Localized Sensor Self-deployment for Guaranteed Coverage Radius Maximization Xu Li∗ , Hannes Frey† , Nicola Santoro‡ , and Ivan Stojmenovic∗ ∗ SITE,

† CS,

University of Ottawa, Canada – {xuli, ivan}@site.uottawa.ca University of Paderborn, Germany – [email protected] ‡ SCS, Carleton University, Canada – [email protected]

Abstract—Focused coverage is defined as the coverage of a wireless sensor network surrounding a point of interest (POI), and is measured by coverage radius, i.e., minimum distance from POI to uncovered areas. Sensor self-deployment algorithm GRG [4] is designed for autonomous focused coverage formation. It however does not always produce optimal (i.e., maximized) coverage radius. In this paper, we propose optimized GRG, referred to as OGRG, for guaranteed coverage radius maximization, and evaluate its performance in comparison with GRG

I. I NTRODUCTION Sensor self-deployment traditionally deals with autonomous coverage formation in a mobile sensor network (MSN) over a region of interest (ROI) without particular coverage focus. Sensors are simply required to scatter/gather to construct a maximized hole-free coverage in any part of ROI. Recently, Li et al. [4] introduced a new sensor self-deployment problem, focused coverage formation, where self-governing sensors surround a point of interest (POI), while satisfying a priority requirement: an area close to POI is covered with higher priority than a relatively distant one. Because of this unique requirement, it is no longer sufficient to merely measure area and sensing holes in the case of focused coverage. An additional metric, coverage radius [4], ought to be used. It is defined as the radius of the maximal hole-free disc centered at POI in the coverage region, i.e., the minimum distance from POI to uncovered areas. Coverage radius is expected to be maximized. Li et al. [4] proposed a localized sensor self-deployment algorithm Greedy-RotationGreedy (GRG). This algorithm has many nice properties; but it provides no optimality guarantee in coverage radius [5]. In this paper, we propose optimized GRG, referred to as OGRG, for guaranteed coverage radius maximization. As GRG, OGRG drives in a localized manner sensors to move from vertex to vertex over an equilateral triangle tessellation (TT) to surround POI in a greedy-rotation alternate fashion. That is, sensors greedily proceed as close to POI as possible; when blocked, they rotate around POI to a vertex where greedy advance can resume. Unlike GRG where sensors rotate along hexagons, it guides sensors to rotate along deployment polygons that best approximate circles, and therefore always lead to optimal focused coverage of maximized radius. II. G REEDY-ROTATION -G REEDY IN A N UTSHELL In this section, we introduce algorithm GRG [4]. We would like to indicate that, as focused coverage is a new problem with

unique requirement, other previous sensor self-deployment algorithms, e.g., [2], [3], [6], [7], are not applicable, or applicable with poor performance, to it. GRG [4] requires sensors to know their own location as well as the location of POI (denoted by Π). Sensors bear the√same communication radius rc and sensing radius rs for rc ≥ 3rs . They have the information such as locations and moving status of 1-hop neighbors by lower-layer protocols. In GRG, a TT graph GT T (Fig. 1) is built in the deployment √ plane with Π as vertex and with edge length le = 3rs . GT T is locally computable by each sensor using a common orientation. In GT T , there are 6i many vertices with equal graph distance i to Π. These vertices constitute a distance-i hexagon, denoted by Hi , centered at Π. The total number ν(i) of vertices enclosed inclusively by Hi is exactly ν(i) = 3i(i + 1) + 1 .

