An adaptive algorithm for charger deployment optimization in wireless rechargeable sensor networks

Ji Hau Liao, Chi Ming Hong, Jehn Ruey Jiang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

Wireless chargers are used to refill sensors' power supply in a wireless rechargeable sensor network (WRSN) so that the WRSN can operate sustainably. Since wireless chargers are costly, the problem about how to deploy as few as possible chargers to make a WRSN sustainable is important. This paper proposes a greedy algorithm, named adaptive pair based greedy cone selection (APB-GCS), to consider the Friis propagation model for solving the problem under the assumption that chargers are equipped with directional antennas and can be deployed on grid points at a fixed height and that the sensors are deployed on the floor or object surfaces. According to simulation results, the APB-GCS algorithm outperforms others in terms of the number of deployed chargers with moderate computation complexity.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Stephen Jenn-Hwa Yang, Han-Chieh Chao
PublisherIOS Press
Pages2080-2089
Number of pages10
ISBN (Electronic)9781614994831
DOIs
StatePublished - 2015
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan
Duration: 12 Dec 201414 Dec 2014

Publication series

NameFrontiers in Artificial Intelligence and Applications
Volume274
ISSN (Print)0922-6389

Conference

ConferenceInternational Computer Symposium, ICS 2014
Country/TerritoryTaiwan
CityTaichung
Period12/12/1414/12/14

Keywords

  • charger deployment
  • directional antennas
  • Friis propagation model
  • greedy algorithms
  • sustainability
  • wireless rechargeable sensor networks

Fingerprint

Dive into the research topics of 'An adaptive algorithm for charger deployment optimization in wireless rechargeable sensor networks'. Together they form a unique fingerprint.

Cite this