Decentralized Boundary Detection without Location Information in Wireless Sensor Networks

Size: px
Start display at page:

Download "Decentralized Boundary Detection without Location Information in Wireless Sensor Networks"

Transcription

1 2012 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Decentralized Boundary Detection without Location Information in Wireless Sensor Networks Wei-Cheng Chu Institute of Computer and Communication Engineering Department of Electrical Engineering National Cheng Kung University Tainan, Taiwan Kuo-Feng Ssu Institute of Computer and Communication Engineering Department of Electrical Engineering National Cheng Kung University Tainan, Taiwan Abstract In wireless sensor networks (WSNs) deployed in an outdoor environment, obstacles may occur as a result of a non-uniform distribution of the sensor nodes or the presence of barriers. These obstacles result in a degradation of the network performance, so obstacle identification is a major concern in most WSN applications. This paper develops a Decentralized Boundary Detection (DBD) algorithm for identifying sensor nodes near a hole or obstacle in the WSN. The algorithm does not require any knowledge of the node locations or distances between two nodes. The detection capability is provided even in networks where the sensor nodes have a non-unit disk communication range. I. INTRODUCTION Wireless sensor networks (WSNs) have a wide range of potential applications, such as environment monitoring, military, smart house, and so forth. WSNs are generally deployed in an outdoor environment, and thus their performance is affected by the presence of obstacles within the sensing field. In practice, these obstacles arise for various reasons. For example, the initial random deployment of the sensor nodes cannot cover the sensing field completely. In addition, the sensor nodes are generally battery-operated and therefore have a limited service life. Once the nodes have consumed all their energy, the sensing and communication functionality in the corresponding region is degraded. Furthermore, the environment may contain physical obstacles such as mountains or buildings, which prevent the propagation of the communication signals generated by the sensors. Finally, even in the absence of such obstacles, the sensor signals may still be adversely affected by animus signal interference. In general, a geographic region without the functionality of sensing or communication is treated as an obstacle that can significantly drop the performance of the communication protocols. Consequently, detecting the presence of obstacles in the sensing fieldisanessentialtaskin improving the performance of most WSN applications [21], [4]. Various researchers [11], [15], [2], [3] proposed stereovision systems based on image-processing algorithms for obstacle detection. They demonstrated that such systems enable a robot to navigate a path between two pre-determined end points while successfully avoiding any obstacles encountered along the way. However, these schemes are all intended for mobile robots and are therefore impractical for large-scale WSNs containing hundreds or thousands of sensor nodes. The literature contains many location-based algorithms for detecting physical obstacles and communication holes in WSNs [6], [18], [20], [14]. These algorithms are based on the assumption that each sensor is aware of its own location with high accuracy, so the obstacles can be detected using a coordinate system computing approach executed by each sensor node and its neighbors. This assumption is not realistic in a real world. Neither GPS nor other localization mechanisms can provide sufficiently accurate sensor location. Consequently, the use of locationfree algorithms has become increasingly common in recent years [10], [7], [8], [9], [19], [17], [13], [16], [12], [5]. The algorithms suffer high communication overhead, which is not suitable for the dynamic hole detection (e.g., a new hole appears when a node exhausts its energy or leaves the network field). Accordingly, this paper presents an efficient mechanism, Decentralized Boundary Detection (DBD), to accomplish obstacle detection in WSNs without the need for any location information or any knowledge of the distance among the sensor nodes. The proposed scheme utilizes three-hop neighboring node information and is implemented using a distributed approach. Therefore, the control overhead can be smaller compared to the topology-based boundary detection method. Additionally, DBD does not enforce the Unit Disk Graph (UDG) constraint. II. RELATED WORK Fekete et al. [7] counted the number of the shortest paths between all pairs of k-hop neighbors passing through a sensor node and defined the node as a boundary node (i.e., a node adjacent to an obstacle) if the number was less than a certain pre-determined threshold. Calculating an appropriate threshold for a particular WSN is actually non-trivial since the node density is not a constant throughout the sensing field, butvaries from one region to another. An improved research proposed by Kröller et al. [12] introduced the flower structure to recognize the inner and outer boundaries. Each inner or outer boundary is consisted of several segments of flower boundaries. The flower combination eliminates the redundant /12/$ IEEE 1742

