Mrinal Debbarma - Academia.edu (original) (raw)

Papers by Mrinal Debbarma

Research paper thumbnail of Energy efficient-Dynamic and Self-optimized Routing In Wireless Sensor Network Based on Ant Colony Optimization

International Journal of Networking and Virtual Organisations, 2019

A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size... more A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network.

Research paper thumbnail of A Review on Coverage-Hole Boundary Detection Algorithms in Wireless Sensor Networks

Computación Y Sistemas, Mar 30, 2020

Wireless sensor nodes are extremely useful in different security and surveillance related applica... more Wireless sensor nodes are extremely useful in different security and surveillance related applications which may be compromised with the existence of coverage-holes. Coverage-hole is the area in a wireless sensor network (WSN) where sensing or transmitting of data is not achievable and therefore, detecting such region is a prominent research topic in WSN. Subsequent to hole-detection, another significant task is to detect the boundary nodes outlining the coverage-holes. In this paper, we have gone through different research articles describing the various boundary-detection techniques those have been recommended to facilitate hole-detection inside the sensor network. On the basis of the literature review, we have done categorization of the boundary-detection methods, their characteristics, pros & cons and their effect on sensor network's performance for better understanding and future reference.

Research paper thumbnail of Cloud GIS Model for Coastal Geospatial Big Data Analytics

Studies in big data, 2022

Research paper thumbnail of A neuro‐evolutionary approach for software defined wireless network traffic classification

IET Communications

Accurate network traffic classification is an essential and challenging issue for wireless networ... more Accurate network traffic classification is an essential and challenging issue for wireless network management and survivability. Existing network traffic classification algorithms, on the other hand, cannot meet the required specifications of real networks' in terms of user privacy control overhead, latency, and above all, classification speed. For wireless network traffic classification, machine learning‐based and hybrid optimization techniques have been deployed. This paper takes a software‐defined wireless network (SDWN) architecture for network traffic classification into account. Because the proposed scheme is perfectly contained within the network controller,the SDWN controller's higher processing capability, global visibility, and programmability can be used to achieve real‐time, adaptive, and precise traffic classification. In this paper, a neuro‐evolutionary approach is proposed in which the feed forward neural network (FFNN) is the base classifier and particle swar...

Research paper thumbnail of Comparative Study on Different Parameters Used for Energy Conservation in Wireless Sensor Networks

IETE Technical Review, 2021

The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human inte... more The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human interaction and WSN is always known for its limited-energy issue. The wireless sensor nodes are equipped...

Research paper thumbnail of Centroid-Based Routing protocol with moving sink node for uniform and non-uniform distribution of wireless sensor nodes

The Journal of Supercomputing, 2020

A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system... more A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system energy for a given wireless sensor network. We have designed the CBR protocol to optimize the battery life of the sensor nodes, by using a mobile Sink Node (SN). In CBR, several clusters are formed for the sensor nodes and each cluster is assigned a 'Cluster Head (CH)' node, and these CHs act as a local Base Station. The SN moves to a coordinate point (X c , Y c) which we call a 'Centroid Point (CP)' to collect data from the CH nodes. This 'CP' is dependent on the coordinates of all the CHs and also on their residual or remaining energy left over at any given round. This way the CH nodes have to pump a balanced amount of energy to send and receive data from SN, which makes the nodes last for a longer period. The simulation results imply that the CBR model is much efficient compared to other existing models in terms of energy utilization and network lifetime for the non-uniformly distributed sensor nodes in a given network area.

Research paper thumbnail of CHPT: an improved coverage-hole patching technique based on tree-center in wireless sensor networks

Journal of Ambient Intelligence and Humanized Computing, 2020

The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the... more The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the network in terms of data transmission. Therefore, after the detection of CH, hole-patching is the next important task in order to reduce the energy consumption and to improve the network lifetime. In this paper, we propose an improved coverage-hole patching technique (CHPT) based on the concept of center of tree. The prerequisite to hole-patching is the hole-detection, which is done based on Delaunay Triangle and empty circle property. Subsequently, using the Inner empty circle property, the hole-area is estimated. And finally, CHPT is used to determine the hole-boundary and formulate the sub-trees for identifying the patch-positions to be covered by deploying additional sensor nodes. Experimental results show that the average percentage of coverage in CHPT increases up to 98.6% in terms of additional sensors and with a given sensing radius.

