SlideShare a Scribd company logo
International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 84
`
International Conference on Advances & Challenges in Interdisciplinary Engineering and
Management 2017 [ICACIEM 2017]
ISBN 978-81-933235-1-9 VOL 01
Website icaciem.org eMail icaciem@asdf.res.in
Received 10 – January – 2017 Accepted 28 - January – 2017
Article ID ICACIEM167 eAID ICACIEM.2017.167
Asynchronous Power Management Using Grid
Deployment Method for Wireless Sensor Networks in
Critical Situation
Dheepika Rajamanickam1
, S Pavithra2
, K Rajalakshmi3
, N Udhaya4
, P J Shriidhar5
1,2,3,4,5
Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India
Abstract: A correct node operation and power administration are significant issues in the wireless sensor network system. Ultrasonic, dead reckoning,
and radio frequency information is obtained by using localization mechanism and worked through a specific filter algorithm. In this paper, a well-
organized grid deployment method is applied to split the nodes into multiple individual grids. The tiny grids are used for improved resolution and
bigger grids are used to decrease the complexity of processing. The efficiency of each grid is obtained by environmental factors such as redeployed nodes,
boundaries, and obstacles. To decrease the power usage, asynchronous power management method is designed. In network communication, power
management method is applied by using an asynchronous awakening scheme and n-duplicate coverage algorithm is engineered for the coverage of nodes.
ISBN 978-81-933235-1-9 VOL 01
Website icaciem.org eMail icaciem@asdf.res.in
Received 10 – January – 2017 Accepted 28 - January – 2017
Article ID ICACIEM168 eAID ICACIEM.2017.168
Denial to “Analysis on Control Cloud Data Entrance
Freedom and Ambiguity with Entirely Anonymous
Attribute-Based Encryption”
P Praveen Kumar1
, T Tamilselvan2
, V Prabhakaran3
, K Meiyalakan4
1,2,3,4
Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India
Abstract: Cloud computing is a revolutionary computing pattern, which enables flexible, on-demand, and low-cost usage of computing possessions,
but the data is outsourced to some cloud servers, and various privacy concerns appear from it. Various schemes based on the attribute-based encryption
have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the entrance organize, while less attention
is paid to the privilege control and the identity privacy. In our proposed we offer complete user security and data security. Encryption /Decryption
algorithms are used for data security, for user the password is automatically generated by the system. If the user wants to upload the data the authority
will send a 16 bit private key to the data owner. After putting this key data owner can upload his documents to the cloud, drop box is a public cloud
here we are used.
This paper is prepared exclusively for International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM
2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr K Samidurai and Editors
Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this
notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the
owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.
2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]

More Related Content

What's hot

Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
HPC as a Service
HPC as a ServiceHPC as a Service
HPC as a Service
EUBrasilCloudFORUM .
 
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
Nexgen Technology
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
ieeepondy
 
Application-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentApplication-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud Environment
Safayet Hossain
 
GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
Ashok Mannai
 
Cloud vs grid
Cloud vs gridCloud vs grid
Cloud vs grid
Omid Sohrabi
 
Grid computing
Grid computing Grid computing
Grid computing
Safayet Hossain
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingpptnavjasser
 
Grid Computing Frameworks
Grid Computing FrameworksGrid Computing Frameworks
Grid Computing FrameworksSabbir Ahmmed
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
Io t technologies_ppt-2
Io t technologies_ppt-2Io t technologies_ppt-2
Io t technologies_ppt-2
achakracu
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
Phương Đông
 
Grid computing
Grid computingGrid computing
Grid computing
Grid computingGrid computing
Grid computing
Dikshita_Viradia
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar verma
gargishankar1981
 

What's hot (20)

Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
HPC as a Service
HPC as a ServiceHPC as a Service
HPC as a Service
 
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
grid computing
grid computinggrid computing
grid computing
 
Application-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentApplication-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud Environment
 
GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
 
Cloud vs grid
Cloud vs gridCloud vs grid
Cloud vs grid
 
Grid computing
Grid computing Grid computing
Grid computing
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingppt
 
