2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) 2016
DOI: 10.1109/aina.2016.59
|View full text |Cite
|
Sign up to set email alerts
|

Void Avoidance Scheme for Real-Time Data Dissemination in Irregular Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Besides, the source node knows the position of the destination node. This assumption is legitimate in geographic routing [ 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 ]. To determine the next node, the current node only needs to look up in its neighbor table and find the one with the smallest distance to the destination.…”
Section: Fuzzy Q-charging Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides, the source node knows the position of the destination node. This assumption is legitimate in geographic routing [ 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 ]. To determine the next node, the current node only needs to look up in its neighbor table and find the one with the smallest distance to the destination.…”
Section: Fuzzy Q-charging Algorithmmentioning
confidence: 99%
“…This assumption is legitimate in geographic routing [34][35][36][37][38][39][40][41][42]. To determine the next node, the current node only needs to look up in its neighbor table and find the one with the smallest distance to the destination.…”
mentioning
confidence: 99%
“…The main idea is to create a forbidden area around every hole from which all the packets are kept to stay away from. Typically, forbidden area is a static region covering the hole and with simple shapes such as circle [29,30], ellipse [31], hexagon [32], convex hull [33,34] In [29], Yu et al, proposed a routing scheme wherein the forbidden area is a circle covering the hole. First, the nodes on the boundary of the holes are identified using Boundhole algorithm [24] and a virtual circle that exactly covers the hole is formed.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, to bypass the problems, the common idea is forming a forbidden area around each hole. As a result, there have been proposed forbidden areas with certain shapes such as circle [29,30], ellipse [31], hexagon [32]. Although the simplicity of shaped regions can reduce the control overhead, a significant enlargement on the routing path may occur.…”
Section: Introductionmentioning
confidence: 99%
“…When a node wants to send a packet, it exploits the aware information to create a routing path that avoids all the holes [12], [13]. In [14]- [19], the authors proposed a variation of hole-awareness by introducing a forbidden area for routing packets around every hole, which is a static region with a simple shape such as circle [14], [15], ellipse [16], hexagon [17], or convex hull [18], [19]. The forbidden area information is then disseminated to nodes to establish hole awareness.…”
mentioning
confidence: 99%