Autograph Protocol for Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
A wealth of innovative opportunities exists for a mobile communications solution that can reliably communicate data without the need for fixed network infrastructure. A key element of any communications system is the provision of protocols to provide reliable data transfer across the network. The Autograph protocol is a deterministic broadcast protocol designed for MANETs that claims to impose minimal restrictions on network topology. This paper assesses an implementation of the Autograph protocol on a wireless sensor network of Motes with modest computational capabilities. The assessment of the success of data transfer under varying conditions will establish the reliability of the protocol and its adaptability to varying conditions and thus determine its suitability for deployment on the wireless sensor network platforms.
Authors and Affiliations
Sharada Kaganurmath, H. Pavithra, Chaitra N Urs
An Approach for Providing Privacy of Microdata Publishing
In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...
To Measure The Average Delay Experienced By A Subscriber To Connect In An Attribute Tree
Validation of publishers and subscribers is not simple to get due to the loose coupling ofpublishers and subscribers.We also present extensions of the cryptographic methods to proffer capable routing of encrypted eve...
Intensity Difference Technique Implementation for Smile Detection
Smile detection has many potential applications. Our paper presents an efficient approach of smile detection. We have combined. Weak Classifiers depending upon intensity differences. This will generate a Strong classi...
Automated Sentiment Analysis System Using Machine Learning Algorithms
Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it....
mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot
As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) i...