Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks
|
|
- Anna Patterson
- 5 years ago
- Views:
Transcription
1 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks Optimized Barrier Location for Barrier Coverage in Mobile Sensor Netorks Xiaoyun Zhang, Mathe L. ymore, and Daji Qiao Ioa State University, Ames, IA 5 {zxydut, mlymore, daji}@iastate.edu Abstract Barrier coverage is an important application of sensor netorks. This paper studies ho to build a strong barrier ith mobile sensors in hich the maximum moving distance of sensors is minimized. Our ork differs from others in the ay the y-coordinate of the barrier is determined. e optimize the y-coordinate of the barrier instead of fixing it a priori. An efficient algorithm is proposed, in hich the search space of the y-coordinate of the barrier is first discretized and then searched over iteratively. In the theoretical orst case, O(N 4 ) iterations may be needed to find the optimal barrier location, here N is the number of sensors, but in practice, our algorithm requires less than O(N 2 ) iterations, as confirmed in simulation. I. INTRODUCTION Intruder detection and border surveillance are intuitive applications of sensor netorks. In these applications, sensors are deployed along the perimeter of a protected area such that no intruder can cross the perimeter ithout being detected. The arrangement of sensors for this purpose is referred to as the barrier coverage problem in sensor netorks. Early research in barrier coverage focused on static sensors [] [4]. Different kinds of barrier coverage ere defined and the corresponding critical densities of sensors ere calculated. Also, various schemes ere proposed to identify the barriers formed by static sensors. More recent research has examined barrier coverage ith mobile sensors [5] [8]. The primary focus of these papers has been minimizing the moving distances of sensors hen building the barrier. These orks either restricted the sensors deployment and movement regions to a -dimensional (D) line, or fixed the y-coordinate of the barrier if considering a 2-dimensional (2D) rectangular deployment region ith the minimum number of sensors. In practice, it is difficult to deploy sensors along a D line, and in the 2D case, fixing the y-coordinate of the barrier a priori results in a suboptimal solution, since the y-coordinate of the barrier affects the moving distance of sensors. In this paper, e study the strong barrier coverage problem in a 2D rectangular region, here the goal is to detect intruders that may follo any path to cross the deployment region. This is in contrast to eak barrier coverage, hich deals ith intruders that only perpendicularly cross the deployment region. e assume that a strong barrier is formed ith the minimum number of sensors, along a horizontal line that spans the length of the deployment region. e present an algorithm that decides the optimal y-coordinate of the barrier, and identifies a subset of sensors to move to their corresponding destinations, so that the maximum moving distance of sensors is minimized. To achieve this, our algorithm first discretizes the search space for the y-coordinate of the barrier, then quickly iterates over this discretized search space. Simulation results sho that our algorithm is efficient and scalable. The rest of this paper is organized as follos. In Section II, e discuss related ork in detail. In Section III, the system model is presented and the problem is formally defined. e present our algorithm in Section IV and evaluate it in Section V. Finally, e conclude this paper in Section VI. II. RELATED ORK Various D mobile barrier coverage problems have been studied in [5, 9, ]. In these papers, mobile sensors are initially deployed on the line here the barrier ill be built, then the sensors move along this line to form the barrier. The sensors move according to various objectives, such as minimizing the maximum (min-max) or the sum (min-sum) of moving distances, maximizing the coverage, or minimizing the number of moving sensors. Regardless of the objective, the y-coordinate of the barrier is not considered because the sensors are assumed to already be on the line. Barrier coverage has also been studied for mobile sensors deployed in a 2D region. Bhattacharya et al. [5] solved the min-max and min-sum problems for sensors moving from a circle s interior to its circumference to form a barrier. Their algorithm optimizes an angle variable, analogous to our y- coordinate of the barrier. Hoever, their solution cannot be applied to our problem due to different search spaces of the angle variable and the y-coordinate, and the difference in ho these factors decide sensors final positions. Saipulla et al. [6] studied the min-max problem of forming a barrier ith a minimum number of mobile sensors in a rectangular region. Hoever, they fixed the y-coordinate of the barrier a priori. Shen et al. [7] did not fix the y-coordinate of the barrier in their investigation into the min-sum problem for a rectangular region, but they instead fixed the order of sensors along the barrier. In contrast, our algorithm does not fix either the y- coordinate or the order of the sensors along the barrier, thus alloing for optimal min-max results ith no assumptions about ho the sensors are deployed. Distributed algorithms have also been proposed for the barrier coverage problem [7, 8,, 2], but the goal of these algorithms is usually to reduce the communication beteen sensors. They are suboptimal hen considering objectives such as min-max or min-sum of sensors moving distances. III. SYSTEM MODEL AND PROBLEM STATEMENT A. System Model ) Sensor Netork: e study a netork of N mobile sensors deployed in a long rectangular region of size L, /5/$3. 25 IEEE 572
