跳到主要內容

臺灣博碩士論文加值系統

(35.175.191.36) 您好!臺灣時間:2021/07/30 18:56
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:劉喬筠
研究生(外文):Chiao-Yun Liu
論文名稱:無線感測網路下之遠距偵測覆蓋空洞演算法
論文名稱(外文):Remote Hole Detection Algorithms for Wireless Sensor Networks
指導教授:賴國華
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:97
語文別:英文
論文頁數:26
中文關鍵詞:覆蓋空洞無線感應網路分散式演算法
外文關鍵詞:Coverage holeWireless sensor networkDistributed algorithm
相關次數:
  • 被引用被引用:0
  • 點閱點閱:137
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在這篇論文裡,我們提出了一個能夠有效率地探測出在無線感測網路上的覆蓋空洞的分散式演算法。在假設每個散佈的感測節點位置都能知道的情況下,我們將整個方法分成兩個階段。第一個階段,我們的目的是檢測出每個包圍在覆蓋空洞旁的節點。我們利用我們提出來的概念-單獨覆蓋弧線(mono-covered arc),此弧線代表了每個節點的感測圓弧中,沒有被其它節點所重覆覆蓋的部分。在我們的方法中,這些有方向性的單獨覆蓋弧線的右側,就是覆蓋空洞及未完全覆蓋區域。在這樣的觀念之下,我們發展出一個以圖論為基礎的分散式演算法,這個演算法可以在感測節點端有效地分辨出每個覆蓋空洞的位置及型態。甚者,這些圖的資訊可被送到基地台做整合,以辨認出所有存在於網路中的覆蓋空洞的幾何特徵
In this thesis, we develop a practical and energy-efficient distributed algorithm for the detection of coverage holes in a wireless sensor network. It assumes the location of sensor nodes is available. We do this in two phases. First we want to identify a set of nodes of which encircle a coverage hole. This is done by introducing a concept of mono-covered arc, which represents the circumference of a non-overlapping region of the sensing disc of a sensor node. That is, a coverage hole or insufficient coverage region will be along the right-hand side of these directed mono-covered arcs. Based on this notion, a graph-theoretic distributed algorithm can then be developed to identify every simple boundary and interior hole locally. Furthermore, these graph-theoretic information can also be forwarded to the sink or base station to recognize the geometric characteristics among these coverage holes existing in the network fabric remotely.
List of Figures . . . . . . . . . . . . . . . . . . . . .vi
List of Tables . . . . . . . . . . . . . . . . . . . . .vii
1 Introduction 1
1.1 Background and Motivation . . . . . . . . . . . . . . 1
1.2 Scope of the Work . . . . . . . . . . . . . . . . . . 2
1.3 Thesis Organization . . . . . . . . . . . . . . . . . 3
2 System Model . . . . . . . . . . .. . . . . . . . . . . 4
2.1 Assumptions . . . . . . . .. . . . . . . . . . . . . . 4
2.2 Definitions . . . . . . .. . . . . . . . . . . . . . . 4
3 Remote Hole Detection (RHD) Algorithms. . . . . . . . . 6
3.1 Mono-covered Arc . . . . . . . . . . . . . . . . . . . 6
3.1.1 End Points Estimation . . . . .. . . . . . . . . . . 7
3.1.2 Mono-covered Arc Selection . . . . . . . . . . . . . 7
3.2 Graph-theoretic Hole Detection . . . . . . . . . . . . 8
3.2.1 Construction of Graph . . . . . . . . . . . . . .. . 9
3.2.2 Hole Detection Schemes . . . . . . . . . . . . . . 12
4 Performance Analysis . . . . . . . . . . . . . . . . . 16
4.1 Simulation Setups . . . . . . . . . . . . . . . . . . 16
4.2 Simulation Results . . . . . . . . . . . . . . . .. . 17
4.2.1 Topological Hole Formation . . . . . . . . . . . . .17
4.2.2 Performance Evaluation . . . . . . . . . . . . . . .17
5 Conclusion . . . . . . . . . . . . . . . . . . . . . . 24
Bibliography . . . . . . . . . . . . . . . . . . . . . . 25
[1] N. Ahmed, S. S. Kanhere, and S. Jha, The holes problem in wireless sensor networks: a survey," ACM SIGMOBILE Mobile Computing and Communnications Review, vol. 9, pp.4-18, 2005.
