2015 Annual IEEE India Conference (INDICON) 2015
DOI: 10.1109/indicon.2015.7443850
|View full text |Cite
|
Sign up to set email alerts
|

Identification of trespasser from the signatures of buried single mode fiber optic sensor cable

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…[18] proposed an interesting solution, which is also profitable, wherein authors employ bees to deter elephants from damaging the vegetation and trees in Africa. A few notable past works [1,[4][5][6][7][8][9][10][11][12][13] have tackled the issues of animal behavior monitoring and proposed technical solutions, mainly warning systems.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…[18] proposed an interesting solution, which is also profitable, wherein authors employ bees to deter elephants from damaging the vegetation and trees in Africa. A few notable past works [1,[4][5][6][7][8][9][10][11][12][13] have tackled the issues of animal behavior monitoring and proposed technical solutions, mainly warning systems.…”
Section: Related Workmentioning
confidence: 99%
“…The reason is that reflectors and whistles lack the spatial and temporal precision of association between warning signal and approaching vehicles. Suman used fiber sensors-buried in the ground (within 2 m depth)-to identify the intruding animals/humans based on the characteristic signature of the intruder (animal/human) that walks over the ground where the fiber sensor is buried [1]. A smart fault detection system [6] was proposed to detect breakages in electric fences, which keeps wild elephants away from humans in order to protect both humans and animals in Sri Lanka.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the data processing at constrained end devices, e.g., Raspberry Pi, with limited compute and storage capability could result in more false alarms, longer processing time, and the temporal precision of association between warning signal and approaching vehicles. [1] used fiber sensors-buried in the ground (within 2 m depth)-to identify the intruding animals/humans based on the characteristic signature of the intruder (animal/human) that walks over the ground where the fiber sensor is buried. A smart fault detection system [6] was proposed to detect breakages in electric fences, which keeps wild elephants away from humans in order to protect both humans and animals in Sri Lanka.…”
Section: Introductionmentioning
confidence: 99%