Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference34 articles.
1. Abrardo A, Martalò M, Ferrari G (2017) Information fusion for efficient target detection in large-scale surveillance Wireless Sensor Networks. Inf Fusion 38:55–64
2. Afolabi D, Man KL, Liang H-N, Lim EG, Shen Z, Lei C-U, Krilavicius T, Yang Y, Cheng L, Hahanov V, Yemelyanov I (2013) A WSN approach to unmanned aerial surveillance of traffic anomalies: some challenges and potential solutions. Des Test Symp 2013:1–4
3. Ball MG, Qela B, Wesolkowski S (2016) A review of the use of computational intelligence in the design of military surveillance networks. In: Abielmona R, Falcon R, Zincir-Heywood N, Abbass H (eds) Recent advances in computational intelligence in defense and security. Studies in computational intelligence, vol 621. Springer, Cham. https://doi.org/10.1007/978-3-319-26450-9_24
4. Benzerbadj A, Kechar B, Bounceur A, Hammoudeh M (2018) Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. J Netw Comput Appl 112:41–52
5. Chand S, Singh S, Kumar B (2014) Heterogeneous HEED protocol for wireless sensor networks. Wirel Pers Commun 77:2117–2139
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献