2019
DOI: 10.3390/s19020225
|View full text |Cite
|
Sign up to set email alerts
|

Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage

Abstract: Perimeter barriers can provide intrusion detection for a closed area. It is efficient for practical applications, such as coastal shoreline monitoring and international boundary surveillance. Perimeter barrier coverage construction in some regions of interest with irregular boundaries can be represented by its minimum circumcircle and every point on the perimeter can be covered. This paper studies circle barrier coverage in Bistatic Radar Sensor Network (BRSN) which encircles a region of interest. To improve t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(18 citation statements)
references
References 30 publications
0
18
0
Order By: Relevance
“…Regarding various scenarios and tasks, barrier coverage problems were extensively and profoundly studied in the last decade. The models that have been studied can be divided into three categories: the disk coverage model [ 8 , 22 , 23 , 24 , 25 ], sector coverage model [ 9 , 26 , 27 , 28 , 29 ], and Cassini coverage model [ 20 , 30 , 31 , 32 , 33 ].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Regarding various scenarios and tasks, barrier coverage problems were extensively and profoundly studied in the last decade. The models that have been studied can be divided into three categories: the disk coverage model [ 8 , 22 , 23 , 24 , 25 ], sector coverage model [ 9 , 26 , 27 , 28 , 29 ], and Cassini coverage model [ 20 , 30 , 31 , 32 , 33 ].…”
Section: Related Workmentioning
confidence: 99%
“…Practically, one circular barrier is inadequate to cover a vast circular area, and the width of a circular barrier is not set with a threshold. A model with a threshold of width was mentioned in [ 33 ], and the whole circular area was divided into several sub-circular barriers with the same width. Each sub-circular barrier was composed of several identical deployment patterns, and only a varied one was exploited to cover the remaining part.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations