A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface
|
|
- Madeleine Spencer
- 5 years ago
- Views:
Transcription
1 A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface Hongyu Zhou, Hongyi Wu, Su Xia, Miao Jin, Ning Ding The Center for Advanced Computer Studies(CACS) University of Louisiana at Lafayette
2 OUTLINE Introduction Triangulation Algorithm Extension to 3D Surface Application and Simulation Results Conclusion
3 INTRODUCTION Wireless sensor network exhibits randomness Wireless sensor network topology is a graph Triangulation is a subgraph of the topology Triangulation mesh is very important for many applications of sensor networks: geometry-based routing, localization, coverage, segmentation, data segmentation
4 INTRODUCTION Related work # # # (a) (a) (a) A (a) 2D A A2D network 2D network network graph. graph. graph. (b) (b) (b) Triangulation (b) Triangulation under under under ideal ideal CDG. ideal CDG. CDG. (c) (c) (c) CDG CDG (c) CDG (k=1): not (k=1): not not planar. not planar. H. Zhou, S. Xia, M. Jin, and H. Wu, Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks, in Proc. of ICDCS, # # # # ## # (d) (d) CDM (k=1): planar but butnot triangulated. (e) (e) Failed triangulation. (f) CDG (k=2): triangulated but coarse. (d) (d) CDM (d) CDM CDM (k=1): (k=1): (k=1): planar planar planar but but not but not triangulated. not triangulated. (e) (e) Failed (e) Failed triangulation. triangulation. (f) (f) CDG (f) CDG (k=2): (k=2): triangulated triangulated but coarse. but coarse. Fig Illustration of of challenges in in triangulation, where the circles indicate sensor nodes and the dashed lines are communication links. The solid black line Fig. [2] Fig. illustrate 2. R. Fig. Sarkar, 2. Illustration 2. virtual Illustration X. Yin, edges, ofj. challenges of Gao, which of challenges F. are Luo, are in realized triangulation, in and inx. triangulation, by D. by corresponding Gu, where Greedy where where the the Routing circles paths the circles circles shown indicate with Guaranteed indicate as as solid sensor grey sensor nodes Delivery lines. nodes and and In In the Using subfigure and the dashed the Ricci dashed (b), lines Flows, the are lines are red communication Proc. lines are depict of IPSN, Voronoi links links. cells. The solid In The subfigure black solid bl illustrate illustrate (c)-(f), virtual virtual the the nodes virtual edges, edges, with edges, which which the the same which are are realized color are realized realized belong by by corresponding toby the corresponding same paths Voronoi paths paths shown shown cell, shown as while as solid solid the as grey large solid grey lines. circles(i.e., grey lines. lines. In Insubfigure A-E) subfigure (b), stand (b), the the for (b), red red landmarks. thelines red depict lines depict Voronoi Voronoi cells. cells. In Insubfig s [3](c)-(f), H. (c)-(f), the Zhou, the nodes the S. nodes Xia, nodes with M. with the with Jin, the same and the same same H. color Wu, color color belong Localized belong belong to to thealgorithm tosame same same Voronoi Voronoi for Voronoi Precise cell, cell, while Boundary cell, while while the the large Detection the large large circles(i.e., in circles(i.e., 3D Wireless A-E) A-E) A-E) stand Networks, stand for forlandmarks. in Proc. landmarks. of ICDCS, subset of of nodes as as landmarks where any two landmarks Landmark j), it it sends a connection packet to the latter. The
5 INTRODUCTION We proposed a distributed triangulation algorithm works for any arbitrary 2D sensor networks without communication model constraint, and we prove the correctness of the algorithm in 2D sensor networks tolerates some measurement errors also works for 3D open or closed surfaces
6 TRIANGULATION ALGORITHM Basic idea Each triangulation mesh edge will associate with two triangles, except boundary edge If we add extra edges into triangulation mesh, they will change this association The association can be used to identify B these extra edges. C D B C D A E A E H G F H G F
7 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj
8 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj
9 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj
