SlideShare a Scribd company logo
1 of 8
Download to read offline
Int. J. on Recent Trends in Engineering and Technology, Vol. 10, No. 1, Jan 2014

Computational Geometry based Remote Networking
Sharifa Rania Mahmud, Marzia Sultana, Nazia Majadi, Lazima Ansari
Department of Computer Science and Engineering,
Military Institute of Science and Technology, Dhaka, Bangladesh
Email:{sraniamahmud, mrzsultana, nazia.majadi, lazima.22}@gmail.com
Abstract— In recent years wireless sensor networks (WSNs) have become one of the most
active research areas due to the bright and interesting future promised to the world of
information technology. It is an emerging field which is accomplishing much importance
because of its vast contribution in varieties of applications. Coverage is one of the important
aspects of WSNs and many approaches are introduced to maximize it. It is the key research
issue in WSN as it can be considered as the measure of the Quality of Service (QoS) of
sensing function for a sensor network. The goal of coverage is to have each location in the
physical space of interest within the sensing range of at least one sensor. By combining
computational geometry and graph theoretic techniques, specifically the Voronoi Diagram
(VD), Delaunay Triangulation (DT) and Graph Search algorithms, can solve the problem.
This paper defines some recent research approaches on coverage of WSNs using VD and
DT. Also shows how they are being utilized in various research works.
Index Terms— Coverage, Wireless Sensors Networks (WSNs), Voronoi Diagram (VD),
Delaunay Triangulation (DT).

I. INTRODUCTION
In recent years there has been increasing interest in the field of WSNs. A WSN consists of a number of
wireless sensor nodes. These nodes are characterized by being very small in size with limited energy usually
supplied by a battery. These tiny sensor nodes, which consist of sensing, data processing, and communicating
components, leverage the idea of sensor networks. Sensor networks represent a significant improvement over
traditional sensors [4]. Sensor nodes can be placed on predetermined positions or randomly deployed. These
networks are typically used to monitor a field of interest to detect movement, temperature changes,
precipitation, etc. and very useful for military, environmental, and scientific applications. One of the most
active research fields in WSNs is that of coverage. The coverage problem has been studied extensively,
especially when combined with connectivity and energy efficiency. Constructing a connected fully covered,
and energy efficient sensor network is valuable for real world applications due to the limited resources of
sensor nodes. Coverage reflects how well the deployed sensor nodes can monitor a set of targets in
surveillance area. The coverage problem is essentially a Quality of Service (QoS) problem which guarantees
the monitored area is covered by one or more sensor nodes. VD is a fundamental algorithm for resolving the
coverage problems of WSNs. It is a set of discrete sites (points) partitions the plane into a set of convex
polygons such that all points inside a polygon are closest to only one site. This construction effectively
produces polygons with edges that are equidistant from neighboring sites. The VD allows sensors to
distribute the sensing task by partitioning the space in a meaningful way. Coverage can be measured in
different ways depending on the application. This paper shows that the coverage problem [1, 2, 3] and some
of its variants can be treated in a unified manner using suitable generalizations of the VD and DT.
DOI: 01.IJRTET.10.1.1344
© Association of Computer Electronics and Electrical Engineers, 2014
II. PRELIMINARIES
A sensor network is consisting of a large number of sensor nodes and the position of sensor nodes need not
be engineered or predetermined. Sensor network protocols and algorithms must possess self-organizing
capabilities because the node lifetime depends on battery lifetime. This also means that. Instead of sending
the raw data to the nodes responsible for the fusion, they use their processing abilities to locally carry out
simple computations and transmit only the required and partially processed data.
Coverage is usually interpreted as how well a sensor network will monitor a field of interest. There are
various coverage problems including area coverage, k-coverage, m-connected k-coverage problems etc [5].
An area coverage problem is to find a minimum number of sensors to work such that each physical point in
the area is monitored by at least a working sensor. If each position in the area is monitored by at least k (k
1) active sensors, the sensor network is said to be a k coverage sensor network where k is the coverage
degree. The communication graph of a given set of sensors M is m-connected if for any two vertices in M,
there are m vertex-disjoint paths between the two vertices. An m-connected k-coverage problem is to find a
minimum number of sensors to work such that each physical point in the area is monitored by at least k active
sensors and the active sensors form an m-connected graph.
The VD allows sensors to distribute the sensing task by partitioning the space in a meaningful way. The
voronoi cell of a sensor s is the subset of the plane in which all points are closer to s than to any other
sensors. Let P={p1 , p2, . . ., pn} be a set of n distinct points in the Euclidian plane. This are called the sites.
The voronoi diagram of P is the subdivision of the plane into n cells, one for each site. Therefore partition the
plane by assigning every point in the plane to its nearest site. All those points assigned to pi form the voronoi
region or voronoi cell V (pi ). A point q lies in the cell corresponding to a site pi P iff Euclidean_Distance
(q, pi) < Euclidean_Distance ( q, pj), for each pi P, j i. Note that we have defined this set to be closed.
Some points do not have a unique nearest site, nearest neighbor. The set of all points that have more than one
nearest neighbor form the VD, V (P) [6]. In Fig. 1 pi is the site points, V (pi) is a voronoi cell, q is a free
point, e is voronoi edge and v is a voronoi edge.

Figure 1.Voronoi Diagram V (P) of n= 9 sites

In 1934 Delaunay proved that when the dual graphs is drawn with straight lines, it produces a planar
triangulation of the Voronoi sites P (if no four sites are co-circular), now called Delaunay Triangulation D
(P) [6]. Straight line dual of a VD is Delaunay Triangulation (DT). DT can be used to find the two closest
sites by considering the shortest edge in the triangulation. The DT can be obtained by connecting the sites in
the Voronoi diagram whose polygons share a common edge. Fig. 2 (a) shows the DT for the VD in Fig. 1,
and Fig. 2(b) shows the DT superimposed on the corresponding VD.
III. S OME EXISTING RESEARCH ON COVERAGE PROBLEM IN WSNs USING VORONOI DIAGRAM
This paper defines some research approaches on coverage of wireless sensor networks using voronoi diagram
and present in some detail the algorithms, assumptions, and results. This paper defines several terms and
concepts and then shows how they are being utilized in various research works.

