Tuesday, September 10, 2019

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Research Paper

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK - Research Paper Example The troops guard the border according to prearranged route as well as the time interval (Ammari 12). Border patrol has widely depended on human participation. On the other hand, the relative cost for the growing number of workers as well as the retreating precision through human-only supervision has called for the contribution of high-tech devices in border patrol (Ammari 36). Amongst these, Unmanned Aerial Vehicles (UAVs) for mid-air surveillance have lately been used to track routinely and detect track unlawful border crossing. Due to the outsized coverage as well as high mobility of the UAVs, the concentrated human participation in low-level surveillance practices can be minimized. In applications of border patrol, the established supervising network ought to cover a considerably large monitoring region. On the other hand, the radius of sensing of a single sensor node is usually limited. Consequently, many sensor nodes are expected to complete the coverage need. In addition, different kinds of sensor nodes like underground, camera, ground, and mobile sensors provide dissimilar coverage potentials. In addition, every sensor type has a special cost, sensing radius, as well as sensing accuracy (Aykanat54). As a result, a most favorable deployment approach is required to settle on the number along with locations of sensor nodes with varied capabilities. The primary objective of the deployment is to get the deployment tactic using the bare minimum number of each category of sensors to cover the entire surveillance area furthermore to accomplish desired intrusion detection likelihood. The aim is sensing the surroundings as well as communicating the findings to the data gathering center (Aykanat54). Most employment areas are envisaged for WSNs ranging from military surveillance to the monitoring of endangered species of animal populations. The research on the node placement together with coverage issues deals with effective use of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.