Power-Time Efficient Algorithm for Computing Reconfigurable FFT in Wireless Sensor Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2011, Vol 2, Issue 3
Abstract
Wireless sensor network have several constraints, such as a short transmission range, poor processing capabilities, limited available power and slow execution time. The design of algorithms for fast processing of information in sensor network is an emerging research area nowadays. However, due to unique characteristics of the sensor network computing paradigm, the objective is to design algorithms that meet two contradicting goal of low power and fast execution time. In this work, a power-time efficient algorithm is proposed which is implemented with the help of Vedic mathematics for computing FFT (Fast Fourier Transform) over data distributed across smart sensors. The word “Vedic” is derived from the word “veda” which means the store-house of all knowledge. Vedic mathematics is mainly based on 16 Sutras (or aphorisms) dealing with various branches of mathematics like arithmetic, algebra, geometry etc. Significant reduction in power requirement and delay has been achieved based on the proposed approach.
Authors and Affiliations
Anuj Kumar Varshney , Vrinda Gupta
A REVIEW: Advancement in Single node data transfer energy protocol in WSN
Wireless sensor network (WSNs) gains the importance in both research and actual user. Energy saving is the major issue that is common in both. Now day maximum work in research field on the multiple hops data transmission...
Applications of ANNs in Stock Market Prediction: A Survey
This paper surveys recent literature in the domain of machine learning techniques and artificial intelligence used to predict stock market movements. Artificial Neural Networks (ANNs) are identified to be the dominant ma...
DETECTION OF VISUAL IMPAIRMENTS USING BACK PROPAGATION NEURAL NETWORKS
Proliferative diabetic retinopathy is the more serious conditions as it involves the proliferative growth of abnormal new vessels on the retina. New vessels characteristic appearance like narrower calibre and more tortuo...
Secure Authentication Protocol to Detect Sybil Attacks in MANETs
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In...
Pistons & Rings Management System
The rapid growth of human-computer interaction efforts resulted, more and more useful softwares to reduce human efforts. The item inventory system automated inventory system , instead of manually, manage inventory of a S...