Resource & Quality Awareness Algorithm for Location Based Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Location monitoring refers to the system where the wireless sensor network odes counts the number of sensors which are capable of detecting the objects present in their sensing areas. Third party always monitor the personal location which is becoming a privacy threat. To over come this we have proposed a method by using a series of routers to hide the client’s IP address from the server. We propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in-network location anonymization algorithms, namely, Cloaked Area Determination Algorithm and quality enhanced histogram algorithm that will help the system to enable and provide high-quality location monitoring services for system users, while preserving personal location privacy. The Cloaked Area determination algorithm aims to minimize communication and computational cost, A quality enhanced histogram approach is used that estimates the distribution of the monitored persons based on the gathered aggregate location information. Then, the estimated distribution is used to provide location monitoring services through answering range queries.
Authors and Affiliations
G Ramesh, B. V. Reddy
MINIMIZING END – TO – END DELAY IN MULTIPARTY NETWORK APPLICATIONS
In these days interaction between different network applications are becoming more popular and to improve the speed and datatransfer rate delay difference between the multynetworks should minimize. In this paper we p...
Empowering the Privacy in Online Social Networks
Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper cla...
A Rule Based Approach For Malayalam-English Translation
This paper presents an approach for translating simple Malayalam sentences to English. As the Malayalam language is morphologically rich, free word order and highly agglutinative it is very difficult to process the sent...
Design Of Ternary Logic Gates Using CNTFET
This paper presents a novel design of ternary logic gates like STI,PTI,NTI,NAND and NOR using carbon nanotube field effect transistors. Ternary logic is a promising alternative to the conventional binary logic design...
Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet
Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...