Professional Documents
Culture Documents
1678
ISSN 2321 3361 2016 IJESC
`
Research Article
INTRODUCTION
RELATED WORK
7039
http://ijesc.org/
III.
COMPARISONS
APPLICATIONS
OF
MILITARY
E.
It is extremely challenging to separate questions in the underwater environment which change in size, shape, and
introduction from regularly happening and man-made
disorder. For that unmanned underwater vehicle (UUV) sensor
frameworks described by high sensor information rates and
constrained preparing capabilities is utilized by Naval Surface
Warfare Centre Panama City (NSWC PC) to output the sonar
picture and characterize the picture characteristics,
geometrically characterized structures with introductions, and
confined ghastly data into different orthogonal parts or
emphasize sub-spaces of the picture [4].
7040
http://ijesc.org/
can save lives of many [6]. It is good that t can sense the NBC
and can save many lives but it should be make sure that it can
sense the NBC even in a very little size and at very early
stage. For this purpose the sensor nodes can be placed close to
these to the plant and their threshold value should be set even
very low than the danger limit so that preventive measures can
be taken before the danger limit is reached.
Tracking military vehicles is another important aspect of using
sensors in military side. Here, sensor nodes are deployed from
an unmanned aerial vehicle (UAV) [7] [40-43]. In order to
sense the closeness of tanks, Magnetometer sensors are
attached to the nodes. Sensor nodes collaborate in order to
estimate the path and velocity of tracked vehicle. In order to
track these vehicles, the tracking object should have a
predefined amount of metallic material. Thisamount can be
specified by the programmer while programing the sensor.
IV.
CONCLUSION
From above discussion, it is clear that WSNs plays an
important role in military operations. With the help of these
networks, not only the critical areas can be monitored but also
due to its flexible nature, it can be expanded to the nearby
areas according to the requirements with the passage of time.
Moreover due to its fault tolerance characteristic, if any node
got damaged, the rest of the network will continue sensing.
Rest of the network will not be affected due to the damage of a
single or a group of sensors.
The use of Wireless Sensor Networks (WSNs) will reduce the
casualty rate. Normally these networks are deployed in risky
and critical areas where there is always a strong threat to
soldiers in case of their presence. The damage of sensor
nodes in that scenario is not noticeable because of their easily
availability and inexpensive nature.
As we discussed earlier, Wireless Sensor Networks (WSNs)
have a vast variety of applications for military purposes, but
keeping in mind the importance and critical nature of security
and safety, there should be a number of more applications are
possible in military operations. This requires further research
in this field.
REFERENCES
7041
http://ijesc.org/
Tunisia.
[12]. Khan, F. (2014). Secure Communication and Routing
Architecture in Wireless Sensor Networks. the 3rd Global
Conference on Consumer Electronics (GCCE) (p. 4).
Tokyo, Japan: IEEE Tokyo.
[13]. M. A. Jan, P. Nanda, X. He and R. P. Liu, PASCCC:
Priority-based application-specific congestion control
clustering protocol Computer Networks, Vol. 74, PP92-102, 2014.
[14]. Khan, F. (2014, May). Fairness and throughput
improvement in multihop wireless ad hoc networks.
In Electrical and Computer Engineering (CCECE), 2014
IEEE 27th Canadian Conference on (pp. 1-6). IEEE.
[15]. Mian Ahmad Jan and Muhammad Khan, A Survey of
Cluster-based Hierarchical Routing Protocols, in
IRACSTInternational Journal of Computer Networks
and Wireless Communications (IJCNWC), Vol.3, April.
2013, pp.138-143.
[16]. Khan, S., Khan, F., & Khan, S.A.(2015). Delay and
Throughput Improvement in Wireless Sensor and Actor
Networks. 5th National Symposium on Information
Technology: Towards New Smart World (NSITNSW)
(pp. 1-8). Riyadh: IEEE Riyad Chapter.
[17]. Khan, F., Khan, S., & Khan, S. A. (2015, October).
Performance improvement in wireless sensor and actor
networks based on actor repositioning. In 2015
International Conference on Connected Vehicles and
Expo (ICCVE) (pp. 134-139). IEEE.
[18]. Khan, S., Khan, F., Jabeen. Q., Arif. F., & Jan. M. A.
(2016). Performance Improvement in Wireless Sensor
and Actor Networks. in the Journal Applied,
Environmental, and Biological Sciences Print ISSN:
2090-4274 Online ISSN: 2090-4215
[19]. Mian Ahmad Jan and Muhammad Khan, Denial of
Service Attacks and Their Countermeasures in WSN, in
IRACSTInternational Journal of Computer Networks
and Wireless Communications (IJCNWC), Vol.3, April.
2013.
[20]. M. A. Jan, P. Nanda, X. He and R. P. Liu, A Sybil
Attack Detection Scheme for a Centralized Clusteringbased
Hierarchical
Network
in
Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015,
IEEE.
[21]. Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., Jan., S.R.,
Ullah, F., (2016) A Survey : Embedded Systems
Supporting By Different Operating Systems in the
International Journal of Scientific Research in Science,
7042
http://ijesc.org/
7043
http://ijesc.org/