Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
碩士 === 國立中央大學 === 資訊工程研究所 === 93 === In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensin...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/33020270667768063970 |
id |
ndltd-TW-093NCU05392068 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NCU053920682015-10-13T11:53:59Z http://ndltd.ncl.edu.tw/handle/33020270667768063970 Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks 在無線感測器網路中邊界點選擇與目標物偵測之通訊協定 Cheng-Ju Yu 游政儒 碩士 國立中央大學 資訊工程研究所 93 In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensing information will be recorded by the sensor nodes and forwarded to the sink node. Therefore, users can obtain the information from the sink node. However, some applications only need to record the information of a target entering or leaving a boundary for some specific regions. For example, zoologists want to know some kinds of wildlife migration or habitual behavior in a large-scale natural habitat, and then they can deploy a wireless sensor network to keep a long-term surveillance and get precious monitoring data. In this thesis, we proposed a distributed algorithm to find out the boundary nodes in a wireless sensor network. The selected boundary nodes are used to track the interesting targets (wildlife) when they enter or leave a boundary of the wireless sensor network. The information of wildlife entering or leaving the monitoring regions will be recorded and forwarded to the sink node by the boundary sensor nodes. Simulation results show that the proposed protocols have good performance in selecting boundary nodes. The number of selected boundary nodes almost closes to the optimal value. Besides, our protocol has the less total control overhead during selecting boundary nodes. As the size of the wireless sensor network is increasing, the time of selecting the boundary nodes using our protocol will not increase rapidly in our protocol. Jang-Ping Sheu 許健平 2005 學位論文 ; thesis 35 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程研究所 === 93 === In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensing information will be recorded by the sensor nodes and forwarded to the sink node. Therefore, users can obtain the information from the sink node. However, some applications only need to record the information of a target entering or leaving a boundary for some specific regions. For example, zoologists want to know some kinds of wildlife migration or habitual behavior in a large-scale natural habitat, and then they can deploy a wireless sensor network to keep a long-term surveillance and get precious monitoring data. In this thesis, we proposed a distributed algorithm to find out the boundary nodes in a wireless sensor network. The selected boundary nodes are used to track the interesting targets (wildlife) when they enter or leave a boundary of the wireless sensor network. The information of wildlife entering or leaving the monitoring regions will be recorded and forwarded to the sink node by the boundary sensor nodes. Simulation results show that the proposed protocols have good performance in selecting boundary nodes. The number of selected boundary nodes almost closes to the optimal value. Besides, our protocol has the less total control overhead during selecting boundary nodes. As the size of the wireless sensor network is increasing, the time of selecting the boundary nodes using our protocol will not increase rapidly in our protocol.
|
author2 |
Jang-Ping Sheu |
author_facet |
Jang-Ping Sheu Cheng-Ju Yu 游政儒 |
author |
Cheng-Ju Yu 游政儒 |
spellingShingle |
Cheng-Ju Yu 游政儒 Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks |
author_sort |
Cheng-Ju Yu |
title |
Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks |
title_short |
Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks |
title_full |
Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks |
title_fullStr |
Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks |
title_full_unstemmed |
Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks |
title_sort |
boundary nodes selection and target detection protocols in wireless sensor networks |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/33020270667768063970 |
work_keys_str_mv |
AT chengjuyu boundarynodesselectionandtargetdetectionprotocolsinwirelesssensornetworks AT yóuzhèngrú boundarynodesselectionandtargetdetectionprotocolsinwirelesssensornetworks AT chengjuyu zàiwúxiàngǎncèqìwǎnglùzhōngbiānjièdiǎnxuǎnzéyǔmùbiāowùzhēncèzhītōngxùnxiédìng AT yóuzhèngrú zàiwúxiàngǎncèqìwǎnglùzhōngbiānjièdiǎnxuǎnzéyǔmùbiāowùzhēncèzhītōngxùnxiédìng |
_version_ |
1716850499670507520 |