THESIS METHOD THESIS METHOD THESIS METHOD

Sam Tran P. 1 2

III. THESIS METHOD

Position collection phase: – The base station sends a message to its neighbors to gather their IDs and positions, and at the same time advertise its own ID as the father ID of the neighbor nodes. – The base’s neighbor nodes, after sending its ID and position to its father the base, marks itself as recognized, and then performs the same actions as the base does by collecting IDs and positions from their neighbors, and advertising itself as the father node, and so on. – When a node gets the position and ID information from its neighbor, it forwards the information to its father. Figure 8: Position Collection phase in simulating status Sam Tran P. 1 3

III. THESIS METHOD

Processing phase: Consists of three steps: Clean up redundant nodes; Define the border nodes; Find the shortest path from each node to the base. A. Clean up redundant nodes: 1. Firstly, we build a geographic image of the network by assign color value = 1 for all points that is covered by at least one sensor node. The rest points are assigned color value = 0. 2. Initialize a list of nodes that are supposed to cover the whole network area, called Area_List. Assign Area_List = null. 3. Add the base node to the Area_List. 4. For all nodes in the area, if a node is not overlapping with any node in the Area_List, add it to the Area_List. The purpose of this step is to optimize the node distribution. 5. For each point in the network area, if the point is not covered by any node in the Area_List, add the node that contains the point to the Area_List. 6. Nodes that are not in the Area_list after the “for” loops in steps 3, 4, and 5 are redundant nodes and will be turned off. Figure 9: The results of cleaning up redundant nodes the white in middle Sam Tran P. 1 4

III. THESIS METHOD

Processing phase…. B. Define border nodes : Nodes that are positioned along the border of the network area are called border nodes. To define these nodes, firstly, apply the border detection algorithm to find out a list of points that traverse the border of the geographic image, called border points. Finally, find a minimum set of nodes in the that contain all the border points. The algorithm bellow is used to find the border of a monochrome image: • For each pixel in the image, check if the color value =1. • If true meaning this pixel belongs to the object, scan all its neighbors to see if any of them having the color value = 0. If true, this pixel belongs to the border. • Note: In this thesis, to optimize the border nodes, the image border is moved toward inside of the network area by a distance of sensing_radius2 half of the sensing radius. By doing so, the number of border nodes will decrease significantly without sacrificing any major characteristics of the network. This change may cause the accuracy of object detection to decrease a little bit, because the objects will be recognized a little bit late. The delay is acceptable though, in light of the gained benefit of reduced number of border nodes. Figure 10: An example of border node detection Sam Tran P. 1 5

III. THESIS METHOD

Dokumen yang terkait

ANALISIS FAKTOR YANGMEMPENGARUHI FERTILITAS PASANGAN USIA SUBUR DI DESA SEMBORO KECAMATAN SEMBORO KABUPATEN JEMBER TAHUN 2011

2 53 20

KONSTRUKSI MEDIA TENTANG KETERLIBATAN POLITISI PARTAI DEMOKRAT ANAS URBANINGRUM PADA KASUS KORUPSI PROYEK PEMBANGUNAN KOMPLEK OLAHRAGA DI BUKIT HAMBALANG (Analisis Wacana Koran Harian Pagi Surya edisi 9-12, 16, 18 dan 23 Februari 2013 )

64 565 20

FAKTOR – FAKTOR YANG MEMPENGARUHI PENYERAPAN TENAGA KERJA INDUSTRI PENGOLAHAN BESAR DAN MENENGAH PADA TINGKAT KABUPATEN / KOTA DI JAWA TIMUR TAHUN 2006 - 2011

1 35 26

A DISCOURSE ANALYSIS ON “SPA: REGAIN BALANCE OF YOUR INNER AND OUTER BEAUTY” IN THE JAKARTA POST ON 4 MARCH 2011

9 161 13

Pengaruh kualitas aktiva produktif dan non performing financing terhadap return on asset perbankan syariah (Studi Pada 3 Bank Umum Syariah Tahun 2011 – 2014)

6 101 0

Pengaruh pemahaman fiqh muamalat mahasiswa terhadap keputusan membeli produk fashion palsu (study pada mahasiswa angkatan 2011 & 2012 prodi muamalat fakultas syariah dan hukum UIN Syarif Hidayatullah Jakarta)

0 22 0

Perlindungan Hukum Terhadap Anak Jalanan Atas Eksploitasi Dan Tindak Kekerasan Dihubungkan Dengan Undang-Undang Nomor 39 Tahun 1999 Tentang Hak Asasi Manusia Jo Undang-Undang Nomor 23 Tahun 2002 Tentang Perlindungan Anak

1 15 79

Pendidikan Agama Islam Untuk Kelas 3 SD Kelas 3 Suyanto Suyoto 2011

4 108 178

PP 23 TAHUN 2010 TENTANG KEGIATAN USAHA

2 51 76

KOORDINASI OTORITAS JASA KEUANGAN (OJK) DENGAN LEMBAGA PENJAMIN SIMPANAN (LPS) DAN BANK INDONESIA (BI) DALAM UPAYA PENANGANAN BANK BERMASALAH BERDASARKAN UNDANG-UNDANG RI NOMOR 21 TAHUN 2011 TENTANG OTORITAS JASA KEUANGAN

3 32 52