2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC) 2017
DOI: 10.1109/ccwc.2017.7868360
|View full text |Cite
|
Sign up to set email alerts
|

Large scale border security systems modeling and simulation with OPNET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Knowing the estimation of RGB assists individuals with picking up the shade of the light which is anticipated onto the sensor since each shading compare to just one estimation of RGB. [2] The proposed framework gives some assistance to our security powers in identification of gatecrashers. The robot can likewise be utilized in high elevation regions where human can't endure.…”
Section: Related Workmentioning
confidence: 99%
“…Knowing the estimation of RGB assists individuals with picking up the shade of the light which is anticipated onto the sensor since each shading compare to just one estimation of RGB. [2] The proposed framework gives some assistance to our security powers in identification of gatecrashers. The robot can likewise be utilized in high elevation regions where human can't endure.…”
Section: Related Workmentioning
confidence: 99%
“…The deployment of the sensor is optimized by [5] for border surveillance. Large scale border security systems are modeled and simulated with "OPNET" by [6]. By [7], a brief survey about using WSNs for border security and intruder detection is presented and a bi-level exposure-oriented sensor location problem for border security missions is covered by [8].…”
Section: Introductionmentioning
confidence: 99%
“…Especially, the hybrid systems that combine some of these instruments above with intelligence and data analysis are studied in the last decade. In the literature, mathematical models [5,8,21], simulation models [6,12,19,22,23] and heuristics/ metaheuristics [1,5,24] are used to solve border security based problems. U.S.-Mexico border is the most studied border [13,15,18,25,26].…”
Section: Introductionmentioning
confidence: 99%
“…To support the adoption of the e-government and security approach, sensor hubs are conveyed deliberately on parts, or the aggregate of the border rely on potential interruption or standard courses to gather sensors data by an organization of communicating hubs on a controlled radio channel [8]. These radio signals are used to attach to the environmental parts that cause many events, like a body movement.…”
Section: Introductionmentioning
confidence: 99%