A Survey on Sensor Cloud: Architecture and Applications
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2014, Vol 6, Issue 1
Abstract
Cloud Computing is a part of computer science and it enables providing Internet services to external customers via very scalable computing capacities. It is abstracted, controlled and high-scalable computer infrastructure which hosts applications for clients. Data services are located in shared, dynamic and scalable set of resources based on technologies of virtualization and scalable application environments. Wireless Sensor Networks can be used for collecting these data because they present distributed systems which consists of different sensor nodes. Sensors are spatially distributed and they are used for measuring different values, such as temperature, humidity, sound levels, pressure, environment variables etc.Many researchers have cited different types of technology in this context. But the application scenario are of important consideration while designing a specific protocol for Sensor network with reference to Cloud Computing. In this paper, we surveyed some typical applications of Sensor Network using Cloud computing as backbone. Since Cloud computing provides plenty of application, platforms and infrastructure over the Internet; it may combined with Sensor network in the application areas such as environmental monitoring, weather forecasting, transportation business, healthcare, military application etc. Bringing various WSNs deployed for different applications under one roof and looking it as a single virtual WSN entity through cloud computing infrastructure is novel.
Authors and Affiliations
Mr. K. Sindhanaiselvan , Ms. T. Mekala
Compressed Sensing Based Image Encoding Technique for Wireless Sensor Networks
The Wireless Sensor Network (WSN) is the one, which generally consists of cameras themselves, which have some local image processing, communication and storage capabilities, and one or more central computers, where image...
Fake Access Point Detection and Prevention Techniques
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...
Contrast Enhancement for Emissive Display Using Histogram Equalization and Bilateral Tone Adjustment
Contrast enhancement has an important role in image processing applications. Conventional contrast enhancement techniques often fail to produce satisfactory results for broad variety of low contrast images or canno...
Utility Based Routing in Mobile Networks
Self Adaptive Utility based Routing SAURP is characterized by the ability of identifying potential opportunities of forwarding messages to their destinations through a novel utility function based mechanism in whic...
Low Power High Speed Two’s Complement Multiplier
To reduce the area of partial product array size and improve the speed which is generated by a radix-4 Modified Booth Encoded Multiplier is used. This reduction is possible without any increase in the delay of the...