Skip to Content
ElectronicsElectronics
  • Article
  • Open Access

25 March 2022

A Convolution Location Method for Multi-Node Scheduling in Wireless Sensor Networks

,
and
1
School of Information Engineering, Zhengzhou University, No. 75, North University Road, Zhengzhou 450001, China
2
Nanyang Institute of Technology, No. 80, Changjiang Road, Nanyang 473000, China
3
Super Computer Center of Henan Province, Zhengzhou 450001, China
4
College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China

Abstract

The localization of continuous objects and the scheduling of resources are challenging issues in wireless sensor networks (WSNs). Due to the irregular shape of the continuous target area and the sensor deployment in WSNs, the sensor data are always discrete and sparse, and most network resources are also limited by the node energy. To achieve faster detection and tracking of continuous objects, we propose a convolution-based continuous object localization algorithm (named CCOL). Moreover, we implement the idea of greedy and dynamic programming to design an energy-saving and efficient strategy model (named MSSM) to respond to emergencies caused by multiple continuous targets in most specific WSNs. The simulation experiments demonstrate that CCOL is superior to other localization algorithms in terms of time complexity and execution performance. Furthermore, the feasibility of the multinode scheduling strategy is verified by setting different mobile nodes to respond to the target area in certain green WSNs.

1. Introduction

The application of wireless sensor networks (WSNs) has been promoted and popularized [1] in daily life. WSNs can cover a vast monitoring area [2] and produce a number of data from numerous sensors in a compact manner [3,4]. WSNs usually remotely sense sensitive events or targets to complete tasks of special functions (forest fire warning, environment monitoring, atmospheric pollutant detection, gas leakage monitoring, data collection of smart cities and predictions, etc.) [5].
However, the discreteness of sensing data makes the detection and localization of continuous target(s) a challenging and topical issue. For example, to detect the leakage of toxic gas in real time, deployed sensors sense the context of the concentration of different areas at different times [6]. Due to the unbalanced density and random sampling of sensors, the collected data are usually discontinuous [7], especially for large monitoring areas with a limited number of sensors (monitoring of marine pollutants in the sea or fire monitoring in the forest, etc.). However, the continuous objects in WSNs, such as toxic gases or streams of people, are still maintained in an integrated state, so deviations and errors commonly appear during target detection [8,9]. For these reasons, it is valuable to detect emergencies rapidly and perform some imperative work in many special scenarios of WSNs.
Studies have mainly focused on improving the positioning and accuracy of the edge area for continuous target detection in wireless sensor networks. Most algorithms are based on geometric theories, such as planarization [6], and downsize the target area by analyzing the data of boundary sensor nodes [7]. For instance, Z. Zhou et al. proposed an iterative method to precisely achieve the target edge [10] by repeatedly updating the candidate nodes to boundary nodes.
B. Liu et al. provided an interpolating and inserting virtual sensor node algorithm to improve the accuracy of the continuous object boundary region [11] by reducing the dispersion and insufficiency of boundary data.
Additionally, service scheduling is one of the important approaches for green computing in WSNs. Scheduling is a balanced problem between effectively addressing emergencies of sensitive areas and saving energy during target location. A few low-latency, efficient algorithms and scheduling strategies have been proposed while slightly reducing the performance of WSNs. The sink mobility-aware node scheduling (SMNS) algorithm increases the utilization of network resources [12]. The packet scheduling algorithm improves the performance of WSNs by a protocol [13]. All of these localization methods are based on the topology of the network and the position relationship of the sensors nodes, so that the target location in WSNs depends on the structure of the network and the distribution of sensors [14]. In this paper, we establish a dynamic serving model for emergencies in WSNs and propose a scheme based on multiple mobile nodes to address sensitive areas. The research on these issues is of great significance in some practical applications, including evacuation in densely populated areas, traffic control in emergency situations, personnel control of toxic gas leakage, etc. [15,16].
Considering the irregular and sporadic shape of the continuous objects in WSNs, in this article, we focus on the boundary of the shape of targets and propose a target localization algorithm that used convolution to solve the discontinuity of data corresponding to different grids in wireless sensor networks. Furthermore, we discuss the scheduling strategy of emergency areas in WSNs and give an efficient and speedy multiple mobile node approach. The simulated results demonstrate the feasibility of the scheme. In this essay, our main work and contributions include the following:
(1) Proposing a fast method based on convolution for the positioning of continuous targets in WSNs.
(2) Putting forward a multiple mobile node dispatch model for emergencies in WSNs.
(3) Comparing the results of the algorithm performance and energy consumption of the network nodes and verifying the feasibility of the perspective.
Section 2 introduces the background of the problem and related works. Then, Section 3 explains the theoretical basis of the algorithm and the establishment of the model. The remaining sections elaborate on the core algorithms and simulation tests and prove the feasibility of the proposed scheme.

