Boundary monitoring algorithms for wireless sensor networks of grouping capabilities
In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem i...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 467 |
---|---|
container_issue | |
container_start_page | 461 |
container_title | |
container_volume | |
creator | Cheng-Ta Lee Lin, Frank Yeong-Sung |
description | In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities. |
doi_str_mv | 10.1109/WCINS.2010.5544130 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5544130</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5544130</ieee_id><sourcerecordid>5544130</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1340-f7df10cd3e7f52a880067ce165ed92cd05963c98ea92d65d1f83e22bc0e0f5f63</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhI0QElD6AnDxC6Ssf5McIYJSqYIDRRwrN14HQxJHdqqKtyeIirnMfIdZaYeQawYLxqC8fa9Wz68LDhMrJSUTcEIumeRSqkKWxek_KGDnZJ7SJ0ySimulL8jmPux7a-I37ULvxxB931DTNlMYP7pEXYj04CO2mBJN2KeJexwPIX4lGhxtYtgPv53aDGbnWz96TFfkzJk24fzoM_L2-LCpnrL1y3JV3a0zz4SEzOXWMaitwNwpbooCQOc1Mq3Qlry2oEot6rJAU3KrlWWuEMj5rgYEp5wWM3Lzd9cj4naIvpse2R5XED-JpFL8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Cheng-Ta Lee ; Lin, Frank Yeong-Sung</creator><creatorcontrib>Cheng-Ta Lee ; Lin, Frank Yeong-Sung</creatorcontrib><description>In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.</description><identifier>ISBN: 1424458501</identifier><identifier>ISBN: 9781424458509</identifier><identifier>EISBN: 1424458498</identifier><identifier>EISBN: 1424458528</identifier><identifier>EISBN: 9781424458493</identifier><identifier>EISBN: 9781424458523</identifier><identifier>DOI: 10.1109/WCINS.2010.5544130</identifier><language>eng</language><publisher>IEEE</publisher><subject>boundary monitoring ; Electronic mail ; Energy consumption ; full coverage ; grouping ; Heuristic algorithms ; Information management ; Intrusion detection ; Monitoring ; Optimization methods ; Surveillance ; Wildlife ; Wireless sensor networks</subject><ispartof>2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010, p.461-467</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5544130$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5544130$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cheng-Ta Lee</creatorcontrib><creatorcontrib>Lin, Frank Yeong-Sung</creatorcontrib><title>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</title><title>2010 IEEE International Conference on Wireless Communications, Networking and Information Security</title><addtitle>WCINS</addtitle><description>In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.</description><subject>boundary monitoring</subject><subject>Electronic mail</subject><subject>Energy consumption</subject><subject>full coverage</subject><subject>grouping</subject><subject>Heuristic algorithms</subject><subject>Information management</subject><subject>Intrusion detection</subject><subject>Monitoring</subject><subject>Optimization methods</subject><subject>Surveillance</subject><subject>Wildlife</subject><subject>Wireless sensor networks</subject><isbn>1424458501</isbn><isbn>9781424458509</isbn><isbn>1424458498</isbn><isbn>1424458528</isbn><isbn>9781424458493</isbn><isbn>9781424458523</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kM1OwzAQhI0QElD6AnDxC6Ssf5McIYJSqYIDRRwrN14HQxJHdqqKtyeIirnMfIdZaYeQawYLxqC8fa9Wz68LDhMrJSUTcEIumeRSqkKWxek_KGDnZJ7SJ0ySimulL8jmPux7a-I37ULvxxB931DTNlMYP7pEXYj04CO2mBJN2KeJexwPIX4lGhxtYtgPv53aDGbnWz96TFfkzJk24fzoM_L2-LCpnrL1y3JV3a0zz4SEzOXWMaitwNwpbooCQOc1Mq3Qlry2oEot6rJAU3KrlWWuEMj5rgYEp5wWM3Lzd9cj4naIvpse2R5XED-JpFL8</recordid><startdate>201006</startdate><enddate>201006</enddate><creator>Cheng-Ta Lee</creator><creator>Lin, Frank Yeong-Sung</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201006</creationdate><title>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</title><author>Cheng-Ta Lee ; Lin, Frank Yeong-Sung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1340-f7df10cd3e7f52a880067ce165ed92cd05963c98ea92d65d1f83e22bc0e0f5f63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>boundary monitoring</topic><topic>Electronic mail</topic><topic>Energy consumption</topic><topic>full coverage</topic><topic>grouping</topic><topic>Heuristic algorithms</topic><topic>Information management</topic><topic>Intrusion detection</topic><topic>Monitoring</topic><topic>Optimization methods</topic><topic>Surveillance</topic><topic>Wildlife</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Cheng-Ta Lee</creatorcontrib><creatorcontrib>Lin, Frank Yeong-Sung</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cheng-Ta Lee</au><au>Lin, Frank Yeong-Sung</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</atitle><btitle>2010 IEEE International Conference on Wireless Communications, Networking and Information Security</btitle><stitle>WCINS</stitle><date>2010-06</date><risdate>2010</risdate><spage>461</spage><epage>467</epage><pages>461-467</pages><isbn>1424458501</isbn><isbn>9781424458509</isbn><eisbn>1424458498</eisbn><eisbn>1424458528</eisbn><eisbn>9781424458493</eisbn><eisbn>9781424458523</eisbn><abstract>In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.</abstract><pub>IEEE</pub><doi>10.1109/WCINS.2010.5544130</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424458501 |
ispartof | 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010, p.461-467 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5544130 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | boundary monitoring Electronic mail Energy consumption full coverage grouping Heuristic algorithms Information management Intrusion detection Monitoring Optimization methods Surveillance Wildlife Wireless sensor networks |
title | Boundary monitoring algorithms for wireless sensor networks of grouping capabilities |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T13%3A53%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Boundary%20monitoring%20algorithms%20for%20wireless%20sensor%20networks%20of%20grouping%20capabilities&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Wireless%20Communications,%20Networking%20and%20Information%20Security&rft.au=Cheng-Ta%20Lee&rft.date=2010-06&rft.spage=461&rft.epage=467&rft.pages=461-467&rft.isbn=1424458501&rft.isbn_list=9781424458509&rft_id=info:doi/10.1109/WCINS.2010.5544130&rft_dat=%3Cieee_6IE%3E5544130%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424458498&rft.eisbn_list=1424458528&rft.eisbn_list=9781424458493&rft.eisbn_list=9781424458523&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5544130&rfr_iscdi=true |