Grid Computing Frameworks
Grid Computing FrameworksGrid Computing Frameworks
Grid Computing Frameworks
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Io t technologies_ppt-2
Io t technologies_ppt-2Io t technologies_ppt-2
Io t technologies_ppt-2
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar verma
 

Similar to Asynchronous Power Management Using Grid Deployment Method for Wireless Sensor Networks in Critical Situation

Application of Agricultural Waste in Preparation of Sustainable Construction ...
Application of Agricultural Waste in Preparation of Sustainable Construction ...Application of Agricultural Waste in Preparation of Sustainable Construction ...
Application of Agricultural Waste in Preparation of Sustainable Construction ...
Association of Scientists, Developers and Faculties
 
Amalgam Approach on Usages of Agent Technology
Amalgam Approach on Usages of Agent TechnologyAmalgam Approach on Usages of Agent Technology
Amalgam Approach on Usages of Agent Technology
Association of Scientists, Developers and Faculties
 
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation MechanismA Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
Association of Scientists, Developers and Faculties
 
Survey and Research Challenges in Big Data
Survey and Research Challenges in Big DataSurvey and Research Challenges in Big Data
Survey and Research Challenges in Big Data
Association of Scientists, Developers and Faculties
 
Montgomery Modular Algorithm of Radix Multiplication
Montgomery Modular Algorithm of Radix MultiplicationMontgomery Modular Algorithm of Radix Multiplication
Montgomery Modular Algorithm of Radix Multiplication
Association of Scientists, Developers and Faculties
 
Sensor Networks Considered Harmful
Sensor Networks Considered HarmfulSensor Networks Considered Harmful
Sensor Networks Considered Harmful
Association of Scientists, Developers and Faculties
 
Securing Voice by Sip with Offset Codebook
Securing Voice by Sip with Offset CodebookSecuring Voice by Sip with Offset Codebook
Securing Voice by Sip with Offset Codebook
Association of Scientists, Developers and Faculties
 
Molecular Modelling of Human Brain Function in Biological Technologies
Molecular Modelling of Human Brain Function in Biological TechnologiesMolecular Modelling of Human Brain Function in Biological Technologies
Molecular Modelling of Human Brain Function in Biological Technologies
Association of Scientists, Developers and Faculties
 
Grid-Connected PV-Wind Power System Design
Grid-Connected PV-Wind Power System DesignGrid-Connected PV-Wind Power System Design
Grid-Connected PV-Wind Power System Design
Association of Scientists, Developers and Faculties
 
Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...
Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...
Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...
Association of Scientists, Developers and Faculties
 
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
Shanmuga Priyan Thiagarajan
 
Reputation System for Improving Security in VOIP
Reputation System for Improving Security in VOIPReputation System for Improving Security in VOIP
Reputation System for Improving Security in VOIP
Association of Scientists, Developers and Faculties
 
Design and Analysis of Propeller Shaft by using Finite Element Analysis Method
Design and Analysis of Propeller Shaft by using Finite Element Analysis MethodDesign and Analysis of Propeller Shaft by using Finite Element Analysis Method
Design and Analysis of Propeller Shaft by using Finite Element Analysis Method
Association of Scientists, Developers and Faculties
 
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Shanmuga Priyan Thiagarajan
 
Improving the efficiency of System Performance using Proxy Servers for Load D...
Improving the efficiency of System Performance using Proxy Servers for Load D...Improving the efficiency of System Performance using Proxy Servers for Load D...
Improving the efficiency of System Performance using Proxy Servers for Load D...
Association of Scientists, Developers and Faculties
 
A New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTA New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCT
Shanmuga Priyan Thiagarajan
 
Survey on IOT Using Big Data
Survey on IOT Using Big DataSurvey on IOT Using Big Data
Survey on IOT Using Big Data
Shanmuga Priyan Thiagarajan
 
Shared Cluster Decision Assembly method using sky Traffic-Flow Organization
Shared Cluster Decision Assembly method using sky Traffic-Flow OrganizationShared Cluster Decision Assembly method using sky Traffic-Flow Organization
Shared Cluster Decision Assembly method using sky Traffic-Flow Organization
Association of Scientists, Developers and Faculties
 
A Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data MiningA Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data Mining
Shanmuga Priyan Thiagarajan
 
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlPower Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Shanmuga Priyan Thiagarajan
 

Similar to Asynchronous Power Management Using Grid Deployment Method for Wireless Sensor Networks in Critical Situation (20)

Application of Agricultural Waste in Preparation of Sustainable Construction ...
Application of Agricultural Waste in Preparation of Sustainable Construction ...Application of Agricultural Waste in Preparation of Sustainable Construction ...
Application of Agricultural Waste in Preparation of Sustainable Construction ...
 
Amalgam Approach on Usages of Agent Technology
Amalgam Approach on Usages of Agent TechnologyAmalgam Approach on Usages of Agent Technology
Amalgam Approach on Usages of Agent Technology
 
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation MechanismA Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
 
Survey and Research Challenges in Big Data
Survey and Research Challenges in Big DataSurvey and Research Challenges in Big Data
Survey and Research Challenges in Big Data
 
Montgomery Modular Algorithm of Radix Multiplication
Montgomery Modular Algorithm of Radix MultiplicationMontgomery Modular Algorithm of Radix Multiplication
Montgomery Modular Algorithm of Radix Multiplication
 
Sensor Networks Considered Harmful
Sensor Networks Considered HarmfulSensor Networks Considered Harmful
Sensor Networks Considered Harmful
 
Securing Voice by Sip with Offset Codebook
Securing Voice by Sip with Offset CodebookSecuring Voice by Sip with Offset Codebook
Securing Voice by Sip with Offset Codebook
 
Molecular Modelling of Human Brain Function in Biological Technologies
Molecular Modelling of Human Brain Function in Biological TechnologiesMolecular Modelling of Human Brain Function in Biological Technologies
Molecular Modelling of Human Brain Function in Biological Technologies
 
Grid-Connected PV-Wind Power System Design
Grid-Connected PV-Wind Power System DesignGrid-Connected PV-Wind Power System Design
Grid-Connected PV-Wind Power System Design
 
Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...
Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...
Dynamic Routing in Wireless Sensor Networks Using Reliable Attribute Aided Da...
 
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
 
Reputation System for Improving Security in VOIP
Reputation System for Improving Security in VOIPReputation System for Improving Security in VOIP
Reputation System for Improving Security in VOIP
 
Design and Analysis of Propeller Shaft by using Finite Element Analysis Method
Design and Analysis of Propeller Shaft by using Finite Element Analysis MethodDesign and Analysis of Propeller Shaft by using Finite Element Analysis Method
Design and Analysis of Propeller Shaft by using Finite Element Analysis Method
 
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
 
Improving the efficiency of System Performance using Proxy Servers for Load D...
Improving the efficiency of System Performance using Proxy Servers for Load D...Improving the efficiency of System Performance using Proxy Servers for Load D...
Improving the efficiency of System Performance using Proxy Servers for Load D...
 
A New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTA New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCT
 
Survey on IOT Using Big Data
Survey on IOT Using Big DataSurvey on IOT Using Big Data
Survey on IOT Using Big Data
 
Shared Cluster Decision Assembly method using sky Traffic-Flow Organization
Shared Cluster Decision Assembly method using sky Traffic-Flow OrganizationShared Cluster Decision Assembly method using sky Traffic-Flow Organization
Shared Cluster Decision Assembly method using sky Traffic-Flow Organization
 
A Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data MiningA Survey on Clustering Concepts in Data Mining
A Survey on Clustering Concepts in Data Mining
 
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlPower Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
 

More from Association of Scientists, Developers and Faculties

Core conferences bta 19 paper 12
Core conferences bta 19 paper 12Core conferences bta 19 paper 12
Core conferences bta 19 paper 12
Association of Scientists, Developers and Faculties
 
Core conferences bta 19 paper 10
Core conferences bta 19 paper 10Core conferences bta 19 paper 10
Core conferences bta 19 paper 10
Association of Scientists, Developers and Faculties
 
