|
1.J. M. Kahn, R. H. Katz and K. S. J. Pister, "Next century challenges: mobile networking for smart dust," Proceedings of the International Conference on Mobile Computing and Networking, 1999, pp. 271-278. 2.B. Arunachalam, D. S. Arjun, R. B. B. Prahlada, H. Pasupuleti and V. Dwarakanath, "Sensing service framework for climate alert system using WSN-cloud infrastructure," 2015 9th International Conference on Sensing Technology (ICST), 2015, pp. 671-676. 3.E. Aguirre, P. Lopez-Iturri, L Azpilicueta, A. Redondo, J. J. Astrain, J. Villadangos and A. Bahillo, "Design and implementation of context aware applications with wireless sensor network support in urban train transportation environments," IEEE Sensors Journal, vol. 17, no. 1, 2017, pp. 169-178. 4.M. Brandi, J. Grabner, K. Kellner, F. Seifert, J. Nicolics, S. Grabner and G. Grabner, "A low-cost wireless sensor system and its application in dental retainers," IEEE Sensors Journal, vol. 9, no. 3, 2009, pp. 255-262. 5.Q. Luo, S. Li, J. Wu and Y. Sun, "Energy-saving coverage algorithm of WSN," 2009 Chinese Control and Decision Conference, Guilin, 2009, pp. 3622-3627. 6.B. Khalifa, Z. Al Aghbari, A. M. Khedr and J. H. Abawajy, "Coverage hole repair in WSNs using cascaded neighbor intervention," IEEE Sensors Journal, vol. 17, no. 21, 2017, pp. 7209-7216. 7.J. Wang, "The placement scheme for static nodes in a circular WSN area based on the analysis of density and energy," 2010 International Conference on Multimedia Information Networking and Security, Nanjing, Jiangsu, 2010, pp. 208-212. 8.Y. C. Wang, C. C. Hu and Y. C. Tseng, "Efficient placement and dispatch of sensors in a wireless sensor network," IEEE Transactions on Mobile Computing, vol. 7, no. 2, 2008, pp. 262-274. 9.M. M. Singh, A. Singh and J. K. Mandal, "Preventing node replication attack in static wireless sensor networks," Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, 2014, pp. 1-5. 10.M. Abo-Zahhad, S. M. Ahmed, N. Sabor and S. Sasaki, "Utilisation of multi-objective immune deployment algorithm for coverage area maximisation with limit mobility in wireless sensors networks," IET Wireless Sensor Systems, vol. 5, no. 5, 2015, pp. 250-261. 11.L. Wang and S. S. Kulkarni, "Sacrificing a little coverage can substantially increase network lifetime," 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, 2006, pp. 326-335. 12.S. Ganeriwal, A. Kansal and M. B. Srivastava, "Self aware actuation for fault repair in sensor networks," IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004, New Orleans, LA, USA, 2004, pp. 5244-5249. 13.D. Tian and N. D. Georganas, "A coverage-preserving node scheduling scheme for large wireless sensor networks," ACM Int. Workshop Wireless Sen. Netw. Appl., 2002, pp. 32-41. 14.G. Vaishali and M. K. Nighot, "An efficient ACO scheme for mobile-sink based WSN," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, 2016, pp. 1-5. 15.X. Chen, L. Wang and Y. Zhan, "Detection and revocation of replica nodes in WSN by using mobile sink," 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 2012, pp. 1-4. 16.Y. Gu, L. Zhao, D. Jing and J. Guo, "A novel routing protocol for mobile nodes in WSN," 2012 International Conference on Control Engineering and Communication Technology, Liaoning, 2012, pp. 624-627. 17.A. Soundarya and V. Santhi, "An efficient algorithm for coverage hole detection and healing in wireless sensor networks," 2017 1st International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech), Kolkata, 2017, pp. 1-5. 18.X. Deng, C. Xu, F. Zhao and Y. Liu, "Repair policies of coverage holes based dynamic node activation in wireless sensor networks," 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, 2010, pp. 368-371. 19.Erdun Zhao, Juan Yao, Hao Wang and Yating Lv, "A coverage hole detection method and improvement scheme in WSNs," 2011 International Conference on Electric Information and Control Engineering, Wuhan, 2011, pp. 985-988. 20.X. Liu, Y. Feng, Q. Lv and T. Zhao, "Cascaded movement strategy for repairing coverage holes in wireless sensor networks," 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, Nanjing, Jiangsu, 2011, pp. 108-111. 21.B. A. White, A. Tsourdos, I. Ashokaraj, S. Subchan and R. Zbikowski, "Contaminant cloud boundary monitoring using network of UAV sensors," IEEE Sensors Journal, vol. 8, no. 10, 2008, pp. 1681-1692. 22.J. Grigulo and L. B. Becker, "Experimenting Sensor Nodes Localization in WSN with UAV Acting as Mobile Agent," 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), Turin, 2018, pp. 808-815. 