[1] M. Atto and C. G. Guy, “A cross layer protocol based on mac and routing
protocols for healthcare applications using wireless sensor networks,”
in International Journal of Advanced Smart Sensor Network Systems (
IJASSN ), vol. 4, no. 2, April 2014.
[2] M. Atto and C. Guy, “Wireless sensor networks: MAC protocols
and mobility management module for real-time applications,” in The
Ninth International Conference on Wireless and Mobile Communications
(ICWMC 2013), Nice,France, July 2013, pp. 1 – 6.
[3] M. Atto and C. G. Guy, “Wireless sensor networks: MAC protocols and
real time applications,” in The 13th Annual Post Graduate Symposium on
the Convergence of Telecommunications, Networking and Broadcasting
(PGNet2012), Liverpool, UK, United Kingdom, June 2012.
[4] X.-S. Yi, P.-J. Jiang, X.-W. Wang, and S.-C. Zhang, “Survey of energysaving
protocols in wireless sensor networks,” in First International
Conference on Robot, Vision and Signal Processing (RVSP), Nov. 2011,
pp. 208 –211.
[5] P. Suriyachai, U. Roedig, and A. Scott, “A survey of mac protocols for
mission-critical applications in wireless sensor networks,” Communications
Surveys Tutorials, IEEE, vol. PP, no. 99, pp. 1 –25, 2011.
[6] D. Zhixiang and Q. Bensheng, “Three-layered routing protocol for wsn
based on leach algorithm,” in IET Conference on Wireless, Mobile and
Sensor Networks, (CCWMSN07)., Dec. 2007, pp. 72 –75.
[7] R. A. Roseline and P. Sumathi, “Local clustering and threshold sensitive
routing algorithm for wireless sensor networks,” in International Conference
on Devices, Circuits and Systems (ICDCS), 2012, pp. 365–369.
[8] D. Baghyalakshmi, J. Ebenezer, and S. A. V. SatyaMurty, “Low latency
and energy efficient routing protocols for wireless sensor networks,”
in International Conference on Wireless Communication and Sensor
Computing (ICWCSC), Jan 2010, pp. 1–6.
[9] O. Sekkas, S. Hadjiefthymiades, and E. Zervas, “A multi-level data
fusion approach for early fire detection,” in 2nd International Conference
on Intelligent Networking and Collaborative Systems (INCOS), 2010, pp.
479–483.
[10] E. N. Udo and E. B. Isong, “Flood monitoring and detection system
using wireless sensor network,” in Asian Journal of Computer and
Information Systems, vol. 01, December 2013.
[11] S. Pal, D. Bhattacharyya, G. Tomar, and T. Kim, “Wireless sensor
networks and its routing protocols: A comparative study,” in International
Conference on Computational Intelligence and Communication
Networks (CICN), Nov. 2010, pp. 314 –319.
[12] L. Tang and S. Liu, “Improvement on leach routing algorithm for
wireless sensor networks,” in International Conference on Internet
Computing Information Services (ICICIS), Sept. 2011, pp. 199 –202.
[13] Donovan, T., Brown, J., Roedig, U., Sreenan, J. C.J. and, Dunkels, A.,
Klein, A., J. Silva, Vassiliou, V., and L. Wolf, “Ginseng: Performance
control in wireless sensor networks,” in 7th Annual IEEE Communications
Society Conference on Sensor Mesh and Ad Hoc Communications
and Networks (SECON), June 2010, pp. 1 –3.
[14] W. Li, J. Zhang, J. Zhang, Z. Xia, and G. Wang, “The monitoring of
host computer for forest fire detection system based on wireless sensor
network,” in 5th International Conference on Wireless Communications,
Networking and Mobile Computing. WiCom ’09., 2009, pp. 1–4.
[15] Y. Liu, Y. Gu, G. Chen, Y. Ji, and J. Li, “A novel accurate forest fire
detection system using wireless sensor networks,” in Seventh International
Conference on Mobile Ad-hoc and Sensor Networks (MSN), Dec
2011, pp. 52–59.
[16] I. Vukasinovic and G. Rakocevic, “An improved approach to track forest
fires and to predict the spread direction with wsns using mobile agents,”
in MIPRO, 2012 Proceedings of the 35th International Convention, May
2012, pp. 262–264.
[17] A. Boulis, “Castalia: A simulator for wireless sensor networks and body
area networks,” in http://castalia.npc.nicta.com.au, NICTA, [retrieved:
May, 2014], March 2011, pp. 1 – 120.
[18] E. Basha and D. Rus, “Design of early warning flood detection systems
for developing countries,” in International Conference on Information
and Communication Technologies and Development (ICTD), Dec 2007,
pp. 1–10.
[19] A. Aziz, Izzatdin, Hamizan, I.A., S. Haron, Nazleeni, Mehat, and Mazlina,
“Cooperative flood detection using gsmd via sms,” in International
Symposium on Information Technology, (ITSim), vol. 3, Aug 2008, pp.
1–7.
[20] Y. Chen and K. Hwang, “Collaborative change detection of ddos
attacks on community and isp networks,” in International Symposium
on Collaborative Technologies and Systems, (CTS), May 2006, pp. 401–
410.
[21] W. Asmara and N. Aziz, “Sms flood alert system,” in Control and System
Graduate Research Colloquium (ICSGRC), 2011 IEEE, June 2011, pp.
18–22.