2 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks here L, as shon in Fig.. Sensors are named s to s N from left to right of the deployment region, and the initial position of sensor s i is denoted by (x i, y i ). The set of all the sensors is denoted by S. e adopt the idely-used disk coverage model and denote the coverage radius as R. An intruder can be detected by a sensor if and only if it is ithin R of the sensor. In addition, e assume sensors can acquire their positions from GPS or another localization scheme. y Exit side s s2 s3 t t2 t3 t4 t5 t6 t47 t48 t49 t5 s4 s6 s49 s5 R s5 Entrance side... s47 intruder path Fig.. An example sensor netork of 5 mobile sensors. 2) Intruder and Barrier: e assume that intruders may take any path to cross the deployment region from bottom to top, as shon in Fig.. In order to detect such intruders, strong barrier coverage is required. This is in contrast to eak barrier coverage, hich assumes intruders only take paths perpendicular to the x-axis of the deployment region. The minimum number of sensors needed to form a strong barrier is N min = L 2R. For simplicity, and ithout loss of generality, e assume that L is a multiple of 2R; hence, N min = L 2R. To form a strong barrier ith N min sensors, hich is the focus of our study in this paper, these sensors must be aligned along a horizontal line parallel to the x-axis of the deployment region. In other ords, the destination positions of these sensors (denoted by t j, j N min ) must have the coordinates of (α j, j ), here α j = (2j )R, j N min, and = 2 = = Nmin. e use T to denote the set of destination positions, and use to denote their common y- coordinate, called the barrier location. 3) System: e assume that the sensor netork remains connected during sensor movement, and that there is a central processing unit hich collects information from sensors, executes the proposed algorithm, and disseminates the movement strategy to sensors. B. Problem Statement Our goal is to minimize the maximum moving distance of mobile sensors that form a strong barrier, ith selected N min sensors from a netork of N (N N min ) sensors ith knon initial positions. More specifically, our algorithm must decide () here the barrier shall be formed, i.e., the optimal barrier location, denoted by opt ; and (2) ho to form the barrier at opt, i.e., the optimal sensor movement strategy, hich can be described as a mapping function M opt from S to T. In general, a mapping function M : S T is defined as follos: M(i) = j means that sensor s i moves to destination t j, hile M(i) = means that sensor s i remains stationary. Sensors not used in the initial barrier may participate in forming future barriers after the operational lifetime of the current barrier has expired. Formally, the problem e try to address in this paper is described as follos: Given: rectangular deployment region: L coverage radius: R s48 L x total number of deployed sensors: N initial sensor positions: (x i, y i ) for each s i S x-coordinate of the destinations: α j for each t j T Output: optimal barrier location opt and sensor movement strategy M opt : { opt, M opt } = arg min D(M, ) here {,M} (xi ) 2 D(M, ) = max α M(i) + (yi ) 2. s i S,M(i) Constraint: opt Essentially, e solve a min-max problem. Our motivation is the assumption that the sensor ith the maximum moving distance runs out of energy first, hich ould break the barrier. Therefore, our scheme produces a barrier ith the longest operational lifetime. e use D(M, ) to denote the maximum moving distance of the sensors hen they follo strategy M to form a barrier at location. e restrict the barrier location beteen and. IV. PROPOSED SCHEME A. Overvie of the Proposed Scheme To determine the optimal barrier location opt, e first reduce its search space from a continuous range [, ] to a discrete set ith less than N 2 Nmin 2 points, hich are called candidate barrier locations. Afterards, e propose an efficient iterative algorithm to search over this discrete set. The orst-case number of iterations is O(N 2 Nmin 2 ), but in practice, our algorithm uses approximately O(NN min ) iterations. B. Identification of Candidate Barrier Locations Candidate barrier locations are derived from the minimum and intersection points of the group of functions defined belo. Definition (Function of Moving Distance). Suppose a sensor s i moves to a destination t j. The moving distance of s i can be represented as a function of the barrier location, i.e., f i,j () = [x i (2j )R] 2 + (y i ) 2, () here. e use F to denote the set of all f associated ith a sensor netork of N sensors, i.e., F = {f i,j () i N, j N min, }. (2) For simplicity, e also define f i, () =, i,. ith these functions defined, e can no define the candidate barrier locations. Definition 2 (Candidate Barrier Locations). The set of candidate barrier locations is Φ = Φ mins Φ ints, here Φ mins = { arg min f i,j()} includes all the values f i,j F that yield a minimum value for at least one of the f i,j functions in F ; Φ ints = { f i,j () = f m,n()} includes all the f i,j F,f m,n F values at hich to functions in F intersect. Let Φ denote the total number of candidates in Φ. e sort these candidates in ascending order and name them {K i i =,, Φ }. Let Φ mins and Φ ints denote the number 573
3 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks of candidates in Φ mins and Φ ints, respectively. Then, e have O(N 4 ) candidates, as follos: Φ = Φ mins + Φ ints ( NNmin ) NN min + = O(N 2 N 2 2 min ) = O(N 4 ). (3) Fig. 3 plots all the functions in F corresponding to the sensor netork shon in Fig. 2. In this example, Φ mins = 3, Φ ints =, and Φ = 3. s 3 t t 2 s t 3 s 2 L Initial Position Destination Position Fig. 2. An example sensor netork of 3 mobile sensors. { } = min max f i,m(i)(k j ), max f i,m(i)(k j+ ) i N i N = min {D (M, K j ), D (M, K j+ )}. (7) C. Iterative Algorithm ith the candidate barrier locations being identified, e further reduce the search complexity by proposing an iterative algorithm in hich only a small portion of candidates are checked. Fig. 4 shos the flochart of our iterative algorithm, hich is explained in detail next. Initialization: curr =, opt = curr, M opt =, D opt = Customized Bottleneck Bipartite Matching 25 f,3 G(V,E) : V = S T, E = {(s i,t j ) s i S,t j T}, eight(s i,t j ) = f i,j ( + curr ) 2 f 2,3 M =Bottleneck Bipartite Matching(G) f ij () 5 f,2 f 3, f 2,2 i = argmaxf i,m (i)( curr + ) i 5 f, f 2, K K 2 K 3 K 4 K 5 K 6 K 7 K 8 K 9 K K K 2 Fig. 3. For the example netork in Fig. 2, there are 