68
(a)

(b)

Figure 2. (a) Delaunay triangulation D (P) for the sites in Fig. 1. (b) Delaunay triangulation and Voronoi diagram: Fig 1 and Fig. 2(a)

A. Worst and Best-case Coverage in Sensor Networks
S. Megerian, F. Koushanfar and M. Potkonjak [1] briefly discussed worst and best-case coverage in sensor
networks. By combining computational geometry and graph theoretic techniques, specifically the VD and
graph search algorithms, authors established the main highlight of the paper—an optimal polynomial time
worst and average case algorithm for coverage calculation for homogeneous isotropic sensors. The DT used
to find the two closest sites by considering the shortest edge in the triangulation. They also presented several
experimental results and analyze potential applications, such as using best and worst-case coverage
information as heuristics to deploy sensors to improve coverage.
Worst-Case Coverage and Maximal Breach Path: A target is Breach if it is not monitored by any sensor. In
worst-case coverage problem Breach is defined as the minimum Euclidean distance from a path to any sensor
in a group of sensors. The problem is to identify a Maximal Breach Path in an area, connecting the areas
initial point and final point. Outline of algorithm for finding Maximal Breach Path is as follows:
1.
Generate VD for given sensors.
2.
Apply graph theoretic abstraction by transforming VD to a weighted graph.
3.
Find Maximal Breach Path using binary-search and breadth-first search.
The Maximal Breach Path is not unique. If new sensors can be deployed or existing sensors moved such that
this breach_weight is decreased, then the worst-case coverage is improved.
Best-Case Coverage and Maximal Support Path: In best-case coverage problem support is defined as the
maximum Euclidean distance from path P to the closest sensor in S. The problem is to identify a Maximal
Support Path, PS, in area A, connecting the areas I and F shows in Fig. 3. Outline of algorithm for finding PS
is as follows:
1. The Voronoi diagram is replaced by the Delaunay triangulation.
2. Each edge in graph G is assigned a weight equal to the largest distance from the corresponding line
segment in the Delaunay triangulation to the closest sensor.
3. The search parameter breach_weight is replaced by the new parameter support_weight and the
search is conducted in such a way that support_weight is minimized.

Figure 3.Sensor field with Delaunay triangulation and a Maximal Support Path (PS)

69
The maximal support path may also not be unique. If additional sensors can be deployed or existing sensors
moved such that support_weight is decreased, then the best-case coverage is improved.
After each additional sensor deployment, the algorithm was repeated to find the new breach region. Over 100
random deployments, breach coverage improved by about 10 percent by deploying just one more sensors.
Similarly, the support_weight and the midpoint of the corresponding edge in the Delaunay triangulation used
as a heuristic for deploying additional sensors to improve support coverage. On average, a 50 percent
improvement achieved in support coverage by adding one additional sensor when five nodes have already
been randomly deployed.
B. Maximal Breach in Wireless Sensor Networks
A. Duttagupta, A. Bishnu and I. Sengupta proved [2] the lower bound results for maximal breach through its
geometric characterization. In 2006 [7] the authors measure the Maximal Breach Path. They also formulate
the sensor-network design problem as a geometric optimization problem. They have improved polynomial
time algorithms for computing the aforesaid measure for a given sensor network. The resulting breach is the
best that can keep the topology of the starting configuration intact. But later in 2008 [2], the authors have
defined a new measure called average maximal breach and design an optimal algorithm for it. They have also
showed that a relaxed optimization problem for the proposed measure is NP-Hard.
C. Blocking Vulnerable Paths of Wireless Sensor Networks
S. Zhou, M. Wu, W. Shu [3] presented the vulnerable paths that rational targets would like to take and block
these paths to enhance the network detection performance. The authors focused on reducing the path-based
vulnerability to get as much information as possible for any target moving out of the surveillance area. They
studied intelligent targets that have the knowledge of existing sensor distribution.
The vulnerability is a measurement of the unawareness of the sensor network when a target is sneaking along
some path. A rational target attempts to find a path that is far away from sensors as much as possible which is
called the Most Vulnerable Path (MVP). Voronoi Diagram (VD) and Dijkstra’s shortest path algorithm are
used as tools to find this path and calculate it vulnerability. The goal of this anti rational target research is to
block the most vulnerable paths. They define the problem as:
Given a randomly deployed sensor network,
1. Find the most vulnerable paths that a rational mobile target would take to sneak out of the
surveillance area.
2. Find the best locations to place additional sensors, subject to minimize the network vulnerability.
Blocking the Vulnerable Paths depends on the MVP. A specific point needs to be identified as the location of
a new sensor called blocking point (BP).The authors proposed four BP selection algorithms, based on two
factors. As the Point-based approach, selecting extremes intensity points as BP allows to emphasize on some
special areas. Edge-based BP selection first selects a particular edge, and then deploys a new sensor at the
center of this edge.
Combine these two factors together, the Four BP selection algorithms are:
1. Best Blocking Effort (BBE): The algorithm select x with maximum Ic(x) in as BP. It is an extreme
approach focusing on local maximum.
2. Maximum Side Effect (MSE): On the contrary to BBE, BP is the point x with minimum Ic(x). It is a
method that focuses on the global performance.
3. Center of Maximum Exposure Edge (CXE): Among all edges in the MVP, CXE selects the center of
exy with maximum exposure Rxy in as BP. Similar to BBE, CXE is also block a path by jam the most
exposed edge.
4.
Center of Minimum Exposure Edge (CIE): On the contrary to CXE, CIE selects the center of edge
exy withminimum exposure Rxy as BP. Putting an additional sensor there can potentially block
multiple MVP.
Fig. 4.demonstrates these four approaches, where the plus sign, solid line and bold line represent the existing
sensors, original VD edges and original MVP, respectively.
The simulation results have showed a sample distribution of sensors in escaping case, after 10 new sensors
are added. BBE putted most new sensors on one direction of the escaping path, and blocked that path
thoroughly. CXE is similar to BBE. MSE’s performance is much better, where all new sensors are placed in
sparse areas. CIE performed closely to MSE. In the sample of sensor distribution in crossing case, the result
was similar to that of escaping case.