2 segments of flower boundaries, where the remaining segments of flower boundaries include the inner and outer boundaries. Saukh et al. [17] also applied the flower structure to recognize the boundaries. The flower structures are developed for both unit disk graph and quasi unit disk graph [17], which is more realistic. The boundary nodes determined in research [17] are guaranteed not to be inner nodes that must be inside the network. Various researchers have proposed topology-based methods for identifying boundary nodes using a repetitive flooding mechanism [8], [9], [19]. Funke et al. [9] presented a Topological Hole Detection (THD) scheme for identifying the breakpoints of the contours which are 3-hop away from a seed [9]. A seed is a node which belongs to the maximal independent set of all nodes in the network. If a contour cannot form a cycle, the breakpoints of the contour play the inner or outer boundary node roles. THD also uses a pruning rule to decrease the number of boundary nodes in order to reduce the computational complexity of the boundary detection process. Wang et al. [19] developed a special structure of the shortest path trees to detect nodes on the boundaries and connect them into boundary cycles. However, the control overhead incurred in performing the flooding procedure to detect the boundary nodes increases significantly with a large number of holes. To reduce the control overhead, Li et al. [13] proposed a 3MeSH algorithm [13] to accomplish hole detection based upon twohop neighboring information only. The 3MeSH algorithm considers only Voronoi neighbors so it may fail for non- Voronoi neighbors due to its inability to take the associated cross links into account. Reichenbach et al. [16] proposed a beacon-based approach to obstacle detection for WSNs in which the beacons were assumed to be distributed over regular grids. Adopting the assumption that the presence of obstacles resulted in a partial suppression of the sensor signals, each node nominated itself as a boundary corner node (or not) by evaluating the signals received from its neighbors. Dong et al. [5] proposed TTG to identify any size of a hole. Simple-connectedness graph [5] is proposed to construct the cycles, which each of them contains exact one hole in the network. Minimizing a cycle length thus can identify the boundary of a hole. TTG requires to collect the k-hop neighbors information for each step of algorithm to construct the simple-connectedness graph, where k is larger than two. The control overhead is significantly raised if the network topology is dynamic. III. DECENTRALIZED BOUNDARY DETECTION A. Network Assumptions and System Model In DBD, it is assumed that each node is unaware of its own location but knows its three-hop neighbors by means of HELLO messages, one-hop, and two-hop node information. The network is represented as a connected graph G = (V G,E G ), where V G is the node set of graph G and each edge in E G is a two-way communication link. DBD can be applied in the network with UDG or quasi-udg embedding. The d-quasi Unit Disk Graph (d-qudg) is first discussed by Fig. 1. The outer boundary is a hole cycle. literature [1]. The parameter d denotes the rate of stable communication range to the maximum communication range. Let uv denote the Euclidean distance between nodes u and v. Assume that the maximum communication range is set as 1. A d-qudg satisfies two conditions: (1) uv E G uv 1, and (2) uv E G uv d. Researches [12], [17] adopt d-qudg model with d 2/2 to recognize the boundary. DBD intends to recognize the boundary without any constraint of the value of d. B. Definition of Hole Dong et al. [5] indicates that hole boundaries have two properties: continuity and consistency. Continuity means that all nodes in a boundary can form loop-like connection instead of being isolated. Consistency means that a boundary encircles holes in any embedding. A graph embedding is a particular drawing of a graph. The boundaries include outer boundaries and inner boundaries. This paper gives the definition of hole which contains above two properties. Definition 1. A cycle divides the plane into two parts: the outside face and the inside face. If the length of a cycle is larger than three and it cannot be decomposed into several cycles with the smaller length, the cycle is denoted as a hole cycle. A hole is an inside face formed by the hole cycle in graph G. Notice that the outer boundary (network boundary) is also a hole cycle in a specific graph embedding. For example, in Fig. 1, the outer boundary abcdefgh of left illustration is a hole cycle abcdefgh in right illustration with varying embedding. C. DBD Since each node maintains its 3-hop neighbors information, a 2-hop-neighbor graph as following definition is constructed by each node. Definition 2. Let Ns k be the k-hop neighbor set of node s (Ns 0 equals node s). Let Es ij denote the edge set where each edge is consisted of two endpoints in Ns i and Ns j, respectively. A 2-hop-neighbor graph of node s is denoted as G s =(Ns 1 Ns 2 s, Es 01 Es 11 Es 12 Es 22 ). The cycle which is inside graph G s can be detected by node s. It indicates that node s is aware of the hole formed by such cycle. 1743