10 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj
11 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set (AENS), A(eij)={eil, eim, ejl, ejm} ' # equivalent edges, eij, elm critical edge, ekj
12 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj
13 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj
14 TRIANGULATION ALGORITHM Lemma 1: A subgraph of G is triangulated if and only if every edge of the subgraph has a weight of two. Given a graph G and a triangulation subgraph T, extra edges are G-T Objective: remove all extra edges There are three type of extra edges, e0, e1, e2 # # # (a) e 0 (b) e 1 (c) e 2
15 TRIANGULATION ALGORITHM Theorem 1: An edge with a weight less than two must be removed in order to produce a triangulated subgraph. # # (a) e 0 (b) e 1
16 TRIANGULATION ALGORITHM Theorem 2:An non-critical edge can be recognized as an e2 edge and safely removed if all edges in its AENS have their weight greater than two. # (c) e
17 TRIANGULATION ALGORITHM Lemma 2: An e0 extra edge can exist in G, only if it depends on at least two other extra edges. Lemma 3: An e1 extra edge can exist in G, only if it at least depends on another extra edge. # # # ' ' (a) Loop chain. (b) Non-loop chain. (c) Same head and tail.
18 TRIANGULATION ALGORITHM Step1: Initialization. each edge calculate NNS, ENS, RENS, AENS, and edge weight; Step2: Iterative edge removal according to Theorems 1 and 2; Step3: Removal of e0 and e1 chains.
19 EXTENSION TO 3D SURFACE Similar algorithm can be applied in a sensor network on 3D surface with minor modification in determining RNS and edge weight ' # l i k j l'
20 APPLICATION AND SIMULATION RESULTS 2D network (a) Sensor network topology (b) Finest triangulation by [2] (c) Proposed triangulation
21 APPLICATION AND SIMULATION RESULTS 3D network with open surface (a) Sensor network topology (b) Finest triangulation by [3] (c) Proposed triangulation
22 APPLICATION AND SIMULATION RESULTS 3D network with closed surface (a) Sensor network topology (b) Finest triangulation by [3] (c) Proposed triangulation
23 APPLICATION AND SIMULATION RESULTS 3D network with closed surface (a) Sensor network topology (b) Finest triangulation by [3] (c) Proposed triangulation
24 (b) Triangulation under 20 distance errors. (c) Triangulation under 30 distance errors. APPLICATION AND SIMULATION RESULTS 2D network with distance errors (a) Triangulation under 10 distance errors.
25 APPLICATION AND SIMULATION RESULTS Difference Communication Models (a) UDG (b) Triangulation under Quasi-UDG (α = 0.4). (c) Triangulation under Quasi-UDG (α = 0.6) (d) Triangulation under Log-normal.
26 APPLICATION AND SIMULATION RESULTS Greedy routing based on Ricci flow in 2D networks (a) Finest triangulation by [2] (b) Ricci embedding (c) Proposed triangulation (d) Ricci embedding
27 APPLICATION AND SIMULATION RESULTS Greedy routing based on Ricci flow in 3D networks (a) Finest triangulation by [3] (b) Ricci embedding (c) Proposed triangulation (d) Ricci embedding
28 APPLICATION AND SIMULATION RESULTS COMPARISON OF STRETCH FACTOR IN GREEDY ROUTING. 2D networks 3D networks Triangulation by [2], [3] Proposed Triangulation Distribution of stretch factor in greedy routing 9 9 UTING. tworks For gud in and 9. For ), its triangue depicted in onding Ricci 0 1.0~ ~ ~ ~ ~ ~1.4 Triangulation Triangulation by [2] by [2] Proposed Triangulation Proposed Triangulation ~1.6 2~3 1.6~1.8 3~4 Stretching Factor ~5 2~3 (a) 2D networks (a) 2D networks. 5~6 3~4 Stretching Factor 6~ 4~5 (a) 2D networks. Fig ~ ~ ~2 0 2~3 1~2 3~4 2~3 4~5 3~4 Triangulation Triangulation by [3] by [3] Proposed Proposed Triangulation Triangulation 5~6 4~5 6~7 7~8 8~9 9~10 (b) Stretching 3DFactor networks. (b) 3D networks (b) 3D networks. 5~6 6~7 7~8 Stretching Factor Distribution of stretch factor in greedy routing ~9 9~10 10~ 10~
29 CONCLUSION In summary, we have proposed a distributed algorithm that can triangulate an arbitrary sensor network without position information. The algorithm can achieve the finest triangulation and tolerate distance measurement errors. We have proven its correctness in 2D and extended it to 3D surface. A range of geometry-based network algorithms can benefit from the proposed triangulation.
