Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks

Size: px
Start display at page:

Download "Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks"

Transcription

1 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks Optimized Barrier Location for Barrier Coverage in Mobile Sensor Netorks Xiaoyun Zhang, Mathe L. ymore, and Daji Qiao Ioa State University, Ames, IA 5 {zxydut, mlymore, daji}@iastate.edu Abstract Barrier coverage is an important application of sensor netorks. This paper studies ho to build a strong barrier ith mobile sensors in hich the maximum moving distance of sensors is minimized. Our ork differs from others in the ay the y-coordinate of the barrier is determined. e optimize the y-coordinate of the barrier instead of fixing it a priori. An efficient algorithm is proposed, in hich the search space of the y-coordinate of the barrier is first discretized and then searched over iteratively. In the theoretical orst case, O(N 4 ) iterations may be needed to find the optimal barrier location, here N is the number of sensors, but in practice, our algorithm requires less than O(N 2 ) iterations, as confirmed in simulation. I. INTRODUCTION Intruder detection and border surveillance are intuitive applications of sensor netorks. In these applications, sensors are deployed along the perimeter of a protected area such that no intruder can cross the perimeter ithout being detected. The arrangement of sensors for this purpose is referred to as the barrier coverage problem in sensor netorks. Early research in barrier coverage focused on static sensors [] [4]. Different kinds of barrier coverage ere defined and the corresponding critical densities of sensors ere calculated. Also, various schemes ere proposed to identify the barriers formed by static sensors. More recent research has examined barrier coverage ith mobile sensors [5] [8]. The primary focus of these papers has been minimizing the moving distances of sensors hen building the barrier. These orks either restricted the sensors deployment and movement regions to a -dimensional (D) line, or fixed the y-coordinate of the barrier if considering a 2-dimensional (2D) rectangular deployment region ith the minimum number of sensors. In practice, it is difficult to deploy sensors along a D line, and in the 2D case, fixing the y-coordinate of the barrier a priori results in a suboptimal solution, since the y-coordinate of the barrier affects the moving distance of sensors. In this paper, e study the strong barrier coverage problem in a 2D rectangular region, here the goal is to detect intruders that may follo any path to cross the deployment region. This is in contrast to eak barrier coverage, hich deals ith intruders that only perpendicularly cross the deployment region. e assume that a strong barrier is formed ith the minimum number of sensors, along a horizontal line that spans the length of the deployment region. e present an algorithm that decides the optimal y-coordinate of the barrier, and identifies a subset of sensors to move to their corresponding destinations, so that the maximum moving distance of sensors is minimized. To achieve this, our algorithm first discretizes the search space for the y-coordinate of the barrier, then quickly iterates over this discretized search space. Simulation results sho that our algorithm is efficient and scalable. The rest of this paper is organized as follos. In Section II, e discuss related ork in detail. In Section III, the system model is presented and the problem is formally defined. e present our algorithm in Section IV and evaluate it in Section V. Finally, e conclude this paper in Section VI. II. RELATED ORK Various D mobile barrier coverage problems have been studied in [5, 9, ]. In these papers, mobile sensors are initially deployed on the line here the barrier ill be built, then the sensors move along this line to form the barrier. The sensors move according to various objectives, such as minimizing the maximum (min-max) or the sum (min-sum) of moving distances, maximizing the coverage, or minimizing the number of moving sensors. Regardless of the objective, the y-coordinate of the barrier is not considered because the sensors are assumed to already be on the line. Barrier coverage has also been studied for mobile sensors deployed in a 2D region. Bhattacharya et al. [5] solved the min-max and min-sum problems for sensors moving from a circle s interior to its circumference to form a barrier. Their algorithm optimizes an angle variable, analogous to our y- coordinate of the barrier. Hoever, their solution cannot be applied to our problem due to different search spaces of the angle variable and the y-coordinate, and the difference in ho these factors decide sensors final positions. Saipulla et al. [6] studied the min-max problem of forming a barrier ith a minimum number of mobile sensors in a rectangular region. Hoever, they fixed the y-coordinate of the barrier a priori. Shen et al. [7] did not fix the y-coordinate of the barrier in their investigation into the min-sum problem for a rectangular region, but they instead fixed the order of sensors along the barrier. In contrast, our algorithm does not fix either the y- coordinate or the order of the sensors along the barrier, thus alloing for optimal min-max results ith no assumptions about ho the sensors are deployed. Distributed algorithms have also been proposed for the barrier coverage problem [7, 8,, 2], but the goal of these algorithms is usually to reduce the communication beteen sensors. They are suboptimal hen considering objectives such as min-max or min-sum of sensors moving distances. III. SYSTEM MODEL AND PROBLEM STATEMENT A. System Model ) Sensor Netork: e study a netork of N mobile sensors deployed in a long rectangular region of size L, /5/$3. 25 IEEE 572