3 Fig. 2. An example of contour lines. Rule 1. If there exists a hole in graph G s, node s is a boundary node. Rule 1 is designed to detect the hole within graph G s by node s. To against the hole which is not totally included in 2-hop-neighbor graph, DBD develops another detection rule, which is based on the contour structure [8]. Consider a point s in the planar field as shown in Fig. 2. Draw the circles centered at point s with radiuses 1, 2, 3,... These circles form the contour lines. Fig. 2 shows that some contour lines encounter the network boundary or an obstacle (the gray area), and they fail to form complete circles. Let point s be a node in the network. If a broken contour line is detected by node s, it is aware that the contour line has encountered the network boundary or an obstacle. However, node s is unaware of its location and the contour lines are virtual lines that they cannot really encounter the network boundary or an obstacle. Therefore, the contour line is replaced by Ns k and one-hop distance is regarded as a unit distance. Definition 3. The k-contour of node s is a graph Cs k = (Ns k,es kk ), where k>1. As the contour structure is defined, the next concern is determining whether a contour is broken or not. Arbitrarily select a node t Ns k. Let node t do the flooding method in graph Cs k,andtreets,t k rooted at node t is then constructed. The height of tree Ts,t k is denoted as H(Ts,t), k and the node set in tree Ts,t k with depth l is represented as Ds,t. k,l For any node m D k, H(T k s,t )/2 s,t, the broken contour is defined as below. Definition 4. Let E(S) E G denote the link set in node set S. Contour Cs k is broken if any one of following conditions holds: 1) All heights of trees constructed by flooding method in graph Cs k aresmallerthanorequaltothree. 2) For any tree Ts,t, k the corresponding (U, E(U)) is a disconnected graph, where U = Ns k \ ((Nm 1 Nm 2 m) D k, H(T k s,t )/2 s,t ). Figs. 3(a) (c) shows an example of the detection of the broken contour of node s. Node s constructs tree Ts,t k (Fig. 3(b)) in Fig. 3. An example of a broken contour of node s. (a) Graph Cs k. (b) Tree Ts,t k. (c) Graph (U, E(U)) of definition 4. (d) Tree T s,m, k the white squares are leaf nodes. graph C k s (Fig. 3(a)). Since contour C k s is broken, the graph in Fig. 3(c) is disconnected. As each node maintains its 2- hop-neighbor graph, it constructs its 2-contour to execute the following rule. Rule 2. If contour C 2 s is broken, node s is a boundary node. A node is a boundary node if it matches any one of two rules. The next section shows the proof of the correctness of two rules. IV. PROOF OF CORRECTNESS Lemma 1. A hole cycle has two properties: continuity and consistency. Proof. Since hole cycle is a cycle, the continuity property holds. On the other hand, a cycle, represented by sets V G and E G, does not change its structure with any embedding of graph G. Therefore, the consistency property also holds. Theorem 1. Let the nodes of hole cycle be denoted as tightly boundary nodes. All tightly boundary nodes can be identified as boundary nodes by DBD. Proof. Let node s be any one of tightly boundary nodes. For the hole cycle with length smaller than 6, it belongs to graph G s that can be detected by node s. Node s is identified as a boundary node by Rule 1. For the hole cycle with length larger than 5, a pair of tightly boundary nodes, say a and b, belong to set Ns 2. Two cases are considered. First, if no path can be constructed between nodes a and b in contour Cs 2, contour Cs 2 is a disconnected graph and becomes a broken contour. Second, if there exists a path between nodes a and b in contour Cs 2, tree Ts,a 2 contains node b. Since the length of the hole cycle is larger than 5, 1744

4 graph Cs 2 cannot enclose the hole. Further, node b is a leaf node in tree Ts,a 2 that matches the second condition of Def. 4. It indicates that contour Cs 2 is broken. Both cases indicate that contour Cs 2 is broken, so node s is identified as a boundary node by Rule 2. Since node s can be any tightly boundary node, the theorem is proved. Theorem 2. Let other identified boundary nodes which are not tightly boundary nodes named coarsely boundary node. If node s is a coarsely boundary node, there exists at least one tightly boundary node in N 2 s or N 1 s. Proof. The proof is considered as two cases. Case 1: Node s is identified by Rule 1. Graph G s contains a hole cycle, and all edges of the hole cycle belong to edge set E 01 s E 11 s E 12 s Es 22. There exists at least one tightly boundary node in set Ns 1 or Ns 2. Case 2: Node s is identified by Rule 2. Assume that tree Ts,t 2 matches the second condition of Def. 4. Let the leaf set of tree Ts,m 2 be L 2 s,m, where node m D 2, H(T 2 s,t )/2 s,t.since contour Cs 2 is broken, graph LG 2 s,m =(L 2 s,m, E(L 2 s,m)) is disconnected and consists at least two connected components, such as an example in Fig. 3(d) with k =2. A connected component of graph LG 2 s,m is one of the maximal connected subgraphs of graph LG 2 s,m. Assume all nodes in L 2 s,m are not tightly boundary nodes. For each node n L 2 s,m, Nn 1 can form a polygon which encloses node n, where each edge of the polygon belongs to En 11. Therefore, for each component A LG 2 s,m, there exists a polygon P, which is formed by the neighbors of node set V A, enclosing A. SetV P can be classified into three types: subset of Ns 1, subset of Ns 2, and subset of Ns 3.Asanexample shown in Fig. 3(d) with k =2, the triangles denote the nodes which belong to Ns 1 V P, the black squares are nodes which belong to Ns 2 V P, and the white diamonds belong to Ns 3 V P. The nodes which belong to Ns 2 V P form two components. The nodes of one component form a parent set of set V A in tree Ts,m, 2 and the nodes of the other component form a child set of set V A in tree Ts,m. 2 SincesetV A has a child set, V A is not a leaf set of tree Ts,m, 2 which contradicts to the assumption. Therefore, there exists at least one tightly boundary node in L 2 s,m. SincesetL 2 s,m Ns 2, there exists at least one tightly boundary node in Ns 2. Theorem 3. The boundaries identified by DBD contain both continuity and consistency properties. Proof. According to Theorems 1 and 2, all boundaries (outer and inner boundaries) can be found by DBD, and the boundaries identified by DBD are also outer or inner boundaries. By Lemma 1, the boundaries identified by DBD contain both continuity and consistency properties. V. PERFORMANCE EVALUATION The detection performance of the DBD scheme is evaluated in terms of the control overhead and the boundary detection TABLE I CONTROL OVERHEADS OF FIVE METHODS WITH DEGREES FROM 7 TO DBD THD THD-P BR TTG Fig. 4. Boundaries detected by five methods in WSN with grid-random deplyment and 1-QUDG. (a) Node deployment. (b) DBD. (c) TTG. (d) BR. (e) THD. (f) THD-P. with varying d-qudgs by NS2. The size of the sensing field is 600m 600m. The maximum transmission range of each node is set as 20m. The simulations consider five different detection schemes, namely DBD, THD [9], THD-P, BR [17], and TTG [5], where THD-P denotes the THD method with the pruning rule (maximal independent set). The simulation results is the average of fifty separate experiments. Table I compares the control overheads of five schemes in terms of the average number of packets sent per node. Each value is an average result from 1-QUDG and 0.7- QUDG environments with random deployment. Since DBD and BR require 3-hop and 7-hop neighboring information, respectively, the control overheads remain constant irrespective of the degree (the number of neighboring nodes). The control overheads of THD and THD-P vary in direct proportion to the degree since there are more nodes participating the repetitive flooding mechanism for identifying the breakpoints of contours. On the other hand, the control overhead of TTG is inverse proportional to the degree due to the less number of communication holes. TTG needs refine inner boundary cycle [5] for each communication hole. However, repetitive vertex deletion and edge deletion [5] cause a large amount of control overhead, so TTG is not suitable for the detection of new hole. Figs. 4 and 5 illustrate the boundary detection results 1745

