2018
DOI: 10.20474/jater-4.4.2
|View full text |Cite
|
Sign up to set email alerts
|

Wireless sensor network development: Targeting and control system for semi-ballistic vehicle for rapid and precise search and rescue applications

Abstract: This paper considers the vast development in the technology of sensor such as embedded system, Global Positioning System (GPS) wireless communications and wireless sensor applications. In recent years an ef icient design of a Wireless Sensor Network has become a leading area of research for semi-ballistic Unmanned Aerial Vehicle (UAV). A network of sensor is a device that responds and detects some type of input from both the physical or environmental conditions, such as pressure, heat, light, etc. The output o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
(13 reference statements)
0
2
0
Order By: Relevance
“…This research shows three benefits of Multi-VLAN design [4]. First, it is a cost-effective way to deploy multiple types of applications, second, it increases protection and security, and third, it can also reduce the network administrators management of maintaining and managing the network as a whole, even if the two campuses are far away and maintain data transmission efficiency [5,6].…”
Section: Iot In Campusmentioning
confidence: 93%
“…This research shows three benefits of Multi-VLAN design [4]. First, it is a cost-effective way to deploy multiple types of applications, second, it increases protection and security, and third, it can also reduce the network administrators management of maintaining and managing the network as a whole, even if the two campuses are far away and maintain data transmission efficiency [5,6].…”
Section: Iot In Campusmentioning
confidence: 93%
“…Usually, they are usually deployed for a long time (for decades). Also, the ICS typically includes several legacy devices that lack basic security features and no new security features [3,4,5,6,7].…”
Section: Introductionmentioning
confidence: 99%