+2 νNΔ χN−k+1 γ Δ ω ωN−k+1 optimal solution of (3.2). Next, ΦN−k+1γνk+2 νNΔ {circumflex over (Φ)}N−k+1 (νk+2 νNΔ ΦN−k+1γωN−k+1 νk+2 νNΔ ΦN−k+1(ω2 νk+2 νNΔ ω2 γΔ
With the exception of one equality being converted to an inequality, the following theorem is a converse of Theorem 3.1.
Theorem 3.2. Let ωN−k+1γΔ and define ω2
Then ω2 γ Δ ΦN−k+1 γωN−k+1, νNΔ≧{circumflex over (Φ)}N−k+1(ω2 νk+2 νNΔ ωN−k+1 γ Δ ω2 (3.4), ΦN−k+1γωN−k+1 νk+2 νNΔ={circumflex over (Φ)}N−k+1(ω2 νk+2 νNΔ and ΦN−k+1 (νk+2 νNΔ {circumflex over (Φ)}N−k+1γνk+2 νNΔ
Proof: Let ωN−k+1 ω2 ΦN−k+1(ωN−k+1 νk+2 νNΔ and {circumflex over (Φ)}N−k+1(ω2 νk+2 νNΔ objective function values of (3.2) and (3.4), respectively. Direct verification shows that ω2 (3.4) and ΦN−k+1γωN−k+1 νk+2νNΔ≧{circumflex over (Φ)}N−k+1(ω2νk+2νN remainder of the proof, assume that ωN−k+1 γΔ and construct ω2 ω
Theorem 4.1. Let w2 be a feasible solution to the two-dimensional assignment problem (4.10) and define wN−k+1 by
Then wN−k+1 is a feasible solution of the Lagrangian relaxed problem and
ΦN−k+1(wN−k+1;uk+2, . . . ,uN)={acute over (Φ)}−k−1(w2; uk+2, . . . ,uN).
If, in addition, w2 is optimal for the two-dimensional problem, then wN−k+1 is an optimal solution of the relaxed problem and ΦN−k+1(uk+2, . . . ,uN)={acute over (Φ)}−k+1(uk+2, . . . ,uN).
Proof. Let wN−k+1 and w2 be as in the hypotheses, and let
ΦN−k+1(wN−k+1;uk+2, . . . ,uN)
and
{acute over (Φ)}n−k+1(z2;uk+2, . . . ,uN)
denote the objective function values of (4.8) and (4.10), respectively. Direct verification shows that wN−k+1 satisfies the constraints in (4.8) and
φN−k+1(wN−k+1;uk+2; . . . ,uN)={acute over (φ)}−k+1(w2;uk+2, . . . ,uN).
For the remainder of the proof, assume that w2 is optimal for (4.10). Let XN−k+1 satisfy the constraints in (4.8) and define
ΦN−k+1(wN−k+1;uk+2, . . . ,uN)={acute over (Φ)}−k−1(w2; uk+2, . . . ,uN).
If, in addition, w2 is optimal for the two-dimensional problem, then wN−k+1 is an optimal solution of the relaxed problem and ΦN−k+1(uk+2, . . . ,uN)={acute over (Φ)}−k+1(uk+2, . . . ,uN).
Proof. Let wN−k+1 and w2 be as in the hypotheses, and let
ΦN−k+1(wN−k+1;uk+2, . . . ,uN)
and
{acute over (Φ)}n−k+1(z2;uk+2, . . . ,uN)
denote the objective function values of (4.8) and (4.10), respectively. Direct verification shows that wN−k+1 satisfies the constraints in (4.8) and
φN−k+1(wN−k+1;uk+2; . . . ,uN)={acute over (φ)}−k+1(w2;uk+2, . . . ,uN).
For the remainder of the proof, assume that w2 is optimal for (4.10). Let XN−k+1 satisfy the constraints in (4.8) and define
Note that x2 satisfies the constraints in (4.10) and
for any feasible solution xN−k+1 of the constraints (4.8). This implies wN−k+1 is an optimal solution of (4.8). Next,
ΦN−k+1(uk+2, . . . ,uN)={acute over (Φ)}N−k+1(uk+2, . . . ,uN)
follows immediately from
ΦN−k+1(wN−k+1;uk+2, . . . ,uN)=ΦN−k+1(w2;uk+2, . . . ,uN)
for an optimal solution w2 of (4.10). With the exception of one equality being converted to an inequality, the following theorem is a converse of Theorem 4.1.
Theorem 4.2. Let wN−k+1 be a feasible solution to problem (4.8) and define w2 by
Then w2 a feasible solution of the problem (4.10) and
φN−k+1(wN−k+1;wk+2, . . . ,uN)≧{acute over (φ)}N−k+1(w2;uk+2, . . . ,uN).
If, in addition, whu N−k+1 is optimal for (4.8), then w2 is an optimal solution of (4.10),
φN−k+1(wN−k+1;uk+2, . . . ,uN)={acute over (φ)}N−k+1(w2;uk+2, . . . ,uN)
and
ΦN−k+1(uk+2, . . . ,uN)={acute over (Φ)}N−k+1(uk+2, . . . ,uN).
Proof: Let wN−k+1 and w2 be as in the hypotheses, and let φN−k+1(wN−k+1;uk+2, . . . ,uN) and {acute over (φ)}N−k+1(w2;uk+2, . . . ,uN) denote the objective function values of (4.8) and (4.10), respectively. Direct verification shows that w2 satisfies the constraints in (4.10) and
φN−k+1(wN−k+1;uk+2, . . . ,uN)≧{acute over (φ)}N−k+1(w2;uk+2, . . . ,uN).
φN−k+1(wN−k+1;uk+2, . . . ,uN)={acute over (φ)}N−k+1(w2;uk+2, . . . ,uN)
and
ΦN−k+1(uk+2, . . . ,uN)={acute over (Φ)}N−k+1(uk+2, . . . ,uN).
Proof: Let wN−k+1 and w2 be as in the hypotheses, and let φN−k+1(wN−k+1;uk+2, . . . ,uN) and {acute over (φ)}N−k+1(w2;uk+2, . . . ,uN) denote the objective function values of (4.8) and (4.10), respectively. Direct verification shows that w2 satisfies the constraints in (4.10) and
φN−k+1(wN−k+1;uk+2, . . . ,uN)≧{acute over (φ)}N−k+1(w2;uk+2, . . . ,uN).
For the remainder of the proof, assume that wN−k+1 is optimal for (4.8) and construct w2 as above. Using Theorem 4.1, construct w N−k+1 by replacing wN−k+1 in (4.11) with w N−k+1. Then, from that theorem and
Optimality of wN−k+1 then implies the last inequality is in fact an equality. This proves the theorem.
The Nonsmooth Optimization Problem. Next, we address the nonsmooth properties of the function ΦN−k+1γνk+2 νNΔ ΦN−k+1(uk+2, . . . ,uN) as explained in the following theorem.
Theorem 3.4 4.3. (G. L. Nemhauser and L. A. Wolsey. Interger and Combinatorial Optimization, Section II.3.6. Wiley, New York, N.Y., 1988). Let ΦN−k+1 γΔΦN−k+1γN−k+1) ΦN−k+1 be as defined in (4.7), let VN−k+1(zN−k+1) be the object objective function value of the (N−k+1)-dimensional assignment problem in equation (3.1) (4.7) corresponding to a feasible solution ZN−k+1 of the constraints in (3.1) (4.7), and let z N−k+1 be an optimal solution of (3.1) (4.7). Then, ΦN−k+1γνk+2νNΔ ΦN−k+1(uk+2, . . . ,uN) is piecewise affine, concave and continuous in {νk+2 νN {uk+2, . . . ,uN}and
ΦN−k+1(uk+2, . . . ,uN)≦VN−k+I(N−k+1)≦VN−k+1(N−k+1). (4.14)
Most of the algorithms for nonsmooth optimization are based on generalized gradients, called subgradients, given by the following definition for a concave function.
Definition 3.5. 4.1. At u=(uk+2, . . . ,uN) the set δΦN−k+1(u) is called a subdifferential of ΦN−k+1 and is defined for the concave function ΦN−k+1(u) by
∂ΦN−k+1(u)={gεRMk+2 +1 x . . . xRM N+1 |ΦN−k+1(ω)−ΦN−k+1(u)≦g T(ω−u) for all ΩεRM k+2 1 x . . . xRM N+1) .
where go=ωo p=0 are all permanently fixed. (Recall that these were used for notational conveience only.) A vector geε∂ΦN−k+1 is called a subgradient.
ΦN−k+1(uk+2, . . . ,uN)≦VN−k+I(N−k+1)≦VN−k+1(N−k+1). (4.14)
Most of the algorithms for nonsmooth optimization are based on generalized gradients, called subgradients, given by the following definition for a concave function.
