Evolving Constraints in Military Applications using Wireless Sensor Networks
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2017, Vol 5, Issue 1
Abstract
WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the loss. In this paper, we analyze the existing literature of using WSNs for military applications. We will discuss the available scenarios of using sensor nodes in the military uses. Provided suitable sensors the system can detect identify and classify threads based on the count, number, type weather it is armored vehicles or men in foot, type and amount of weapons they carry, etc., can be detected in advance. This system provides reliable real time war picture and better situational awareness. This will further help to improve the troop readiness and decrease the reaction time. Added using the data collected tactical planning for deploying troops effectively can be done. In case of civil applications economic zones like oil fields, gold mines, can be protected from intruders and attackers. Industrial complex and production facility can be protected with minimized man power and improved efficiency. Basic criteria are which had to be taken into account while deploying wireless sensors for such applications has been discussed. Particularly locating the intruder with respect to the distance from the sensor node to the target in terms of latitude and longitudinal coordinates are discussed here.
Authors and Affiliations
Dr. S. R. BOSELIN PRABHU, N. BALAKUMAR, A. JOHNSON ANTONY
Integration of Heterogeneous Distributed Database Based on E-Commerce System
The rapid expansion of internet systems, ease of availability and so on reduction in operating costs, and spread of internet access have created colossal of electronic data. The disseminate nature of our internet system...
An Overview of Genetics and Obsessive-compulsive Disorder
The present status in this article, the genetics of obsessive compulsive disorder (OCD) is discussed (OCD). Heredity has a key role in the development of OCD. This information is derived from a range of investigations, i...
Software Bug Reports: Automatic Keyword and Sentence-Based Text Summarization Using Artificial Intelligence
The purpose of text summarization is to quickly and accurately extract the most important data from papers. The proposed unsupervised method seeks to synthesise complete and informative bug reports (software artefacts)....
An Improved Quality Enhancement Fingerprint Analysis
The use of fingerprint authentication as a biometric technique for secure authentication and access control has gained significant traction in recent years. This article presents an overview of the technology used for fi...
Energy Aware Sensor Node Design
Wireless sensor network (WSN) have been identified as one of the most important technology for 21st century. But the energy consumption is the major problem for the implementation of wireless sensor network now days. Thi...