2015
DOI: 10.1016/j.jnca.2015.07.003
|View full text |Cite
|
Sign up to set email alerts
|

Network tomography application in mobile ad-hoc network using stitching algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Controls and management in facility application surveillance, intrusion detection, industrial processes controls, and machine health monitoring and so many to mention, were among many applications used in wireless sensor network. [9] Mobile Network and WSN-Wireless sensor network technology are continuously derived in local network behavior performances [20]. However, most of the techniques previously used were not schedule systematically using data-mule.…”
Section: Related Workmentioning
confidence: 99%
“…Controls and management in facility application surveillance, intrusion detection, industrial processes controls, and machine health monitoring and so many to mention, were among many applications used in wireless sensor network. [9] Mobile Network and WSN-Wireless sensor network technology are continuously derived in local network behavior performances [20]. However, most of the techniques previously used were not schedule systematically using data-mule.…”
Section: Related Workmentioning
confidence: 99%
“…We are going to adopt a minimum-risk point estimation procedure to estimate the mean vector P λ. Having recorded Y (1) , Y (2) , ..., Y (n) , with,…”
Section: An Adaptive Proceduresmentioning
confidence: 99%
“…T from the two observed vectors of data y (1) and y (2) . Note that W and γ are known to begin with.…”
Section: An Adaptive Proceduresmentioning
confidence: 99%
See 1 more Smart Citation
“…Facility application surveillance, intrusion detection, industrial processes controls and machine health monitoring were among many applications used in wireless sensor network. [10] Wireless sensor network and mobile network technology are continuously derived in local network behavior performances [11].…”
Section: Introductionmentioning
confidence: 99%