首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
In this paper, we study k‐road‐coverage problems in wireless sensor networks (WSNs). Assume there is a 2‐dimensional area Ω with a given road map = (V,E) where E contains all road segments and V consists of all intersection points on Ω. The first question we study is about ‘sensor deployment’, i.e., how to deploy a minimum number of sensor nodes on Ω such that each path (each road segment) on is k‐covered when all sensor nodes have the same sensing range. When sensors can only be deployed in a set of discrete locations, we propose an efficient method with the approximation ratio 6 + ϵ for the special case where k = 1 and O(k) generally. If sensors can be deployed in arbitrary locations, we propose an efficient method with the approximation ratio 24 + ϵ when k = 1 and O(k) generally. The second question we study is about ‘path query’, i.e., how to find the k‐covered path or k‐support path connecting any given source/destination pair of points on the road map . Basically, given any source/destination pair of points S and D, we present two algorithms which can efficiently find a k‐covered path connecting S and D and a k‐supported path connecting S and D, respectively. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

2.
Wireless sensor networks are prone to failure, so prolonging their lifetime and preventing loss of connectivity are significant. A simple but efficient strategy is to place redundant sensor nodes to establish multi‐connectivity. This paper explores how to add as few as possible nodes (called Steiner nodes) to a sensor network such that the resulting network is k‐connected or partially k‐connected. k‐connectivity means that each pair of the nodes, whether Steiner or original, is connected by at least k node‐disjoint paths, while partial k‐connectivity only requires such connectivity among original nodes. The contribution lies in two aspects. First, the approximation ratio of an existing k‐connectivity repair algorithm is decreased from O(k4α) to O(k3α), where α is the approximation ratio of any algorithm that finds a minimum‐weight k‐connected spanning subgraph of a weighted complete graph. This is the best result ever obtained. Second, the first generic partial k‐connectivity repair algorithm is proposed. It is proved that the approximation ratio of this algorithm is at most O(k3α). Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

3.
In this paper, we propose two schemes based on a full‐duplex network‐coded cooperative communication (FD‐NCC) strategy, namely, full‐duplex dynamic network coding (FD‐DNC) and full‐duplex generalized dynamic network coding (FD‐GDNC). The use of full‐duplex communication aims at improving the spectrum efficiency of a two‐user network where the users cooperatively transmit their independent information to a common destination. In the proposed FD‐NCC schemes, the self‐interference imposed by full‐duplexing is modeled as a fading channel, whose harmful effect can be partially mitigated by interference cancellation techniques. Nevertheless, our results show that, even in the presence of self‐interference, the proposed FD‐NCC schemes can outperform (in terms of outage probability) the equivalent half‐duplex network‐coded cooperative (HD‐NCC) schemes, as well as traditional cooperation techniques. Moreover, the ?‐outage capacity, that is, the maximum information rate achieved by the users given a target outage probability, is evaluated. Finally, we examine the use of multiple antennas at the destination node, which increases the advantage of the FD‐NCC (in terms of the diversity‐multiplexing trade‐off and ?‐outage capacity).  相似文献   

4.
Coverage is one of the most important issues in Wireless Sensor Networks (WSNs). However, full coverage only can be achieved when surplus mobile sensors contribute a coverage area larger than the hole size. When there is no surplus mobile sensor to cover a big hole, previous studies have utilized mobile sensors by moving the hole from one location to another, therefore achieving temporal full‐coverage, where each location on the monitoring region has been ever covered by mobile sensors during a fixed time interval. However, with only some mobile sensors participating in the hole‐movement task, this results in an energy‐imbalance WSN. This paper considers a mobile WSN that contains a big hole where there exists no redundant mobile sensor to heal the hole. Three distributed algorithms, called Basic, Forward‐Only, and Any‐Direction movement mechanisms, are proposed to achieve the purpose of temporal full‐coverage in a way that the total energy consumption is minimized or that the energy consumption of all mobile sensors that participate in the hole‐movement task are balanced. Simulation results reveal that the proposed hole‐movement mechanisms enhance the coverage of WSNs and balance the energy consumption of mobile sensor nodes. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

