Loading…

Theoretical Treatment of Target Coverage in Wireless Sensor Networks

The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound...

Full description

Saved in:
Bibliographic Details
Published in:Journal of computer science and technology 2011, Vol.26 (1), p.117-129
Main Author: 谷雨 赵保华 计宇生 李颉
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3
cites cdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3
container_end_page 129
container_issue 1
container_start_page 117
container_title Journal of computer science and technology
container_volume 26
creator 谷雨 赵保华 计宇生 李颉
description The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.
doi_str_mv 10.1007/s11390-011-9419-4
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_907983727</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>36339546</cqvip_id><sourcerecordid>2235629991</sourcerecordid><originalsourceid>FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</originalsourceid><addsrcrecordid>eNp9kD9PwzAQxSMEEqXwAdgsFiaDHTuxPaLyV6pgIIjRcpxLmjaNWzsF8e1xFSQkBpa70-n37p5ekpxTckUJEdeBUqYIJpRixanC_CCZUJkTzAVXh3EmhGAVy3FyEsKSECYI55PktliA8zC01nSo8GCGNfQDcjUqjG9gQDP3Ad40gNoevbceOggBvUIfnEfPMHw6vwqnyVFtugBnP32avN3fFbNHPH95eJrdzLFlgg-4jE_BZozLuuSWZFUmZcVoVjKu0gpKm0OqlCmprdOKUiGtqmXGWVVCXFUVmyaX492Nd9sdhEGv22Ch60wPbhe0IkJJJlIRyYs_5NLtfB_Nackymioi0wjREbLeheCh1hvfro3_0pTofap6TFXHVPU-Vc2jJh01IbJ9A_738H-iHzd24fpmG3W6NHZVtx1oljOmMp6zb5_ThTg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>835129082</pqid></control><display><type>article</type><title>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</title><source>ABI/INFORM global</source><source>Springer Link</source><creator>谷雨 赵保华 计宇生 李颉</creator><creatorcontrib>谷雨 赵保华 计宇生 李颉</creatorcontrib><description>The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.</description><identifier>ISSN: 1000-9000</identifier><identifier>EISSN: 1860-4749</identifier><identifier>DOI: 10.1007/s11390-011-9419-4</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Algorithms ; Analysis ; Artificial Intelligence ; Computer Science ; Computer simulation ; Data Structures and Information Theory ; Discretization ; Gaps ; Heuristic ; Heuristic methods ; Information Systems Applications (incl.Internet) ; Integer programming ; Linear programming ; Mathematical models ; Networks ; Optimization ; R&amp;D ; Regular Paper ; Research &amp; development ; Sensors ; Software Engineering ; Studies ; Theory of Computation ; Wireless networks ; Wireless sensor networks ; 启发式算法 ; 周期模式 ; 大肠杆菌 ; 无线传感器网络 ; 时间离散 ; 求解过程 ; 生命周期 ; 覆盖率</subject><ispartof>Journal of computer science and technology, 2011, Vol.26 (1), p.117-129</ispartof><rights>Springer 2011</rights><rights>Springer 2011.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</citedby><cites>FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/85226X/85226X.jpg</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/835129082?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,4010,11667,27900,27901,27902,36037,36038,44339</link.rule.ids></links><search><creatorcontrib>谷雨 赵保华 计宇生 李颉</creatorcontrib><title>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</title><title>Journal of computer science and technology</title><addtitle>J. Comput. Sci. Technol</addtitle><addtitle>Journal of Computer Science and Technology</addtitle><description>The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.</description><subject>Algorithms</subject><subject>Analysis</subject><subject>Artificial Intelligence</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Data Structures and Information Theory</subject><subject>Discretization</subject><subject>Gaps</subject><subject>Heuristic</subject><subject>Heuristic methods</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Integer programming</subject><subject>Linear programming</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Optimization</subject><subject>R&amp;D</subject><subject>Regular Paper</subject><subject>Research &amp; development</subject><subject>Sensors</subject><subject>Software Engineering</subject><subject>Studies</subject><subject>Theory of