3D Wireless Sensor Networks: Challenges and Solutions
3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND
More informationIEEE/ACM TRANSACTIONS ON NETWORKING 1. Hongyu Zhou, Student Member, IEEE, SuXia, Member, IEEE, Miao Jin, and Hongyi Wu, Member, IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Localized and Precise Boundary Detection in 3-D Wireless Sensor Networks Hongyu Zhou, Student Member, IEEE, SuXia, Member, IEEE, Miao Jin, and Hongyi Wu, Member, IEEE
More informationCut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks
Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, and Su Xia Presenter: Hongyi Wu The Center for Advanced
More informationNetworks: A Deterministic Approach with Constant Overhead
Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette
More informationARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks
ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks Hongyu Zhou, Hongyi Wu, and Miao Jin Abstract In this work we develop a distributed boundary detection algorithm,
More informationCut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology
213 Proceedings IEEE INFOCOM Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu Abstract We address the problem of
More informationLocalized Algorithm for Precise Boundary Detection in 3D Wireless Networks
Localized lgorithm for Precise oundary etection in 3 Wireless Networks Hongyu Zhou, Su Xia, Miao Jin and Hongyi Wu integrated Wireless Information Network (iwin) Lab The enter for dvanced omputer Studies(S)
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationLocalization in 3D Surface Sensor Networks: Challenges and Solutions. Yao Zhao, Hongyi Wu, Miao Jin and Su Xia University of Louisiana at Lafayette
Localization in 3D Surface Sensor Networks: Challenges and Solutions Yao Zhao, Hongyi Wu, Miao Jin and Su Xia University of Louisiana at Lafayette Outline q Introduction Autonomous localization algorithms
More informationGreedy Routing with Guaranteed Delivery Using Ricci Flow
Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Joint work with Rik Sarkar, Xiaotian Yin, Wei Zeng, Feng Luo, Xianfeng David Gu Greedy Routing Assign coordinatesto
More informationGPS-Free Greedy Routing with Delivery Guarantee and Low Stretch Factor on 2D and 3D Surfaces
GPS-Free Greedy Routing with Delivery Guarantee and Low Stretch Factor on 2D and 3D Surfaces Su Xia, Hongyi Wu, and Miao Jin Abstract This paper focuses on greedy routing in wireless networks deployed
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST 2015 1149 Distributed Information Storage and Retrieval in 3-D Sensor Networks With General Topologies Yang Yang, Miao Jin, Yao Zhao, and Hongyi
More informationGreedy Routing in Wireless Networks. Jie Gao Stony Brook University
Greedy Routing in Wireless Networks Jie Gao Stony Brook University A generic sensor node CPU. On-board flash memory or external memory Sensors: thermometer, camera, motion, light sensor, etc. Wireless
More informationGLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Stanford University HP Labs Point-to-Point Routing in Sensornets Routing
More informationLocalized Algorithm for Precise Boundary Detection in 3D Wireless Networks
Localized lgorithm for Precise Boundary Detection in 3D Wireless Networks Hongyu Zhou, Su Xia, Miao Jin, and Hongyi Wu The enter for dvanced omputer Studies University of Louisiana at Lafayette Lafayette,
More information3D Surface Localization with Terrain Model
3D Surface Localization with Terrain Model Yang Yang, Miao Jin, and Hongyi Wu Abstract The majority of current research on sensor network localization focuses on wireless sensor networks deployed on two
More informationGeometric Modeling in Graphics
Geometric Modeling in Graphics Part 10: Surface reconstruction Martin Samuelčík www.sccg.sk/~samuelcik samuelcik@sccg.sk Curve, surface reconstruction Finding compact connected orientable 2-manifold surface
More informationMidpoint Routing algorithms for Delaunay Triangulations
Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical
More informationG 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994)
Discrete Comput Geom 12:29-34 (1994) G 6i try 9 1994 Springer-Verlag New York Inc. On the Number of Minimal 1-Steiner Trees* B. Aronov, 1 M. Bern, 2 and D. Eppstein 3 Computer Science Department, Polytechnic
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationGeometry in Wireless Sensor Networks
How cancomputational Geometry help Mobile Networks: Geometry in Wireless Sensor Networks Jie Gao Stony Brook University CG Week 2012 Algorithms in the Field Workshop 2013/6/21 1 A generic sensor node CPU.
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationApproximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks
Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1
More informationAs a consequence of the operation, there are new incidences between edges and triangles that did not exist in K; see Figure II.9.
II.4 Surface Simplification 37 II.4 Surface Simplification In applications it is often necessary to simplify the data or its representation. One reason is measurement noise, which we would like to eliminate,
More informationChapter 7 TOPOLOGY CONTROL
Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing
More informationEdge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks
Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute
More informationVoronoi Diagram. Xiao-Ming Fu
Voronoi Diagram Xiao-Ming Fu Outlines Introduction Post Office Problem Voronoi Diagram Duality: Delaunay triangulation Centroidal Voronoi tessellations (CVT) Definition Applications Algorithms Outlines
More informationDecentralized Boundary Detection without Location Information in Wireless Sensor Networks
2012 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Decentralized Boundary Detection without Location Information in Wireless Sensor Networks Wei-Cheng Chu Institute
More informationGeo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer
Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance
More informationarxiv: v1 [cs.ni] 28 Apr 2015
Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland
More informationNotes in Computational Geometry Voronoi Diagrams
Notes in Computational Geometry Voronoi Diagrams Prof. Sandeep Sen and Prof. Amit Kumar Indian Institute of Technology, Delhi Voronoi Diagrams In this lecture, we study Voronoi Diagrams, also known as
More informationLifting Transform, Voronoi, Delaunay, Convex Hulls
Lifting Transform, Voronoi, Delaunay, Convex Hulls Subhash Suri Department of Computer Science University of California Santa Barbara, CA 93106 1 Lifting Transform (A combination of Pless notes and my
More informationResilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space
Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space Wei Zeng Rik Sarkar Feng Luo Xianfeng Gu Jie Gao Department of Computer Science, State University of New York
More informationOptimal k-support Coverage Paths in Wireless Sensor Networks
Optimal k-support Coverage Paths in Wireless Sensor Networks ShaoJie Tang Department of Computer Science Illinois Institute of Technology Chicago, IL, 60616. Email: stang7@iit.edu XuFei Mao Department
More informationSINUS: A Scalable and Distributed Routing Algorithm with Guaranteed Delivery for WSNs on High Genus 3D Surfaces
2013 Proceedings IEEE INFOCOM SINUS: A Scalable and Distributed Routing Algorithm with Guaranteed Delivery for WSNs on High Genus 3D Surfaces Tianlong Yu 1 Hongbo Jiang 1 Guang Tan 2 Chonggang Wang 3 Chen
More informationJordan Curves. A curve is a subset of IR 2 of the form
Jordan Curves A curve is a subset of IR 2 of the form α = {γ(x) : x [0,1]}, where γ : [0,1] IR 2 is a continuous mapping from the closed interval [0,1] to the plane. γ(0) and γ(1) are called the endpoints
More informationMöbius Transformations in Scientific Computing. David Eppstein