9 functions in F and 3 candidate barrier locations. Φ mins = {K 3, K 4, K 3 } and Φ ints = {K, K 2, K 5, K 6, K 7, K 8, K 9, K, K, K 2 }. The optimal barrier location opt is guaranteed to be at one of the candidate barrier locations, as Theorem belo proves, any movement strategy M for a barrier at any beteen to adjacent candidate locations can alays yield a smaller maximum moving distance at one of these to candidates. Theorem. M, (K j, K j+ ), here j Φ, D(M, )> min {D (M, K j ), D (M, K j+ )}. Proof: Let s i denote the sensor that has the maximum moving distance in M at. This means f 3,2 K 3 i, f i,m(i) () f i,m(i )(). (4) Since K j and K j+ are adjacent candidate locations, no other functions in F intersect beteen them. Therefore, (4) implies that { fi,m(i) (K j ) f i,m(i )(K j ), i, (5) f i,m(i) (K j+ ) f i,m(i )(K j+ ), i. In other ords, f i,m(i )(K j ) = max f i,m(i)(k j ), i N f i,m(i )(K j+ ) = max f i,m(i)(k j+ ). i N Moreover, according to the definition of candidate barrier locations, all the functions in F are monotone beteen to adjacent candidates such as K j and K j+. Therefore, e have: D(M, ) = max f i,m(i)() = f i i N,M(i )() (Definition) > min { f i,m(i )(K j ), f i,m(i )(K j+ ) } (Monotone) (6) D(M, curr ) = max i N f i,m (i)( curr ) D(M, curr ) < D opt? no Continue ith the Next Candidate next = min{k j K j > curr,k j Φ i,m (i )} Does next exist? no STOP, output M opt, opt yes Update: opt = curr, M opt = M, D opt = D(M, curr ) yes curr = next Fig. 4. Flochart of the iterative algorithm (note that + curr = curr + δ). The algorithm starts ith curr =. After initialization ith the optimal min-max moving distance D opt set to infinity, the Bottleneck Bipartite Matching (BBM) algorithm [3] is applied to determine the best movement strategy for the current barrier location as follos. The input to BBM is a eighted bipartite graph G(V, E): V = S T here S is the set of sensors, T is the set of destinations along curr ; E = {(s i, t j ) s i S, t j T }; eight(s i, t j ) = f i,j ( curr) + here curr + = curr +δ and δ is a positive offset hich is sufficiently small so that curr + does not reach the next candidate in Φ. Recall that f i,j is the function of moving distance for sensor s i to reach destination t j. BBM returns a max-cardinality matching hose maximum edge eight is minimized. In other ords, it produces a 574
4 f ij () 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks movement strategy hich minimizes the maximum moving distance of sensors from their initial positions to the destination positions along curr. In this customized BBM algorithm, the offset δ is used as a tie breaker in case there are multiple movement strategies that all yield the same min-max moving distance at curr. For example, in Fig. 5, at curr = K 2, there exist to such movement strategies: M = { 2, 2, 3 3} and M 2 = {, 2 2, 3 3}. By adding a small offset, the tie is broken and M 2 is chosen hich yields a smaller maximum moving distance than M at K 2 +. This serves as an important base for the next round of iteration, as shon in the proof of Theorem 2. As shon in the flochart, e record the output of the customized BBM algorithm as follos: M : the min-max matching at + curr; i : the index of the sensor that has the maximum moving distance in M at + curr; D(M, curr ): the min-max moving distance at curr. The next candidate location to check is next = min{k j K j > curr, Kj Φ i,m (i )}, (8) here Φ i,m (i ) is the set of candidates along f i,m (i ) hich is formally defined belo. Definition 3 (Candidate Barrier Locations along f i,j ). The set of candidate barrier locations along the f i,j function is Φ i,j = Φ mins i,j Φints, here i,j Φ mins i,j = { arg min f i,j()} includes the value at hich f i,j achieves its minimum; Φ ints i,j = { f i,j () = f m,n()} includes all the f m,n F values at hich f i,j intersects ith another function in F. Note that next is the first candidate location along the f i,m (i ) function after curr. There might exist other candidate locations beteen curr and next but belong to a different f function, hich are skipped in our iterative algorithm to reduce the search complexity. For example, in Fig. 5, the next candidate to check after K 2 is K 6. It is determined ith the folloing steps: () the min-max matching at K 2 + is M = {, 2 2, 3 3}; (2) the sensor that has the maximum moving distance in M at K 2 + is s 3; (3) the first candidate along after K 2 is K 6. Comparing Fig. 5 ith Fig. 3, e can see that candidate locations K 3, K 4, and K 5 are skipped. The reason hy these candidate locations can be skipped is that, as e ill sho in Theorem 2, at any beteen curr and next, the maximum moving distance of any movement strategy is alays larger than or equal to that of M at curr or next. Theorem 2. M, [ curr, next ], here curr is the current candidate location in the iterative algorithm, and next is the next candidate location to check as defined in (8), e alays have D(M, ) min {D(M, curr ), D(M, next )}, here M is the min-max matching at curr. + Proof: Recall that i is the index of the sensor that has the maximum moving distance in M at + curr, i.e., i = arg max f i,m i (i)( curr). + (9) Iteration # Iteration #2 Iteration #3 Iteration #4 f,2 f 2,2 f 2,3 f,3 f 3, ( opt,d opt ) f2,2 f 5 f, f, f 2, 3,2 K 2 K 6 K 2 Fig. 5. The iterative algorithm starts ith curr =. Iteration #: The minmax matching at curr + is { 2, 2, 3 3}, in hich s 3 has the maximum moving distance at curr. + The next candidate to check is the first candidate location along after curr =, hich is K 2. Iteration #2: The minmax matching at K + 2 is {, 2 2, 3 3}, in hich s 3 has the maximum moving distance at K + 2. The next candidate to check is the first candidate along after K 2, hich is K 6. The same process repeats for Iteration #3 and Iteration #4 till the algorithm terminates. Therefore, the folloing inequality holds for all i: f 2,2 f, f i,m (i )( + curr) f i,m (i)( + curr). () As next is the first candidate location along the f i,m (i ) function after curr, no other functions in F intersect ith f i,m (i ) beteen curr and next. Consequently, e have: [ curr, next ], i, f i,m (i )() f i,m (i)(). () Hence, e have: [ curr, next ], f i,m (i )() = D(M, ). (2) On the other hand, let i denote the index of the sensor that has the maximum moving distance in M at + curr, i.e., i = arg max f i,m i (i)( curr). + (3) As M is the min-max matching at + curr, e have: f i,m (i )( + curr) f i,m (i )( + curr). (4) Similarly, due to the fact that no other functions in F intersect ith f i,m (i ) beteen curr and next, e have: [ curr, next ], f i,m (i )() f i,m (i )(). (5) As the definition of D(M, ) implies: e have: D(M, ) = max f i,m i N (i)() f i,m (i )(), (6) [ curr, next ], D(M, ) f i,m (i )(). (7) Furthermore, as the f i,m (i ) function is monotone beteen curr and next, (7) implies: [ curr, next ], D(M, ) min{f i,m (i )( curr ), f i,m (i )( next )}. Finally, by combining (2) ith (8), e have: [ curr, next ], D(M, ) min{d(m, curr), D(M, next)}. (8) (9) 575