Definition 3.5. 4.1. At u=(uk+2, . . . ,uN) the set δΦN−k+1(u) is called a subdifferential of ΦN−k+1 and is defined for the concave function ΦN−k+1(u) by
∂ΦN−k+1(u)={gεRM
where go=ωo p=0 are all permanently fixed. (Recall that these were used for notational conveience only.) A vector geε∂ΦN−k+1 is called a subgradient.
There is a large literature on such problems, e.g., (J.-B. Hiriart-Urruty and C. Lemarechal. Concex Analysis and Minimization Algorithms I& II. Springer-Verlag, Berlin, 1993; K.C. Kiwiel. Methods of descent for nondifferentiable optimization. In Lecture Notes in Mathematics 1133, A. Dold and B. Eckmann, eds. Springer-Verlag, Berlin, 1985; C. Lemarechal and R. Mifflin. Nonsmooth Optimization. Pergamon Press, Oxford, UK, 1978; B. T. Polyak. Subgradient method: A survey of Soviet research. In C. Lemarechal and R. Mifflin, editors, Nonsmooth Optimization, pages 5-29, N.Y., 1978. Pergamon Press.; H. Schramm and J. Zowe. A version of the bundle idea for minimizing a nonsmooth function: Conceptual idea, convergence analysis, numerical results. SIAM Journal on Optimization, 2, No.1:121-152, February, 1992; N. Z. Shor. Minimization Methods for Non-Differentiable Functions. Springer-Verlag, New York, 1985; P. Wolfe. A method of conjugate subgradients for minimizing nondifferentiable functions. Mathematical Programming Study, 3:145-173, 1975), and we have tried a variety of methods including subgradient methods (N. Z. Shor. Minimization Methods for Non-Differentiable Functions. Springer-Verlag, New York, 1985) and bundle methods (J.-B. Hiriart-Urruty and C. Lemarechal. Convex Analysis and Minimization Algorithms I& II. Springer-Verlag, Berlin, 1993; K. C. Kiwiel. Methods of descent for nondifferentiable optimization. In Lecture Notes in Mathematics 1133, A. Dold and B. Eckmann, eds, Springer-Verlag, Berlin, 1985). Of these, we have determined that for a fixed number of nonsmooth iterations (e.g., twenty), the bundle trust method of Schramm and Zowe (H. Schramm and J. Zowe. A version of the bundle idea for minimizing a nonsmooth function: Conceptual idea, convergence analysis, numerical results. SIAM Journal on Optimization, 2, No. 1:121-152, February, 1992) provides excellent quality solutions with the fewest number of function and subgradient evaluations, and is therefore our currently recommended method.
An Algorithm for Computing ΦN−k+1 and a Subgradient. Most current software for maximizing the concave function ΦN−k+1 requires the value of the function and a subgradient at a point (uk+2, . . . ,uN). Based on the previous two sections, this can be summarized as follows.
1. Starting with problem (3.1) (4.7), form the relaxed problem (3.2) (4.8);
2. To solve (3.2) (4.8) optimally, defined the two dimensional two-dimensional assignment problem (3.4) (4.10) via the transformation (3.3) (4.0);
3. Solve the two-dimensional problem (3.4) (4.10) optimally;
4. Reconstruct the optimal solution, say ŵN−k+1, of (3.2) (4.8) via equation (3.5) (4.9) as in Theorem 3.1 4.1;
5. Compute the function
6. A subgradient is given by
Several remarks are in order. First, the optimal solution of the minimiation minimization problem (3.2) (4.8) is required before one can remove the minimum sign, replace zN−k+1 by the minimizer ŵN−k+1 and differentiate with respect to ui
Finally, we have presented a method for computing one subgradient. If ŵN−k+1 is the unique optimal solution of (3.2) (4.8), then ΦN−k+1(u) is differentiable at u, g is just the gradient at u, and the subdifferential δΦN−k+1(u)={g} is a singleton. If, corresponding to u,ŵN−k+1 is not unique, then there are finitely many such solutions, say {ŵN−k+1(1), . . . ,ŵN−k+1(m)} with respective subgradients {g(1), . . . ,g(m)}, the subdifferential δΦ(u)is the convex hull of {g(1) g(m)} (J. L. Goffin. On convergence rates of subgradient optimization methods, mathematical programming. Mathematical Programming, 13:329-347, 1977). These nonunique solutions arise in two ways. First, if the optimal solution of the two dimensional two-dimensional assignment problem is not unique, then one can general generate all optimal solutions of the two dimensional two-dimensional assignment problem (3.4) (4.10). Corresponding to each of these solutions and to each index pair (lk,ik+1)in each solution, compute the indices (jk+2, . . . ,jN) in (3.3) (4.9). If these j's are not unique, then we can enumerate all the possible optimal solutions ŵN−k+1 of (3.2) (4.8). Given these solutions, one can then compute the corresponding subgradients from (3.11) (4.17).
In most nonsmooth optimization algorithms, one uses an epsilon-subdifferential ε-subdifferential.
Definition 3.x 4.2. At u=(uk+2, . . . ,uN) the set δεΦN−k+1(u) is called an epsilon subdifferential ε-subdifferential of ΦN−k+1 and is defined for the concave funtion ΦN−k+1(u) by
∂ΦN−k+1(u)={gεRMk+2 +1x . . . xRM N+1 |1 N−k+1(ω)−ΦN−k+i(u)≦gT(ω−u)+ε for all ωRM k+1 }. (3.9)
where go p=ωo p=uo p=0 are all permanently fixed. (Recall that these were used for notational convenicence only.) A vector gε∂ΦN−k+1(u) is called a subgradients an ε-subgradient.
∂ΦN−k+1(u)={gεRM
where go p=ωo p=uo p=0 are all permanently fixed. (Recall that these were used for notational convenicence only.) A vector gε∂ΦN−k+1(u) is called a subgradients an ε-subgradient.
HOW DO YOU COMPUTE gε∂ΦN−k+i(u)
IV.3.3 The Recovery Procedure.
The next objective is to explain a recovery procedure, i.e., given a feasible (optimal or suboptimal) solution ω2γΔγωN−k+1γΔ w2 of (4.10) (or wN−k+1 of (4.8) constructed via Theorem 3.1 4.1), generate a feasible solution zN−k+1 of equation (3.1) which is close to ω2 w2 in a sense to be specified. We first assume that no variables in (3.1) (4.7) are presassigned preassigned to zero; this assumption will be removed shortly. The difficulty with the solution ωN−k+1 ω wN−k+1 it need not satisfy the last (N−k−1) sets of constraints in (3.1) (4.7). (Note, however, that if ω2 (3.4) w2 is an optimal solution (4.10) and ωN−k+1 wN−k+1, as constructed in Theorem 4.1, satisfies the to relaxed constraints, then ωN−k+1γΔΔω wN−k+1 is optimal for (4.7.) The recovery proceudre described here is designed to preserve the 0-1 character of the solution ω2γΔ w2 of (4.10) as far as possible: If ωi k i i+1 2=1 and lk≠0 or ik+1≠0, w2 l k i k+1 −1 and lk≠0 or ik+1≠0 the corresponding feasible solution zN−k+1 of (3.1) (4.7) is construed so that zi 0 . . . ipo . . . oN−k+1=1 for some (ik+2, . . . iN). By this reasoning, variables of the form zOOi k+2 . . . i N N−k+1 can be assigned a value of one in the recovery problem only if ωoo 2=1. However, variables zooi k+2 . . . i N N−k+1 will be treated differently in the recovery procedure in that they can be assigned either zero or one independent of the value of ωoo 2 w00 2. This increases the feasible set of the recovery problem, leading to a potentially better solution.
Let {(lk(lk+1),ik+1(lk+j)}i k+1 L k+1 −0 be an enumeration of indices {lk, ik+1} of ω2γωN−k+1 w2 (or the first 2 indices of wN−k+1 constructed in equation (5) (4.11)) such that ωi k (l k+1 ),i k+1 (l k+1 ) 2=1 w2 l k (l k+1 ),i k+1 (l k+1 )=1 for (lk(lk+1),ik+1(lk+1))≠(0,0) and (lk(lk+1), ik+1(lk+1))=(0,0) for lk+1=0 regardless of whether ωoo 2=1 w2 oo=1 or not. To define the N−k dimensional (N−k)-dimensional assignment problem that resores restores feasibility, let
where
lm . . . k+1=lmolm+1o . . . olk(lk+1)=lm(lm 1( . . . (ll(lk+1)) . . . ))(3.13) (4.19)
for m=2,k+1 and where o “o” denotes function composition. For example l23=l2(l3) and l234=l 2o l3(l4)=l2(l3(l4)).