Research paper thumbnail of Computational geometry based coverage hole-detection and hole-area estimation in wireless sensor network

Journal of High Speed Networks, 2018

Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance re... more Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance related applications where coverage plays an important role. While arranging the sensor nodes in a large scale WSN, covering the region of interest (ROI) is a complicated job and this quality of coverage is compromised in the presence of coverage holes. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, we first construct a Delaunay Triangle on the basis of node location information. Then we propose an algorithm based on the property of empty circle to recognize whether coverage hole is present or not in the given ROI of a large scale WSN. Also, we have estimated the area of the coverage-hole based on computational geometry. We have shown the correctness of the algorithm based on the theoretical proofs. Simulations are also conducted to show the effectiveness of the algorithm for coverage-hole detection and area estimation (CHDAE).

Research paper thumbnail of Center of Mass and Junction based data Routing Method to Increase the QoS In VANET

AEU - International Journal of Electronics and Communications, 2019

In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the... more In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the speed of the cars, the obstruction caused by high rise buildings and routing loop problem at the road junction. This causes less throughput and data packet drops for a given network. In order to avoid these problems, we have defined a set of fixed junction points (FJP), any particular vehicles around FJP, is assigned as a transceiver for the data communication. That vehicle, called Virtual junction point (VJP) which has assigned weight to every road, depends on number of cars on that road and the distance between two junctions points along that road. Apart from the concept of VJP, a newly developed method, we call it Center of Mass (CM) method, is used by source vehicle for selecting the next forwarding vehicle. In this method, one minimizes the sum of all the distances of all neighboring vehicles from a given imaginary point, which is the CM point. In this point, physically there may not be any vehicle, but the vehicle close to that point is used for the next forwarding vehicle in our method. Simulation result shows our method performs better than other protocols.

Research paper thumbnail of A Survey on Coverage Problems in Wireless Sensor Network Based on Monitored Region

Advances in Data and Information Sciences, 2018

These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commer... more These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commercial fields such as environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, and medical science to military applications. For attaining network coverage in a WSN, normally a few to thousands of small, limited-power sensor nodes are required to be deployed in an interconnected fashion. While arranging the sensor nodes in a WSN, covering the region to be monitored is a difficult task and became a hot field of research for last few years. Coverage verifies the quality of monitoring some event in a meticulous environment by the sensor nodes. The idea behind this paper is to study thoroughly about the most recent literature of WSN coverage based on monitored region of the network. While doing so, we have mainly studied three different types: coverage area, point, and barrier coverage.

Research paper thumbnail of Literature Survey on Cross-Layer Design Architecture for Bandwidth Management in Mobile Ad-hoc Networks

International Journal of Computer Applications, 2012

Research paper thumbnail of QoS Provisioning in WMNs: Challenges and a Comparative Study of Efficient Methodologies

International Journal of Computer Applications, Mar 15, 2013

Research paper thumbnail of Performance analysis of network monitoring tool through automated software engineering approach

2015 International Conference on Signal Processing and Communication Engineering Systems, 2015

In this paper, we developed an application that can be used to monitor network packets, bandwidth... more In this paper, we developed an application that can be used to monitor network packets, bandwidth, Protocol Packets from the network and easily can monitor the system networking performance. The system uses automated software engineering approach, especially unit test in Java. The system can be used for monitoring the TCP, UDP, ARP, packets, when the system is connected with the internet. Domain IP address can be detected and packet that is lost can also be measured. The packet is captured with JPcap and WinPcap tool, integrated in JVM. Testing of this software involves developing set of test cases that are similar to the real data that the NMT is intended to manipulate. This project is a prototype of software engineering methodology and software is successfully tested.

