SlideShare ist ein Scribd-Unternehmen logo
1 von 4
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Mobility and Intruder Prior Information Improving 
the Barrier Coverage of Sparse Sensor 
Networks 
ABSTRACT: 
The barrier coverage problem in emerging mobile sensor networks has 
been an interesting research issue due to many related real-life 
applications. Existing solutions are mainly concerned with deciding one-time 
movement for individual sensors to construct as many barriers as 
possible, which may not be suitable when there are no sufficient sensors to 
form a single barrier. In this paper, we aim to achieve barrier coverage in 
the sensor scarcity scenario by dynamic sensor patrolling. Specifically, we 
design a periodic monitoring scheduling (PMS) algorithm in which each 
point along the barrier line is monitored periodically by mobile sensors. 
Based on the insight from PMS, we then propose a coordinated sensor 
patrolling (CSP) algorithm to further improve the barrier coverage, where 
each sensor’s current movement strategy is derived from the information 
of intruder arrivals in the past. By jointly exploiting sensor mobility and 
intruder arrival information, CSP is able to significantly enhance barrier 
coverage. We prove that the total distance that sensors move during each
time slot in CSP is the minimum. Considering the decentralized nature of 
mobile sensor networks, we further introduce two distributed versions of 
CSP: S-DCSP and G-DCSP. We study the scenario where sensors are 
moving on two barriers and propose two heuristic algorithms to guide the 
movement of sensors. Finally, we generalize our results to work for 
different intruder arrival models. Through extensive simulations, we 
demonstrate that the proposed algorithms have desired barrier coverage 
performances. 
EXISTING SYSTEM: 
Existing solutions are mainly concerned with deciding one-time movement 
for individual sensors to construct as many barriers as possible, which may 
not be suitable when there are no sufficient sensors to form a single barrier. 
In this paper, we aim to achieve barrier coverage in the sensor scarcity 
scenario by dynamic sensor patrolling. Specifically, we design a periodic 
monitoring scheduling (PMS) algorithm in which each point along the 
barrier line is monitored periodically by mobile sensors. Based on the 
insight from PMS, we then propose a coordinated sensor patrolling (CSP) 
algorithm to further improve the barrier coverage, where each sensor’s 
current movement strategy is derived from the information of intruder 
arrivals in the past. Existing solutions to barrier coverage in mobile sensor 
networks implicitly assume the availability of sufficient sensors. They focus 
on how to move the available sensors one time to construct as many 
barriers as possible with a minimum aggregate moving distance . 
PROPOSED SYSTEM: 
We study the scenario where sensors are moving on two barriers and 
propose two heuristic algorithms to guide the movement of sensors. Finally,
we generalize our results to work for different intruder arrival models. 
Through extensive simulations, we demonstrate that the proposed 
algorithms have desired barrier coverage performances. They defined the 
notion of k-barrier coverage, and proposed algorithms to decide whether a 
belt region is k-barrier covered or not after sensor deployment. They also 
introduced two probabilistic barrier coverage concepts: weak barrier 
coverage and strong barrier coverage. The minimum number of sensors 
required to ensure weakbarrier coverage with high probability has been 
derived, while the issue of strong barrier coverage is still open. Based on 
the insight gained from PMS, we then proposed to jointly exploit sensor 
mobility and intruder arrival information to improve barrier coverage. 
CONCLUSION: 
We have studied the cost-effective barrier coverage problem for the case of 
sensor scarcity. We first designed a periodic monitoring scheduling (PMS) 
algorithm. Based on the insight gained from PMS, we then proposed to 
jointly exploit sensor mobility and intruder arrival information to improve 
barrier coverage. We devised a coordinated sensor patrolling (CSP) 
algorithm, and demonstrated that the proposed CSP can significantly 
enhance the barrier coverage. We also presented two distributed versions 
of CSP, S-DCSP and G-DCSP, to suit the decentralized nature of WSNs. 
We considered 2-barriers case, where sensors can move on two different 
barriers, and proposed two sensor movement algorithms. In addition, we 
generalized CSP to work for different intruder arrival models. Our 
simulation results indicated that the proposed algorithms can better 
improve the barrier coverage performance when we know more about the 
intruder arrival information. Our solution thus has a great potential to 
reduce the application budget and provides a new cost-effective approach
to achieve barrier coverage in large-scale mobile sensor networks. We will 
study the general k-barriers coverage by mobile sensor 
networks in the future work. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