Then the (N−k)-dimensional assignment problem that restores feasibility is
Let Y be an optimal or feasible solution to this N−k dimensional (N−k)-dimensional assignment problem. The recovered feasible solution zN is defined by
Said in a different way, the recovered reasible feasible solution zN corresponding to the multiplier set {uk+2, . . . ,uN} is then defined by
where lm . . . k+1 is defined in (3.13) (4.19) and o “o” denotes function composition.
The next objective is to remove the asumption assumption that all cost coefficients are defined and all zero-one variables are free to be assigned. We first note that the above construction of a reduced dimension assignment problem (3.14) (4.20) is valid as long as all cost coefficients cN−k are defined and all zero-one variables in zN−k are free to be assigned. Modifications are necessary for sparse problems. If the cost coefficient cl k (l k+1 ) i k+1 (l k+1 )i k+2 . . . i N N−k+1 is well-defined and the zero-one variable Zi k (l k+1 )i k+1 (l k+1 )i k+2 . . . i N N−k+1 is free to be assigned to zero or one, then define cl k+1 i k+2 . . . l N N−k=cl k (l k+1 )l k+1 (l k+1 )l k+2 . . . i N N−k+1 as in (3.12) (4.18) with zl k+1 i k+2 . . . l N N−k being free to be assigned. Otherwise, zi k+1 l k+2 . . . l N N−k is preassigned to zero or the corresponding arc is not allowed in the feasible set of arcs. To ensure that a feasible solution exists, we now only need ensure that the variables zi k+1 o o N−k are free to be assigned for lk+1=0.1, . . . ,Lk+1 with the corresponding cost coefficients being well-defined. (Recall that all variables of the form zi k o . . . o N−k+1 and zo o p o . . . o N−k+1 are free (to be assigned) and all coefficients of the form cl k o . . . o N−k+1 and co . . . oi p O N−k+1 are well-defined for lk=0, . . . ,Lk and ip=0, . . . ,Mp for p=k+1, . . . ,N.) This is accomplished as follows: If the cost coefficient ck k (l k+1 )i k+1 (l k+1 )o . . . o N−k+1 is well-defined and zl k (l k+1 )i k+1 (l k+1 )o . . . o N−k+1 is free, then define ci k+1 o . . . o N−k=cl k (l k+1 )i k+1 (l k+1 )o . . . o N−k+1 with zi k+1 o . . . o N−k being free. Otherwise, since all variables of the form zl k o . . . o N−k+1 and zol k+1 o . . . o N−k+1 are free to be assigned with the corresponding costs being well-defined, set cl k+1 o . . . o N−k=cl k (l k+1 )oo . . . o N−k+col k+1 (l k+1 )o . . . o N−k+1 where the first term is omitted if lk(Ik+1)=0 and the second, if ik+1(Ik+1)=0. For lk(lk+1)=0 and ik+1(lk+1)=0, define co . . . o N−k=co . . . o N−k+1.
IV.3.4. The last step k=N− 2.
The description of the algorithm ends with k=N+2. The resulting recovery problem defined in (3.14) (4.20) with k=N−2 is
Let Y be an optimal or feasible solution to this 2-dimensional two-dimensional assignment problem. The recovered feasible solution ZN is defined by
Said in a different way, the recoered feasible solution zN is then defnied by
where lm . . . N−1 is defined in (3.13) (4.19) and o “o” denotes function composition. To complete the description, let {(ln−1(lN),iN (lN)}l
IV.3.5. The Upper and Lower BoundBounds. The upper bound on the feasible solution is given by
and the lower by ΦNγ3 . . . ,uN) for any multiplier value (u3, . . . , uN). In particular, we have
ΦN(u3, . . . ,uN)≦ΦN(ū3, . . . ,ūN)≦VN(
where (u3, . . . ,uN) is any multiplier value, (−3 . . . ,−NΔ maximizer of ΦNγ3 . . . , uN), −N multidimensional assignment problem (3.1) (4.7) and {circumflex over (z)}N is the recovered feasible solution defined by (3.20) (4.25). Finally, we conclude with the observation that VN({circumflex over (z)})=V2(Y) where Y is the optimal solution of (3.17) (4.23) used in the construction of {circumflex over (z)} in equations (3.18) (4.24)-(3.20) (4.26).
IV.3.6. Reuse of Multipliers.
Since the most computationally expensive part of the algorithm occurs in the maximization of
ΦN−k+1
starts or multipliers close to the optimal are fundamentally important for real-time speed. The purpose of this section is to demonstrate that the multiplier set obtained at stage k≧1 provide good starting values for those obtained at step k+1. Theorem 3.xx 4.4. Let (u3, . . . ,uN) denote a multiplier set obtained in the maximum maximization of ΦNγγ3 . . . ,uN). Then this multiplier set satisfies the string of inequalities
ΦN(u3, . . . ,uN)≦ΦN−1(u4, . . . u5)≦ . . . ≦Φ3(uN)≦Φ2≦VN({circumflex over (z)}), (4.28)
where after the first step in the maximization of ΦN multipliers are not changed in the remaining steps. Furthermore, to improve this inequiality, let (u2+kN−k+1, . . . ,uN,N−k+1) denote a maximizer of ΦN−k+1(uk+2, . . . ,uN). Then we have
ΦN−k+1
starts or multipliers close to the optimal are fundamentally important for real-time speed. The purpose of this section is to demonstrate that the multiplier set obtained at stage k≧1 provide good starting values for those obtained at step k+1. Theorem 3.xx 4.4. Let (u3, . . . ,uN) denote a multiplier set obtained in the maximum maximization of ΦNγγ3 . . . ,uN). Then this multiplier set satisfies the string of inequalities
ΦN(u3, . . . ,uN)≦ΦN−1(u4, . . . u5)≦ . . . ≦Φ3(uN)≦Φ2≦VN({circumflex over (z)}), (4.28)
where after the first step in the maximization of ΦN multipliers are not changed in the remaining steps. Furthermore, to improve this inequiality, let (u2+kN−k+1, . . . ,uN,N−k+1) denote a maximizer of ΦN−k+1(uk+2, . . . ,uN). Then we have
Inequalities depend on solution of 2d assignment problem.
Proof: Suppose we have a value of the multipliers (uk+2, . . . ,uN) obtains in the maximization of
where
These need not be the maximizer; however, we do assume that we have solved the above minimization problem optimally to evaluate ΦN−k+1(uk+2, . . . ,uN). Just as in the definition of the earlier recovery problem disussed earlier, let {(lk(lk+1),ik+1 {(lk+1)}l
Then, the final value of the objective function can be expressed as
where
If now another constrain set, say the (k+2)th set, is added to this problem, one has
Since the constraint Σi k+1 i k+3 . . . i N Zi k (l k+1 )i k+1 (l k+1 )i k+2 . . . i N N−k+1=1 for lk+2=1, . . . ,Mk2 is now imposed, the feasible region is smaller, so that one has
where the fact that
ΦN(u3, . . . ,uN)≦ΦN−1(u4, . . . uN)≦ . . . ≦Φ3(uN)≦Φ2≡VN({circumflex over (Z)})
where Φ2 γΔ is defined in (4.22).
To explain how to improve this inequality, let (u2+k,N−k+1, . . . , uN,N−k+1) denote a maximizer of ΦN−k+1(uk+2, . . . ,uN). Then by the same reasoning one has (3.xx) the result as stated in the theorem. Q.E.D.
V. Summary of the Lagrangian Relaxation Problem. (APB)
Given the multidimensional assignment problem
where co . . o N is arbitrarily defined to be zero and is included for notational convenience and where the superscript N on both c and z is not an exponent, but denotes the dimension of the subscripts and the assignment problem as stated in (2.5) (3.5). In relaxed and recovery problems co . . . o N need not be zero! In this problem, we assume that all zero-one variables zi
Having explained many of the relaxation features, it is now appropriate to present the Lagrangian relaxation algorithm, which iteratively constructs a feasible solution to the N-dimensional assignment problem (4.1) (5.1).
Algorithm 4.1 5.1 (Lagrangian Relaxation Algorithm). To construct a high quality feasible solution, enoted denoted by {circumflex over (z)}N, of the assignment problem (4.1) (5.1), proceed as follows:
0. Initialize the multipliers (uk+2, . . . ,uN), e.g., (uk+2, . . . , uN)=(0, . . . ,0).
For k−1, . . . ,N−2, do
1. For the Lagrangian relaxed problem (3.2) (4.8) from the problem (3.1) 4.7) by relaxing the last (N−k−1) sets of constraints.
2. Use a nonsmooth optimization technique to solve
Maximize {ΦN−k+1|uΓεRMp+1 for p=k+2, . . . ,N with u0 p=0 being fixed} (4.2) (5.2)
where ΦN−k+1(uk+2, . . . ,uN) is defined by equation (3.2) (4.8). The algorithm following problem (3.9) in Section IV.3.2 provides one method for computing a function value and a subgradient out of the subdifferential at (uk+2, . . . ,uN), as required in most nonsmooth optimization techniques.