2 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks here L, as shon in Fig.. Sensors are named s to s N from left to right of the deployment region, and the initial position of sensor s i is denoted by (x i, y i ). The set of all the sensors is denoted by S. e adopt the idely-used disk coverage model and denote the coverage radius as R. An intruder can be detected by a sensor if and only if it is ithin R of the sensor. In addition, e assume sensors can acquire their positions from GPS or another localization scheme. y Exit side s s2 s3 t t2 t3 t4 t5 t6 t47 t48 t49 t5 s4 s6 s49 s5 R s5 Entrance side... s47 intruder path Fig.. An example sensor netork of 5 mobile sensors. 2) Intruder and Barrier: e assume that intruders may take any path to cross the deployment region from bottom to top, as shon in Fig.. In order to detect such intruders, strong barrier coverage is required. This is in contrast to eak barrier coverage, hich assumes intruders only take paths perpendicular to the x-axis of the deployment region. The minimum number of sensors needed to form a strong barrier is N min = L 2R. For simplicity, and ithout loss of generality, e assume that L is a multiple of 2R; hence, N min = L 2R. To form a strong barrier ith N min sensors, hich is the focus of our study in this paper, these sensors must be aligned along a horizontal line parallel to the x-axis of the deployment region. In other ords, the destination positions of these sensors (denoted by t j, j N min ) must have the coordinates of (α j, j ), here α j = (2j )R, j N min, and = 2 = = Nmin. e use T to denote the set of destination positions, and use to denote their common y- coordinate, called the barrier location. 3) System: e assume that the sensor netork remains connected during sensor movement, and that there is a central processing unit hich collects information from sensors, executes the proposed algorithm, and disseminates the movement strategy to sensors. B. Problem Statement Our goal is to minimize the maximum moving distance of mobile sensors that form a strong barrier, ith selected N min sensors from a netork of N (N N min ) sensors ith knon initial positions. More specifically, our algorithm must decide () here the barrier shall be formed, i.e., the optimal barrier location, denoted by opt ; and (2) ho to form the barrier at opt, i.e., the optimal sensor movement strategy, hich can be described as a mapping function M opt from S to T. In general, a mapping function M : S T is defined as follos: M(i) = j means that sensor s i moves to destination t j, hile M(i) = means that sensor s i remains stationary. Sensors not used in the initial barrier may participate in forming future barriers after the operational lifetime of the current barrier has expired. Formally, the problem e try to address in this paper is described as follos: Given: rectangular deployment region: L coverage radius: R s48 L x total number of deployed sensors: N initial sensor positions: (x i, y i ) for each s i S x-coordinate of the destinations: α j for each t j T Output: optimal barrier location opt and sensor movement strategy M opt : { opt, M opt } = arg min D(M, ) here {,M} (xi ) 2 D(M, ) = max α M(i) + (yi ) 2. s i S,M(i) Constraint: opt Essentially, e solve a min-max problem. Our motivation is the assumption that the sensor ith the maximum moving distance runs out of energy first, hich ould break the barrier. Therefore, our scheme produces a barrier ith the longest operational lifetime. e use D(M, ) to denote the maximum moving distance of the sensors hen they follo strategy M to form a barrier at location. e restrict the barrier location beteen and. IV. PROPOSED SCHEME A. Overvie of the Proposed Scheme To determine the optimal barrier location opt, e first reduce its search space from a continuous range [, ] to a discrete set ith less than N 2 Nmin 2 points, hich are called candidate barrier locations. Afterards, e propose an efficient iterative algorithm to search over this discrete set. The orst-case number of iterations is O(N 2 Nmin 2 ), but in practice, our algorithm uses approximately O(NN min ) iterations. B. Identification of Candidate Barrier Locations Candidate barrier locations are derived from the minimum and intersection points of the group of functions defined belo. Definition (Function of Moving Distance). Suppose a sensor s i moves to a destination t j. The moving distance of s i can be represented as a function of the barrier location, i.e., f i,j () = [x i (2j )R] 2 + (y i ) 2, () here. e use F to denote the set of all f associated ith a sensor netork of N sensors, i.e., F = {f i,j () i N, j N min, }. (2) For simplicity, e also define f i, () =, i,. ith these functions defined, e can no define the candidate barrier locations. Definition 2 (Candidate Barrier Locations). The set of candidate barrier locations is Φ = Φ mins Φ ints, here Φ mins = { arg min f i,j()} includes all the values f i,j F that yield a minimum value for at least one of the f i,j functions in F ; Φ ints = { f i,j () = f m,n()} includes all the f i,j F,f m,n F values at hich to functions in F intersect. Let Φ denote the total number of candidates in Φ. e sort these candidates in ascending order and name them {K i i =,, Φ }. Let Φ mins and Φ ints denote the number 573

3 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks of candidates in Φ mins and Φ ints, respectively. Then, e have O(N 4 ) candidates, as follos: Φ = Φ mins + Φ ints ( NNmin ) NN min + = O(N 2 N 2 2 min ) = O(N 4 ). (3) Fig. 3 plots all the functions in F corresponding to the sensor netork shon in Fig. 2. In this example, Φ mins = 3, Φ ints =, and Φ = 3. s 3 t t 2 s t 3 s 2 L Initial Position Destination Position Fig. 2. An example sensor netork of 3 mobile sensors. { } = min max f i,m(i)(k j ), max f i,m(i)(k j+ ) i N i N = min {D (M, K j ), D (M, K j+ )}. (7) C. Iterative Algorithm ith the candidate barrier locations being identified, e further reduce the search complexity by proposing an iterative algorithm in hich only a small portion of candidates are checked. Fig. 4 shos the flochart of our iterative algorithm, hich is explained in detail next. Initialization: curr =, opt = curr, M opt =, D opt = Customized Bottleneck Bipartite Matching 25 f,3 G(V,E) : V = S T, E = {(s i,t j ) s i S,t j T}, eight(s i,t j ) = f i,j ( + curr ) 2 f 2,3 M =Bottleneck Bipartite Matching(G) f ij () 5 f,2 f 3, f 2,2 i = argmaxf i,m (i)( curr + ) i 5 f, f 2, K K 2 K 3 K 4 K 5 K 6 K 7 K 8 K 9 K K K 2 Fig. 3. For the example netork in Fig. 2, there are 9 functions in F and 3 candidate barrier locations. Φ mins = {K 3, K 4, K 3 } and Φ ints = {K, K 2, K 5, K 6, K 7, K 8, K 9, K, K, K 2 }. The optimal barrier location opt is guaranteed to be at one of the candidate barrier locations, as Theorem belo proves, any movement strategy M for a barrier at any beteen to adjacent candidate locations can alays yield a smaller maximum moving distance at one of these to candidates. Theorem. M, (K j, K j+ ), here j Φ, D(M, )> min {D (M, K j ), D (M, K j+ )}. Proof: Let s i denote the sensor that has the maximum moving distance in M at. This means f 3,2 K 3 i, f i,m(i) () f i,m(i )(). (4) Since K j and K j+ are adjacent candidate locations, no other functions in F intersect beteen them. Therefore, (4) implies that { fi,m(i) (K j ) f i,m(i )(K j ), i, (5) f i,m(i) (K j+ ) f i,m(i )(K j+ ), i. In other ords, f i,m(i )(K j ) = max f i,m(i)(k j ), i N f i,m(i )(K j+ ) = max f i,m(i)(k j+ ). i N Moreover, according to the definition of candidate barrier locations, all the functions in F are monotone beteen to adjacent candidates such as K j and K j+. Therefore, e have: D(M, ) = max f i,m(i)() = f i i N,M(i )() (Definition) > min { f i,m(i )(K j ), f i,m(i )(K j+ ) } (Monotone) (6) D(M, curr ) = max i N f i,m (i)( curr ) D(M, curr ) < D opt? no Continue ith the Next Candidate next = min{k j K j > curr,k j Φ i,m (i )} Does next exist? no STOP, output M opt, opt yes Update: opt = curr, M opt = M, D opt = D(M, curr ) yes curr = next Fig. 4. Flochart of the iterative algorithm (note that + curr = curr + δ). The algorithm starts ith curr =. After initialization ith the optimal min-max moving distance D opt set to infinity, the Bottleneck Bipartite Matching (BBM) algorithm [3] is applied to determine the best movement strategy for the current barrier location as follos. The input to BBM is a eighted bipartite graph G(V, E): V = S T here S is the set of sensors, T is the set of destinations along curr ; E = {(s i, t j ) s i S, t j T }; eight(s i, t j ) = f i,j ( curr) + here curr + = curr +δ and δ is a positive offset hich is sufficiently small so that curr + does not reach the next candidate in Φ. Recall that f i,j is the function of moving distance for sensor s i to reach destination t j. BBM returns a max-cardinality matching hose maximum edge eight is minimized. In other ords, it produces a 574

4 f ij () 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks movement strategy hich minimizes the maximum moving distance of sensors from their initial positions to the destination positions along curr. In this customized BBM algorithm, the offset δ is used as a tie breaker in case there are multiple movement strategies that all yield the same min-max moving distance at curr. For example, in Fig. 5, at curr = K 2, there exist to such movement strategies: M = { 2, 2, 3 3} and M 2 = {, 2 2, 3 3}. By adding a small offset, the tie is broken and M 2 is chosen hich yields a smaller maximum moving distance than M at K 2 +. This serves as an important base for the next round of iteration, as shon in the proof of Theorem 2. As shon in the flochart, e record the output of the customized BBM algorithm as follos: M : the min-max matching at + curr; i : the index of the sensor that has the maximum moving distance in M at + curr; D(M, curr ): the min-max moving distance at curr. The next candidate location to check is next = min{k j K j > curr, Kj Φ i,m (i )}, (8) here Φ i,m (i ) is the set of candidates along f i,m (i ) hich is formally defined belo. Definition 3 (Candidate Barrier Locations along f i,j ). The set of candidate barrier locations along the f i,j function is Φ i,j = Φ mins i,j Φints, here i,j Φ mins i,j = { arg min f i,j()} includes the value at hich f i,j achieves its minimum; Φ ints i,j = { f i,j () = f m,n()} includes all the f m,n F values at hich f i,j intersects ith another function in F. Note that next is the first candidate location along the f i,m (i ) function after curr. There might exist other candidate locations beteen curr and next but belong to a different f function, hich are skipped in our iterative algorithm to reduce the search complexity. For example, in Fig. 5, the next candidate to check after K 2 is K 6. It is determined ith the folloing steps: () the min-max matching at K 2 + is M = {, 2 2, 3 3}; (2) the sensor that has the maximum moving distance in M at K 2 + is s 3; (3) the first candidate along after K 2 is K 6. Comparing Fig. 5 ith Fig. 3, e can see that candidate locations K 3, K 4, and K 5 are skipped. The reason hy these candidate locations can be skipped is that, as e ill sho in Theorem 2, at any beteen curr and next, the maximum moving distance of any movement strategy is alays larger than or equal to that of M at curr or next. Theorem 2. M, [ curr, next ], here curr is the current candidate location in the iterative algorithm, and next is the next candidate location to check as defined in (8), e alays have D(M, ) min {D(M, curr ), D(M, next )}, here M is the min-max matching at curr. + Proof: Recall that i is the index of the sensor that has the maximum moving distance in M at + curr, i.e., i = arg max f i,m i (i)( curr). + (9) Iteration # Iteration #2 Iteration #3 Iteration #4 f,2 f 2,2 f 2,3 f,3 f 3, ( opt,d opt ) f2,2 f 5 f, f, f 2, 3,2 K 2 K 6 K 2 Fig. 5. The iterative algorithm starts ith curr =. Iteration #: The minmax matching at curr + is { 2, 2, 3 3}, in hich s 3 has the maximum moving distance at curr. + The next candidate to check is the first candidate location along after curr =, hich is K 2. Iteration #2: The minmax matching at K + 2 is {, 2 2, 3 3}, in hich s 3 has the maximum moving distance at K + 2. The next candidate to check is the first candidate along after K 2, hich is K 6. The same process repeats for Iteration #3 and Iteration #4 till the algorithm terminates. Therefore, the folloing inequality holds for all i: f 2,2 f, f i,m (i )( + curr) f i,m (i)( + curr). () As next is the first candidate location along the f i,m (i ) function after curr, no other functions in F intersect ith f i,m (i ) beteen curr and next. Consequently, e have: [ curr, next ], i, f i,m (i )() f i,m (i)(). () Hence, e have: [ curr, next ], f i,m (i )() = D(M, ). (2) On the other hand, let i denote the index of the sensor that has the maximum moving distance in M at + curr, i.e., i = arg max f i,m i (i)( curr). + (3) As M is the min-max matching at + curr, e have: f i,m (i )( + curr) f i,m (i )( + curr). (4) Similarly, due to the fact that no other functions in F intersect ith f i,m (i ) beteen curr and next, e have: [ curr, next ], f i,m (i )() f i,m (i )(). (5) As the definition of D(M, ) implies: e have: D(M, ) = max f i,m i N (i)() f i,m (i )(), (6) [ curr, next ], D(M, ) f i,m (i )(). (7) Furthermore, as the f i,m (i ) function is monotone beteen curr and next, (7) implies: [ curr, next ], D(M, ) min{f i,m (i )( curr ), f i,m (i )( next )}. Finally, by combining (2) ith (8), e have: [ curr, next ], D(M, ) min{d(m, curr), D(M, next)}. (8) (9) 575

