Implementing secure data accumulation by ant agents in wireless sensor network using randomized dispersive routes
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 7
Abstract
In this paper we discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP( Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant based routing and the implementation of the Dijkstra’s algorithm to reach the data using the shortest path. Further the use of NRRP assures that the data is securely transported from the source to the sink by the ant agents.
Authors and Affiliations
Sharon C DSouza , Mrs. Rajapuspha
An Evolving Approach on Video Frame Retrieval Based on Color, Shape and Region
This paper proposes a new methodology for matching of objects in video based on the color, shape and region. The objects are segmented and indexed based on the similarity between the frames. The similarity feature such a...
Movement Evaluation Algorithm for video coding in Video Compression
The increase demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital video technology a necessity. A problem, however, i...
A MACHINE LEARNING APPROACH TO PREDICT SOLAR RADIATION FOR SOLAR ENERGY BASED DEVICES
Solar energy is used in many applications, such as increasing water’s temperature or moving electrons in a photovoltaic cell, agriculture planning, fuel production, electricity production, transport, architecture and urb...
Two Stage Robust Filtering Technique to Remove Salt & Pepper Noise in Grayscale Image
Digital images are playing a key role but while transmitting the image more disturbances are produced by the noise which corrupts the image. Denoising leads to good quality image and restoration of original information....
INVISIBLE MULTIPLE WATERMARKING WITH MINIMUM DISTORTION USING DWT-DCT-CDMA
with the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of wa...