(1)

GRG translates area coverage problem to vertex coverage problem on GT T . In GRG, each sensor first by an alignment rule moves to the closet TT vertex and then acts in the following way: greedily proceed from vertex to vertex toward Π; when blocked, i.e., when greedy next hop is occupied by others, rotate around Π counterclockwise along the residence hexagon to a vertex where greedy advance can resume; if both greedy advance and rotation are blocked, stay put. Greedy advance rules and rotation rules are carefully designed to guarantee progress and termination. GRG has two variants: GRG-CW and GRG-CV. The former allows greedy-rotation collisions and solves them after, while the latter prevents this particular type of node collision by using additional collision avoidance rules. However, notice that GRG (even the -CV version) is not collision free in general, due to initial stochastic node distribution. To solve node collision and ensure coverage maximization, GRG employs a retreat rule, which allows only one node to stay by pushing the others onto the next outer hexagon after a node collision. GRG does not require fixed network size and allows dynamic node addition and removal. It works regardless of network asynchrony and disconnectivity. Using merely one-hop neighborhood information, it produces a connected network of TT layout without sensing hole and consequently a maximized coverage according to [8]. It is the first localized sensor selfdeployment algorithm that provides such coverage guarantee. GRG ensures a hexagon coverage shape centered at POI. It

√  where ρ(i) = 6 √ t (2 12 (i − t − 6it − 3t2 ) + 1) for integer t ∈ [1, (1 − 23 )i − 1 ] represents the number of vertices that exist in/on Hi but fall outside Pi . B. Properties The six vertex neighbors of any vertex v defines a circle of le that is centered at v. In order for v to be located on Pi , this circle must intersect Ci . Clearly, R(Ci ) = ih where h = 32 rs is the height of a TT triangle. Denote by |vΠ| the Euclidean distance from v to Π. Hence, v can be located only on Pi for |vΠ| ≤ ih + le . It can be trivially derived that a satisfactory i is  |vΠ| that another possibly satisfactory h , and √  − 1. Recall l = 3rs . Summarizing, we have the i is  |vΠ| e h following theorem: T HEOREM 1 (R ESIDENCE ): In GT T , a vertex v must reside on Pi where i =  2|vΠ| 3rs ; it will also reside on Pi−1 iff it has a neighboring vertex w such that |wΠ| < 32 (i − 1)rs . L EMMA 2: In GT T , no edge is shared by two different deployment polygons. L EMMA 3: On a deployment polygon, the two vertex neighbors of any vertex are not adjacent to each other. By Lemmas 2 and 3 (whose proofs are omitted due to space limitation) and by exhaustive enumeration, we have: T HEOREM 2 (PATTERN ): In GT T , a non-POI vertex v has four and only four possible neighborhood patterns, with respect to its residence polygon(s): 1) edge (−): v has one residence polygon; it is located on an polygon edge; 2) convex corner (∧): v has one residence polygon; it is located at a convex polygon corner; 3) concave corner (∨): v has one residence polygon; it is located at a concave polygon corner; 4) joint corner (×): v has two residence polygons; examples are the dotted vertices in Fig. 1. Figure 2 illustrates the four neighborhood patterns, which are obviously locally detectable. From this figure, the vertex neighbors of v may be divided into four disjoint sets: left-hand neighbor set N l (v), right-hand neighbor set N r (v), inward neighbor set N i (v), and outward neighbor set N o (v). The first two sets respectively contain the vertex neighbors of v on its residence polygons in the clockwise direction and in the counter-clockwise direction around Π; the last two sets respectively consist of those on an inner deployment polygon and on an outer deployment polygon. By Theorem 1, vertex v must reside on Pi where i =   2|vP| 3rs . Define i = i − 1 if Pi−1 is also a residence polygon of v, or i = i otherwise. With no difficulty, we may conclude that the vertices in N i (v) are all located on Pi −1 and that the vertices in N o (v) are all located on Pi+1 . Let Inn(N l (v)) and Out(N l (v)) be the vertex neighbors of v on Pi −1 and Pi+1 , respectively. Inn(N l (v)) = Out(N l (v)) when |N l (v)| = 1. To ease later writing, we denote by P at(v) the neighborhood pattern of v, and we further denote by Ltm(N i (v)), M id(N i (v)) and Rtm(N i (v)) the leftmost, the middle, and the rightmost vertex neighbors of v in N i (v), respectively. If