5 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks The algorithm terminates hen next cannot be found, meaning that e have completed the search over the entire range [, ]. Fig. 5 illustrates the iterative algorithm ith an example and the iteration process is explained in its caption. D. Complexity Analysis In theory, there is a total of O(N 2 Nmin 2 ) candidates in Φ, hich means that, in the orst case, e may need O(N 2 Nmin 2 ) iterations to complete the search. Hoever, in practice, the number of iterations is more comparable to O(NN min ). This is because our algorithm checks the candidate barrier locations iteratively along a continuous function that is composed of multiple sections from different f functions. In other ords, in each iteration, our algorithm only checks the candidate locations along a particular section of a single f function. Thus, the total number of checked locations is on the same order as the number of candidate locations along a single f function, hich is O(NN min ). In Section V, e validate this complexity analysis by simulation. V. EVALUATION RESULTS e evaluate our algorithm by simulating to types of sensor deployment: random uniform deployment, and linebased deployment. In both scenarios, e compare the optimal min-max moving distance found by our algorithm to that of a naive algorithm that fixes the barrier location to 2, hich is the middle point of the deployment region. e refer to our algorithm as Opt and the naive algorithm as Mid. The time complexity of our algorithm is also evaluated in terms of the number of checked candidate locations. A. Uniform Deployment e first evaluate our algorithm ith a random uniform deployment of N sensors in an L region. ) Min-max Moving Distance: Fig. 6 shos the min-max moving distances of the to algorithms varying ith N in the uniform case. e test different sizes of deployment region. For each size, the effect of redundant sensors on the min-max moving distance is also tested. e first note that, regardless of the size of the deployment region, the min-max moving distance of both algorithms decreases as the number of sensors increases. This is an intuitive result, as more sensors deployed in the area means a higher chance that one or more sensors ill already be close to each final destination. e also note that, regardless of the size of the deployment region, Opt outperforms Mid more hen N is larger. This is because the horizontal moving distance tends to dominate the overall 2D moving distance as L, but as the number of sensors increases, the horizontal moving distance decreases. Therefore, the benefit of optimizing vertical moving distance becomes relatively larger. Finally, e note from Fig. 6(b) that, given the same L and N, the difference beteen Opt and Mid is larger hen is larger. This is again due to the increased proportion of vertical distance in the total moving distance. Fig. 6 shos the average min-max moving distances of Opt and Mid. To further illustrate the improvement of Opt over Mid, Fig. 7 presents the cumulative distribution function (CDF) of the absolute and relative improvement of Opt over (m) Opt, L=5, =5 Mid, L=5, =5 Opt, L=, =5 Mid, L=, =5 Opt, L=2, =5 Mid, L=2, = N (a) Fixed and varying L. (m) Opt,L=,=2 Mid,L=,=2 Opt,L=,=5 Mid,L=,=5 Opt,L=,= Mid,L=,= 5 5 N (b) Fixed L and varying. Fig. 6. Min-max moving distance hen N sensors are uniformly deployed in an L region. The coverage radius of each sensor is R = m. Mid in terms of min-max moving distance, hich is a result of trials for each of three different setups shon in the figure. In the scenario here N = 5, Opt has a min-max moving distance hich is on average 2.5 m or.2% less than that of Mid, but in around 4% of the trials, the improvement is greater. In the most extreme case, Opt reduces the min-max moving distance by 9.4 m or 38%. Similar observations can be made for the other to setups..6 L=,=5,N=5 L=,=5,N= L=,=5,N= Absolute improvement (m).5 L=,=5,N=5 L=,=5,N= L=,=5,N= Relative improvement (%) Fig. 7. CDF of the absolute and relative improvement of Opt over Mid in terms of min-max moving distance. 2) Number of Checked Candidate Locations: Table I shos the number of total and checked candidate locations of selected experiments from the uniform scenario. Total is the number of candidates in Φ, hich is up to N 2 Nmin 2, hile check is the number of candidates checked in our iterative algorithm. hen N, L, or increases, the number of total and checked candidates increases accordingly. Hoever, in any scenario, only a small portion of candidates are checked, ith a number even less than NN min, hich indicates that our algorithm is efficient and scalable. For example, hen L = 2 m, = m, N min =, given N = 3 sensors, NN min = 3, but only 783 candidates are checked. TABLE I TOTAL AND CHECKED CANDIDATES FOR THE UNIFORM DEPLOYMENT CASE. R = M AND N MIN = L/2R. L=,=5 N min = 5 L=2,=5 N min = L=2,= N min = N total check N total check N total check B. Line-based Deployment The second deployment scenario is the line-based sensor deployment strategy proposed in [4], here N sensors are deployed in an L region along the line of y = 2. Each sensor s i is deployed at its final position [(2j )R, 2 ] ith a random x-axis error δi x and y-axis error δ y i, here 576

