Wireless Sensor Network –A Survey
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 7
Abstract
Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life time of the network. In Wireless sensor network, nodes should consume less power, memory and so data aggregation should be performed. Security is another aspect which should be present in the network. Quality of service, routing, medium access schemes all are considered in designing the protocols.
Authors and Affiliations
Nirvika Chouhan , P. D. Vyavahare , Rekha Jain
Analytical Study of Information Retrieval techniques and Modified Model of Search Engine
The concept of Information Retrieval is very vast and too many models of search engines are available in the market. In this research various information retrieval techniques used in search engine were studies and modifi...
Computer Vision for Malaria Parasite Classification in Erythrocytes
In this is paper, we introduce a new approach to represent a mathematical modeling technique by means of linear programming as an efficient tool to solve problems related to medical imaging problems especially Malaria Di...
Discovering Communities in Social Networks Through Mutual Accessibility
Social network gains popularity due to its ease of use, as an application of Web 2.0 which facilitates users to communicate, interact and share on the World Wide Web. A Social network is a set of people or organizations...
AN ANDROID APPLICATION FOR ATM WITH A SECURED PIN-ENTRY METHODS
One of the most commonly occurringproblems in the recent years are the ATM (Automatic teller machine) frauds. People lose their money due to lack of awareness. The major reason for such kind of actions is the attacks mad...
A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this...