A novel data fusion algorithm to combat false data injection attacks in networked radar systems
Networked radar systems are vulnerable to different types of attacks, including electronic
countermeasure (ECM) jamming and false data injection (FDI) attack. Substantial research …
countermeasure (ECM) jamming and false data injection (FDI) attack. Substantial research …
Pipe routing-path planning (with many constraints)
D Zhu, JC Latombe - … 1991 IEEE International Conference on Robotics …, 1991 - computer.org
Photo crowdsourcing with smartphone has attracted considerable attention recently due to
the prevalence of smartphones and the rich information provided by photos. In scenarios …
the prevalence of smartphones and the rich information provided by photos. In scenarios …
Optimal placement for barrier coverage in bistatic radar sensor networks
By taking advantage of active sensing using radio waves, radar sensors can offer several
advantages over passive sensors. Although much attention has been given to multistatic …
advantages over passive sensors. Although much attention has been given to multistatic …
Resource-aware photo crowdsourcing through disruption tolerant networks
Photo crowdsourcing with smartphone has attracted considerable attention recently due to
the prevalence of smartphones and the rich information provided by photos. In scenarios …
the prevalence of smartphones and the rich information provided by photos. In scenarios …
Optimizing source and receiver placement in multistatic sonar networks to monitor fixed targets
Multistatic sonar networks consisting of non-collocated sources and receivers are a
promising development in sonar systems, but they present distinct mathematical challenges …
promising development in sonar systems, but they present distinct mathematical challenges …
Minimum cost placement of bistatic radar sensors for belt barrier coverage
How to construct barrier coverage efficiently is a critical problem for many wireless sensor
network applications, such as boundary surveillance and intrusion detection. In this paper …
network applications, such as boundary surveillance and intrusion detection. In this paper …
Solving multistatic sonar location problems with mixed-integer programming
A multistatic sonar system consists of one or more sources that are able to emit underwater
sound, and receivers that listen to the reflected sound waves. Knowing the speed of sound …
sound, and receivers that listen to the reflected sound waves. Knowing the speed of sound …