Fig. 1. Equilateral triangle tessellation and Deployment polygons P14 , P15

is proven that the radius of the resultant focused coverage approximates the maximum value with a factor in [0.88, 1] [5]. III. D EPLOYMENT POLYGON The radius γ C of a focused coverage produced by GRG is considered equivalent to the radius of the inscribed circle of the outmost fully-occupied hexagon Hκ [5]. However, Hκ might not approximate its inscribed circle best, and nodes making no contribution to γ C may exist in the corner areas of Hκ . For this, GRG does not guarantee optimal (maximized) coverage radius. Below, we define deployment polygons that best approximate circles over GT T and present their localized computation. Later, in Section IV, we show how to enable GRG to guarantee coverage radius maximization without jeopardizing its any other property using these polygons. A. Definition Denote by Ci the inscribed circle of an arbitrary hexagon Hi and by R(Ci ) the radius of Ci . In discrete graph GT T , Ci is best approximated without radius reduction by a minimum polygon that encloses Ci and consists of successive vertices. Apparently, this polygon must be completely contained in, or overlapped by, Hi . We refer to it as deployment polygon associated with Ci and denote it by Pi . Formally, we define: D EFINITION 1 ( DEPLOYMENT POLYGON ): In GT T , a deployment polygon Pi is the perimeter of the polygonal area composed of the TT triangles inside Ci and the TT triangles across the border of Ci . Observe Fig. 1 that shows Pi and Ci for i = 14 and 15. Pi is constituted exactly by the vertices that are located on the border of Ci as well as those that reside outside Ci and comprise the TT triangles crossing the border of Ci . Hence, by definition, we have the following lemma: L EMMA 1: In GT T , a vertex is located on Pi if and only if it itself does not reside inside Ci and at least one of its neighboring vertex lies inside Ci . According to [5], the total number ν  (i) of vertices enclosed inclusively by Pi is  ν(i) for i ≤ 7  ν (i) = (2) ν(i) − ρ(i) for i > 7 , 2

Fig. 2.

Neighborhood patterns

|N i (v)| = 2, then define M id(N i (v)) = Rtm(N i (v)); in the case of |N i (v)| = 1, define Ltm(N i (v)) = M id(N i (v)) = Rtm(N i (v)). The above denotations for vertices in N l (v) and N i (v) are likewise applied to those in N o (v) and N r (v) too.

Note that, if P at(v) = “ ∧ ” and the two nodes are instead from e and c, they could also collide at v. To prevent this collision, the following forbiddance rule can be used. RULE 2 (F ORBIDDANCE RULE ): A node at Rtm(N o (v)) does not take v as greedy next hop when P at(v) = “ ∧ ”. Π is a special vertex with 6 outward vertex neighbors. Its occupancy is ensured by the following innermost-layer rule. RULE 3 (I NNERMOST- LAYER RULE ): A node at a vertex on P1 moves to Π as long as Π is to its knowledge unoccupied. The innermost-layer rule may induce node collision at Π, but fortunately no more than once according to [4]. As in GRG, this potential greedy-greedy collision can be avoided by a gateway rule to be introduced later, in Sec. IV-C.

IV. O PTIMIZED G REEDY-ROTATION -G REEDY We will now present the optimized GRG algorithm, OGRG, by using deployment polygons instead of hexagons for node rotation. As deployment polygons best approximate circles without radius degradation, OGRG naturally provides guaranteed coverage radius maximization. OGRG follows the same combined greedy-rotation idea as GRG for sensors self-deployment and thus preserves all the properties of GRG. In OGRG, a node located at a vertex v greedily advances to an eligible vertex in N i (v); in the case that no such a vertex exists, it moves to an eligible vertex in N r (v) instead; if no eligible greedy next or rotation next hop exists, it stays still for the time being and resumes deployment movement whenever possible. In OGRG, the eligibility of a vertex for deployment next hop is determined by a set of strictly localized hop selection rules. These rules share the same design considerations with their counterparts in GRG. Despite design similarity, their definition is not trivial, as polygon vertices have more complex neighbor patterns than hexagon vertices and bring more possibilities and restrictions to hop selection. OGRG adopts the same alignment rule and the same retreat rule as GRG to deal with off-vertex sensors and node collision. Below, we present its hop selection rules only, in groups in accordance with their purposes.