Maximize {ΦN−k+1|uΓεRM
where ΦN−k+1(uk+2, . . . ,uN) is defined by equation (3.2) (4.8). The algorithm following problem (3.9) in Section IV.3.2 provides one method for computing a function value and a subgradient out of the subdifferential at (uk+2, . . . ,uN), as required in most nonsmooth optimization techniques.
3. Given an approximate or optimal maximizer of (4.2) (5.2), say (ûl+2, . . . ,ûN), let ŵ2 assignment problem (3.4) (4.10) corresponding to this maximizer of ΦN−k+1(uk+2, . . . ,uN).
4. Formulate the recovery (N−k)-dimensional problem (3.13) (4.19), modified as discussed at the end of subsection (3.3) (IV.3.2) for sparse problems. At this stage, {circumflex over (z)}N as defined in (3.15) (4.21), contains the alignment of the indices
Formulate the final two-dimensional problem (3.17) (4.22) and complete the final recovered solution {circumflex over (z)}N as in (3.20) (4.25).
To explain the lower and upper bounds, let ΦN defined in (3.2) (4.8) with k=1, let VN(zN) be the objective function value of the N-dimensional assignment problem in equation (2.5) (3.5) corresponding to a feasible solution zN of the constraints in (2.5) (3.5), and let z N−k+1 (2.5) (3.5). Then,
ΦN(u3, . . . ,u4)≦VN(z N)≦VN({circumflex over (z)}N) (4.3) (5.3)
is the desired inequality.
ΦN(u3, . . . ,u4)≦VN(
is the desired inequality.
1. Step 2 is the computational part of the algorithm. Evaluating ΦN−k+1 search procedure requires 99% of the computing time in the algorithm. This part uses two dimensional two-dimensional assignment algorithms, a search over a large number of indices, and a nonsmooth optimization algorithm. It is the second part (the search) that consumes 99% of the computational time and this is almost entirely parallelizable.
2. In track maintenance, the warm starts for the initial multipliers for the first step are available. For the relaxation procedure, initial multipliers are available in step 2 from the prior step in the algorithm.
3. There are many variations on the above algorithm. For example, one can compute a good solution on the first pass (k=1) and not perform the optimization in (2) thereafter. This yields a great solution. Thus one can continue the optimization at the first pass, and immediately compute quality feasible solutions to the problem.
VI. Lagrangian Relaxation Algorithm for the 3-Dimensional Algorithm. (ABP)
In this section, we illustrate the relaxation algorithm for the three dimensional three-dimensional assignment problem. Having discussed the general relaxation scheme,
To ensure that a feasible solution of (5.1) (6.1) always exists for a sparse problem, all variables with exactly one nonzero index (i.e., variables of the formzl
VI.1. The Lagrangian Relaxed Assignment Problem.
The three dimensional three-dimensional assignment problem (5.1) (6.1) has three sets of constraints and one can describe the relaxation by relaxing any of the three sets of constraints, the description here is based on relaxing the last set of constraints. A (M3+1)-dimensional multiplier vector (i.e., u3 εRM 3 +1) associated with the 3th constraint set will be denoted by u3=(u0 3, u1 3 . . . ,uM 3 3)T with uo 3≡0 being fixed for notational convenience. (The zero multiplier u0 3 is used for notational convenience.) Now, the three dimensional three-dimensional assignment problem (5.1) (6.1) is relaxed to a two-dimensional assignment problem by incorporating last set of constraints into the objective function via the Lagrangian. Although any constraint set can be relaxed, we choose the last set of constraints for convenience. The relaxed problem is
One of the major steps in the algorithm is the maximization of Φ3γ3Δ u3 Φ3(u3) with respect to the multiplier vector u3. It turns out that Φ3 is a concave, continuous, and piecewise affine function of the multiplier vector u3, so that the maximization of Φ3 is a problem of nonsmooth optimization. Since many of these algorithms require a function value and a subgradient of Φ3 γ3Δ Φ3 at any required multiplier value (u3), we address this problem in the next subsection. We note, however, that there are other ways to maximize Φ3 and the next subsection addresses but one such method.
VI.2. Properties Lagrangian Relaxed Assignment Problem
For a function evaluation of Φ3 γ Φ3, we show that an optimal (or suboptimal) solution of this relaxed problem (5.2) (6.2) can be constructed from that of a two-dimensional assignment problem. Then, the nonsmooth characteristics of Φ3 are addressed, followed by a method for computing a subgradient.
Evaluation of Φ3. Define for each (i1, i2) j3=j3(i1,i2) and a new cost function ci 1 i 2 2 by:
Given an index pair (i1,i2), j3 need not be unique, resulting in the potential generation of several subgradients (5.11) (6.11). (We further discuss this issue at the end of the Subsection 5.2.3.)
Now, define
As an aside, two observations are in order. The first is that the search procedure needed for the computation of the relaxed cost coefficients in (5.3) (6.3) is the most computationally intensive part of the entire relaxation algorithm. The second is that a feasible solution z3 of a sparse problem (5.1) (6.1) yields a feasible solution z2 of (5.4) (6.4) via the construction
Thus the two-dimensional assignment problem (5.4) (6.4) has feasible solutions other than those with exactly one nonzero index if the original problem (5.1) (6.1) does.
The following Theorem 5.1 6.1 states that an optimal solution of (5.2) (6.2) can be computed from that of (5.4) (6.4). Furthermore, if the solution of either of these two problems is ε ε then so is the other. The converse is contained in Theorem 5.2 6.2.
Theorem 5.1 6.1. Let ω2 w2 dimensional assignment problem (5.4) (6.4) and define w3 by
wi1 i 2 i 3 3=wi 1*2 2 if i3=j3 and (i1,i2)≠(0,0);
wi1 i 2 i 3 3=0 if i3≠j3 and (i1,i2)≠(0,0);
wooi3 3=1 if cooi 3 3+ui 3 3≦0;
wooi3 3=01 if cooi 3 3+ui 3 3>0. (5.5) (6.5)
Then w3 is a feasible solution of the Lagrangian relaxed problem (6.2) and Φ γ3 3Δ Φ γ2 3Δ ε ε2 φ3(w3;u3)={circumflex over (φ)}3(w2;u3). If, in addition, w2 is optimal for the two dimensional two-dimensional problem, then w3 is an optimal solution of the relaxed problem and Φ3(u3)=Φ 3(u3).
wi
wi
wooi
wooi
Then w3 is a feasible solution of the Lagrangian relaxed problem (6.2) and Φ γ3 3Δ Φ γ2 3Δ ε ε2 φ3(w3;u3)={circumflex over (φ)}3(w2;u3). If, in addition, w2 is optimal for the two dimensional two-dimensional problem, then w3 is an optimal solution of the relaxed problem and Φ3(u3)=
With the exception of one equality being converted to an inequality, the following theorem is a converse of Theorem 5.1 6.1.
Theorem 5.2 6.2. Let w2 be a feasible solution to problem (5.2) (6.2)and define w2 by
woo 2=0 if (i1,i2)=(00) and cooi
woo 2=1 if (i1,i2)=(00) and cooi
Then w2 is a feasible solution of the problem (5.4) (6.4) and Φ3(w3;u3)≧Φ3(w2;u3). If, in addition, w3 is optimal for (5.2) (6.2), then w2 is an optimal solution of (5.4) (6.4), Φ3(w3;u3)=Φ3(w2;u3) and Φ3(u3)=
The Nonsmooth Optimization Problem
An Algorithm for Computing Φ3 and a Subgradient
Given u3 the problem of computing Φ3γ3Δ Φ3(u3) and a subgradient of Φ3γ3Δ Φ3(u3)
1. Starting with problem (5.1) (6.1), form the relaxed problem (5.2) (6.2).
2. To solve (5.2) (6.2) optimally, define the two dimensional two-dimensional assignment problem (5.4) (6.4) via the transformation (5.3) (6.3).
3. Solve the two-dimensional problem (5.4) (6.3) optimally.
4. Reconstruct the optimal solution, say ŵ3εγΔ equation (5.6) (6.6) as in Theorem 5.1 6.1.
5. Then
6. A subgradient is given by substituting ŵ3 objective function (5.2) (6.2), erasing the minimum sign, and taking the partial with respect to ui 3 3. The result is
VI.3. The Recovery Procedure.
