Jin Zhang, Daxin Liu, Yuezhu Xu, Meng Zhao, Wenhui Zhao
{"title":"Potential Target Traversing Detection Algorithm Based on Voronoi Diagram","authors":"Jin Zhang, Daxin Liu, Yuezhu Xu, Meng Zhao, Wenhui Zhao","doi":"10.1109/ICICSE.2008.41","DOIUrl":null,"url":null,"abstract":"In a wireless sensor network, sensors are scattered randomly by aircraft or rocket ejection. On account of scattered randomness, there may be sparse areas of sensors, in which, sensors cannot detect every hole and corner. Aimed at the region coverage, from another profile, the paper analyses and explains that the randomness of sensor scattered and the limitation of sensor monitor capability lead the appearance of potential traversing path in the whole wireless sensor network, and proposes the potential target traversing detection algorithm based on Voronoi diagram and corresponding solution. Through the analysis of experimental results, the feasibility and the validity of the detection algorithm are proved, and the potential risk can be made up by corresponding solution.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Internet Computing in Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICSE.2008.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In a wireless sensor network, sensors are scattered randomly by aircraft or rocket ejection. On account of scattered randomness, there may be sparse areas of sensors, in which, sensors cannot detect every hole and corner. Aimed at the region coverage, from another profile, the paper analyses and explains that the randomness of sensor scattered and the limitation of sensor monitor capability lead the appearance of potential traversing path in the whole wireless sensor network, and proposes the potential target traversing detection algorithm based on Voronoi diagram and corresponding solution. Through the analysis of experimental results, the feasibility and the validity of the detection algorithm are proved, and the potential risk can be made up by corresponding solution.