70
Figure 4.Demonstration of BP selection algorithm

In this work, MSE has the best performance in both cases. It takes care of both current and potential MVP,
and deploys sensors on the most needed spots. Minimum extremum based approaches outperform maximum
extremum based approaches. The authors have [3] also compared the performance of coverage-based
approach with our BP-selection algorithms. Comparison with coverage-based approach further proves the
necessity of path-based method for detecting rational mobile targets. It is the first work that concentrates on
path-based rational mobile targets detection and sensor network vulnerability.
D. An Efficient Coverage Scheme for Wireless Sensor Network
This paper [11] focuses on two coverage strategies namely Delaunay triangulation scheme and Square grid
deployment strategy of wireless sensor network.
Here comparative analyses of these two strategies are performed based on different parameters. Theoretical
Comparative Analysis and Simulation Based Comparative Analysis of Coverage Strategies have done.
Finally it conclude that Delaunay triangulation is more efficient coverage strategy than the square grid
deployment because nodes are linked in triangle form and if sensing range of a sensor is increased, then each
node can communicate with other node in the network. On the other hand, in square grid deployment strategy
if sensing range is increased then overlapping of sensing area is increased which is unexpected for valid data
in the coverage of region of interest.
E. Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network
This paper [8] proposed a new coverage measurement method using DT. In order to show the dense, optimal
and scattered areas, it categorizes sensors as ‘fat’, ‘healthy’ or ‘thin’. Where sensors with many close
neighbors are known as fat Sensors, Sensors with enough close neighbors are healthy sensors and sensors
with few close neighbors are thin sensors. This method also yields the largest empty area of sensors in the
field.

(a)

71
(b)
Figure 5. (a) Delaunay Triangulation (b) Delaunay Triangulation (Corrected)

To use the DT as a WSN coverage measurement tool, the authors add two rules before generating the DT
graph. The first rule is to add extra sensors (Fig. 5) at the corners of the field, assumed convex to lead a full
triangulation of the field. Secondly, if three sensors are collinear, they move one of them by a random
multiple of 0.5 m to let the DT create a triangle.
F. Node Placement for Maximum Coverage Based on Voronoi Diagram Using Genetic Algorithm in Wireless
Sensor Networks
The genetic algorithm (GA) is a technique for randomized search and optimization. The authors [12] used
GA to determine best places for additional nodes maximizing the coverage. Optimal placement of nodes can
guarantee the maximum coverage with less number of nodes and energy consumption decreases. In their
network model it is assumed that all sensors are of the same type and deployed randomly in the sensing field.
Initially their proposed algorithm uses voronoi diagram to divide the field into cells and then for each cell it
uses GA to deploy additional mobile nodes to the holes.
The authors use a 2*n array to represent the solutions in which i-th cells are coordination of a node inside a
cell. Each co-ordination in each chromosome is random but it must be inside the corresponding voronoi cell.
Fitness function is used to determine better solutions that can cover more with less overlap. If there is no
overlap between two nodes in a voronoi cell their distance is equal or more than 2r. Selection mechanism is
one of the important parts of a GA. They used tournament selection mechanism to select chromosomes for
reproducing new generations. In tournament selection each time k individuals are picked randomly and then
the chromosome with the best fitness value among them are selected for mating. Selection mechanism is one
of the important parts of a genetic algorithm. They used tournament selection mechanism to select
chromosomes for reproducing new generations. In tournament selection each time k individuals are picked
randomly and then the chromosome with the best fitness value among them are selected for mating. To
produce new off springs from the selected parents, they randomly used a one point crossover. The authors
select two parents in the population and crossover them. The resulted Childs after crossover are same to their
parents because each co-ordination in chromosomes is inside the corresponding voronoi cell. For mutating
chromosomes in their proposed genetic algorithm, a new random coordination is calculated inside the
voronoi cell and is assigned to a random point in chromosome. Finally, a termination criterion is one of the
important parameters in genetic algorithms. There are several methods for specifying termination criterion
such as determining a constant number of iterations or until a predefined value for fitness acquired or the
fitness value does not change. The authors compared their proposed approach with other works in literature
and simulations show that their proposed approach has better performance.
G. Distributed Deployment Strategies for Improved Coverage in a Network of Mobile Sensors with
Prioritized Sensing Field
Let S be a set of n distinct weighted nodes (S1,w1), (S2,w2), . . . , (Sn,wn) in the plane, where wi > 0 is the
weighting factor associated with Si , for any i n := {1,2, . . . ,n}. Partition the plane into n regions such that
each region contains only one node, which is the nearest node, in the sense of weighted distance, to any point
inside that region. The diagram obtained by the partitioning described above is called the multiplicatively
72
weighted Voronoi diagram (MW-Voronoi diagram). This paper [13] proposed efficient deployment strategies
for a mobile sensor network, where the coverage priority of different points in the field is specified by a
priority function. The multiplicatively weighted Voronoi (MW-Voronoi) diagram is utilized to find the
coverage holes of the network for the case where the sensing ranges of different sensors are not the same. In
their proposed deployment strategy, the authors considered the following assumptions:
(i)
There is no obstacle in the field. Therefore, the sensors can move to any desired location using
existing techniques.
(ii)
The sensors are capable of localizing themselves with sufficient accuracy in the field.
Under the proposed strategies, each sensor detects coverage holes within its MW-Voronoi region, and then
moves in a proper direction to reduce their size. Since the coverage priority of the field is not uniform, the
target location of each sensor is determined based on the weights of the vertices or the points inside the
corresponding MW-Voronoi region. Their Simulations validate the theoretical results
IV. FUTURE W ORKS
In addition there are some more recent works on coverage in WSN using VD. The problem of monitoring
targets with hybrid networks is addressed [9], which is composed of some static sensors randomly deployed
in the sensing area and some mobile sensors deployed in the edge. Probability model is used to find all the
maximal breach paths and ensure that can be detected within the monitoring area. While most existing
research efforts in the area of WSNs have focused on Homogeneous nodes, in the paper [10] the authors
addressed on X-voronoi to solve the coverage in Heterogeneous networks. It was first study on voronoi for
Heterogeneous WSNs.
As future work it can improve in a way that different number of additional nodes is used for each voronoi cell
according to its size. Focus on study and comparison of different deployment techniques used in WSN,
energy-optimal topology that maximizes network lifetime while ensuring simultaneously full area coverage
and sensor connectivity to cluster heads, which are constrained to form a routing technique based on the
topology. Influence coverage such as obstacles, environmental conditions, and noise can consider. The
integration of multiple types of non-homogeneous sensors in one network platform and the study of the
overall coverage of the system also presents several interesting challenges. Investigate methods of optimally
deploying multiple sensors at a time. A probability-based exposure can also provide more accurate results.
However there are still more work to be done in the field of WSN’s coverage so that a global solution can be
achieved.
V. CONCLUSION
This paper studies how Voronoi Diagram and Delaunay triangulation is so useful in WSN coverage. Here we
have attempted to give an overview of the work that has been done to address the coverage problem in
wireless sensor networks. First paper [1] presented best and worst-case formulations for isotropic sensor
coverage in wireless ad hoc sensor networks. The second paper [2] study of the geometric and combinatorial
properties of single-pair and average maximal breach has led to exact polynomial time algorithms for
computing the measures. The third [3] paper present a method of decreasing sensor network vulnerability
which also points out the path-based network topology study. In the fourth paper [11] a comparative analysis
is done between Delaunay triangulation scheme and Square grid deployment strategy. The fifth Paper [8]
have proposed a new measurement scheme, based on DT, which gives detailed information about the areas
between sensors, distance between them, and fat, healthy and thin sensors. This information can improve
understanding sensors of the coverage properties of different coverage promising algorithms, and comparison
among them. The sixth paper [12] have proposed a new approach to increase coverage which uses voronoi
diagram to divide the field into cells and uses genetic algorithm to find best places to put additional mobile
nodes to heal the coverage holes. In the seventh paper [13] efficient sensor deployment algorithms are
presented that helps to increase coverage in a mobile sensor network.
REFERENCES
[1] S. Megerian, F. Koushanfar, M. Potkonjak, and M. Srivastava, “Worst and best-case coverage in sensor networks,”
IEEE Transactions on Mobile Computing, 4(1), 2005, pp. 84-91.
[2] A. Duttagupta, A. Bishnu, and I. Sengupta, “Maximal breach in wireless sensor networks: geometric
characterization and algorithms,” ALGOSENSORS 2007, LNCS, vol. 4837, 2008, pp. 126—137.

