Koji Yamamoto, Hayato Ozaki, Takuya Suzuki, T. Wada, K. Mutsuura, H. Okada
{"title":"Barrier Coverage Constructions for Border Security Systems Using Wireless Sensors","authors":"Koji Yamamoto, Hayato Ozaki, Takuya Suzuki, T. Wada, K. Mutsuura, H. Okada","doi":"10.1109/ICPPW.2011.31","DOIUrl":null,"url":null,"abstract":"In this paper, we propose network construction methods of sensor nodes for Border Security Systems. A Border Security System watches intruders by using sensor nodes with communication function. The detection of some intruders and the use of a long-term operation system are required in this system. In this paper, we propose two methods to reduce the power consumption of the whole network system by effective control of sensor nodes. By computer simulation, we show that the proposed network construction methods are suitable for Border Security Systems.","PeriodicalId":173271,"journal":{"name":"2011 40th International Conference on Parallel Processing Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 40th International Conference on Parallel Processing Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPPW.2011.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In this paper, we propose network construction methods of sensor nodes for Border Security Systems. A Border Security System watches intruders by using sensor nodes with communication function. The detection of some intruders and the use of a long-term operation system are required in this system. In this paper, we propose two methods to reduce the power consumption of the whole network system by effective control of sensor nodes. By computer simulation, we show that the proposed network construction methods are suitable for Border Security Systems.