5 Fig. 5. Boundaries detected by five methods in WSN with grid-random deplyment and 0.7-QUDG. (a) Node deployment. (b) DBD. (c) TTG. (d) BR. (e) THD. (f) THD-P. obtained by the five schemes with degree 12. DBD identifies all inner and outer boundaries in the network, no matter what the hole size and d-qudg are. On the other hand, THD and THD-P cannot identify the boundary between two holes if the holes get too close. Further, the boundary of hole cannot be identified if the size of hole is too small (as the hole formed by the cycle with length 4 in Fig. 4). BR cannot identify the boundaries if the hole is formed by the cycle with length smaller than 14 (bases on the collection of 7-hop neighboring information). Although TTG identifies all holes in the different environments, the accuracy of the recognized hole shapes is less than that of DBD. VI. SUMMARY In real-world WSNs, the performance of routing or coverage protocols is commonly degraded as a result of the presence of obstacles. Thus, obstacle detection is an important concern in most WSN applications. Previous boundary detection methods are generally dependent upon each node being aware of both its own location and that of its neighbors. However, accurate location information is unavailable in most WSNs. Accordingly, this paper has developed a location-free and decentralized boundary detection (DBD) scheme which requires only a knowledge of the three-hop neighboring node information. The correctness proof and simulation results have shown that DBD successfully detects all boundaries in the WSN with the smaller control overhead, and can apply in dynamic networks or new hole occurrence. Moreover, it has been shown that DBD can be applied in the environment with varying d-qudgs. Ranges, in ACM Workshop on Discrete Algothrithms and Methods for MOBILE Computing and Communications, July 2001, pp [2] A. Broggi, C. Caraffi, R. I. Fedriga, andp. Grisleri, ObstacleDetection with Stereo Vision for Off-road Vehicle Navigation, in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 2005, pp [3] J. Byrne, M. Cosgrove, and R. Mehra, Stereo Based Obstacle Detection for an Unmanned Air Vehicle, in Proceedings of IEEE International Conference on Robotics and Automation, May 2006, pp [4] S. Chen, G. Fan, and J. H. Cui, Avoid Void in Geographic Routing for Data Aggregation in Sensor Networks, International Journal of Ad Hoc and Ubiquitous Computing, vol. 2, no. 1, pp , July [5] D. Dong, Y. Liu, and X. Liao, Fine-grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks by Topological Methods, in ACM International Symposium on Mobile Ad Hoc Networking and Computing, May 2009, pp [6] Q. Fang, J. Gao, and L. J. Guibas, Locating and Bypassing Routing Holes in Sensor Networks, in IEEE International Conference on Computer Communications, March 2004, pp [7] S. P. Fekete, M. Kaufmann, A. Kröller, and K. Lehmann, A New Approach for Boundary Recognition in Geometric Sensor Networks, in Canadian Conference on Computational Geometry, August 2005, pp [8] S. Funke, Topological Hole Detection in Wireless Sensor Networks and its Applications, in Proceedings of Joint Workshop on Foundations of Mobile Computing, September 2005, pp [9] S. Funke and C. Klein, Hole Detection or: How much Geometry hides in Connectivity?, in Symposium on Computational Geometry, June 2006, pp [10] R. Ghrist and A. Muhammad, Coverage and Hole Detection in Sensor Networks via Homology, in IEEE International Symposium on Information Processing in Sensor Networks, April 2005, pp [11] Y. Huang, Obstacle Detection in Urban Traffic Using Stereovision, in Proceedings of IEEE Intelligent Transportation Systems Vienna, September 2005, pp [12] A. Kröller, S. P. Fekete, D. Pfisterer, and S. Fischer, Deterministic Boundary Recognition and Topology Extraction for Large Sensor Networks, in ACM-SIAM Symposium on Discrete Algorithms, January 2006, pp [13] X. Li, D. K. Hunter, and K. Yang, Distributed Coordinate-free Hole Detection and Recovery, in IEEE Global Telecommunications Conference, November 2006, pp [14] W. J. Liu and K. T. Feng, Greedy Anti-void Routing Protocol for Wireless Sensor Networks, IEEE Communication Letters, vol. 11, no. 7, pp , July [15] P. Lombardi, M. Zanin, and S. Messelodi, Unified Stereovision for Ground, Road, and Obstacle Detection, in Proceedings of IEEE Intelligent Vehicles Symposium, June 2005, pp [16] F. Reichenbach, R. Salomon, and D. Timmermann, Distributed Obstacle Localization in Large Wireless Sensor Networks, in Proceedings of International Conference on Wireless Communications and Mobile Computing, July 2006, pp [17] O. Saukh, R. Sauter, M. Gauger, and P. J. Marrón, On Boundary Recognition without Location Information in Wireless Sensor Networks, ACM Transactions on Sensor Networks, vol. 6, no. 3, June [18] X. Shan and J. Tan, Mobile Sensor Deployment for a Dynamic Clusterbased Target Tracking Sensor Network, in IEEE/RSJ International Conference on Intelligent Robots and Systems, August 2005, pp [19] Y. Wang, J. Gao, and J. S. B. Mitchell, Boundary Recognition in Sensor Networks by Topological Methods, in ACM International Conference on Mobile Computing and Networking, September 2006, pp [20] M. K. Watfa and S. Commuri, Energy-efficient Approaches to Coverage Holes Detection in Wireless Sensor Networks, in Proceedings of IEEE International Symposium on Intelligent Control, October 2006, pp [21] L. Zou, M. Lu, and Z. Xiong, A Distributed Algorithm for the Deadend Problem of Location based Routing in Sensor Networks, IEEE Trans. Vehicular Technology, vol. 54, no. 4, pp , July REFERENCES [1] L. Barrière, P. Fraigniaud, and L. Narayanan, Robust Position-based Routing in Wireless Ad Hoc Networks with Unstable Transmission 1746

