2015
DOI: 10.1007/978-3-319-19419-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Data Suppression Algorithms for Surveillance Applications of Wireless Sensor and Actor Networks

Abstract: This paper introduces algorithms for surveillance applications of wireless sensor and actor networks (WSANs) that reduce communication cost by suppressing unnecessary data transfers. The objective of the considered WSAN system is to capture and eliminate distributed targets in the shortest possible time. Computational experiments were performed to evaluate effectiveness of the proposed algorithms. The experimental results show that a considerable reduction of the communication costs together with a performance… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…26,27 Systematic use of data suppression algorithms would reduce the number of uninformative, and hence unnecessary, data transfers. 28 Any personal identifying information must be stored and transmitted in an encrypted form that can be accessed only by a public health officer for investigation purposes. The categories of information used by the system should be available for public scrutiny.…”
Section: Velsko and Batesmentioning
confidence: 99%
“…26,27 Systematic use of data suppression algorithms would reduce the number of uninformative, and hence unnecessary, data transfers. 28 Any personal identifying information must be stored and transmitted in an encrypted form that can be accessed only by a public health officer for investigation purposes. The categories of information used by the system should be available for public scrutiny.…”
Section: Velsko and Batesmentioning
confidence: 99%
“…According to another popular method, actors walk randomly in the monitored area until they receive target reports from sensor nodes [14]. In [15] default locations of actors were determined to ensure that the communication ranges of the available actors cover the entire monitored area. The default locations are arranged in a square grid.…”
Section: Control Of Actors' Mobilitymentioning
confidence: 99%
“…The last four algorithms in Table 3 utilize state-of-the-art approaches for actor deployment. According to the uniform deployment approach [15], a default initial location is determined for each actor to create an ideal square grid topology, which ensures full coverage of the monitored area. In this scheme, an actor which does not have information about target locations always moves toward its default location.…”
Section: Compared Algorithmsmentioning
confidence: 99%