Wireless Mesh Network Deployed in Disaster Area using Gateway Selection
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 6
Abstract
As known from the history, communication services turns out to be exceedinglyimperative after calamity strike. Wireless Mesh network (WMN) serves as a cost effective technology that yield backbone infrastructure to provide city-wide network access. The self-recovery characteristics of Wireless Mesh Network (WMN), makes it an appropriate solution to be deployed in disaster areas for network access. Throughput is a major factor used for assessmentof the WMN. Selection of different wireless mesh routers as gateway results in distinct system performance. In this paper, we propose a gateway selection method to associate the destroyed network with an external network. The gateway selectionmust maximize the system throughput. The simulation is done using network simulator (NS2).
Authors and Affiliations
Supriya Madanrao Nasre, P Malathi, Manish Sharma
Logo Matching And Recognition System Using Surf
Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...
A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...
Multi Dimensional Digital Radar for Collision Avoidance and Security
A proper remote sensing device is required to provide security and safety from unauthorized areas in case of trespassing or illegal usage of assets, private properties and to avoid collision in transportation system....
Design of Efficient DSP operation using 16×16 R-MAC Unit
As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase thi...
Dynamic Approach for Secure Data Publishing in Mining
More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quant...