5.
High‐performance, air‐stable, p‐channel WSe2 top‐gate field‐effect transistors (FETs) using a bilayer gate dielectric composed of high‐ and low‐k dielectrics are reported. Using only a high‐k Al2O3 as the top‐gate dielectric generally degrades the electrical properties of p‐channel WSe2, therefore, a thin fluoropolymer (Cytop) as a buffer layer to protect the 2D channel from high‐k oxide forming is deposited. As a result, a top‐gate‐patterned 2D WSe2 FET is realized. The top‐gate p‐channel WSe2 FET demonstrates a high hole mobility of 100 cm2­ V?1 s?1 and a ION/IOFF ratio > 107 at low gate voltages (VGS ca. ?4 V) and a drain voltage (VDS) of ?1 V on a glass substrate. Furthermore, the top‐gate FET shows a very good stability in ambient air with a relative humidity of 45% for 7 days after device fabrication. Our approach of creating a high‐k oxide/low‐k organic bilayer dielectric is advantageous over single‐layer high‐k dielectrics for top‐gate p‐channel WSe2 FETs, which will lead the way toward future electronic nanodevices and their integration.  相似文献   

6.
Innovative and emerging developments in sensor networks are proven to be the backbone for real‐time applications such as satellite communications, military and border area surveillance systems, health care systems, traffic monitoring systems, seismic and underwater monitoring systems, and agriculture and habitat environment systems. Coverage and clustering techniques enable the sensor network to operate in group‐based and region‐based communication and thus save the node energy. Energy‐efficient protocols save the node energy and increase the network life cycle in a resource‐constrained sensor network. Cluster head (CH) node manages and controls the operations such as network topology, coverage area, and routing paths (multi‐paths and fault‐tolerant paths) of the network. In this paper, we present deterministic K‐means secure coverage clustering (K‐SCC) with periodic authentication. The proposed protocol uses coverage clustering technique with periodic authentication between the CH node and sensor nodes to establish the secure channel in the network. Maximum cover of K nodes is maintained in the secure coverage cluster to achieve authenticated communication between the sensor nodes in the network. The proposed K‐SCC protocol is compared with the existing protocols such as deterministic‐SCC and random‐SCC protocols. Simulation results indicate that the proposed K‐SCC protocol achieves an average of 84% coverage ratio (cluster/sensor node ratio) as compared with 62% coverage ratio in the existing SCC protocols. Simulations also indicate that the proposed K‐SCC protocol consumes 20% less energy as compared with the existing SCC protocol. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

7.
This work describes a novel location‐aware, self‐organizing, fault‐tolerant peer‐to‐peer (P2P) overlay network, referred to as Laptop. Network locality‐aware considerations are a very important metric for designing a P2P overlay network. Several network proximity schemes have been proposed to enhance the routing efficiency of existing DHT‐based overlay networks. However, these schemes have some drawbacks such as high overlay network and routing table maintenance overhead, or not being completely self‐organizing. As a result, they may result in poor scalability as the number of nodes in the system grows. Laptop constructs a location‐aware overlay network without pre‐determined landmarks and adopts a routing cache scheme to avoid maintaining the routing table periodically. In addition, Laptop significantly reduces the overlay maintenance overhead by making each node maintain only the connectivity between parent and itself. Mathematical analysis and simulations are conducted to evaluate the efficiency, scalability, and robustness of Laptop. Our mathematical analysis shows that the routing path length is bounded by logd N, and the joining and leaving overhead is bounded by d logd N, where N is the number of nodes in the system, and d is the maximum degree of each node on the overlay tree. Our simulation results show that the average latency stretch is 1.6 and the average routing path length is only about three in 10 000 Laptop nodes, and the maximum degree of a node is bounded by 32. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

