Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


January Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the January 2023 Edition of the journal. The last date of research paper submission is December 15, 2022.

The Progression of Dynamic Reconfigurable Intrusion Identification Wireless Sensor Network

Hathal Salamah A. Alwageed. Published in Wireless

International Journal of Applied Information Systems
Year of Publication: 2015
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Hathal Salamah A. Alwageed
Download full text
  1. Hathal Salamah A Alwageed. Article: The Progression of Dynamic Reconfigurable Intrusion Identification Wireless Sensor Network. International Journal of Applied Information Systems 9(6):28-30, September 2015. BibTeX

    	author = "Hathal Salamah A. Alwageed",
    	title = "Article: The Progression of Dynamic Reconfigurable Intrusion Identification Wireless Sensor Network",
    	journal = "International Journal of Applied Information Systems",
    	year = 2015,
    	volume = 9,
    	number = 6,
    	pages = "28-30",
    	month = "September",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"


WSN’s are anticipated turn out to be an imperative implementation for an assortment of safety measures and for miscellaneous monitoring applications. We have witnessed and detailed the growth and expansion of a WSN’s with having manifold formation of intrusion recognition and categorization. Initially, reasonably trouble-free nodes by means of indispensable sensing devices, a low computational power microcontroller and faculties of wireless transmission are brought into play. The primary stage nodes are exercised as preface intrusion recognizers/detectors. The subsequent/following sensor node is constructed in the order of a towering performance/act FPGA dealing out an assortment of cameras. Such nodes are able to be vigorously built up to carry out diverse forms of scrutiny and visual data processing to bear out and authenticate the existence of every intruder/burglar/imposter in the prospect and to endow with further facts in relation to the intruder. Specifically, the network is capable of lending a hand to an individual operator to substantiate the system’s assessment weather an identified or discovered intruder is an impending threat.


  1. ”Obraczka et al”, “Managing the Information Flow in Visual Sensor Networks,'”' Proc. WPMC 2002: The Fifth International Symposium on Wireless Personal Multimedia Communication, October 27--30, 2002, Honolulu, HI.
  2. “Estrin”, “Sensor network research: Emerging challenges for architecture, systems, and languages,” in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), ser. ACM SIGPLAN notices, C. Norris and J. J. B. Fenwick, Eds., vol. 37, 10. New York: ACM Press, October 5–9 2002, pp. 1–4.
  3. “Collins et al”, "A System for Video Surveillance and Monitoring," in Proceedings of the American Nuclear Society (ANS) Eighth International Topical Meeting on Robotics and Remote Systems, April, 1999.
  4. “Collins et al”, "Algorithms for cooperative multisensor surveillance," Proceedings of the IEEE, Vol. 89, No. 10, October, 2001, pp. 1456 - 1477.
  5. “J. Bellis et al”, “Development of Field Programmable Modular Wireless Sensor Network Nodes for Ambient Systems”, Computer Communications – Accepted for Special Issue on Wireless Sensor Networks, to appear in 2005.
  6. “John Lach et al”, “Power-Efficient Adaptable Wireless Sensor Network”,. Military and Aerospace Programmable Logic Devices International Conference, 2003.
  7. “Meffert B et al “, Winkler F: “Monitoring traffic by optical sensors”. Second International Conference on Intelligent Computing and Information Systems Proceedings, pp. 9-14.
  9. “M.S. Islam et al”, “Towards invariant interest point detection of an object,” Proc. 13th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 101-104, Czech Republic, 2005.
  10. “M.S. Islam et al”, "Matching interest points of an object," IEEE International Conference on Image Processing, Genova, Italy, September 11 -14, 2005 (accepted).
  11. “H. Wu et al”, "Energy Efficient Distributed JPEG2000 Image Compression in Multihop Wireless Networks," in Proceedings of the 4th workshop on Applications and Services in Wireless Networks (ASWN), Boston, Massachusetts, 2004.
  12. “N. Taylor et al”,. “Adaptive image compression for enabling mobile multimedia communication”, in Proceedings of IEEE International Conference on Communications, 2001.
  13. “N. Taylor et al”, “Energy/latency/image quality trade-offs in enabling mobile multimedia communication”, in E. D. Re, editor, Software Radio – Technologies and Services, pages 55–66. Springer Verlag, 2001.


Intrusion Identification, WSN