B. Rotation Rotation resumes blocked greedy advance by guiding nodes around occupied vertices. It happens to a node when the node moves to a vertex from the vertex’s left-hand vertex neighbor. Examine Fig. 2. If a node is moving to v from f while another node is moving to v from e, they are likely to collide at v. This collision can be prevented by the competition rule: RULE 4 (C OMPETITION RULE ): When two nodes are competing for vertex v from two different vertices Out(N l (v)) and Ltm(N o (v)) (or, Inn(N l (v)) and Out(N l (v))), the one from Out(N l (v)) (resp., Inn(N l (v))) wins. If the two nodes are instead from f and an outward vertex neighbor different than e of v, they could also collide at v. But this collision is no longer avoidable by the above rule. We will elaborate and resolve this situation later, in Sec. IV-C. Figure 2 shows that Rtm(N o (v)) is always adjacent to Out(N r (v)). If a node located at v discovers that some node is rotating to Rtm(N o (v)), then it knows that the node will proceed to Out(N r (v)) if it itself does not chose Out(N r (v)) as rotation next hop. This is the design consideration of the following suspension rule, which prevents rotation loop and ensures nodes’ greedy advance [5]. RULE 5 (S USPENSION RULE ): A node located at vertex v does not rotate to Out(N r (v)) if any of its neighbors is currently rotating to Rtm(N o (v)). Note: when the collision avoidance rules to be defined in Sec. IV-C are applied, the suspension rule ought to be ignored if greedy advance at Rtm(N o (v)) is forbidden by those rules.

A. Greedy advance Greedy advance ensures nodal progress toward Π. It happens to a node when the node proceeds to a vertex v from an outward vertex neighbor of v. It is possible, only under the condition |N o (v)| > 1, that multiple greedily advancing nodes collide at a non-POI vertex v. By Fig. 3, this condition is true only when P at(v) = “ − ”|“ ∧ ”. Examine the corresponding graphs in Fig. 2. If two nodes are greedily moving to v from vertices e and d in parallel, they may collide at v. But this situation can be avoided by the following priority rule as e and d are adjacent to each other. RULE 1 (P RIORITY RULE ): For two nodes aiming at a nonPOI vertex v from two different vertices Ltm(N o (v)) and M id(N o (v)), the one from M id(N o (v)) has higher priority.

C. Collision avoidance The greedy rules preclude non-POI-based greedy-greedy collision but leave POI-based still possible. The rotation rules 3

(a) P at(a) = “ ∧ ” (case 1)

with respect to the neighborhood pattern of a. Examining this figure, we define the following collision avoidance rules (whose detailed derivation is omitted due to space limitation): RULE 7 (E DGE RULE ): A node located at vertex v with P at(v) = “ − ” does not take Ltm(N i (v)) (or Rtm(N i (v))) as greedy next hop if P at(Ltm(N i (v))) = “ − ”|“ × ” (resp., P at(Rtm(N i (v))) = “ × ”). RULE 8 (C ONCAVE - CORNER RULE ): A node located at vertex v with P at(v) = “ ∨ ” does not move to Ltm(N i (v)) (or M id(N i (v))) if P at(Ltm(N i (v))) = “ − ” (resp., “ × ”). RULE 9 (C ONVEX - CORNER RULE ): A node located at vertex v with P at(v) = “∧”|“×” does not move to Ltm(N i (v)) if P at(Ltm(N i (v))) = “ ∧ ”|“ × ”|“ − ”, where “ − ” additionally requires Out(N l (Ltm(N i (v)))) = Inn(N l (v))).

