English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 42755948      線上人數 : 2568
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/8973


    題名: 在無線感測器網路中邊界點選擇與目標物偵測之通訊協定;Boundary Nodes Selection and Target Detection Protocols in Wireless Sensor Networks
    作者: 游政儒;Cheng-Ju Yu
    貢獻者: 資訊工程研究所
    關鍵詞: 無線感測器網路;邊界點;目標物追蹤;Wireless sensor networks;Target tracking;Boundary nodes
    日期: 2005-07-16
    上傳時間: 2009-09-22 11:38:39 (UTC+8)
    出版者: 國立中央大學圖書館
    摘要: 近年來在無線感測網路 (Wireless sensor networks) 的研究中,目標物追蹤 (Target tracking) 是一項重要的研究議題。使用者利用無線感測器 (Wireless sensor nodes),對欲監控之目標物進行監測,當目標物進入感測器的感測範圍後,感測器可取得所感測的資訊並回傳至後端之資料彙集點 (Sink node)。因此,使用者可以從資料彙集點取得所感測之資料。然而,有些應用只需要目標物進出某些區域之資訊。例如:動物學家欲了解某些野生動物,在廣大棲息地中遷徙或活動之習性,則可佈建無線感測網路做長期之監測,以取得寶貴之監測數據。本篇論文中,我們提出一種在無線感測網路中,分散式尋找出監測目標物之邊界點 (Boundary nodes) 的演算法。被選擇的邊界點將紀錄目標物進出邊界之時間資訊,並將這些資訊傳送至資料彙集點。模擬結果證明,我們所提出的演算法,所選出的邊界點數目相當接近最佳值。此外,我們的演算法所需要之控制封包數量也少於其他方法,且在網路範圍變大的情況下,使用我們的演算法來選擇邊界點之時間並不會增加太多。 In recent years, target tracking has been an important issue in research of wireless sensor networks. Users can use wireless sensor networks to keep the interesting target under surveillance. Once the target enters the sensing range of the sensor node, the sensing information will be recorded by the sensor nodes and forwarded to the sink node. Therefore, users can obtain the information from the sink node. However, some applications only need to record the information of a target entering or leaving a boundary for some specific regions. For example, zoologists want to know some kinds of wildlife migration or habitual behavior in a large-scale natural habitat, and then they can deploy a wireless sensor network to keep a long-term surveillance and get precious monitoring data. In this thesis, we proposed a distributed algorithm to find out the boundary nodes in a wireless sensor network. The selected boundary nodes are used to track the interesting targets (wildlife) when they enter or leave a boundary of the wireless sensor network. The information of wildlife entering or leaving the monitoring regions will be recorded and forwarded to the sink node by the boundary sensor nodes. Simulation results show that the proposed protocols have good performance in selecting boundary nodes. The number of selected boundary nodes almost closes to the optimal value. Besides, our protocol has the less total control overhead during selecting boundary nodes. As the size of the wireless sensor network is increasing, the time of selecting the boundary nodes using our protocol will not increase rapidly in our protocol.
    顯示於類別:[資訊工程研究所] 博碩士論文

    文件中的檔案:

    檔案 大小格式瀏覽次數


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明