Boundary monitoring algorithms for wireless sensor networks of grouping capabilities

In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Cheng-Ta Lee, Lin, Frank Yeong-Sung
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 467
container_issue
container_start_page 461
container_title
container_volume
creator Cheng-Ta Lee
Lin, Frank Yeong-Sung
description In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.
doi_str_mv 10.1109/WCINS.2010.5544130
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5544130</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5544130</ieee_id><sourcerecordid>5544130</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1340-f7df10cd3e7f52a880067ce165ed92cd05963c98ea92d65d1f83e22bc0e0f5f63</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhI0QElD6AnDxC6Ssf5McIYJSqYIDRRwrN14HQxJHdqqKtyeIirnMfIdZaYeQawYLxqC8fa9Wz68LDhMrJSUTcEIumeRSqkKWxek_KGDnZJ7SJ0ySimulL8jmPux7a-I37ULvxxB931DTNlMYP7pEXYj04CO2mBJN2KeJexwPIX4lGhxtYtgPv53aDGbnWz96TFfkzJk24fzoM_L2-LCpnrL1y3JV3a0zz4SEzOXWMaitwNwpbooCQOc1Mq3Qlry2oEot6rJAU3KrlWWuEMj5rgYEp5wWM3Lzd9cj4naIvpse2R5XED-JpFL8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Cheng-Ta Lee ; Lin, Frank Yeong-Sung</creator><creatorcontrib>Cheng-Ta Lee ; Lin, Frank Yeong-Sung</creatorcontrib><description>In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.</description><identifier>ISBN: 1424458501</identifier><identifier>ISBN: 9781424458509</identifier><identifier>EISBN: 1424458498</identifier><identifier>EISBN: 1424458528</identifier><identifier>EISBN: 9781424458493</identifier><identifier>EISBN: 9781424458523</identifier><identifier>DOI: 10.1109/WCINS.2010.5544130</identifier><language>eng</language><publisher>IEEE</publisher><subject>boundary monitoring ; Electronic mail ; Energy consumption ; full coverage ; grouping ; Heuristic algorithms ; Information management ; Intrusion detection ; Monitoring ; Optimization methods ; Surveillance ; Wildlife ; Wireless sensor networks</subject><ispartof>2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010, p.461-467</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5544130$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5544130$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cheng-Ta Lee</creatorcontrib><creatorcontrib>Lin, Frank Yeong-Sung</creatorcontrib><title>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</title><title>2010 IEEE International Conference on Wireless Communications, Networking and Information Security</title><addtitle>WCINS</addtitle><description>In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.</description><subject>boundary monitoring</subject><subject>Electronic mail</subject><subject>Energy consumption</subject><subject>full coverage</subject><subject>grouping</subject><subject>Heuristic algorithms</subject><subject>Information management</subject><subject>Intrusion detection</subject><subject>Monitoring</subject><subject>Optimization methods</subject><subject>Surveillance</subject><subject>Wildlife</subject><subject>Wireless sensor networks</subject><isbn>1424458501</isbn><isbn>9781424458509</isbn><isbn>1424458498</isbn><isbn>1424458528</isbn><isbn>9781424458493</isbn><isbn>9781424458523</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kM1OwzAQhI0QElD6AnDxC6Ssf5McIYJSqYIDRRwrN14HQxJHdqqKtyeIirnMfIdZaYeQawYLxqC8fa9Wz68LDhMrJSUTcEIumeRSqkKWxek_KGDnZJ7SJ0ySimulL8jmPux7a-I37ULvxxB931DTNlMYP7pEXYj04CO2mBJN2KeJexwPIX4lGhxtYtgPv53aDGbnWz96TFfkzJk24fzoM_L2-LCpnrL1y3JV3a0zz4SEzOXWMaitwNwpbooCQOc1Mq3Qlry2oEot6rJAU3KrlWWuEMj5rgYEp5wWM3Lzd9cj4naIvpse2R5XED-JpFL8</recordid><startdate>201006</startdate><enddate>201006</enddate><creator>Cheng-Ta Lee</creator><creator>Lin, Frank Yeong-Sung</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201006</creationdate><title>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</title><author>Cheng-Ta Lee ; Lin, Frank Yeong-Sung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1340-f7df10cd3e7f52a880067ce165ed92cd05963c98ea92d65d1f83e22bc0e0f5f63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>boundary monitoring</topic><topic>Electronic mail</topic><topic>Energy consumption</topic><topic>full coverage</topic><topic>grouping</topic><topic>Heuristic algorithms</topic><topic>Information management</topic><topic>Intrusion detection</topic><topic>Monitoring</topic><topic>Optimization methods</topic><topic>Surveillance</topic><topic>Wildlife</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Cheng-Ta Lee</creatorcontrib><creatorcontrib>Lin, Frank Yeong-Sung</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cheng-Ta Lee</au><au>Lin, Frank Yeong-Sung</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Boundary monitoring algorithms for wireless sensor networks of grouping capabilities</atitle><btitle>2010 IEEE International Conference on Wireless Communications, Networking and Information Security</btitle><stitle>WCINS</stitle><date>2010-06</date><risdate>2010</risdate><spage>461</spage><epage>467</epage><pages>461-467</pages><isbn>1424458501</isbn><isbn>9781424458509</isbn><eisbn>1424458498</eisbn><eisbn>1424458528</eisbn><eisbn>9781424458493</eisbn><eisbn>9781424458523</eisbn><abstract>In this paper, we develop three heuristic algorithms to construct efficient boundary monitoring for wireless sensor networks of grouping capabilities. We try to find the maximum K groups of sensors for boundary monitoring of sensor field. The mechanism can prolong the system lifetime. This problem is formulated as 0/1 integer-programming problem. Three heuristic-based algorithms are proposed for solving the optimization problem. The experimental results showed that the proposed efficient boundary monitoring algorithm (EBMA) gets a near optimization in the efficient boundary monitoring for grouping capabilities.</abstract><pub>IEEE</pub><doi>10.1109/WCINS.2010.5544130</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424458501
ispartof 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010, p.461-467
issn
language eng
recordid cdi_ieee_primary_5544130
source IEEE Electronic Library (IEL) Conference Proceedings
subjects boundary monitoring
Electronic mail
Energy consumption
full coverage
grouping
Heuristic algorithms
Information management
Intrusion detection
Monitoring
Optimization methods
Surveillance
Wildlife
Wireless sensor networks
title Boundary monitoring algorithms for wireless sensor networks of grouping capabilities
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T13%3A53%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Boundary%20monitoring%20algorithms%20for%20wireless%20sensor%20networks%20of%20grouping%20capabilities&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Wireless%20Communications,%20Networking%20and%20Information%20Security&rft.au=Cheng-Ta%20Lee&rft.date=2010-06&rft.spage=461&rft.epage=467&rft.pages=461-467&rft.isbn=1424458501&rft.isbn_list=9781424458509&rft_id=info:doi/10.1109/WCINS.2010.5544130&rft_dat=%3Cieee_6IE%3E5544130%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424458498&rft.eisbn_list=1424458528&rft.eisbn_list=9781424458493&rft.eisbn_list=9781424458523&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5544130&rfr_iscdi=true