Weitere ähnliche Inhalte

Andere mochten auch

Collaborate 2014, Oracle Financial Close Management: Embrace the Change
Collaborate 2014, Oracle Financial Close Management: Embrace the ChangeCollaborate 2014, Oracle Financial Close Management: Embrace the Change
Collaborate 2014, Oracle Financial Close Management: Embrace the ChangeRJ Linehan
 
Product Analysis Oracle iSupplier Portal - Oracle e-Business Suite
Product Analysis Oracle iSupplier Portal - Oracle e-Business SuiteProduct Analysis Oracle iSupplier Portal - Oracle e-Business Suite
Product Analysis Oracle iSupplier Portal - Oracle e-Business SuiteAcevedoApps
 
[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...
[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...
[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...OWASP Turkiye
 
2013 anemo nurse - cotza il recupero di sangue intraoperatorio
2013 anemo nurse - cotza il recupero di sangue intraoperatorio2013 anemo nurse - cotza il recupero di sangue intraoperatorio
2013 anemo nurse - cotza il recupero di sangue intraoperatorioanemo_site
 
IMC - Uber Technologies
IMC - Uber TechnologiesIMC - Uber Technologies
IMC - Uber TechnologiesAmit Inani
 
INNOVATE 2014, Oracle Financial Close Management: Streamline Your Close Process
INNOVATE 2014, Oracle Financial Close Management: Streamline Your Close ProcessINNOVATE 2014, Oracle Financial Close Management: Streamline Your Close Process
INNOVATE 2014, Oracle Financial Close Management: Streamline Your Close ProcessRJ Linehan
 
Aula 06 fisiologia do sistema endócrino - atualizado
Aula 06   fisiologia do sistema endócrino - atualizadoAula 06   fisiologia do sistema endócrino - atualizado
Aula 06 fisiologia do sistema endócrino - atualizadoHamilton Nobrega
 
Customize the login homepage For Oracle EBS R12
Customize the login homepage For Oracle EBS R12Customize the login homepage For Oracle EBS R12
Customize the login homepage For Oracle EBS R12Ahmed Elshayeb
 
Şifreleme Teknikleri ve SSL
Şifreleme Teknikleri ve SSLŞifreleme Teknikleri ve SSL
Şifreleme Teknikleri ve SSLTolga ÇELİK
 

Andere mochten auch (10)

Collaborate 2014, Oracle Financial Close Management: Embrace the Change
Collaborate 2014, Oracle Financial Close Management: Embrace the ChangeCollaborate 2014, Oracle Financial Close Management: Embrace the Change
Collaborate 2014, Oracle Financial Close Management: Embrace the Change
 
Product Analysis Oracle iSupplier Portal - Oracle e-Business Suite
Product Analysis Oracle iSupplier Portal - Oracle e-Business SuiteProduct Analysis Oracle iSupplier Portal - Oracle e-Business Suite
Product Analysis Oracle iSupplier Portal - Oracle e-Business Suite
 
[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...
[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...
[OWASP-TR Uygulama Güvenliği Günü 2016] Muhammet Dilmaç - Ruby on Rails Web F...
 
2013 anemo nurse - cotza il recupero di sangue intraoperatorio
2013 anemo nurse - cotza il recupero di sangue intraoperatorio2013 anemo nurse - cotza il recupero di sangue intraoperatorio
2013 anemo nurse - cotza il recupero di sangue intraoperatorio
 
IMC - Uber Technologies
IMC - Uber TechnologiesIMC - Uber Technologies
IMC - Uber Technologies
 
INNOVATE 2014, Oracle Financial Close Management: Streamline Your Close Process
INNOVATE 2014, Oracle Financial Close Management: Streamline Your Close ProcessINNOVATE 2014, Oracle Financial Close Management: Streamline Your Close Process
INNOVATE 2014, Oracle Financial Close Management: Streamline Your Close Process
 
Summary Account R12 General Ledger
Summary Account R12 General LedgerSummary Account R12 General Ledger
Summary Account R12 General Ledger
 
Aula 06 fisiologia do sistema endócrino - atualizado
Aula 06   fisiologia do sistema endócrino - atualizadoAula 06   fisiologia do sistema endócrino - atualizado
Aula 06 fisiologia do sistema endócrino - atualizado
 
Customize the login homepage For Oracle EBS R12
Customize the login homepage For Oracle EBS R12Customize the login homepage For Oracle EBS R12
Customize the login homepage For Oracle EBS R12
 
Şifreleme Teknikleri ve SSL
Şifreleme Teknikleri ve SSLŞifreleme Teknikleri ve SSL
Şifreleme Teknikleri ve SSL
 

