TY - GEN
T1 - The deployment algorithm based on cutting a triangle for wireless sensor networks
AU - Shiu, Liang Cheng
AU - Lee, Chao Yang
AU - Yang, Chu Sing
PY - 2010/7/15
Y1 - 2010/7/15
N2 - In a large monitored area, the static sensors are deployed by random. It is obvious there are coverage holes and a coverage hole can be polygonal. Because a polygon can be decomposed into a piece of triangles, triangles are considered, and the three nodes of triangles are the static sensors deployed randomly. This paper presents an efficiently deployment algorithm which is based on the coverage hole is a triangle. The triangle is cut into small triangles which contains at least one interior angles is equal to 60°. These small triangles with 60° angle can be guaranteed full coverage, and the rest area of the triangle is still a triangle. Continue the cutting until the triangle is small enough that the sensors on the three nodes can fully cover the area. As a result, the coverage hole of triangle can be full coverage. Beside, the x-y coordinates of each deployed sensor can be deduced.
AB - In a large monitored area, the static sensors are deployed by random. It is obvious there are coverage holes and a coverage hole can be polygonal. Because a polygon can be decomposed into a piece of triangles, triangles are considered, and the three nodes of triangles are the static sensors deployed randomly. This paper presents an efficiently deployment algorithm which is based on the coverage hole is a triangle. The triangle is cut into small triangles which contains at least one interior angles is equal to 60°. These small triangles with 60° angle can be guaranteed full coverage, and the rest area of the triangle is still a triangle. Continue the cutting until the triangle is small enough that the sensors on the three nodes can fully cover the area. As a result, the coverage hole of triangle can be full coverage. Beside, the x-y coordinates of each deployed sensor can be deduced.
UR - http://www.scopus.com/inward/record.url?scp=77954435523&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954435523&partnerID=8YFLogxK
U2 - 10.1109/ICISA.2010.5480579
DO - 10.1109/ICISA.2010.5480579
M3 - Conference contribution
AN - SCOPUS:77954435523
SN - 9781424459438
T3 - 2010 International Conference on Information Science and Applications, ICISA 2010
BT - 2010 International Conference on Information Science and Applications, ICISA 2010
T2 - 2010 International Conference in Information Science and Applications, ICISA 2010
Y2 - 21 April 2010 through 23 April 2010
ER -