2011
DOI: 10.1109/taes.2011.6034654
|View full text |Cite
|
Sign up to set email alerts
|

Throughput per Pass for Data Aggregation from a Wireless Sensor Network via a UAV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(28 citation statements)
references
References 33 publications
0
28
0
Order By: Relevance
“…The average number of the covered members can be known by using the number of associated members. Since the number of the covered members within the distance r tar is π(r tar ) 2 …”
Section: Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…The average number of the covered members can be known by using the number of associated members. Since the number of the covered members within the distance r tar is π(r tar ) 2 …”
Section: Proofmentioning
confidence: 99%
“…For example, in a tactical group communication network, a commander monitors the conditions of the soldiers. A soldier equips with a monitoring system [1], and the monitored status is transmitted to the base camp through an unmanned aerial vehicle (UAV) [2]. If all the soldiers transmit their information at the same time to the UAV, the network congestion will occur increasingly as the number of soldiers increases.…”
Section: Introductionmentioning
confidence: 99%
“…Giorgetti et al focus on data retrieval from a sensor field by using a UAV [8]. By using a UAV to collect data form sensors, a large area can be covered and the data collection can be more flexible due to the mobility of UAV.…”
Section: Global-scaled Internet Of Thingsmentioning
confidence: 99%
“…Based on Theorem 1, the relay can adaptively allocate resources to meet the required performance. For example, as in [33], if some users (e.g. J − 1) have the same message to transmit, the relay can allocate the corresponding proportion of resources to this message, therefore J − 1 independent copies of the same data can be received by the destinations, and a full diversity order of J − 1 can be achieved.…”
Section: Proofmentioning
confidence: 99%