|
[1]N. Ahmed, S. S. Kanhere, and S. Jha, “The Holes Problem in Wireless Sensor Networks :A Survey,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 2, pp. 4-18, April 2005. [2]I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 104-112, August 2002. [3]B. Carbunar, A. Grama, J. Vitek, and O. Carbunar, “Redundancy and Coverage Detection in Sensor Networks,” ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 94-128, February 2006. [4]C. Huang, Y. Tseng, “The Coverage Problem in a Wireless Sensor Network,” in Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA), pp. 115–121, San Diego, USA, September 2003. [5]C. Hunag, L. Lo, T. Tseng, and W. Chen, “Decentralized Energy-Conserving and Coverage-Preserving Protocols for Wireless Sensor Networks,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), pp. 640-643, Kobe, Japan, May 2005. [6]M. Iqbal, I. Gondal, and L. Dooley, “Coverage Characteristics of Symmetric Topologies for Pervasive Sensor Networks,” in Proceedings of the Second IFIP International Conference on Wireless and Optical Communication Networks (WOCN), pp. 523-529, Dubai, United Arab Emirates, March 2005. [7]JR. Jiang, TM. Sung, “Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks,” Journal of Networks, vol. 4, pp. 403–410, August 2009. [8]JH Li, M Yu, “Sensor Coverage in Wireless Ad Hoc Sensor Networks,” International Journal of Sensor Networks, vol. 2, pp. 218-229, June 2007. [9]I. Khou, P. Minet, A. Laouiti, and S. Mahfoudh, “Survey of Deployment Algorithms in Wireless Sensor Networks: Coverage and Connectivity Issues and Challenges,” International Journal of Autonomous and Adaptive Communications Systems (IJAACS), pp. 1-24, December 2014. [10]W. Li, W. Zhang, “Coverage Hole and Boundary Nodes Detection in Wireless Sensor Networks,” Journal of Network and Computer Applications, vol. 48, no. 2, pp. 35-43, February 2015. [11]C. Ma, J. He, H.-H. Chen, and Z. Tang, “Coverage Overlapping Problems in Applications of IEEE 802.15.4 Wireless Sensor Networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 4364-4369, Shanghai, China, April 2013. [12]D. Tian, N. D. Georganas, “A Node Scheduling Scheme for Energy Conservation in Large Wireless Sensor Networks,” Journal on Wireless Communications and Mobile Computing, vol. 3, no. 2, pp. 271–290, March 2003. [13]X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), pp.28-39, Los Angeles, USA , November 2003. [14]E. Welzl, “Smallest Enclosing Disks (balls and ellipsoids),” New Results and New Trends in Computer Science, Germany: Springer Verlag, pp. 359-370, June 1991. [15]M.-C. Wueng, S.-I. Hwang, “An Efficient K-coverage Eligibility Algorithm on Sensor Networks,” in Proceedings of the 4th International Conference on Parallel and Distributed Processing and Applications(ISPA), pp. 418-429, Sorrento, Italy, December 2006. [16]T. Yan, T. He, and J. A. Stankovic, “Differentiated Surveillance for Sensor Network,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems(SenSys), pp.51-62, Los Angeles, USA, November 2003. [17]Y. Zhao, P. Cao, “Honeycomb Architecture for Energy Conservation in wireless sensor networks,” in Proceedings of the IEEE Global Telecommunications Conference, pp. 1-5, San Francisco, San Francisco, USA, November 2006 [18]Matlab, https://in.mathworks.com/products/matlab.html
|