Möbius Transformations in Scientific Computing David Eppstein Univ. of California, Irvine School of Information and Computer Science (including joint work with Marshall Bern from WADS 01 and SODA 03) Outline
More informationGeometric Routing: Of Theory and Practice
Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and
More informationDifferential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson]
Differential Geometry: Circle Packings [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Conformal Maps Recall: Given a domain Ω R 2, the map F:Ω R 2 is conformal if it
More informationMa/CS 6b Class 11: Kuratowski and Coloring
Ma/CS 6b Class 11: Kuratowski and Coloring By Adam Sheffer Kuratowski's Theorem Theorem. A graph is planar if and only if it does not have K 5 and K 3,3 as topological minors. We know that if a graph contains
More informationROUTING is an important issue that affects wireless
1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,
More informationChapter 8. Voronoi Diagrams. 8.1 Post Oce Problem
Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationLocalization in 3D Surface Sensor Networks: Challenges and Solutions
Localization in 3D Surface Sensor Networks: Challenges and Solutions Yao Zhao, Hongyi Wu, Miao Jin and Su Xia Abstract This work aims to address the problem of localization in 3D surface wireless sensor
More informationCS133 Computational Geometry
CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,
More informationSurface Mesh Generation
Surface Mesh Generation J.-F. Remacle Université catholique de Louvain September 22, 2011 0 3D Model For the description of the mesh generation process, let us consider the CAD model of a propeller presented
More information[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations
Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer
More informationScheduling, Map Coloring, and Graph Coloring
Scheduling, Map Coloring, and Graph Coloring Scheduling via Graph Coloring: Final Exam Example Suppose want to schedule some ;inal exams for CS courses with following course numbers: 1007, 3137, 3157,
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationDistributed Newest Vertex Bisection
Distributed Newest Vertex Bisection in Dune-ALUGrid Martin Alkämper and Robert Klöfkorn Dune User Meeting 2015 Algorithm Some Analysis Experiments Problem In Dune-ALUGrid (among others) we provide an adaptive,
More informationApproximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006
Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006 Outline Reducing the constant from O ( ɛ d) to O ( ɛ (d 1)/2) in uery time Need to know ɛ ahead of time Preprocessing time and
More informationFault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults
Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Seungjin Park Jong-Hoon Youn Bella Bose Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science
More informationExtended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication
Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic
More informationTopology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co
Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,
More informationExploration of Path Space using Sensor Network Geometry
Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook
More informationLecture notes: Object modeling
Lecture notes: Object modeling One of the classic problems in computer vision is to construct a model of an object from an image of the object. An object model has the following general principles: Compact
More informationIEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 1, JANUARY
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 1, JANUARY 2014 113 ZoneDefense: A Fault-Tolerant Routing for 2-D Meshes Without Virtual Channels Binzhang Fu, Member, IEEE,
More informationDistributed Voronoi diagram computation in wireless sensor networks
Distributed Voronoi diagram computation in wireless sensor networks Waleed Alsalih (1) Kamrul Islam (1) Yurai Núñez-Rodríguez (1) Henry Xiao (1) (1) Queen s University(waleed/islam/yurai/xiao@cs.queensu.ca)