23.G. Subramanian, "Application of WSN in UAV," 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, 2018, pp. 1-5. 24.S. Mahmoud, I. Jawhar, N. Mohamed and Jie Wu, "UAV and WSN softwarization and collaboration using cloud computing," 2016 3rd Smart Cloud Networks & Systems (SCNS), Dubai, 2016, pp. 1-8. 25.Huiyong Wang, Minglu Zhang and Jingyang Wang, "Design and implementation of an Emergency Search and Rescue System based on mobile robot and WSN," 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010), Wuhan, 2010, pp. 206-209. 26.S. János and I. Matijevics, "Implementation of potential field method for mobile robot navigation in greenhouse environment with WSN support," IEEE 8th International Symposium on Intelligent Systems and Informatics, Subotica, 2010, pp. 319-323. 27.M. Chovanec and P. Šarafín, "Real-time schedule for mobile robotics and WSN aplications," 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, 2015, pp. 1199-1202. 28.Y. Zou and K. Chakrabarty, "Sensor deployment and target localization based on virtual forces," IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, CA, vol. , 2003, pp. 1293-1303. 29.T. Lin, H. A. Santoso and K. Wu, "Global sensor deployment and local coverage-aware recovery schemes for smart environments," IEEE Transactions on Mobile Computing, vol. 14, no. 7, 2015, pp. 1382-1396. 30.H. Mahboubi and A. G. Aghdam, "Distributed deployment algorithms for coverage improvement in a network of wireless mobile sensors: relocation by virtual force," IEEE Transactions on Control of Network Systems, vol. 4, no. 4, 2017, pp. 736-748. 31.S. T. Hasson and A. A. R. Finjan, "A suggested angles-based sensors deployment algorithm to develop the coverages in WSN," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 547-552. 32.A. M. Khedr, W. Osamy and A. Salim, "Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks," Computer Communications, vol. 124, no. 21, 2018, pp. 61-75. 33.https://en.wikipedia.org/wiki/Smallest-circle_problem, accessed on July 2019 34.https://en.wikipedia.org/wiki/Voronoi_diagram, accessed on July 2019 35.R. Sujee and K. E. Kannammal, "Energy efficient adaptive clustering protocol based on genetic algorithm and genetic algorithm inter cluster communication for wireless sensor networks," 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, 2017, pp. 1-6. 36.C. K. Ng, C. H. Wu, W. H. Ip and K. L. Yung, "A smart bat algorithm for wireless sensor network deployment in 3-D environment," IEEE Communications Letters, vol. 22, no. 10, 2018, pp. 2120-2123. 37.D. S. Deif and Y. Gadallah, "An ant colony optimization approach for the deployment of reliable wireless sensor networks," IEEE Access, vol. 5, 2017, pp. 10744-10756. 38.Y. Zhou, N. Wang and W. Xiang, "Clustering hierarchy protocol in wireless sensor networks using an improved PSO algorithm," IEEE Access, vol. 5, 2017, pp. 2241-2253. 39.https://zh.wikipedia.org/wiki/%E6%97%85%E8%A1%8C%E6%8E%A8%E9%94%80%E5%91%98%E9%97%AE%E9%A2%98, accessed on July 2019 40.P. Huang, L. Xu, Z. Kang, C. Liu and F. Lin, "GA-based sweep coverage scheme in WSN," 2016 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, 2016, pp. 254-259. 41.J. G. Moreno-Torres, X. Llorà and D. E. Goldberg, "Binary representation in gene expression programming: Towards a better scalability," 2009 Ninth International Conference on Intelligent Systems Design and Applications, Pisa, 2009, pp. 1441-1444. 42.M. Kubicki and D. Figurowski, "An introduction to a novel crossover operator for real-value encoded genetic algorithm: Gaussian crossover operator," 2018 International Interdisciplinary PhD Workshop (IIPhDW), Swinoujście, 2018, pp. 85-90. 43.P. Hartono, S. Hashimoto and M. Wahde, "Labeled-GA with adaptive mutation rate," Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753), Portland, OR, USA, 2004, pp. 1851-1858. 44.H. Komari Alaei and M. Khademi, "Partial mutation in GA a novel proposed algorithm to solving complex problem," 2010 International Conference on Intelligent Computing and Cognitive Informatics, Kuala Lumpur, 2010, pp. 304-307. 45.C. Chen and J. Luo, "Hybrid optimal control of robot motor based on improved genetic algorithm and fuzzy logic," 2017 International Conference on Robotics and Automation Sciences (ICRAS), Hong Kong, 2017, pp. 53-57. 46.S. M. Kwon and J. S. Kim, "Coverage ratio in the wireless sensor networks using Monte Carlo simulation," 2008 Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, 2008, pp. 235-238. 47.https://en.wikipedia.org/wiki/Sigmoid_function, accessed on July 2019
|