Core conferences bta 19 paper 8
Core conferences bta 19 paper 8Core conferences bta 19 paper 8
Core conferences bta 19 paper 7
Core conferences bta 19 paper 7Core conferences bta 19 paper 7
Core conferences bta 19 paper 6
Core conferences bta 19 paper 6Core conferences bta 19 paper 6
Core conferences bta 19 paper 5
Core conferences bta 19 paper 5Core conferences bta 19 paper 5
Core conferences bta 19 paper 4
Core conferences bta 19 paper 4Core conferences bta 19 paper 4
Core conferences bta 19 paper 3
Core conferences bta 19 paper 3Core conferences bta 19 paper 3
Core conferences bta 19 paper 2
Core conferences bta 19 paper 2Core conferences bta 19 paper 2
CoreConferences Batch A 2019
CoreConferences Batch A 2019CoreConferences Batch A 2019
International Conference on Cloud of Things and Wearable Technologies 2018
International Conference on Cloud of Things and Wearable Technologies 2018International Conference on Cloud of Things and Wearable Technologies 2018
International Conference on Cloud of Things and Wearable Technologies 2018
Association of Scientists, Developers and Faculties
 
ICCELEM 2017
ICCELEM 2017ICCELEM 2017
ICSSCCET 2017
ICSSCCET 2017ICSSCCET 2017
ICAIET 2017
ICAIET 2017ICAIET 2017
ICICS 2017
ICICS 2017ICICS 2017
ICACIEM 2017
ICACIEM 2017ICACIEM 2017
Raindrop Algorithm Based Controller for Chopper Driven PMDC Motor
Raindrop Algorithm Based Controller for Chopper Driven PMDC MotorRaindrop Algorithm Based Controller for Chopper Driven PMDC Motor
Raindrop Algorithm Based Controller for Chopper Driven PMDC Motor
Association of Scientists, Developers and Faculties
 
A Study on Customer Satisfaction towards Ambal Auto, Erode
A Study on Customer Satisfaction towards Ambal Auto, ErodeA Study on Customer Satisfaction towards Ambal Auto, Erode
A Study on Customer Satisfaction towards Ambal Auto, Erode
Association of Scientists, Developers and Faculties
 
Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...
Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...
Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...
Association of Scientists, Developers and Faculties
 
A Secured Image Sharing on Social Websites
A Secured Image Sharing on Social WebsitesA Secured Image Sharing on Social Websites
A Secured Image Sharing on Social Websites
Association of Scientists, Developers and Faculties
 

More from Association of Scientists, Developers and Faculties (20)

Core conferences bta 19 paper 12
Core conferences bta 19 paper 12Core conferences bta 19 paper 12
Core conferences bta 19 paper 12
 
Core conferences bta 19 paper 10
Core conferences bta 19 paper 10Core conferences bta 19 paper 10
Core conferences bta 19 paper 10
 
Core conferences bta 19 paper 8
Core conferences bta 19 paper 8Core conferences bta 19 paper 8
Core conferences bta 19 paper 8
 
Core conferences bta 19 paper 7
Core conferences bta 19 paper 7Core conferences bta 19 paper 7
Core conferences bta 19 paper 7
 
Core conferences bta 19 paper 6
Core conferences bta 19 paper 6Core conferences bta 19 paper 6
Core conferences bta 19 paper 6
 
Core conferences bta 19 paper 5
Core conferences bta 19 paper 5Core conferences bta 19 paper 5
Core conferences bta 19 paper 5
 
Core conferences bta 19 paper 4
Core conferences bta 19 paper 4Core conferences bta 19 paper 4
Core conferences bta 19 paper 4
 
Core conferences bta 19 paper 3
Core conferences bta 19 paper 3Core conferences bta 19 paper 3
Core conferences bta 19 paper 3
 
Core conferences bta 19 paper 2
Core conferences bta 19 paper 2Core conferences bta 19 paper 2
Core conferences bta 19 paper 2
 
CoreConferences Batch A 2019
CoreConferences Batch A 2019CoreConferences Batch A 2019
CoreConferences Batch A 2019
 
