474 Hits in 6.4 sec

Mesh-Based Coverage for Wireless Sensor Networks

Jiong Wang, Sirisha Medidi
2008 IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference  
The simulation results confirm that our mesh-based coverage technique reduces sensing energy consumption and maintains a sound coverage ratio for reliable surveillance.  ...  Our technique dynamically schedules a set of active sensors based on a square mesh or an equilateral-triangular mesh.  ...  The request informs those adjacent cluster heads to select active sensors based on the initiator's local virtual mesh.  ... 
doi:10.1109/glocom.2008.ecp.77 dblp:conf/globecom/WangM08 fatcat:ap5di23nj5g5vdt3ixfj6zptnq

Sensors Networks - Localization and Topology

Marios Sfendourakis, Rajagopal Nilavalan, Emmanuel Antonidakis
2016 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)  
Another type of localization is also commented which is the localization in Telemetry. In addition, issues of network coverage and topology are analyzed.  ...  Network hole problems are also examined as they are of high importance when a network has to perform accurately and with a minor number of areas that are problematic or may degrade it's performance.  ...  using Voronoi diagrams based on the Approximate Point-In-Triangulation test (APIT) algorithm.  ... 
doi:10.1109/mcsi.2016.036 fatcat:ro7ghwuqw5cc7pgtsjnyihupsq

The holes problem in wireless sensor networks

Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
2005 ACM SIGMOBILE Mobile Computing and Communications Review  
Different kinds of holes can form in such networks creating geographically correlated problem areas such as coverage holes, routing holes, jamming holes, sink/black holes and worm holes, etc.  ...  We present state-of-the-art in research for addressing the holes related problems in wireless sensor networks and discuss the relative strengths and short-comings of the proposed solutions for combating  ...  The static sensors detect their local coverage holes by using Voronoi diagrams as in [13] .  ... 
doi:10.1145/1072989.1072992 fatcat:xz5uitjoengflewxacsvmsc6he

EDTD-SC: An IoT Sensor Deployment Strategy for Smart Cities

Ibtihal Alablani, Mohammed Alenazi
2020 Sensors  
A smart city is a geographical area that uses modern technologies to facilitate the lives of its residents. Wireless sensor networks (WSNs) are important components of smart cities.  ...  This study introduces a novel deployment algorithm, called the Evaluated Delaunay Triangulation-based Deployment for Smart Cities (EDTD-SC), which targets not only sensor distribution, but also sink placement  ...  Acknowledgments: The authors thank the Deanship of Scientific Research and RSSU at King Saud University for their technical support.  ... 
doi:10.3390/s20247191 pmid:33333935 pmcid:PMC7765373 fatcat:um57rclvnzhyldzncccr6gw3se


Putri Kevin, Department of Computer Science, Brahijaya University,Indonesia
2021 International Journal of Advanced Research in Computer Science  
Six approaches are identified; they use a particular theory to shift the node from the original position to the target position.  ...  Based on the sensors' location, the Voronoi network diagram is built, and the decision whether the sensors need to be repositioned or Stay would be made based on the diagram.  ...  Local hole coverage: Each node determines its coverage hole size and attempts to repair it [12] .  ... 
doi:10.26483/ijarcs.v12i1.6686 fatcat:xrs4hdfgobcjngwvmhgjdzqdg4

Coverage Hole Detection Algorithm for WSN

Venkatesh Venkatesh, Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India, Shruti Tavaragundi
2019 Journal of Communications  
A communication resto-ration algorithm is used for avoiding void region problem.  ...  Sensor coverage reflects the quality of measurement on the real-time application. In this paper, we derive optimal conditions for connectivity and coverage in WSNs.  ...  To discover the localized coverage holes, Delaunay triangulation's and Voronoi diagram based computational geometry approaches are used [9] .  ... 
doi:10.12720/jcm.14.9.853-858 fatcat:ppqtn2o3wffrdc6dlwtwb2ex3e

A Nodes Deployment Algorithm in Wireless Sensor Network Based on Distribution

Song Yuli, Zhang Hongdong
2014 Sensors & Transducers  
In this paper, we propose a wireless sensor network node deployment algorithm base on distribution in order to form an efficient wireless sensor network.  ...  Wireless sensor network coverage is a basic problem of wireless sensor network.  ...  For example: covering the application of the method used the Voronoi diagram proposed by Anthony et al for determining, using the concept of order k Voronoi diagram to test network coverage.  ... 
doaj:23bafd092f104850ba9a9307268e34dd fatcat:iji343tuszfhjpi5jdmz56djk4

Target Detection Coverage Algorithm Based on 3D-Voronoi Partition for Three-Dimensional Wireless Sensor Networks

Xiaochao Dang, Chenguang Shao, Zhanjun Hao
2019 Mobile Information Systems  
The detection of target events is an important research area in the field of wireless sensor networks (WSNs).  ...  Hence, with the objective of addressing the target event coverage problem of WSNs in 3D space applications, this paper proposes a target detection coverage algorithm based on 3D-Voronoi partitioning for  ...  a Voronoi diagram and a centroid, namely, Centroid (i.e., based on centroid scheme) and Dual-Centroid (i.e., based on dual-centroid scheme), to improve the speed and efficiency of node coverage holes.  ... 
doi:10.1155/2019/7542324 fatcat:v6etylw3lrdc3fuhzx2iodzou4