73
[3] S. Zhou, M. Wu, and W. Shu, “Blocking vulnerable path of wireless sensor networks,” IEEE GLOBECOM, 2006.
[4] F. Zhao, and L. J. Guibas, “Wireless sensor networks: An information processing approach,” San Francisco, CA:
Elsevier, 2004.
[5] M. Cardei, and J. Wu, “Energy-efficient Coverage Problems in Wireless Ad-hoc Sensor Networks,” Computer
Communications, vol. 29(4), 2006, pp.413—420.
[6] J. O'Rourke, “Computational Geometry in C,” 2nd edition, Cambridge University Press, New York, 1998.
[7] A. DuttaGupta, A. Bishnu, and I. Sengupta, “Optimisation Problems Based on the Maximal Breach Path Measure
for Wireless Sensor Network Coverage,” ICDCIT 2006. LNCS, vol. 4317, Springer, Heidelberg, 2006.
[8] H. Chizari, M. Hosseini, T. Poston, S. Razak, and A. Abdullah, “Delaunay Triangulation as a New Coverage
Measurement Method in Wireless Sensor Network,” Sensors, vol. 11, 2011, pp. 3163-3176.
[9] X. Wang, W. Ni, Q. Fang, and Y. Ge, “Study on Worst Case Coverage of Mobile Sensors in Hybrid Wireless Sensor
Networks,” Applied Mechanics and Materials, vol. 157-158, 2012, pp. 1004-1007.
[10] X. Wang, M. Liu,Q. Fang, and Y. Ge, “Study on X-Voronoi for Hetrrogenrous Wireless Sensor Networks,” Applied
Mechanics and Materials, vol. 157-158,2012, pp. 1665-1669.
[11] A. Dagar, and V. Saroha, “An Efficient Coverage Scheme for Wireless Sensor Network,” International Journal of
Advanced Research in Computer Science and Software Engineering, vol. 3(4), pp. 557-563, April 2013,
[12] N. Rahmani, F. Nematy, A. M. Rahmani, and M. Hosseinzadeh, “Node Placement for Maximum Coverage Based on
Voronoi Diagram Using Genetic Algorithm in Wireless Sensor Networks,” Australian Journal of Basic and Applied
Sciences, vol. 5(12), 2011, pp. 3221-3232
[13] H. Mahboubi, J. Habibi,A. G. Aghdam, and K. Sayrafian-Pour, “Distributed Deployment Strategies for Improved
Coverage in a Network of Mobile Sensors with Prioritized Sensing Field,” IEEE Transactions on Industrial
Informatics, Vol. 9 (1), pp. 451-461, February 2013

74

More Related Content

What's hot

1. 7697 8112-1-pb
1. 7697 8112-1-pb1. 7697 8112-1-pb
1. 7697 8112-1-pbIAESIJEECS
 
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor NetworksA Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networksijma
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage ProblemHigh-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problemijasuc
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks orEstimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks ormarwaeng
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNIJAAS Team
 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issuesijsrd.com
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
CLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATACLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATAcsandit
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359Sandeep Saxena
 

What's hot (16)

1. 7697 8112-1-pb
1. 7697 8112-1-pb1. 7697 8112-1-pb
1. 7697 8112-1-pb
 
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor NetworksA Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage ProblemHigh-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage Problem
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks orEstimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks or
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSN
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
I0341042048
I0341042048I0341042048
I0341042048
 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issues
 