(b) P at(a) = “ ∧ ” (case 2)

V. P ERFORMANCE EVALUATION

(c) P at(a) = “−” (case 1)

(d) P at(a) = “−” (case 2)

(e) P at(a) = “ ∨ ”

(f) P at(a) = “ × ”

Fig. 3.

In this section, we will present our comparative simulation study of GRG [4] and OGRG. As our simulation results are consistent with those detailedly presented in [5], here we only study their performance difference for achieving the same coverage radius (referred to as cR) with proper number of nodes (referred to as nN). It is important to notice from Eqn. (1) and (2) that, OGRG uses increasingly less nodes than GRG when the target cR goes up. We chose the following evaluation metrics that are also adopted in [5]: • Convergence time (cT): the number of time units that it takes the network to stabilize (have no floating node); • Number of collisions (nC): the number of times that node collision occurs during the course of self-deployment. • Mileage (Mg): the average distance that a node travels during the course of its self-deployment; • Number of moves (nM): the average number of times that a node changes its status from still to moving;

The leftmost inward vertex neighbor a of v

prohibit rotation-rotation collision completely but eliminate greedy-rotation collision only in part. It is because they rely on the adjacency of the greedy prior hop and the rotation prior hop of a vertex, which however does not always remain. Below, we will discuss how to totally preclude these collisions. We start with the easiest part, i.e., enabling OGRG to generate no greedy-greedy collision at Π. This goal can be accomplished simply by the following gateway rule of GRG, which serves as a replacement of the inner-most layer rule. RULE 6 (G ATEWAY RULE ): A vertex on P1 (i.e., H1 ) is pre-defined as the gateway to Π. For a node located on P1 , it performs only greedy advance if its home vertex is the gateway, or only rotation otherwise. Now let us focus on greedy-rotation collision avoidance. For ease of description, we say a node’s greedy advance is “safe” if and only if it will cause no greedy-rotation collision. In order not to risk greedy-rotation collision, a node must not greedily advance unless it knows the movement is definitely safe. From local perspective, a node is able to make such an assurance only when all the left-hand vertex neighbors of its greedy next hop are neighbored by its home vertex. This serves as the design principle of the rules to be presented below. Consider a vertex v on Pi for i > 1. Suppose that a node is located at v and that it has decided by the greedy rules to move to Ltm(N i (v)). Figure 3, where a = Ltm(N i (v)) and f = Inn(N l (v)), enumerates all the possible scenarios

A. Simulation setup We implemented GRG and OGRG within a custom network simulator, and simulated their execution over a MSN randomly and uniformly dropped in a two-dimensional free plane. The geographic center of dropping area is taken as POI. Nodes √ have sensing radius 10 and communication radius 10 × 3 ≈ 18; they may move at different speeds, ranging from 0.05 to 0.2 per simulated time unit, for every step. We fix the size of dropping area to 5002 and target at different cRs. By Eqn. (2), OGRG is equivalent to GRG for a cR ≤ 7. We consider the cases of cR = 8, ..., 18 by varying nN accordingly. Using fixed dropping area and varied nN, we are able to study the impact of node density on algorithm performance. To minimize data noises, for each simulation setting, we executed GRG and OGRG in 50 randomly generated network scenarios and computed average results. B. Experimental results 1) Convergence and collision: We first examine the convergence time (cT) and the number of collisions (nC) of GRG and OGRG. As we will see, OGRG has better performance than GRG in these two aspects, especially in dense networks. 4

