Design Face track To Achieve An Efficient And Real-Time Tracking Through Detecting The Movement of A Target In WSN’S
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
The Research in target tracking can be approximately divided into three categories. Treebased schemes, cluster based schemes predictionbased schemes. This paper, mainly recommends Face Track, a framework of activities using face tracking in a WSN, which does not fall into existing groups and is to the best of my knowledge, the first of its kind. I propose Face Track, a new tracking framework that detects the movements of a target using polygon (face) tracking, stimulated by the planarized algorithm, which does not rely on any global topology. Introducing brink detection algorithm that facilitates the WSN to be responsive for the target moving inside the polygon a bit earlier, and to work in a timely fashion. Simulation results, compared with existing work, show that Face Track attains better tracking correctness and power competence.
Authors and Affiliations
G. Sanjiv Rao, B. Manjusha
Enhancement Of Power Quality Under Different Fault Condictions And Harmonic Elimination By Using D-Statcom
this paper mainly focuses on power quality with D-STATCOM Due to the non-standard voltage, frequency, and current at distribution side. In this paper the role of DSTATCOM (Distribution Static Compensator) are located...
An Effective Scheme for Countering Distributed Denial of Service Attacks on Mobile Ad-hoc Networks
Mobile ad hoc networks play a key role in the private and public communication, yet their application is being hampered by network attacks. One of the most dangerous attacks that pose a serious threat to the mobile a...
High Speed Design of an Information Lossless 8 Bit Carry Select Adder using CNT FET
Basic reasons for research on reversible logic are the power consumption and heat dissipation. Existing systems have designed carry select added using TSG gate, for four bit addition. In the proposed system an enhan...
Double Compression Of JPEG Image Using DWT Over RDWT
Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...
Extraction of Frequent Subgraph from Graph Database
Graphs are promising abstraction of complex structured and semi-structured data. Graph mining techniques extract, analyze and summarize significant and useful information from the graph databases. Finding frequent su...