arXiv:1106.0708v1 [math.OC] 3 Jun 2011 Optimal Sensor Configurations for Rectangular Target Dectection Franc ̧ois-Alex Bourque and Bao U. Nguyen Abstract — Optimal search strategies where targets are ob- served at several different angles are found. Targets are assumed to exhibit rectangular symmetry and have a uniformly- distributed orientation. By rectangular symmetry, it is meant that one side of a target is the mirror image of its opposite side. Finding an optimal solution is generally a hard problem. Fortunately, symmetry principles allow analytical and intuitive solutions to be found. One such optimal search strategy consists of choosing n angles evenly separated on the half-circle and leads to a lower bound of the probability of not detecting targets. As no prior knowledge of the target orientation is required, such search strategies are also robust, a desirable feature in search and detection missions. I. INTRODUCTION In mine hunting operations it is known that the detection performance improves when a target is observed many times at different aspect angles [1]–[6]. Similarly, classification algorithms [7]–[9] and sensor-arrays deployed for target localization and tracking [10]–[13] benefit from multi-aspect observations. This fact is, however, often overlooked. For example, the formula for the probability of detecting a target in a random search derived by Koopman is widely used yet it assumes no angular dependence [14]. In this paper, search strategies that minimize the overall probability of not detecting a target observed at several different angles are identified. Finding an optimal angular configuration is a priori intractable as it is multi-dimensional in the sense that each observation is independent of one another and hence each observation angle must be considered as a separate dimension. What is more, the explicit expres- sion for the overall probability of detection can be hopelessly complicated even when the probability of detection for a single observation is simple and the number of observations is small. The novelty of our approach lies in the fact that this normally intractable problem is solved using an elegant symmetry argument. Specifically, targets are assumed to exhibit rectangular symmetry. That is, the left-hand side of a target is the mirror image of its right-hand side, and its rear end is the mirror image of its front end. Many targets can be approximated with this class of symmetry including canoes, ships, submarines, mines and human bodies. Optimal angles are then shown to be evenly distributed on multiples of the half-circle as in Ref. [13]. However, this constitutes a departure from the current literature on sensor F-.A. Bourque and B. U. Nguyen are scientists with Defence Research and Development Canada Centre for Operational Research and Analysis, National Defence Headquarters, 101 Colonel By drive, Ottawa, Canada. Email enquiries should be sent to alex.bourque@drdc-rddc.gc.ca. x Fig. 1. Rectangular target observed at angle x . geometry [10]–[13] as our result is derived for finite-extent targets rather than for point targets. The simplicity of the solution implies that no complicated calculations are required prior to a search as long as the target has the assumed approximate symmetry. This fact should improve the task of planning the path of mobile sensors, such as unmanned vehicles, to search for fixed targets, as well as of deploying a fixed sensor array to monitor traffic through choke points. Assumptions and the minimization problem are stated in Section II, while Section III presents a set of search strategies that minimizes the probability of no detection. Section IV provides a lower bound of not detecting targets achievable with these strategies, which is