Self-deployment algorithms for mobile sensors networks
2005-03-31
Loading...
View/Download File
Persistent link to this item
Statistics
View StatisticsJournal Title
Journal ISSN
Volume Title
Title
Self-deployment algorithms for mobile sensors networks
Alternative title
Authors
Published Date
2005-03-31
Publisher
Type
Report
Abstract
Large and sophisticated networks of sensors are being developed and deployed in a variety of environments, from military surveillance, to environmental monitoring, and smart spaces. Adding mobility to sensors, by placing them on robots, can make the sensors more useful but at the cost of adding new challenges.
We focus on the problem of automated deployment of the sensors, in particular on how to disperse a group of robots in an unknown environment so as to cover the environment as much as possible while staying within communications range. We assume there is no central control, the robots operate independently, and the only communications among them are to ensure they are within communication range. Whenever a robot loses communication, it moves to attempt to regain communication.
We evaluate different algorithms based on the percentage of the environment that the group of robots succeeds in observing, the percentage of time the robots are within communications range, and how long it takes for them to reacquire communication.
Keywords
Description
Related to
Replaces
License
Series/Report Number
Technical Report; 05-006
Funding information
Isbn identifier
Doi identifier
Previously Published Citation
Other identifiers
Suggested citation
Lapoint, Monica; Gini, Maria. (2005). Self-deployment algorithms for mobile sensors networks. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/215648.
Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.