The next objective is to explain a recovery procedure, i.e., given a feasible (optimal or suboptimal) solution w2 of (5.4) (6.4) (or w3 of (5.2) (6.2) constructed in Theorem 5.1 6.1), generate a feasible solution z3 of equation (5.1) (6.1) which is close to w2 in a sense to be specified. We first assume that no variables in (5. 1) (6.1) are preassigned to zero; this assumption will be removed shortly. The difficulty with the solution w3 in Theorem 5.1 6.1 is that it need not satisfy the third set of constraints in (5.1) (6.1). (Note, however, that if w2 is an optimal solution for (5.4) (6.4) and w3, as constructed in Theorem 5.1 6.1, satisfies the relaxed constraints, then w3 is optimal for (5.1) (6.1).) The recovery procedure described here is designed to preserve the 0-1 character of the solution w2 of (5.4) (6.4) as far as possible: If wi 1 i 23 2=1 and i1≠0 or i2≠0, the corresponding feasible solution z3 of (5.1) (6.1) is constructed so that zi 1 i 2 i 3 3=1 for some (i1,i2,i3) . By this reasoning, variables of the form ZOOi 3 3, can be assigned a value of one in the recovery problem only if wOO 2=1. However, variables zOOi 3 3 will be treated differently in the recovery procedure in that they can be assigned either zero or one independent of the value wOO 2. This increases the feasible set of the recovery problem, leading to a potentially better solution.
Let {(i1(l2),i2(l2)}l 2 L=0 be an enumeration of indices {i1,i2} of w2 (or the first 2 indices of w3 constructed in equation(5) (6.5)) such that wi 1 (l 2 ),i 2 (l 2) 2=1 or (i1(l2)i2)≠(0,0) and (i1(l2),i2(l2))=(0,0) for l2=0 regardless of whether w00 2=1 or not. (The latter can only improve the quality of the feasible solution.)
Next to define the two-dimensional assignment problem that restores feasibility, let
cl2 l 3 2=ci 1 (l 2 )i 2 (l 2 )i 3 3 for l2=0, . . . ,L1 (5.12) (6.9)
Then the two-dimensional assignment problem that restores feasibility is
cl
Then the two-dimensional assignment problem that restores feasibility is
The next objective is to remove the assumption that all cost coefficients are defined and all zero-one variables are free to be assigned. We first note that the above construction of a reduced dimension two-dimensional assignment problem (5.13) (6.11) is valid as long as all cost coefficients c2 are defined and all zero-one variables in z2 are free to be assigned. Modifications are necessary for sparse problems. If the cost coefficient ci 1 (l 2 )i 2 (l 2 )i 3 3 is well-defined and the zero-one variable zi 1 (l 2 )i 2 (l 2 )i 3 3 is free to be assigned to zero or one, then define cl 2 i 3 2=ci 1 (l 2 )i 2 (l 2 )i 3 3 as in (5.12) (6.10) with zi 1 (l 2 )i 2 (l 2 )i 3 3 being free to be assigned. Otherwise, zl 2 i 3 2 is preassigned to zero or the corresponding arc is not allowed in the feasible set of arcs. To ensure that a feasible solution exists, we now only need ensure that the variables zl 2 O 2 are free to be assigned for l2=0,1, . . . ,L1 with the corresponding cost coefficients being well-defined. ( Recall that all variables of the form zi 1 OO 3, zOi 2 O 3 and zOOi 3 3 are free (to be assigned) and all coefficients of the corresponding form ci 1 OO 3,cOi 2 O 3 and cOOi 3 3need to be defined. ) This is accomplished as follows: If if the cost coefficient ci 1 (l 2 )i 2 (l 2 )O 3 is well-defined and zi 1 (l 2 )i 2 (l 2 )O 3 is free, then define cl 2 O 2=ci 2 (l 2 )i 2 (l 2 )O 3 with z l 2 O 3 2 being free. Otherwise, since all variables of the form zi 1 O 3 and zOl 2 O 3 are free to be assigned with the corresponding costs being well-defined, set cl 2 O 2=ci 1 (l 2 )OO 3+cOi 2 (l 2 )O 3 where the first term is omitted if i1(1 2)=0 and the second, if i2(l2)=0. For i1(l2)=0 and i2(l2)=0, define coo 2=cOOO 3.
VI.4. The final recovery problem.
The recovery problem for the case N=3 is
Let Y be an optimal or feasible solution to this 2-dimensional two-dimensional assignment problem. The recovered feasible solution z3 is defined by
Said in another way, let {(l2(l3),i3(l3)}l
The upper bound on the feasible solution is given by
and the lower by Φ3γ3Δγ3Δ Φ3(u3).
In particular, we have
Φ3(u3)≧Φ3(ū3)≦V3(z 3)≦V3({circumflex over (z)}3)
where u3 is any multiplier value, (ūΔ3Φ3γ3Δεz 3 (ū3) is a maximizer of Φ3(u3), z 3 is an optimal solution of the multidimensional assignment problem and {circumflex over (z)}3 is the recovered feasible solution defined by (5.16) (6.13).
Φ3(u3)≧Φ3(ū3)≦V3(
where u3 is any multiplier value, (ūΔ3Φ3γ3Δε
VII. Other Relaxations for the Multidimensional Assignment Problem. (ABP)
In this section, we briefly describe other possible relaxations and their implications. These include linear programming relaxations and the corresponding duals.
Recall from Section II that one starts with the definition of the zero-one variable z1 N . . . i N =1 and cost coefficients to form the problem
where cO . . . O is arbitrarily defined to be zero. Here, each group of sums in the constraints represents the fact that each non-dummy report occurs exactly once in a “track of data”. One can modify this formulation to include multiassignments of one, some, or all the actual reports. The assignment problem (2.5) (3.5) is changed accordingly. For example, if zi
Again, the recent work of Poore and Drummond (A. B. Poore and O. E. Drummond. Track initiation and maintenance using multidimensional assignment problems. In D. W. Hearn, W. W. Hager, and P. M. Pardalos, editors, Network Optimization, volume 450, pages 407-422, Boston, 1996. Kluwer Academic Publishers B.V.) significantly extends the formulation of the track maintenance and initiation to new approaches. The discussions of this section apply equally to those formulations.
VII.1. The Linear Programming Relaxation.
In the linear programming relaxation, one replaces the zero-one variables constraints
zi1 . . . i N ε{0,1} for all i1, . . . ,iN (6.2) (7.2)
with the constraint
0≦zi1 . . . i N ≦1 for all i1, . . . iN (6.2) (7.3)
Then, the problem (6.1) (7.1) can be formulated as a linear programming problem with the contraint (6.2) (7.2) in (6.1) (7.1) replaced by (6.3) (7.3) with a special block structure to which the Dantzing-Wolfe decomposition is applicable. Of course, after solving this problem, one must now recover the zero-one character of the variables in (6.1) (7.1) and there are many ways to do this, such as using the two dimensional two-dimensional assignment problems. Commercial software is also available.
zi
with the constraint
0≦zi
Then, the problem (6.1) (7.1) can be formulated as a linear programming problem with the contraint (6.2) (7.2) in (6.1) (7.1) replaced by (6.3) (7.3) with a special block structure to which the Dantzing-Wolfe decomposition is applicable. Of course, after solving this problem, one must now recover the zero-one character of the variables in (6.1) (7.1) and there are many ways to do this, such as using the two dimensional two-dimensional assignment problems. Commercial software is also available.
VII.2. The Linear Programming Dual and Partial Lagrangian Relaxations.
Given the linear programming relaxation, one can formulate the dual problem or the partial Lagrangian relaxation duals with respect to any number of constraints. In particular. this is precisely what is done in Section 3 on the Lagrangian relaxation algorithm presented. The much broader class of algorithms provided in the U.S. Pat. No.II.2 5,537,119 (Aubrey B. Poore. Jr., Method and System for Tracking Multiple Regional Objects by MultiDimensional Relaxation, U.S. Pat. No. 5,537,119, filed Mar. 14, 1995, issue date of Jul. 16, 1996) can be modified to remove the zero-one character when one relaxes M sets of constraints to an N-M dimensional (N-M)-dimensional problem and recovers with an N−M+1 dimensional (N-M+1)-dimensional problem. This avoids the problems associated with the NP-hard N−M (N−M)- and N−M+1 dimensional (N−M+1)-dimensional problems. However, to restore the zero-one character, one can do it sequentially with an assignment problem or with one of the many zero-one rounding techniques. These formulations are easy to work out and thus the details are omitted.
The complete dual problem is another way of solving the LP problem and may indeed be more efficient in certain applications. In addition, the solution of this dual problem may provide excellent initial approximations to the multipliers for Lagrangian relaxations.
