دانلود و نمایش مقالات مرتبط با نظارت بر مرز::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - نظارت بر مرز

تعداد مقالات یافته شده: 1
ردیف عنوان نوع
1 Optimal sensor deployment to increase the security of the maximal breach path in border surveillance
استقرار سنسور بهینه برای افزایش امنیت حداکثر مسیر شکست در نظارت بر مرز-2017
Article history:Received 4 May 2014Accepted 7 September 2016Available online 14 September 2016Keywords:OR in defense Border surveillanceWireless sensor networks Bilevel programming Maximal breach pathWireless Sensor Networks (WSN) are based on the collaborative effort of a large number of sensors which are low-cost, low-power, multi-functional small electronic devices. They provide a distributed sensing and monitoring environment for the area of interest and hence are used for applications such as environmen- tal monitoring, border surveillance, and target tracking. In this work we study optimal deployment of WSNs for border surveillance using a static Stackelberg game frame and propose a bilevel optimization model for the optimal deployment of a heterogenous WSN so that the security of the area under con- sideration is increased as much as possible. There are two players in this game: defender and intruder. The defender is the leader and tries to determine the best sensor locations so as to maximize the secu- rity measured in terms of coverage intensity at discretized points in the area. The well-informed intruder assuming the role of the follower is capable of destroying some of the sensors so as to identify the max- imal breach path, which represents the safest path from his perspective and thus increases the chance of being undetected by the sensors. This new approach results in a mixed-integer linear bilevel program- ming formulation that is difficult to solve exactly. Therefore, we propose three Tabu search heuristics and realize computational experiments on a large set of test instances in order to assess their performances.© 2016 Elsevier B.V. All rights reserved.
Keywords: OR in defense | Border surveillance | Wireless sensor networks | Bilevel programming | Maximal breach path
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 8653 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 8653 :::::::: افراد آنلاین: 77