請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/42919
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 陳健輝 | |
dc.contributor.author | Chuang-Jung Chen | en |
dc.contributor.author | 陳莊榮 | zh_TW |
dc.date.accessioned | 2021-06-15T01:28:51Z | - |
dc.date.available | 2010-07-27 | |
dc.date.copyright | 2009-07-27 | |
dc.date.issued | 2009 | |
dc.date.submitted | 2009-07-21 | |
dc.identifier.citation | [1] I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, 2002.
[2] S. Ren, Q. Li, H.N.Wang, X. Chen, and X. Zhang, “”Probabilistic coverage for object tracking in sensor networks,”” Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom 2004), 2004. [3] W. Ye, J. Heidemann, and D. Estrin. “An energy-efficient MAC protocol for wireless sensor networks,” Proceedings of the 21st IEEE International Annual Joint Conference of the Computer and Communications (INFOCOM 2002), New York, NY, USA, June 2002. [4] M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, “”The flooding time synchronization protocol,”” Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004. [5] S. Ganeriwal, R. Kumar, and M.B. Srivastava, “Timing-sync protocol for sensor networks,” Proceedings of the 1st ACM Conference on Embedded Networked Sensor System (SenSys), pp. 138–149, November 2003. [6] H. Zhang and J.C. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Large Sznsor Networks. NSF International Worhhup on Theoretical and Algorirlunic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks, February 2004. [7] X. Wang et al., “Integrated coverage and connectivity configuration in wireless sensor networks,” Proceedings of the ACM Conference on Embedded Networked Sensor Systems, November 2003. [8] S. Shakkottai, R. Srikant, and N. Shroff, “Unreliable sensor grids: coverage, connectivity, and diameter,” Proceedings of the 22nd IEEE International Conference of the Computer and Communications (INFOCOM), April 2003. [9] V. S. A. Kumar, S. Arya, and H. Ramesh. “Hardness of set cover with intersection 1,” Automata, Languages and Programming, 2000. [10] H. Gupta, S. Das, and Q. Gu, “Connected sensor cover: self-organization of sensor networks for efficient query execution,” Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2003. [11] Nurcan Tezcan and Wenye Wang. “TTS: A two-tiered scheduling mechanism for energy conservation in wireless sensor networks,” International Journal of Sensor Networks, vol. 1, no. 3/4, pp.213–228, November 2006. [12] A. Keshavarzian, H. Lee, and L. Venkatraman, .”Wakeup scheduling in wireless sensor networks,” Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), pp. 322-333, May 2006. [13] O. Dousse, P. Mannersalo, and P. Thiran, “”Latency of wireless sensor networks with uncoordinated power saving mechanisms,” Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2004. [14] Jongkeun Na, Sangsoon Lim and Chong-kwon Kim, “Dual wake-up low power listening for duty cycled wireless sensor networks,” European Association For Signal Processing Journal on Wireless Communications and Networking, to appear. [15] L. Gu and J. Stankovic, “”Radio-triggered wake-up capability for sensor networks,” Proceedings of IEEE Run-Time Abstraction Services, 2004. [16] Xiaobing Wu, Guihai Chen, and Sajal K. Das. “Avoiding energy holes in wireless sensor networks with non-uniform node distribution,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 5, pp.710–720, May 2008. [17] Yizhou Wang, Song C. Zhu. “Department of Statistics, UCLA”. Escholarship Repository, University of California http://repositories.cdlib.org/uclastat/papers/2002010119. [18] J. Jeong, S. Sharafkandi, and D. H. C. Du. “Energy-aware scheduling with quality of surveillance guarantee in wireless sensor networks,” Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, 2006. [19] V. P. Sadaphal, B. N. Jain, “Random and Periodic sleep schedules for target detection in sensor networks,” Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Pisa, pp.8 –11, October 2007. [20] Q. Cao, T. F. Abdelzaher, T. He, and J. A. Stankovic, ”Towards Optimal Sleep Scheduling in Sensor Networks for Rare Event Detection,” Proceedings of the 4th International Conference on Information Processing in Sensor Networks, April 2005. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/42919 | - |
dc.description.abstract | 事件偵測以及環境監督在無線感測網路中是重要的討論議題.然而使用著無法充電或替換的電力來源,通常市電池,將會較短的導致網路壽命,特別是在於事件的發生頻率相當低並且危及的時候,感測裝置若持續的開啟可能在事件發生之前早已將電力耗盡,為了這個理由,要達到節省能源的目的,則有提出了感測裝置進入睡眠模式的概念,並且藉由排程的程序來決定各個感測裝置何時要進入睡眠模式以及何時要醒來工作,但是問題在於感測裝置處於睡眠模式時無法擁有立即的感測事件的功能,若是感測裝置在工作的期間越長,則事件發生後越容易被一個作用中的感測裝置偵測到,因此,事件偵測的延遲時間和感測裝置工作期間長短將會成為一個權衡問題。在此文章中我們將會介紹一個名為'無線感測網路用於事件偵測及資料傳遞之二階段監測感知排程機制'的排程方法,並且加入在事件發生前的感測資訊成為排程的參考參數。為了要有較低的負擔並且減少偵測事件的延遲,我們提出兩種監督的模型能有較好的效率用以處理以上所述之事件。即使此模型只需建立在不含全球定位系統的同質感測裝置上,依舊可以達到降低這兩種延遲。最後我們顯示實驗結果以及數學分析做比較,並且提出結論以及未來改善的方法. | zh_TW |
dc.description.abstract | Event detection and environment surveillance are the important issues in wireless sensor networks. However, using the non-renewable power source leads to the short lifetime of the networks, especially when the event occurred in rare frequency. For this reason to reduce the working time is using the scheduling process to determine the time sensor goes sleeping to conserve energy and wakes up. But in their sleeping time would have no ability to sense the event immediately, so the delay time and the working interval would become trade-off. In this article, we will introduce a new scheduling approach “A Two-Phased Surveillance Aware Scheduling Mechanism for Event Detection and Packet Delivery in Wireless Sensor Networks” to lower the delay time, and we use the sensed data before the event really occurred to make the scheduling policy. Consider to have lower overhead and delay of the event being sensed and the delay to transmit to the base station. We propose two surveillance models to cope with these events. Although this model is simple to create with the homogeneous GPS-free sensor nodes, it can achieve the goal of reducing the delay time of detection and delivery. Finally, we show our performance and make the mathematical analysis to compare with the simulation results then describe the improvement of our approach. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T01:28:51Z (GMT). No. of bitstreams: 1 ntu-98-R96922128-1.pdf: 629627 bytes, checksum: db6c49ed15a042004e94f7619b744375 (MD5) Previous issue date: 2009 | en |
dc.description.tableofcontents | 1 Introduction...............................................................................................................................1
1.1 Sensor networks power issues.............................................................................................1 1.2 Event detection and surveillance.........................................................................................2 1.3 Motivation..........................................................................................................................5 1.4 Pre-occurrence signs............................................................................................................5 1.5 Reducing time delay............................................................................................................6 2 Related Work.............................................................................................................................7 2.1 Event detection and event track...........................................................................................7 2.2 Power issues and detection of rare events...........................................................................9 3 Problem Formulation..............................................................................................................11 3.1 Assumptions.....................................................................................................................11 3.2 Terminologies...................................................................................................................12 4 A Two-Phased Scheduling Mechanism...................................................................................15 4.1 Architecture and state machine.........................................................................................15 4.2 A whirl model....................................................................................................................18 5 Simulation and Mathematical analysis..................................................................................22 5.1 Simulation environments and results.................................................................................22 5.2 Mathematical analysis.......................................................................................................26 7 Conclusion and Future Work..................................................................................................30 REFERENCES | |
dc.language.iso | en | |
dc.title | 無線感測網路用於事件偵測及資料傳遞之二階段監測感知
排程機制 | zh_TW |
dc.title | A Two-Phased Surveillance Aware Scheduling Mechanism for Event Detection and Packet Delivery in Wireless Sensor Networks | en |
dc.type | Thesis | |
dc.date.schoolyear | 97-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 蔡子傑,王藏億,胡家正,周承復 | |
dc.subject.keyword | 無線感測網路,事件偵測,兩,階段排程,監督,電力,消耗, | zh_TW |
dc.subject.keyword | Wireless sensor network,event detection,scheduling,surveillance,power consumption, | en |
dc.relation.page | 34 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2009-07-22 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-98-1.pdf 目前未授權公開取用 | 614.87 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。