More informationFOLLOWING their success in 2-D environments, sensor
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 1, JANUARY 2015 57 OnionMap: A Scalable Geometric Addressing and Routing Scheme for 3D Sensor Networks Kechao Cai, Zhimeng Yin, Hongbo Jiang,
More informationVoronoi diagram and Delaunay triangulation
Voronoi diagram and Delaunay triangulation Ioannis Emiris & Vissarion Fisikopoulos Dept. of Informatics & Telecommunications, University of Athens Computational Geometry, spring 2015 Outline 1 Voronoi
More informationWE consider a wireless ad hoc network (or sensor
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 10, OCTOBER 2003 1035 Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks Xiang-Yang Li, Member, IEEE, Gruia
More informationOn Greedy Geographic Routing Algorithms in Sensing-Covered Networks
On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,
More informationDistributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range
sensors Article Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range Chenlong He 1, * ID, Zuren Feng 1 and Zhigang Ren 2 1 State Key Laboratory for Manufacturing
More informationAppendix B Submodeling Technique
Appendix B Submodeling Technique 16.0 Release Introduction to ANSYS Mechanical 1 2015 ANSYS, Inc. February 27, 2015 Chapter Overview In this chapter controlling meshing operations is described. Topics:
More informationProtocol Design and Optimization for
Protocol Design and Optimization for Yu Wang, Hongyi Wu*, Feng Lin, and Nian-Feng Tzeng Center for Advanced Computer Studies University of Louisiana at Lafayette Mobile Sensor Networks Applications: Air
More informationDeterministic Greedy Routing with Guaranteed Delivery in 3D Wireless Sensor Networks
eterministic Greedy Routing with Guaranteed elivery in 3 Wireless Sensor Networks Su Xia Xiaotian Yin Center for Advanced Mathematics epartment Computer Studies Harvard University University of Louisiana
More informationLecture 3 Mesh. Dr. Shuang LIANG. School of Software Engineering Tongji University Spring 2013
Lecture 3 Mesh Dr. Shuang LIANG School of Software Engineering Tongji University Spring 2013 Today s Topics Overview Mesh Acquisition Mesh Data Structures Subdivision Surfaces Today s Topics Overview Mesh
More informationOn a nested refinement of anisotropic tetrahedral grids under Hessian metrics
On a nested refinement of anisotropic tetrahedral grids under Hessian metrics Shangyou Zhang Abstract Anisotropic grids, having drastically different grid sizes in different directions, are efficient and
More informationLecture 2 Unstructured Mesh Generation
Lecture 2 Unstructured Mesh Generation MIT 16.930 Advanced Topics in Numerical Methods for Partial Differential Equations Per-Olof Persson (persson@mit.edu) February 13, 2006 1 Mesh Generation Given a
More informationInformation Processing Letters
Information Processing Letters 113 (2013) 132 136 Contents lists available at SciVerse ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl The complexity of geodesic Voronoi diagrams
More informationNon-extendible finite polycycles
Izvestiya: Mathematics 70:3 1 18 Izvestiya RAN : Ser. Mat. 70:3 3 22 c 2006 RAS(DoM) and LMS DOI 10.1070/IM2006v170n01ABEH002301 Non-extendible finite polycycles M. Deza, S. V. Shpectorov, M. I. Shtogrin
More informationNODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS
CHAPTER 6 NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS Abstract Localization of sensor nodes in a wireless sensor network is needed for many practical purposes. If the nodes are considered
More informationRobustness improvement of polyhedral mesh method for airbag deployment simulations. TU Delft
Robustness improvement of polyhedral mesh method for airbag deployment simulations. TU Delft Santiago Alagon Carrillo, Numerical Analysis Daily Supervisor: Prof. dr. ir. C. Vuik, Company Supervisors: Dr.
