Survey on energy consumption in wireless IOT
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 1
Abstract
This paper focuses the Internet of Things. Main enabling feature of this promising model is the integration of several technologies and communication solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the subsequently invention Internet), and distributed intelligence for smart objects are just the most appropriate. The Internet of Things represents a hallucination in which the Internet extends into the real world hypothesis everyday objects. Physical objects are no longer detached from the virtual world, but can be controlled remotely and can act as physical access points to Internet services. Internet of Things (IoT) is a theory that envisions all items around us as element of internet. IoT management is very wide and includes diversity of things like smart phones, tablets, and sensors. Once all these devices are linked to each other, they facilitate more and more smart processes and services that maintain our basic needs, surroundings and health. Such huge number of devices linked to internet provides many different services. They also generate enormous amount of data and information. To decrease the huge amount of data we need to use data mining algorithm to provide user only required and important information.
Authors and Affiliations
Mahesh Patil , Mahesh Sutar , Sachin Waghmare , Prof. Kirti Panmand
Self-timed Circuit Device Size Optimization for an Input Data Distribution
New design techniques with energy-delay characteristics that are superior to that of the synchronous timing and control approach are needed today because the throughput of systems realized with this method is limited by...
Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS
The Paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Fl...
Modified Booth Dadda Multiplier using Carry Look ahead adder Design and Implementation
This paper proposes a novel 8X8 bit Modified Booth Dadda Multiplier architecture which is an improved version of Modified Booth Wallace Multiplier. The idea involves the generation of partial products using Modified Boot...
Automatic System For Brain Tumor Detection And Classification Using Level Set And ANN
Even with increasing popularity of MRI imaging techniques, the assessment of lesions in brain area is still performed manually or semi-manually. The major drawbacks to manual image segmentation are time consuming and sub...
Analysis of Trust in Wireless Sensor Networks
Trust is an important factor in Wireless Sensor Network (WSN) that enables the sensor node to cooperate each other for their application. It makes the nodes in the wireless sensor networks to cope with uncertainty caused...