StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK - Research Paper Example

Cite this document
Summary
The main challenge in shielding lengthy stretches of borders is the requirement for exhaustive human participation in patrolling the grounds. Conventional boundary patrol system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK
Read Text Preview

Extract of sample "BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK"

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Introduction Border patrol systems have lately got interest to tackle the concerns regarding national security. The main challenge in shielding lengthy stretches of borders is the requirement for exhaustive human participation in patrolling the grounds. Conventional boundary patrol system comprises security checkpoints along with border troops. The protection checkpoints are built on the international roads in which all vehicle traffic is halted to detect and arrest unlawful aliens, drugs, in addition to other illegal activity.

Every border troop controls and watches a specific segment of the border. The troops guard the border according to prearranged route as well as the time interval (Ammari 12).Existing border patrol techniquesBorder patrol has widely depended on human participation. On the other hand, the relative cost for the growing number of workers as well as the retreating precision through human-only supervision has called for the contribution of high-tech devices in border patrol (Ammari 36). Amongst these, Unmanned Aerial Vehicles (UAVs) for mid-air surveillance have lately been used to track routinely and detect track unlawful border crossing.

Due to the outsized coverage as well as high mobility of the UAVs, the concentrated human participation in low-level surveillance practices can be minimized.Deployment methodologyIn applications of border patrol, the established supervising network ought to cover a considerably large monitoring region. On the other hand, the radius of sensing of a single sensor node is usually limited. Consequently, many sensor nodes are expected to complete the coverage need. In addition, different kinds of sensor nodes like underground, camera, ground, and mobile sensors provide dissimilar coverage potentials.

In addition, every sensor type has a special cost, sensing radius, as well as sensing accuracy (Aykanat54). As a result, a most favorable deployment approach is required to settle on the number along with locations of sensor nodes with varied capabilities. The primary objective of the deploymentThe primary objective of the deployment is to get the deployment tactic using the bare minimum number of each category of sensors to cover the entire surveillance area furthermore to accomplish desired intrusion detection likelihood.

The aim is sensing the surroundings as well as communicating the findings to the data gathering center (Aykanat54). Most employment areas are envisaged for WSNs ranging from military surveillance to the monitoring of endangered species of animal populations. The research on the node placement together with coverage issues deals with effective use of sensor nodes in the networking field. A sensor node watches over only a limited region from its locality. Thus, data cannot be acquired from an area that is not covered by one or more sensor node.

Coverage A network model denotes the region covered by a particular sensor at a particular location. This model can be either probabilistic or deterministic. A probabilistic network model establishes the likelihood that an incident will be detected at a certain location whereas a deterministic network model denotes the region covered by a sensor node. So as to ensure coverage, sensor nodes should be deterministically located in the environment. Nevertheless, in many applications sensor nodes are deployed randomly (Ang and Kah 24).

Detection-oriented communicationTo enhance accurate and timely object detection, effective and efficient communication procedures are needed to support two forms of transmissions: camera-remote center transmission and sensor-camera transmission (Ang and Kah 24). Camera-remote center transmission allows camera towers to transmit captured images to the remote control center whilst sensor-camera transmission enables underground/ ground sensors to report doubtful actions to camera towers.Works citedAmmari, Habib M.

The Art of Wireless Sensor Networks: Volume 1: Fundamentals. Berlin, Heidelberg: Imprint: Springer, 2014. Internet resource.Ang, Li-minn, and Kah P. Seng. Visual Information Processing in Wireless Sensor Networks: Technology, Trends, and Applications. Hershey, PA: Information Science Reference, 2012. Print.Aykanat, Cevdet. Computer and Information Sciences - Iscis 2004: 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004 ; Proceedings. Berlin [u.a.: Springer, 2004. Print.