illustrated with a specific example in Section V. Conclusions including future work are discussed in Section VI. Supplementary lemmata used in Sections III and IV are found in the Appendix. II. PROBLEM STATEMENT The dependence of detection process on angle occurs often in search and detection operations. In general, the effectiveness of such an operation also depends on the distance between the sensor and the target. However, here, the probability of detection is assumed constant as a function of range and, hence, the focus is only on the angular dependence. For more details on the range dependence, refer to Ref. [6]. 1 1 Note that the probability of detection as a function of range is primarily a characteristic of the sensor, while the probability of detection as a function of angle is primarily a characteristic of the target. x x x +  Fig. 2. Symmetries of the target: Reflection through the short axis of the target (dashed line) and reflection through the center of the target (dot- dashed line). As shown in Fig. 1, the problem is modeled on a two- dimensional plan and the observation angle, x , is defined as the counter-clockwise angle measured in radian between the sensor beam and the short axis of a rectangular (positive horizontal axis) target. An observation angle of zero degree corresponds to the observation of the long side of the target, while an observation angle of π/ 2 degrees corresponds to the observation of the short side of the target. Targets considered will have approximate rectangular symmetries as shown in Fig. 2. That is, they possess a reflection axis through their short axis (left-right mirror symmetry) and a point reflection through their center. 2 In what follows, the probability of no detection rather than the probability of detection is considered; one being the complement of the other. Define the single probability of no detection as the probability of not detecting the target at angle x and denote this single-value real function as g ( x ) . Note that the single probability of no detection is even due to the reflection symmetry through the short axis of the target and periodic due to the reflection through the center of the target. Specifically, g ( x ) = g ( − x ) , g ( x ) = g ( x + π ) . Next, define the multiple probability of no detection as the probability of not detecting a target after n observations. Let x be the orientation of the target. Let u i be the i - th angle at which the target is observed relative to x and ~ μ = ( μ 0 , . . . , μ n − 1 ) be the vector of the n relative ob- servation angles. Assume the multiple observation detection process is a Bernoulli process, i.e., all observations are independent. Then, the multi-observation probability of no detection is modeled as the product of single probabilities 2 Note that the composition of a reflection through the short axis followed by a reflection through the center of the target is equivalent to a reflection through the long axis of the target (forward/backward mirror symmetry). of no detection. In general, however, the exact value of x , i.e., the orientation of the target is unknown. To circumvent this problem, assume that the target’s orientation is uniformly distributed and evaluate the average multiple probability of no detection by G ( ~ μ ) . Then, G ( ~ μ ) = 1 π ∫ π 2 − π 2 dx n − 1 ∏ i =0 g ( x + μ i ) . (1) Therefore, the problem amounts to finding search strate- gies that minimize G ( ~ μ ) . For simplicity, the probability of no detection is taken to mean the average multiple probability of no detection in what follows. III. A SET OF OPTIMAL SEARCH STRATEGIES In this section, a condition ensuring that all partial deriva- tives of the probability of no detection are equal to zero is derived. From this condition, a set of optimal search strategies is then identified and the probability of no detection is recast into a form used in the subsequent section. Let us first introduce some useful notation and definitions. Let i ∈ { 0 , . . . , n − 1 } , N i = { 0 , . . . , n − 1 } \{ i } and j ∈ N i . Define ∂ i = ∂/∂ i . Denote ~ μ ∗ as an optimal point of G ( ~ μ ) . Let a be an integer and b be a positive integer. Define the modulo operation as a mod b = a − ⌊ a b ⌋ b. Let m be a non-negative integer and μ = π/n . Define ̃ G ( m, n ) = 1 π ∫ π 2 − π 2 dx n − 1 ∏ i =0 g ( x + miμ ) . Then the following holds. Lemma 3.1: The partial derivative can be written as ∂ i G ( ~ μ ) = 1 2 π ∫ π 2 − π 2 dx g ′ ( x ) { ∏ j ∈ N i g ( x + μ j − μ i ) − ∏ j ∈ N i g ( x − μ j + μ i ) } . Proof: Apply the partial derivative to the expression for G ( ~ μ ) given by (1). Then ∂ i G ( ~ μ ) = 1 π ∫ π 2 − π 2 dx g ′ ( x + μ j ) ∏ j ∈ N i g ( x + μ j ) . Let x → x − μ i and note that Lemma A.1 applies and dictates that the integral is invariant under this change of variable. Thus, ∂ i G ( ~ μ ) = 1 π ∫ π 2 − π 2 dx g ′ ( x ) ∏ j ∈ N i g ( x + μ j − μ i ) . (2) Because g ( x ) is even, ∂ i G ( ~ μ ) = 1 π ∫ π 2 − π 2 dx g ′ ( x ) ∏ j ∈ N i g ( − x − μ j + μ i ) . Let x → − x and remark that g ′ ( x ) is odd. Then ∂ i G ( ~ μ ) = − 1 π ∫ π 2 − π 2 dx g ′ ( x ) ∏ j ∈ N i g ( x − μ j + μ i ) . (3) And the result follows from the average of (2) and (3). A condition for optimizing G ( ~ μ ) is thus for the integrands of all partial derivatives to be equal to zero. The next Lemma identifies a set of search strategies for which this condition holds, i.e., optimizes the probably of no detection. Lemma 3.2: Define ( m, n ) to be the search strategy such that the separation between two consecutive observations is a constant and equal to mπ/n with m a positive integer. Then the search strategy ( m, n ) is an optimum of G ( ~ μ ) and defines a subset of all possible optimal search strategies. Proof: Evaluate the product in (2) at point ~ μ ∗ giving ∏ j ∈ N i g ( x + μ ∗ j − μ ∗ i ) . Assume that ( m, n ) is an optimal search strategy. Then, the definition of the strategy ( m, n ) implies that μ ∗ j − μ ∗ i = m [ − (2 i − j ) + i ] μ. From definition of the modulo note that 2 i − j = ⌊ 2 i − j n ⌋ n + (2 i − j ) mod n. Define σ i ( j ) = (2 i − j ) mod n and recall that g ( x ) is periodical. Then, g ( x + μ ∗ j − μ ∗ i ) = g ( x − mσ i ( j ) μ + miμ ) . Lemma A.2 implies that the map σ i ( j ) is a bijection from the set of j to itself. Therefore, ∏ j ∈ N i g ( x + μ ∗ j − μ ∗ i ) = ∏ j ∈ N i g ( x − mσ i ( j ) μ + miμ ) = ∏ j ∈ N i g ( x − mjμ + miμ ) = ∏ j ∈ N i g ( x − μ ∗ j + μ ∗ i ) . And Lemma 3.1 then entails that ∂ i G ( ~ μ ∗ ) = 0 for all i . For an optimal search strategy ( m, n ) , it will be useful in what follows to cast the integral in the following form. Lemma 3.3: Let the search strategy be ( m, n ) . Then the probability of no detection is equal to ̃ G ( m, n ) . Proof: First, remark that only the difference between two consecutive observations is specified in Lemma 3.2. Thus, liberty exists in the choice of the absolute reference angle. Without loss of generality, take μ ∗ 0 to be this absolute reference angle. Then, μ ∗ i = μ ∗ 0 + miμ. Substituting this expression into (1) yields G ( ~ μ ∗ ) = 1 π ∫ π 2 − π 2 dx n − 1 ∏ i =0 g ( x + μ ∗ 0 + miμ ) . Next, let x → x − μ ∗ 0 . Then Lemma A.1 entails that the domain of integration is invariant under such a shift of the integration variable. IV. A LOWER BOUND OF THE PROBABILITY OF NO DETECTION In the previous section, a set of optimal search strategies was identified, the ( m, n ) search strategies. In this section, a lower bound of the probability of no detection achievable