[2] Peter Corke, Ron Peterson, and Daniela Rus, Finding holes in sensor networks," cmc.cs.dartmouth.edu
[3] Stefan Funke, Topological hole detection in wireless sensor networks and its applications," in Proceedings of the 2005 joint workshop on Foundations of mobile computing, pp.44-53 , 2005.
[4] S. Funke and C. Klen, Hole detection or:How much geometry hides in connectivity?," in Proceeding of the 22nd ACM Sympos. Computational Geometry, pp.377-385, 2006.
[5] S. Ganeriwal, A. Kansal, and M.B. Srivastava, Self aware actuation for fault repair in sensor networks," in IEEE International Conference on Robotics and Automation, Proceedings. ICRA ''04, 2004.
[6] Robert Ghrist , and Abubakr Muhammad, Coverage and hole-detection in sensor networks via homology," in Proceedings of the 4th international symposium on Information processing in sensor networks, pp.254-260, 2005.
[7] Chih-fan Hsin and Mingyan Liu, Randomly duty-cycled wireless sensor networks: dynamics of coverage," in IEEE Transactions on Wireless Communications, 2006.
[8] Chi-Fu Huang and Yu-Chee Tseng, The coverage problem in a wireless sensor network," in Proceedings of the 2nd ACM WSNA''03, pp.115-121, 2003.
[9] S. Kumar, T. H. Lai, and A. Arora. Barrier coverage with wireless sensors," in Proceedings of the ACM MobiCom, pp.284-298, 2005.
[10] Benyuan Liu, Peter Brass, Olivier Dousse, Philippe Nain, and Don Towsley,Mobility improves coverage of sensor networks," in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, 2005.
[11] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M.B. Srivastava, Coverage problems in wireless ad-hoc sensor networks," in Proceeding of 2001 INFCOOM, vol. 3, pp.1380-1387, 2001.
[12] V. Raghunathan, S. Ganeriwal, and M. Srivastava, Emerging techniques for long lived wireless sensor networks," in IEEE Communications Magazine, pp.108-114, April 2006.
[13] V. de Silva and R. Ghrist, Homological sensor networks," in Notices of the American Mathematical Society, vol. 54, no. 1, pp.10-17, 2007.
[14] P.J. Wan, and C.W. Yi , Coverage by randomly deployed wireless sensor networks," in IEEE Transactions on Information Theory, pp.2658-2669, 2006.
[15] Guiling Wang, Guohong Cao, and La Porta, Movement-assisted sensor deployment," in INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, 2004.
[16] Yue Wang, Jie Gao, and Joseph S.B. Mitchell, Boundary recognition in sensor networks by topological methods," in International Conference on Mobile Computing and Networking, 2006.
[17] B. Warneke, K.S.J Pister, MEMS for distributed wireless sensor networks," in Proceedings of the 9th International Conference on Electronics, Circuits and
Systems, VOL. 1, pp.291-294, 2002.
[18] M.K. Watfa, and S. Commuri, Energy-e±cient approaches to coverage holes detection in wireless sensor networks," in IEEE International Symposium on Intelligent Control, pp.131-136, 2006.
[19] M.K. Watfa, and S. Commuri, Power conservation approaches to the border coverage problem in wireless sensor networks," in Proceedings of ICWN, 2006.
[20] Data sheet for CC2420 2.4GHz IEEE 802.15.4/ZigBee RF transceiver,http://www.chipcon.com/‾les/CC2420 Data Sheet 1 2.pdf.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