By: Ziji Song Advisor: Prof. J. Spinelli

Slides:



Advertisements
Similar presentations
O(N 1.5 ) divide-and-conquer technique for Minimum Spanning Tree problem Step 1: Divide the graph into  N sub-graph by clustering. Step 2: Solve each.
Advertisements

Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Stanford University CS243 Winter 2006 Wei Li 1 Register Allocation.
Transportation Problem (TP) and Assignment Problem (AP)
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Polynomial Time Approximation Schemes Presented By: Leonid Barenboim Roee Weisbert.
Maximal Lifetime Scheduling in Sensor Surveillance Networks Hai Liu 1, Pengjun Wan 2, Chih-Wei Yi 2, Siaohua Jia 1, Sam Makki 3 and Niki Pissionou 4 Dept.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Wireless Broadcasting with Optimized Transmission Efficiency Jehn-Ruey Jiang and Yung-Liang Lai National Central University, Taiwan.
Three-Dimensional Broadcasting with Optimized Transmission Efficiency in Wireless Networks Yung-Liang Lai and Jehn-Ruey Jiang National Central University.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Branch and Bound Searching Strategies
Subscription Subsumption Evaluation for Content-Based Publish/Subscribe Systems Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, and Nalini Venkatasubramanian.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
1 Branch and Bound Searching Strategies 2 Branch-and-bound strategy 2 mechanisms: A mechanism to generate branches A mechanism to generate a bound so.
Using Search in Problem Solving
A Hybrid Self-Organizing Neural Gas Network James Graham and Janusz Starzyk School of EECS, Ohio University Stocker Center, Athens, OH USA IEEE World.
1 A Coverage-Preserving & Hole Tolerant Based Scheme for the Irregular Sensing Range in WSN Azzedine Boukerche, Xin Fei, Regina B. Araujo PARADISE Research.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Dave Risch. Project Specifications There is a “knapsack” that you want to fill with the most valuable items that are available to you. Each item has a.
- ABHRA DASGUPTA Solving Adhoc and Math related problems.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Multiply polynomials vertically and horizontally
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
P6 Rational Expressions. Warm-up Simplify the following:
Maxim A. Batalin, Gaurav S. Sukhatme Presented by:Shawn Kristek.
Ai Chen, Ten H. Lai, Dong Xuan Department of Computer Science and Engineering The Ohio State University Columbus Measuring and Guaranteeing Quality of.
Minimum Spanning Trees CS 146 Prof. Sin-Min Lee Regina Wang.
© Yamacraw, 2001 Selecting Forwarding neighbors in Wireless Ad Hoc Networks A. Zelikovsky GSU G. Calinescun, Illinois IT I. Mandoiu,
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
11.2 Space coordinates and vectors in Space. 3 dimensional coordinate plane.
The number which appears most often in a set of numbers. Example: in {6, 3, 9, 6, 6, 5, 9, 3} the Mode is 6 (it occurs most often). Mode : The middle number.
Motion Planning Howie CHoset. Assign HW Algorithms –Start-Goal Methods –Map-Based Approaches –Cellular Decompositions.
Branch and Bound Searching Strategies
Query-based wireless sensor storage management for real time applications Ravinder Tamishetty, Lek Heng Ngoh, and Pung Hung Keng Proceedings of the 2006.
Parameter Reduction for Density-based Clustering on Large Data Sets Elizabeth Wang.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Iterative Improvement for Domain-Specific Problems Lecturer: Jing Liu Homepage:
Color Image Segmentation Mentor : Dr. Rajeev Srivastava Students: Achit Kumar Ojha Aseem Kumar Akshay Tyagi.
Clustering In Mobile Networks Presented By: Assaf Mizrachi Shimrit Artzi Tutor: Dr. Michael Segal.
Graph Search Applications, Minimum Spanning Tree
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Prof. Yu-Chee Tseng Department of Computer Science
Flood fill algorithm Also called seed fill, is an algorithm that determines the area connected to a given node in a multi-dimensional array, When applied.
Data Center Network Architectures
Original Synteny Vincent Ferretti, Joseph H. Nadeau, David Sankoff, 1996 Presented by: Suzy Sun.
Selecting Forwarding Neighbors in Wireless Ad Hoc Networks
Parallel Density-based Hybrid Clustering
Section 3.3 Solving Equations with Variables on Both Sides
Presented by Prashant Duhoon
Analysis and design of algorithm
Finding Heuristics Using Abstraction
Selection in heaps and row-sorted matrices
Divide Areas Algorithm For Optimal Multi-Robot Coverage Path Planning
GENERAL VIEW OF KRATOS MULTIPHYSICS
Performance Comparison of Tarry and Awerbuch Algorithms
Effective Replica Allocation
Trees & Forests D. J. Foreman.
ADVISOR : Professor Yeong-Sung Lin STUDENT : Hung-Shi Wang
Hacker Detection: Jamming a WSN
Chapter 12 – Optimal Tag Coverage and Tag Report Elimination
Solving the Minimum Labeling Spanning Tree Problem
Self-protection experiment
Minimum Spanning Trees
Presentation transcript:

By: Ziji Song Advisor: Prof. J. Spinelli EER Senior Project Wireless Sensor Placement in Arbitrary 3D Environment By: Ziji Song Advisor: Prof. J. Spinelli

Origin and Application of the Problem Union Outing Club students were trapped in a cave during caving due to water flooding Application: Wireless network setup

Goal of the Project For any given 3D environment, setup a wireless sensor network in the environment based on its shape and the communication range of the sensor. Use different algorithms to place motes and compare the different results

Design Specifications All empty spaces in the environment should be reached by at least one sensor mote The least number of sensor motes should be used

Description of the 3D Environment The 3D Environment  “Cave” Cave is divided into nodes which are separated by x,y and z paralleled planes (i.e a 3*3*3 cave will look like a Rubic’s cube) Empty spaces nodes “Free Space Nodes” (refer to the center point of the cube area) Non-empty space nodes  “Rock”

Neighbor Density Definition: For a given free space node in the cave, denote Q as the set of free space nodes which direct lines between p and Q maps only free space nodes. The neighbor density of p equals ∑1/dist2(p,q) for all q in Q.

2D Example of Calculating ND

Another 2D Example with Rock

Important Definitions Covered Node: If a free space node is reachable by at least one sensor mote, then it is a covered node. Occupied Node: If a sensor mote is placed on a free space node, then the node is occupied.

Two Algorithms to Place Motes The First Algorithm Adding motes to an empty cave Add motes to the uncovered node with highest ND Repeat step 2 until all FS nodes are covered

Two Algorithms to Place Motes The Second Algorithm Subtracting motes from a fully occupied cave Place all FS nodes in an array and sort the array ASC with respect to ND For each node in the array, remove the sensor If not all FS nodes are covered, put the sensor back on that particular FS node

Comparison of the Two Methods Run time Simulation results

Conclusion No known algorithm to find the optimal solution Run Time might go up exponentially Both algorithms give reasonable solutions

Special Thanks Prof. Chang Prof. Fernandes Prof. Almstead Prof. Hedrick