Beruflich Dokumente
Kultur Dokumente
VOL. 19,
NO. 8,
AUGUST 2007
1145
INTRODUCTION
1146
NETWORK MODEL
AND
RELATED WORK
VOL. 19,
NO. 8,
AUGUST 2007
1147
n
1X
di
n i1
s
n
1 X
^
di ^2 :
n 1 i1
^
3.1
y1
d1 ^
di ^
dn ^
; ; yi
; ; yn
:
^
^
^
1
i
i
i
fx1 ; x2 ; ; xk g.
1148
3.2 Algorithm
Let C1 denote the set of sensors with jyi j . The set C1 is
viewed as a set of sensors that are claimed as outliers by the
above procedure. The procedure in Section 3.1 can be
summarized into the following algorithm:
Algorithm 1
1.
2.
3.
4.
VOL. 19,
NO. 8,
AUGUST 2007
Fig. 2. Event E is the union of line l and the portion on the left-hand side
of l. Si is a sensor located on BE, and S1 is a sensor inside N Si .
Both N Si and N S1 are closed disks.
1149
Fig. 5. Illustration of C1 , C2 , and C3 . Data in (a) are obtained from one run
of the experiment, leading to panels in the third row of Fig. 12. The
interior of the ellipse is the event region. A sensor becomes outlying,
with probability p 0:2. A represents a sensor and a represents an
outlying sensor. A represents a node in (b) C1 , (c) C2 , and (d) C3 ,
respectively.
1.
1150
VOL. 19,
NO. 8,
AUGUST 2007
Fig. 6. The event boundary intersects the disk DSi ; R in two sectors: i
and iii. A and B are two intersection points between the event boundary
and the boundary of the disk. r is the distance from sensor Si to the
event boundary.
Fig. 7. The event boundary intersects the disk DSi ; R in three sectors:
i, ii, and iii. A and B are two intersection points between the event
boundary and the boundary of the disk. r is the distance from sensor Si
to the event boundary.
sensors, and the false alarm rate eC1 , defined to be the ratio
of the number of normal sensors that are claimed as
outlying to the total number of normal sensors. Let O
denote the set of outliers in the field, then
2.
3.
PERFORMANCE EVALUATION
5.1 Evaluation of C1
To evaluate the performance of C1 , we compute the detection
accuracy aC1 , defined to be the ratio of the number of
outlying sensors detected to the total number of outlying
aC1
jC1 \ Oj
;
jOj
eC1
jC1 Oj
:
N jOj
R2
1
! R2 sin !;
2
2
where ! 2 0;
is the value of ASi B. Consequently, the
area of the other part is given as follows:
R2 4
A1 :
A2
3
2
So that di from N N Si becomes extreme, we require
A1 A2 , which implies that
1151
2
R
1
R2 4
:
! R2 sin !
2
3
2
2
2
Simplification leads to ! 2
3 sin!. We see that ! 3 ,
since sin ! 0. Then,
!
1 2
R
:
r R cos R cos
2
2 3
2
5.3 Evaluation of C3
Here, we first describe a quantity to judge how well C3 can
be used to fit the boundary. Then, we present a quantity to
examine how many sensors that are far away are
included in C3 . We begin with the following definition:
Definition. For a positive number r, let BAE; r denote the set
of all points in R2 such that the distance of each point to the
boundary BE is at most r. The degree of fitting of C3 is
defined as
jBAE; r \ C3 j
aC3 ; r
:
jBAE; r \ Sj
jAE; R \ C3 j
:
jAE; R \ Sj
SIMULATION
1152
VOL. 19,
NO. 8,
AUGUST 2007
TABLE 1
Relationship between 1 and p When ys Are Identical
Independent Distribution (i.i.d.) from N0; 1
TABLE 2
False Alarm Rates and Detection Accuracies Associated with
the Points Indicated on the ROC Curves in Fig. 9
1153
TABLE 4
Optimal Threshold Values Derived from Table 3
1154
VOL. 19,
NO. 8,
AUGUST 2007
Fig. 11. False alarm rate versus sensor outlying probability p for different
density values.
CONCLUSIONS
AND
FUTURE WORK
1155
Fig. 12. Performance of the event boundary detection algorithm under different values of sensor outlying probability p and network density. The first,
second, third, fourth, and fifth rows have a density equal to 10, 20, 30, 40, and 50, respectively.
1156
ACKNOWLEDGMENTS
This work was supported in part by the US National Science
Foundation under NSF Grant ACI-0305567 and in part by
NSF CAREER Award CNS-0347674.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
VOL. 19,
NO. 8,
AUGUST 2007
1157