{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:25:44Z","timestamp":1760243144686,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T00:00:00Z","timestamp":1439251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Jiangsu \u201cSix Level Talents Peak\u201d","award":["DZXX-026"],"award-info":[{"award-number":["DZXX-026"]}]},{"name":"2014 National Senior Researcher Fellow and Visiting Scholar by CSC"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61304264"],"award-info":[{"award-number":["61304264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Priority Academic Program Development of Jiangsu Higher Education Institutions"},{"name":"the Prospective Joint Research Projects of Jiangsu Province Joint Enterprises, Universities Innovation Fund","award":["BY2014023-31"],"award-info":[{"award-number":["BY2014023-31"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>To solve the problem of coverage performance assessment, this study proposes an evaluation method based on the trajectory of the target, which is applicable to universal sensor networks, including both heterogeneous and homogeneous sensor networks. Different from the traditional Voronoi algorithm, the proposed Improved Coverage Force Division (ICFD) plans a coverage force division map whichscales the qualitative coverage performancebasedon both covering intensities andlocations of the nodes. Furthermore, the Trajectory-based Evaluating Schedule (TES) is responsible for solving the quantitative coverage evaluationproblem by measuringthe resulting trajectories\u2019 Balance Values (BVs). A model of weak-point ranking conjoined in consideration of coverage force and distance can guide future deployment to compensate coverage. Comparative trials using the greedy algorithm, Voronoi algorithm, and the proposed TES verify that TES achieves the approximate results for two-stage and multistage heterogeneous sensor networks with acceptable difference and lower complexity, and it is superior to the Voronoi algorithm in homogeneous sensor networks interms of breaking the four-point circle block.<\/jats:p>","DOI":"10.3390\/s150819649","type":"journal-article","created":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T10:38:57Z","timestamp":1439289537000},"page":"19649-19666","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Trajectory-Based Coverage Assessment Approach for Universal Sensor Networks"],"prefix":"10.3390","volume":"15","author":[{"given":"Ningning","family":"Qin","sequence":"first","affiliation":[{"name":"Key Laboratory of Advanced Process Control for Light Industry Ministry of Education, College of IOT Engineering, Jiangnan University, Wuxi 214122, China"}]},{"given":"Xin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Advanced Process Control for Light Industry Ministry of Education, College of IOT Engineering, Jiangnan University, Wuxi 214122, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7563-1523","authenticated-orcid":false,"given":"Guiyun","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Newcastle University,  Newcastle Upon Tyne NE1 7RU, UK"}]}],"member":"1968","published-online":{"date-parts":[[2015,8,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPOT.2013.2245946","article-title":"Green Computing and Communication Techniques for Future Wireless Systems and Networks","volume":"32","author":"Karmokar","year":"2013","journal-title":"IEEE Potentials"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Samundiswary, P., Priyadarshini, P., and Dananjayan, P. (2009, January 3\u20135). Performance evaluation of heterogeneous sensor networks. Proceedings of the 2009 International Conference on Future Computer and Communication (ICFCC2009), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICFCC.2009.119"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1109\/TSMCB.2012.2236647","article-title":"Distributed optimal consensus filter for target tracking in heterogeneous sensor networks","volume":"43","author":"Zhu","year":"2013","journal-title":"IEEE Trans. Cybern."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1109\/TAC.2012.2225511","article-title":"Coverage and Energy Consumption Control in Mobile Heterogeneous Wireless Sensor Networks","volume":"4","author":"Wang","year":"2013","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_5","unstructured":"Tsai, R.G., Kuo, H.C., Wang, H.L., and Huang, Y.M. (2012, January 18\u201321). Target coverage QoS control with multiple sensing units in wireless heterogeneous sensor networks. Proceedings of the Sixth International Conference on Sensing Technology (ICST\u20192012), Kolkata, India."},{"key":"ref_6","first-page":"204","article-title":"Wireless Sensor Network Node Cover Iterative","volume":"4","author":"Wang","year":"2013","journal-title":"Comput. Simul."},{"key":"ref_7","first-page":"3472","article-title":"Improving coverage of wireless sensor network using enhanced adaptive PSO algorithm","volume":"30","author":"Song","year":"2013","journal-title":"Appl. Res. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/JSEN.2014.2326799","article-title":"Benefits of Wake-Up Radio in Energy-Efficient Multimodal Surveillance Wireless Sensor Network","volume":"14","author":"Vana","year":"2014","journal-title":"IEEE Sens. J."},{"key":"ref_9","unstructured":"Anis, K., and Khelil, A. (2015). Cooperative Robots and Sensor Networks, Springer Heidelberg."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Borstell, H., Kluth, J., Jaeschke, M., Plate, C., Gebert, B., and Richter, K. (2014, January 8\u201310). Pallet monitoring system based on a heterogeneoussensor network for transparent warehouse processes. Proceedings of the Sensor Data Fusion: Trends, Solutions, Applications (SDF), Bonn, Germany.","DOI":"10.1109\/SDF.2014.6954718"},{"key":"ref_11","unstructured":"Tolga, Z., and Hwa, C. (2014, January 4\u20136). Delay tolerant network for autonomous robotic vehicle charging and hazarddetection. Proceedings of the 2014 IEEE\/ACIS 13th International Conference on Computer and Information Science (ICIS), Taiyuan, China."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"189","DOI":"10.3724\/SP.J.1146.2009.00694","article-title":"The Coverage force algorithm for heterogeneous wireless sensor networks","volume":"32","author":"Qin","year":"2010","journal-title":"J. Electron. Inf. Technol."