5 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks The algorithm terminates hen next cannot be found, meaning that e have completed the search over the entire range [, ]. Fig. 5 illustrates the iterative algorithm ith an example and the iteration process is explained in its caption. D. Complexity Analysis In theory, there is a total of O(N 2 Nmin 2 ) candidates in Φ, hich means that, in the orst case, e may need O(N 2 Nmin 2 ) iterations to complete the search. Hoever, in practice, the number of iterations is more comparable to O(NN min ). This is because our algorithm checks the candidate barrier locations iteratively along a continuous function that is composed of multiple sections from different f functions. In other ords, in each iteration, our algorithm only checks the candidate locations along a particular section of a single f function. Thus, the total number of checked locations is on the same order as the number of candidate locations along a single f function, hich is O(NN min ). In Section V, e validate this complexity analysis by simulation. V. EVALUATION RESULTS e evaluate our algorithm by simulating to types of sensor deployment: random uniform deployment, and linebased deployment. In both scenarios, e compare the optimal min-max moving distance found by our algorithm to that of a naive algorithm that fixes the barrier location to 2, hich is the middle point of the deployment region. e refer to our algorithm as Opt and the naive algorithm as Mid. The time complexity of our algorithm is also evaluated in terms of the number of checked candidate locations. A. Uniform Deployment e first evaluate our algorithm ith a random uniform deployment of N sensors in an L region. ) Min-max Moving Distance: Fig. 6 shos the min-max moving distances of the to algorithms varying ith N in the uniform case. e test different sizes of deployment region. For each size, the effect of redundant sensors on the min-max moving distance is also tested. e first note that, regardless of the size of the deployment region, the min-max moving distance of both algorithms decreases as the number of sensors increases. This is an intuitive result, as more sensors deployed in the area means a higher chance that one or more sensors ill already be close to each final destination. e also note that, regardless of the size of the deployment region, Opt outperforms Mid more hen N is larger. This is because the horizontal moving distance tends to dominate the overall 2D moving distance as L, but as the number of sensors increases, the horizontal moving distance decreases. Therefore, the benefit of optimizing vertical moving distance becomes relatively larger. Finally, e note from Fig. 6(b) that, given the same L and N, the difference beteen Opt and Mid is larger hen is larger. This is again due to the increased proportion of vertical distance in the total moving distance. Fig. 6 shos the average min-max moving distances of Opt and Mid. To further illustrate the improvement of Opt over Mid, Fig. 7 presents the cumulative distribution function (CDF) of the absolute and relative improvement of Opt over (m) Opt, L=5, =5 Mid, L=5, =5 Opt, L=, =5 Mid, L=, =5 Opt, L=2, =5 Mid, L=2, = N (a) Fixed and varying L. (m) Opt,L=,=2 Mid,L=,=2 Opt,L=,=5 Mid,L=,=5 Opt,L=,= Mid,L=,= 5 5 N (b) Fixed L and varying. Fig. 6. Min-max moving distance hen N sensors are uniformly deployed in an L region. The coverage radius of each sensor is R = m. Mid in terms of min-max moving distance, hich is a result of trials for each of three different setups shon in the figure. In the scenario here N = 5, Opt has a min-max moving distance hich is on average 2.5 m or.2% less than that of Mid, but in around 4% of the trials, the improvement is greater. In the most extreme case, Opt reduces the min-max moving distance by 9.4 m or 38%. Similar observations can be made for the other to setups..6 L=,=5,N=5 L=,=5,N= L=,=5,N= Absolute improvement (m).5 L=,=5,N=5 L=,=5,N= L=,=5,N= Relative improvement (%) Fig. 7. CDF of the absolute and relative improvement of Opt over Mid in terms of min-max moving distance. 2) Number of Checked Candidate Locations: Table I shos the number of total and checked candidate locations of selected experiments from the uniform scenario. Total is the number of candidates in Φ, hich is up to N 2 Nmin 2, hile check is the number of candidates checked in our iterative algorithm. hen N, L, or increases, the number of total and checked candidates increases accordingly. Hoever, in any scenario, only a small portion of candidates are checked, ith a number even less than NN min, hich indicates that our algorithm is efficient and scalable. For example, hen L = 2 m, = m, N min =, given N = 3 sensors, NN min = 3, but only 783 candidates are checked. TABLE I TOTAL AND CHECKED CANDIDATES FOR THE UNIFORM DEPLOYMENT CASE. R = M AND N MIN = L/2R. L=,=5 N min = 5 L=2,=5 N min = L=2,= N min = N total check N total check N total check B. Line-based Deployment The second deployment scenario is the line-based sensor deployment strategy proposed in [4], here N sensors are deployed in an L region along the line of y = 2. Each sensor s i is deployed at its final position [(2j )R, 2 ] ith a random x-axis error δi x and y-axis error δ y i, here 576
