|Appears in Collections:||Computing Science and Mathematics Journal Articles|
|Peer Review Status:||Refereed|
|Title:||Localised alpha-shape computations for boundary recognition in sensor networks|
Mouftah, Hussein T
|Citation:||Fayed M & Mouftah HT (2009) Localised alpha-shape computations for boundary recognition in sensor networks, Ad Hoc Networks, 7 (6), pp. 1259-1269.|
|Abstract:||Intuitively, many wireless and sensing applications benefit from knowledge of network boundaries. Many virtual coordinate constructions rely on the furthest set of nodes as beacons. Network edges may also bound routing holes in the network, regions of failure due to environmental effects, or indicate the need for additional deployment. In this paper we solve the edge detection problem locally using a geometric structure called the alpha-shape (αα-shape). For a disc of radius 1/α1/α, the αα-shape consists of nodes (and joining edges) that sit on the boundary of the discs that contain no other nodes in the network. In the simplest terms a node decides it is on a network boundary by asking the following question: "Do I sit on the boundary of a disc of radius 1/α1/α that contains no other nodes in the network?" We show that using only local communications our algorithm is provably correct. Boundary nodes may further participate to reduce unwanted detail. We show via simulation that our algorithm identifies meaningful boundaries even in networks of low-density and non-uniform distribution.|
|Rights:||The publisher does not allow this work to be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study.|
|Affiliation:||Computing Science - CSM Dept|
University of Ottawa
|Localised alpha-shape computations for boundary recognition in sensor networks.pdf||2.22 MB||Adobe PDF||Under Embargo until 31/12/2999 Request a copy|
Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependant on the depositor still being contactable at their original email address.
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact firstname.lastname@example.org providing details and we will remove the Work from public display in STORRE and investigate your claim.