3. Problem Formulation and System Model

In this section, we mainly discuss the data processing model of the CCOL algorithm. In the initial state, each sensor node reports its position to the clusters deployed in the cloud. Then, each sensor node enters the dormant state until an emergency occurs at a certain time point, at which the node is woken up and uploads the sensor data to the sink nodes periodically or when they sense some abnormalities. According to different models, the algorithm running on the computing centers will fulfill the target localization and scheduling.

3.1. Settings for the Convolution Kernel

The settings of the convolution kernel are one of the important issues in our research. A large discrepancy in the calculation results of the original data matrix will occur when the algorithm employs different convolution kernels. The results of the operation of the original data matrix by different convolution kernels will be very different. In this essay, we take a matrix that is a K × K unit square ( K = 3 in the experiment), and the scale of the original matrix is reduced by 1 / K . However, the process of setting the value of K depends on the specific size of the WSNs. Generally, the parameter K and the coverage of WSNs are proportional. Consequently, the value of K should increase or decrease as the size of WSNs changes.
The convolution matrix can effectively compensate for the lack of data in continuous target areas. For example, a continuous target may dominate multiple grids; once the sensor in this area fails or the distribution is missing, it is not appropriate to localize the boundary solely according to real sensor data from WSNs. Convolution might merge the neighbor grids, which have no data but cover the target areas, into one element in the convolution matrix. Due to following the formula (Equation (4)), the operation will non-destructively retain the original features of the continuous targets during the whole convolution process.

3.2. Sensor Data Processing Model

The sensor data processing model converts the data collected by the sensors into a matrix for target positioning, and it can be roughly divided into the two stages listed in the following context.
(1) Mapping to the grids
Sensors are randomly distributed throughout the network in WSNs, and each sensor can correspondingly gain a value. These values are assigned to different grids in accordance with their position. Briefly, one grid is taken as the minimum unit for data processing in this paper, and the value of the grid is the cumulative sum of all sensor data in it (Equation (3)).
a i j = i x i + 1 , j y j + 1 S x y
In Equation (3), i , j is the index of the row and column of the grids, respectively; S x y is single value of the grid ( x , y ), in which the x and y are limited by i x i + 1 and j y j + 1 , respectively. Each a i j is the cumulative sum of grid ( x , y ).
(2) Sliding convolution
According to the computing method involved in Equation (3), the entire network is replaced by the following matrix in Equation (4). Each element ( a i j ) in the matrix is obtained by superposing several S x y . The sliding convolution operation serves to ensure that the CKM multiplies a matrix that has the same size as CKM and is combined by a i j . The whole calculation process is divided into two parts:
Step 1: Pre-arrangement of the matrix
Once the WSN is blocked by the default size, the number of rows or columns of the aforementioned matrix can be ensured.
a 11 a 12 a 1 ( n K ) a 21 a 22 a 2 ( n K ) a ( m K ) 1 a ( m K ) 2 a ( m K ) ( n K )
In this paper, if the number of rows and columns of the original sensor data matrix is not an integer multiple of the number of rows and columns of the CKM, it will insert certain zero rows or columns into the source matrix to facilitate subsequent operations.
For example, a 100 × 100 network is blocked by a 5 × 5 grid, which will yield a 20 × 20 matrix. If the size of CKM is 3 × 3 , we should add one zero-row and one zero-column to obtain a 7 × 7 convolution result matrix. As shown in the formula, if the CKM is a K × K square matrix, the size of the original matrix will be prepared as m K × n K .
Step 2: Convolution
During the processing of convolution, the original matrix in Equation (4) has been distributed to m × n blocks following the rule illustrated in Equation (5). Therefore, each block A i j is a K × K square matrix marked by A , and the matrix (Equation (4)) shrinks to A (Equation (6)).
A i j = a ( i × K ) ( j × K ) a ( i × K ) ( ( j + 1 ) × K 1 ) a ( i × K + 1 ) ( j × K ) a ( i × K + 1 ) ( ( j + 1 ) × K 1 ) a ( ( i + 1 ) × K 1 ) ( j × K ) a ( ( i + 1 ) × K 1 ) ( ( j + 1 ) × K 1 )
A = A 11 A 12 A 1 n A 21 A 22 A 2 n A m 1 A m 2 A m n
We symbolize the CKM as matrix C (Equation (7)), a unit square of K × K , of which all elements are 1.
C = 1 1 1 1 K × K
Equation (8) gives the calculation method of r i j , which is a numerical value that corresponds to the result of each A i j (Equation (6)) multiplied by C (Equation (7)).
r i j = i × K w ( i + 1 ) × K 1 j × K y ( j + 1 ) × K 1 a w l × c w l
Compared to the original matrix (Equation (4)), the result matrix R (Equation (9)) has the same size of A (Equation (6)). In other words, it has been shrunk by K. Therefore, this approach can solve the problem of matrix deflation.
R = r 11 r 12 r 1 n r 21 r 22 r 2 n r m 1 r m 2 r m n
R in Equation (9) is the result matrix, and each element r i j in matrix R can represent an area of ( K × g s i z e ) 2 in WSNs, where K is the number of rows of the CKM, and g s i z e is the side length of each mesh in WSNs. Then, the value of R w l can be considered as the eigenvalue of the corresponding region. Thus, when a continuous target arises in the surveillance area, a certain R w l corresponding to the target will differ with respect to the neighboring areas. Therefore, this is the primary reason that object detection can be accomplished by using this model.

