1 |
U. Volovelsky, "Civilian uses of unmanned aerial vehicles and the threat to the right to privacy - An Israeli case study," Computer Law & Security Review, vol. 30, 2014, pp. 306-320.
DOI
|
2 |
J. Park, S. Lee, and W. Oh, "Priority routing based Congestion Control; Packet Service Time; Wireless sensor networks; Congestion Detection," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 2, 2009, pp. 13-18.
|
3 |
K. Kim, D. Kim, and S. Bae, "An Enhanced Robust Routing Protocol in AODV over MANETs," J. of the Korea Institute of Electronic Communication Sciences, 2013, pp.321-328.
|
4 |
G. Salvo, L. Caruso, and A. Scordo, "Urban traffic analysis through an UAV," Procedia Social and Behavioral Sciences, vol. 111, 2014, pp.532-539.
|
5 |
S. Kim, "A Study on the attitude control of the quadrotor using neural networks", J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 9, 2014, pp.1019-1025.
DOI
|
6 |
S. Kim, H. Oh, J. Suk, and A. Tsourdos, "Coordinated trajectory planning for efficient communication relay using multiple UAVs," Control Engineering Practice, vol. 29, 2014, pp. 42-29.
DOI
|
7 |
S. Ge and F. Lewis, "Autonomous Mobile Robots, Sensing: Control, Decision Making and Applications," CRC Press, 2006.
|
8 |
T. Hayes, and F. H. Ali, "Proactive Highly Ambulatory Sensor Routing(PHASeR) protocol for mobile wireless sensor networks," Pervasive and Mobile Computing, vol. 21, 2015, pp. 47-61.
DOI
|
9 |
D. Kampitaki, A. A. Economides, "Simulation study of MANET routing protocols under FTP traffic," Procedia Technology, vol. 17, 2014, pp. 231-238.
DOI
|
10 |
R. Clarke, "Understanding the Drone Epidemic," Computer Law & Security Review, vol. 30, 2014, pp. 230-246
DOI
|