8.
In multi‐radio multi‐channel wireless mesh networks, the design of logical topology is different from that in single channel wireless mesh networks. The same channel assignment algorithm used for various logical topologies will lead to diverse network performance. In this paper, we study the relationship between k ‐connected logical topology and the maximum number of assigned channels. Meanwhile, we analyze the issues affecting channel assignment performance, and present the lower and upper bounds of the maximum allowable number of assigned channels for k ‐connected logical topology. We then develop a k ‐connected logical topology design algorithm based on shortest disjoint paths and minimum interference disjoint paths for each node‐pair. In addition, we propose a static channel assignment algorithm according to minimum spanning tree search. Extensive simulations show that our proposed algorithm achieves higher throughput and lower end‐to‐end delay than fault tolerant topology control algorithms, which validates the involved trade‐off between path length and nodal interference. Moreover, numerical results demonstrate that our proposed channel assignment further improves network performance under the context of limited radio interfaces. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

9.
Exact expressions for outage probability and symbol error rate are presented for a decode‐and‐forward cooperative network with partial relay selection. An independent but not identically distributed Nakagami‐m fading environment is considered. Numerical and simulated results show the validity of the analytical results. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

10.
In stationary camera sensor networks (CSNs), when the deployment characteristics and sensing models are defined, the coverage can be deduced and remain unchanged over time. However, in the maritime environment, the rough and random sea condition can move CSN from the initial location. We envisage that camera sensors are mounted on quasi‐mobile platforms such as buoys. Hence, it is important to understand the effect of realistic sea surface movements in achieving full‐view coverage because in full‐view coverage, target's facing direction is taken into account to judge whether a target is guaranteed to be captured because image shot at the frontal viewpoint of a given target considerably increases the possibility to detect and recognize the target. To accurately emulate the maritime environment, the movement of the buoy, which is attached with a cable that is nailed at the sea floor, has been characterized based on the sea wave that is created by the wind, and it is limited by the cable. The average percentage of full‐view coverage has been evaluated based on different parameters such as equilateral triangle grid length, sensing radius of camera, wind speed and wave height. Furthermore, a method to improve the target detection and recognition has been proposed in the presence of poor link quality using cooperative transmission with low power consumption. In some parameter scenario, the cooperative transmission method has achieved around 70% improvement in the average percentage of full‐view coverage of a given target and total reduction of around 13% for the total transmission power PTotal(Q). Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

11.
This paper presents an energy‐efficient and coverage‐preserving communication protocol which distributes a uniform energy load to the sensors in a wireless microsensor network. This protocol, called Distance‐based Segmentation (DBS), is a cluster‐based protocol that divides the entire network into equal‐area segments and applies different clustering policies to each segment to (1) reduce total energy dissipation and (2) balance the energy load among the sensors. Therefore, it prolongs the lifetime of the network and improves the sensing coverage. Moreover, the proposed routing protocol does not need any centralized support from a certain node which is at odds with aiming to establish a scalable communication protocol. Results from extensive simulations on two different network configurations show that by lowering the number of wasteful transmissions in the network, the DBS can achieve as much as a 20% reduction in total dissipated energy as compared with current cluster‐based protocols. In addition, this protocol is able to distribute energy load more evenly among the sensors in the network. Hence, it yields up to a 66% increase in the useful network lifetime. According to the simulation results, the sensing coverage degradation of the DBS is considerably slower than that of the other cluster‐based protocols. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

12.
In wireless sensor networks, both nodes and links are prone to failures. In this paper we study connectivity properties of large-scale wireless sensor networks and discuss their implicit effect on routing algorithms and network reliability. We assume a network model of n sensors which are distributed randomly over a field based on a given distribution function. The sensors may be unreliable with a probability distribution, which possibly depends on n and the location of sensors. Two active sensor nodes are connected with probability p e (n) if they are within communication range of each other. We prove a general result relating unreliable sensor networks to reliable networks. We investigate different graph theoretic properties of sensor networks such as k-connectivity and the existence of the giant component. While connectivity (i.e. k = 1) insures that all nodes can communicate with each other, k-connectivity for k > 1 is required for multi-path routing. We analyze the average shortest path of the k paths from a node in the sensing field back to a base station. It is found that the lengths of these multiple paths in a k-connected network are all close to the shortest path. These results are shown through graph theoretical derivations and are also verified through simulations.  相似文献   

