2013
DOI: 10.1007/s13369-013-0914-5
|View full text |Cite
|
Sign up to set email alerts
|

A New Design for a Motorway Surveillance System Using a Wireless Ad-Hoc Camera Network to Improve Safety

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…Hadikusumo and Rowlinson [31] built similar safety design process tools. Seo and Choi [32][33][34][35][36][37][38][39][40][41][42][43] evaluated and selected the design schemes of specific metro engineering projects by establishing the matching relationship between design suggestions and safety risks.…”
Section: Introductionmentioning
confidence: 99%
“…Hadikusumo and Rowlinson [31] built similar safety design process tools. Seo and Choi [32][33][34][35][36][37][38][39][40][41][42][43] evaluated and selected the design schemes of specific metro engineering projects by establishing the matching relationship between design suggestions and safety risks.…”
Section: Introductionmentioning
confidence: 99%
“…AODV protocol is one of the widely used routing protocols in MANETs [49] as it has a wide range of advantages compared with other protocols. AODV is loop-free and scales to a large number of nodes, is adaptable to topology changes and responds to changes quickly, supports both unicast and multicast transmissions, has a minimal routing overhead, and has lower setup delay [50]. Some researchers conduct a performance analysis comparison between the AODV routing protocol and other routing protocols such as OLSR and DSR protocols, while other researchers focus on the performance of the AODV protocol under attack.…”
Section: Related Workmentioning
confidence: 99%
“…One approach involves a node broadcasting connectivity information via local hello messages, enabling nearby nodes to listen to these packets and determine connectivity. An alternative approach utilizes a link or network layer mechanism, such as the IEEE802.11 Media Access Control (MAC) protocol [6].…”
Section: Introductionmentioning
confidence: 99%