3.3. Multimobile Service Node Scheduling Model (MSSM)

The MSSM refers to the treatment method in [30] and adopts a dynamic and greedy idea. Its purpose is to keep each MN as busy as possible at the same time and to reduce the waiting time for emergency events in sensitive areas. This section will describe this model in detail.
At the beginning, we make the following assumptions: S e t ( M i ) is the set of MNs, S e t ( O i ) is the set of grids of SA, and the S e t ( M k , O l ) is the set of distances from any MN to the target areas.
This model (shown in Figure 4) mainly involves the operations among S e t ( M i ) , S e t ( O i ) and S e t ( M k , O l ) . According to the minimum element of S e t ( M k , O l ) , it iterates and updates the S e t ( M i ) , and removes the element O ω from S e t ( O i ) . This process is repeated until the S e t O i = and is then terminated.
Figure 4. Multimobile service node scheduling model.
The greedy algorithm will find a suitable mobile service node and one shortest scheduling path to respond the SA, and it can also decrease the number of leisure service nodes and minimize the energy consumption throughout the scheduling process.

4. Core Algorithm

The two algorithms of CCOL and MSSM discussed in this paper address the target detection and emergency scheduling in WSNs. The following context will explain the principle and process of each algorithm.

4.1. Pretreatment of Sensor Data

The pretreatment of sensor data in WSNs contains two tasks: blocking the WSNs and rounding the numbers of the row or column of the matrix. After the preprocessing step, we gain a new blocked grid matrix. The formula of this step refers to the model in Section 3.
After padding and aligning, Algorithm 1 returns a new matrix (U_Matrix_Gridcell), whose rows and columns can be divided by the number of rows and columns of the convolution matrix. In addition, the sensor’s data are mapped to the grids.
Electronics 11 01031 i001

4.2. Convolution-Based Continuous Object Localization Algorithm (CCOL)

After the process of Algorithm 1, the sensor data are stored in Matrix_Gridcell. According to the index (i,j) in the array of R_matrix, it converts the coordinates of the first element ( m o d × i , m o d × j ) and the last element ( m o d × i + m o d , m o d × j + m o d ) of the matrix subblock involved in each convolution and then obtains the subblocks c that will take part in the convolution with k e r n e l _ m a t r i x . At the end, the result will be stored in R _ m a t r i x [ i ] [ j ] , and Algorithm 2 will return the entire array of R _ m a t r i x .
Electronics 11 01031 i002
In fact, the nonzero elements in the R_matrix should be focused on. Each nonzero element relates to an SA in WSNs, and the SAs in WSNs are marked in the R_matrix by the grid index. Therefore, the reverse process is the localization for continuous targets. For instance, one nonzero value may be mapped to an emergency (a gas disaster, the dense flow of a crowd or an abnormal environmental event and so on), and the system scheduling will take some emergency measures to react to the SA in the special scenario.

4.3. Multimobile Service Node Scheduling Algorithm (MSNS)

Following the convolution of Algorithm 2, we set an alert threshold such that S x y is either 0 or 1 (shown in Equation (10)).
S x y = 0 i f t h e t a r g e t e x i s t s 1 i f t h e t a r g e t d o e s n o t e x i s t
The data of the matrix A are accumulated by Equation (8), and the cumulative result reflects the degree of the SA emergency. Once the present threshold is reached, it will start the process of scheduling and reply to the SAs. Moreover, convolution can overcome the shortage of discreteness of sensor data in the localization such that one continuous target maybe divided into several neighboring elements in the result matrix. Therefore, this condition provides a solution for MN scheduling. Accordingly, the dynamic scheduling algorithm is divided into two situations for different sizes of SAs:
(1) Limited in one grid
If the target is a single object (such as a car or fire point), Algorithm 3 is a special case of the multimobile service node scheduling algorithm. The sensitive area corresponding to the target is so small that there is only one grid corresponding to it. In this case, the scheme is relatively simple: we simply select a node that is closest to the SA with the most energy to provide services. The detailed algorithm is described in the following (Algorithm 3).
Electronics 11 01031 i003
Once the SA is served by the MN, this service node will move to the area marked by min_info that corresponds to the emergency. Moreover, it updates the remnant of energy and the current position.
(2) Covering many grids
Algorithm 4 is a general case of multimobile service node scheduling. The SA always exists throughout several grids and has an irregular shape.
Convolution will map the target to some adjacent grids whose values exceed the threshold, which will greatly narrow the search range of the target area. This effect could increase the efficiency of the emergency response capability in coupling with the MSNS algorithm. The details of Algorithm 4 are as follows.
The difference between Algorithms 3 and 4 is that line 19 (Algorithm 4) takes some threads to serve the SAs, and the rest of them are almost the same.
Electronics 11 01031 i004

5. Experimental Simulation and Analysis

Based on the aforementioned discussion, simulation and verification of the experiment are proposed in this section. We compare the performance of CCOL to the G-G and RNG, analyze the consumption of different strategies, and prove the feasibility of the algorithm proposed in the article.

5.1. Simulation Experiment

The experiment simulates a 500 × 500 wireless sensor network that randomly deploys 300 sensors. The 500 × 500 network represent a region related to the size of the grid, we do regard it as a residential area or an urban area. Without loss of generality, 300 sensors are assigned to different grids randomly. In the program, there is a variable length list of MNs, in which the position and the remaining energy of the node are stored. The size of the grid is 20 × 20 , so the whole network is divided into 25 × 25 grids, and a square matrix of which all elements are 1 is appointed as the CKM. The detailed experimental process is as follows:
Step 1: Sensor maps to the grid
The position of the sensors is random. To facilitate the sliding convolution, sensor data need to be preprocessed at the beginning. According to Algorithm 1, the network ( 25 × 25 ) is expanded with different kernel matrices. In our experiment, we takes two CKMs ( 2 × 2 or 3 × 3 ) to deal with data grid corresponding to the original network.
Step 2: Convolution with the CKM
The processed data in the matrix are convolved with the 3 × 3 operator and generate a result matrix that is only one-third of the original grid matrix.
Step 3: Localization of the SA
If there are some values that exceed the threshold, the program will revert to the original position from the location of exceeded values.
Step 4: Scheduling MNs
In the above steps, the SAs in WSNs are detected. A dynamic and greedy scheme is implemented, and several MNs in the list should be selected to respond to the different SAs (Algorithms 3 and 4).

