Loading…
Theoretical Treatment of Target Coverage in Wireless Sensor Networks
The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound...
Saved in:
Published in: | Journal of computer science and technology 2011, Vol.26 (1), p.117-129 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3 |
---|---|
cites | cdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3 |
container_end_page | 129 |
container_issue | 1 |
container_start_page | 117 |
container_title | Journal of computer science and technology |
container_volume | 26 |
creator | 谷雨 赵保华 计宇生 李颉 |
description | The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm. |
doi_str_mv | 10.1007/s11390-011-9419-4 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_907983727</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>36339546</cqvip_id><sourcerecordid>2235629991</sourcerecordid><originalsourceid>FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</originalsourceid><addsrcrecordid>eNp9kD9PwzAQxSMEEqXwAdgsFiaDHTuxPaLyV6pgIIjRcpxLmjaNWzsF8e1xFSQkBpa70-n37p5ekpxTckUJEdeBUqYIJpRixanC_CCZUJkTzAVXh3EmhGAVy3FyEsKSECYI55PktliA8zC01nSo8GCGNfQDcjUqjG9gQDP3Ad40gNoevbceOggBvUIfnEfPMHw6vwqnyVFtugBnP32avN3fFbNHPH95eJrdzLFlgg-4jE_BZozLuuSWZFUmZcVoVjKu0gpKm0OqlCmprdOKUiGtqmXGWVVCXFUVmyaX492Nd9sdhEGv22Ch60wPbhe0IkJJJlIRyYs_5NLtfB_Nackymioi0wjREbLeheCh1hvfro3_0pTofap6TFXHVPU-Vc2jJh01IbJ9A_738H-iHzd24fpmG3W6NHZVtx1oljOmMp6zb5_ThTg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>835129082</pqid></control><display><type>article</type><title>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</title><source>ABI/INFORM global</source><source>Springer Link</source><creator>谷雨 赵保华 计宇生 李颉</creator><creatorcontrib>谷雨 赵保华 计宇生 李颉</creatorcontrib><description>The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.</description><identifier>ISSN: 1000-9000</identifier><identifier>EISSN: 1860-4749</identifier><identifier>DOI: 10.1007/s11390-011-9419-4</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Algorithms ; Analysis ; Artificial Intelligence ; Computer Science ; Computer simulation ; Data Structures and Information Theory ; Discretization ; Gaps ; Heuristic ; Heuristic methods ; Information Systems Applications (incl.Internet) ; Integer programming ; Linear programming ; Mathematical models ; Networks ; Optimization ; R&D ; Regular Paper ; Research & development ; Sensors ; Software Engineering ; Studies ; Theory of Computation ; Wireless networks ; Wireless sensor networks ; 启发式算法 ; 周期模式 ; 大肠杆菌 ; 无线传感器网络 ; 时间离散 ; 求解过程 ; 生命周期 ; 覆盖率</subject><ispartof>Journal of computer science and technology, 2011, Vol.26 (1), p.117-129</ispartof><rights>Springer 2011</rights><rights>Springer 2011.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</citedby><cites>FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/85226X/85226X.jpg</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/835129082?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,4010,11667,27900,27901,27902,36037,36038,44339</link.rule.ids></links><search><creatorcontrib>谷雨 赵保华 计宇生 李颉</creatorcontrib><title>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</title><title>Journal of computer science and technology</title><addtitle>J. Comput. Sci. Technol</addtitle><addtitle>Journal of Computer Science and Technology</addtitle><description>The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.</description><subject>Algorithms</subject><subject>Analysis</subject><subject>Artificial Intelligence</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Data Structures and Information Theory</subject><subject>Discretization</subject><subject>Gaps</subject><subject>Heuristic</subject><subject>Heuristic methods</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Integer programming</subject><subject>Linear programming</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Optimization</subject><subject>R&D</subject><subject>Regular Paper</subject><subject>Research & development</subject><subject>Sensors</subject><subject>Software Engineering</subject><subject>Studies</subject><subject>Theory of