Analysis of Simulation Tools for Underwater Wireless Sensor Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
Our earth is enclosed by 75% of water that could be a river or sea or ocean. The underwater sensor network becomes more and more conventional for monitoring huge areas of the oceans where manual intervention is not possible. Underwater sensor Networks consist of an inconsistent number of sensors that are deployed to carry out monitoring tasks over a given area. The UWSNs offer continuous observation for various applications similar to ocean sampling networks, pollution monitoring, disaster prevention, submarine detection, etc. Simulation tools for underwater wireless sensor networks are gradually being used more to study sensor webs and to study new applications and protocols in this developing research field. This paper gives a simple analysis of simulation tools used for underwater sensor networks with a view to help researchers.
Authors and Affiliations
V. P. Dhviya , R. Arthi
A LITERATURE SURVEY ON MULTITHREADING TECHNIQUES TO AVOID DATA LOSS IN CLOUD STORAGE
“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...
A Single Image Super Resolution Using Advanced Neighbor Embedding
There are lots of Super resolution methods developed recently. Each has its own pros and cons and behavior. The neighbor-embedding (NE) algorithm for single-image super-resolution reconstruction is one of them which assu...
Cephalometric analysis for finding facial growth abnormalities
Cephalometric analysis of lateral radiographs of the head is an important diagnosis tool in orthodontics. Based on physically locating specific landmarks, it is a boring, lengthy and error prone task. The objective of th...
Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS
The Paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Fl...
Design & Evaluation For Conversion from Dv to Mpeg4 Video in Grid Environment
The term, grid computing, has become one of the latest buzz words in the IT industry Grid computing is an innovative approach that leverages existing IT infrastructure to optimize computer resources and manage data and c...