5.2. Results of the Experiment

(1) Data of the matrix
The cumulative sum determines the data in each grid, each sensor will be set to a random value (0 or 1), and then, we accumulate the results in one grid unit that has the important reference data in the target localization.
Figure 5 presents a visual representation of the matrix ( 25 × 25 ), and grid areas without sensors are indicated by black, while the gray denotes the areas with sensors. Then, the program can judge whether the value of the grid exceeds the threshold.
Figure 5. Original data grid.
According to the steps in Section 5.1, different CKMs need different sizes of Prepossessed data grid. As shown in Figure 6a is the pre-processing matrix required by the 2 × 2 CKM, and Figure 6b is the pre-processing matrix required by the 3 × 3 CKM.
Figure 6. Data of grid. (a,b) is different pre-processing results with different CKMs, there is one more blank row and column a than that of b. (a) Pre-processing data grid with 2 × 2 kernel. (b) Pre-processing data grid with 3 × 3 kernel.
(2) Localization of SAs
In the experiment, we assume the warning threshold is 3. The grids whose value reaches the threshold are indicated in these matrix. As shown in Figure 7, when we take 2 × 2 and 3 × 3 CKM, the position, number and the areas of targets in the grid are various.
Figure 7. Convolution result matrix. Because of the various sizes of CKM, the number of row and column of result matrices is different. (a) Convolution result Matrix with 2 × 2 kernel. (b) Convolution result Matrix with 3 × 3 kernel.
In Figure 7a,b, the darker areas are the SAs whose value exceeds the threshold, and they are the areas that we should closely monitor. The lighter areas and the blank areas are the SAs whose value does not reach the threshold, and we should not pay attention to these areas. Obviously, the darker areas in Figure 7a,b respond the range of the SAs are not equal. Therefore, the smaller the convolution kernel, the more accurate the positioning accuracy should be in theory. When the size of CKM is increases, the its corresponding area also becomes larger, and the positioning accuracy decreases.
According to the CCOL algorithm, we can get darker areas shown in Figure 8. Each darker region corresponds to a certain area in Figure 7, this process is the inverse of CCOL. So we can mark the darker areas by red dotted lines in Figure 8.
Figure 8. Marked SAs. (a) Marked SAs with 2 × 2 kernel. (b) Marked SAs with 3 × 3 kernel.
In Figure 8, the continuous targets can be distinguished by the darker grids, since they usually are localized by a series of irregular contiguous darker grids because of differences in shapes or sizes. Figure 8a,b are the location of SAs marked by different CKMs in the original network.
(3) Selecting Service nodes and Scheduling Paths
As a result of the aforementioned steps, they have proved that the size of CKM could impact the accuracy of target location in WSNs. However, the improvement of accuracy will inevitably increase the calculation of convolution operation. Therefore, a optimal CKM is very necessary. In order to verify the method mentioned above, we design a multi-node service scheduling. The scheduling with various numbers (1, 2, 4, and 8) of MNs serves the SAs in Figure 8, so we can plan the paths of MNs and record the energy consumption under different policies. We take Figure 8b as an example, and find 19 SAs that need to be served in total. The following is the path selection of different numbers of MNs.
  • Path for a single node
The position of the single node was randomly set at ( 2.3 , 5.01 ) , according to the strategy and distribution of WSN, and its mobile path is drawn in Figure 9 by blue arrows.
Figure 9. Path of a single node.
  • Path for double nodes
If there are two service nodes, their position is set at ( 2.3 , 5.01 ) and ( 250 , 258.85 ) . Since the same scheme is used, 19 SAs in Figure 8b were responded to. One of the nodes deals with 8 SAs, and the other node served 11 SAs. Their paths are drawn by different lines in Figure 10.
Figure 10. Path of a double node.
When the number of nodes increases to 4 or 8, the experimental results are similar to the above two cases, so we do not describe them redundantly.