13.
We present guaranteed dynamic priority assignment schemes for multiple real‐time tasks subject to (m, k)‐firm deadlines. The proposed schemes have two scheduling objectives: providing a bounded probability of missing (m, k)‐firm constraints and maximizing the probability of deadline satisfactions. The second scheduling objective is especially necessary in order to provide the best quality of service as well as to satisfy the minimum requirements expressed by (m, k)‐firm deadlines. We analytically establish that the proposed schemes provide a guarantee on the bounded probability of missing (m, k)‐firm constraints. Experimental studies validate our analytical results and confirm the effectiveness and superiority of the proposed schemes with regard to their scheduling objectives.  相似文献   

14.
We consider a multi‐source two‐way relay network, in which one source communicates with N other sources (n = 1,2,…,N) with the help of a single amplify‐and‐forward relay. We propose two opportunistic source scheduling schemes in such a network. According to the proposed schemes, in each transmission interval, only a single out of the N sources is selected, and this selected node acts as either transmitter or receiver depending on the channel conditions. For both schemes, tight closed‐form lower bounds of outage probability and bit error rate (BER) are derived. Asymptotic outage probability and BER that are valid for high signal‐to‐noise ratio regime are also analyzed, which can provide important insights on the impact of system parameters. The analytical results show that the full diversity order N + 1 can be achieved by both proposed schemes. Simulation results are also presented to corroborate the analysis. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

15.
Careful deployment of nodes in underwater acoustic sensor networks in a distributed manner with the goal of maximized coverage and guaranteed connectivity is a challenging problem because it is very difficult and costly to access the 3D underwater environment. This paper presents a novel algorithm for self‐deployment of nodes in underwater acoustic sensor networks assuming that the nodes are randomly dropped to the water surface and form a densely populated connected network at the water surface. The idea of the algorithm is based on calculating an optimized depth for each node in the network in such a way that the possible sensing coverage overlaps are minimized and the connectivity of final topology is guaranteed. The algorithm has three main phases. In the first phase, nodes are organized in a tree structure that is rooted at the surface station. In the second phase, the depths for all nodes are computed iteratively at surface station. In the final phase, the calculated depths are distributed to nodes so that the nodes start sinking. The performance of the proposed approach is validated through simulation. We observed that the proposed approach performs at least 10% better in terms of network coverage than contemporary schemes in the literature. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

16.
In this paper, we analyze the performance of cognitive amplify‐and‐forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi‐antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel state information‐assisted AF mode, and the signals undergo independent Nakagami‐m fading. In particular, closed‐form expressions for the outage probability and symbol error rate (SER) of the considered network over Nakagami‐m fading are presented. More importantly, asymptotic closed‐form expressions for the outage probability and SER are derived. These tractable closed‐form expressions for the network performance readily enable us to evaluate and examine the impact of network parameters on the system performance. Specifically, the impact of the number of antennas, the fading severity parameters, the channel mean powers, and the peak interference power is addressed. The asymptotic analysis manifests that the peak interference power constraint imposed on the secondary relay network has no effect on the diversity gain. However, the coding gain is affected by the fading parameters of the links from the primary receiver to the secondary relay network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

