{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:44:27Z","timestamp":1740141867082,"version":"3.37.3"},"reference-count":25,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100007750","name":"National Cheng Kung University","doi-asserted-by":"crossref","award":["D102-23015","D102-15103"],"award-info":[{"award-number":["D102-23015","D102-15103"]}],"id":[{"id":"10.13039\/501100007750","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007750","name":"National Cheng Kung University","doi-asserted-by":"crossref","award":["D102-23015","D102-15103"],"award-info":[{"award-number":["D102-23015","D102-15103"]}],"id":[{"id":"10.13039\/501100007750","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,12,1]]},"abstract":"<jats:p> An efficient wireless sensor network (WSN) should maintain full sensing coverage and topology connectivity within its sensing field. Once holes occur due to failed sensors, the functionality and performance of the WSN will be affected. In this work, the proposed hole healing strategy aims to shorten the delivery hop count by a dynamic hole healing process in order to improve the data delivery time while maintaining the coverage ratio and topology connectivity. The criteria used to determine which hole should have the highest priority for healing in the next round include the weighted distance, angle magnitude, and depth of the hole. This study proposes a mobile robot, operating within the WSN, which carries redundant sensors to patch the holes by an optimum healing path. This path is determined based on the proposed EDPS (equally divided path selection) algorithm. Simulation results show the superiority of the proposed hole healing scheme over other general methods. <\/jats:p>","DOI":"10.1155\/2013\/790794","type":"journal-article","created":{"date-parts":[[2013,12,25]],"date-time":"2013-12-25T21:01:44Z","timestamp":1388005304000},"page":"790794","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Coverage Hole Healing Strategy with Awareness of Data Delivery Time in Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2351-1343","authenticated-orcid":false,"given":"Fu-Tian","family":"Lin","sequence":"first","affiliation":[{"name":"Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan 70101, Taiwan"},{"name":"Department of Electrical Engineering, Tung Fang Design University, Kaohsiung 82941, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2747-3150","authenticated-orcid":false,"given":"Tien-Wen","family":"Sung","sequence":"additional","affiliation":[{"name":"Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan 70101, Taiwan"},{"name":"Department of Network Multimedia Design, Hsing Kuo University, Tainan 70963, Taiwan"}]},{"given":"Chu-Sing","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan 70101, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2013,12,25]]},"reference":[{"first-page":"139","volume-title":"Proceedings of the IEEE Information Theory Workshop","author":"Pottie G. J.","key":"B1-2013-790794"},{"key":"B2-2013-790794","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"first-page":"263","volume-title":"Proceedings of the Annual ACM International Conference on Mobile Computing and Networking MobiCom","author":"Estrin D.","key":"B3-2013-790794"},{"key":"B4-2013-790794","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2010.032231"},{"key":"B5-2013-790794","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1067"},{"first-page":"1380","volume-title":"Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Meguerdichian S.","key":"B6-2013-790794"},{"key":"B7-2013-790794","doi-asserted-by":"publisher","DOI":"10.1145\/116873.116880"},{"key":"B8-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.53"},{"key":"B9-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1022"},{"key":"B10-2013-790794","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.07.003"},{"key":"B11-2013-790794","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/165498"},{"issue":"1","key":"B12-2013-790794","volume":"9","author":"Babaie S.","year":"2012","journal-title":"IJCSI International Journal of Computer Science Issues"},{"volume-title":"Proceedings of the 2nd ACM international conference on Wireless Networks and Applications (WSNA \u201903)","author":"Huang C. -F.","key":"B13-2013-790794"},{"key":"B14-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.680"},{"key":"B15-2013-790794","doi-asserted-by":"publisher","DOI":"10.1145\/2069216.2069234"},{"first-page":"529","volume-title":"Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication","author":"Zhou S.","key":"B16-2013-790794"},{"issue":"13","key":"B17-2013-790794","first-page":"2577","volume":"8","author":"Si P.","year":"2011","journal-title":"Journal of Information and Computational Science"},{"key":"B18-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.61"},{"key":"B19-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1022"},{"key":"B20-2013-790794","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/725452"},{"first-page":"246","volume-title":"Proceedings of the Workshop on High Perfomance Switching and Routing (HPSR '04)","author":"Hao B.","key":"B21-2013-790794"},{"volume-title":"Proceedings of the joint workshop on Foundations of mobile computing (DIALM\u00adPOMC '05)","author":"Funke S.","key":"B22-2013-790794"},{"key":"B23-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.29"},{"key":"B24-2013-790794","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.85"},{"key":"B25-2013-790794","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00201-4"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/790794","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/790794","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/790794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:17:52Z","timestamp":1621196272000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/790794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,1]]},"references-count":25,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2013,12,1]]}},"alternative-id":["10.1155\/2013\/790794"],"URL":"https:\/\/doi.org\/10.1155\/2013\/790794","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,12,1]]}}}