5.3. Comparison and Analysis

In this section, the CCOLis compared with G-G and RNG algorithms, the depletion of each stratagem is counted, and the advantage and feasibility of the solution proposed in this essay are analyzed.
(1) Time Complexity
G-G and RNG are classical algorithms among the target localization approaches in WSNs, and a rough boundary can be found by them, similar to the CCOL. However, the CCOL is better than others in terms of the cost of time or execution. In Table 1, we find the merits of CCOL.
Table 1. Performance comparison.
(i) G-G is lower than CCOL in terms of time complexity. However, the cost of the G-G is much more than the others because of the recursive call.
(ii) However, while RNG executes in the same manner as CCOL, the time complexity of O ( n 3 ) is higher than that of G-G and CCOL.
What needs to be emphasized is that G-G and RNG are based on geometry theory; however, the CCOL is generally based on grids. There may be some differences between them. If we want to obtain more accurate SAs, a precise algorithm must be employed to address the results of these algorithms.
Despite the advantages of CCOL compared with G-G and RNG, CCOL’s time complexity is still O ( n 2 ) which can be further optimized, while CCOL is usually deployed on high-performance devices such as remote servers or edge servers, considering the low-coupling correlation of grid data in the convolution process, parallelized program may be a better optimization solution whose time complexity is not changed nevertheless.
(2) Energy consumption of the WSN
In comparison to other algorithms, the CCOL proposed in this article might prolong the lifetime of the network. All of the WSNs will lose the same energy to complete the collection, transmission and so on. In the same network topology, other algorithms increasingly need more nodes to participate, but the CCOL does not. Most jobs of CCOL are finished on the center nodes or cloud servers; therefore, it is not necessary for any nodes to cooperate. Consequently, this approach could improve the utilization of the sensors in WSNs.
(3) Energy Comparison of MNs
In the experiment in this essay, each node is set at 4000 points as the initial energy, and the energy consumption is calculated according to the distance ( E ( d ) = d i s ( p 1 , p 2 ) ) from the service node to the SA. Figure 11 is the energy change of different numbers of nodes. Judging from the changing trend, as the number of mobile nodes increases, their total energy consumption tends to decrease dramatically.
Figure 11. Trend of energy consumption.
(i) The change is obvious from 1 to 4, but this trend becomes gentle with the increase in the number of nodes.
(ii) When the number of MNs reaches 8, there are two service nodes that are not working, which is a waste of resources.
Given all of the above, the advantages of the algorithm of CCOL and the MSNS are manifest, and they are also feasible in practical applications. The experimental data also support this viewpoint; however, there are some promotion and improvements for CCOL and MSNS. For example, although CCOL could acquire the position of the continuous targets efficiently in the network based on the data on the sensors in the grid, the accuracy of the target boundary depends on the resolution of the mesh. In other words, if the resolution is small, the area covered by the grid become too large, respectively, which may cause a large error in the contour of the continuous target, but this defect will be avoided by increasing the resolution of the grid; In addition, the performance of the greedy node scheduling algorithm is restricted by the number of target area and nodes participating in the scheduling, and MSNS is difficult to adapt to certain special scenario such as constantly changing networks or unknown number of available resources, and so on. Therefore, a more flexible and optimized algorithm is desired in the follow-up work. We are preparing to use interpolation to improve our algorithm to reduce the impact of mesh roughness on positioning accuracy.

6. Conclusions

This essay proposes a convolution-based localization method and multi-mobile service node scheduling approach that are applied to continuous targets in WSNs. From the simulation experiment, the method and approach show potential in effectively solving the above problems. The main conclusions can be summarized in the following aspects:
(1) Convolution can conveniently address the issue of matrix deflation in WSNs.
(2) At a certain network scale, the number of mobile nodes that can be utilized in schedules can be found in a reasonable interval.
(3) There is some information loss during the convolution, but the degree is related to the size of the CKM.
Ultimately, although the localization and detection of continuous targets is a challenging issue in WSNs, this paper introduces convolution into continuous target localization and demonstrates the rationality of this approach. This type of method might also play a more efficient role in sensor data processing and fusion with the development of self-learning and AI in WSNs. However, there are a few limitations in CCOL and the current multi-node scheduling model that demand future research effort. Firstly, in order to delineate the position of the continuous targets more accurately in WSNs, some algorithms to refine the boundary of targets should be intensely studied in the following works, which can enhance the application value of CCOL in practice. Secondly, it is necessary to explore a dynamic model that can adapt to more complex network scheduling by improving the existing model (MSSM), so that the constraint relationship between the network scale, the number of targets and the number of nodes participating in the scheduling should be formulated precisely in our future research.