Coverage Control for Mobile Sensing Networks

J. Cortes, S. Martinez, T. Karatas, F. Bullo
2004 IEEE Transactions on Robotics and Automation  
The algorithms exploit the computational geometry of spatial structures such as Voronoi diagrams.  ...  This paper presents control and coordination algorithms for networks of autonomous vehicles.  ...  The algorithm is based on basic properties of Voronoi diagrams; e.g., see [1] .  ... 
doi:10.1109/tra.2004.824698 fatcat:6fvqk2pddbg43ldpq6prmtc45i

North Atlantic Inflight Internet Connectivity via Airborne Mesh Networking

Daniel Medina, Felix Hoffmann, Francesco Rossetto, Carl-Herbert Rokitansky
2011 2011 IEEE Vehicular Technology Conference (VTC Fall)  
When forwarding packets for a given destination, a node considers not one but a set of next hop candidates, and spreads traffic among them based on queue dynamics.  ...  The Airborne Internet is a vision of a large scale multihop wireless mesh network consisting of commercial passenger aircraft connected via long range highly directional air-to-air radio links.  ...  This paper is framed around the vision of the Airborne Internet [1] [2] , a new paradigm for inflight connectivity based on the concept of mesh networking [3] .  ... 
doi:10.1109/vetecf.2011.6092878 dblp:conf/vtc/MedinaHRR11 fatcat:ojftlr2sirasbcr7i45df3d7na

Distributed deployment algorithm based on boundary expansion and virtual force for mobile sensor networks

Nan Guofang, Chen Zhongnan, Li Minqiang, Huang Liang, Abraham Ajith
2014 Neural Network World  
Vectorbased algorithm (VEC) and Voronoi-based algorithm (VOR) are two existing approaches. However, VEC is sensitive to initial deployment, while VOR always moves to the coverage holes.  ...  For a node, only the location of its nearby nodes and boundary information are needed in the algorithm, thereby avoiding communication cost for transmitting global information.  ...  For the desired sensor network architecture based on the Voronoi diagram, we make the following assumptions: (1) All the nodes can communicate with their neighbors to achieve connectivity for the whole  ... 
doi:10.14311/nnw.2014.24.018 fatcat:mx67z36wh5fgplfy4ljtpp75em

Analysis of Different Coverage and Connectivity Techniques

2019 International journal of recent technology and engineering  
The fundamental issues in wireless sensor network having great impact on WSN are coverage and connectivity.  ...  The paper describes the important issues of wireless sensor network, classification of coverage problem.  ...  Hexagonal Mesh Fig. 26 . 26 An example of 1-covered, 2-covered and 3-covered Fig. 27. Voronoi diagram D.  ... 
doi:10.35940/ijrte.b1298.0782s319 fatcat:qi4nwxmnxza3lnhrrn5mbipsma

Dynamic Coverage Problems in Sensor Networks [chapter]

Hristo Djidjev, Miodrag Potkonjak
2012 Intelligent Sensor Networks  
One of the fundamental issues in sensor networks is related to analyzing the coverage, or how well a network of sensors monitors the physical space for an intrusion.  ...  DYNAMIC COVERAGE PROBLEMS IN SENSOR NETWORKS their efficiencies and accuracies, to be analyzed by theoretical means that would yield worst-case guarantees, rather than using empirical methods.  ...  It is easily accomplished using the notion of a Voronoi diagram. A Voronoi diagram is a tessellation of the space using piecewise linear connected components.  ... 
doi:10.1201/b14300-25 fatcat:hflb6fafw5gszntsf424gc374i

A Comprehensive Review of Sensor Relocation

Wei Shi, Jean-Pierre Corriveau
2010 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing  
/Area Partition Methods: 1) Voronoi diagram based: [11] , [13] ; 2) Grid-based: the network field is partitioned into a 2 − D grid; 3) Zone-based: a variant of the quorum-based location service [7]  ...  In the dynamic algorithm, the sensor area is dynamically divided in to Voronoi graphs based on the robots' current locations.  ... 
doi:10.1109/greencom-cpscom.2010.42 dblp:conf/greencom/ShiC10 fatcat:xa2lkxkzsrfsjj7izhmeidhwhu

Optimal dynamic actuator location in distributed feedback control of a diffusion process

Yangquan Chen, Zhongmin Wang, Jinsong Liang
2007 International Journal of Sensor Networks (IJSNet)  
We attempt to solve the optimal actuator location problem by using Centroidal Voronoi Tessellations.  ...  A new simulation platform (Diff-MAS2D) for measurement scheduling and controls in distributed parameter systems is also introduced in this paper.  ...  Acknowledgement The authors would like to acknowledge the useful remarks from all three anonymous reviewers.  ... 
doi:10.1504/ijsnet.2007.013197 fatcat:idpmhfakszgoray2oz2dg2z74y
« Previous Showing results 1 — 15 out of 474 results