Path loss prediction
Path loss predictionPath loss prediction
Path loss prediction
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
CLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATACLUSTERING HYPERSPECTRAL DATA
CLUSTERING HYPERSPECTRAL DATA
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359
 

Viewers also liked (9)

80 152-157
80 152-15780 152-157
80 152-157
 
71 338-347
71 338-34771 338-347
71 338-347
 
84 11-21
84 11-2184 11-21
84 11-21
 
82 348-355
82 348-35582 348-355
82 348-355
 
69 122-128
69 122-12869 122-128
69 122-128
 
62 328-337
62 328-33762 328-337
62 328-337
 
74 136-143
74 136-14374 136-143
74 136-143
 
72 129-135
72 129-13572 129-135
72 129-135
 
65 113-121
65 113-12165 113-121
65 113-121
 

Similar to Computational Geometry based Remote Networking

Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged byijcsit
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theoryidescitation
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS cscpconf
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKScsandit
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 

Similar to Computational Geometry based Remote Networking (20)

Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged by
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 

More from idescitation (20)

46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 
106 419-424
106 419-424106 419-424
106 419-424
 
114 425-433
114 425-433114 425-433
114 425-433
 
501 183-191
501 183-191501 183-191
501 183-191
 
503 434-438
503 434-438503 434-438
503 434-438
 
525 192-198
525 192-198525 192-198
525 192-198
 
528 439-449
528 439-449528 439-449
528 439-449
 
529 199-206
529 199-206529 199-206
529 199-206
 
538 207-219
538 207-219538 207-219
538 207-219
 
546 220-228
546 220-228546 220-228
546 220-228
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Computational Geometry based Remote Networking