6 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks δi x, δy i N(, σ). In practice, this error could be the result of ind or other environmental conditions during an air drop. hen redundant sensors are deployed, sensors are assumed to be dropped in groups, e.g., for N = 2N min, to sensors are dropped at each position. ) Min-max Moving Distance: Fig. 8(a) shos the minmax moving distances of Opt and Mid ith varying σ. As σ increases, the min-max moving distances of both Opt and Mid increase, because the sensors tend to be initially deployed farther from their final positions. Also, as σ increases, Opt outperforms Mid more. This is because hen σ is larger, the sensors ill be scattered in a ider region. It is more necessary to optimize the vertical moving distance in this case. Interestingly, hen σ is fixed, the difference beteen Opt and Mid is larger hen N is smaller, hich is the opposite of the observations in the uniform deployment case. This is due to the folloing reasons. Firstly, hen N increases and multiple sensors are dropped at each point, e tend to have a combination of sensors that yields an optimal barrier location close to 2 ; therefore, the difference beteen the vertical moving distance of Opt and Mid is smaller. Secondly, the vertical and horizontal moving distances are comparable in the line-based deployment case; hence, the reduction of the vertical moving distance can be reflected in the overall 2D moving distance. (m) Opt, N=5 Mid, N=5 Opt, N= Mid, N= Opt, N=5 Mid, N= σ (m) (a) Min-max moving distance vs. σ given three different N values..59 σ=5,n=5 σ=5,n=5 σ=2,n=5 σ=2,n= Absolute improvement (m) (b) CDF of the absolute improvement of Opt over Mid in terms of min-max moving distance. Fig. 8. The min-max moving distance for the line-based deployment strategy, ith L = m, = 5 m, R = m, and N min = 5. Similar to before, e plot in Fig. 8(b) the CDF of the improvement of Opt over Mid in four different setups. e can see that hen σ = 2 m and N = 5, on average, the min-max moving distance of Opt is 4.6 m or 8.7% less than Mid. In the most extreme case, the min-max moving distance of Opt may be up to 9.3 m or 36% less than Mid. Similar observations can be made for the other setups. 2) Number of Checked Candidate Locations: Table II shos the number of total and checked candidate locations of selected experiments from the line-based deployment scenario. Similar to before, hen N or σ increases, the number of total and checked candidates increases, but only a small proportion of the total candidates are checked in any scenario. C. Discussions As shon above, our proposed scheme outperforms the scheme that fixes the barrier location, significantly in terms of the min-max moving distance, thus saving much energy on sensor movement. As a tradeoff, it may increase the computational complexity at the central processing unit, hich usually is much more poerful than sensor nodes and has TABLE II TOTAL AND CHECKED CANDIDATES FOR THE LINE-BASED DEPLOYMENT CASE. L = M, = 5 M, R = M, AND N MIN = 5. N σ = 5 σ = 2 total check total check a sustainable poer supply. On the other hand, these to schemes incur the same communication overhead, as both algorithms are executed by the central processing unit thus all sensors need to report their initial positions to there. VI. CONCLUSIONS AND FUTURE ORK In conclusion, e have shon that our proposed algorithm reduces the min-max moving distance for mobile sensors in a barrier coverage netork by determining the optimal barrier location, instead of fixing it a priori. Depending on the deployment scheme, this reduction can be up to 38% of the min-max moving distance obtained by an algorithm that uses an intuitive fixed barrier location. Additionally, simulation results sho that our proposed algorithm for finding the optimal barrier location is both efficient and scalable. Future ork includes extending the proposed scheme to K-barrier coverage and to use the probabilistic coverage model, in hich sensors may collaborate ith each other to further reduce the moving distance and the number of sensors used. ACKNOLEDGMENT Xiaoyun Zhang ould like to thank China Scholarship Council for the financial support. REFERENCES [] S. Kumar, T. H. Lai, and A. Arora, Barrier coverage ith ireless sensors, in Proc. of ACM MobiCom, Aug. 25. [2] B. Liu, O. Dousse, J. ang, and A. Saipulla, Strong barrier coverage of ireless sensor netorks, in Proc. of ACM MobiHoc, May 28. [3] A. Chen, S. Kumar, and T. H. Lai, Designing localized algorithms for barrier coverage, in Proc. of ACM MobiCom, Sept. 27. [4] G. Yang and D. Qiao, Barrier information coverage ith ireless sensors, in Proc. of IEEE INFOCOM, Apr. 29. [5] B. Bhattacharya, B. Burmester, Y. Hu, E. Kranakis, Q. Shi, and A. iese, Optimal movement of mobile sensors for barrier coverage of a planar region, in Proc. of COCOA, Aug. 28. [6] A. Saipulla, B. Liu, G. Xing, X. Fu, and J. ang, Barrier coverage ith sensors of limited mobility, in Proc. of ACM MobiHoc, Sep. 2. [7] C. Shen,. Cheng, X. Liao, and S. Peng, Barrier coverage ith mobile sensors, in Proc. of IEEE I-SPAN, May 28. [8] M. Eftekhari, E. Kranakis, D. Krizanc, O. Morales-Ponce, L. Narayanan, J. Opatrny, and S. Shende, Distributed algorithms for barrier coverage using relocatable sensors, in Proc. of ACM PODC, July 23. [9] J. Czyzoicz, E. Kranakis, D. Krizanc, I. Lambadaris, L. Narayanan, J. Opatrny, L. Stacho, J. Urrutia, and M. Yazdani, On minimizing the sum of sensor movements for barrier coverage of a line segment, in Proc. of ADHOC-NO, Aug. 2. [] M. Mehrandish, L. Narayanan, and J. Opatrny, Minimizing the number of sensors moved on line barriers, in Proc. of IEEE CNC, 2. [] T. M. Cheng and A. V. Savkin, A distributed self-deployment algorithm for the coverage of mobile ireless sensor netorks, IEEE Communications Letters, vol. 3, no., pp , 29. [2] L. Kong, X. Liu, Z. Li, and M.-Y. u, Automatic barrier coverage formation ith mobile sensor netorks, in Proc. of IEEE ICC, 2. [3] A. P. Punnen and K. Nair, Improved complexity bound for the maximum cardinality bottleneck bipartite matching problem, Discrete Applied Mathematics, vol. 55, no., pp. 9 93, 994. [4] A. Saipulla, C. estphal, B. Liu, and J. ang, Barrier coverage of linebased deployed ireless sensor netorks, in Proc. of IEEE INFOCOM, April

Non-linear Barrier Coverage using Mobile Wireless Sensors

Non-linear Barrier Coverage using Mobile Wireless Sensors Non-linear Barrier Coverage using Mobile Wireless Sensors arxiv:1611.07397v1 [cs.ni] 22 Nov 2016 Ashutosh Baheti Dept. of Computer Sc. & Engineering Indian Institute of Technology, Kharagpur Kharagpur,

More information

Complexity of Barrier Coverage with Relocatable Sensors in the Plane

Complexity of Barrier Coverage with Relocatable Sensors in the Plane Complexity of Barrier Coverage with Relocatable Sensors in the Plane Stefan Dobrev 1, Stephane Durocher 2, Mohsen Eftekhari 3, Konstantinos Georgiou 4, Evangelos Kranakis 5, Danny Krizanc 6, Lata Narayanan

More information

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University

More information

A study of sensor movement and selection strategies for strong barrier coverage

A study of sensor movement and selection strategies for strong barrier coverage Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2017 A study of sensor movement and selection strategies for strong barrier coverage Xiaoyun Zhang Iowa State

More information

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks 1 Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Netorks Yu Wang Xiang-Yang Li Department of Computer Science, University of North Carolina at Charlotte, 9201 University

More information

arxiv:cs/ v1 [cs.ds] 18 May 2002

arxiv:cs/ v1 [cs.ds] 18 May 2002 arxiv:cs/0205041v1 [cs.ds] 18 May 2002 Faster Parametric Shortest Path and Minimum Balance Algorithms Neal E. Young Computer Science Department, Princeton University, Princeton, Ne Jersey, 08544 Robert

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Indexing Methods for Moving Object Databases: Games and Other Applications

Indexing Methods for Moving Object Databases: Games and Other Applications Indexing Methods for Moving Object Databases: Games and Other Applications Hanan Samet Jagan Sankaranarayanan Michael Auerbach {hjs,jagan,mikea}@cs.umd.edu Department of Computer Science Center for Automation

