2019
DOI: 10.1109/mcom.2018.1800314
|View full text |Cite
|
Sign up to set email alerts
|

Accurate Boundary Detection and Refinement for Continuous Objects in IoT Sensing Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Several techniques such as multiple traveling salesman problems along with time constraints and the vehicle routing are used for optimizing the route of mobile nodes. This strategy repeats until the elimination of candidate nodes and proceeds unless no more refinement is possible further 26 . An intelligent framework is created with IoT‐assisted WSNs for the wildfire detection (WD).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Several techniques such as multiple traveling salesman problems along with time constraints and the vehicle routing are used for optimizing the route of mobile nodes. This strategy repeats until the elimination of candidate nodes and proceeds unless no more refinement is possible further 26 . An intelligent framework is created with IoT‐assisted WSNs for the wildfire detection (WD).…”
Section: Literature Reviewmentioning
confidence: 99%
“…This strategy repeats until the elimination of candidate nodes and proceeds unless no more refinement is possible further. 26 An intelligent framework is created with IoT-assisted WSNs for the wildfire detection (WD). In this work, a sleep Scheduling-based Energy Optimization Framework (SEOF) is introduced, which operate in two phases.…”
Section: Continuous Object Monitoringmentioning
confidence: 99%
“…All of them can find the targets in WSNs but need to promote the accuracy of the object boundary. A large number of researchers, such as the authors of [10], have done a considerable amount of work based on these algorithms to improve the precise algorithm of the boundary area of continuous targets.…”
Section: Contribution and Solutionsmentioning
confidence: 99%
“…For instance, Z. Zhou et al proposed an iterative method to precisely achieve the target edge [10] by repeatedly updating the candidate nodes to boundary nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the sensing data of the abnormal node is routed to the sink node through the shortest path. Since the network is in a normal state most of the time [17], adopting a sleep mechanism can greatly reduce network energy consumption. However, the activation of neighboring nodes generates a large amount of redundant information transmission and consumes network energy.…”
Section: A Boundary Detectionmentioning
confidence: 99%