Responsive image
博碩士論文 etd-0721105-140137 詳細資訊
Title page for etd-0721105-140137
論文名稱
Title
應用對偶性及基因演算法來解決無線感測網路中的覆蓋率問題
Duality and Genetic Algorithms for the Worst-Case-Coverage Deployment Problem in Wireless Sensor Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
49
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2005-07-12
繳交日期
Date of Submission
2005-07-21
關鍵字
Keywords
覆蓋率、對偶性、無線感測網路、基因演算法
Wireless Sensor Network, Coverage, Genetic Algorithm, Duality
統計
Statistics
本論文已被瀏覽 5667 次,被下載 3152
The thesis/dissertation has been browsed 5667 times, has been downloaded 3152 times.
中文摘要
在本論文中,我們針對ad-hoc無線感測網路的最糟情形下部署節點問題提出演算法來加以解決。最糟情形下部署節點的問題是指在無線感測區域裡部署新的感測節點來最佳化最糟情形下感測情形。我們找出Maximum breach path與Minimum Delaunay cut之間的對偶關係,並透過這個關係我們提出找出網路Delaunay Cut所形成的防守線以利於部署多個感測節點提升覆蓋率。這個對偶關係產生的結果類似網路最佳化領域中大家熟知的Max-flow-min-cut定理,主要的不同點則是在於我們論文中的目標函數是非線性而不是線性的。基於這個對偶性關係,我們提出一個有效率的對偶性防守線演算法以解決最糟情形下部署節點的問題。另外,我們提出一套基因演算法用來找出多個感測節點部署位置。我們針對提出的定理使用分析證明來解說,並透過模擬結果驗證我們所提出的方法。
Abstract
In this thesis, we propose and evaluate algorithms for solving the worst-case-coverage deployment problem in ad-hoc wireless sensor networks. The worst-case-coverage deployment problem is to deploy additional sensors in the wireless sensor field to optimize the worst-case coverage. We derive a duality theorem that reveals the close relation between the maximum breach path and the minimum Delaunay cut. The duality theorem is similar to the well-known max-flow-min-cut theorem in the field of network optimization. The major difference lies in the fact that the object function we study in this paper is nonlinear rather than linear. Based on the duality theorem, we propose an efficient dual algorithm to solve the worst-case-coverage deployment problem. In addition, we propose a genetic algorithm for deploying a number of additional sensors simultaneously. We use analytical proofs and simulation results to justify the usage of the proposed approaches.
目次 Table of Contents
第一章 緒論 1
1-1無線感測網路的背景 1
1-2 文獻探討 2
1-3 研究動機 4
1-4文章組織 5
第二章 最糟情形覆蓋率下同時多個感測節點部署方案 6
2-1 Voronoi Diagram 6
2-2 MBP (Maximal Breach Path)節點部署 8
2-3 基因演算法(GA)節點部署 11
2-4 GA電腦模擬 16
2-5 防守線(DP)節點部署 25
2-6 DP電腦模擬 33
2-7 模擬結論 36
第三章 結論 37
3-1 總結 37
3-2 未來努力方向 37
參考文獻 38
參考文獻 References
[1] Sachin Adlakha; Mani Srivastava,”Critical Density Thresholds for Coverage in Wireless Sensor Networks,” Wireless Communications and Networking, 2003. WCNC 2003. IEEE ,Volume: 3 ,16-20 March 2003
[2] L. Bao and J. J. Garcia-Luna-Aceves, "A new approach to channel access scheduling for ad hoc networks," in Proc. ACM MOBICOM 2001, July 2001.
[3] J. M. Kahn, R. H. Katz, K. S. J. Pister ," Next century challenges: mobile networking for Smart Dust,” Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking , August 1999
[4] V. Kawadia, P.R.Kumar,” Power control and clustering in ad hoc networks,” INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE , Volume: 1 , 30 March - 3 April 2003.
[5] I. Kyildiz, S. Weilian, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, Issue 8, Aug. 2002
[6] X.Y. Li, P.J. Wan and O.Frieder, "Coverage in Wireless Ad Hoc Sensor Networks," IEEE Transactions On Computers, Vol.52, No.6, June 2003
[7] Frank Y. S. Lin and P. L. Chiu, "A Near-Optimal Sensor Placement Algorithm to Achieve Complete Coverage/Discrimination in Sensor Networks," IEEE Communications Letters, Vol.9, No. 1, January 2005
[8] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, “Wireless sensor networks for habitat monitoring,” In Proc. of ACM WSNA'02, 2002
[9] S. Megerian, F. Koushanfar, M. Potkonjak, M.B. Srivastava, "Worst and Best-Case Coverage in Sensor Networks," IEEE Transactions on Mobile Computing, Publication Date : Jan.-Feb. 2005 On page(s): 84-92 Vol. 04, Issue: 1
[10] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and Mani B. Srivastava, ”Coverage Problems in Wireless Ad-hoc Sensor Networks,” INFOCOM 2001, Proceedings, IEEE, Vol. 3, 2001, pp.1380-1387.
[11] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, "Exposure In Wireless Ad-Hoc Sensor Networks," Proceedings of the 7th annual international conference on Mobile computing and networking, p.139-150, July 2001, Rome, Italy
[12] Kim Minkyu; M. Medard, ”Robustness in large-scale random networks,” INFOCOM 2004 Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies , Vol. 4 ,7-11 March 2004
[13] Melanie Mitchell, “An Introduction to Genetic Algorithms,” MIT Press 1996
[14] K.Mulmuley, “Computational Geometry: An Introduction through Randomized Algorithms,” Prentice-Hall, 1994
[15] http://robotics.eecs.berkeley.edu/~pister/SmartDust/
[16] http://www-2.cs.cmu.edu/~quake/triangle.html
[17] Venkatesh Rajendran, Katia Obraczka, and J.J. Garcia-Luna-Aceves. "Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks," Proceedings of the 1st international conference on Embedded networked sensor systems. November, 2003
[18] V. Rodoplu, T.H. Meng, "Minimum energy mobile wireless networks," Selected Areas in Communications, IEEE Journal on , Volume: 17 Issue: 8 , Aug. 1999 Page(s): 1333 -1344
[19] Jingao Wang, Qing-An Zeng and Dharma P. Agrawal, ”Performance Analysis of a Preemptive and Priority Reservation Handoff Scheme for Integrated Service-Based Wireless Mobile Networks,” IEEE TRANSACTIONS On Mobile Computing, Vol. 2, No.1 JANUARY-MARCH 2003
[20] Alec Woo, David E. Culler, “A Transmission Control Scheme for Media Access in Sensor Networks,” Proceedings of the 7th annual international conference on Mobile computing and networking July 2001
[21] L. Yao, W.A Sethares,; D.C.Kammer, "Sensor placement for on-orbit modal identification of large space structure via a genetic algorithm," Systems Engineering, 1992, IEEE International Conference on 17-19 Sept. 1992 Page(s):332 - 335
[22] J. Yeo, H. Lee and S. Kim, “An efficient broadcast scheduling algorithm for TDMA ad-hoc networks,” Computer & Operations Research, 29, (2002) 1793-1806
[23] R. Zheng, R. Kravets, "On-demand power management for ad hoc networks," INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE ,Vol. 1 ,30 3-Mar April 2003
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code