VIII. Hot Starts for Track Maintenance and Initiation: Bundle Modifications (ABP)
Thus reuse of multipliers and the first proof that this reuse is actually valid was presented in this section. The reuse in track maintenance is demonstrated and discussed in the work of Poore and Drummond [xx] (A. B. Poore and O. E. Drummond. Track initiation and maintenance using multidimensional assignment problems. In D. W. Hearn, W. W. Hager, and P. M. Pardalos, editors, Network Optimization, volume 450, pages 407-422, Boston, 1996. Kluwer Academic Publishers B.V.). The only item left is the modification of the bundle of subgradients for the use with the multiplier values as one goes through the recovery problem as in Section 3.6 IV.3.6 or as one moves the window in track maintenance. It is this aspect of the nonsmooth optimization that adds an order of magnitude to the speed of the algorithms. This work is based on both a mathematical proof as in Section 3.6 IV.3.6 as well as computational experience and heuristics.
Adaptive Window Size Selection (ABP)IX. ADAPTIVE AND VARIABLE WINDOW SIZE SELECTION
These data association algorithms, based on the multidimensional assignment problem, range from sequential processing to many frames of data processed all at once! The data association problem for multisensor multitarget multisensor-multitarget tracking is formulated using a window sliding over the frames of data from the sensors. This discussion focuses on the work of Poore and Drummond and not on the formulations in Section 2 III. Firm data association decisions for existing track are made at, say frame k, with the most recent frame being k+M. Decisions after frame k are soft decisions. Reports not in the confirmed tracks are used to initiate tracks over frames numbered k−I to k+M.
The length of these windows varies from sequential processing, which corresponds precisely to I=0 and M=1, to user defined large values of I and M. (In the case of sequential processing. we also have a temporary track file of dynamically feasible tracks, but incorrect data association.) There is a marked change in performance over this range. As the two windows become exceedingly long, there is little statistically significant information gained and indeed performance can degenerate slightly. Thus, one must manually find the correct window lengths for performance in a given scenario and the algorithms do not change for a changing environment. Thus we propose an adaptive method for adjusting the window lengths. (The method has been highly successful for selecting the correct window length for multistep methods in ordinary differential equations.)
1. Compute the solution for different window lengths that overlap and differ by one or two frames.
2. Compare the solution quality, i.e., the value of the objective function, for two adjacent window lengths.
3. If there is a predefined improvement in either direction, we then, for stability, repeat the exercise for a shorter or longer on the first try. If there is consistent information, we adjust the window size in the indicated direction. This can be given a well defined mathematical formula in terms of the assignment problems of different dimensions.
Algorithm Enhancements due to Data Structures (ABP)
Construction and enumeration of the Best K-Solutions.
New Nonsmooth Optimization Techniques.
Sensitivity Analysis
X. SENSITIVITY ANALYSIS
For sequential processing in which the two dimensional two-dimensional assignment algorithm is used, one can use the LP sensitivity analysis theory and easily obtain the corresponding answers. For the multiframe processing, the optimal solution is not available; however, there are still two approaches one can use. First, the basic algorithm can perform the same sensitivity analysis at each stage (loop) of the algorithm as is done in the two dimensional two-dimensional assignment problem since the evaluation of function ΦN−k+1 is equivalent to a two dimensional two-dimensional assignment: problem. Alternately, one could use an LP relaxation of the assignment problem and base the sensitivity on the resulting LP problem. We currently see this as an important step in finding even better solutions to the assignment problem if so desired.
New Auction Algorithms (ABP & PS) XI. NEW AUCTION ALGORITHMS.
In this section we present a new auction algorithm for the two dimensional two-dimensional assignment problem.
An important step in solving N-dimensional assignment problems for N≧3, is finding the optimal solution of the 2-dimensional two-dimensional assignment problem. In particular, we wish to solve the 2-dimensional two-dimensional problem which includes the zero-index. T3.pically Typically this problem can be thought of as trying to find either a minimum cost or maximum utility in assigning person to objects, tenants to apartments, or teachers to classrooms. We will follow the work of Bertsekas and call the first index set persons and the second index set objects. The statement of this problem is given below (1) (11.1) when the number of persons is m and the number of objects is n.
There are a couple of assumptions which we will make about (1) (11.1). First of all, we assume that ciO and cOj are well-defined and the corresponding variables χiO χOj free to be assigned. Second if a cost cij happens to be undefined, then the corresponding variable χij χ to 0. In effect if cij is undefined, we simply remove this cost and variable from inclusion in the problem.
Notice that there are no constraints on the number of times person 0 and object 0 can be assigned. But notice that the first constraint requires that each non-zero person i must be assigned exactly once. Similarly, the second constraint forces each non-zero object j to be assigned exactly one time. Finally, the last constraint gives an integer solution, although we will see shortly that this constraint can be relaxed to admit any solution χij≧0. One reason for requiring that all of the costs of the form ciO and cOj be defined is so that we are guaranteed a feasible solution exists for the given problem.
XI.1. Relaxation of One Constraint
Relaxing the last constraint, we obtain the following problem:
This lower bound is achieved and the second constraint in the original problem is satisfied if the following conditions are met:
The relaxation of the first constraint is analogous and would lead to similar results with i and j exchanged and the introduction of the multiplier u1.
XI.2. Relaxation of Both Constraints
This time we will relax both constraints and using use duality theory to obtain a relationship between the multipliers u1 and u2.
Definition: An assignment S and a multiplier set (u1,u2) are said to satisfy e-complementary slackness (ε−CS) if
cij+ui 1+uj 2=0 for all (i,j)εS,
cij+ui 1+uj 2≧−ε for all (i,j)εA.
cij+ui 1+uj 2=0 for all (i,j)εS,
cij+ui 1+uj 2≧−ε for all (i,j)εA.
Forward Auction Algorithm
(1) Select any unassigned person i
(2) Determine the following quantities:
ji=arg min {cik+uk 2|kεA(i)}
vi=clji +uj i 2
wi=min {cik+uk 2|kεA(i), k≠ji}
ji=arg min {cik+uk 2|kεA(i)}
vi=clj
wi=min {cik+uk 2|kεA(i), k≠ji}
In the selection of j1 . above, if a tie occurs between 0 and any non-zero index k, then select j, as k. Otherwise, if there is a tie between two or more non-zero indices, the choice of j, is arbitrary. Also if A(i) consists of only one element, then set wi=∞.
(3) Update the multipliers and the assignment:
If jl=0, then
-
- (a) Add (i,0) to the assignment.
- (b) Update ui 1:+−ciO.
- If ji≠0, then
- (a) Add (i,jl) to the assignment.
- (b) Remove (i′,j2) from the assignment if ji was previously assigned.
- (c) Update uji 2: =uji 2+(wl−vl)+ε=wl−clj
i +ε. - (d) Update u,i 1: =−(clj
i +uji 2)=−wi−ε.
Reverse Auction Algorithm
-
- (1) Select any unassigned object j, such that cOj+uj 2>0.
- (2) Determine the following quantities:
ij=arg min {cjk+uk 1|kεB(j)}
βj=cijj +uij 1
γj=min {ckj+uk 1|kεB(j), k≠1j}
In the selection of ij, above, if a tie occurs between 0 and any non-zero index k, then select j, as k. Otherwise, if there is a tie between two or more non-zero indices, the choice of ji is arbitrary. Also if B(j) consists of only one element, then set γj ∞.
(3) Update the multipliers and the assignment:
-
- If ij=0, then
- (a) Add (0, j) to the assignment.
- (b) Update uj 2: =−cOj.
- If ij≠0, then
- (a) Add (ij,j) to the assignment.
- (b) Remove (ij,j′) from the assignment if (ij,j) was previously assigned.
- (c) Update ul
j 1: =ulj 1+(γj−βj)+ε=γj−cij+ε. - (d) Update uj 2: =−(cij+ui
j 1)=−γj−ε.
Combined Forward/Reverse Auction Algorithm
1. Assume that u2 is given as an arbitrary multiplier.
2. Adjust the value of u2 for each object j as follows:
If cOj+uj 2<0, then set uj 2: =−cOj.
If cOj+uj 2<0, then set uj 2: =−cOj.
3. Run iterations of the Forward Auction Algorithm until all persons become assigned.
4. Run iterations of the Reverse Auction Algorithm until all of the objects become assigned.
Note at the completion of the Forward auction step we have the following conditions satisfied:
-
- coj+uj 2≧0 for all objects j.
- cij+ui 1+uj 2=0 for all (i,j)εS.
- cij+uj 2≦k min{cik+uk 2} for all (i,j)εS.
Thus we can prove the following proposition.
Proposition: If we assume that coj+uj 2≧0 at the start of the Forward Auction Algorithm and all of the persons are assigned via a forward step, then we have:
cij+ui 1+uj 2≧−ε for all (i,j)εA.
cij+ui 1+uj 2=0 for all (i,j)εS.
cij+uj 2≦k min{cik+uk 2}+ε for all (i,j)εS.
cij+ui 1+uj 2≧−ε for all (i,j)εA.
cij+ui 1+uj 2=0 for all (i,j)εS.
cij+uj 2≦k min{cik+uk 2}+ε for all (i,j)εS.
