Routing protocols in underground coalmine environment: A Review
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 6
Abstract
Researchers have worked on routing issues for adhoc-networks, VANET’s, and Wireless Sensor Networks in a normal scenario; recently there has been a recent trend towards the study on underground wireless networks and proposals for design and development for Wireless Underground Sensor Networks. This paper highlights the concept of wireless underground sensor network in the coal mine environment, its application and various protocols related to underground coal mine environment have been studied. The focus is on various issues, routing protocols and parameters used for comparison of their performance with an insight into the applications of underground wireless sensor network. No doubt, the WUSN has its own share of challenges and the research has just started.
Authors and Affiliations
Hariom Agrawal , Dr. A. K. Verma
Six Sigma Quick Switching Variables Sampling System Indexed by Six Sigma Quality Levels
Motorola corporation introduced the concept of Six Sigma is a method for improving overall quality and production. If this concept of Six Sigma adopted in an organization it can results in 3.4 or lower defects per millio...
Survey on Improving Frequent Pattern mining in Spatial Database
spatial database system as a database system that offers spatial data types in its data model and query language and supports spatial data types in its implementation, providing at least spatial indexing and spatial join...
Review of Security in Manets Using Cryptographic Techniques
Ad hoc on demand distance vector (AODV) is a routing protocol for Mobile Ad hoc networks. An ad hoc network is a collection of moveable nodes which works without the need of any centralized base station or any infrastruc...
Collision Avoidance Using WTRP-MAC Protocol for Clustered Wireless Sensor Network
In a clustered wireless sensor network, multiple accesses at a time lead to collision. This could cause retransmit of lost packets. It increases power consumption, decreases sensor lifetime and delay in packet transmissi...
Efficient Data Sharing with Unbounded Ciphertext Classes in Cloud Storage using Single key
Cloud computing is an emerging paradigm in which resources of the computing infrastructure can be able to share over the internet. As this paradigm also have many challenges for data security and access control when user...