UDTN-RS : A new underwater delay tolerant network routing protocol for coastal patrol and surveillance
The Coastal Patrol and Surveillance Application (CPSA) is developed and deployed to detect, track and monitor water vessel traffic using automated devices. The latest advancements of marine technologies, including Automatic Underwater Vehicles, have encouraged the development of this type of applica...
| Main Authors: | Azad, Saiful, Mokthar Neffati, Ahmed Ali, Mahmud, Mufti R., Kaiser, M. Shamim, Ahmed, Muhammad Raisuddin, Kamruzzaman, Joarder |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40655/ http://umpir.ump.edu.my/id/eprint/40655/1/UDTN-RS_A%20new%20underwater%20delay%20tolerant%20network.pdf |
Similar Items
Underwater delay-tolerant routing via probabilistic spraying
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
A high-throughput routing metric for multi-hop underwater acoustic networks
by: Azad, Saiful, et al.
Published: (2015)
by: Azad, Saiful, et al.
Published: (2015)
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
by: Azad, Saiful, et al.
Published: (2024)
by: Azad, Saiful, et al.
Published: (2024)
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
by: Azad, Saiful, et al.
Published: (2021)
by: Azad, Saiful, et al.
Published: (2021)
Remote surveillance system
by: Hafiz Mohd Hanafi @ Omar,
Published: (2006)
by: Hafiz Mohd Hanafi @ Omar,
Published: (2006)
Pedestrian Detection and Tracking in Surveillance Video
by: Chong, Penny
Published: (2016)
by: Chong, Penny
Published: (2016)
Allocating patrolling resources to effectively thwart intelligent attackers
by: Lowbridge, Thomas
Published: (2021)
by: Lowbridge, Thomas
Published: (2021)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007)
by: Sulaiman, Noor Suhana
Published: (2007)
Adaptive delay tolerant routing for enhanced connectivity in vehicular networks / Mostofa Kamal Nasir
by: Mostofa Kamal , Nasir
Published: (2016)
by: Mostofa Kamal , Nasir
Published: (2016)
Image classification and segmentation for efficient surveillance applications / Maryam Asadzadeh Kaljahi
by: Maryam Asadzadeh, Kaljahi
Published: (2019)
by: Maryam Asadzadeh, Kaljahi
Published: (2019)
Dynamic Cluster Based Routing for Underwater
Wireless Sensor Networks
by: Muhammad, Ayaz, et al.
Published: (2010)
by: Muhammad, Ayaz, et al.
Published: (2010)
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
by: Muhammad, Ayaz, et al.
Published: (2009)
by: Muhammad, Ayaz, et al.
Published: (2009)
CRISP SET IMPLEMENTATION ON VIDEO IMAGES FOR
THE APPLICATION OF SURVEILLANCE SYSTEMS
by: Asirvadam , Vijanth Sagayan
Published: (2009)
by: Asirvadam , Vijanth Sagayan
Published: (2009)
Abnormal Event Detection in Surveillance Videos Using Spatiotemporal Autoencoder
by: Chong, Yong Shean
Published: (2019)
by: Chong, Yong Shean
Published: (2019)
Autonomous smart robot surveillance system (ASRSS)
by: Guat, Si Jie
Published: (2018)
by: Guat, Si Jie
Published: (2018)
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Moving object detection for visual surveillance application
by: Ong, Kelvin Chun Yauw
Published: (2018)
by: Ong, Kelvin Chun Yauw
Published: (2018)
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020)
by: Rabby, Gollam, et al.
Published: (2020)
iWorksafe: Towards healthy workplaces during COVID-19 with an intelligent phealth app for industrial settings
by: Kaiser, M. Shamim, et al.
Published: (2021)
by: Kaiser, M. Shamim, et al.
Published: (2021)
Underwater Image Enhancement Using An Integrated Colour Model.
by: Iqbal, Kashif, et al.
Published: (2007)
by: Iqbal, Kashif, et al.
Published: (2007)
Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks
by: Muhammad , Ayaz, et al.
Published: (2009)
by: Muhammad , Ayaz, et al.
Published: (2009)
Object-relational Features for Modeling and Analysis of Spatio-temporal Data
by: Kamruzzaman, A. Z. M, et al.
Published: (2006)
by: Kamruzzaman, A. Z. M, et al.
Published: (2006)
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
by: Noraziah, Ahmad, et al.
Published: (2013)
by: Noraziah, Ahmad, et al.
Published: (2013)
Autonomous reconnaissance mission: development of an algorithm for collaborative multi robot communication
by: Ahmed, Mohiuddin, et al.
Published: (2010)
by: Ahmed, Mohiuddin, et al.
Published: (2010)
Features extraction based on fuzzy clustering and segmentation onto the motion region for medium field surveillance application
by: Maliki, Mohamad Nansah, et al.
Published: (2004)
by: Maliki, Mohamad Nansah, et al.
Published: (2004)
Image resolution enhancement using improved edge directed interpolation algorithm / Md Shamim Hossain
by: Md Shamim , Hossain
Published: (2018)
by: Md Shamim , Hossain
Published: (2018)
A predictive approach to improve a fault tolerance confidence level on grid resources scheduling
by: Bouyer, Asgarali, et al.
Published: (2008)
by: Bouyer, Asgarali, et al.
Published: (2008)
The impact of error-tolerance using customized DIJKSTRA on large scale parallel crowd simulations / Luuk Sterke
by: Luuk , Sterke
Published: (2022)
by: Luuk , Sterke
Published: (2022)
Adaptive neuro-fuzzy control of wet scrubbing process
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2015)
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2015)
Autonomous boat for underwater surveillance
by: Rashid, Muhammad Mahbubur, et al.
Published: (2019)
by: Rashid, Muhammad Mahbubur, et al.
Published: (2019)
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
by: Noraziah, Ahmad, et al.
Published: (2013)
by: Noraziah, Ahmad, et al.
Published: (2013)
Comparative Study Of Plant Biodiversity Data Modeling In Research Perspective
by: Wahid, Mohd Taib, et al.
Published: (2004)
by: Wahid, Mohd Taib, et al.
Published: (2004)
Underwater Image Recognition using Machine Learning
by: Divya, N.K., et al.
Published: (2024)
by: Divya, N.K., et al.
Published: (2024)
A survey on potential reactive fault tolerance approach for distributed systems in big data
by: Noraziah, Ahmad, et al.
Published: (2023)
by: Noraziah, Ahmad, et al.
Published: (2023)
Improving online decision making process based on the ranking of user reviews and product features / Azra Shamim
by: Shamim, Azra
Published: (2015)
by: Shamim, Azra
Published: (2015)
Similar Items
-
Underwater delay-tolerant routing via probabilistic spraying
by: Azad, Saiful, et al.
Published: (2018) -
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013) -
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012) -
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014) -
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)