Casey et al., 2008 - Google Patents
A sensor network architecture for tsunami detection and responseCasey et al., 2008
View HTML- Document ID
- 11985990086953413890
- Author
- Casey K
- Lim A
- Dozier G
- Publication year
- Publication venue
- International Journal of Distributed Sensor Networks
External Links
Snippet
In this paper, we propose a sense and response system for tsunami detection and mitigation. We use the directed diffusion routing protocol as a baseline network protocol and develop several communication mechanisms to improve its performance. These include an …
- 238000001514 detection method 0 title abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/023—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Casey et al. | A sensor network architecture for tsunami detection and response | |
Chaudhary et al. | CRAIoT: concept, review and application (s) of IoT | |
Osanaiye et al. | A statistical approach to detect jamming attacks in wireless sensor networks | |
Pan et al. | Underwater acoustic sensor networks | |
Javaid et al. | Delay-sensitive routing schemes for underwater acoustic sensor networks | |
Mohamed et al. | Sensor network architectures for monitoring underwater pipelines | |
Sahni et al. | Algorithms for wireless sensor networks | |
Zeng et al. | An emergency-adaptive routing scheme for wireless sensor networks for building fire hazard monitoring | |
Bekmezci et al. | Energy efficient, delay sensitive, fault tolerant wireless sensor network for military monitoring | |
Feng et al. | Trust management scheme based on DS evidence theory for wireless sensor networks | |
Zhu et al. | Transmission reliability evaluation for wireless sensor networks | |
Misra et al. | Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system | |
Cecílio et al. | Evaluation of LoRa technology in flooding prevention scenarios | |
Kaur et al. | Adaptive neuro fuzzy inference system (ANFIS) based wildfire risk assessment | |
Muzammal et al. | A trust-based model for secure routing against RPL attacks in internet of things | |
Ahmad et al. | Adaptive trust-based framework for securing and reducing cost in low-cost 6LoWPAN wireless sensor networks | |
Al Sawafi et al. | Hybrid deep learning-based intrusion detection system for RPL IoT networks | |
Luo et al. | A software-defined multi-modal wireless sensor network for ocean monitoring | |
Alablani et al. | EE-UWSNs: A joint energy-efficient MAC and routing protocol for underwater sensor networks | |
Hindu et al. | Self-organizing and scalable routing protocol (SOSRP) for underwater acoustic sensor networks | |
Ravichandran et al. | Data validation algorithm for wireless sensor networks | |
Pishdar et al. | PCC-RPL: an efficient trust-based security extension for RPL | |
Abba et al. | An autonomous self-aware and adaptive fault tolerant routing technique for wireless sensor networks | |
Ayaz et al. | Energy Efficient Intrusion Detection in a heterogeneous environment of Wireless sensor networks | |
Ahmed et al. | An optimized link state routing protocol with a blockchain framework for efficient video-packet transmission and security over mobile ad-hoc networks |