Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/26907
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor周承復(Cheng-Fu Chou)
dc.contributor.authorYu-Yi Chenen
dc.contributor.author陳佑逸zh_TW
dc.date.accessioned2021-06-08T07:31:44Z-
dc.date.copyright2011-08-16
dc.date.issued2011
dc.date.submitted2011-08-09
dc.identifier.citation[1] M. Adler, H. R‥acke, N. Sivadasan, C. Sohler, and B. V‥ocking. Randomized pursuit-
evasion in graphs. Comb. Probab. Comput., 12:225–244, May 2003.
[2] P. Balister, Z. Zheng, S. Kumar, and P. Sinha. Trap coverage: Allowing coverage
holes of bounded diameter in wireless sensor networks. In INFOCOM 2009, IEEE,
pages 136 –144, april 2009.
[3] J.-C. Chin, Y. Dong, W.-K. Hon, C.-T. Ma, and D. Yau. Detection of intelligent
mobile target in a mobile sensor network. Networking, IEEE/ACM Transactions on,
18(1):41 –52, feb. 2010.
[4] J. christophe Zufferey, A. Klaptocz, A. Beyeler, J. daniel Nicoud, and D. Floreano. A
10-gram microflyer for vision-based indoor navigation. In International Conference
on Intelligent RObots and Systems - IROS, pages 3267–3272, 2006.
[5] B. P. Gerkey, S. Thrun, and G. Gordon. Visibility-based pursuit-evasion with limited
field of view. Int. J. Rob. Res., 25:299–315, April 2006.
[6] W. Green and P. Oh. Autonomous hovering of a fixed-wing micro air vehicle. In
Robotics and Automation, 2006. ICRA 2006. Proceedings 2006 IEEE International
Conference on, pages 2164 –2169, may 2006.
[7] L. J. Guibas, J.-C. Latombe, S. M. LaValle, D. Lin, and R. Motwani. Visibility-based
pursuit-evasion in a polygonal environment. In Proceedings of the 5th International
Workshop on Algorithms and Data Structures, WADS ’97, pages 17–30, London,
UK, 1997. Springer-Verlag.
[8] N. Heo and P. Varshney. A distributed self spreading algorithm for mobile wireless
sensor networks. In Wireless Communications and Networking, 2003. WCNC 2003.
2003 IEEE, volume 3, pages 1597 –1602 vol.3, march 2003.
[9] G. Hollinger, A. Kehagias, and S. Singh. Probabilistic strategies for pursuit in clut-
tered environments with multiple robots. In Robotics and Automation, 2007 IEEE
International Conference on, pages 3870 –3876, april 2007.
[10] A. Howard, M. J. Mataric, and G. S. Sukhatme. Mobile sensor network deployment
using potential fields: A distributed, scalable solution to the area coverage problem.
In Proc. of the 6th Int. Symp. on Distributed Autonomous Robotics Systems, pages
299–308, 2002.
[11] V. Isler, S. Kannan, and S. Khanna. Randomized pursuit-evasion with limited vis-
ibility. In Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete
algorithms, SODA ’04, pages 1060–1069, Philadelphia, PA, USA, 2004. Society
for Industrial and Applied Mathematics.
[12] Y. Keung, B. Li, and Q. Zhang. The intrusion detection in mobile sensor network.
In Proceedings of the eleventh ACM international symposium on Mobile ad hoc
networking and computing, MobiHoc ’10, pages 11–20, New York, NY, USA, 2010.
ACM.
[13] S. Kumar, T. H. Lai, and A. Arora. Barrier coverage with wireless sensors. In
Proceedings of the 11th annual international conference on Mobile computing and
networking, MobiCom ’05, pages 284–298, New York, NY, USA, 2005. ACM.
[14] S. Kumar, T. H. Lai, and J. Balogh. On k-coverage in a mostly sleeping sensor
network. In Proceedings of the 10th annual international conference on Mobile
computing and networking, MobiCom ’04, pages 144–158, New York, NY, USA,
2004. ACM.
[15] S. LaValle, D. Lin, L. Guibas, J. Latombe, and R. Motwani. Finding an unpre-
dictable target in a workspace with obstacles. In Robotics and Automation, 1997.
Proceedings., 1997 IEEE International Conference on, volume 1, pages 737 –742
vol.1, apr 1997.
[16] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley. Mobility improves coverage of
sensor networks. In Proceedings of the 6th ACM international symposium on Mobile
ad hoc networking and computing, MobiHoc ’05, pages 300–308, New York, NY,
USA, 2005. ACM.
[17] J. Roberts, J.-C. Zufferey, and D. Floreano. Energy management for indoor hovering
robots. In Intelligent Robots and Systems, 2008. IROS 2008. IEEE/RSJ International
Conference on, pages 1242 –1247, sept. 2008.
[18] R. Vidal, O. Shakernia, H. J. Kim, D. H. Shim, and S. Sastry. Probabilistic pursuit-
evasion games: Theory, implementation and experimental evaluation. IEEE Trans-
action on Robotics and Automation, 18(5):662–669, 2002.