Author Contributions

P.H.: Conceptualization, Methodology, Software and Writing—original draft preparation. J.S.: Methodology, Supervision, and Project administration. J.-S.P.: Data curation, Writing—review and editing, Formal analysis and Resources. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Key Science and Technology Research of Henan Province, China (Grant No. 212102210516).

Institutional Review Board Statement

This study did not involve humans or animals.

Data Availability Statement

All data, models, and code generated or used during the study appear in the submitted article.

Conflicts of Interest

The authors declare no conflict of interest, and the funders had no role in the design of the study.

References

  1. Ramson, S.J.; Moni, D.J. Applications of wireless sensor networks—A survey. In Proceedings of the 2017 International Conference on Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), Coimbatore, India, 3–4 February 2017; pp. 325–329. [Google Scholar]
  2. Bakaraniya, P.; Mehta, S. Features of wsn and various routing techniques for wsn: A survey. Int. J. Res. Eng. Technol. 2012, 1, 349–354. [Google Scholar]
  3. Chu, S.C.; Xu, X.W.; Yang, S.Y.; Pan, J.S. Parallel fish migration optimization with compact technology based on memory principle for wireless sensor networks. Knowl.-Based Syst. 2022, 241, 108124. [Google Scholar] [CrossRef]
  4. Zhang, S.; Fan, F.; Li, W.; Chu, S.C.; Pan, J.S. A parallel compact sine cosine algorithm for TDOA localization of wireless sensor network. Telecommun. Syst. 2021, 78, 213–223. [Google Scholar] [CrossRef]
  5. Harb, H.; Makhoul, A.; Laiymani, D.; Jaber, A. A distance-based data aggregation technique for periodic sensor networks. ACM Trans. Sens. Netw. (TOSN) 2017, 13, 1–40. [Google Scholar] [CrossRef]
  6. Shu, L.; Mukherjee, M.; Wu, X. Toxic gas boundary area detection in large-scale petrochemical plants with industrial wireless sensor networks. IEEE Commun. Mag. 2016, 54, 22–28. [Google Scholar] [CrossRef]
  7. Sun, C.; Wen, X.; Lu, Z.; Liu, X.; Jing, W.; Hu, Z. Performance Analysis of Slotted CSMA/CA in UAV-Based Data Collection Network. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  8. Song, P.C.; Chu, S.C.; Pan, J.S.; Wu, T.Y. An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks. Int. J. Ad Hoc Ubiquit. Comput. 2022, 39, 1–19. [Google Scholar] [CrossRef]
  9. Jiang, T.B.; Pan, J.S.; Gu, Y.M.; Chu, S.C. Parallel cuckoo search for cognitive wireless sensor networks. Int. J. Sens. Netw. 2021, 35, 193–205. [Google Scholar] [CrossRef]
  10. Zhou, Z.; Zhang, Y.; Yi, X.; Chen, C.; Ping, H. Accurate Boundary Detection and Refinement for Continuous Objects in IoT Sensing Networks. IEEE Commun. Mag. 2019, 57, 93–99. [Google Scholar] [CrossRef]
  11. Binbin, L.; Guangjie, H.; Hongwen, S. VNOE-based Algorithm for Continuous Target Tracking in Wireless Sensor Networks. Microprocessors 2017, 1, 53–59. [Google Scholar]
  12. Mantri, D.S.; Prasad, N.R.; Prasad, R. Sink mobility-aware node scheduling algorithm for wireless sensor network. In Proceedings of the 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), Pune, India, 2–3 December 2016; pp. 474–478. [Google Scholar]
  13. Shree, S.I.; Karthiga, M.; Mariyammal, C. Improving congestion control in WSN by multipath routing with priority based scheduling. In Proceedings of the 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 19–20 January 2017; pp. 1–6. [Google Scholar]
  14. Nguyen, T.T.; Lin, W.W.; Vo, Q.S.; Shieh, C.S. Delay aware routing based on queuing theory for wireless sensor networks. Data Sci. Patten Recognit. 2021, 5, 1–10. [Google Scholar]
  15. Chen, J.N.; Zhou, Y.P.; Huang, Z.J.; Wu, T.Y.; Zou, F.M.; Tso, R. An efficient aggregate signature scheme for healthcare wireless sensor networks. J. Netw. Intell. 2021, 6, 1–15. [Google Scholar]
  16. Wu, J.; Xu, M.; Liu, F.F.; Huang, M.; Ma, L.; Lu, Z.M. Solar Wireless Sensor Network Routing Algorithm Based on Multi-Objective Particle Swarm Optimization. J. Inf. Hiding Multim. Signal Process. 2021, 12, 1–11. [Google Scholar]
  17. Akter, M.; Rahman, M.O.; Islam, M.N.; Hassan, M.M.; Alsanad, A.; Sangaiah, A.K. Energy-efficient tracking and localization of objects in wireless sensor networks. IEEE Access 2018, 6, 17165–17177. [Google Scholar] [CrossRef]
  18. Ez-Zaidi, A.; Rakrak, S. A comparative study of target tracking approaches in wireless sensor networks. J. Sens. 2016, 2016, 3270659. [Google Scholar] [CrossRef] [Green Version]
  19. Bhat, S.J.; Santhosh, K. Is Localization of Wireless Sensor Networks in Irregular Fields a Challenge? Wirel. Pers. Commun. 2020, 114, 2017–2042. [Google Scholar] [CrossRef]
  20. Imran, S.; Ko, Y.B. A continuous object boundary detection and tracking scheme for failure-prone sensor networks. Sensors 2017, 17, 361. [Google Scholar] [CrossRef]
  21. Hu, Y.; Niu, Y.; Lam, J.; Shu, Z. An energy-efficient adaptive overlapping clustering method for dynamic continuous monitoring in WSNs. IEEE Sens. J. 2016, 17, 834–847. [Google Scholar] [CrossRef] [Green Version]
  22. Xiang, J.; Zhou, Z.; Shu, L.; Rahman, T.; Wang, Q. A mechanism filling sensing holes for detecting the boundary of continuous objects in hybrid sparse wireless sensor networks. IEEE Access 2017, 5, 7922–7935. [Google Scholar] [CrossRef]
  23. Shu, L.; Mukherjee, M.; Xu, X.; Wang, K.; Wu, X. A survey on gas leakage source detection and boundary tracking with wireless sensor networks. IEEE Access 2016, 4, 1700–1715. [Google Scholar] [CrossRef] [Green Version]
  24. Pandey, O.J.; Gautam, V.; Jha, S.; Shukla, M.K.; Hegde, R.M. Time Synchronized Node Localization Using Optimal H-Node Allocation in a Small World WSN. IEEE Commun. Lett. 2020, 24, 2579–2583. [Google Scholar] [CrossRef]
  25. Ping, H.; Zhou, Z.; Rahman, T.; Duan, Y. Localization and tracking of continuous objects boundary area leveraging planarization algorithms in duty-cycled wireless sensor networks. In Proceedings of the IECON 2017—43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 29 October–1 November 2017; pp. 8476–8481. [Google Scholar]
  26. Hadi, K. Expected nodes in target sensing area in wireless sensor networks. In Proceedings of the 2018 Annual IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 23–26 April 2018; pp. 1–5. [Google Scholar]
  27. Hadi, K. Management of target-tracking sensor networks. Int. J. Sens. Netw. 2010, 8, 109–121. [Google Scholar] [CrossRef] [Green Version]
  28. Rafiei, A.; Abolhasan, M.; Franklin, D.; Safaei, F. Boundary node selection algorithms in WSNs. In Proceedings of the 2011 IEEE 36th Conference on Local Computer Networks, Bonn, Germany, 4–7 October 2011; pp. 251–254. [Google Scholar]
  29. Ping, H.; Zhou, Z.; Shi, Z.; Rahman, T. Accurate and energy-efficient boundary detection of continuous objects in duty-cycled wireless sensor networks. Pers. Ubiquit. Comput. 2018, 22, 597–613. [Google Scholar] [CrossRef]
  30. Nicolaou, A.; Temene, N.; Sergiou, C.; Georgiou, C.; Vassiliou, V. Utilizing Mobile Nodes for Congestion Control in Wireless Sensor Networks. In Proceedings of the 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Istanbul, Turkey, 8–11 September 2019; pp. 1–7. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.