Covering the Target Objects with Mobile Sensors by Using Genetic Algorithm in Wireless Sensor Networks

نویسندگان

  • Van-Dai Ta
  • Shih-Chang Huang
  • Huynh Thi Thanh Binh
چکیده

Wireless sensor networks have several applications, such as target detection and tracking, and monitoring battlefields. Coverage is one of the most important performance metrics for wireless sensor networks since it reflects how appropriate an event can be detected and monitored in the sensing field. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of sensor node deployment. In this paper, an efficient genetic algorithm is proposed to solve the coverage problem of the target objects. The optimal number of sensor nodes starts from fewer randomly deployed nodes and increases gradually in subsequence generations. The performance of the proposed genetic algorithm was evaluated, and the simulation results show that this approach can cover all the target objects as well as minimize the number of additional mobile sensor nodes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Obstacle Avoidance by Distributed Algorithm based on Reinforcement Learning (RESEARCH NOTE)

In this paper we focus on the application of reinforcement learning to obstacle avoidance in dynamic Environments in wireless sensor networks. A distributed algorithm based on reinforcement learning is developed for sensor networks to guide mobile robot through the dynamic obstacles. The sensor network models the danger of the area under coverage as obstacles, and has the property of adoption o...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Target Tracking with Unknown Maneuvers Using Adaptive Parameter Estimation in Wireless Sensor Networks

Abstract- Tracking a target which is sensed by a collection of randomly deployed, limited-capacity, and short-ranged sensors is a tricky problem and, yet applicable to the empirical world. In this paper, this challenge has been addressed a by introducing a nested algorithm to track a maneuvering target entering the sensor field. In the proposed nested algorithm, different modules are to fulfill...

متن کامل

Energy-Saving in Wireless Sensor Networks Based on Optimization Sink Movement Control

A sensor network is made up of a large number of sensors with limited energy. Sensors collect environmental data then send them to the sink. Energy efficiency and thereby increasing the lifetime of sensor networks is important. Direct transfer of the data from each node to the central station will increase energy consumption. Previous research has shown that the organization of nodes in cluster...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCP

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2015