Research paper thumbnail of An Energy-efficient Framework for Performance Evaluation of Mobile Ad-hoc Networks

The stream of qualified data in telecommunication networks requires the interaction of the differ... more The stream of qualified data in telecommunication networks requires the interaction of the different network layers. These network layers collaborate with one another in a nontrivial way to uphold qualified information exchange between the sender junction and appropriating junction. In a mobile ad hoc system, where there are fast topology up-dates due to mobility of junctions and channel fading there is a need to catch the layer interactions of the system layers. In this paper we introduce a conceptual model that recognizes the huge portions of the mobile ad hoc networks through state subordinate system control approaches. The energy-efficient control scheduling with optimal and suboptimal execution are broke down and put forth. A comprehensive perspective of the system that catches the layer interactions around obstruction administration strategies are brought at different layers. The coming about complex multi-objective improvement issue is then explained by multi-objective pursuit methods.

Research paper thumbnail of DVR-Based Hybrid Routing Protocols in Mobile Ad-Hoc Network: Application and Challenges

International Journal of Research in Engineering and Technology, 2013

DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algori... more DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algorithm which, in turn, is based on Distributed Asynchronous Bellman Ford's shortest path algorithm, however, with some minor to significant variations as needed for the ad hoc and mobile nature of the MANET A major thrust of the protocol designers towards the development and deployment of DVR-based routing protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node of the DVR. A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not become stable till date. This paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET.

Research paper thumbnail of A Review of DVR-based Routing Protocols for Mobile Ad Hoc Networks

International Journal of Computer Applications, 2012

Research paper thumbnail of Analysis of Software Complexity Measures for Regression Testing

Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.201... more Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.2011.02. Short Paper 158 Analysis of Software Complexity Measures for Regression Testing Mrinal Kanti Debbarma1, Nagendra Pratap Singh2, Amit Kr. ...

Research paper thumbnail of Hole Detection in Wireless Sensor Network: A Review

Advances in Intelligent Systems and Computing, 2018

Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to... more Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, medical science to military applications. While organizing the sensor nodes in a WSN, covering the area-to-be-monitored is a tricky job and this quality is compromised in the presence of holes. Hole may be defined as an area in WSN around which a sensor is incapable of sensing or transmitting data. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, a detail literature review is done on hole detection, categorization, characteristics, and their effect on sensor network’s performance on the basis of the most recent literature.

Research paper thumbnail of Study of Implementing Automated Attendance System Using Face Recognition Technique

International Journal of Computer and Communication Engineering, 2012

Research paper thumbnail of MAvB A Maximum Available Bandwidth based routing metric for multiradio multichannel Wireless Mesh Networks ensuring QoS provisions for real time communications

2013 IEEE International Conference on Electronics, Computing and Communication Technologies, 2013

Research paper thumbnail of Energy efficient-Dynamic and Self-optimized Routing In Wireless Sensor Network Based on Ant Colony Optimization

International Journal of Networking and Virtual Organisations, 2019

A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size... more A wireless sensor network (WSN) consists of low power, low cost, limited memory and small in size sensor nodes, organise them in a cooperative network and perform three basic operations - sensing data from environment, computation, and data routing. Routing in WSN mainly focuses on data dissemination, data aggregation, life time of the network and limited bandwidth constraints in order to facilitate the efficient working of the network. Due to the limited battery power, the energy conservation is a critical aspect to design an efficient routing protocol in WSN. This paper proposes the energy efficient dynamic and self-optimised routing to prolong the life time of the network, QoS and solve the stagnation problem in the network.

Research paper thumbnail of A Review on Coverage-Hole Boundary Detection Algorithms in Wireless Sensor Networks

Computación Y Sistemas, Mar 30, 2020

Wireless sensor nodes are extremely useful in different security and surveillance related applica... more Wireless sensor nodes are extremely useful in different security and surveillance related applications which may be compromised with the existence of coverage-holes. Coverage-hole is the area in a wireless sensor network (WSN) where sensing or transmitting of data is not achievable and therefore, detecting such region is a prominent research topic in WSN. Subsequent to hole-detection, another significant task is to detect the boundary nodes outlining the coverage-holes. In this paper, we have gone through different research articles describing the various boundary-detection techniques those have been recommended to facilitate hole-detection inside the sensor network. On the basis of the literature review, we have done categorization of the boundary-detection methods, their characteristics, pros & cons and their effect on sensor network's performance for better understanding and future reference.

