2019 International Conference on Engineering and Emerging Technologies (ICEET) 2019
DOI: 10.1109/ceet1.2019.8711858
|View full text |Cite
|
Sign up to set email alerts
|

EADSA: Energy-Aware Distributed Sink Algorithm for Hotspot Problem in Wireless Sensor and Actor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…A number of strategies have been used, such as using two-hop neighbor information and a backward transmission mechanism to find other routing paths as well as time-based priority of nodes to handle the problem of void holes. Some other approaches use VDM-SL, as discussed in [13][14][15]. Diagonal and vertical path selection and its effects on water area when the master station is present on the surface of the sink is discussed in [16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of strategies have been used, such as using two-hop neighbor information and a backward transmission mechanism to find other routing paths as well as time-based priority of nodes to handle the problem of void holes. Some other approaches use VDM-SL, as discussed in [13][14][15]. Diagonal and vertical path selection and its effects on water area when the master station is present on the surface of the sink is discussed in [16].…”
Section: Related Workmentioning
confidence: 99%
“…A number of strategies have been used, such as using two‐hop neighbor information and a backward transmission mechanism to find other routing paths as well as time‐based priority of nodes to handle the problem of void holes. Some other approaches use VDM‐SL, as discussed in [13–15].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, in our previous work like [41][42][43][44][45] in which, we performed simulation under different traffic agents such that TCP and UDP. In addition, link failure detection between two nodes, subnet based approach and some relevant article to support our words, for this, see [46][47][48][49][50].…”
Section: F Layer Angle Based Flooding (L2-abf)mentioning
confidence: 99%