  • 1. Int. J. on Recent Trends in Engineering and Technology, Vol. 10, No. 1, Jan 2014 Computational Geometry based Remote Networking Sharifa Rania Mahmud, Marzia Sultana, Nazia Majadi, Lazima Ansari Department of Computer Science and Engineering, Military Institute of Science and Technology, Dhaka, Bangladesh Email:{sraniamahmud, mrzsultana, nazia.majadi, lazima.22}@gmail.com Abstract— In recent years wireless sensor networks (WSNs) have become one of the most active research areas due to the bright and interesting future promised to the world of information technology. It is an emerging field which is accomplishing much importance because of its vast contribution in varieties of applications. Coverage is one of the important aspects of WSNs and many approaches are introduced to maximize it. It is the key research issue in WSN as it can be considered as the measure of the Quality of Service (QoS) of sensing function for a sensor network. The goal of coverage is to have each location in the physical space of interest within the sensing range of at least one sensor. By combining computational geometry and graph theoretic techniques, specifically the Voronoi Diagram (VD), Delaunay Triangulation (DT) and Graph Search algorithms, can solve the problem. This paper defines some recent research approaches on coverage of WSNs using VD and DT. Also shows how they are being utilized in various research works. Index Terms— Coverage, Wireless Sensors Networks (WSNs), Voronoi Diagram (VD), Delaunay Triangulation (DT). I. INTRODUCTION In recent years there has been increasing interest in the field of WSNs. A WSN consists of a number of wireless sensor nodes. These nodes are characterized by being very small in size with limited energy usually supplied by a battery. These tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks. Sensor networks represent a significant improvement over traditional sensors [4]. Sensor nodes can be placed on predetermined positions or randomly deployed. These networks are typically used to monitor a field of interest to detect movement, temperature changes, precipitation, etc. and very useful for military, environmental, and scientific applications. One of the most active research fields in WSNs is that of coverage. The coverage problem has been studied extensively, especially when combined with connectivity and energy efficiency. Constructing a connected fully covered, and energy efficient sensor network is valuable for real world applications due to the limited resources of sensor nodes. Coverage reflects how well the deployed sensor nodes can monitor a set of targets in surveillance area. The coverage problem is essentially a Quality of Service (QoS) problem which guarantees the monitored area is covered by one or more sensor nodes. VD is a fundamental algorithm for resolving the coverage problems of WSNs. It is a set of discrete sites (points) partitions the plane into a set of convex polygons such that all points inside a polygon are closest to only one site. This construction effectively produces polygons with edges that are equidistant from neighboring sites. The VD allows sensors to distribute the sensing task by partitioning the space in a meaningful way. Coverage can be measured in different ways depending on the application. This paper shows that the coverage problem [1, 2, 3] and some of its variants can be treated in a unified manner using suitable generalizations of the VD and DT. DOI: 01.IJRTET.10.1.1344 © Association of Computer Electronics and Electrical Engineers, 2014
  • 2. II. PRELIMINARIES A sensor network is consisting of a large number of sensor nodes and the position of sensor nodes need not be engineered or predetermined. Sensor network protocols and algorithms must possess self-organizing capabilities because the node lifetime depends on battery lifetime. This also means that. Instead of sending the raw data to the nodes responsible for the fusion, they use their processing abilities to locally carry out simple computations and transmit only the required and partially processed data. Coverage is usually interpreted as how well a sensor network will monitor a field of interest. There are various coverage problems including area coverage, k-coverage, m-connected k-coverage problems etc [5]. An area coverage problem is to find a minimum number of sensors to work such that each physical point in the area is monitored by at least a working sensor. If each position in the area is monitored by at least k (k 1) active sensors, the sensor network is said to be a k coverage sensor network where k is the coverage degree. The communication graph of a given set of sensors M is m-connected if for any two vertices in M, there are m vertex-disjoint paths between the two vertices. An m-connected k-coverage problem is to find a minimum number of sensors to work such that each physical point in the area is monitored by at least k active sensors and the active sensors form an m-connected graph. The VD allows sensors to distribute the sensing task by partitioning the space in a meaningful way. The voronoi cell of a sensor s is the subset of the plane in which all points are closer to s than to any other sensors. Let P={p1 , p2, . . ., pn} be a set of n distinct points in the Euclidian plane. This are called the sites. The voronoi diagram of P is the subdivision of the plane into n cells, one for each site. Therefore partition the plane by assigning every point in the plane to its nearest site. All those points assigned to pi form the voronoi region or voronoi cell V (pi ). A point q lies in the cell corresponding to a site pi P iff Euclidean_Distance (q, pi) < Euclidean_Distance ( q, pj), for each pi P, j i. Note that we have defined this set to be closed. Some points do not have a unique nearest site, nearest neighbor. The set of all points that have more than one nearest neighbor form the VD, V (P) [6]. In Fig. 1 pi is the site points, V (pi) is a voronoi cell, q is a free point, e is voronoi edge and v is a voronoi edge. Figure 1.Voronoi Diagram V (P) of n= 9 sites In 1934 Delaunay proved that when the dual graphs is drawn with straight lines, it produces a planar triangulation of the Voronoi sites P (if no four sites are co-circular), now called Delaunay Triangulation D (P) [6]. Straight line dual of a VD is Delaunay Triangulation (DT). DT can be used to find the two closest sites by considering the shortest edge in the triangulation. The DT can be obtained by connecting the sites in the Voronoi diagram whose polygons share a common edge. Fig. 2 (a) shows the DT for the VD in Fig. 1, and Fig. 2(b) shows the DT superimposed on the corresponding VD. III. S OME EXISTING RESEARCH ON COVERAGE PROBLEM IN WSNs USING VORONOI DIAGRAM This paper defines some research approaches on coverage of wireless sensor networks using voronoi diagram and present in some detail the algorithms, assumptions, and results. This paper defines several terms and concepts and then shows how they are being utilized in various research works. 68
  • 3. (a) (b) Figure 2. (a) Delaunay triangulation D (P) for the sites in Fig. 1. (b) Delaunay triangulation and Voronoi diagram: Fig 1 and Fig. 2(a) A. Worst and Best-case Coverage in Sensor Networks S. Megerian, F. Koushanfar and M. Potkonjak [1] briefly discussed worst and best-case coverage in sensor networks. By combining computational geometry and graph theoretic techniques, specifically the VD and graph search algorithms, authors established the main highlight of the paper—an optimal polynomial time worst and average case algorithm for coverage calculation for homogeneous isotropic sensors. The DT used to find the two closest sites by considering the shortest edge in the triangulation. They also presented several experimental results and analyze potential applications, such as using best and worst-case coverage information as heuristics to deploy sensors to improve coverage. Worst-Case Coverage and Maximal Breach Path: A target is Breach if it is not monitored by any sensor. In worst-case coverage problem Breach is defined as the minimum Euclidean distance from a path to any sensor in a group of sensors. The problem is to identify a Maximal Breach Path in an area, connecting the areas initial point and final point. Outline of algorithm for finding Maximal Breach Path is as follows: 1. Generate VD for given sensors. 2. Apply graph theoretic abstraction by transforming VD to a weighted graph. 3. Find Maximal Breach Path using binary-search and breadth-first search. The Maximal Breach Path is not unique. If new sensors can be deployed or existing sensors moved such that this breach_weight is decreased, then the worst-case coverage is improved. Best-Case Coverage and Maximal Support Path: In best-case coverage problem support is defined as the maximum Euclidean distance from path P to the closest sensor in S. The problem is to identify a Maximal Support Path, PS, in area A, connecting the areas I and F shows in Fig. 3. Outline of algorithm for finding PS is as follows: 1. The Voronoi diagram is replaced by the Delaunay triangulation. 2. Each edge in graph G is assigned a weight equal to the largest distance from the corresponding line segment in the Delaunay triangulation to the closest sensor. 3. The search parameter breach_weight is replaced by the new parameter support_weight and the search is conducted in such a way that support_weight is minimized. Figure 3.Sensor field with Delaunay triangulation and a Maximal Support Path (PS) 69
