Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Coverage in Sensor Networks When Obstacles Are Present
Date
2006-01-01
Author
Onur, Ertan
Delic, Hakan
Akarun, Lale
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
148
views
0
downloads
Cite This
In this paper, we propose a method to determine the quality of deployment in a surveillance wireless sensor network in an environment that contains obstacles. The maximum detection probability on the potential breach paths is used as the deployment quality measure. The watershed segmentation algorithm is applied on the graph formed by the iso-sensing curves to identify the possible breach paths. An algorithm is proposed to convert the watershed segmentation to an auxiliary graph which is then employed to determine the deployment quality measure.
Subject Keywords
Surveillance
,
Deployment
URI
https://hdl.handle.net/11511/42569
DOI
https://doi.org/10.1109/icc.2006.255719
Collections
Department of Computer Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
Fusion of thermal- and visible-band video for abandoned object detection
Beyan, Cigdem; Yiğit, Ahmet; Temizel, Alptekin (2011-07-01)
Timely detection of packages that are left unattended in public spaces is a security concern, and rapid detection is important for prevention of potential threats. Because constant surveillance of such places is challenging and labor intensive, automated abandoned-object-detection systems aiding operators have started to be widely used. In many studies, stationary objects, such as people sitting on a bench, are also detected as suspicious objects due to abandoned items being defined as items newly added to ...
Impacts of Routing Attacks on Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Yazıcı, Adnan; Coşar, Ahmet (2015-08-25)
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed accordin...
Finding sensing coverage and breach paths in wireless sensor networks
Onur, Ertan; Delic, H (2004-01-01)
Most of the recent studies on wireless sensor networks deal with the communication coverage. However, for the surveillance wireless sensor networks, sensing coverage is an open research area. In this paper, the sensing coverage area of surveillance wireless sensor networks is studied. The sensing coverage is determined by applying Neyman-Pearson Detection Model and Dijkstra's shortest path algorithm is applied to find the weakest breach path. Although individually not enough, breach probability is an approp...
Optimized Hexagon-Based Deployment for Large-Scale Ubiquitous Sensor Networks
Al-Turjman, Fadi (2018-04-01)
Ubiquitous Sensor Network describes an application platform comprised of intelligently networked sensors deployed over a large area, supporting multiple application scenarios. On one hand, at the user-end, storing and managing the large amount of heterogeneous data generated by the network is a daunting task. On the other hand, at the network-end, ensuring network connectivity and longevity in a dynamically changing network environment, while trying to provide context-aware application data to the end-users...
Surveillance wireless sensor networks: Deployment quality analysis
Onur, Ertan; Delic, Hakan; Akarun, Lale (2007-11-01)
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of deployment can be determined sufficiently by analysis in advance of deployment. However, when random deployment is required, determining the deployment quality becomes challenging. To assess the quality of sensor deployment, appropriate measures can be employed that reveal the weaknesses in the coverage of SWSNs with respect to the suc...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
E. Onur, H. Delic, and L. Akarun, “Coverage in Sensor Networks When Obstacles Are Present,” 2006, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/42569.