2017
DOI: 10.3390/s17020361
|View full text |Cite
|
Sign up to set email alerts
|

A Continuous Object Boundary Detection and Tracking Scheme for Failure-Prone Sensor Networks

Abstract: Abstract:In wireless sensor networks, detection and tracking of continuous natured objects is more challenging owing to their unique characteristics such as uneven expansion and contraction. A continuous object is usually spread over a large area, and, therefore, a substantial number of sensor nodes are needed to detect the object. Nodes communicate with each other as well as with the sink to exchange control messages and report their detection status. The sink performs computations on the received data to est… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…If the network configuration changes, then the minimum spanning tree is no longer valid. In WSNs, the network configuration is highly dynamic because the channel quality varies over time [1,14] and the nodes are prone to failures [15,16]. Thus, as time goes by, the minimum spanning tree loses its validity.…”
Section: Limitations Of the Ghs Algorithm For Wsnsmentioning
confidence: 99%
“…If the network configuration changes, then the minimum spanning tree is no longer valid. In WSNs, the network configuration is highly dynamic because the channel quality varies over time [1,14] and the nodes are prone to failures [15,16]. Thus, as time goes by, the minimum spanning tree loses its validity.…”
Section: Limitations Of the Ghs Algorithm For Wsnsmentioning
confidence: 99%
“…The boundary problem solutions are presented in [10][11][12][13][14] when target moves along the boundary region. In [10], the proposed algorithm forms dynamic clusters when target moves near to the static cluster's boundary area.…”
Section: Related Workmentioning
confidence: 99%
“…These algorithms require higher energy consumption to solve boundary problem by forming extra clusters. In [14], the authors develop an efficient failure-prone object detection algorithm that detects and recovers from binary node failures. This scheme increases the boundary estimation accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…In industrial applications like factory monitoring, sensors are deployed to monitor gas, liquid, or other kinds of dangerous objects. In this article, we concentrate on continuous object boundary detection, where traditional techniques have explored this topic [6][7][8]. As shown in Figure 1, wireless sensor networks (WSNs) serve as the foundation of IoT.…”
Section: Introductionmentioning
confidence: 99%