Affiliation:
1. Nanchang University, Nanchang, Jiangxi, China
2. St. Francis Xavier University, Nova Scotia, Canada
3. University of South China, Hengyang, Hunan, China
Abstract
The improvement of coverage quality in the construction of multiple-barrier coverage is a critical problem in a wireless sensor network. In this article, we investigate the
K
-barrier coverage construction problem in passive bistatic radar sensor networks. In contrast to traditional bistatic radar networks, the transmitters in a passive bistatic radar network are predeployed and noncooperative. To construct
K
barriers, we need to deploy receivers that couple with predeployed transmitters to build continuous barriers. In this work, we focus on the minimum number of receivers problem of constructing
K
-barrier coverage, where the minimum number of receivers is based on the predeployed transmitters. To handle this problem, we first investigate the optimal placement of receivers between adjacent transmitters for a sub-barrier formation and then determine the optimal placement of receivers for the one-barrier construction. For multiple-barrier coverage construction, we introduce a weighted transmitter graph (WTG) to describe the relation among different transmitters, where the weight in the graph is the minimum number of receivers needed for these two transmitters for a sub-barrier formation. Based on WTG, the minimum receivers problem changes to a problem of how to find
K
-disjoint paths with the minimum total weight in the graph. For large-scale networks, we also propose two efficient heuristic algorithms to solve the corresponding problem. Finally, we conduct extensive experiments to validate the correctness and the efficiency of the proposed algorithms.
Funder
China Scholarship Council
Natural Sciences and Engineering Research Council of Canada
Research Foundation of Education Bureau of Hunan Province
National Natural Science Foundation of China
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. SPRING: Improving the Throughput of Sharding Blockchain via Deep Reinforcement Learning Based State Placement;Proceedings of the ACM Web Conference 2024;2024-05-13
3. The Sword of Damocles: Upgradeable Smart Contract in Ethereum;Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension;2024-04-15
4. SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network;Proceedings of the IEEE/ACM 46th International Conference on Software Engineering;2024-04-12
5. Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers;Proceedings of the IEEE/ACM 46th International Conference on Software Engineering;2024-04-12