One Dominant Graph Topology for Heterogeneous Wireless Sensor Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 9
Abstract
The integration of different wired and wireless access technologies constitute the nextgeneration heterogeneous network. A typical wireless sensor network configuration consists of sensors sensing and transmitting their observation values to some control center, the so-called sink node, which serves as a user interface. Due to the limited transmission range, sensors that are far away from the sink deliver their data through multihop communications. As sensor devices are resource constrained, extending the network life time is very crucial to the functioning of the system. In this paper it is proposed to identify a one dominant node based topology in heterogeneous set up. The topology management is proved to be highly energy efficient.
Authors and Affiliations
Jasmine Norman
Keystone Error Correction Method in Camera-Projector System to Correct the Projected Image on planar surface and tilted projector
Projector camera systems are basically systems that can serve as improvement to projector based applications by addition of visual feedback to the projector. However, unless the projector is precisely aligned to the pres...
IMPLEMENTATION OF IMAGE PROCESSING ALGORITHMS ON THE PARALLEL PLATFORM USING MATLAB
Application with sequential algorithm can no longer rely on technology scaling to improve performance. Image processing applications exhibits high degree of parallelism and are excellent source for multicore platform. Ma...
A New Multi-hop approach for sensing coverage in wireless sensor network
Sensor networks provide a strong combination of distributed sensing, computing and communication. Wireless sensor networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied wi...
Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS
The Paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Fl...
A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
This paper presents a new approach to off-line handwritten numeral recognition. Recognition of handwritten numerals has been one of the most challenging task in pattern recognition. Recognition of handwritten numerals po...