Harbin Institute of Technology Application-Aware Data Collection in Wireless Sensor Networks Fang Xiaolin Harbin Institute of Technology.

Slides:



Advertisements
Similar presentations
Approximation algorithms for geometric intersection graphs.
Advertisements

Algorithm Design Methods (I) Fall 2003 CSE, POSTECH.
Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
Set Cover 資工碩一 簡裕峰. Set Cover Problem 2.1 (Set Cover) Given a universe U of n elements, a collection of subsets of U, S ={S 1,…,S k }, and a cost.
Properties of SPT schedules Eric Angel, Evripidis Bampis, Fanny Pascual LaMI, university of Evry, France MISTA 2005.
Greedy Algorithms Greed is good. (Some of the time)
Greedy Algorithms Basic idea Connection to dynamic programming
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
Greedy Algorithms Basic idea Connection to dynamic programming Proof Techniques.
Approaches to Problem Solving greedy algorithms dynamic programming backtracking divide-and-conquer.
Approaches to Problem Solving greedy algorithms dynamic programming backtracking divide-and-conquer.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Nazgol Haghighat Supervisor: Prof. Dr. Ir. Daniel J. Rixen
1 Vertex Cover Problem Given a graph G=(V, E), find V' ⊆ V such that for each edge (u, v) ∈ E at least one of u and v belongs to V’ and |V’| is minimized.
Chess Review May 11, 2005 Berkeley, CA Tracking Multiple Objects using Sensor Networks and Camera Networks Songhwai Oh EECS, UC Berkeley
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
1 Rendezvous Design Algorithms for Wireless Sensor Networks with a Mobile Station Guoliang Xing; Tian Wang; Weijia Jia; Minming Li Department of Computer.
1 Combinatorial Dominance Analysis The Knapsack Problem Keywords: Combinatorial Dominance (CD) Domination number/ratio (domn, domr) Knapsack (KP) Incremental.
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks Maggie X. Cheng, Lu Ruan and Weili Wu Dept. of Comput. Sci, Missouri.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Outline Introduction The hardness result The approximation algorithm.
Hamed Pirsiavash, Deva Ramanan, Charless Fowlkes
Operations Research Models
Fair Scheduling of Real-Time Tasks on Multiprocessors Uday Prabhala.
Stochastic Algorithms Some of the fastest known algorithms for certain tasks rely on chance Stochastic/Randomized Algorithms Two common variations – Monte.
1 Approximation Through Scaling Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Introduction to Algorithms By Mr. Venkatadri. M. Two Phases of Programming A typical programming task can be divided into two phases: Problem solving.
Approximate Dynamic Programming Methods for Resource Constrained Sensor Management John W. Fisher III, Jason L. Williams and Alan S. Willsky MIT CSAIL.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Greedy Algorithms for the Shortest Common Superstring Overview by Anton Nesterov Saint Petersburg State University Russia Original paper by A. Frieze,
3.3 Complexity of Algorithms
Approaches to Problem Solving greedy algorithms dynamic programming backtracking divide-and-conquer.
Node Reclamation and Replacement for Long-lived Sensor Networks Bin Tong, Wensheng Zhang, and Chuang Wang Department of Computer Science, Iowa State University.
Energy-Aware Scheduling for Aperiodic Tasks on Multi-core Processors Dawei Li and Jie Wu Department of Computer and Information Sciences Temple University,
Approximation of Non-linear Functions in Mixed Integer Programming Alexander Martin TU Darmstadt Workshop on Integer Programming and Continuous Optimization.
Channel-Independent Viterbi Algorithm (CIVA) for DNA Sequencing
Lecture 8 CSE 331. Main Steps in Algorithm Design Problem Statement Algorithm Problem Definition “Implementation” Analysis n! Correctness+Runtime Analysis.
Fair Energy-efficient Sensing Task Allocation in Participatory Sensing with Smartphones 使用智能手机的共享式传感中的公平、高效能的传感任务分配 --- 赵若男.
Coverage and Scheduling in Wireless Sensor Networks Yong Hwan Kim Korea University of Technology and Education Laboratory of Intelligent.
DEPARTMENT/SEMESTER ME VII Sem COURSE NAME Operation Research Manav Rachna College of Engg.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Simplify. Complex Numbers Complex Numbers Intro Definition of Pure Imaginary Numbers: For any positive real number, “b” Where i is the imaginary unit.
Introduction toData structures and Algorithms
The Subset-sum Problem
deterministic operations research
Memory Segmentation to Exploit Sleep Mode Operation
Dynamic Programming Sequence of decisions. Problem state.
Chapter 8 Local Ratio II. More Example
for Vision-Based Navigation
Dynamic Programming Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Greedy Algorithms Basic idea Connection to dynamic programming
Computability and Complexity
The Greedy Method Spring 2007 The Greedy Method Merge Sort
Xinbing Wang*, Qian Zhang**
Multi-Objective Optimization for Topology Control in Hybrid FSO/RF Networks Jaime Llorca December 8, 2004.
Unit 4: Dynamic Programming
Approximation Algorithms
Richard Anderson Lecture 6 Greedy Algorithms
The use of Neural Networks to schedule flow-shop with dynamic job arrival ‘A Multi-Neural Network Learning for lot Sizing and Sequencing on a Flow-Shop’
Richard Anderson Lecture 7 Greedy Algorithms
for Vision-Based Navigation
CS 6310 Advanced Design and Analysis of Algorithms Rajani Pingili
Presentation transcript:

