Proceedings of the 11th ACM International Conference on Underwater Networks &Amp; Systems - WUWNet '16 2016
DOI: 10.1145/2999504.3001084
|View full text |Cite
|
Sign up to set email alerts
|

Coverage control study of mobile uwasns nodes based on particle swarm optimization algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Maximum connectivity and coverage (MCC) self‐deployment algorithm based on ACO (MCC‐ACO) was developed to achieve energy efficient coverage of target events. PSO algorithm for mobile UASN‐based deployment was developed by Chaoping Dong et al 22 This algorithm aims to solve the continuous variable optimization problem in UASN. Sangeeta Kumari and Govind P. Gupta 23 proposed a Cuckoo Search Optimization (CSO) based placement strategy in UASN.…”
Section: Related Workmentioning
confidence: 99%
“…Maximum connectivity and coverage (MCC) self‐deployment algorithm based on ACO (MCC‐ACO) was developed to achieve energy efficient coverage of target events. PSO algorithm for mobile UASN‐based deployment was developed by Chaoping Dong et al 22 This algorithm aims to solve the continuous variable optimization problem in UASN. Sangeeta Kumari and Govind P. Gupta 23 proposed a Cuckoo Search Optimization (CSO) based placement strategy in UASN.…”
Section: Related Workmentioning
confidence: 99%
“…The technology to improve connectivity and reliability of sensor networks is a hot topic nowadays. There are several kinds of methods aiming to improve connectivity and reliability to meet the requirement of applications, such as the algorithms for the routing layer and MAC layer [ 12 , 13 , 14 , 15 , 16 ], the nodes complement about dynamic nodes and static nodes [ 17 , 18 , 19 ] and so on. In this section, we provide a review on research works on this topic.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Ref. [ 19 ] makes use of the virtual force algorithm to make the nodes cover the network connection holes. The algorithm can reduce the node redundancy, but requires a higher computational capability and self-mobility capability and the driving force of node movement also generates a large energy expenditure.…”
Section: Related Workmentioning
confidence: 99%