Fault Localization Using Passive End-to-End Measurements and Sequential Testing for W
#1

Abstract—Faulty components in a network need to be localized and repaired to sustain the health of the network. In this paper, we propose a novel approach that carefully combines active and passive measurements to localize faults in wireless sensor networks. More specifically, we formulate a problem of optimal sequential testing guided by end-to-end data. This problem determines an optimal testing sequence of network components based on end-to-end data in sensor networks to minimize expected testing cost. We prove that this problem is NP-hard, and propose a recursive approach to solve it. This approach leads to a polynomial-time optimal algorithm for line topologies while requiring exponential running time for general topologies. We further develop two polynomial-time heuristic schemes that are applicable to general topologies. Extensive simulation shows that our heuristic schemes only require testing a very small set of network components to localize and repair all faults in the network. Our approach is superior to using active and passive measurements in isolation. It also outperforms the state-of-the-art approaches that localize and repair all faults in a network.
projects9.com
Phone : +91-9618855666
+91-8008855666
Email : projects[at]projects9.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: end of segregation in schools, how to end anchoring of hindi poem recitation competition, calculation of skirt ot dished end joint, end to end vehicle management system pdf, 2 1elipsoidel desh end devlopment, both of thanks at end of the a seminar, how to end a anchoring of freher party,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,048 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,653 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,920 25-02-2015, 07:17 AM
Last Post: Guest
  Combination Lock with LCD and Keypad using pic16f628A: seminar surveyer 5 4,604 30-08-2014, 02:51 AM
Last Post: Guest
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,026 03-06-2013, 11:13 AM
Last Post: computer topic
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,442 17-04-2013, 11:37 PM
Last Post: [email protected]
  application projects in java and vb.net (titles and topics) project topics 1 5,470 28-11-2012, 01:11 PM
Last Post: seminar details
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,169 24-10-2012, 01:09 PM
Last Post: seminar details
  Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobi Projects9 1 1,721 10-10-2012, 12:22 PM
Last Post: seminar details
  Student Project Allocation and Management with Online Testing System computer science technology 5 6,015 24-02-2012, 02:42 PM
Last Post: ngoclong3i

Forum Jump: