Inicio  /  Algorithms  /  Vol: 15 Par: 2 (2022)  /  Artículo
ARTÍCULO
TITULO

Algorithms for Detecting and Refining the Area of Intangible Continuous Objects for Mobile Wireless Sensor Networks

Shih-Chang Huang and Cong-Han Huang    

Resumen

Detecting the intangible continuous object (ICO) is a significant task, especially when the ICO is harmful as a toxic gas. Many studies used steady sensors to sketch the contour and find the area of the ICO. Applying the mobile sensors can further improve the precision of the detected ICO by efficiently adjusting the positions of a subset of the deployed sensors. This paper proposed two methods to figure out the area of the ICO, named Delaunay triangulation with moving sensors (MDT) and convex hull with moving sensors (MCH). First, the proposed methods divide the sensors into ICO-covered and ICO-uncovered sensors. Next, the convex hull algorithm and the Delaunay triangulation geometric architecture are applied to figure out the rough boundary of the ICO. Then, the area of the ICO is further refined by the proposed sensor moving algorithm. Simulation results show that the figured out area sizes of MDT and MCH are 135% and 102% of the actual ICO. The results are better than the planarization algorithms Gabriel Graph (GG) and Delaunay triangulation without moving sensors, that amount to 137% and 145% of the actual ICO. The simulation also evaluates the impact of the sensors? moving step size to find the compromise between the accuracy of the area and the convergence time of area refinement.

 Artículos similares

       
 
Beatriz Soares, Carolina Gouveia, Daniel Albuquerque and Pedro Pinho    
The Bio-Radar system, useful for monitoring patients with infectious diseases and detecting driver drowsiness, has gained popularity in the literature. However, its efficiency across diverse populations considering physiological and body stature variatio... ver más
Revista: Applied Sciences

 
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay    
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti... ver más
Revista: Applied Sciences

 
Yongzhen Zhang, Yanbo Hui, Ying Zhou, Juanjuan Liu, Ju Gao, Xiaoliang Wang, Baiwei Wang, Mengqi Xie and Haonan Hou    
Moldy corn produces aflatoxin and gibberellin, which can have adverse effects on human health if consumed. Mold is a significant factor that affects the safe storage of corn. If not detected and controlled in a timely manner, it will result in substantia... ver más
Revista: Applied Sciences

 
Wenxiao Cao, Guoming Li, Hongfei Song, Boyu Quan and Zilu Liu    
Water control of grain has always been a crucial link in storage and transportation. The resistance method is considered an effective technique for quickly detecting moisture in grains, making it particularly valuable in practical applications at drying ... ver más
Revista: Applied Sciences

 
Zahra Ameli, Shabnam Jafarpoor Nesheli and Eric N. Landis    
The application of deep learning (DL) algorithms has become of great interest in recent years due to their superior performance in structural damage identification, including the detection of corrosion. There has been growing interest in the application ... ver más
Revista: Infrastructures