2019
DOI: 10.1016/j.comnet.2019.07.010
|View full text |Cite|
|
Sign up to set email alerts
|

Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…For example, through coordinate (1,2) of the source node and coordinate (10,20) of the destination node, the proposed scheme can obtain a straight-line equation 2x − y = 0. After that, in this example, when a node that finishes face routing has a coordinate (5,5), the proposed scheme can find that the length of the perpendicular line is √ 5 and that the coordinate of the foot of the perpendicular line is (3,6). Based on this example, using the Euclidean distance formula, when the proposed scheme calculates a horizontal vertex coordinate, it can obtain two coordinates-one is (2,4) and the other is (4,8).…”
Section: Marking Process In a Hole Areamentioning
confidence: 99%
See 1 more Smart Citation
“…For example, through coordinate (1,2) of the source node and coordinate (10,20) of the destination node, the proposed scheme can obtain a straight-line equation 2x − y = 0. After that, in this example, when a node that finishes face routing has a coordinate (5,5), the proposed scheme can find that the length of the perpendicular line is √ 5 and that the coordinate of the foot of the perpendicular line is (3,6). Based on this example, using the Euclidean distance formula, when the proposed scheme calculates a horizontal vertex coordinate, it can obtain two coordinates-one is (2,4) and the other is (4,8).…”
Section: Marking Process In a Hole Areamentioning
confidence: 99%
“…Wireless Sensor Networks (WSNs) exploit millions of sensor devices that collect sensing data from their sensors and transmit these data to a sink for analysis [1][2][3][4][5][6][7]. WSNs do not use all network topology information, but exploit local information in the one-hop range due to the characteristics of sensor devices with limited resources.…”
Section: Introductionmentioning
confidence: 99%
“…GAS [38] and COTS [39] similarly construct proactive virtual clusters which means a grid structure calculated with only location information. Each sensor node could know its own cluster by calculation with its own location, a reference point, and a cluster size without communication among sensor nodes.…”
Section: Phase Ii: Integrationmentioning
confidence: 99%
“…Therefore, TG-COD, TGM-COT, GAS, and COTS do not suffer from communication overhead for cluster construction and maintenance. Figure 4 and Table 2 TG-COD [30] CODA [34] GAS [38] COTS [39] PRECO [35] EUCOW [27] / PM-COT [32] COBOM [26] MCHD [40] BFA [37] FPOD [36] BTS-COT [33] / TPE-FTED [29] TGM-COT [31] DeGas [7] / GLDS [28] BRTCO [6] [25] COBOM [26], EUCOW [34], PRECO [35], FPOD [36], BTS-COT [33], PM-COT [32], TPE-FTED [29] CODA [34], GAS [38], COTS [39], BRTCO [6] TG-COD [30], MCHD [40], BFA [37], TGM-COT [31], DeGas [7], GLDS [28] # Dual prediction techniques that are proposed for abbreviation in IMO monitoring are not studied yet in LFO monitoring. Dual prediction for LFO monitoring is much more complex than that for IMO monitoring since it has to predict the next boundary shape not the next point.…”
Section: Phase Ii: Integrationmentioning
confidence: 99%