with these strategies is proven. Let us first introduce some useful notation and definitions. Let gcd ( · , · ) be the greatest common divider. Let r , q and p be strictly positive integers such that m = pq , n = pr and p = gcd( m, n ) . Let i ∈ { 0 , . . . , n − 1 } , j ∈ { 0 , . . . , r − 1 } and k ∈ { 1 , . . . , p } . Define h ( x ) = g ( x ) g ( x + mμ ) . . . g ( x + ( r − 1) mμ ) . Lemma 4.1: The following identities hold: p ∏ k =1 h ( x + ( k − 1) μ ) = n − 1 ∏ i =0 g ( x + iμ ) , (4) n − 1 ∏ i =0 g ( x + miμ ) = h ( x ) p . (5) Proof: Consider the first identity. Using the definition of h ( x ) , write the left-hand side of (4) as p ∏ k =1 r − 1 ∏ j =0 g ( x + mjμ + ( k − 1) μ ) . The definitions of m and n and of the modulo operation imply that mj = n ⌊ qj r ⌋ + p ( qj mod r ) . Using this expression for mj and the periodicity of g ( x ) , the right-hand side further becomes equal to p ∏ k =1 r − 1 ∏ j =0 g ( x + p ( qj mod r ) μ + ( k − 1) μ ) . Next, from Lemma A.3, the map σ ( j ) = qj mod r is known to be a bijection from the set of j to itself. Therefore, the product can also be written as p ∏ k =1 r − 1 ∏ j =0 g ( x + pjμ + ( k − 1) μ ) . Finally, from Lemma A.4, the set of ( j, k ) pairs can be mapped to the set of i using the bijection σ ( k − 1 , j ) = ( k − 1) + pj . Therefore, p ∏ k =1 r − 1 ∏ j =0 g ( x + pjμ + ( k − 1) μ ) = n − 1 ∏ i =0 g ( x + iμ ) . Now, consider the second identity. From Lemma A.4, the set of i can be mapped to the set of ( j, k ) pairs using the bijection σ ( j, k − 1) = j + r ( k − 1) . Therefore, the left-hand side of (5) becomes p ∏ k =1 r − 1 ∏ j =0 g ( x + mjμ + m ( k − 1) rμ ) . Next, note that the definitions of m and n imply mr = nq and that the definition of μ implies nμ = π , from which follows that m ( k − 1) rμ = ( k − 1) qπ . This equality and the periodicity of g ( x ) , then imply that g ( x + mjμ + m ( k − 1) rμ ) = g ( x + mjμ ) . Finally, from the definition of h ( x ) , p ∏ k =1 r − 1 ∏ j =0 g ( x + mjμ ) = p ∏ k =1 h ( x ) = h ( x ) p . Theorem 4.2 (Lower Bound Estimate): For any ( m, n ) search strategies, ̃ G ( m, n ) ≥ ̃ G (1 , n ) . Proof: Consider a given ( m, n ) pair. Then, Lemma 4.1 allows to write ̃ G (1 , n ) = 1 π ∫ π 2 − π 2 dx p ∏ k =1 h ( x + ( k − 1) μ ) , ̃ G ( m, n ) = 1 π ∫ π 2 − π 2 dx h ( x ) p . Next, let that l ∈ { 0 , . . . , p − 1 } and define λ l ( x ) = p − l ∏ k =1 h ( x + ( k − 1) μ ) . Assume that ∫ π 2 − π 2 dx λ l ( x ) h ( x ) l ≤ ∫ π 2 − π 2 dx λ l +1 ( x ) h ( x ) l +1 . Then ̃ G (1 , n ) = 1 π ∫ π 2 − π 2 dx λ 0 ( x ) ≤ 1 π ∫ π 2 − π 2 dx λ 1 ( x ) h ( x ) ≤ . . . ≤ 1 π ∫ π 2 − π 2 dx λ l ( x ) h ( x ) l ≤ . . . ≤ 1 π ∫ π 2 − π 2 dx λ p − 1 ( x ) h ( x ) p − 1 = 1 π ∫ π 2 − π 2 dx h ( x ) p = ̃ G ( m, n ) . To show that the assumption holds true, proceed by generating a partially ordered set. Let δ l = ( p − l − 1) μ and note that λ l ( x ) = λ l +1 ( x ) h ( x + δ ) . Then, the first element of the partially ordered set is ∫ π 2 − π 2 dx λ l +1 ( x ) h ( x + δ ) h ( x ) l . And the last element is ∫ π 2 − π 2 dx λ l +1 ( x ) h ( x ) l +1 . For greater clarity, the indice of λ l +1 ( x ) and δ l are suppressed in what follows. Next, apply recursively t times h ( x ) a h ( x + δ ) b ≤ 1 2 h ( x ) a − b [ h ( x ) 2 a + h ( x + δ ) 2 a ] from the first element. After summing the resulting geometric series, the element generated is ∫ π 2 − π 2 dx λ ( x ) { [ 1 − ( 1 2 ) t ] h ( x ) l +1 + ( 1 2 ) t h ( x ) l +1 − 2 t h ( x + δ ) 2 l } . Remark however that beyond a recursion step defined such that 2 t +1 > l + 1 ≥ 2 t , the power of h ( x ) becomes negative in the second term. This is problematic because the last element of the partially ordered set has only positive powers of h ( x ) . To circumvent this problem, let