More information

Efficient k-coverage Algorithms

Efficient k-coverage Algorithms School of Computing Science Simon Fraser University, Canada Efficient k-coverage Algorithms for Wireless Sensor Networks (joint work with Majid Bagheri) INFOCOM Minisymposium 07 7 May 2007 1 Motivations

More information

Automatic Deployment and Formation Control of Decentralized Multi-Agent Networks

Automatic Deployment and Formation Control of Decentralized Multi-Agent Networks Automatic Deployment and Formation Control of Decentralized Multi-Agent Netorks Brian S. Smith, Magnus Egerstedt, and Ayanna Hoard Abstract Novel tools are needed to deploy multi-agent netorks in applications

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

An Analysis of Interference as a Source for Diffraction

An Analysis of Interference as a Source for Diffraction J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction

More information

PARTICLE SWARM OPTIMIZATION (PSO) [1] is an

PARTICLE SWARM OPTIMIZATION (PSO) [1] is an Proceedings of International Joint Conference on Neural Netorks, Atlanta, Georgia, USA, June -9, 9 Netork-Structured Particle Sarm Optimizer Considering Neighborhood Relationships Haruna Matsushita and

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Fast and Scalable Conflict Detection for Packet Classifiers

Fast and Scalable Conflict Detection for Packet Classifiers Fast and Scalable Conflict Detection for Packet Classifiers Florin Baboescu, George Varghese Dept. of Computer Science and Engineering University of California, San Diego 95 Gilman Drive La Jolla, CA9293-4

More information

Spatial-Temporal Coverage Optimization in Wireless Sensor Networks

Spatial-Temporal Coverage Optimization in Wireless Sensor Networks 1 Spatial-Temporal Coverage Optimization in Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 168

More information

Implementation of a Turbo Encoder and Turbo Decoder on DSP Processor-TMS320C6713

Implementation of a Turbo Encoder and Turbo Decoder on DSP Processor-TMS320C6713 International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X,.ijerd.com Volume 2, Issue 5 (July 2012), PP. 37-41 Implementation of a Turbo Encoder and Turbo Decoder

More information

Mixture models and clustering

Mixture models and clustering 1 Lecture topics: Miture models and clustering, k-means Distance and clustering Miture models and clustering We have so far used miture models as fleible ays of constructing probability models for prediction

More information

Project 1: Creating and Using Multiple Artboards

Project 1: Creating and Using Multiple Artboards E00ILCS.qxp 3/19/2010 1:0 AM Page 7 Workshops Introduction The Workshop is all about being creative and thinking outside of the box. These orkshops ill help your right-brain soar, hile making your left-brain

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

PARALLEL LAGRANGE INTERPOLATION ON EXTENDED FIBONACCI CUBES

PARALLEL LAGRANGE INTERPOLATION ON EXTENDED FIBONACCI CUBES STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume L, Number 1, 2005 PARALLEL LAGRANGE INTERPOLATION ON EXTENDED FIBONACCI CUBES IOANA ZELINA Abstract. In this paper is presented a parallel algorithm for computing

More information

Optimal time-delay spiking deconvolution and its application in the physical model measurement

Optimal time-delay spiking deconvolution and its application in the physical model measurement Optimal time-delay spiking deconvolution and its application in the physical model measurement Zhengsheng Yao, Gary F. Margrave and Eric V. Gallant ABSRAC Spike deconvolution based on iener filter theory

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

The Tree Congestion of Graphs

The Tree Congestion of Graphs The Tree Congestion of Graphs Diana Carr August 2, 2005 Abstract Edge congestion can be thought of as the cutwidth of a graph In this paper we embed complete tripartite graphs into trees and spanning trees

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

The Locality of Searchable Symmetric Encryption

The Locality of Searchable Symmetric Encryption The Locality of Searchable Symmetric Encryption David Cash Rutgers U Stefano Tessaro UC Santa Barbara 1 Outsourced storage and searching Broser only donloads documents matching query. Avoids donloading

More information

A Robust Method of Facial Feature Tracking for Moving Images

A Robust Method of Facial Feature Tracking for Moving Images A Robust Method of Facial Feature Tracking for Moving Images Yuka Nomura* Graduate School of Interdisciplinary Information Studies, The University of Tokyo Takayuki Itoh Graduate School of Humanitics and

More information

Rubik's Shells.

Rubik's Shells. Ruik's Shells Ruik's Shells is a puzzle that consists of 4 intersecting rings, coloured heels ith 8 alls each, hich can rotat The heels are in to pairs; to axes ith a pair of heels on each, and the to

More information

Crossing Families. Abstract

Crossing Families. Abstract Crossing Families Boris Aronov 1, Paul Erdős 2, Wayne Goddard 3, Daniel J. Kleitman 3, Michael Klugerman 3, János Pach 2,4, Leonard J. Schulman 3 Abstract Given a set of points in the plane, a crossing

More information

Affine Transformations Computer Graphics Scott D. Anderson

Affine Transformations Computer Graphics Scott D. Anderson Affine Transformations Computer Graphics Scott D. Anderson 1 Linear Combinations To understand the poer of an affine transformation, it s helpful to understand the idea of a linear combination. If e have

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

Group Secret Key Generation Algorithms

Group Secret Key Generation Algorithms Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]

More information

{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs

{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs Problem definition Paths and cycles Complete subgraphs 10. Extremal graph theory 10.1. Definitions Let us examine the following forbidden subgraph problems: At most how many edges are in a graph of order

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

WIRELESS sensor networks (WSNs) have been

WIRELESS sensor networks (WSNs) have been IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Achieving k-barrier Coverage in Hybrid Directional Sensor Networks Zhibo Wang, Jilong Liao, Qing Cao, Member, IEEE, Hairong Qi,Senior Member, IEEE, and Zhi Wang,

More information

Development of Redundant Robot Simulator for Avoiding Arbitrary Obstacles Based on Semi-Analytical Method of Solving Inverse Kinematics

Development of Redundant Robot Simulator for Avoiding Arbitrary Obstacles Based on Semi-Analytical Method of Solving Inverse Kinematics Proceedings of the 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems San Diego, CA, USA, Oct 29 - Nov 2, 2007 ThC2.1 Development of Redundant Robot Simulator for Avoiding Arbitrary

