2020
DOI: 10.1016/j.measurement.2020.108167
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient target coverage for a wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…Due to the NP-hardness of the problem, a range of approximate algorithms have been proposed in the literature in order to solve it. Examples, which also include algorithms for closely related problem formulations, are a greedy heuristic [13], some memetic algorithms [14][15][16], a cuckoo search approach [17], and finally, a genetic algorithm [18].…”
Section: Graph Problems Used To Model Wsn Lifetime Maximizationmentioning
confidence: 99%
“…Due to the NP-hardness of the problem, a range of approximate algorithms have been proposed in the literature in order to solve it. Examples, which also include algorithms for closely related problem formulations, are a greedy heuristic [13], some memetic algorithms [14][15][16], a cuckoo search approach [17], and finally, a genetic algorithm [18].…”
Section: Graph Problems Used To Model Wsn Lifetime Maximizationmentioning
confidence: 99%
“…[ 22 , 23 ] investigated the search and localization problem of a stationary target with static measurement field. Research in [ 9 , 10 , 24 , 25 ] assumed a static environment with uniform event occurrence probability distribution. The work reported in [ 10 , 11 , 24 , 26 , 27 ] adopted the commonly used disk-shaped Boolean or probabilistic sensing model [ 28 ].…”
Section: Related Workmentioning
confidence: 99%
“…Although this method reduces the cost of monitoring, the measurement process is too complex. Balaji et al [ 27 ] proposed a method to maximize sensor lifetime by activating sensor covers one at a time to monitor the whole network. This method mainly depends on the effective usage of available resources.…”
Section: Introductionmentioning
confidence: 99%