A Multi-hop approach for sensing coverage in wireless sensor network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
Wireless sensor networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied widely and usefully applied in many applications like military surveillance, environmental monitoring etc. In WSNs, a large number of sensor nodes are deployed arbitrarily over the considered area; therefore, the sensing regions of different sensor nodes may be partially overlapped. In this paper, we are trying to realize maximum sensing coverage problem in WSNs. In our method, we have taken the concept of both gateway node and redundant node removal technique. Many protocols have been developed to collect, receive and transferring data more energy efficient. In this paper, we propose a multi-hop cluster based routing protocol and compare it with some single-hop approaches.
Authors and Affiliations
AMLAN JYOTI BARUAH , DR. SANTOSH KUMAR SWAIN , CHINMOY BHARADWAJ
Foundations of a rapid de-noising technique in real time image processing applications
A noise is an inherent entity of the imaging technologies that tend to deteriorate the quality of processed images at all levels. At the hardware level they appear as the dark current, shot noise etc. however at the imag...
Effort Reduction by Automatic Code Generation
The emergence of Unified Modelling Language (UML) as a standard for modelling systems has encouraged the use of automated software tools that facilitate the development process from analysis through coding. In our approa...
Speaker Independent Isolated Tamil Words Recognition System using Different Classifiers
The paper is to build a speaker independent isolated speech recognition system for Tamil Language. The system consists of four steps: first step involves recording of Tamil spoken words using high quality studio micropho...
MELIORATING MM CUBE TECHNIQUE
In this paper I have analyzed and improved MM Cube Technique to better time-efficiency. MM Cube that compute Iceberg Cubes by factorizing the lattice space according to the frequency of values. This approach, different f...
Ad hoc Network and its Security Essentials
This In this paper we present an analysis of ad hoc network and how the attacks are prominence on the ad hoc network. Basically ad hoc network is a combination of several nodes which are linked over without wires which m...