Hole Detection and Boundary Recognition in Wireless Sensor Networks

Hole Detection and Boundary Recognition in Wireless Sensor Networks Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh Dept. of Computer Science and Information Engineering National Central University Jhongli, 32054, Taiwan E-mail: rocky@axp1.csie.ncu.edu.tw

More information

Boundary Recognition in Sensor Networks. Ng Ying Tat and Ooi Wei Tsang

Boundary Recognition in Sensor Networks. Ng Ying Tat and Ooi Wei Tsang Boundary Recognition in Sensor Networks Ng Ying Tat and Ooi Wei Tsang School of Computing, National University of Singapore ABSTRACT Boundary recognition for wireless sensor networks has many applications,

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

On Boundary Recognition without Location Information in Wireless Sensor Networks

On Boundary Recognition without Location Information in Wireless Sensor Networks Rheinische Friedrich-Wilhelms-Universität Bonn Institute for Computer cience IV Römerstraße 164 D-53117 Bonn On Boundary Recognition without Location Information in Wireless ensor Networks Olga aukh 1,

More information

Literature Review on Hole Detection and Healing in Wireless Sensor Network

Literature Review on Hole Detection and Healing in Wireless Sensor Network Review Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Samidha

More information

An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network

An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network Rajesh Sharma Lalit Kumar Awasthi Naveen Chauhan ABSTRACT Nodes along the boundaries of a Wireless Sensor Network (WSN)

More information

Distributed Coordinate-free Hole Detection and Recovery

Distributed Coordinate-free Hole Detection and Recovery Distributed Coordinate-free Hole Detection and Recovery Xiaoyun Li xliw@essex.ac.uk David K. Hunter dkhunter@essex.ac.uk Kun Yang kunyang@essex.ac.uk Abstract A distributed algorithm is introduced which

More information

Boundary Recognition in Sensor Networks by Topological Methods

Boundary Recognition in Sensor Networks by Topological Methods Boundary Recognition in Sensor Networks by Topological Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B. Mitchell Dept. of Applied Math. and Statistics

More information

Light-weight Contour Tracking in Wireless Sensor Networks

Light-weight Contour Tracking in Wireless Sensor Networks Light-weight Contour Tracking in Wireless Sensor Networks Xianjin Zhu Rik Sarkar Jie Gao Joseph S. B. Mitchell INFOCOM 08 1 Motivation Sensor network: sense and monitor the physical world (temperature,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks

New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks 163 New Holes Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks Ahmed M. Khedr 1 Arwa Attia 2 1 Computer Science Department, University of Sharjah, Sharjah 27272, UAE 1,2 Mathematics

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

GIS based topology for wireless sensor network modeling: Arc-Node topology approach