Computation</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><subject>启发式算法</subject><subject>周期模式</subject><subject>大肠杆菌</subject><subject>无线传感器网络</subject><subject>时间离散</subject><subject>求解过程</subject><subject>生命周期</subject><subject>覆盖率</subject><issn>1000-9000</issn><issn>1860-4749</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kD9PwzAQxSMEEqXwAdgsFiaDHTuxPaLyV6pgIIjRcpxLmjaNWzsF8e1xFSQkBpa70-n37p5ekpxTckUJEdeBUqYIJpRixanC_CCZUJkTzAVXh3EmhGAVy3FyEsKSECYI55PktliA8zC01nSo8GCGNfQDcjUqjG9gQDP3Ad40gNoevbceOggBvUIfnEfPMHw6vwqnyVFtugBnP32avN3fFbNHPH95eJrdzLFlgg-4jE_BZozLuuSWZFUmZcVoVjKu0gpKm0OqlCmprdOKUiGtqmXGWVVCXFUVmyaX492Nd9sdhEGv22Ch60wPbhe0IkJJJlIRyYs_5NLtfB_Nackymioi0wjREbLeheCh1hvfro3_0pTofap6TFXHVPU-Vc2jJh01IbJ9A_738H-iHzd24fpmG3W6NHZVtx1oljOmMp6zb5_ThTg</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>谷雨 赵保华 计宇生 李颉</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>2011</creationdate><title>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</title><author>谷雨 赵保华 计宇生 李颉</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>Analysis</topic><topic>Artificial Intelligence</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Data Structures and Information Theory</topic><topic>Discretization</topic><topic>Gaps</topic><topic>Heuristic</topic><topic>Heuristic methods</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Integer programming</topic><topic>Linear programming</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Optimization</topic><topic>R&amp;D</topic><topic>Regular Paper</topic><topic>Research &amp; development</topic><topic>Sensors</topic><topic>Software Engineering</topic><topic>Studies</topic><topic>Theory of Computation</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><topic>启发式算法</topic><topic>周期模式</topic><topic>大肠杆菌</topic><topic>无线传感器网络</topic><topic>时间离散</topic><topic>求解过程</topic><topic>生命周期</topic><topic>覆盖率</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>谷雨 赵保华 计宇生 李颉</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of computer science and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>谷雨 赵保华 计宇生 李颉</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</atitle><jtitle>Journal of computer science and technology</jtitle><stitle>J. Comput. Sci. Technol</stitle><addtitle>Journal of Computer Science and Technology</addtitle><date>2011</date><risdate>2011</risdate><volume>26</volume><issue>1</issue><spage>117</spage><epage>129</epage><pages>117-129</pages><issn>1000-9000</issn><eissn>1860-4749</eissn><abstract>The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11390-011-9419-4</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1000-9000
ispartof Journal of computer science and technology, 2011, Vol.26 (1), p.117-129
issn 1000-9000
1860-4749
language eng
recordid cdi_proquest_miscellaneous_907983727
source ABI/INFORM global; Springer Link
subjects Algorithms
Analysis
Artificial Intelligence
Computer Science
Computer simulation
Data Structures and Information Theory
Discretization
Gaps
Heuristic
Heuristic methods
Information Systems Applications (incl.Internet)
Integer programming
Linear programming
Mathematical models
Networks
Optimization
R&D
Regular Paper
Research & development
Sensors
Software Engineering
Studies
Theory of Computation
Wireless networks
Wireless sensor networks
启发式算法
周期模式
大肠杆菌
无线传感器网络
时间离散
求解过程
生命周期
覆盖率
title Theoretical Treatment of Target Coverage in Wireless Sensor Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T07%3A55%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Theoretical%20Treatment%20of%20Target%20Coverage%20in%20Wireless%20Sensor%20Networks&rft.jtitle=Journal%20of%20computer%20science%20and%20technology&rft.au=%E8%B0%B7%E9%9B%A8%20%E8%B5%B5%E4%BF%9D%E5%8D%8E%20%E8%AE%A1%E5%AE%87%E7%94%9F%20%E6%9D%8E%E9%A2%89&rft.date=2011&rft.volume=26&rft.issue=1&rft.spage=117&rft.epage=129&rft.pages=117-129&rft.issn=1000-9000&rft.eissn=1860-4749&rft_id=info:doi/10.1007/s11390-011-9419-4&rft_dat=%3Cproquest_cross%3E2235629991%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=835129082&rft_id=info:pmid/&rft_cqvip_id=36339546&rfr_iscdi=true