6 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks δi x, δy i N(, σ). In practice, this error could be the result of ind or other environmental conditions during an air drop. hen redundant sensors are deployed, sensors are assumed to be dropped in groups, e.g., for N = 2N min, to sensors are dropped at each position. ) Min-max Moving Distance: Fig. 8(a) shos the minmax moving distances of Opt and Mid ith varying σ. As σ increases, the min-max moving distances of both Opt and Mid increase, because the sensors tend to be initially deployed farther from their final positions. Also, as σ increases, Opt outperforms Mid more. This is because hen σ is larger, the sensors ill be scattered in a ider region. It is more necessary to optimize the vertical moving distance in this case. Interestingly, hen σ is fixed, the difference beteen Opt and Mid is larger hen N is smaller, hich is the opposite of the observations in the uniform deployment case. This is due to the folloing reasons. Firstly, hen N increases and multiple sensors are dropped at each point, e tend to have a combination of sensors that yields an optimal barrier location close to 2 ; therefore, the difference beteen the vertical moving distance of Opt and Mid is smaller. Secondly, the vertical and horizontal moving distances are comparable in the line-based deployment case; hence, the reduction of the vertical moving distance can be reflected in the overall 2D moving distance. (m) Opt, N=5 Mid, N=5 Opt, N= Mid, N= Opt, N=5 Mid, N= σ (m) (a) Min-max moving distance vs. σ given three different N values..59 σ=5,n=5 σ=5,n=5 σ=2,n=5 σ=2,n= Absolute improvement (m) (b) CDF of the absolute improvement of Opt over Mid in terms of min-max moving distance. Fig. 8. The min-max moving distance for the line-based deployment strategy, ith L = m, = 5 m, R = m, and N min = 5. Similar to before, e plot in Fig. 8(b) the CDF of the improvement of Opt over Mid in four different setups. e can see that hen σ = 2 m and N = 5, on average, the min-max moving distance of Opt is 4.6 m or 8.7% less than Mid. In the most extreme case, the min-max moving distance of Opt may be up to 9.3 m or 36% less than Mid. Similar observations can be made for the other setups. 2) Number of Checked Candidate Locations: Table II shos the number of total and checked candidate locations of selected experiments from the line-based deployment scenario. Similar to before, hen N or σ increases, the number of total and checked candidates increases, but only a small proportion of the total candidates are checked in any scenario. C. Discussions As shon above, our proposed scheme outperforms the scheme that fixes the barrier location, significantly in terms of the min-max moving distance, thus saving much energy on sensor movement. As a tradeoff, it may increase the computational complexity at the central processing unit, hich usually is much more poerful than sensor nodes and has TABLE II TOTAL AND CHECKED CANDIDATES FOR THE LINE-BASED DEPLOYMENT CASE. L = M, = 5 M, R = M, AND N MIN = 5. N σ = 5 σ = 2 total check total check a sustainable poer supply. On the other hand, these to schemes incur the same communication overhead, as both algorithms are executed by the central processing unit thus all sensors need to report their initial positions to there. VI. CONCLUSIONS AND FUTURE ORK In conclusion, e have shon that our proposed algorithm reduces the min-max moving distance for mobile sensors in a barrier coverage netork by determining the optimal barrier location, instead of fixing it a priori. Depending on the deployment scheme, this reduction can be up to 38% of the min-max moving distance obtained by an algorithm that uses an intuitive fixed barrier location. Additionally, simulation results sho that our proposed algorithm for finding the optimal barrier location is both efficient and scalable. Future ork includes extending the proposed scheme to K-barrier coverage and to use the probabilistic coverage model, in hich sensors may collaborate ith each other to further reduce the moving distance and the number of sensors used. ACKNOLEDGMENT Xiaoyun Zhang ould like to thank China Scholarship Council for the financial support. REFERENCES [] S. Kumar, T. H. Lai, and A. Arora, Barrier coverage ith ireless sensors, in Proc. of ACM MobiCom, Aug. 25. [2] B. Liu, O. Dousse, J. ang, and A. Saipulla, Strong barrier coverage of ireless sensor netorks, in Proc. of ACM MobiHoc, May 28. [3] A. Chen, S. Kumar, and T. H. Lai, Designing localized algorithms for barrier coverage, in Proc. of ACM MobiCom, Sept. 27. [4] G. Yang and D. Qiao, Barrier information coverage ith ireless sensors, in Proc. of IEEE INFOCOM, Apr. 29. [5] B. Bhattacharya, B. Burmester, Y. Hu, E. Kranakis, Q. Shi, and A. iese, Optimal movement of mobile sensors for barrier coverage of a planar region, in Proc. of COCOA, Aug. 28. [6] A. Saipulla, B. Liu, G. Xing, X. Fu, and J. ang, Barrier coverage ith sensors of limited mobility, in Proc. of ACM MobiHoc, Sep. 2. [7] C. Shen,. Cheng, X. Liao, and S. Peng, Barrier coverage ith mobile sensors, in Proc. of IEEE I-SPAN, May 28. [8] M. Eftekhari, E. Kranakis, D. Krizanc, O. Morales-Ponce, L. Narayanan, J. Opatrny, and S. Shende, Distributed algorithms for barrier coverage using relocatable sensors, in Proc. of ACM PODC, July 23. [9] J. Czyzoicz, E. Kranakis, D. Krizanc, I. Lambadaris, L. Narayanan, J. Opatrny, L. Stacho, J. Urrutia, and M. Yazdani, On minimizing the sum of sensor movements for barrier coverage of a line segment, in Proc. of ADHOC-NO, Aug. 2. [] M. Mehrandish, L. Narayanan, and J. Opatrny, Minimizing the number of sensors moved on line barriers, in Proc. of IEEE CNC, 2. [] T. M. Cheng and A. V. Savkin, A distributed self-deployment algorithm for the coverage of mobile ireless sensor netorks, IEEE Communications Letters, vol. 3, no., pp , 29. [2] L. Kong, X. Liu, Z. Li, and M.-Y. u, Automatic barrier coverage formation ith mobile sensor netorks, in Proc. of IEEE ICC, 2. [3] A. P. Punnen and K. Nair, Improved complexity bound for the maximum cardinality bottleneck bipartite matching problem, Discrete Applied Mathematics, vol. 55, no., pp. 9 93, 994. [4] A. Saipulla, C. estphal, B. Liu, and J. ang, Barrier coverage of linebased deployed ireless sensor netorks, in Proc. of IEEE INFOCOM, April
