2016 International Conference on Communication and Signal Processing (ICCSP) 2016
DOI: 10.1109/iccsp.2016.7754242
|View full text |Cite
|
Sign up to set email alerts
|

MANET topology for disaster management using wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Data from a wide range of sources is collected and stored in a distributed capacity based on the majority of assembler boundaries in a massive information investigation framework. Building up a collection of sensitive information, sorting information, and separating and separating the sensitive information from the rest of the information is the method for obtaining information [10]. The sorted data is stored in a separate location (locally on a PC or on another PC in a LAN or WAN or on the Internet.)…”
Section: Literature Surveymentioning
confidence: 99%
“…Data from a wide range of sources is collected and stored in a distributed capacity based on the majority of assembler boundaries in a massive information investigation framework. Building up a collection of sensitive information, sorting information, and separating and separating the sensitive information from the rest of the information is the method for obtaining information [10]. The sorted data is stored in a separate location (locally on a PC or on another PC in a LAN or WAN or on the Internet.)…”
Section: Literature Surveymentioning
confidence: 99%
“…We first assume that π‘Ÿ π‘šπ‘˜ is a log-normal random variable, which denotes the RSS at the π‘šth sensor node from the π‘˜th source node, i.e., π‘Ÿ π‘šπ‘˜ = 𝑃 π‘˜ 𝑑 βˆ’π›Ό π‘šπ‘˜ 10 πœ‰ π‘šπ‘˜ 10 . Then, the RSS at the π‘šth sensor node, π‘Ÿ π‘š , is obtained by (5):…”
Section: B the Approximation Of The Log-normal Sum Distribution By F-...mentioning
confidence: 99%
“…Unlike active positioning, where radio signals are emitted by transmitters, passive positioning has received considerable attention due to good concealment, strong antiinterference ability and low cost in recent years and is applied in Global Positioning System (GPS), wireless sensor networks (WSNs), tracking radars and vision system [4]. In particular, localization in WSNs has a broad spectrum of applications in fields such as disaster monitoring, smart home, indoor navigation and animal tracking [5]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…Reducing network inefficiency is a major priority for computer experts who want to improve the central administration's network performance. ACO comes up with a higher-lasting energy-efficient route based on the ants' unique knowledge to fine-tune and is used to help the nodes to have a longer life by making sure that as little energy is wasted during transmission as possible [6]. Other techniques are examined to see whether they produced similar findings and also address the security concerns, including the inherent vulnerability of…”
Section: Introductionmentioning
confidence: 99%