Optimality of the Algorithm
Theorem: ε-CS preserved during every forward and reverse iteration.
Theorem: If a feasible solution exists, then the resulting solution is with mε of being optimal for the Combined Forward Reverse Algorithm.
Implementation Specifics
Parallelization
Here are but a few comments.
Although the algorithm appears to be serial in nature, its primary computational requirements are almost entirely parallelizable. Thus parallelization is planned.
If a sensitivity analysis is desired or if one is interested in computing several near-optimal solutions, a parallel processor with a few powerful processors and good communication such as on the Intel Paragon would be most beneficial.
The foregoing discussion of the invention has been presented for purposes of illustration and description. Further, the description is not intended to limit the invention to the form disclosed herein. Consequently, variation and modification commensurate with the above teachings, within the skill and knowledge of the relevant art, are within the scope of the present invention. The embodiment described hereinabove is further intended to explain the best mode presently known of practicing the invention and to enable others skilled in the art to utilize the invention as such, or in other embodiments, and with the various modifications required by their particular application or use of the invention. It is intended that the appended claims be construed to include alternative embodiments of the invention to the extent permitted by the prior art.
Claims (3)
1. A method for tracking a plurality of objects, comprising:
repeatedly scanning a region containing a set consisting of one or more moving objects and generating N sequential images or data sets of said region, a plurality of observations in said images or data sets providing positional information for objects in said set;
determining a plurality of tracks, at least one track for each object in said set;
determining a plurality of costs, wherein each cost is for assigning one of said observations to one of said tracks;
defining a linear programming problem:
wherein each ci 1 . . t N is included in said plurality of costs, each Mi, i=1, . . . ,N, being one of: (a) a number of observations in an ith image or data set of said N sequential images or data sets; (b) a sum of a number of tracks in said plurality of tracks, and a number of said observations in the ith image or data set not assigned to one of said tracks; and
(c) a number of tracks in said plurality of tracks;
solving said linear programming problem for values of z i 1 . . . i N for each i1 . . . iN;
determining a value z1 1 . . . i N in {0,1} for each i1 . . . iN corresponding to each zij . . iN, wherein said values zi1 . . . iN provide an optimal or near optimal solution to said linear programming problem;
taking one or more of the following actions based on said optimal or near-optimal assignment of said plurality of points to said plurality of tracks;
sending a warning to aircraft or a ground or sea facility, controlling air traffic,
controlling anti-aircraft or anti-missile equipment, taking evasive action,
working on one of said one or more objects, surveilling one of said one or more objects.
2. A method for tracking a plurality of objects, comprising:
using remote scanning apparatus to repeatedly scan a region containing a set consisting of one or more moving objects and generating N sequential images or data sets of said region, a plurality of observations in said images or data sets providing positional information for objects in said set;
using a computer system to determine a plurality of tracks, at least one track for each object in said set;
using a computer system to determine a plurality of costs, wherein each cost is for assigning one of said observations to one of said tracks;
defining a linear programming problem:
wherein each ci1 . . . iN is included in said plurality of costs, each Mi, i=1, . . . ,N, being one of: (a) a number of observations in an ith image or data set of said N sequential images or data sets; (b) a sum of a number of tracks in said plurality of tracks, and a number of said observations in the ith image or data set not assigned to one of said tracks; and (c) a number of tracks in said plurality of tracks;
using a computer system for solving said linear programming problem for values of zi1 . . . iN for each i1 . . . iN;
using a computer system for determining a value zi1 . . . iN in {0,1} for each i1 . . . iN corresponding to each zi1 . . . iN, wherein said values zi1 . . . iN provide an optimal or near optimal solution to said linear programming problem; and
using a computer system to determine which one or more of the following actions will be taken based on said optimal or near-optimal assignment of said plurality of points to said plurality of tracks;
sending a warning to aircraft or a ground or sea facility,
controlling air traffic,
controlling anti-aircraft or anti-missile equipment,
taking evasive action,
working on one of said one or more objects, and
surveilling one of said one or more objects.
3. The method of claim 2, wherein the remote scanning apparatus for repeatedly scanning a region containing a set consisting of one or more moving objects comprises radar apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/865,469 USRE44807E1 (en) | 1993-12-21 | 2001-05-25 | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/171,327 US5406289A (en) | 1993-05-18 | 1993-12-21 | Method and system for tracking multiple regional objects |
US08/404,024 US5537119A (en) | 1993-12-21 | 1995-03-14 | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
US08/682,904 US5959574A (en) | 1993-12-21 | 1996-07-16 | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
US09/865,469 USRE44807E1 (en) | 1993-12-21 | 2001-05-25 | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/682,904 Reissue US5959574A (en) | 1993-12-21 | 1996-07-16 | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE44807E1 true USRE44807E1 (en) | 2014-03-18 |
Family
ID=50240553
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/865,469 Expired - Lifetime USRE44807E1 (en) | 1993-12-21 | 2001-05-25 | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
Country Status (1)
Country | Link |
---|---|
US (1) | USRE44807E1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130234882A1 (en) * | 2012-03-09 | 2013-09-12 | Raytheon Company | Multiple hypothesis tracking using maximum weight independent set |
US20160161606A1 (en) * | 2014-12-08 | 2016-06-09 | Northrop Grumman Systems Corporation | Variational track management |
US9864787B2 (en) | 2015-01-21 | 2018-01-09 | Raytheon Company | Parallel hypothesis formation for multiple hypotheses tracking |
CN109490890A (en) * | 2018-11-29 | 2019-03-19 | 重庆邮电大学 | A kind of millimetre-wave radar towards intelligent vehicle and monocular camera information fusion method |
CN110411445A (en) * | 2018-04-28 | 2019-11-05 | 中国科学院沈阳自动化研究所 | Covering path method based on soft wing unmanned plane |
US20240036186A1 (en) * | 2022-07-22 | 2024-02-01 | Numerica Corporation | Multi-target detection using convex sparsity prior |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5406289A (en) | 1993-05-18 | 1995-04-11 | International Business Machines Corporation | Method and system for tracking multiple regional objects |
US5537119A (en) | 1993-12-21 | 1996-07-16 | Colorado State University Research Foundation | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
US5959574A (en) | 1993-12-21 | 1999-09-28 | Colorado State University Research Foundation | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
-
2001
- 2001-05-25 US US09/865,469 patent/USRE44807E1/en not_active Expired - Lifetime
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5406289A (en) | 1993-05-18 | 1995-04-11 | International Business Machines Corporation | Method and system for tracking multiple regional objects |
US5537119A (en) | 1993-12-21 | 1996-07-16 | Colorado State University Research Foundation | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
US5959574A (en) | 1993-12-21 | 1999-09-28 | Colorado State University Research Foundation | Method and system for tracking multiple regional objects by multi-dimensional relaxation |
Non-Patent Citations (37)
Title |
---|
A. V. Aho, J.E. Hopcroft, and J.D. Ullman. Design and Analysis of Computer Algorithms. Addison-Wesley, MA, 1974. |
A.B. Poore and N. Rijavec. A lagrangian relaxation algorithm for multidimensional assignment problems arising from multitarget tracking. SIAM Journal of Optimization, 3, No. 3:544-563, 1993. |
A.B. Poore and N. Rijavec. A numerical study of some data association problems arising in multitarget tracking. Large Scale Optimization: State of the Art, pp. 339-361, 1994. |
A.B. Poore and N. Rijavec. Partitioning multiple data sets: multidimentional assignments and lagrangian relaxation. In P.M. Pardalos and H. Wolkowicz, editors, Quadratic Assignment and Related Problems: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 16, pp. 25-37, 1994. |
A.B. Poore and O.E. Drummo Track initiation and maintenance using multidimensional assignment problems. In D.W. Hearn, W.W. Hager, and P.M. Pardalos, editors, Network Optimization, vol. 450, pp. 407-422, Boston, 1996. Kluwer Academic Publishers B.V. |
