A Graphical Tool Designed to Deploy Wireless Sensors in Homogeneous Grid Selected from Irregular Polygon
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
In this paper, we present a graphical tool, which will help us with algorithms that are used for finding Quality of Service. This tool relates these algorithms to the real world and thus provides a better insight into the actual problems of deploying sensors in a field and finding out whether QoS would be achieved or not. We have used Mathematical Gur Game and its application to deploy the sensors in the homogeneous are, which is selected from the Irregular Polygon.
Authors and Affiliations
DR. Nitin
ANALYSIS OF STUDENT ACTIVITIES ON COMPUTER - A STUDY ON PUNJAB UNIVERSITY, INDIA
The purpose of this research is to investigate and understand how students are using computer. The activities that a student undertakes with the help of computers which might be fulfilling some academic or non academic p...
MOBILE SMART EMERGENCY RESPONSE SYSTEM FOR JEDDAH CITY
Responding to disasters and crises is a crucial role for the government to ensure the public safety of society. Responding lies in the counter of crimes of civil or disorders, providing the urgent medical care to injured...
A Hybrid Approach of AES and File Encryption to Enhance The Cloud Security
Cloud computing is a paradigm shift in the way we define software and hardware, and architect our IT solutions. The emerging cloud technologies, due to their various unique and attractive properties, are evolving with tr...
ACID GAS ABSORPTION STUDIES IN PACKED COLUMN
Carbon dioxide is a major greenhouse gas that results in climatic changes. Reducing CO2 emission for addressing the climatic change concerns is becoming increasingly important as the CO2 concentration in the atmosphere h...
Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile ad...