2021
DOI: 10.1007/s11277-021-08518-9
|View full text |Cite
|
Sign up to set email alerts
|

Void Hole Avoidance Based on Sink Mobility and Adaptive Two Hop Vector-Based Forwarding in Underwater Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…(1) selection (yes), (2) next stage (routing), and (3) rejection state. The process is depicted in the following figure (2).…”
Section: Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…(1) selection (yes), (2) next stage (routing), and (3) rejection state. The process is depicted in the following figure (2).…”
Section: Proposed Systemmentioning
confidence: 99%
“…UWSNs are essential for exploring and investigating underwater environments. UWSNs can provide useful information from an area, which is more than 70.00 percent of the Earth's surface covered by water [1,2]. The UWSN is composed of a large number of Autonomous Underwater Vehicles (AUVs) that are used to collect data from deployed sensor nodes [3].…”
Section: Introductionmentioning
confidence: 99%
“…Also taken into consideration and proposed for WSN are three distinct scenarios with the numbers WSN-(1), WSN-( 2), and WSN- (3). There are now different sensor node ranges and numbers for each WSN; for example, WSN-(1) had 100 sensor nodes, WSN-(2) had 100 (hundred) sensor nodes, and WSN-(3) had the same amount of sensor nodes as WSN-(1) and WSN- (2). The amount of CH selections varies between these scenarios, which is the fundamental distinction.…”
Section: The Proposed Modelmentioning
confidence: 99%
“…The delay consists of the transmission delay, the propagation delay of the signal, the processing delay of the data, and the queuing delay in the entire network. From sender to destination, when a signal travels and carries data, which undergoes these mentioned delays, is counted as the end-to-end delay of the network [8,23].…”
Section: End To End Delaymentioning
confidence: 99%