Non-linear Barrier Coverage using Mobile Wireless Sensors
Non-linear Barrier Coverage using Mobile Wireless Sensors arxiv:1611.07397v1 [cs.ni] 22 Nov 2016 Ashutosh Baheti Dept. of Computer Sc. & Engineering Indian Institute of Technology, Kharagpur Kharagpur,
More informationComplexity of Barrier Coverage with Relocatable Sensors in the Plane
Complexity of Barrier Coverage with Relocatable Sensors in the Plane Stefan Dobrev 1, Stephane Durocher 2, Mohsen Eftekhari 3, Konstantinos Georgiou 4, Evangelos Kranakis 5, Danny Krizanc 6, Lata Narayanan
More informationAlgorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain
Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University
More informationA study of sensor movement and selection strategies for strong barrier coverage
Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2017 A study of sensor movement and selection strategies for strong barrier coverage Xiaoyun Zhang Iowa State
More informationLocalized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks
1 Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Netorks Yu Wang Xiang-Yang Li Department of Computer Science, University of North Carolina at Charlotte, 9201 University
More informationarxiv:cs/ v1 [cs.ds] 18 May 2002
arxiv:cs/0205041v1 [cs.ds] 18 May 2002 Faster Parametric Shortest Path and Minimum Balance Algorithms Neal E. Young Computer Science Department, Princeton University, Princeton, Ne Jersey, 08544 Robert
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationIndexing Methods for Moving Object Databases: Games and Other Applications
Indexing Methods for Moving Object Databases: Games and Other Applications Hanan Samet Jagan Sankaranarayanan Michael Auerbach {hjs,jagan,mikea}@cs.umd.edu Department of Computer Science Center for Automation
More informationEfficient k-coverage Algorithms
School of Computing Science Simon Fraser University, Canada Efficient k-coverage Algorithms for Wireless Sensor Networks (joint work with Majid Bagheri) INFOCOM Minisymposium 07 7 May 2007 1 Motivations
More informationAutomatic Deployment and Formation Control of Decentralized Multi-Agent Networks
Automatic Deployment and Formation Control of Decentralized Multi-Agent Netorks Brian S. Smith, Magnus Egerstedt, and Ayanna Hoard Abstract Novel tools are needed to deploy multi-agent netorks in applications
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationAn Analysis of Interference as a Source for Diffraction
J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction
More informationPARTICLE SWARM OPTIMIZATION (PSO) [1] is an
Proceedings of International Joint Conference on Neural Netorks, Atlanta, Georgia, USA, June -9, 9 Netork-Structured Particle Sarm Optimizer Considering Neighborhood Relationships Haruna Matsushita and
More informationEstimating the Free Region of a Sensor Node
Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We
More informationFast and Scalable Conflict Detection for Packet Classifiers
Fast and Scalable Conflict Detection for Packet Classifiers Florin Baboescu, George Varghese Dept. of Computer Science and Engineering University of California, San Diego 95 Gilman Drive La Jolla, CA9293-4
More informationSpatial-Temporal Coverage Optimization in Wireless Sensor Networks
1 Spatial-Temporal Coverage Optimization in Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 168
More informationImplementation of a Turbo Encoder and Turbo Decoder on DSP Processor-TMS320C6713
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X,.ijerd.com Volume 2, Issue 5 (July 2012), PP. 37-41 Implementation of a Turbo Encoder and Turbo Decoder
More informationMixture models and clustering
1 Lecture topics: Miture models and clustering, k-means Distance and clustering Miture models and clustering We have so far used miture models as fleible ays of constructing probability models for prediction
More informationProject 1: Creating and Using Multiple Artboards
E00ILCS.qxp 3/19/2010 1:0 AM Page 7 Workshops Introduction The Workshop is all about being creative and thinking outside of the box. These orkshops ill help your right-brain soar, hile making your left-brain
More informationStretch-Optimal Scheduling for On-Demand Data Broadcasts
Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu
More informationPARALLEL LAGRANGE INTERPOLATION ON EXTENDED FIBONACCI CUBES
STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume L, Number 1, 2005 PARALLEL LAGRANGE INTERPOLATION ON EXTENDED FIBONACCI CUBES IOANA ZELINA Abstract. In this paper is presented a parallel algorithm for computing
More informationOptimal time-delay spiking deconvolution and its application in the physical model measurement
Optimal time-delay spiking deconvolution and its application in the physical model measurement Zhengsheng Yao, Gary F. Margrave and Eric V. Gallant ABSRAC Spike deconvolution based on iener filter theory
More informationLink Scheduling in Multi-Transmit-Receive Wireless Networks
Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology
More informationA New Combinatorial Design of Coded Distributed Computing
A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA
More informationThe Tree Congestion of Graphs
The Tree Congestion of Graphs Diana Carr August 2, 2005 Abstract Edge congestion can be thought of as the cutwidth of a graph In this paper we embed complete tripartite graphs into trees and spanning trees
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationThe Locality of Searchable Symmetric Encryption
The Locality of Searchable Symmetric Encryption David Cash Rutgers U Stefano Tessaro UC Santa Barbara 1 Outsourced storage and searching Broser only donloads documents matching query. Avoids donloading
More informationA Robust Method of Facial Feature Tracking for Moving Images
A Robust Method of Facial Feature Tracking for Moving Images Yuka Nomura* Graduate School of Interdisciplinary Information Studies, The University of Tokyo Takayuki Itoh Graduate School of Humanitics and
More informationRubik's Shells.