x → x − δ in the the second term of the element. Since the domain of integration remains unchanged (Lemma A.1), h ( x ) is even (Lemma A.5), and λ ( x ) = λ ( x − δ ) (Corollary A.6), then the second term is also equal to ∫ π 2 − π 2 dx λ ( − x ) h ( − x ) l +1 − 2 t h ( − x + δ ) 2 l Finally, letting x → − x , the t -element becomes ∫ π 2 − π 2 dx λ ( x ) { [ 1 − ( 1 2 ) t ] h ( x ) l +1 + ( 1 2 ) t h ( x + δ ) l +1 − 2 t h ( x ) 2 l } And the power of h ( x ) is now greater than or equal to that of h ( x + δ ) in the second term allowing again the recursive application of the inequality. The algorithm thus loops through successive recursion steps and changes of variable. Note that for l + 1 = 2 t , the last element is generated after the first iteration. Lemma A.7 states that this is the only case for which the algorithm terminates in a finite number of iterations. For all other cases, the last element arises by letting the number of iterations go to infinity. V. AN ANALYTICAL EXAMPLE In the previous section, a lower bound of the probability of no detection was found for an arbitrary g ( x ) . In this section, the probability of no detection is evaluated and the inequality of Theorem 4.2 is explicitly verified when g ( x ) = sin ( x ) 2 Lemma 5.1: Let g ( x ) = sin ( x ) 2 . Then ̃ G ( m, n ) = 2 p (2 p − 1)!! 4 n p ! . (6) Proof: Recall that ̃ G ( m, n ) = 1 π ∫ π 2 − π 2 dx p ∏ k =1 r − 1 ∏ j =0 g ( x + jmμ ) . Then Lemma A.8 implies that ̃ G ( m, n ) = 1 π ∫ π 2 − π 2 dx p ∏ k =1 r − 1 ∏ j =0 g ( x + jπ r ) . Let g ( x ) = sin ( x ) 2 and use the identity [15]: sin ( rx ) = 2 r − 1 r − 1 ∏ j =0 sin ( x + jπ r ) . Then, ̃ G ( m, n ) = 1 π ∫ π 2 − π 2 dx p ∏ k =1 1 4 r − 1 sin ( rx ) 2 = 1 π ∫ π 2 − π 2 dx 1 4 p ( r − 1) sin ( rx ) 2 p Finally, carrying out the integral [16] and recalling that n = pr , ̃ G ( m, n ) = 1 4 n − p (2 p − 1)!! 2 p !! . Since 2 p !! = 2 p p ! , (6) follows. Corollary 5.2: For p = gcd (1 , n ) = 1 , ̃ G (1 , n ) = 2 4 n . And Theorem 4.2 follows since (2 p − 1)!! = 1 × 3 × · · · × (2 p − 1) ≥ 1 × 2 × · · · × p = p ! . VI. CONCLUSIONS AND FUTURE WORK In this paper, the angular dependence of the detection process which is often overlooked for search and detection mission is explicitly accounted for by assuming that the tar- get possesses rectangular symmetry. One major consequence of this approximate symmetry is that the long side of a target is endowed with the largest cross section, which results in the highest probability of detection given that the target is observed only once. However, since the orientation of the target is in general unknown, there is likelihood that it will be imaged on the short side, i.e., the smallest cross-section. Therefore, the probability of not detecting the target may not be zero even if the search area is entirely covered. Making several observations of the target in order to increase the change of observing its long side is one way to address this problem. Assuming that the observations are independent, an opti- mal search strategy is then to observe the target such that the separation between two consecutive observations is a constant and equal to a multiple of 180 degrees divided by the number of observations. The resulting tactic is simple, intuitive and robust (as no prior knowledge of the target orientation is required). For example, two observations sep- arated by 90 degrees or three observations separated by 60 degrees will minimize the probability of no detection. Having shown that one of these search strategies leads to a lower bound of the probability of no detection, work is currently underway to prove that it is also a globally minimal search strategy. Another logical extension of this work is to relax the assumption that information