By Topic

Potential Target Traversing Detection Algorithm Based on Voronoi Diagram

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Jin Zhang ; Coll. of Comput. Sci. & Technol., Harbin Eng. Univ., Harbin ; Daxin Liu ; Yuezhu Xu ; Meng Zhao
more authors

In a wireless sensor network, sensors are scattered randomly by aircraft or rocket ejection. On account of scattered randomness, there may be sparse areas of sensors, in which, sensors cannot detect every hole and corner. Aimed at the region coverage, from another profile, the paper analyses and explains that the randomness of sensor scattered and the limitation of sensor monitor capability lead the appearance of potential traversing path in the whole wireless sensor network, and proposes the potential target traversing detection algorithm based on Voronoi diagram and corresponding solution. Through the analysis of experimental results, the feasibility and the validity of the detection algorithm are proved, and the potential risk can be made up by corresponding solution.

Published in:

Internet Computing in Science and Engineering, 2008. ICICSE '08. International Conference on

Date of Conference:

28-29 Jan. 2008