2020
DOI: 10.1155/2020/8833767
|View full text |Cite
|
Sign up to set email alerts
|

Bodacious-Instance Coverage Mechanism for Wireless Sensor Network

Abstract: Due to unavoidable environmental factors, wireless sensor networks are facing numerous tribulations regarding network coverage. These arose due to the uncouth deployment of the sensor nodes in the wireless coverage area that ultimately degrades the performance and confines the coverage range. In order to enhance the network coverage range, an instance (node) redeployment-based Bodacious-instance Coverage Mechanism (BiCM) is proposed. The proposed mechanism creates new instance positions in the coverage area. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 34 publications
(31 reference statements)
0
21
0
Order By: Relevance
“… The Medium-Access Control (MAC) Layer has the purpose of managing medium access through OEC devices that implement different PHY layers. Thus, this layer is responsible for identifying the communicating nodes within the coverage area, which can be enhanced by using cost-effective algorithms in deployments with mobile and static nodes [ 28 ]. The Transport Layer isolates the upper layers from any changes that may occur in terms of hardware in the lower layers (since PHY and MAC layers are usually implemented directly by specific hardware).…”
Section: Design and Implementation Of The Proposed Oec Systemmentioning
confidence: 99%
See 1 more Smart Citation
“… The Medium-Access Control (MAC) Layer has the purpose of managing medium access through OEC devices that implement different PHY layers. Thus, this layer is responsible for identifying the communicating nodes within the coverage area, which can be enhanced by using cost-effective algorithms in deployments with mobile and static nodes [ 28 ]. The Transport Layer isolates the upper layers from any changes that may occur in terms of hardware in the lower layers (since PHY and MAC layers are usually implemented directly by specific hardware).…”
Section: Design and Implementation Of The Proposed Oec Systemmentioning
confidence: 99%
“…The Medium-Access Control (MAC) Layer has the purpose of managing medium access through OEC devices that implement different PHY layers. Thus, this layer is responsible for identifying the communicating nodes within the coverage area, which can be enhanced by using cost-effective algorithms in deployments with mobile and static nodes [ 28 ].…”
Section: Design and Implementation Of The Proposed Oec Systemmentioning
confidence: 99%
“…Those signals can also be detected and achieved through a wireless system (Ashraf, 2020). Bodacious-instance Coverage Mechanism (tuned BiCM) and FOA algorithm can be used to detect wireless data (Ashraf et al 2020).…”
Section: Literature Reviewmentioning
confidence: 99%
“…But in the article [12], there is no specific study on how to increase perturbation to improve the success rate of transfer attack and which part the model pays more attention to when identifying. BiCM was proposed in [13] to improve the coverage of the network. A new multilevel network structure was proposed by Wang et al [14], which uses the pyramid features of different levels to extract the general and transferable features of the perturbation.…”
Section: Introductionmentioning
confidence: 99%