provided by subsequent observations is uncorrelated (i.e., follows a Bernoulli process) as it entails that the probability of not detecting a target decreases with increasing number of observations even if the observations are co-linear. This is questionable as no additional information is gained. VII. ACKNOWLEDGMENTS One of the authors (A. Bourque) would like to acknowl- edge A. Percival from Defence R&D Canada - Atlantic for bringing to his attention the issue of correlation effects in the detection process. A PPENDIX S UPPLEMENTARY L EMMATA Lemma A.1 (Rotational Invariance): Let ω ∈ R and h ( x ) = h ( x + π ) . Then ∫ π 2 − π 2 dx h ( x − ω ) = ∫ π 2 − π 2 dx h ( x ) . Proof: Let x → x + ω on the RHS and break the integration interval of the resulting integral into [ − π 2 − ω, − π 2 [ and [ − π 2 , π 2 − ω ] . Then let x → x − π in the integral over the first interval and recall that by assumption h ( x ) is periodic. Lemma A.2: Let i ∈ { 0 , . . . , n − 1 } , N i = { 0 , . . . , n − 1 } \{ i } and j ∈ N i . Then σ i ( j ) = (2 i − j ) mod n is a bijection from N i to itself and its own inverse. Proof: Composition gives σ i ( σ i ( j )) = (2 i − (2 i − j ) mod n ) mod n. Use the definition of the modulo twice to give σ i ( σ i ( j )) = j + ⌊ (2 i − j ) n ⌋ n −     j + ⌊ (2 i − j ) n ⌋ n n     n. Recall that j ∈ N i and note that j n < n . Then ⌊ j n + ⌊ (2 i − j ) n ⌋ n ⌋ = ⌊ (2 i − j ) n ⌋ n and σ i ( σ i ( j )) = j . Lemma A.3: Let r , q be positive integers such that gcd ( r, q ) = 1 , i.e., r and q are co-primes. Let i ∈ { 0 , . . . , r − 1 } . Then the map σ ( i ) = qi mod r is a bijection of the set of i to itself. Proof: Proceed with a proof by contradiction. Assume this map is not a bijection. Then there exists a pair u, v ∈ { 0 , . . . , r − 1 } such that u 6 = v and qu mod r = qv mod r . Next, assume that u > v then q ( u − v ) mod r = qw mod r = 0 where w = u − v . This implies that qw = ry with y a positive integer, as w, q > 0 . Because q and r are co-primes, i.e., gcd ( r, q ) = 1 then w = rz with z > 0 , which leads to a contraction as w = u − v < r − 1 . Lemma A.4: Let u ∈ { 0 , . . . a − 1 } , v ∈ { 0 , . . . , b − 1 } , and w ∈ { 0 , . . . , n − 1 } where n = ab . Then σ ( u, v ) = u + av and σ − 1 ( w ) = ( w mod a, ⌊ w a ⌋) are bijections. Proof: Composition gives σ ( σ − 1 ( w ) ) = w mod a + a ⌊ w a ⌋ = w, where the last equality follows from the definition of the modulo operation. Similarly, σ − 1 ( σ ( u, v )) = [ ( u + av ) mod a, ⌊ u + av a ⌋] = ( u, v ) , where the last equality follows from the definition of the modulo operation and since u < a . Therefore, σ ( u, v ) and σ − 1 ( w ) are both one-to-one, onto, and inverse of each other. Lemma A.5: h ( x ) = h ( − x ) . Proof: Because of the periodicity of g ( x ) and nq = mr , g ( x + mjμ ) = g ( x + m ( j − r ) μ ) . Let j → − j + r . Then h ( x ) = g ( x ) . . . g ( x − ( r − 1) jμ ) and the proof follows since by definition g ( x ) is even. Corollary A.6: Consider λ l ( x ) and δ l = ( p − k − 1) μ . Then λ l ( x − δ l ) = h ( x − ( p − l − 1) μ ) . . . h ( x ) and λ l ( x − δ l ) = λ l ( − x ) since h ( x ) is even by Lemma A.5. Lemma A.7: Let i and c be positive integers. Let { t i } be the set of non-negative integers such that 2 t i +1 > c ≥ 2 t i . And let { u i } be the set of non-negative integer such that u i = c − 2 t i u i − 1 and u 0 = 1 . Then, a fix point exists if and only if c = 2 l 1 . Proof: After i iterations, u i = c − 2 t i u i − 1 = c − 2 t i ( c − 2 t i − 1 u i − 2 ) = ( c − 2 t i ( . . . ( c − 2 1 ) . . . )) = c [ 1 − 2 t i ( . . . ( 1 − 2 t 2 ) . . . )] + ( − 1) i 2 t i + ··· + t 1 . Then u i = 0 implies that the prime factorization of ( k + 1) must be 2 a where a is a non-negative integer. Because 2 t 1 +1 > ( l + 1) = 2 a ≥ 2 t 1 , then a = t 1 and u i = 0 for i > 0 . Lemma A.8: r − 1 ∏ j =0 g ( x + mjπ n ) = r − 1 ∏ j =0 g ( x + jπ r ) . Proof: Recall that r , q and p are positive integers such that m = pq , n = pr , and p = gcd( m, n ) . Then g ( x + mjπ n ) = g ( x + qjπ r ) . Use the periodicity of g ( x ) and the definition of the modulo to further write the right-hand side of the equality as g ( x + qjπ r − ⌊ qj r ⌋ π ) = g ( x + ( qj mod r ) π r ) . Lemma A.3 implies that map σ ( j ) = qj mod r is a bijection from the set of j to itself. R EFERENCES [1] B. Zerr, E. Bovio, and B. Stage, “Automatic mine classification approach based on auv manoeuvrability and cots side scan sonar,” in Proc. of the Autonomous Underwater Vehicle and Ocean Mod- elling Networks: GOAT2 2000 Conference , NATO Saclant Undersea Research Centre, La Spezia, Italy, Aug. 2001, pp. 315–322. [2] B. Nguyen and D. Hopkin, “Modeling autonomous underwater vehicle (auv) operations in mine hunting,” in Proc. of Oceans 2005-Europe Conference , Brest, France, Oct. 2005, pp. 533–538. [3] ——, “Concepts of operations for the side scan sonar autonomous underwater vehicles developed at DRDC Atlantic,” Defence Research and Development Canada, Dartmouth, Canada, Tech. Rep. DRDC Atlantic TM 2005-213, Oct. 2005. [4] B. Nguyen, D. Hopkin, and H. Yip, “Autonomous underwater vehicles: A transformation of mine counter-measure operations,” Defense & Security Analysis , vol. 24, no. 3, pp. 247–266, 2008. [5] J. A. Fawcett, A. Crawford, D. Hopkin, V. Myers, M. Couillard, and B. Zerr, “Multi-aspect computer-aided classification of the citadel trial side-scan sonar images,” Defence Research and Development Canada, Dartmouth, Canada, Tech. Rep. DRDC Atlantic TM 2008-029, May 2008. [6] B. U. Nguyen, D. Hopkin, and H. Yip, “Autonomous underwater vehicles conducting mine counter measur exploratory operations,” Defence Research and Development Canada, Ottawa, Canada, Tech. Rep. DRDC CORA TM 2008-42, Oct. 2008. [7] P. Runkle, P. K. Bharadwa, L. Couchman, , and L. Carin, “Hidden markov models for multiaspect target classification,” IEEE Transac- tions on Signal Processing , vol. 47, no. 7, pp. 2035–2040, 1999. [8] M. Robinson, M. R. Azimi-Sadjadi, and J. Salazar, “Multi-aspect tar- get discrimination using hidden markov models and neural networks,” IEEE Transactions on Neural Networks , vol. 16, no. 2, pp. 447–459, 2005. [9] J. Shihao and L. M. Xuejun, “Adaptive multiaspect target classification and detection with hidden markov models,” IEEE Sensors Journal , vol. 5, no. 5, pp. 1035–1042, 2005. [10] S. Mart ́ ınez and F. J. Bullo, “Optimal sensor placement and motion coordination for target tracking,” Automatica , vol. 42, no. 4, pp. 661– 668, 2005. [11] J. N. Ash and R. L. Moses, “On optimal anchor node placement in sensor localization by optimization of subspace principal angles,” in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing , Las Vegas, USA, Mar. 2008, pp. 2289–2292. [12] A. N. Bishop and P. Jemsfelt, “An optimality analysis of sensor-target geometries for signal strength based lozalization,” in Proc. of the 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP’09) , Melbourne, Australia, Dec. 2009, pp. 127–132. [13] A. N. Bishop, B. Fidan, B. D. O. Anderson, K. D. anc ̧ay, and P. N. Pathirana, “Optimality analysis of sensor-target localization geometries,” Automatica , vol. 46, no. 3, pp. 479–492, 2010. [14] B. O. Koopman, “Law of random search,” in Search and Screening . New York, USA: Pergamon Press, 1980, pp. 71–74. [15] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products , 4th ed. San Diego: Academic Press, 1979, p. 33. [16] D. Zwillinger, Standard Mathematical Tables and Formulae , 30th ed. Boca: CRC Press, 1979, p. 397.