Mehr von IEEEFINALYEARSTUDENTSPROJECTS

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologiesIEEEFINALYEARSTUDENTSPROJECTS
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologiesIEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networksIEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...IEEEFINALYEARSTUDENTSPROJECTS
 

Mehr von IEEEFINALYEARSTUDENTSPROJECTS (13)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
 

Kürzlich hochgeladen

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Kürzlich hochgeladen (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

2014 IEEE JAVA MOBILE COMPUTING PROJECT Mobility and intruder prior information improving the barrier coverage of sparse sensor networks

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks ABSTRACT: The barrier coverage problem in emerging mobile sensor networks has been an interesting research issue due to many related real-life applications. Existing solutions are mainly concerned with deciding one-time movement for individual sensors to construct as many barriers as possible, which may not be suitable when there are no sufficient sensors to form a single barrier. In this paper, we aim to achieve barrier coverage in the sensor scarcity scenario by dynamic sensor patrolling. Specifically, we design a periodic monitoring scheduling (PMS) algorithm in which each point along the barrier line is monitored periodically by mobile sensors. Based on the insight from PMS, we then propose a coordinated sensor patrolling (CSP) algorithm to further improve the barrier coverage, where each sensor’s current movement strategy is derived from the information of intruder arrivals in the past. By jointly exploiting sensor mobility and intruder arrival information, CSP is able to significantly enhance barrier coverage. We prove that the total distance that sensors move during each
  • 2. time slot in CSP is the minimum. Considering the decentralized nature of mobile sensor networks, we further introduce two distributed versions of CSP: S-DCSP and G-DCSP. We study the scenario where sensors are moving on two barriers and propose two heuristic algorithms to guide the movement of sensors. Finally, we generalize our results to work for different intruder arrival models. Through extensive simulations, we demonstrate that the proposed algorithms have desired barrier coverage performances. EXISTING SYSTEM: Existing solutions are mainly concerned with deciding one-time movement for individual sensors to construct as many barriers as possible, which may not be suitable when there are no sufficient sensors to form a single barrier. In this paper, we aim to achieve barrier coverage in the sensor scarcity scenario by dynamic sensor patrolling. Specifically, we design a periodic monitoring scheduling (PMS) algorithm in which each point along the barrier line is monitored periodically by mobile sensors. Based on the insight from PMS, we then propose a coordinated sensor patrolling (CSP) algorithm to further improve the barrier coverage, where each sensor’s current movement strategy is derived from the information of intruder arrivals in the past. Existing solutions to barrier coverage in mobile sensor networks implicitly assume the availability of sufficient sensors. They focus on how to move the available sensors one time to construct as many barriers as possible with a minimum aggregate moving distance . PROPOSED SYSTEM: We study the scenario where sensors are moving on two barriers and propose two heuristic algorithms to guide the movement of sensors. Finally,
  • 3. we generalize our results to work for different intruder arrival models. Through extensive simulations, we demonstrate that the proposed algorithms have desired barrier coverage performances. They defined the notion of k-barrier coverage, and proposed algorithms to decide whether a belt region is k-barrier covered or not after sensor deployment. They also introduced two probabilistic barrier coverage concepts: weak barrier coverage and strong barrier coverage. The minimum number of sensors required to ensure weakbarrier coverage with high probability has been derived, while the issue of strong barrier coverage is still open. Based on the insight gained from PMS, we then proposed to jointly exploit sensor mobility and intruder arrival information to improve barrier coverage. CONCLUSION: We have studied the cost-effective barrier coverage problem for the case of sensor scarcity. We first designed a periodic monitoring scheduling (PMS) algorithm. Based on the insight gained from PMS, we then proposed to jointly exploit sensor mobility and intruder arrival information to improve barrier coverage. We devised a coordinated sensor patrolling (CSP) algorithm, and demonstrated that the proposed CSP can significantly enhance the barrier coverage. We also presented two distributed versions of CSP, S-DCSP and G-DCSP, to suit the decentralized nature of WSNs. We considered 2-barriers case, where sensors can move on two different barriers, and proposed two sensor movement algorithms. In addition, we generalized CSP to work for different intruder arrival models. Our simulation results indicated that the proposed algorithms can better improve the barrier coverage performance when we know more about the intruder arrival information. Our solution thus has a great potential to reduce the application budget and provides a new cost-effective approach
  • 4. to achieve barrier coverage in large-scale mobile sensor networks. We will study the general k-barriers coverage by mobile sensor networks in the future work. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.