Thursday 27 December 2012

seminar Topics

Abstract:cut detection in wireless sensor networks

       Wireless sensor networks are promising technology for monitoring large regions at high spatial and temporal resolution.a node may fail due to various factors such as mechanical or electrical problems or node failure is expected to be common due to limited energy budget of the nodes that are powered by small batteries.Such failures cause a subset of nodes that have not failed to become disconnected from rest, resulting in a cut.
     A Wireless sensor network can get separated into multiple connected component due to the failure of some of its  nodes, which is called a "cut" here we can detect the cuts by using algorithm that allows
1.every node to detect when the connectivity to a specially designated nodes has been lost.
2.one or more nodes to detect the occurrence of the cut.
The algorithm is distributed and asynchronous:every node needs to be communicate with only those nodes that are within its communicating range.The algorithm is based on iterative computation of fictitious electrical potential of the nodes.The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.         


Abstract:Privacy preserving location monitoring system for wireless sensor networks

                     Monitoring personal location with potentially untrusted server poses privacy threats to the monitored individuals.Therefore we use two algorithms that is resource and quality aware algorithm that enables the system to provide high quality location monitoring service for the system users,while preserving personal location privacy.Both algorithms rely on that a person is indistinguishable among k persons , to enable trusted sensor node to provide the aggregate location information of monitored person for our system.The source aware algorithm aims to minimize communication and computational cost while the quality aware algorithm is to maximize accuracy of aggregate location.We use the spatial histogram approach that estimate the distribution of the monitored person based on gathered information.     






Wednesday 19 December 2012

why i am doing Mtech?

This blog is created by shagufta...... pursuing mtech in Computer Science and Engineering stream at SDMCET Dharwad.
I am doing mtech because i am interested in research in the field of Artificial Intelligence.

Method used: Flesch-Kincaid (English).
Flesch-Kincaid Grade level: 11.
Flesch-Kincaid Reading Ease score: 38.
This blog is created by shagufta...... pursuing mtech in Computer Science and Engineering stream at SDMCET Dharwad. I am doing mtech because i am interested in research in the field of Artificial Intelligence.