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera. Computer Networks: 20th International Conference, Cn 2013, Lwówek Śląski, Poland, June 17-21, 2013, Proceedings. , 2013. Internet resource.Li, Yingshu, My T. Thai, and Weili Wu. Wireless Sensor Networks and Applications. New York: Springer, 2008. Internet resource.Mao, Guoqiang, and Bariș Fidan. Localization Algorithms and Strategies for Wireless Sensor Networks. Hershey, PA: Information Science Reference, 2009. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Research Paper”, n.d.)
BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Research Paper. Retrieved from https://studentshare.org/information-technology/1685102-border-surveillance-using-wireless-sensor-network
(BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Research Paper)
BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Research Paper. https://studentshare.org/information-technology/1685102-border-surveillance-using-wireless-sensor-network.
“BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Research Paper”, n.d. https://studentshare.org/information-technology/1685102-border-surveillance-using-wireless-sensor-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK

Monitoring Offshore Oil and Gas Processes Using Ad-Hoc Wireless Network

Ad-hoc wireless network is suitably suited for offshore oil and gas processes in regard to its ability to circumvent the remote and harsh environmental challenges, in an offshore processing environment.... In offshore oil and gas processes, the choice of a network is rationalized… against its installation and maintenance cost together with its reliability, efficiency and security under a multiplicity of volatile environmental scenarios.... This research explores the enhanced reliability and security of ad-hoc wireless network in the networking of offshore The superiority of ad-hoc wireless network is attributed to their exploitation of a remote, automated and digitally implemented communication system, which circumvent the inefficiencies of an analogue and manual communication system....
4 Pages (1000 words) Research Paper

Application of Unmanned Aerial Vehicles

Such aspects as firefighting, surveillance, civil application and policing among others are the current applications where the drones are being used to promote efficiency and effectiveness.... Such aspects as land surveying, film shooting and photography, air rescue missions, power inspections and wildlife surveillance among others are possibly carried out effectively with the help of unmanned aerial vehicles (Cosic et al.... border patrol, human rescue missions and other security surveillances are examples of military applications of drones....
6 Pages (1500 words) Essay

Geospatial Intelligence Assessment Detailing the Washington DC Metro Station and the Power Stations

the city have a network of connection to the Washington D.... For the purpose of security surveillance the East Capitol is a street to keep an eye on by the security intelligence as this busy street can be used by the terrorists in their line of mission of movement towards their destination which is the North Power Station or an obstruction in that street would cause delays by the security agents in providing safety at times of terrorism attacks, and so it constitute a major approach point to the North Power Station1....
6 Pages (1500 words) Essay

Border Control Using Wireless Sensor Technology

Wireless border control sensor network architecture is made up of three main components: sensor nodes, gateways, and task managers.... The task managers are the receiving ends of the wireless border control sensor network architecture.... wireless sensor Networks, WSN, is an emerging technology that uses distributed sensors with a communications infrastructure to monitor or record environmental conditions.... sensor nodes are the components at the end of the architecture which capture the data at the border (through sensing)....
4 Pages (1000 words) Research Paper

E-commerce in China and the United States of America

Evidently, registration and licensing schemes in China go hand in hand with far-reaching surveillance processes that have a serious influence on the online speech and are driven by the political desire to suppress undesirable political speech (Negriff 130-144).... The purpose of this paper “E-commerce in China and the United States of America” is to answer three questions that are related with e-commerce and more specifically with the aspects of internet access in China and the USA, mobile payments and business model of three social media platforms....
6 Pages (1500 words) Assignment

Impact of Telephone on Society

The paper "Impact of Telephone on Society " describes that cellular technology is a blessing, as it makes communication easier regardless of location, distance, weather conditions etc.... The contributing of this technology to society is massive in terms of the advantages it portrays to the community....
6 Pages (1500 words) Essay

Threats to Information Holdings

… Security PlanIntroductionInformation security refers to the assortment of technologies, policies, standards as well as management practices, which are used to keep information safe.... In the current technology environment, firms are depending more on Security PlanIntroductionInformation security refers to the assortment of technologies, policies, standards as well as management practices, which are used to keep information safe....
14 Pages (3500 words) Essay

The Components of an Alarm System

The microwave sensor functions by emitting microwaves into the space being monitored by the sensors.... However, this poses the threat of false alarms but such a threat can be countered through the combination of the active sensor with a passive infrared detector....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us