2019
DOI: 10.1007/s11042-019-7316-y
|View full text |Cite
|
Sign up to set email alerts
|

Scheduling algorithms for K-barrier coverage to improve transmission efficiency in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…There are some solutions for barrier coverage problem based on the classical theories: based on the divide and conquer theory, Wen et al [15] proposed an efficient algorithm to construct k-barrier; based on the Dijkstra algorithm, Liu et al [16] realized the minimum full-view coverage for mobile CSNs. And there are some algorithms for meeting special requirements in barrier coverage problem: the sensor interference issue was solved in the algorithm for k-barrier coverage in [17]; the one-way k -barrier algorithm was proposed in [18] to avoid one-way 2…”
Section: Related Workmentioning
confidence: 99%
“…There are some solutions for barrier coverage problem based on the classical theories: based on the divide and conquer theory, Wen et al [15] proposed an efficient algorithm to construct k-barrier; based on the Dijkstra algorithm, Liu et al [16] realized the minimum full-view coverage for mobile CSNs. And there are some algorithms for meeting special requirements in barrier coverage problem: the sensor interference issue was solved in the algorithm for k-barrier coverage in [17]; the one-way k -barrier algorithm was proposed in [18] to avoid one-way 2…”
Section: Related Workmentioning
confidence: 99%
“…This limitation is addressed using the benefit function with an adjustable sensing range to improve the overall energy conservation significantly. The non-critical redundant nodes are identified using 3D Voronoi diagram in [151] and using 2D Voronoi diagram in [152]. The sensor nodes that lie in small Voronoi cells are considered noncritical for guaranteeing coverage and hence are put to "sleep" state in both the approaches above.…”
Section: Figure 18 State Diagram Of Obsp Protocolmentioning
confidence: 99%
“…The computational complexity of this approach increases as the size of the network increases. In [187], [190], the network is converted to an undirected graph, and then a This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.…”
Section: ) the Graph-based Approachesmentioning
confidence: 99%