Coverage Analysis In Wireless Sensor Network
Journal Title: International Journal on Computer Science and Engineering - Year 2016, Vol 8, Issue 7
Abstract
A WSN can be composed of homogeneous or heterogeneous sensor nodes also termed as motes, which adapts the same or different coordination, sensing and computation abilities, respectively. Node deployment is a fundamental issue to be solved in WSNs. A proper node deployment scheme can reduce the complexity of problems in WSNs as, for example, routing, data fusion, communication,etc. Furthermore, it can extend the lifetime of WSNs by minimizing energy consumption. In this paper, we investigate random and deterministic node deployments for large-scale WSNs under the performance metrics.Thus, we have taken four different deterministic deployment patterns for Wireless Sensor Network (WSNs) namely a square grid ,a regular hexagon based, a octagon-square based and a decagonstar pattern for sensor nodes deployment and analysed each of them on the basis of their average coverage provided in the application field. Using basic geometry we propose a novel strategy for calculating the relative frequency of exactly k-covered points, by using k-coverage maps, for all the deployment methods .
Authors and Affiliations
Sasmita Manjari Nayak , Mr Rajeeb Sankar Bal
SOLUTION OF MULTI-OBJECTIVE MATHEMATICAL PROGRAMMING PROBLEMS IN FUZZY APPROACH
Recent developments in multi objective programming by Geoffrion, Mond and Wolfe [3, 8, 13] show interesting results with convex functions and related scalar objective programs. In this paper we compare the solution of mu...
Review on Recent Image Segmentation Techniques
Image Segmentation refers to the process of partitioning an image into non-overlapping different regions with similar attributes, for gray level images, the most basic attribute used is the luminance amplitude, and for c...
An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks
In mobile ad hoc networks (MANETs), every node overhears every data transmission occurring in its vicinity and thus consumes energy unnecessarily. Although lots of research has been done on energy efficiency remains it i...
Framework for User Authenticity and Access Control Security over a Cloud
Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the sam...
Capacity Estimation of Multi-Service Cellular Network Dimensioning and Planification Network
Planning and dimensioning process of a multi-service network WCDMA should consider the whole parameters characterising the radio cell. Among these, we are interested in the required total BTS power and maximum capacity s...