{"id":"https://openalex.org/W2960838029","doi":"https://doi.org/10.1109/icc.2019.8761717","title":"Traffic Aware Wireless Visual Sensor Network Deployment for 3D Indoor Monitoring","display_name":"Traffic Aware Wireless Visual Sensor Network Deployment for 3D Indoor Monitoring","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2960838029","doi":"https://doi.org/10.1109/icc.2019.8761717","mag":"2960838029"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101686914","display_name":"Zhonghui Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I368840534","display_name":"University of Mississippi","ror":"https://ror.org/02teq1165","country_code":"US","type":"education","lineage":["https://openalex.org/I368840534","https://openalex.org/I4210141039"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhonghui Wang","raw_affiliation_strings":["University of Mississippi, University, MS, USA"],"affiliations":[{"raw_affiliation_string":"University of Mississippi, University, MS, USA","institution_ids":["https://openalex.org/I368840534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100431183","display_name":"Feng Wang","orcid":"https://orcid.org/0000-0002-0461-6940"},"institutions":[{"id":"https://openalex.org/I368840534","display_name":"University of Mississippi","ror":"https://ror.org/02teq1165","country_code":"US","type":"education","lineage":["https://openalex.org/I368840534","https://openalex.org/I4210141039"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Feng Wang","raw_affiliation_strings":["University of Mississippi, University, MS, USA"],"affiliations":[{"raw_affiliation_string":"University of Mississippi, University, MS, USA","institution_ids":["https://openalex.org/I368840534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109430994","display_name":"Tisha Brown","orcid":null},"institutions":[{"id":"https://openalex.org/I47500176","display_name":"Belmont University","ror":"https://ror.org/033vjpd42","country_code":"US","type":"education","lineage":["https://openalex.org/I47500176"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tisha Brown","raw_affiliation_strings":["Belmont University, Nashville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Belmont University, Nashville, TN, USA","institution_ids":["https://openalex.org/I47500176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109997723","display_name":"Jianxia Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I4210103986","display_name":"Jingdong (China)","ror":"https://ror.org/01dkjkq64","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210103986"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianxia Xue","raw_affiliation_strings":["Google Inc., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Google Inc., Beijing, China","institution_ids":["https://openalex.org/I4210103986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100409967","display_name":"Jian Zhang","orcid":"https://orcid.org/0000-0002-4947-7219"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Zhang","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101686914"],"corresponding_institution_ids":["https://openalex.org/I368840534"],"apc_list":null,"apc_paid":null,"fwci":0.1769,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.52659657,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7569159865379333},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7394285202026367},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.6368594169616699},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5981320142745972},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5657488703727722},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5305616855621338},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.5210016369819641},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4482392370700836},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4476031959056854},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4223715662956238},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.41304126381874084},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40830695629119873},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3830157220363617},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3788760006427765},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14355018734931946},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07871004939079285},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07682982087135315},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07396295666694641}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7569159865379333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7394285202026367},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.6368594169616699},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5981320142745972},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5657488703727722},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5305616855621338},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.5210016369819641},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4482392370700836},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4476031959056854},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4223715662956238},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.41304126381874084},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40830695629119873},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3830157220363617},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3788760006427765},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14355018734931946},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07871004939079285},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07682982087135315},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07396295666694641},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1578708060","https://openalex.org/W1965298505","https://openalex.org/W2022406135","https://openalex.org/W2027074372","https://openalex.org/W2054856368","https://openalex.org/W2075854428","https://openalex.org/W2077026084","https://openalex.org/W2115293739","https://openalex.org/W2123690159","https://openalex.org/W2165895113","https://openalex.org/W2168452204","https://openalex.org/W2171117352","https://openalex.org/W2783703515","https://openalex.org/W6634484563"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W1827895227","https://openalex.org/W2540218377","https://openalex.org/W4285104409","https://openalex.org/W4210317843"],"abstract_inverted_index":{"Wireless":[0],"visual":[1,25,75],"sensor":[2,30,56],"networks":[3],"(WVSNs)":[4],"play":[5],"a":[6,10,160,172,177],"prominent":[7],"role":[8],"in":[9,53,94,115,129],"wide":[11],"range":[12],"of":[13,61,100,201],"applications":[14],"such":[15],"as":[16,171],"security,":[17],"military,":[18],"and":[19,72,77,164,180],"environmental":[20],"monitoring.":[21],"As":[22],"all":[23],"the":[24,37,47,59,67,78,85,92,98,101,107,124,130,139,146,153,199,210],"streaming":[26],"data":[27,48],"from":[28,46],"each":[29],"are":[31,88],"required":[32],"to":[33,36,96,134,138,144,185,208],"be":[34],"delivered":[35],"base":[38,79,140],"station":[39],"for":[40],"further":[41],"processing,":[42],"this":[43,170],"also":[44,82],"differs":[45],"aggregation":[49],"approaches":[50],"often":[51],"used":[52,114],"traditional":[54],"wireless":[55],"networks.":[57],"Therefore,":[58],"deployment":[60,189],"WVSNs":[62],"must":[63],"not":[64],"only":[65],"guarantee":[66],"3D":[68,211],"indoor":[69,212],"area":[70],"coverage":[71],"connectivity":[73],"between":[74],"sensors":[76,128,202],"station,":[80],"but":[81],"ensure":[83],"that":[84,106,126,193],"traffic":[86,147],"loads":[87],"well":[89],"balanced":[90],"among":[91],"network":[93,109,131,155],"order":[95],"prolong":[97],"lifetime":[99],"entire":[102],"network.":[103],"We":[104,142],"note":[105],"tree":[108],"topology,":[110,156],"which":[111],"is":[112],"widely":[113],"WSNs,":[116],"may":[117,132],"yield":[118],"sub-optimal":[119],"results,":[120],"since":[121],"it":[122,158],"eliminates":[123],"opportunities":[125],"some":[127],"connect":[133],"multiple":[135],"neighbors":[136],"closer":[137],"station.":[141],"propose":[143],"optimize":[145],"load":[148,206],"balance":[149,207],"by":[150],"working":[151],"on":[152],"full":[154],"transforming":[157],"into":[159],"generalized":[161],"max-flow":[162],"problem":[163],"proposing":[165],"an":[166,181],"efficient":[167],"solution.":[168],"With":[169],"building":[173],"block,":[174],"we":[175],"develop":[176],"greedy":[178],"heuristic":[179],"enhanced":[182],"DFS":[183],"algorithm":[184],"address":[186],"traffic-aware":[187],"WVSN":[188],"problem.":[190],"Simulations":[191],"demonstrate":[192],"our":[194],"solutions":[195],"can":[196],"significantly":[197],"reduce":[198],"number":[200],"while":[203],"achieving":[204],"excellent":[205],"cover":[209],"monitoring":[213],"space.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