[19] G. Wang, G. Cao, and T. La Porta. Movement-assisted sensor deployment. In
INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and
Communications Societies, volume 4, pages 2469 – 2479 vol.4, march 2004.
[20] G. Wang, G. Cao, T. La Porta, and W. Zhang. Sensor relocation in mobile sensor
networks. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer
and Communications Societies. Proceedings IEEE, volume 4, pages 2302 –2312 vol.
4, march 2005.
[21] Y. Zou and K. Chakrabarty. Sensor deployment and target localization based on
virtual forces. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the
IEEE Computer and Communications. IEEE Societies, volume 2, pages 1293 – 1303
vol.2, march-3 april 2003.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/26907-
dc.description.abstract無線感測網路已經被用在使用移動式感測器來偵測移動式目標。考 慮在一個封閉的區域空間內,一些移動式感測器會持續不斷地進行巡邏,並且嘗試去發現在此空間內的移動式目標。由於目標會在一定時間內離開這塊空間, 感測器必須要在給定的時間之內發現目標。本論文探討如何在給定時間限制之下去找出需要的感測器數量,以符合應用的要求。我們使用馬可夫模型來計算目標出現的機率,並且根據此機率推算出期望的偵測時間,再利用這些關係來推論出所需要的感測器數量。另外本論文也提供感測器在合作模式之下對時間的影響,並且提出一個讓感測器在分散式的環境交換資訊的演算法。 最後我們使用模擬來驗證模型的準確性、在不同的環境底下對於偵測時間的影響,並且成功推算出所需要的感測器數量。zh_TW
dc.description.abstractWireless sensor networks have been widely studied in arious applications such as environmental monitoring , battlefield surveillance, and intrusion detection recently. One of the important applications is to detect mobile targets (e.g., invaders) by using mobile sensor nodes. Consider a closed region where there are several mobile sensors patrolling the area and some mobile targets in the region. The mobile sensors need to find the targets before a time period because the mobile targets may escape from the monitored region after a certain period of time. In order to meet the deadline, many mobile sensors should be deployed to reduce the detection time. This work aims at finding the number of sensors required in the region through realizing relations among expected detection time, detection strategies, and the number of sensors. Thus, given the number of sensors and detecting robability, we propose a Markov model to derive the expected detection time. Our proposed model can then help determine how many sensors are sufficient such that sensors are able to detect the targets before a given deadline. We also provided a cooperative scheme for sensors that can reduce expected detection time and a distributed protocol for sensors with limited transmission range. The simulation results show that the model can predict the expected detection time precisely, and the number of sensors required derived from the model is adequate.en
dc.description.provenanceMade available in DSpace on 2021-06-08T07:31:44Z (GMT). No. of bitstreams: 1
ntu-100-R98944007-1.pdf: 1057052 bytes, checksum: 5a1442d4060af4fa1ec00984a4e4779b (MD5)
Previous issue date: 2011
en
dc.description.tableofcontents致謝 ii
Abstract iii
中文摘要 v
1 Introduction 1
2 Related Work 4
3 Prediction Model 8
3.1 Prediction Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.1 Evolution of Sensor Position . . . . . . . . . . . . . . . . . . . . 9
3.1.2 Evolution of Target Presence Probability . . . . . . . . . . . . . 10
3.2 Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.3 Method of evaluating detection time . . . . . . . . . . . . . . . . . . . . 16
3.4 Finding number of sensors required . . . . . . . . . . . . . . . . . . . . 17
4 Other Issues 19
4.1 Cooperative Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.2 Distributed Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.2.1 Confidence Index . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.2.2 Information Fusion . . . . . . . . . . . . . . . . . . . . . . . . . 21
5 Simulation 23
5.1 Model Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.1.1 Expected Detecting Time . . . . . . . . . . . . . . . . . . . . . . 25
5.1.2 Detecting Probability . . . . . . . . . . . . . . . . . . . . . . . . 25
5.2 Number of Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5.3 Cooperative Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.4 Distributed Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6 Conclusion 33
Bibliography 34
dc.language.isoen
dc.title利用移動式感測網路在時間限制下之目標物偵測zh_TW
dc.titleDeadline-Constrained Mobile Target Detection in Mobile Sensor
Networks
en
dc.typeThesis
dc.date.schoolyear99-2
dc.description.degree碩士
dc.contributor.oralexamcommittee蔡子傑(Tzu-Chieh Tsai),吳曉光(Hsiao-Kuang Wu),王協源(Shie-Yuan Wang),林靖茹(Ching-Ju Lin)
dc.subject.keyword入侵者偵測,追逃問題,模型,時間限制,zh_TW
dc.subject.keywordIntrusion Detection,Pursuit-Evasion,Model,Time Constraint,en
dc.relation.page37
dc.rights.note未授權
dc.date.accepted2011-08-09
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
ntu-100-1.pdf
  目前未授權公開取用
1.03 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved