A Survey on WSN-based Forest Fire Detection Techniques
暂无分享,去创建一个
[1] Majid Bagheri,et al. Wireless Sensor Networks for Early Detection of Forest Fires , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[2] Fazlullah Khan,et al. Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[3] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[4] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[5] Xiaoqiao Meng,et al. Real-time forest fire detection with wireless sensor networks , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..
[6] Muhammad Safdar,et al. Request-Response Interaction Model in Constrained Networks , 2016 .
[7] Hashim Ali,et al. Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .
[8] Muhammad Babar,et al. Applications and Challenges Faced by Internet of Things - A Survey , 2016 .
[9] Byung-rak Son,et al. A Design and Implementation of Forest-Fires Surveillance System based on Wireless Sensor Networks for South Korea Mountains , 2006 .
[10] Özgür Ulusoy,et al. A framework for use of wireless sensor networks in forest fire detection and monitoring , 2012, Comput. Environ. Urban Syst..
[11] Iftikhar Ahmad,et al. A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .
[12] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[13] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[14] Nazia Azim,et al. Offsite 2-Way Data Replication towards Improving Data Refresh Performance , 2016 .
[15] Nazia Azim,et al. EEC : Evaluation of Energy Consumption in Wireless Sensor Networks , 2016 .
[16] Hanafy M. Ali,et al. COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS , 2018 .
[17] Miguel Garcia,et al. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification , 2009, Sensors.
[18] F. Han,et al. APPLICATIONS , LIMITATIONS , AND IMPROVEMENTS IN VISIBLE LIGHT COMMUNICATION SYSTEMS , 2016 .
[19] Aurelio Bermúdez,et al. Simulating a WSN-Based Wildfire Fighting Support System , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[20] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[21] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[22] A. Cracknell. advanced very high resolution radiometer AVHRR , 1997 .
[23] YED,et al. SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .
[24] Kenji Nakagawa,et al. B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .
[25] Farman Ullah,et al. A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.
[26] Fazlullah Khan,et al. An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .
[27] Richard Han,et al. FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments , 2006, MobiSys '06.
[28] Sameerchand Pudaruth,et al. PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .
[29] Fazlullah Khan. Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[30] Shahzad Khan,et al. Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[31] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.