Ruik's Shells Ruik's Shells is a puzzle that consists of 4 intersecting rings, coloured heels ith 8 alls each, hich can rotat The heels are in to pairs; to axes ith a pair of heels on each, and the to
More informationCrossing Families. Abstract
Crossing Families Boris Aronov 1, Paul Erdős 2, Wayne Goddard 3, Daniel J. Kleitman 3, Michael Klugerman 3, János Pach 2,4, Leonard J. Schulman 3 Abstract Given a set of points in the plane, a crossing
More informationAffine Transformations Computer Graphics Scott D. Anderson
Affine Transformations Computer Graphics Scott D. Anderson 1 Linear Combinations To understand the poer of an affine transformation, it s helpful to understand the idea of a linear combination. If e have
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationGlasgow eprints Service
Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,
More informationGroup Secret Key Generation Algorithms
Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]
More information{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs
Problem definition Paths and cycles Complete subgraphs 10. Extremal graph theory 10.1. Definitions Let us examine the following forbidden subgraph problems: At most how many edges are in a graph of order
More informationGATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani
GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,
More informationWIRELESS sensor networks (WSNs) have been
IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Achieving k-barrier Coverage in Hybrid Directional Sensor Networks Zhibo Wang, Jilong Liao, Qing Cao, Member, IEEE, Hairong Qi,Senior Member, IEEE, and Zhi Wang,
More informationDevelopment of Redundant Robot Simulator for Avoiding Arbitrary Obstacles Based on Semi-Analytical Method of Solving Inverse Kinematics
Proceedings of the 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems San Diego, CA, USA, Oct 29 - Nov 2, 2007 ThC2.1 Development of Redundant Robot Simulator for Avoiding Arbitrary
More informationContrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization
Contrast Improvement on Various Gray Scale Images Together With Gaussian Filter and Histogram Equalization I M. Rajinikannan, II A. Nagarajan, III N. Vallileka I,II,III Dept. of Computer Applications,
More informationRandomized k-coverage Algorithms For Dense Sensor Networks
Randomized k-coverage Algorithms For Dense Sensor Networks Mohamed Hefeeda School of Computing Science Simon Fraser University Surrey, BC, Canada Majid Bagheri School of Computing Science Simon Fraser
More informationEnhancing the pictorial content of digital holograms at 100 frames per second
Enhancing the pictorial content of digital holograms at 100 frames per second P.W.M. Tsang, 1 T.-C Poon, 2 and K.W.K. Cheung 1 1 Department of Electronic Engineering, City University of Hong Kong, Hong
More informationBroadcast on Clusters of SMPs with Optimal Concurrency
Broadcast on Clusters of SMPs ith Optimal Concurrency Yuzhong Sun +, David Bader +, and X. Lin * + Department of Electrical and Computer Engineering University of Ne Mexico * Department of Electrical and
More informationEXTREME POINTS AND AFFINE EQUIVALENCE
EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard
More informationOptidef A Latex library for optimization problems Version Jesus Lago May 23, 2018
Optidef A Latex library for optimization problems Version - 2.7 Jesus Lago May 23, 2018 1 Contents 1 Introduction and features 3 2 Using the package 3 3 Environment Syntax Definition 3 3.1 Definition of
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationNeural networks in the re-engineering process based on construction drawings
Neural netorks in the re-engineering process based on construction draings S. Komoroski HOCHTIEF Construction AG, Bauen im Βestand NRW, Essen, Germany V. Berkhahn Institute of Computer Science in Civil
More informationMonotone Paths in Geometric Triangulations
Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation
More informationExBCG-TC: Extended Borel Cayley Graph Topology Control for Ad Hoc Networks
Ex: Extended Borel Cayley Graph Topology Control for Ad Hoc Netorks Dongsoo Kim and Jaeook Yu Department of ECE Stony Brook University (SUNY) Stony Brook, NY 11794 2350 Email: {dongsoo.kim, jaeook.yu}@stonybrook.edu
More informationBorder Surveillance using sensor based thick-lines
Border Surveillance using sensor based thick-lines Ramzi Bellazreg, Noureddine Boudriga and Sunshin An + University of Carthage Tunisia and + Korea University Email : ramzi_bellazreg@yahoo.fr; noure.boudriga2@gmail.com;
More information13 Sensor networks Gathering in an adversarial environment
13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,
More informationTime-Bounded Essential Localization for Wireless Sensor Networks
IEEE TRANSACTIONS ON NETWORKING 1 Time-Bounded Essential Localization for Wireless Sensor Networks Wei Cheng, Member, IEEE, Nan Zhang, Member, IEEE, Xiuzhen Cheng, Senior Member, IEEE, Min Song, Senior
More informationExtended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces
Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces ERGUN AKLEMAN, JIANER CHEN Texas A&M University, College Station, Texas JONATHAN L. GROSS Columbia University, Ne York
More informationMath 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)
Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.
More informationInapproximability of the Perimeter Defense Problem
Inapproximability of the Perimeter Defense Problem Evangelos Kranakis Danny Krizanc Lata Narayanan Kun Xu Abstract We model the problem of detecting intruders using a set of infrared beams by the perimeter
More informationγ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set
γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that
More informationEnergy Aware Node Placement Algorithm for Wireless Sensor Network
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm
More informationCascaded Coded Distributed Computing on Heterogeneous Networks
Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,
More informationRanking of Generalized Exponential Fuzzy Numbers using Integral Value Approach
Int. J. Advance. Soft Comput. Appl., Vol., No., July 010 ISSN 074-853; Copyright ICSRS Publication, 010.i-csrs.org Ranking of Generalized Exponential Fuzzy Numbers using Integral Value Approach Amit Kumar,
More informationK d (490) models characterisation Issue 1 revision 0 Gilbert Barrot, ACRI-ST 05/jul/2006
K d (490) models characterisation Issue 1 revision 0 Gilbert Barrot, ACRI-ST 05/jul/2006 K d (490) is the diffuse attenuation coefficient at 490 nm. It is one indicator of the turbidity of the ater column.