GRG-CW GRG-CV GRG*-CW GRG*-CV

18 16 14 12 10 8 6

GRG-CW GRG-CV GRG*-CW GRG*-CV

3

2

1

0 8

9

10 11 12 13 14 15 16 17 18

8

9

Circular coverage radius

10 11 12 13 14 15 16 17 18 Circular coverage radius

(a) cT v.s. cR

(b) nC v.s. cR

8

18

4

Mileage (x10)

Progress (x10)

GRG GRG*

0

-4

GRG-CW GRG-CV GRG*-CW GRG*-CV

16

14

12

-8

10 8

9

10 11 12 13 14 15 16 17 18 Circular coverage radius

8

9

(c) Pg v.s. cR

10 11 12 13 14 15 16 17 18 Circular coverage radius

(d) Mg v.s. cR

6

5 GRG-CW GRG-CV GRG*-CW GRG*-CV

5 4

Number of moves

Mileage over progress (x10)

distance to Π. Then Pg is equal to distini − distf in . We know that distini is approximately constant as nodes are randomly and uniformly placed at initialization. Observe Fig. 4(c) and notice the difference between GRG and OGRG: the curve of OGRG is always above that of GRG. It is because of the larger distf in of GRG, which is in turn due to the coverage redundancy of GRG. Figure 4(d) shows the difference between GRG and OGRG in Mg. Observe that Mg reaches the lowest value later in OGRG than in GRG. It is because OGRG uses less nodes than GRG for achieving the same coverage radius, delaying the behavioral change of the network. We can also observe that the Mg of OGRG is slightly larger (much smaller) than that of GRG in concentrating (resp., expanding) networks. In both GRG and OGRG, nodes move along curly path to their final position; thus their Mg is usually larger than their Pg. The ratio mileage over progress (MoP) gives an idea about how costly zigzag node movement is. Note in MoP we use absolute value of progress. From Fig. 4(e) MoP is most of time below 5; it increases dramatically only when cR is around the value leading to lowest Pg (see Fig. 4(c)), although Mg approaches the lowest value at the same time (see Fig. 4(d)). Again, as shown in the figure, the economic node usage of OGRG delays the appearance of the peak value in MoP; GRG and OGRG have nearly same MoP performance in other cases. In OGRG, nodes are regulated by more hop selection rules and thus may have to stop moving more often than in GRG. On the other hand, GRG requires more nodes than OGRG for achieving the same coverage radius and therefore possibly causes relatively frequent node blocking. As confirmed by Fig. 4(f), when cR is not too large compared with the dropping area, in other words, when node density is moderate, the impact of hop selection rules dominates algorithm performance on nM, making GRG generate less nM than OGRG; but it is slowly overwhelmed by the latter as cR becomes increasingly large, rendering OGRG eventually overtaking GRG.

4 Number of collisions (x1000)

Number of time units (x1000)

20

3 2

GRG-CW GRG-CV GRG*-CW GRG*-CV

4

3

1 0

2 8

9

10 11 12 13 14 15 16 17 18 Circular coverage radius

(e) MoP v.s. cR Fig. 4.

8

9

10 11 12 13 14 15 16 17 18 Circular coverage radius

(f) nM v.s. cR Experimental results

Since OGRG uses less nodes than GRG to achieve the same coverage radius (specifically, when cR > 7), it should as well spend less number of time units stabilizing the network, i.e., converging, than GRG. This is true as confirmed by Fig. 4(a), from which we can see that, the cT curve of OGRG always stays below that of GRG. Notice that the gap between these curves gets bigger and bigger after cR is beyond number 13. Later we will see that this “magic” cR value is the one that leads to the lowest nodal progress of GRG in magnitude. Figure 4(b) depicts nC as a result of cR. It is observed that GRG always generates a larger nC than OGRG. This performance difference is rooted at the fact that GRG requires more nodes than GRG for achieving the same coverage radius. Since the dropping area is fixed, the more nodes, the larger node density, and thus the more often node collision occurs. As we know, the two algorithms’ difference in required nN actually becomes bigger and bigger as cR goes up. This change is reflected by the growing gap between the nC curves for GRG and OGRG in Fig. 4(b). 2) Energy consumption: We now study the energy consumption of OGRG in comparison with GRG. As we will see, OGRG consumes slightly more energy in sparse networks but much less energy in dense networks than GRG. Before proceeding further, we would like to introduce another metric progress (Pg) which will be used later to evaluate the overhead of curly-line movement in the two algorithms. Pg is defined as the average progress a node makes to POI during its self-deployment process. Let distini and distf in be the average nodal initial distance and average nodal final

