2009 17th Mediterranean Conference on Control and Automation 2009
DOI: 10.1109/med.2009.5164583
|View full text |Cite
|
Sign up to set email alerts
|

Detecting coverage holes in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 16 publications
0
18
0
Order By: Relevance
“…This definition is similar to the one of the Rips complexes is very similar to the one of the sensing disks. [5], [6] Figure 2. The wireless sensor network.…”
Section: Rips Complexesmentioning
confidence: 99%
“…This definition is similar to the one of the Rips complexes is very similar to the one of the sensing disks. [5], [6] Figure 2. The wireless sensor network.…”
Section: Rips Complexesmentioning
confidence: 99%
“…Authors in [2] introduce a novel idea of using the mathematical field of homology to solve coverage holes problem. In [3] two methods, divide-and-conquer strategy and triangle collapsing algorithm, are proposed to determine the location and the number of the coverage holes. The method, in [4], is also based on a divide-and-conquer method, but the computing complexity is less than [3].…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…In [3] two methods, divide-and-conquer strategy and triangle collapsing algorithm, are proposed to determine the location and the number of the coverage holes. The method, in [4], is also based on a divide-and-conquer method, but the computing complexity is less than [3]. However methods which are centralized require an overview of the entire network.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…The underlying principle of interaction between the UGV and WSAN is that the WSAN serves as a medium to guide the UGV. As in [1], for simplicity, we treat the network as an unweighted, undirected communication graph, where two nodes in the network are connected by an edge if and only if they can communicate directly. Hole boundary nodes are located on the boundary of the coverage hole.…”
Section: Introductionmentioning
confidence: 99%
“…Buchart and Yao et al [2], [3] propose centralized and distributed algorithms to identify the coverage hole boundary nodes, respectively. We consider the problem of a UGV navigation to the hole boundary nodes, which is triggered after the detection and identification of hole boundary nodes [2], [1] and which occurs before the patching of the coverage holes [3]. Since we treat the hole boundary nodes simply as target destinations for the purpose of UGV navigation, this problem can be generalized to any navigation of a UGV to a pre-determined set of target nodes within a WSAN.…”
Section: Introductionmentioning
confidence: 99%