By Topic

Hostile area or facility monitoring with an optimal wireless sensor network deployment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jenn-Long Liu ; Dept. of Inf. Manage., I-Shou Univ., Kaohsiung, Taiwan ; Jiann-Horng Lin

This study uses an enhanced non-dominated sorting genetic algorithm (enhanced MOGA) to generate the optimal wireless sensor network deployment for monitoring a hostile perimeter area or a critical facility. The sensors are deployed around the area to sense the activities in the area or placed outside the critical facility for sensing the movements of incoming and outgoing of personnel worked in the facility. The distributed sensors are capable of sensing and linking with each other in order to communicate the gathered data via a sensor to a nearby high energy communication node (HECN). The HECN served as a transmission relay to deliver gathered data from the ground to a high-altitude unmanned aerial vehicle (UAV). Two scenarios are implemented by using the enhanced MOGA to achieve the sensor deployment by minimizing the number of sensors and maximizing the coverage. Simulation results will show the Pareto-optimal front, sensor deployment and communication routes between sensors and the HECN.

Published in:

Evolutionary Computation (CEC), 2010 IEEE Congress on

Date of Conference:

18-23 July 2010