Optimal Sensor Treatment in a Survey of Micro-Electro Mechanical Systems for WSN Holes

Authors

  • M. John Basha
  • I. Ambika
  • Santhosh S

DOI:

https://doi.org/10.52783/jns.v14.3002

Keywords:

WSN Holes, GPS, data transfer, sensing range, optimization

Abstract

Area coverage in wireless sensor networks (WSN) is a non-trivial undertaking due to misunderstanding of the comparatively tiny sensor node (SN) required to protect a study area, as well as the restrictions of energy reserve, control, and communiqué ranges. A crucial factor in any WSN's successful functioning is WSN performance in terms of area-coverage optimization. The present state of WSN hole research is examined, as well as the relative benefits and downsides of the many solutions put out to address different kinds of holes. The distributed techniques presented in this paper allow nodes to cooperate autonomously and find coverage holes. Keywords—component, formatting, style, styling, insert Planning for research articles took into account node type, distribution method, data transfer and sensing range, comprehensive coverage tracking, and GPS methodology.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

A. Al-Hourani, S. Kandeepan, and A. Jamalipour, “Modeling air-toground path loss for low altitude platforms in urban environments,” in IEEE Global Communications Conference (GLOBECOM), Dec 2014, pp. 2898–2904.

A. Al-Hourani, S. Kandeepan, and S. Lardner, “Optimal LAP altitude for maximum coverage,” IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 569–572, Dec 2014.

Kumaresan, T., Saravanakumar, S., & Balamurugan, R. (2019). Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine. Cluster Computing, 22(Suppl 1), 33-46.

M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs,” 2015. [Online]. Available: http://arxiv.org/abs/1509.01187

Saravanan, T., Saravanakumar, S., Rathinam, G. O. P. A. L., Narayanan, M., Poongothai, T., Patra, P. S. K., & Sengan, S. U. D. H. A. K. A. R. (2022). Malicious attack alleviation using improved time-based dimensional traffic pattern generation in uwsn. Journal of Theoretical and Applied Information Technology, 100(3), 682-689.

“Drone small cells in the clouds: Design, deployment and performance analysis,” in IEEE Global Communications Conference (GLOBECOM), Dec 2015, pp. 1–6.

R.I. Bor Yaliniz, A. El-keyi, and H. Yanikomeroglu, “Efficient 3-D placement of an aerial base station in next generation cellular networks,” in IEEE International Conference on Communications (ICC), May 2016. [Online]. https://arxiv.org/abs/1603.00300.

H. Ghazzai, E. Yaacoub, M.S. Alouini, Z. Dawy, and A. Abu-Dayya, “Optimized LTE cell planning with varying spatial and temporal user densities,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1575–1589, March 2016.

Saravanakumar, S., & Thangaraj, P. (2019). A computer aided diagnosis system for identifying Alzheimer’s from MRI scan using improved Adaboost. Journal of medical systems, 43(3), 76. Saravanan, T., & Saravanakumar, S. (2022). Enhancing investigations in data migration and security using sequence cover cat and cover particle swarm optimization in the fog paradigm. International Journal of Intelligent Networks, 3, 204-212.

D. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, ser. Artificial Intelligence. AddisonWesley Publishing Company, 1989. [Online]. Available: https://books.google.ca/books?id=3_RQAAAAMAAJ

Saravanakumar, S. (2020). Certain analysis of authentic user behavioral and opinion pattern mining using classification techniques. Solid State Technology, 63(6), 9220-9234.

S. Kirkpatrick, C.D. Gelatt, and M.P. Vecchi, “Optimization by simulated annealing,” Science, vol. 220, no. 4598, pp. 671–680, 1983. [Online] http://science.sciencemag.org/content/220/4598/671.

J. Kennedy and R. Eberhart, “Particle swarm optimization,” in IEEE International Conference on Neural Networks, vol. 4, Nov 1995, pp. 1942–1948.

F. Glover and M. Laguna, Tabu Search. Norwell, MA, USA: Kluwer Academic Publishers, 1997.

Saravanakumar, S., & Saravanan, T. (2023). Secure personal authentication in fog devices via multimodal rank‐level fusion. Concurrency and Computation: Practice and Experience, 35(10), e7673.

M. Dorigo, V. Maniezzo, and A. Colorni, “Ant system: optimization by a colony of cooperating agents,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 26, no. 1, pp. 29–41, Feb 1996.

Thangavel, S., & Selvaraj, S. (2023). Machine Learning Model and Cuckoo Search in a modular system to identify Alzheimer’s disease from MRI scan images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 11(5), 1753-1761.

Downloads

Published

2025-04-04

How to Cite

1.
Basha MJ, Ambika I, S S. Optimal Sensor Treatment in a Survey of Micro-Electro Mechanical Systems for WSN Holes. J Neonatal Surg [Internet]. 2025Apr.4 [cited 2025Sep.21];14(11S):411-6. Available from: https://jneonatalsurg.com/index.php/jns/article/view/3002