{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:27Z","timestamp":1740141807856,"version":"3.37.3"},"reference-count":34,"publisher":"SAGE Publications","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["TIN2012-38341-C04-04","621353"],"award-info":[{"award-number":["TIN2012-38341-C04-04","621353"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["TIN2012-38341-C04-04","621353"],"award-info":[{"award-number":["TIN2012-38341-C04-04","621353"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"crossref","award":["TIN2012-38341-C04-04","621353"],"award-info":[{"award-number":["TIN2012-38341-C04-04","621353"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"crossref"}]},{"name":"EU ARTEMIS JU funding","award":["TIN2012-38341-C04-04","621353"],"award-info":[{"award-number":["TIN2012-38341-C04-04","621353"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>Disaster management is one of the most relevant application fields of wireless sensor networks. In this application, the role of the sensor network usually consists of obtaining a representation or a model of a physical phenomenon spreading through the affected area. In this work we focus on forest firefighting operations, proposing three fully distributed ways for approximating the actual shape of the fire. In the simplest approach, a circular burnt area is assumed around each node that has detected the fire and the union of these circles gives the overall fire\u2019s shape. However, as this approach makes an intensive use of the wireless sensor network resources, we have proposed to incorporate two in-network aggregation techniques, which do not require considering the complete set of fire detections. The first technique models the fire by means of a complex shape composed of multiple convex hulls representing different burning areas, while the second technique uses a set of arbitrary polygons. Performance evaluation of realistic fire models on computer simulations reveals that the method based on arbitrary polygons obtains an improvement of 20% in terms of accuracy of the fire shape approximation, reducing the overhead in-network resources to 10% in the best case.<\/jats:p>","DOI":"10.1155\/2015\/964564","type":"journal-article","created":{"date-parts":[[2015,10,4]],"date-time":"2015-10-04T21:07:21Z","timestamp":1443992841000},"page":"1-18","source":"Crossref","is-referenced-by-count":7,"title":["Distributed Forest Fire Monitoring Using Wireless Sensor Networks"],"prefix":"10.1177","volume":"2015","author":[{"given":"M. \u00c1ngeles","family":"Serna","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Casado","sequence":"additional","affiliation":[]},{"given":"Aurelio","family":"Berm\u00fadez","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tennina","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"year":"2009","key":"35"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1108\/meq-09-2012-0058"},{"volume-title":"Wildland fire preparedness in Greece and Cyprus; lessons learnt from the catastrophic fires of 2007 and beyond","year":"2013","key":"11"},{"key":"2","doi-asserted-by":"crossref","first-page":"1188","DOI":"10.1016\/S0924-9338(11)72893-0","volume":"26","year":"2011","journal-title":"European Psychiatry"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/s0140-6736(08)60163-4"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.atmosenv.2009.04.010"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2011.06.028"},{"first-page":"61","volume-title":"Environmental problems caused by fires and fire-fighting agents","year":"1994","key":"29"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2010.5434381"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.3390\/s90705664"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.03.003"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00007-6"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2010.034065"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2012.032612.112345"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70741"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-010-7075-2"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/bf00133570"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.024"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2010.5434384"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/597368"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3390\/s90805878"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2012.03.002"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.104"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1071\/wf11168"},{"issue":"3-4","key":"28","first-page":"169","volume":"7","year":"2009","journal-title":"Ad-Hoc & Sensor Wireless Networks"},{"issue":"12","key":"31","first-page":"187","volume":"2","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.3390\/s91108722"},{"issue":"9","key":"61","first-page":"124","volume":"6","year":"2006","journal-title":"International Journal of Computer Science and Network Security"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40066-7_9"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.018"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.5772\/38731"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1504\/ijsnet.2009.029391"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2006.010831"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1098-6"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/964564.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/964564.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/964564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T23:14:10Z","timestamp":1589584450000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/ijdsn\/2015\/964564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":34,"alternative-id":["964564","964564"],"URL":"https:\/\/doi.org\/10.1155\/2015\/964564","relation":{},"ISSN":["1550-1329","1550-1477"],"issn-type":[{"type":"print","value":"1550-1329"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015]]}}}