  • 4. The maximal support path may also not be unique. If additional sensors can be deployed or existing sensors moved such that support_weight is decreased, then the best-case coverage is improved. After each additional sensor deployment, the algorithm was repeated to find the new breach region. Over 100 random deployments, breach coverage improved by about 10 percent by deploying just one more sensors. Similarly, the support_weight and the midpoint of the corresponding edge in the Delaunay triangulation used as a heuristic for deploying additional sensors to improve support coverage. On average, a 50 percent improvement achieved in support coverage by adding one additional sensor when five nodes have already been randomly deployed. B. Maximal Breach in Wireless Sensor Networks A. Duttagupta, A. Bishnu and I. Sengupta proved [2] the lower bound results for maximal breach through its geometric characterization. In 2006 [7] the authors measure the Maximal Breach Path. They also formulate the sensor-network design problem as a geometric optimization problem. They have improved polynomial time algorithms for computing the aforesaid measure for a given sensor network. The resulting breach is the best that can keep the topology of the starting configuration intact. But later in 2008 [2], the authors have defined a new measure called average maximal breach and design an optimal algorithm for it. They have also showed that a relaxed optimization problem for the proposed measure is NP-Hard. C. Blocking Vulnerable Paths of Wireless Sensor Networks S. Zhou, M. Wu, W. Shu [3] presented the vulnerable paths that rational targets would like to take and block these paths to enhance the network detection performance. The authors focused on reducing the path-based vulnerability to get as much information as possible for any target moving out of the surveillance area. They studied intelligent targets that have the knowledge of existing sensor distribution. The vulnerability is a measurement of the unawareness of the sensor network when a target is sneaking along some path. A rational target attempts to find a path that is far away from sensors as much as possible which is called the Most Vulnerable Path (MVP). Voronoi Diagram (VD) and Dijkstra’s shortest path algorithm are used as tools to find this path and calculate it vulnerability. The goal of this anti rational target research is to block the most vulnerable paths. They define the problem as: Given a randomly deployed sensor network, 1. Find the most vulnerable paths that a rational mobile target would take to sneak out of the surveillance area. 2. Find the best locations to place additional sensors, subject to minimize the network vulnerability. Blocking the Vulnerable Paths depends on the MVP. A specific point needs to be identified as the location of a new sensor called blocking point (BP).The authors proposed four BP selection algorithms, based on two factors. As the Point-based approach, selecting extremes intensity points as BP allows to emphasize on some special areas. Edge-based BP selection first selects a particular edge, and then deploys a new sensor at the center of this edge. Combine these two factors together, the Four BP selection algorithms are: 1. Best Blocking Effort (BBE): The algorithm select x with maximum Ic(x) in as BP. It is an extreme approach focusing on local maximum. 2. Maximum Side Effect (MSE): On the contrary to BBE, BP is the point x with minimum Ic(x). It is a method that focuses on the global performance. 3. Center of Maximum Exposure Edge (CXE): Among all edges in the MVP, CXE selects the center of exy with maximum exposure Rxy in as BP. Similar to BBE, CXE is also block a path by jam the most exposed edge. 4. Center of Minimum Exposure Edge (CIE): On the contrary to CXE, CIE selects the center of edge exy withminimum exposure Rxy as BP. Putting an additional sensor there can potentially block multiple MVP. Fig. 4.demonstrates these four approaches, where the plus sign, solid line and bold line represent the existing sensors, original VD edges and original MVP, respectively. The simulation results have showed a sample distribution of sensors in escaping case, after 10 new sensors are added. BBE putted most new sensors on one direction of the escaping path, and blocked that path thoroughly. CXE is similar to BBE. MSE’s performance is much better, where all new sensors are placed in sparse areas. CIE performed closely to MSE. In the sample of sensor distribution in crossing case, the result was similar to that of escaping case. 70
  • 5. Figure 4.Demonstration of BP selection algorithm In this work, MSE has the best performance in both cases. It takes care of both current and potential MVP, and deploys sensors on the most needed spots. Minimum extremum based approaches outperform maximum extremum based approaches. The authors have [3] also compared the performance of coverage-based approach with our BP-selection algorithms. Comparison with coverage-based approach further proves the necessity of path-based method for detecting rational mobile targets. It is the first work that concentrates on path-based rational mobile targets detection and sensor network vulnerability. D. An Efficient Coverage Scheme for Wireless Sensor Network This paper [11] focuses on two coverage strategies namely Delaunay triangulation scheme and Square grid deployment strategy of wireless sensor network. Here comparative analyses of these two strategies are performed based on different parameters. Theoretical Comparative Analysis and Simulation Based Comparative Analysis of Coverage Strategies have done. Finally it conclude that Delaunay triangulation is more efficient coverage strategy than the square grid deployment because nodes are linked in triangle form and if sensing range of a sensor is increased, then each node can communicate with other node in the network. On the other hand, in square grid deployment strategy if sensing range is increased then overlapping of sensing area is increased which is unexpected for valid data in the coverage of region of interest. E. Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network This paper [8] proposed a new coverage measurement method using DT. In order to show the dense, optimal and scattered areas, it categorizes sensors as ‘fat’, ‘healthy’ or ‘thin’. Where sensors with many close neighbors are known as fat Sensors, Sensors with enough close neighbors are healthy sensors and sensors with few close neighbors are thin sensors. This method also yields the largest empty area of sensors in the field. (a) 71
  • 6. (b) Figure 5. (a) Delaunay Triangulation (b) Delaunay Triangulation (Corrected) To use the DT as a WSN coverage measurement tool, the authors add two rules before generating the DT graph. The first rule is to add extra sensors (Fig. 5) at the corners of the field, assumed convex to lead a full triangulation of the field. Secondly, if three sensors are collinear, they move one of them by a random multiple of 0.5 m to let the DT create a triangle. F. Node Placement for Maximum Coverage Based on Voronoi Diagram Using Genetic Algorithm in Wireless Sensor Networks The genetic algorithm (GA) is a technique for randomized search and optimization. The authors [12] used GA to determine best places for additional nodes maximizing the coverage. Optimal placement of nodes can guarantee the maximum coverage with less number of nodes and energy consumption decreases. In their network model it is assumed that all sensors are of the same type and deployed randomly in the sensing field. Initially their proposed algorithm uses voronoi diagram to divide the field into cells and then for each cell it uses GA to deploy additional mobile nodes to the holes. The authors use a 2*n array to represent the solutions in which i-th cells are coordination of a node inside a cell. Each co-ordination in each chromosome is random but it must be inside the corresponding voronoi cell. Fitness function is used to determine better solutions that can cover more with less overlap. If there is no overlap between two nodes in a voronoi cell their distance is equal or more than 2r. Selection mechanism is one of the important parts of a GA. They used tournament selection mechanism to select chromosomes for reproducing new generations. In tournament selection each time k individuals are picked randomly and then the chromosome with the best fitness value among them are selected for mating. Selection mechanism is one of the important parts of a genetic algorithm. They used tournament selection mechanism to select chromosomes for reproducing new generations. In tournament selection each time k individuals are picked randomly and then the chromosome with the best fitness value among them are selected for mating. To produce new off springs from the selected parents, they randomly used a one point crossover. The authors select two parents in the population and crossover them. The resulted Childs after crossover are same to their parents because each co-ordination in chromosomes is inside the corresponding voronoi cell. For mutating chromosomes in their proposed genetic algorithm, a new random coordination is calculated inside the voronoi cell and is assigned to a random point in chromosome. Finally, a termination criterion is one of the important parameters in genetic algorithms. There are several methods for specifying termination criterion such as determining a constant number of iterations or until a predefined value for fitness acquired or the fitness value does not change. The authors compared their proposed approach with other works in literature and simulations show that their proposed approach has better performance. G. Distributed Deployment Strategies for Improved Coverage in a Network of Mobile Sensors with Prioritized Sensing Field Let S be a set of n distinct weighted nodes (S1,w1), (S2,w2), . . . , (Sn,wn) in the plane, where wi > 0 is the weighting factor associated with Si , for any i n := {1,2, . . . ,n}. Partition the plane into n regions such that each region contains only one node, which is the nearest node, in the sense of weighted distance, to any point inside that region. The diagram obtained by the partitioning described above is called the multiplicatively 72
  • 7. weighted Voronoi diagram (MW-Voronoi diagram). This paper [13] proposed efficient deployment strategies for a mobile sensor network, where the coverage priority of different points in the field is specified by a priority function. The multiplicatively weighted Voronoi (MW-Voronoi) diagram is utilized to find the coverage holes of the network for the case where the sensing ranges of different sensors are not the same. In their proposed deployment strategy, the authors considered the following assumptions: (i) There is no obstacle in the field. Therefore, the sensors can move to any desired location using existing techniques. (ii) The sensors are capable of localizing themselves with sufficient accuracy in the field. Under the proposed strategies, each sensor detects coverage holes within its MW-Voronoi region, and then moves in a proper direction to reduce their size. Since the coverage priority of the field is not uniform, the target location of each sensor is determined based on the weights of the vertices or the points inside the corresponding MW-Voronoi region. Their Simulations validate the theoretical results IV. FUTURE W ORKS In addition there are some more recent works on coverage in WSN using VD. The problem of monitoring targets with hybrid networks is addressed [9], which is composed of some static sensors randomly deployed in the sensing area and some mobile sensors deployed in the edge. Probability model is used to find all the maximal breach paths and ensure that can be detected within the monitoring area. While most existing research efforts in the area of WSNs have focused on Homogeneous nodes, in the paper [10] the authors addressed on X-voronoi to solve the coverage in Heterogeneous networks. It was first study on voronoi for Heterogeneous WSNs. As future work it can improve in a way that different number of additional nodes is used for each voronoi cell according to its size. Focus on study and comparison of different deployment techniques used in WSN, energy-optimal topology that maximizes network lifetime while ensuring simultaneously full area coverage and sensor connectivity to cluster heads, which are constrained to form a routing technique based on the topology. Influence coverage such as obstacles, environmental conditions, and noise can consider. The integration of multiple types of non-homogeneous sensors in one network platform and the study of the overall coverage of the system also presents several interesting challenges. Investigate methods of optimally deploying multiple sensors at a time. A probability-based exposure can also provide more accurate results. However there are still more work to be done in the field of WSN’s coverage so that a global solution can be achieved. V. CONCLUSION This paper studies how Voronoi Diagram and Delaunay triangulation is so useful in WSN coverage. Here we have attempted to give an overview of the work that has been done to address the coverage problem in wireless sensor networks. First paper [1] presented best and worst-case formulations for isotropic sensor coverage in wireless ad hoc sensor networks. The second paper [2] study of the geometric and combinatorial properties of single-pair and average maximal breach has led to exact polynomial time algorithms for computing the measures. The third [3] paper present a method of decreasing sensor network vulnerability which also points out the path-based network topology study. In the fourth paper [11] a comparative analysis is done between Delaunay triangulation scheme and Square grid deployment strategy. The fifth Paper [8] have proposed a new measurement scheme, based on DT, which gives detailed information about the areas between sensors, distance between them, and fat, healthy and thin sensors. This information can improve understanding sensors of the coverage properties of different coverage promising algorithms, and comparison among them. The sixth paper [12] have proposed a new approach to increase coverage which uses voronoi diagram to divide the field into cells and uses genetic algorithm to find best places to put additional mobile nodes to heal the coverage holes. In the seventh paper [13] efficient sensor deployment algorithms are presented that helps to increase coverage in a mobile sensor network. REFERENCES [1] S. Megerian, F. Koushanfar, M. Potkonjak, and M. Srivastava, “Worst and best-case coverage in sensor networks,” IEEE Transactions on Mobile Computing, 4(1), 2005, pp. 84-91. [2] A. Duttagupta, A. Bishnu, and I. Sengupta, “Maximal breach in wireless sensor networks: geometric characterization and algorithms,” ALGOSENSORS 2007, LNCS, vol. 4837, 2008, pp. 126—137. 73
  • 8. [3] S. Zhou, M. Wu, and W. Shu, “Blocking vulnerable path of wireless sensor networks,” IEEE GLOBECOM, 2006. [4] F. Zhao, and L. J. Guibas, “Wireless sensor networks: An information processing approach,” San Francisco, CA: Elsevier, 2004. [5] M. Cardei, and J. Wu, “Energy-efficient Coverage Problems in Wireless Ad-hoc Sensor Networks,” Computer Communications, vol. 29(4), 2006, pp.413—420. [6] J. O'Rourke, “Computational Geometry in C,” 2nd edition, Cambridge University Press, New York, 1998. [7] A. DuttaGupta, A. Bishnu, and I. Sengupta, “Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage,” ICDCIT 2006. LNCS, vol. 4317, Springer, Heidelberg, 2006. [8] H. Chizari, M. Hosseini, T. Poston, S. Razak, and A. Abdullah, “Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network,” Sensors, vol. 11, 2011, pp. 3163-3176. [9] X. Wang, W. Ni, Q. Fang, and Y. Ge, “Study on Worst Case Coverage of Mobile Sensors in Hybrid Wireless Sensor Networks,” Applied Mechanics and Materials, vol. 157-158, 2012, pp. 1004-1007. [10] X. Wang, M. Liu,Q. Fang, and Y. Ge, “Study on X-Voronoi for Hetrrogenrous Wireless Sensor Networks,” Applied Mechanics and Materials, vol. 157-158,2012, pp. 1665-1669. [11] A. Dagar, and V. Saroha, “An Efficient Coverage Scheme for Wireless Sensor Network,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3(4), pp. 557-563, April 2013, [12] N. Rahmani, F. Nematy, A. M. Rahmani, and M. Hosseinzadeh, “Node Placement for Maximum Coverage Based on Voronoi Diagram Using Genetic Algorithm in Wireless Sensor Networks,” Australian Journal of Basic and Applied Sciences, vol. 5(12), 2011, pp. 3221-3232 [13] H. Mahboubi, J. Habibi,A. G. Aghdam, and K. Sayrafian-Pour, “Distributed Deployment Strategies for Improved Coverage in a Network of Mobile Sensors with Prioritized Sensing Field,” IEEE Transactions on Industrial Informatics, Vol. 9 (1), pp. 451-461, February 2013 74