},{"key":"ref_13","first-page":"565","article-title":"Maintaining differentiated coverage in heterogeneous sensor networks","volume":"4","author":"Du","year":"2005","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_14","first-page":"213","article-title":"Hole detection for increasing coverage in wireless sensor networks using triangular structure","volume":"1","author":"Babaie","year":"2012","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Qu, G., and Potkonjak, M. (2001, January 16\u201321). Exposure in wireless ad hoc sensor networks. Proceedings of the ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking, Rome, Italy.","DOI":"10.1145\/381677.381691"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Mahboubi, H., Moezzi, K., Aghdam, A.G., and Sayrafian-Pour, K. (July, January 29). Self-deployment algorithms for field coverage in a network of nonidentical mobile sensors: Vertex-based approach. Proceedings of the 2011 American Control Conferenceon O\u2019Farrell Street, San Francisco, CA, USA.","DOI":"10.1109\/ACC.2011.5991564"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kanno, J., Buchart, J.G., Selmic, R.R., and Phoha, V. (2009, January 24\u201326). Detecting coverage holes in wireless sensor networks. Proceedings of the 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece.","DOI":"10.1109\/MED.2009.5164583"},{"key":"ref_18","unstructured":"Ghrist, R., and Muhammad, A. (2005, January 25\u201327). Coverage and hole-detection in sensor networks via homology. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN\u201905), LosAngeles, CA, USA."},{"key":"ref_19","unstructured":"Yan, F., Martins, P., and Decreusefond, L. (2011, January 5\u20139). Connectivity-based distributed coverage hole detection in wireless sensor networks. Proceedings of the IEEE Global Telecommunications Conference, Paris, France."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Yan, F., Martins, P., and Decreusefond, L. (2012, January 10\u201315). Accuracy of homology based approaches for coverage hole detection in wireless sensor networks. Proceedings of the IEEE International Conference on Communications, Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6364341"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s10776-007-0064-3","article-title":"Minimum path exposure and detection interval setting for target detection using wireless sensor network","volume":"14","author":"Deng","year":"2007","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TNET.2011.2175746","article-title":"Design of wireless sensor networks for mobile target detection","volume":"20","author":"Amaldi","year":"2012","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_23","unstructured":"Dung, T.N., Nam, P.N., My, T.T., and Abdelsalam, H. (2011, January 4\u20138). An optimal algorithm for coverage hole healing in hybrid sensor networks. Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, Turkey."},{"key":"ref_24","unstructured":"Lee, J., Krishnamachari, B., and Kuo, C. (2004, January 4\u20137). Impact of heterogeneous deployment on lifetime sensing coverage in sensor networks. Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/TPDS.2012.141","article-title":"Dynamic coverage of mobile sensor networks","volume":"24","author":"Liu","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_26","unstructured":"Kushwaha, M. (2010). Feature-Level Information Fusion Methods for Urban Surveillance Using Heterogeneous Sensor Networks. [Ph.D. Thesis, Vanderbilt University]."},{"key":"ref_27","first-page":"408","article-title":"Optimal Deployment Scheme in Sensing-heterogeneous Wireless Sensor Networks","volume":"3","author":"Wang","year":"2012","journal-title":"J. Nanjing Univ. Sci. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Gupta, H.P., Rao, S.V., and Venkatesh, T. (2013, January 9\u201313). Analysis of the redundancy in coverage of a heterogeneous wireless sensor network. Proceedings of the 2013 IEEE International Conference on Communciation, Budapest, Hungary.","DOI":"10.1109\/ICC.2013.6654800"},{"key":"ref_29","unstructured":"Li, M. (2011). Study on Coverage Algorithms for Heterogeneous Wireless Sensor Network. [Ph.D. Thesis, Chongqing University]. (In Chinese)."},{"key":"ref_30","unstructured":"Abdusy, S., Imee, B., Abedlhafid, A., Lhassane, I., Riri, F., and Pascal, L. (2014, January 10\u201314). Evolutionary multi-objective based approach for wireless sensor network deployment. Proceedings of the IEEE International Conference on Communications (ICC), Sydney, Australia."},{"key":"ref_31","first-page":"1204","article-title":"A Novel Security Algorithm Based on Biological Immune Principles in Wireless Sensor Networks","volume":"6","author":"Jiang","year":"2012","journal-title":"J. Jilin Univ. (Science Edition)"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3036","DOI":"10.1109\/JSEN.2012.2208742","article-title":"Ant-colony-based scheduling algorithm for energy efficient coverage of WSN","volume":"12","author":"Lee","year":"2012","journal-title":"IEEE Sens. J."},{"key":"ref_33","unstructured":"Miao, L., Qi, H., and Wang, F. (2005, January 2\u20136). Biologically inspiredself deployable heterogeneous mobile sensor networks. Proceedings of the IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS 2005), Knoxville, TN, USA."},{"key":"ref_34","first-page":"64","article-title":"Locomotion trajectory with cooperative metrics in wireless sensor networks","volume":"12","author":"Qin","year":"2007","journal-title":"J. China Univ. Posts. Commun."},{"key":"ref_35","first-page":"3080","article-title":"Comparison between the node sensing models and the relative works in wireless sensor networks","volume":"27","author":"Qin","year":"2010","journal-title":"Appl. Res. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/8\/19649\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:50:31Z","timestamp":1760215831000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/8\/19649"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,11]]},"references-count":35,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2015,8]]}},"alternative-id":["s150819649"],"URL":"https:\/\/doi.org\/10.3390\/s150819649","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2015,8,11]]}}}