Harbin Institute of Technology Application-Aware Data Collection in Wireless Sensor Networks Fang Xiaolin Harbin Institute of Technology

2 Outline n Existing work n Our problem n An approximation algorithm n An special instance n Simulations

3 Harbin Institute of Technology Existing work n Multi-application based data collection Data sharing [9] Sample as less data as possible Data point Existing work studies data point sampling

4 Harbin Institute of Technology Our problem n Multi-application based data collection n Sample data for a continuous interval Acoustic, video information [10], [11] Vibration measurement [12], [13], [14] Speed information [15] Sample an interval

5 Harbin Institute of Technology Problem definition Given a set of n tasks T, each task Ti is denoted as Ti = bi: beginning time ei: end time li: data sampling interval length Find a continuous sub-interval Ii for each task Ti so that

6 Harbin Institute of Technology Problem complexity n Non-linear non-convex optimization problem Nonlinear integer programming problem, If bi,ei,li are regarded as integers

7 Harbin Institute of Technology Greedy algorithm overview n 1. Sort by end times n 2. Find task set P overlap with first n 3. Find solution for P, and Remove n 4. Back to step 2

8 Harbin Institute of Technology Greedy algorithm overview n 1. Sort by end times n 2. Find task set P overlap with first n 3. Find solution for P, and Remove n 4. Back to step 2

9 Harbin Institute of Technology Greedy algorithm overview n 1. Sort by end times n 2. Find task set P overlap with first n 3. Find solution for P, and Remove n 4. Back to step 2

10 Harbin Institute of Technology Greedy algorithm overview n 1. Sort by end times n 2. Find task set P overlap with first n 3. Find solution for P, and Remove n 4. Back to step 2

11 Harbin Institute of Technology Find solution for P n Compute [s,e] for the tasks overlap with each other

12 Harbin Institute of Technology Approximation algorithm analysis n Approximation ratio is 2 n Time complexity is

13 Harbin Institute of Technology A special instance General problem Ti = Special instance Ti = n The data length is the same Can be solved in O(n 2 )

14 Harbin Institute of Technology Algorithm overview n1n1. Sort by the end times n2n2. Remove tasks cover other tasks n3n3. Dynamic programming Does not affect the result

15 Harbin Institute of Technology Algorithm overview n 1. Sort by the end times n 2. Remove tasks cover other tasks n 3. Dynamic programming

16 Harbin Institute of Technology Algorithm overview n 1. Sort by the end times n 2. Remove tasks cover other tasks n 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,7] [5,9] [12,16] x(i,j)[s,e] x(1,1)[3,7] x(2,2)[5,9] x(3,3)[12,16] x(1,2)[3,8] x(2,3)[5,10]

17 Harbin Institute of Technology Algorithm overview n 1. Sort by the end times n 2. Remove tasks cover other tasks n 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,8] x(i,j)[s,e] x(1,1)[3,7] x(2,2)[5,9] x(3,3)[12,16] x(1,2)[3,8] x(2,3)[5,10]

18 Harbin Institute of Technology Algorithm overview n 1. Sort by the end times n 2. Remove tasks cover other tasks n 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [5,10] x(i,j)[s,e] x(1,1)[3,7] x(2,2)[5,9] x(3,3)[12,16] x(1,2)[3,8] x(2,3)[5,10]

19 Harbin Institute of Technology Algorithm overview n 1. Sort by the end times n 2. Remove tasks cover other tasks n 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,10] x(i,j)[s,e] x(1,1)[3,7] x(2,2)[5,9] x(3,3)[12,16] x(1,2)[3,8] x(2,3)[5,10] x(1,3) = x(1,1) U x(2,3) x x(1,2) U x(3,3) x min

20 Harbin Institute of Technology Simulation n Tossim n Four cases n Tasks are from multi-applications n Each application consists of periodical tasks

21 Harbin Institute of Technology Simulation n short sampling interval lengths

22 Harbin Institute of Technology Simulation n longer sampling interval lengths

23 Harbin Institute of Technology Simulation n Different Window size

24 Harbin Institute of Technology Simulation n Data loss

25 Harbin Institute of Technology