2023
DOI: 10.1109/jsen.2022.3227601
|View full text |Cite
|
Sign up to set email alerts
|

A k-Barrier Coverage Enhancing Scheme Based on Gaps Repairing in Visual Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…On the other hand, surveillance and secure monitoring are considered as critical tasks in smart buildings; these tasks can be supported by heterogeneous mobile robots, drones, UAVs (Unmanned Aerial Vehicles), IoT devices, and intelligent components [ 16 , 17 , 18 , 19 , 20 , 21 , 22 ]. To provide reinforced surveillance and secure monitoring, the concept of a barrier can be applied to smart buildings because the formation of a barrier and its creation guarantee that any penetrations or mobile objects are detected by system members in the built surveillance barriers within the requested three-dimensional space and plane area [ 23 , 24 , 25 , 26 , 27 , 28 , 29 ]. Essentially, it has been known that the barrier has been used for numerous applications, including virtual emotion surveillance, digital twins, maritime transportation systems, public and private areas, patrol services, border surveillance, smart complex surveillance, virtual emotion informatics, and geographic segmentation surveillance [ 30 , 31 , 32 , 33 , 34 ].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, surveillance and secure monitoring are considered as critical tasks in smart buildings; these tasks can be supported by heterogeneous mobile robots, drones, UAVs (Unmanned Aerial Vehicles), IoT devices, and intelligent components [ 16 , 17 , 18 , 19 , 20 , 21 , 22 ]. To provide reinforced surveillance and secure monitoring, the concept of a barrier can be applied to smart buildings because the formation of a barrier and its creation guarantee that any penetrations or mobile objects are detected by system members in the built surveillance barriers within the requested three-dimensional space and plane area [ 23 , 24 , 25 , 26 , 27 , 28 , 29 ]. Essentially, it has been known that the barrier has been used for numerous applications, including virtual emotion surveillance, digital twins, maritime transportation systems, public and private areas, patrol services, border surveillance, smart complex surveillance, virtual emotion informatics, and geographic segmentation surveillance [ 30 , 31 , 32 , 33 , 34 ].…”
Section: Introductionmentioning
confidence: 99%