More information

Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization

Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization I M. Rajinikannan, II A. Nagarajan, III N. Vallileka I,II,III Dept. of Computer Applications,

More information

Randomized k-coverage Algorithms For Dense Sensor Networks

Randomized k-coverage Algorithms For Dense Sensor Networks Randomized k-coverage Algorithms For Dense Sensor Networks Mohamed Hefeeda School of Computing Science Simon Fraser University Surrey, BC, Canada Majid Bagheri School of Computing Science Simon Fraser

More information

Enhancing the pictorial content of digital holograms at 100 frames per second

Enhancing the pictorial content of digital holograms at 100 frames per second Enhancing the pictorial content of digital holograms at 100 frames per second P.W.M. Tsang, 1 T.-C Poon, 2 and K.W.K. Cheung 1 1 Department of Electronic Engineering, City University of Hong Kong, Hong

More information

Broadcast on Clusters of SMPs with Optimal Concurrency

Broadcast on Clusters of SMPs with Optimal Concurrency Broadcast on Clusters of SMPs ith Optimal Concurrency Yuzhong Sun +, David Bader +, and X. Lin * + Department of Electrical and Computer Engineering University of Ne Mexico * Department of Electrical and

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

Optidef A Latex library for optimization problems Version Jesus Lago May 23, 2018

Optidef A Latex library for optimization problems Version Jesus Lago May 23, 2018 Optidef A Latex library for optimization problems Version - 2.7 Jesus Lago May 23, 2018 1 Contents 1 Introduction and features 3 2 Using the package 3 3 Environment Syntax Definition 3 3.1 Definition of

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Neural networks in the re-engineering process based on construction drawings

Neural networks in the re-engineering process based on construction drawings Neural netorks in the re-engineering process based on construction draings S. Komoroski HOCHTIEF Construction AG, Bauen im Βestand NRW, Essen, Germany V. Berkhahn Institute of Computer Science in Civil

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

ExBCG-TC: Extended Borel Cayley Graph Topology Control for Ad Hoc Networks

ExBCG-TC: Extended Borel Cayley Graph Topology Control for Ad Hoc Networks Ex: Extended Borel Cayley Graph Topology Control for Ad Hoc Netorks Dongsoo Kim and Jaeook Yu Department of ECE Stony Brook University (SUNY) Stony Brook, NY 11794 2350 Email: {dongsoo.kim, jaeook.yu}@stonybrook.edu

More information

Border Surveillance using sensor based thick-lines

Border Surveillance using sensor based thick-lines Border Surveillance using sensor based thick-lines Ramzi Bellazreg, Noureddine Boudriga and Sunshin An + University of Carthage Tunisia and + Korea University Email : ramzi_bellazreg@yahoo.fr; noure.boudriga2@gmail.com;

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Time-Bounded Essential Localization for Wireless Sensor Networks

Time-Bounded Essential Localization for Wireless Sensor Networks IEEE TRANSACTIONS ON NETWORKING 1 Time-Bounded Essential Localization for Wireless Sensor Networks Wei Cheng, Member, IEEE, Nan Zhang, Member, IEEE, Xiuzhen Cheng, Senior Member, IEEE, Min Song, Senior

More information

Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces

Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces ERGUN AKLEMAN, JIANER CHEN Texas A&M University, College Station, Texas JONATHAN L. GROSS Columbia University, Ne York

More information

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus) Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.

More information

Inapproximability of the Perimeter Defense Problem

Inapproximability of the Perimeter Defense Problem Inapproximability of the Perimeter Defense Problem Evangelos Kranakis Danny Krizanc Lata Narayanan Kun Xu Abstract We model the problem of detecting intruders using a set of infrared beams by the perimeter

More information

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Cascaded Coded Distributed Computing on Heterogeneous Networks

Cascaded Coded Distributed Computing on Heterogeneous Networks Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,

More information

Ranking of Generalized Exponential Fuzzy Numbers using Integral Value Approach

Ranking of Generalized Exponential Fuzzy Numbers using Integral Value Approach Int. J. Advance. Soft Comput. Appl., Vol., No., July 010 ISSN 074-853; Copyright ICSRS Publication, 010.i-csrs.org Ranking of Generalized Exponential Fuzzy Numbers using Integral Value Approach Amit Kumar,

More information

K d (490) models characterisation Issue 1 revision 0 Gilbert Barrot, ACRI-ST 05/jul/2006

K d (490) models characterisation Issue 1 revision 0 Gilbert Barrot, ACRI-ST 05/jul/2006 K d (490) models characterisation Issue 1 revision 0 Gilbert Barrot, ACRI-ST 05/jul/2006 K d (490) is the diffuse attenuation coefficient at 490 nm. It is one indicator of the turbidity of the ater column.

More information

Optidef A Latex library for optimization problems Version Jesus Lago July 19, 2018

Optidef A Latex library for optimization problems Version Jesus Lago July 19, 2018 Optidef A Latex library for optimization problems Version - 3.0 Jesus Lago July 19, 2018 1 Contents 1 Introduction and features 4 2 Using the package 4 3 Environment Syntax Definition 4 3.1 Definition

More information

10.2 Single-Slit Diffraction

10.2 Single-Slit Diffraction 10. Single-Slit Diffraction If you shine a beam of light through a ide-enough opening, you might expect the beam to pass through ith very little diffraction. Hoever, hen light passes through a progressively

More information

New Graphs of Finite Mutation Type

New Graphs of Finite Mutation Type Ne Graphs of Finite Mutation Type Harm Derksen Department of Mathematics University of Michigan hderksen@umich.edu Theodore Oen Department of Mathematics Ioa State University oentheo@isu.edu Submitted:

More information

Sensor Stream Reduction For Clustered Wireless Sensor Networks

Sensor Stream Reduction For Clustered Wireless Sensor Networks Sensor Stream Reduction For Clustered Wireless Sensor Netorks André L. L. de Aquino 1, Carlos M. S. Figueiredo 2, Eduardo F. Nakamura 2, Alejandro C. Frery 3, Antonio A. F. Loureiro 1, Antônio Otávio Fernandes

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Barrier Information Coverage with Wireless Sensors

Barrier Information Coverage with Wireless Sensors This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 9 proceedings. Barrier Information Coverage with Wireless

More information

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering

More information

Superconcentrators of depth 2 and 3; odd levels help (rarely)

Superconcentrators of depth 2 and 3; odd levels help (rarely) Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv

More information

A dynamic programming algorithm for perceptually consistent stereo

A dynamic programming algorithm for perceptually consistent stereo A dynamic programming algorithm for perceptually consistent stereo The Harvard community has made this article openly available. Please share ho this access benefits you. Your story matters. Citation Accessed

More information

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu

More information

Inverse Analysis of Soil Parameters Based on Deformation of a Bank Protection Structure

Inverse Analysis of Soil Parameters Based on Deformation of a Bank Protection Structure Inverse Analysis of Soil Parameters Based on Deformation of a Bank Protection Structure Yixuan Xing 1, Rui Hu 2 *, Quan Liu 1 1 Geoscience Centre, University of Goettingen, Goettingen, Germany 2 School

More information

DTM Based on an Ellipsoidal Squares

DTM Based on an Ellipsoidal Squares DM Based on an Ellipsoidal Squares KRZYSZOF NAUS Institute of Navigation and Hydrography Polish Naval Academy Śmidoicza 69, 8-3 Gdynia POLAND k.naus@am.gdynia.pl Abstract: - he paper presents the description

More information

Efficient Line K-Coverage Algorithms in Mobile Sensor Network

Efficient Line K-Coverage Algorithms in Mobile Sensor Network Efficient Line K-Coverage Algorithms in Mobile Sensor Network Yang Wang, Shuang Wu, Xiaofeng Gao (B), Fan Wu, and Guihai Chen Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

Edge intersection graphs. of systems of grid paths. with bounded number of bends

Edge intersection graphs. of systems of grid paths. with bounded number of bends Edge intersection graphs of systems of grid paths with bounded number of bends Andrei Asinowski a, Andrew Suk b a Caesarea Rothschild Institute, University of Haifa, Haifa 31905, Israel. b Courant Institute,

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang LI 1,a, Qiu-shi HAN 1, Wei-hua LI 2 and Bao-ying PENG 1

Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang LI 1,a, Qiu-shi HAN 1, Wei-hua LI 2 and Bao-ying PENG 1 07 nd International Conference on Applied Mechanics, Electronics and Mechatronics Engineering (AMEME 07) ISBN: 978--60595-497-4 Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang

More information

Lecture 1: Turtle Graphics. the turtle and the crane and the swallow observe the time of their coming; Jeremiah 8:7

Lecture 1: Turtle Graphics. the turtle and the crane and the swallow observe the time of their coming; Jeremiah 8:7 Lecture 1: Turtle Graphics the turtle and the crane and the sallo observe the time of their coming; Jeremiah 8:7 1. Turtle Graphics Motion generates geometry. The turtle is a handy paradigm for investigating

More information

Comp Online Algorithms

Comp Online Algorithms Comp 7720 - Online Algorithms Notes 4: Bin Packing Shahin Kamalli University of Manitoba - Fall 208 December, 208 Introduction Bin packing is one of the fundamental problems in theory of computer science.

More information

Optimizing Query Injection from Mobile Objects to Sensor Networks

Optimizing Query Injection from Mobile Objects to Sensor Networks Optimizing Query Injection from Mobile Objects to Sensor Networks Shourui Tian and Sol M. Shatz Department of Computer Science University of Illinois at Chicago Chicago, IL 60607 USA {stian,shatz}@cs.uic.edu

More information

Max-Flow Protection using Network Coding

Max-Flow Protection using Network Coding Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State

More information

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout Tail Inequalities Wafi AlBalawi and Ashraf Osman Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV fwafi,osman@csee.wvu.edug 1 Routing in a Parallel Computer

More information

arxiv: v2 [cs.cg] 24 Jul 2011

arxiv: v2 [cs.cg] 24 Jul 2011 Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract arxiv:116.855v2 [cs.cg] 24 Jul 211 What is the minimum angle α > such that given any set of α-directional antennas (that

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

CHAPTER 4 VORONOI DIAGRAM BASED CLUSTERING ALGORITHMS

CHAPTER 4 VORONOI DIAGRAM BASED CLUSTERING ALGORITHMS CHAPTER 4 VORONOI DIAGRAM BASED CLUSTERING ALGORITHMS 4.1 Introduction Although MST-based clustering methods are effective for complex data, they require quadratic computational time which is high for

More information

Graph theory - solutions to problem set 1

Graph theory - solutions to problem set 1 Graph theory - solutions to problem set 1 1. (a) Is C n a subgraph of K n? Exercises (b) For what values of n and m is K n,n a subgraph of K m? (c) For what n is C n a subgraph of K n,n? (a) Yes! (you

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Parameterized Complexity of Independence and Domination on Geometric Graphs

Parameterized Complexity of Independence and Domination on Geometric Graphs Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de

More information

Maximizing Angle Coverage in Visual Sensor Networks

Maximizing Angle Coverage in Visual Sensor Networks Maximizing Angle Coverage in Visual Sensor Networks Kit-Yee Chow, King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam Road, Hong Kong,

More information

Industrial Data Communications - Fundamentals

Industrial Data Communications - Fundamentals Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous

More information

The 4/5 Upper Bound on the Game Total Domination Number

The 4/5 Upper Bound on the Game Total Domination Number The 4/ Upper Bound on the Game Total Domination Number Michael A. Henning a Sandi Klavžar b,c,d Douglas F. Rall e a Department of Mathematics, University of Johannesburg, South Africa mahenning@uj.ac.za

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

Geometric Unique Set Cover on Unit Disks and Unit Squares

Geometric Unique Set Cover on Unit Disks and Unit Squares CCCG 2016, Vancouver, British Columbia, August 3 5, 2016 Geometric Unique Set Cover on Unit Disks and Unit Squares Saeed Mehrabi Abstract We study the Unique Set Cover problem on unit disks and unit squares.

More information

REAL-TIME 3D GRAPHICS STREAMING USING MPEG-4

REAL-TIME 3D GRAPHICS STREAMING USING MPEG-4 REAL-TIME 3D GRAPHICS STREAMING USING MPEG-4 Liang Cheng, Anusheel Bhushan, Renato Pajarola, and Magda El Zarki School of Information and Computer Science University of California, Irvine, CA 92697 {lcheng61,

More information

Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces

Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces ERGUN AKLEMAN, JIANER CHEN Texas A&M University, College Station, Texas and JONATHAN L. GROSS Columbia University, Ne

More information