GIS based topology for wireless sensor network modeling: Arc-Node topology approach GIS based topology for wireless sensor network modeling: Arc-Node topology approach S.Amin Hosseini (Author) Zanjan Branch, Islamic Azad University, Zanjan,. Iran Email: s.a.hosseini86@gmail.com Behrooz

More information

Fine-Grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks By Topological Methods

Fine-Grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks By Topological Methods Fine-Grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks By Topological Methods Dezun Dong Yunhao Liu Xiangke Liao School of Computer, National University of Defense Technology, Changsha,

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive

More information

Research on Relative Coordinate Localization of Nodes Based on Topology Control

Research on Relative Coordinate Localization of Nodes Based on Topology Control Journal of Information Hiding and Multimedia Signal Processing c 2018 ISSN 2073-4212 Ubiquitous International Volume 9, Number 2, March 2018 Research on Relative Coordinate Localization of Nodes Based

More information

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston,

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing? Geographical routing in practice We noticed that the trouble is due to face routing. Is greedy routing robust to localization noise? Can we ignore the real coordinates and use virtual coordinates for routing?

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Two trees which are self-intersecting when drawn simultaneously

Two trees which are self-intersecting when drawn simultaneously Discrete Mathematics 309 (2009) 1909 1916 www.elsevier.com/locate/disc Two trees which are self-intersecting when drawn simultaneously Markus Geyer a,, Michael Kaufmann a, Imrich Vrt o b a Universität

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Rini Baby N M.G University, Kottayam, Kerala, India Abstract: The main services provided by a WSN (wireless sensor network)

More information

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for Minimum m-connected k-dominating Set Problem Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China

More information

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Ted Brown, Deniz Sarioz, Amotz Bar-Noy, Tom LaPorta, Dinesh Verma, Matthew Johnson, Hosam Rowaihy November 20, 2006 1 Introduction

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Hole repair algorithm in hybrid sensor networks

Hole repair algorithm in hybrid sensor networks Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 2016) Hole repair algorithm in hybrid sensor networks Jian Liu1,

More information

Link-Based Wormhole Detection in Wireless Sensor Networks

Link-Based Wormhole Detection in Wireless Sensor Networks Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

Coarse-to-Fine Search Technique to Detect Circles in Images

Coarse-to-Fine Search Technique to Detect Circles in Images Int J Adv Manuf Technol (1999) 15:96 102 1999 Springer-Verlag London Limited Coarse-to-Fine Search Technique to Detect Circles in Images M. Atiquzzaman Department of Electrical and Computer Engineering,

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Mobile Wireless Sensor Network Connectivity Repair with K-Redundanc

Mobile Wireless Sensor Network Connectivity Repair with K-Redundanc Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2007-48 2007 Mobile Wireless

More information

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT FREE REGIONS OF SENSOR NODES Laxmi Gewali 1, Navin Rongatana 2, Henry Selvaraj 3, Jan B. Pedersen 4 Howard R. Hughes College of Engineering University of Nevada, Las Vegas, NV 89154-4026 1 laxmi@cs.unlv.edu,

More information

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

Detection of Holes in Wireless Sensor Networks by Distributed Hole Detection Algorithm

Detection of Holes in Wireless Sensor Networks by Distributed Hole Detection Algorithm National Journal on Advances in Computing & Management Vol.5 No. 2 October 2014 7 Detection of Holes in Wireless Sensor Networks by Distributed Hole Detection Algorithm V Venkatesa Kumar M.E., Ph.D, S

More information

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming

More information

Using temporal seeding to constrain the disparity search range in stereo matching

Using temporal seeding to constrain the disparity search range in stereo matching Using temporal seeding to constrain the disparity search range in stereo matching Thulani Ndhlovu Mobile Intelligent Autonomous Systems CSIR South Africa Email: tndhlovu@csir.co.za Fred Nicolls Department

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Journal of Industrial Engineering Research

Journal of Industrial Engineering Research IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Mammogram Image Segmentation Using voronoi Diagram Properties Dr. J. Subash

More information

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive

More information

Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks

Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, and Su Xia Presenter: Hongyi Wu The Center for Advanced

More information

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.

