Advances in Ubiquitous Computing 2020
DOI: 10.1016/b978-0-12-816801-1.00009-8
|View full text |Cite
|
Sign up to set email alerts
|

The use of WSN (wireless sensor network) in the surveillance of endangered bird species

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 53 publications
0
5
0
Order By: Relevance
“…Voiceprints: Each person has a distinct voiceprint, which can be used to identify and authenticate users. They are frequently employed in call centres and other settings where it is crucial to confirm the caller’s identity ( Boulmaiz et al, 2020 ).…”
Section: Preliminariesmentioning
confidence: 99%
“…Voiceprints: Each person has a distinct voiceprint, which can be used to identify and authenticate users. They are frequently employed in call centres and other settings where it is crucial to confirm the caller’s identity ( Boulmaiz et al, 2020 ).…”
Section: Preliminariesmentioning
confidence: 99%
“…Any LDO has a much lower V DO than the classic linear regulators. Specifically, the MIC5503-3.3YM5 has a very low V DO (160 mV at 300 mA output current), so it guarantees a regulated output voltage of 3.3 V for a battery voltage of only 3.46 V, as shown in Equation (1).…”
Section: Master Slavementioning
confidence: 99%
“…T HE monitoring of wild animals to improve the conditions of these animals or to preserve endangered species [1] is a topic of great interest. The first way to get information from the animals was to use field observers, as in [2] where the behavior of apes is studied.…”
Section: Introductionmentioning
confidence: 99%
“…35,77,78 So user-centric middleware technique has been suggested to solve the issue of heterogeneity using three modules, that is, data collection, interface, and heterogeneous network. In previous studies, [79][80][81] resource management has been investigated with TinyOS, FreeRTOS, and Contiki which are popular operating system for various parameters like memory, process, energy, and communication management. In Tanganelli and Curado, 82 security method is suggested for the IoT data, and DC-Net is implemented over the real-time sensor nodes to achieve the high-level confidentiality.…”
Section: Middleware Approaches For Wsnsmentioning
confidence: 99%