International Conference on Cloud of Things and Wearable Technologies 2018
International Conference on Cloud of Things and Wearable Technologies 2018International Conference on Cloud of Things and Wearable Technologies 2018
International Conference on Cloud of Things and Wearable Technologies 2018
 
ICCELEM 2017
ICCELEM 2017ICCELEM 2017
ICCELEM 2017
 
ICSSCCET 2017
ICSSCCET 2017ICSSCCET 2017
ICSSCCET 2017
 
ICAIET 2017
ICAIET 2017ICAIET 2017
ICAIET 2017
 
ICICS 2017
ICICS 2017ICICS 2017
ICICS 2017
 
ICACIEM 2017
ICACIEM 2017ICACIEM 2017
ICACIEM 2017
 
Raindrop Algorithm Based Controller for Chopper Driven PMDC Motor
Raindrop Algorithm Based Controller for Chopper Driven PMDC MotorRaindrop Algorithm Based Controller for Chopper Driven PMDC Motor
Raindrop Algorithm Based Controller for Chopper Driven PMDC Motor
 
A Study on Customer Satisfaction towards Ambal Auto, Erode
A Study on Customer Satisfaction towards Ambal Auto, ErodeA Study on Customer Satisfaction towards Ambal Auto, Erode
A Study on Customer Satisfaction towards Ambal Auto, Erode
 
Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...
Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...
Biodiesel Prepared By Trans-esterification Technique from Waste Cooking Oil (...
 
A Secured Image Sharing on Social Websites
A Secured Image Sharing on Social WebsitesA Secured Image Sharing on Social Websites
A Secured Image Sharing on Social Websites
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Asynchronous Power Management Using Grid Deployment Method for Wireless Sensor Networks in Critical Situation

  • 1. International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 84 ` International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM 2017] ISBN 978-81-933235-1-9 VOL 01 Website icaciem.org eMail icaciem@asdf.res.in Received 10 – January – 2017 Accepted 28 - January – 2017 Article ID ICACIEM167 eAID ICACIEM.2017.167 Asynchronous Power Management Using Grid Deployment Method for Wireless Sensor Networks in Critical Situation Dheepika Rajamanickam1 , S Pavithra2 , K Rajalakshmi3 , N Udhaya4 , P J Shriidhar5 1,2,3,4,5 Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India Abstract: A correct node operation and power administration are significant issues in the wireless sensor network system. Ultrasonic, dead reckoning, and radio frequency information is obtained by using localization mechanism and worked through a specific filter algorithm. In this paper, a well- organized grid deployment method is applied to split the nodes into multiple individual grids. The tiny grids are used for improved resolution and bigger grids are used to decrease the complexity of processing. The efficiency of each grid is obtained by environmental factors such as redeployed nodes, boundaries, and obstacles. To decrease the power usage, asynchronous power management method is designed. In network communication, power management method is applied by using an asynchronous awakening scheme and n-duplicate coverage algorithm is engineered for the coverage of nodes. ISBN 978-81-933235-1-9 VOL 01 Website icaciem.org eMail icaciem@asdf.res.in Received 10 – January – 2017 Accepted 28 - January – 2017 Article ID ICACIEM168 eAID ICACIEM.2017.168 Denial to “Analysis on Control Cloud Data Entrance Freedom and Ambiguity with Entirely Anonymous Attribute-Based Encryption” P Praveen Kumar1 , T Tamilselvan2 , V Prabhakaran3 , K Meiyalakan4 1,2,3,4 Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India Abstract: Cloud computing is a revolutionary computing pattern, which enables flexible, on-demand, and low-cost usage of computing possessions, but the data is outsourced to some cloud servers, and various privacy concerns appear from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the entrance organize, while less attention is paid to the privilege control and the identity privacy. In our proposed we offer complete user security and data security. Encryption /Decryption algorithms are used for data security, for user the password is automatically generated by the system. If the user wants to upload the data the authority will send a 16 bit private key to the data owner. After putting this key data owner can upload his documents to the cloud, drop box is a public cloud here we are used. This paper is prepared exclusively for International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM 2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr K Samidurai and Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution. 2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]