2015
DOI: 10.1007/s40815-015-0079-3
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Fuzzy Event-detection Algorithm for Border Monitoring on FPGA

Abstract: The use of wireless sensor networks to protect sensitive facilities or international borders has recently attracted more and more attention. It has become a highpriority issue in many countries. In addition to the physical fences built for stopping illegal intruders from crossing the border, smart fencing has been proposed to extend intrusion-detection capabilities. Event detection is a central component in numerous wireless sensor network applications. In spite of this, the area of event description has not r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…We could observe that the proposed ALGAS2 system is consuming more dynamic power than Ref. [27,[29][30] and less than the value achieved in Ref. [7].…”
Section: Resultsmentioning
confidence: 78%
See 1 more Smart Citation
“…We could observe that the proposed ALGAS2 system is consuming more dynamic power than Ref. [27,[29][30] and less than the value achieved in Ref. [7].…”
Section: Resultsmentioning
confidence: 78%
“…The proposed ALGAS2 system is mainly depends on the FLS engine to gain its agility and sustainable performance. Thus, we compared the achieved performance of it with similar FLS-based systems such as in [7,27,29,30] as depicted in Table2. We could observe that the proposed ALGAS2 system is consuming more dynamic power than Ref.…”
Section: Resultsmentioning
confidence: 99%
“…An implementation of fuzzy logic on FPGA has been proposed in [16]. Synthesis results show that the maximum reached frequency is 75 MHz, and total power used for this implementation is equal to 100.64 mW.…”
Section: Implementation Details: Experiments and Resultsmentioning
confidence: 99%
“…However, the redundant data are deleted and potential interference and discord at the MAC level are mitigated [15]. Fang et al [16] proposed a clustering approach to bring data together in WSNs monitoring several targets. These targets can be stationary or dynamic at any time regardless of the others.…”
Section: Related Workmentioning
confidence: 99%
“…The wireless sensor network (WSN), which consists of a large amount of sensor nodes with wireless communication capability, has enormous applications including environmental monitoring, industrial control, infrastructure security, smart home and surveillance system [1][2][3][4]. One of the important applications of WSNs is to monitor intrusion activities for protecting international borders or sensitive facilities such as military bases, power plants, urban water sources and airports [5][6][7]. Currently, the majority of the WSNs are constructed based on battery-powered sensor nodes.…”
Section: Introductionmentioning
confidence: 99%