A.B. Poore. Multidimensional assignment formulation of data association problems arising from multitarget tracking and multisensor data fusion. Computational Optimization and Applications, 3:27-57, 1994. |
A.B. Poore. Multidimensional assignments and multitarget tracking: Partitioning data sets. In P. Hansen, I.J. Cox, and B. Julesz, editors, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 19, pp. 169-198, Providence, R.I., 1995. American Mathematical Society. |
A.J. Robertson III. A class of lagrangian relaxation algorithms for the multidimensional assignment problem. Ph.D. Thesis, Colorado State University, Ft. Collins, CO, 1995. |
A.M. Frieze and J. Yadegar. An algorithm for solving 3-dimensional assignment problems with application to scheduling a teaching practice. Journal of the Operational Research Society, 32:989-995, 1981. |
B.T. Poljak. Subgradient method: A survey of Soviet research. In C. Lemarèchal and R. Mifflin, editors, Nonsmooth Optimization, pp. 5-29, N.Y., 1978. Pergamon Press. |
C. Lemarèchal and R. Mifflin. Nonsmooth Optimization. Pergamon Press, Oxford, UK, 1978. |
C.H. Papadimitriou and K.Steiglitz. Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall, Inc., Englewood Cliffs, NJ, 1982. |
C.R. Reeves ed. Modern Heuristic Techniques for Combinatorial Problems. Halstead Press, Wiley, New York, NY, 1993. |
D. P. Bertsekas and D.A. Castañon. A forward/reverse auction algorithm for asymmetric assignment problems. Computational Optimization and Applications, 1: 277-298, 1992). |
G.L. Nemhauser and L.A. Wolsey. Integer and Combinatorial Optimization. Wiley, New York, NY, 1988. |
H. Schramm and J. Zowe. A version of the bundle idea for minimizing a nonsmooth function: Conceptual idea, convergence analysis, numerical results. SIAM Journal on Optimization, 2, No. 1:121-152, Feb. 1992. |
J. L. Goffin. On convergence rates of subgradient optimization methods, mathematical programming. Mathematical Programming, 13:329-347, 1977. |
J. Pearl. Heuristics: Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley, Reading, MA, 1984. |
J.-B. Hiriart-Urruty and C. Lemarèchal. Coonvex Andlysis and Minimization Algorithms I&II. Springer-Verlag, Berlin, 1993. |
K.C. Kiwiel. An aggregate subgradient method for non-smooth convex minimization. Mathematical Programming, 27:320-341, 1983. |
K.C. Kiwiel. Methods of descent for nondifferentiable optimization. In A. Dold and B. Eckmann, editors, Lecture Notes in Mathematics, vol. 1133, Berlin, 1985. Springer-Verlag. |
K.R. Pattipati, S. Deb, and Y. Bar-Shalom. A multisensor-multitarget data association algorithm for heterogeneous sensors. In Proceedings of the IEEE Transaction on Aerospace and Electronic Systems, vol. 29, No. 2, pp. 560-568, Apr. 1993. |
K.R. Pattipati, S. Deb, and Y. Bar-Shalom. A multisensor—multitarget data association algorithm for heterogeneous sensors. In Proceedings of the IEEE Transaction on Aerospace and Electronic Systems, vol. 29, No. 2, pp. 560-568, Apr. 1993. |
K.R. Pattipati, S. Deb, and Y. Bar-Shalom. A s-dimensional assignment algorithm for track initiation. In Proceedings of the IEEE Systems Conference, Kobe, Japan, pp. 127-130, 1992. |
M.R. Garey and D.S. Johnson. Computers and Inrtactability. W.H. Freeman and Company, San Francisco, CA, 1979. |
N. Z. Shor. Minimization Methods for Non-Differentiable Functions. Springer-Verlag, New York, 1985. |
O.E. Drummond. Feedback in track fusion without process noise. In Signal and Data processing of Small Targets, SPIE Proceddings, vol. 2561, pp. 369-383, 1995. |
O.E. Drummond. Multiple sensor tracking with multiple frame, probabilistic data association. In Signal and Data Processing of Small Targets, SPIE Proceddings, vol. 2561, pp. 322-336, 1995. |
O.E. Drummond. Multiple target tracking with multiple frame, probabilistic data association. In Signal and Data Processing of Small Targets, SPIE Proceddings, vol. 1954, pp. 394-408, 1993. |
P. Wolfe. A method of conjugate subgradients for minimizing nondifferentiable functions. Mathematical Programming Study, 3:145-173, 1975. |
P. Wolfe. Finding the nearest point in a polytope. Mathematical Programming Study, 11:128-149, 1976. |
S.S. Blackman. Multiple Target Tracking with Radar Applications. Artech House, Dedham, MA, 1986. |
T. Kurien. Issues in the designing of practical multitarget tracking algorithms. In Multitarget-Multisensor Tracking: Advances Applications by Y. Bar-Shalom. Artech House, MA, 1990. |
W. Pierskalla. The tri-substitution method for the three-dimensional assignment problem. Journal du CORS, 5:71-81, 1967. |
Y. Bar-Shalom and T.E. Fortmann. Tracking and Data Association. Academic Press, Boston, MA, 1988. |
Y. Bar-Shalom, S. Deb, K.R. Pattipati, and H. Tsanakis. A new algorithm for the generalized multidimensional assignment problem. In Proceedings of the IEEE International Conference in Systems, Math, and Cybernetics, Chicago, pp. 132-136, 1992. |
Y. Bar-Shalom. Multitarget-Multisensor Tracking: Advanced Applications. Artech House, Dedham, MA, 1990. |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130234882A1 (en) * | 2012-03-09 | 2013-09-12 | Raytheon Company | Multiple hypothesis tracking using maximum weight independent set |
US9291708B2 (en) * | 2012-03-09 | 2016-03-22 | Raytheon Company | Multiple hypothesis tracking using maximum weight independent set |
US20160161606A1 (en) * | 2014-12-08 | 2016-06-09 | Northrop Grumman Systems Corporation | Variational track management |
US10310068B2 (en) * | 2014-12-08 | 2019-06-04 | Northrop Grumman Systems Corporation | Variational track management |
US10782396B2 (en) | 2014-12-08 | 2020-09-22 | Northrop Grumman Systems Corporation | Variational track management |
US9864787B2 (en) | 2015-01-21 | 2018-01-09 | Raytheon Company | Parallel hypothesis formation for multiple hypotheses tracking |
CN110411445A (en) * | 2018-04-28 | 2019-11-05 | 中国科学院沈阳自动化研究所 | Covering path method based on soft wing unmanned plane |
CN110411445B (en) * | 2018-04-28 | 2023-07-07 | 中国科学院沈阳自动化研究所 | Traversal planning method based on soft-wing unmanned aerial vehicle |
CN109490890A (en) * | 2018-11-29 | 2019-03-19 | 重庆邮电大学 | A kind of millimetre-wave radar towards intelligent vehicle and monocular camera information fusion method |
CN109490890B (en) * | 2018-11-29 | 2023-06-02 | 重庆邮电大学 | Intelligent vehicle-oriented millimeter wave radar and monocular camera information fusion method |
US20240036186A1 (en) * | 2022-07-22 | 2024-02-01 | Numerica Corporation | Multi-target detection using convex sparsity prior |
US12013456B2 (en) * | 2022-07-22 | 2024-06-18 | Numerica Corporation | Multi-target detection using convex sparsity prior |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6404380B2 (en) | Method and system for tracking multiple regional objects by multi-dimensional relaxation | |
US5537119A (en) | Method and system for tracking multiple regional objects by multi-dimensional relaxation | |
US5406289A (en) | Method and system for tracking multiple regional objects | |
Kreucher et al. | Sensor management using an active sensing approach | |
Kirubarajan et al. | Ground target tracking with variable structure IMM estimator | |
Poore et al. | A Lagrangian relaxation algorithm for multidimensional assignment problems arising from multitarget tracking | |
Deb et al. | A generalized SD assignment algorithm for multisensor-multitarget state estimation | |
US6704692B1 (en) | Method and system for tracking multiple objects | |
Chummun et al. | Fast data association using multidimensional assignment with clustering | |
US6055523A (en) | Method and apparatus for multi-sensor, multi-target tracking using a genetic algorithm | |
Uhlmann | Introduction to the algorithmics of data association in multiple-target tracking | |
Poore et al. | Data association using multiple-frame assignments | |
Trémois et al. | Optimal observer trajectory in bearings-only tracking for manoeuvring sources | |
Chong | Graph approaches for data association | |
Qiu et al. | A survey of motion-based multitarget tracking methods | |
Shams | Neural network optimization for multi-target multi-sensor passive tracking | |
USRE44807E1 (en) | Method and system for tracking multiple regional objects by multi-dimensional relaxation | |
Teng et al. | Stealth terrain navigation | |
Drummond | Target tracking with retrodicted discrete probabilities | |
Leung et al. | Evaluating set measurement likelihoods in random-finite-set slam | |
Lau et al. | Multidimensional assignment by dual decomposition | |
Hillis | Using a genetic algorithm for multi-hypothesis tracking | |
Poore et al. | Data association problems posed as multidimensional assignment problems: algorithm development | |
Poore et al. | Track initiation and maintenance using multidimensional assignment problems | |
Gish et al. | Target state estimation in a multitarget environment using multiple sensors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: COLORADO STATE UNIVERSITY RESEARCH FOUNDATION, COL Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:POORE, AUBREY B., JR.;REEL/FRAME:031141/0066 Effective date: 19950310 |