English logo
Boğaziçi University Library
Digital Archive
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
English logo
Boğaziçi University Library
Digital Archive
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Onur, Ertan."

Now showing 1 - 2 of 2
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Deployment quality measures in surveillance wireless sensor networks
    (Thesis (Ph.D.)-Bogazici University. Institute for Graduate Studies in Science and Engineering, 2007., 2007.) Onur, Ertan.; Ersoy, Cem.
    Surveillance wireless sensor networks are deployed at border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of deployment can be determined sufficiently well by analysis in advance of deployment. However, when random deployment is required, determining the deployment quality becomes challenging. To assess the quality of sensor deployment, appropriate measures must be proposed. Determining the required number of sensors to be deployed initially is a critical decision. After deployment, temporal changes in the surveillance quality as the sensors die in time must be analyzed. The network lifetime definition must consider the surveillance performance of the network. In this thesis, to analyze the surveillance performance of the network, we propose deployment quality measures. We discuss the trade-off between the number of sensors and the deployment quality. We formulate the weakest breach path problem, and propose a method to determine the required number of sensors to be deployed. We propose the utilization of the watershed segmentation on the iso-sensing graph that reveals the equally sensed regions of the field of interest in a surveillance application. The watershed segmentation algorithm is applied on the iso-sensing graph to identify the possible breach paths. An algorithm is proposed to convert the watershed segmentation to an auxiliary graph which is then employed to determine the deployment quality. The surveillance quality is verified analytically. The temporal resilience of the surveillance quality is analyzed with a realistic discrete event simulator, and network lifetime definitions based on the deployment quality measures are proposed.
  • Loading...
    Thumbnail Image
    Item
    Mitigation techniques for the energy hole problem in wireless sensor networks
    (Thesis (M.S.)-Bogazici University. Institute for Graduate Studies in Science and Engineering, 2009., 2009.) Bojaxhiu, Ilir.; Ersoy, Cem.; Onur, Ertan.
    Uneven energy consumption in wireless sensor networks can drastically reduce the network lifetime. The large number of sensors reporting to a single data collection sink exposes the sensors around the sink to a higher traffic load. This causes the energy at these nodes to be consumed more rapidly which is known as the energy hole problem in wireless sensor networks. Although this problem is inherent to the network topology, several strategies can be developed to delay the hole formation and thus extend the network lifetime. In this work, we measure the performance of three different approaches used to mitigate the energy hole problem in surveillance wireless sensor networks. We evaluate the surveillance quality of the network over time for different network configurations and mitigation strategies using realistic sensor models, MAC and routing protocols in simulations.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Send Feedback