2018
DOI: 10.1109/mcom.2018.1700423
|View full text |Cite
|
Sign up to set email alerts
|

Software Defined Radio and Wireless Acoustic Networking for Amateur Drone Surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 99 publications
(43 citation statements)
references
References 13 publications
0
43
0
Order By: Relevance
“…We categorized the existing solution into two parts, in which, at first, we address the SFC algorithms, [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] and then in the second part, we describe the solutions and handle the failures and faults in SDNs/NFVs. We categorized the existing solution into two parts, in which, at first, we address the SFC algorithms, [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] and then in the second part, we describe the solutions and handle the failures and faults in SDNs/NFVs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We categorized the existing solution into two parts, in which, at first, we address the SFC algorithms, [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] and then in the second part, we describe the solutions and handle the failures and faults in SDNs/NFVs. We categorized the existing solution into two parts, in which, at first, we address the SFC algorithms, [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] and then in the second part, we describe the solutions and handle the failures and faults in SDNs/NFVs.…”
Section: Related Workmentioning
confidence: 99%
“…In the following, we briefly discuss the main literature on NFVs/SDNs and service function changing related to our work. We categorized the existing solution into two parts, in which, at first, we address the SFC algorithms, [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] and then in the second part, we describe the solutions and handle the failures and faults in SDNs/NFVs. [24][25][26][27][28][29][30][31][32][33][34][35]…”
Section: Related Workmentioning
confidence: 99%
“…The internet-based security robot identifies intruders by facial recognition using features such as facial expression, three-dimensional posture, and personal appearance. In addition, remote monitoring systems using drones [7]- [9] have also been studied. However, the drones are difficult to use due to the low battery capacity and a lack of safety.…”
Section: Introductionmentioning
confidence: 99%
“…In this study, we proposed a novel monitoring system to provide the sense of reality through an HMD, and to automatically control the camera position according to the movement of the user using sensors in the HMD. The proposed method maximizes the stereoscopic and immersive feeling through the HMD designed with the pupil forming system, partial binocular overlap, and eye tracking system [13], rather than the display used in conventional monitoring systems [1]- [9]. Therefore, it provides a realistic monitoring system to users, and it can improve the immersion experience of the conventional monitoring system.…”
Section: Introductionmentioning
confidence: 99%
“…In the field of aeronautical communications, with the anticipated increase in the number of aircraft [1], the communication demands have shown exponential growth in numerous applications, such as air traffic control (ATC) for manned aircraft [2], communication and surveillance for unmanned aerial vehicles (UAVs) [3][4][5], and the cooperative systems of manned-unmanned aerial vehicles [6]. In all of these applications, a great mass of heterogeneous information with different criticality levels needs to be transmitted over the datalinks.…”
Section: Introductionmentioning
confidence: 99%