17.
One of the main challenge in designing wireless networks is to ensure optimal coverage and connectivity, which can be achieved by optimally repositioning nodes in backbone network such that the total energy requirement is minimized. Therefore, an efficient optimization algorithm that converges at faster rate while minimizing the cost function (total power) is required. In this paper, we propose the use of Levenberg‐Marquardt optimization algorithm to achieve assured coverage and connectivity control in backbone‐based wireless networks. The Levenberg‐Marquardt method combines the advantages of Cauchy steepest descent method and Newton‐Raphson method and is expected to achieve faster convergence rate irrespective of initial conditions, which is the main motivation of this study. It relies on that when current solution is far from the optimal solution, then steepest descent method will be used, and as current solution approaches to optimal solution, then gradually switched to Newton‐Raphson method to find the optimal solution. Extensive simulations using M A T L A B R 2020a has been performed to demonstrate the effectiveness of proposed method by measuring its performance in the number of iterations, elapsed time, and power requirement to maintain proper coverage and connectivity. The performance is compared with Cauchy steepest descent method as well as Newton‐Raphson method.  相似文献   

18.
Mobile‐to‐mobile (M‐to‐M) communications are expected to play a crucial role in future wireless systems and networks. In this paper, we consider M‐to‐M multiple‐input multiple‐output (MIMO) maximal ratio combining system and assess its performance in spatially correlated channels. The analysis assumes double‐correlated Rayleigh‐and‐Lognormal fading channels and is performed in terms of average symbol error probability, outage probability, and ergodic capacity. To obtain the receive and transmit spatial correlation functions needed for the performance analysis, we used a three‐dimensional (3D) M‐to‐M MIMO channel model, which takes into account the effects of fast fading and shadowing. The expressions for the considered metrics are derived as a function of the average signal‐to‐noise ratio per receive antenna in closed‐form and are further approximated using the recursive adaptive Simpson quadrature method. Numerical results are provided to show the effects of system parameters, such as distance between antenna elements, maximum elevation angle of scatterers, orientation angle of antenna array in the xy plane, angle between the xy plane and the antenna array orientation, and degree of scattering in the xy plane, on the system performance. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

19.
Wireless sensor networks have emerged recently as an effective way of monitoring remote or inhospitable physical targets, which usually have different quality of service (QoS) constraints, i.e., different targets may need different sensing quality in terms of the number of transducers, sampling rate, etc. In this paper, we address the problem of optimizing network lifetime while capturing those diversified QoS coverage constraints in such surveillance sensor networks. We show that this problem belongs to NP‐complete class. We define a subset of sensors meeting QoS requirements as a coverage pattern, and if the full set of coverage patterns is given, we can mathematically formulate the problem. Directly solving this formulation however is difficult since number of coverage patterns may be exponential to number of sensors and targets. Hence, a column generation (CG)‐based approach is proposed to decompose the original formulation into two subproblems and solve them iteratively. Here a column corresponds to a feasible coverage pattern, and the idea is to find a column with steepest ascent in lifetime, based on which we iteratively search for the maximum lifetime solution. An initial feasible set of patterns is generated through a novel random selection algorithm (RSA), in order to launch our approach. Experimental data demonstrate that the proposed CG‐based approach is an efficient solution, even in a harsh environment. Simulation results also reveal the impact of different network parameters on network lifetime, giving certain guidance on designing and maintaining such surveillance sensor networks. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

20.
Hybrid networks, comprising a conventional cellular network overlaid with Device‐to‐Device (D2D), offer efficient way to improve system throughput. In this paper, a novel orthogonal frequency‐division multiple access channel‐assignment method is proposed for hybrid network. The proposed approach is optimal in terms of throughput and is subjected to a sensible QoS requirement, which guarantees that macrocell and D2D achieve a prescribed data rate and outage probability, respectively. Our solution consists of two phases. In the first phase, the minimum sub‐channels are allocated to the macrocell to satisfy their data rate requirements. This problem is mapped to the 0‐1 Knapsack Problem and solved by integer programming based Lagrange dual approach. In the second phase, the redundant sub‐channels are allocated to D2D pairs to maximize the throughput of D2D networks. An interference management scheme is proposed to guarantee the outage probability of D2D communications. A cluster is taken as the unit for frequency reuse among D2D pairs. The problem of clustering is mapped to the MAX k‐CUT problem in graph theory and is solved by graph‐based heuristic algorithm. Extensive simulations demonstrate the superior performance of the proposed solution compared with the existing scheme. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号