http://scholars.ntou.edu.tw/handle/123456789/20275| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Chien-Fu Cheng | en_US |
| dc.contributor.author | Chen-Wei Wang | en_US |
| dc.date.accessioned | 2022-02-11T04:25:59Z | - |
| dc.date.available | 2022-02-11T04:25:59Z | - |
| dc.date.issued | 2017-10-01 | - |
| dc.identifier.issn | 1089-7798 | - |
| dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/20275 | - |
| dc.description.abstract | When there are multiple barriers in a wireless sensor network (WSN), the sleep-wakeup schedule can be used to alternate working barriers to extend the overall network lifetime. However, when one working barrier is being replaced by another, if any intruder comes into the potential-breach-point between these two barriers, the barrier-breach problem may occur. In this letter, the proposed algorithm uses mobile elements to check presence of intruders at potential-breach-points. Compared with the extant algorithms, the proposed algorithm has two major advantages. First, it does not remove crossing barriers, so the overall network lifetime of barrier coverage can be extended. Second, it does not alternate working barriers always based on the order of barrier's distance to the front side, from near to far, so the sleep-wakeup schedule can be flexibly arranged. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IEEE | en_US |
| dc.relation.ispartof | IEEE Communications Letters | en_US |
| dc.subject | Mobile communication | en_US |
| dc.subject | Switches | en_US |
| dc.subject | Schedules | en_US |
| dc.subject | Sensors | en_US |
| dc.subject | Wireless sensor networks | en_US |
| dc.subject | Scheduling algorithms | en_US |
| dc.subject | Algorithm design and analysis | en_US |
| dc.subject | Wireless sensor networks | en_US |
| dc.subject | barrier coverage | en_US |
| dc.subject | barrier-breach problem | en_US |
| dc.title | The Barrier-Breach Problem of Barrier Coverage in Wireless Sensor Networks | en_US |
| dc.type | journal article | en_US |
| dc.identifier.doi | 10.1109/LCOMM.2017.2694432 | - |
| dc.identifier.isi | WOS:000412626700038 | - |
| dc.relation.journalvolume | 21 | en_US |
| dc.relation.journalissue | 10 | en_US |
| dc.relation.pages | 2262 - 2265 | en_US |
| item.fulltext | no fulltext | - |
| item.grantfulltext | none | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
| item.cerifentitytype | Publications | - |
| item.openairetype | journal article | - |
| item.languageiso639-1 | en | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| Appears in Collections: | 資訊工程學系 | |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.