scispace - formally typeset
Proceedings ArticleDOI

Sensor deployment strategy for target detection

TLDR
This paper presents an approach for sequential deployment in steps and illustrates that the cost of deployment can be minimized to achieve the desired detection performance by appropriately choosing the number of sensors deployed in each step.
Abstract
In order to monitor a region for traffic traversal, sensors can be deployed to perform collaborative target detection. Such a sensor network achieves a certain level of detection performance with an associated cost of deployment. This paper addresses this problem by proposing path exposure as a measure of the goodness of a deployment and presents an approach for sequential deployment in steps. It illustrates that the cost of deployment can be minimized to achieve the desired detection performance by appropriately choosing the number of sensors deployed in each step.

read more

Citations
More filters
Proceedings ArticleDOI

Integrated coverage and connectivity configuration in wireless sensor networks

TL;DR: The design and analysis of novel protocols that can dynamically configure a network to achieve guaranteed degrees of Coverage Configuration Protocol (CCP) and integrate SPAN to provide both coverage and connectivity guarantees are presented.
Proceedings ArticleDOI

Movement-assisted sensor deployment

TL;DR: This paper designs two sets of distributed protocols for controlling the movement of sensors, one favoring communication and one favoring movement, and uses Voronoi diagrams to detect coverage holes and use one of three algorithms to calculate the target locations of sensors it holes exist.
Journal ArticleDOI

Strategies and techniques for node placement in wireless sensor networks: A survey

TL;DR: This paper reports on the current state of the research on optimized node placement in WSNs, and categorizes the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively.
Journal ArticleDOI

Movement-assisted sensor deployment

TL;DR: This paper designs two sets of distributed protocols for controlling the movement of sensors, one favoring communication and one favoring movement, and uses Voronoi diagrams to detect coverage holes and use one of three algorithms to calculate the target locations of sensors it holes exist.
Journal ArticleDOI

Spatio-temporal correlation: theory and applications for wireless sensor networks

TL;DR: A theoretical framework is developed to model the spatial and temporal correlations in WSN to enable the development of efficient communication protocols which exploit these advantageous intrinsic features of the WSN paradigm.
References
More filters
Journal ArticleDOI

Empirical formula for propagation loss in land mobile radio services

TL;DR: An empirical formula for propagation loss is derived from Okumura's report in order to put his propagation prediction method to computational use.
Book

Distributed Detection and Data Fusion

TL;DR: This book discusses distributed detection systems, Bayesian Detection Theory, Information Theory and Distributed Hypothesis Testing, and the role of data compression in the development of knowledge representation.
Proceedings ArticleDOI

Exposure in wireless Ad-Hoc sensor networks

TL;DR: This work has developed an efficient and effective algorithm for exposure calculation in sensor networks, specifically for finding minimal exposure paths and provides an unbounded level of accuracy as a function of run time and storage.
Book

Computer Algorithms: Introduction to Design and Analysis

TL;DR: This edition features an increased emphasis on algorithm design techniques such as divide-and-conquer and greedy algorithms, along with the addition of new topics and exercises.
Book

Multi-Sensor Fusion: Fundamentals and Applications With Software

TL;DR: A comparison with Existing Approaches, a New Method for Cloud Removal, and Experimental Results of the Exhaustive Search Algorithm: Designing Optimal Sensor Systems within Dependability Bounds.
Related Papers (5)