Computation</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><subject>启发式算法</subject><subject>周期模式</subject><subject>大肠杆菌</subject><subject>无线传感器网络</subject><subject>时间离散</subject><subject>求解过程</subject><subject>生命周期</subject><subject>覆盖率</subject><issn>1000-9000</issn><issn>1860-4749</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kD9PwzAQxSMEEqXwAdgsFiaDHTuxPaLyV6pgIIjRcpxLmjaNWzsF8e1xFSQkBpa70-n37p5ekpxTckUJEdeBUqYIJpRixanC_CCZUJkTzAVXh3EmhGAVy3FyEsKSECYI55PktliA8zC01nSo8GCGNfQDcjUqjG9gQDP3Ad40gNoevbceOggBvUIfnEfPMHw6vwqnyVFtugBnP32avN3fFbNHPH95eJrdzLFlgg-4jE_BZozLuuSWZFUmZcVoVjKu0gpKm0OqlCmprdOKUiGtqmXGWVVCXFUVmyaX492Nd9sdhEGv22Ch60wPbhe0IkJJJlIRyYs_5NLtfB_Nackymioi0wjREbLeheCh1hvfro3_0pTofap6TFXHVPU-Vc2jJh01IbJ9A_738H-iHzd24fpmG3W6NHZVtx1oljOmMp6zb5_ThTg</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>谷雨 赵保华 计宇生 李颉</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>2011</creationdate><title>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</title><author>谷雨 赵保华 计宇生 李颉</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>Analysis</topic><topic>Artificial Intelligence</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Data Structures and Information Theory</topic><topic>Discretization</topic><topic>Gaps</topic><topic>Heuristic</topic><topic>Heuristic methods</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Integer programming</topic><topic>Linear programming</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Optimization</topic><topic>R&D</topic><topic>Regular Paper</topic><topic>Research & development</topic><topic>Sensors</topic><topic>Software Engineering</topic><topic>Studies</topic><topic>Theory of Computation</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><topic>启发式算法</topic><topic>周期模式</topic><topic>大肠杆菌</topic><topic>无线传感器网络</topic><topic>时间离散</topic><topic>求解过程</topic><topic>生命周期</topic><topic>覆盖率</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>谷雨 赵保华 计宇生 李颉</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of computer science and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>谷雨 赵保华 计宇生 李颉</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Theoretical Treatment of Target Coverage in Wireless Sensor Networks</atitle><jtitle>Journal of computer science and technology</jtitle><stitle>J. Comput. Sci. Technol</stitle><addtitle>Journal of Computer Science and Technology</addtitle><date>2011</date><risdate>2011</risdate><volume>26</volume><issue>1</issue><spage>117</spage><epage>129</epage><pages>117-129</pages><issn>1000-9000</issn><eissn>1860-4749</eissn><abstract>The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11390-011-9419-4</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1000-9000 |
ispartof | Journal of computer science and technology, 2011, Vol.26 (1), p.117-129 |
issn | 1000-9000 1860-4749 |
language | eng |
recordid | cdi_proquest_miscellaneous_907983727 |
source | ABI/INFORM global; Springer Link |
subjects | Algorithms Analysis Artificial Intelligence Computer Science Computer simulation Data Structures and Information Theory Discretization Gaps Heuristic Heuristic methods Information Systems Applications (incl.Internet) Integer programming Linear programming Mathematical models Networks Optimization R&D Regular Paper Research & development Sensors Software Engineering Studies Theory of Computation Wireless networks Wireless sensor networks 启发式算法 周期模式 大肠杆菌 无线传感器网络 时间离散 求解过程 生命周期 覆盖率 |
title | Theoretical Treatment of Target Coverage in Wireless Sensor Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T07%3A55%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Theoretical%20Treatment%20of%20Target%20Coverage%20in%20Wireless%20Sensor%20Networks&rft.jtitle=Journal%20of%20computer%20science%20and%20technology&rft.au=%E8%B0%B7%E9%9B%A8%20%E8%B5%B5%E4%BF%9D%E5%8D%8E%20%E8%AE%A1%E5%AE%87%E7%94%9F%20%E6%9D%8E%E9%A2%89&rft.date=2011&rft.volume=26&rft.issue=1&rft.spage=117&rft.epage=129&rft.pages=117-129&rft.issn=1000-9000&rft.eissn=1860-4749&rft_id=info:doi/10.1007/s11390-011-9419-4&rft_dat=%3Cproquest_cross%3E2235629991%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c374t-b037ec5348fb4c05d588d315b3492debc6e299ab1cf2d1178c9f8543dbe1cfdd3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=835129082&rft_id=info:pmid/&rft_cqvip_id=36339546&rfr_iscdi=true |