R EFERENCES [1] X. Bai, S. Kumary, D. Xuan, Z. Yun and T. H. Lai, “Deploying Wireless Sensors to Achieve Both Coverage and Connectivity”. In Proc. of ACM MobiHoc, pp. 131-142, 2006. [2] N. Bartolini, T. Calamoneri, E.G. Fusco, A. Massini, and S. Silvestri, “Snap and Spread: A Self-deployment Algorithm for Mobile Sensor Networks”. In Proc. of IEEE DCOSS, pp. 451-456, 2008. [3] M. Garetto, M. Gribaudo, C.-F. Chiasserini, and E. Leonardi. “A Distributed Sensor Relocation Scheme for Environmental Control”. In Proc. of IEEE MASS, pp. 1-10, 2007. [4] X. Li, H. Frey, N. Santoro, and I. Stojmenovic. “Localized Sensor Self-Deployment with Coverage Guarantee.” ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), 12(2): 50-52, 2008. [5] X. Li, H. Frey, N. Santoro, and I. Stojmenovic. “Localized SelfDeployment of Mobile Sensors for Optimal Focused-Coverage Formation.” TR-2007-13, SITE, Univ. of Ottawa, Dec. 2007. [6] M. Ma and Y. Yang. “Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks”. IEEE Tran. on Computers, 56(7): 946-958, 2007. [7] G. Wang, G. Cao and T. L. Porta. “Movement-Assisted Sensor Deployment”. IEEE Tran. on Mobile Computing, 5(6): 640-652, 2006. [8] H. Zhang and J. C. Hou, “Maintaining Sensing Coverage and Connectivity in Large Sensor Networks”. Ad Hoc & Sensor Wireless Networks, Vol. 1, pp. 89-124, 2005.

5

Localized Sensor Self-deployment for Guaranteed ...

wireless sensor network surrounding a point of interest (POI), and is measured by ... We would like to indicate that, as focused coverage is a new problem with.

160KB Sizes 2 Downloads 230 Views

Recommend Documents

LOCALized Multi-Objective Routing for Wireless Sensor ...
transmitter and the receiver, which is power-efficient and appropriate since localization information is available. To transmit one bit from a source to a destination over a .... The HELLO protocol consists in periodical broadcast of HELLO packets. T

Poster Abstract: Localized Sensor Self-Deployment with ...
They both yield a connected network of TT layout with hole-free ... are designated to monitor concerned events or envi- ... radius of the maximized hole-free disc centered at the. POI and contained in the coverage region, i.e., the re- gion enclosed

Localized Sensor Self-Deployment with Coverage ...
was brought into attention for dedicated applications. In this problem, mobile sensors are required to ... sensors deployment is modeled as a minimum cost maximum flow problem from .... and development of a pressure adjustment protocol. ..... 50 rand

pdf-1837\louisiana-a-students-guide-to-localized-history-localized ...
Try one of the apps below to open or edit this item. pdf-1837\louisiana-a-students-guide-to-localized-history-localized-history-series-by-joe-gray-taylor.pdf.

ZONER: A ZONE-based Sensor Relocation Protocol for Mobile Sensor ...
sensor relocation protocol, ZONER, for mobile sensor networks on the basis of a restricted flooding .... The payload part contains communication data, the thus its format is application .... Figure 2(a) is a big picture about a discovery process.