More information

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM D.Yamini 1, J. Jayavel 2 1 III-M.tech(IT), Department of Information technology,

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks

A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks I.J. Wireless and Microwave Technologies, 01,, 65-73 Published Online April 01 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.01.0.10 Available online at http://www.mecs-press.net/ijwmt A Real-Time

More information

A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface

A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface Hongyu Zhou, Hongyi Wu, Su Xia, Miao Jin, Ning Ding The Center for Advanced Computer Studies(CACS) University of

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

IN WIRELESS SENSOR NETWORKS

IN WIRELESS SENSOR NETWORKS CONSTRUCTING K-CONNECTED M-DOMINATING SETS IN WIRELESS SENSOR NETWORKS Yiwei Wu, Feng Wang,MyT.Thai and Yingshu Li Department of Computer Science, Georgia State University, {wyw, yli}@cs.gsu.edu Department

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Connected Components of Underlying Graphs of Halving Lines

Connected Components of Underlying Graphs of Halving Lines arxiv:1304.5658v1 [math.co] 20 Apr 2013 Connected Components of Underlying Graphs of Halving Lines Tanya Khovanova MIT November 5, 2018 Abstract Dai Yang MIT In this paper we discuss the connected components

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Landmark-based routing

Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation

More information

Map: Medial axis based geometric routing in sensor networks

Map: Medial axis based geometric routing in sensor networks DOI.7/s11276-6-9857-z Map: Medial axis based geometric routing in sensor networks Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Published online: 23 October 6 C Science + Business Media, LLC 6 Abstract

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

LORP : A Load-balancing Based Optimal Routing Protocol for Sensor Networks with Bottlenecks

LORP : A Load-balancing Based Optimal Routing Protocol for Sensor Networks with Bottlenecks LORP : A Load-balancing Based Optimal Routing Protocol for Sensor Networks with Bottlenecks Liie Xu, Guihai Chen, Xinchun Yin, Panlong Yang and Baiian Yang Institute of Information Engineering, Yangzhou

More information

coding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight

coding of various parts showing different features, the possibility of rotation or of hiding covering parts of the object's surface to gain an insight Three-Dimensional Object Reconstruction from Layered Spatial Data Michael Dangl and Robert Sablatnig Vienna University of Technology, Institute of Computer Aided Automation, Pattern Recognition and Image

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges 1 Connected Dominating Sets in Wireless Networks with Different Transmission Ranges My T. Thai Feng Wang Dan Liu Shiwei Zhu Ding-Zhu Du Dept. of Computer Science & Enginering University of Minnesota Minneapolis,

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Constructing weakly connected dominating set for secure clustering in distributed sensor network

Constructing weakly connected dominating set for secure clustering in distributed sensor network J Comb Optim (01) 3:301 307 DOI 10.1007/s10878-010-9358-y Constructing weakly connected dominating set for secure clustering in distributed sensor network Hongjie Du Weili Wu Shan Shan Donghyun Kim Wonjun

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Ding-Zhu Du 1,MyT.Thai 1,YingshuLi 2,DanLiu 1, and Shiwei Zhu 1 1 Department of Computer Science and Engineering,

More information

ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks

ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks Hongyu Zhou, Hongyi Wu, and Miao Jin Abstract In this work we develop a distributed boundary detection algorithm,

More information

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br

More information

Scene Text Detection Using Machine Learning Classifiers

Scene Text Detection Using Machine Learning Classifiers 601 Scene Text Detection Using Machine Learning Classifiers Nafla C.N. 1, Sneha K. 2, Divya K.P. 3 1 (Department of CSE, RCET, Akkikkvu, Thrissur) 2 (Department of CSE, RCET, Akkikkvu, Thrissur) 3 (Department

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

A Novel Geometric Diagram and Its Applications in Wireless Networks

A Novel Geometric Diagram and Its Applications in Wireless Networks A Novel Geometric Diagram and Its Applications in Wireless Networks Guangbin Fan * and Jingyuan Zhang * Department of Computer and Information Science, University of Mississippi University, MS 38677, Email:

More information

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [cs.cc] 30 Jun 2017 Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs Erik D. Demaine Mikhail Rudoy arxiv:1706.10046v1 [cs.cc] 30 Jun 2017 Abstract In 2007, Arkin et al. [3] initiated

More information