More informationOptidef A Latex library for optimization problems Version Jesus Lago July 19, 2018
Optidef A Latex library for optimization problems Version - 3.0 Jesus Lago July 19, 2018 1 Contents 1 Introduction and features 4 2 Using the package 4 3 Environment Syntax Definition 4 3.1 Definition
More information10.2 Single-Slit Diffraction
10. Single-Slit Diffraction If you shine a beam of light through a ide-enough opening, you might expect the beam to pass through ith very little diffraction. Hoever, hen light passes through a progressively
More informationNew Graphs of Finite Mutation Type
Ne Graphs of Finite Mutation Type Harm Derksen Department of Mathematics University of Michigan hderksen@umich.edu Theodore Oen Department of Mathematics Ioa State University oentheo@isu.edu Submitted:
More informationSensor Stream Reduction For Clustered Wireless Sensor Networks
Sensor Stream Reduction For Clustered Wireless Sensor Netorks André L. L. de Aquino 1, Carlos M. S. Figueiredo 2, Eduardo F. Nakamura 2, Alejandro C. Frery 3, Antonio A. F. Loureiro 1, Antônio Otávio Fernandes
More informationAlgorithms for minimum m-connected k-tuple dominating set problem
Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong
More informationBarrier Information Coverage with Wireless Sensors
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 9 proceedings. Barrier Information Coverage with Wireless
More informationBenefits of Coded Placement for Networks with Heterogeneous Cache Sizes
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering
More informationSuperconcentrators of depth 2 and 3; odd levels help (rarely)
Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv
More informationA dynamic programming algorithm for perceptually consistent stereo
A dynamic programming algorithm for perceptually consistent stereo The Harvard community has made this article openly available. Please share ho this access benefits you. Your story matters. Citation Accessed
More informationAn Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks
An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu
More informationInverse Analysis of Soil Parameters Based on Deformation of a Bank Protection Structure
Inverse Analysis of Soil Parameters Based on Deformation of a Bank Protection Structure Yixuan Xing 1, Rui Hu 2 *, Quan Liu 1 1 Geoscience Centre, University of Goettingen, Goettingen, Germany 2 School
More informationDTM Based on an Ellipsoidal Squares
DM Based on an Ellipsoidal Squares KRZYSZOF NAUS Institute of Navigation and Hydrography Polish Naval Academy Śmidoicza 69, 8-3 Gdynia POLAND k.naus@am.gdynia.pl Abstract: - he paper presents the description
More informationEfficient Line K-Coverage Algorithms in Mobile Sensor Network
Efficient Line K-Coverage Algorithms in Mobile Sensor Network Yang Wang, Shuang Wu, Xiaofeng Gao (B), Fan Wu, and Guihai Chen Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer
More informationLOW-DENSITY PARITY-CHECK (LDPC) codes [1] can
208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer
More informationEdge intersection graphs. of systems of grid paths. with bounded number of bends
Edge intersection graphs of systems of grid paths with bounded number of bends Andrei Asinowski a, Andrew Suk b a Caesarea Rothschild Institute, University of Haifa, Haifa 31905, Israel. b Courant Institute,
More informationOn the Minimum k-connectivity Repair in Wireless Sensor Networks
On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu
More informationContour Error Decoupling Compensation for Non-circular Grinding Qi-guang LI 1,a, Qiu-shi HAN 1, Wei-hua LI 2 and Bao-ying PENG 1
07 nd International Conference on Applied Mechanics, Electronics and Mechatronics Engineering (AMEME 07) ISBN: 978--60595-497-4 Contour Error Decoupling Compensation for Non-circular Grinding Qi-guang
More informationLecture 1: Turtle Graphics. the turtle and the crane and the swallow observe the time of their coming; Jeremiah 8:7
Lecture 1: Turtle Graphics the turtle and the crane and the sallo observe the time of their coming; Jeremiah 8:7 1. Turtle Graphics Motion generates geometry. The turtle is a handy paradigm for investigating
More informationComp Online Algorithms
Comp 7720 - Online Algorithms Notes 4: Bin Packing Shahin Kamalli University of Manitoba - Fall 208 December, 208 Introduction Bin packing is one of the fundamental problems in theory of computer science.
More informationOptimizing Query Injection from Mobile Objects to Sensor Networks
Optimizing Query Injection from Mobile Objects to Sensor Networks Shourui Tian and Sol M. Shatz Department of Computer Science University of Illinois at Chicago Chicago, IL 60607 USA {stian,shatz}@cs.uic.edu
More informationMax-Flow Protection using Network Coding
Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State
More informationFigure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout
Tail Inequalities Wafi AlBalawi and Ashraf Osman Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV fwafi,osman@csee.wvu.edug 1 Routing in a Parallel Computer
More informationarxiv: v2 [cs.cg] 24 Jul 2011
Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract arxiv:116.855v2 [cs.cg] 24 Jul 211 What is the minimum angle α > such that given any set of α-directional antennas (that
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationMobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,
More informationCHAPTER 4 VORONOI DIAGRAM BASED CLUSTERING ALGORITHMS
CHAPTER 4 VORONOI DIAGRAM BASED CLUSTERING ALGORITHMS 4.1 Introduction Although MST-based clustering methods are effective for complex data, they require quadratic computational time which is high for
More informationGraph theory - solutions to problem set 1
Graph theory - solutions to problem set 1 1. (a) Is C n a subgraph of K n? Exercises (b) For what values of n and m is K n,n a subgraph of K m? (c) For what n is C n a subgraph of K n,n? (a) Yes! (you
More informationOn Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)
On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationConnected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu
More informationParameterized Complexity of Independence and Domination on Geometric Graphs
Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de
More informationMaximizing Angle Coverage in Visual Sensor Networks
Maximizing Angle Coverage in Visual Sensor Networks Kit-Yee Chow, King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam Road, Hong Kong,
More informationIndustrial Data Communications - Fundamentals
Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous
More informationThe 4/5 Upper Bound on the Game Total Domination Number
The 4/ Upper Bound on the Game Total Domination Number Michael A. Henning a Sandi Klavžar b,c,d Douglas F. Rall e a Department of Mathematics, University of Johannesburg, South Africa mahenning@uj.ac.za
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationMath 5593 Linear Programming Lecture Notes
Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More informationGeometric Unique Set Cover on Unit Disks and Unit Squares
CCCG 2016, Vancouver, British Columbia, August 3 5, 2016 Geometric Unique Set Cover on Unit Disks and Unit Squares Saeed Mehrabi Abstract We study the Unique Set Cover problem on unit disks and unit squares.
More informationREAL-TIME 3D GRAPHICS STREAMING USING MPEG-4
REAL-TIME 3D GRAPHICS STREAMING USING MPEG-4 Liang Cheng, Anusheel Bhushan, Renato Pajarola, and Magda El Zarki School of Information and Computer Science University of California, Irvine, CA 92697 {lcheng61,
More informationExtended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces
Extended Graph Rotation Systems as a Model for Cyclic Weaving on Orientable Surfaces ERGUN AKLEMAN, JIANER CHEN Texas A&M University, College Station, Texas and JONATHAN L. GROSS Columbia University, Ne
More information