Sensor ] ( Sensor
Engine. Base. N303. Enviromental. Database. Agent Interface "\-/301. 71;]. 3 ..... agent architecture and processes usable for the detection and tracking of a ...

Guaranteed Node Overage
Every renewal period our customers purchase a certain number of nodes that their subscription covers. However, with changes in your organization such as new employees, PC refresh projects, or acquisitions – your node count increases and you incur o

Localized Broadcast Oriented Protocols with Mobility Prediction for ...
In our mechanism S needs to set timer with interval ∆T2 to trigger prediction proc- ess; U should set .... A pseudo code of BIP is shown in Fig. 9. Input: given an ...

BioPSy: An SMT-based Tool for Guaranteed Parameter ...
perform sensitivity analysis limiting how much of the state space the model checker ..... progress in continuous and hybrid reachability analysis. ... Soft Comput.

Localized Broadcast Oriented Protocols with Mobility Prediction for ...
exploits the “wireless broadcast advantage” property associated with omni-antennas, namely the capability for a node to reach several neighbors by using a ...

Localized Energy-Aware Broadcast Protocol for Wireless Networks ...
We consider broadcast protocols in wireless networks that have lim- ited energy and ..... minimum; if an edge (i,k)∈T×T raising the length range of beam can cover a .... and Engineering Foundation in Ministry of Science and Technology.

cryosurgery as primary treatment for localized prostate ...
ABSTRACT. The technique and recent experience incorporating cryosurgery into our community practice for primary treatment of localized prostate cancer is described. Between December 2000 and December 2001, a total of 93 patients underwent targeted cr

Guaranteed Income for Working Americans 5.24.pdf
The tax code. in most states ... Make taxes fairer, so the wealthiest pay their fair share. 4. Build on a $15 ... Guaranteed Income for Working Americans 5.24.pdf.

WIRELESS SENSOR NETWORKS FOR MEDICAL SERVICE
Abstract: The present work surveys and classifies various applications of the Wireless Sensor Networks. (WSNs) technology in bio-medical service. A review.

Communication–aware Deployment for Wireless Sensor Networks
which is the case for many sensor network applications in the environmental ... example for an environmental monitoring application scenario (temperature ...

Multi-tier method of developing localized calibration models for non ...
Jan 27, 2005 - parametric neural netWork classi?ers that assume little a priori information. See K. ..... in the spectral mea surement. 2=PT(ttT)'1P+diag(o2). (9).

Multi-tier method of developing localized calibration models for non ...
Jan 27, 2005 - tion sequence organizes spectral data into clusters having a high degree ..... HoWever, cluster analysis does not utilize a priori informa tion and ...

WIRELESS SENSOR NETWORKS FOR MEDICAL SERVICE
concerning the involvement of WSNs in bio-medical service is ... sors is to replace existing wired telemetry systems for ... consequence management needs.

Micro-sensor systems for central vacuum cleaners
user interface on a PC or laptop. On both ... Keyboard. MCM. Battery to the hose to the tele- scope pipe. Dust sensor. Venturi ... diagnostic tool (PC, laptop etc.).

Sensor Web for Public Safety
taking place that result in a huge death toll. So it is ... threshold value and if exceeded, a notification is sent to the authorities present at the site who can then take ...

Sensor Management for Multistatics
Abstract—This paper focuses on sensor management for dis- tributed sensor fields in deep water. This paper will investigate the sensor placement problem for the barrier scenario. Field per- formance is often based solely on sensor coverage or proba

Guaranteed Non-convex Optimization: Submodular ...
Submodular continuous functions naturally find applications in various real-world settings, including influence and revenue maximization with continuous assign- ments, sensor energy management, multi-resolution data summarization, facility location,

Sensor Networks for Monitoring Traffic
Aug 5, 2004 - traffic monitoring system using wireless sensor networks that offers high ... P. Varaiya is Professor in Electrical Engineering and Computer ...