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationHole repair algorithm in hybrid sensor networks
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 2016) Hole repair algorithm in hybrid sensor networks Jian Liu1,
More informationLecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets
Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Saul Glasman 14 September 2016 Let s give the definition of an open subset of R. Definition 1. Let U R. We
More informationPERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS
SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS THE CENTRALIZED DEPLOYMENT OF MOBILE SENSORS I.E. THE MINIMUM WEIGHT PERFECT MATCHING 1 2 ON BIPARTITE GRAPHS Prof. Tiziana Calamoneri Network Algorithms
More informationA Reduction of Conway s Thrackle Conjecture
A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854
More informationSimplicial Complexes: Second Lecture
Simplicial Complexes: Second Lecture 4 Nov, 2010 1 Overview Today we have two main goals: Prove that every continuous map between triangulable spaces can be approximated by a simplicial map. To do this,
More informationEstimating the Free Region of a Sensor Node
Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We
More informationA Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks
A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston,
More informationIncreasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems
Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Valentin Gies and Thierry M. Bernard ENSTA, 32 Bd Victor 75015, Paris, FRANCE, contact@vgies.com,
More informationOn the Minimum k-connectivity Repair in Wireless Sensor Networks
On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu
More informationJordan Curves. A curve is a subset of IR 2 of the form
Jordan Curves A curve is a subset of IR 2 of the form α = {γ(x) : x [0, 1]}, where γ : [0, 1] IR 2 is a continuous mapping from the closed interval [0, 1] to the plane. γ(0) and γ(1) are called the endpoints
More informationEFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS
Discrete Mathematics, Algorithms and Applications Vol. 1, No. 4 (2009) 437 461 c World Scientific Publishing Company EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationComputational QC Geometry: A tool for Medical Morphometry, Computer Graphics & Vision
Computational QC Geometry: A tool for Medical Morphometry, Computer Graphics & Vision Part II of the sequel of 2 talks. Computation C/QC geometry was presented by Tony F. Chan Ronald Lok Ming Lui Department
More informationGEOGRAPHIC routing (also known as location-based or
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, and Chen Qian, Student Member, IEEE Abstract
More informationProblem Set 3. MATH 776, Fall 2009, Mohr. November 30, 2009
Problem Set 3 MATH 776, Fall 009, Mohr November 30, 009 1 Problem Proposition 1.1. Adding a new edge to a maximal planar graph of order at least 6 always produces both a T K 5 and a T K 3,3 subgraph. Proof.
More informationOn Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)
On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information
More informationGraphs & Algorithms: Advanced Topics Planar Separators
Graphs & Algorithms: Advanced Topics Planar Separators Johannes Lengler, Uli Wagner ETH Zürich Separators Definition Let G = (V, E) be a graph on n vertices, f : N 0 R a function, α (0, 1) a parameter.
More informationCharacterizing graphs with convex and connected configuration spaces
Characterizing graphs with convex and connected configuration spaces Meera Sitharam Heping Gao arxiv:0809.3935v3 [cs.cg] 11 Oct 2008 June 29, 2009 Abstract We define and study exact, efficient representations
More informationStrongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links
Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Ding-Zhu Du 1,MyT.Thai 1,YingshuLi 2,DanLiu 1, and Shiwei Zhu 1 1 Department of Computer Science and Engineering,
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationTutte s Theorem: How to draw a graph
Spectral Graph Theory Lecture 15 Tutte s Theorem: How to draw a graph Daniel A. Spielman October 22, 2018 15.1 Overview We prove Tutte s theorem [Tut63], which shows how to use spring embeddings to obtain
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationOn Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks
On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was
More informationCovering Space for In-Network Sensor Data Storage
Covering Space for In-Network Sensor Data Storage Rik Sarkar Wei Zeng Jie Gao Xianfeng David Gu Department of Computer Science Stony Brook University Stony Brook, NY 11794 {rik,jgao,gu}@cs.sunysb.edu Department
More informationGEOGRAPHIC routing (also known as location-based or
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013 663 Geographic Routing in -Dimensional Spaces With Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, ACM, andchenqian, Student
More informationCLASSIFICATION OF SURFACES
CLASSIFICATION OF SURFACES JUSTIN HUANG Abstract. We will classify compact, connected surfaces into three classes: the sphere, the connected sum of tori, and the connected sum of projective planes. Contents
More information