Research paper thumbnail of Cloud GIS Model for Coastal Geospatial Big Data Analytics

Studies in big data, 2022

Research paper thumbnail of A neuro‐evolutionary approach for software defined wireless network traffic classification

IET Communications

Accurate network traffic classification is an essential and challenging issue for wireless networ... more Accurate network traffic classification is an essential and challenging issue for wireless network management and survivability. Existing network traffic classification algorithms, on the other hand, cannot meet the required specifications of real networks' in terms of user privacy control overhead, latency, and above all, classification speed. For wireless network traffic classification, machine learning‐based and hybrid optimization techniques have been deployed. This paper takes a software‐defined wireless network (SDWN) architecture for network traffic classification into account. Because the proposed scheme is perfectly contained within the network controller,the SDWN controller's higher processing capability, global visibility, and programmability can be used to achieve real‐time, adaptive, and precise traffic classification. In this paper, a neuro‐evolutionary approach is proposed in which the feed forward neural network (FFNN) is the base classifier and particle swar...

Research paper thumbnail of Comparative Study on Different Parameters Used for Energy Conservation in Wireless Sensor Networks

IETE Technical Review, 2021

The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human inte... more The Wireless Sensor Networks (WSNs) are mostly used for applications which hardly have human interaction and WSN is always known for its limited-energy issue. The wireless sensor nodes are equipped...

Research paper thumbnail of Centroid-Based Routing protocol with moving sink node for uniform and non-uniform distribution of wireless sensor nodes

The Journal of Supercomputing, 2020

A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system... more A routing protocol called 'Centroid-Based Routing (CBR)' is proposed to optimize the total system energy for a given wireless sensor network. We have designed the CBR protocol to optimize the battery life of the sensor nodes, by using a mobile Sink Node (SN). In CBR, several clusters are formed for the sensor nodes and each cluster is assigned a 'Cluster Head (CH)' node, and these CHs act as a local Base Station. The SN moves to a coordinate point (X c , Y c) which we call a 'Centroid Point (CP)' to collect data from the CH nodes. This 'CP' is dependent on the coordinates of all the CHs and also on their residual or remaining energy left over at any given round. This way the CH nodes have to pump a balanced amount of energy to send and receive data from SN, which makes the nodes last for a longer period. The simulation results imply that the CBR model is much efficient compared to other existing models in terms of energy utilization and network lifetime for the non-uniformly distributed sensor nodes in a given network area.

Research paper thumbnail of CHPT: an improved coverage-hole patching technique based on tree-center in wireless sensor networks

Journal of Ambient Intelligence and Humanized Computing, 2020

The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the... more The occurrence of coverage-hole (CH) in a wireless sensor network degrades the performance of the network in terms of data transmission. Therefore, after the detection of CH, hole-patching is the next important task in order to reduce the energy consumption and to improve the network lifetime. In this paper, we propose an improved coverage-hole patching technique (CHPT) based on the concept of center of tree. The prerequisite to hole-patching is the hole-detection, which is done based on Delaunay Triangle and empty circle property. Subsequently, using the Inner empty circle property, the hole-area is estimated. And finally, CHPT is used to determine the hole-boundary and formulate the sub-trees for identifying the patch-positions to be covered by deploying additional sensor nodes. Experimental results show that the average percentage of coverage in CHPT increases up to 98.6% in terms of additional sensors and with a given sensing radius.

Research paper thumbnail of Computational geometry based coverage hole-detection and hole-area estimation in wireless sensor network

Journal of High Speed Networks, 2018

Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance re... more Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance related applications where coverage plays an important role. While arranging the sensor nodes in a large scale WSN, covering the region of interest (ROI) is a complicated job and this quality of coverage is compromised in the presence of coverage holes. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, we first construct a Delaunay Triangle on the basis of node location information. Then we propose an algorithm based on the property of empty circle to recognize whether coverage hole is present or not in the given ROI of a large scale WSN. Also, we have estimated the area of the coverage-hole based on computational geometry. We have shown the correctness of the algorithm based on the theoretical proofs. Simulations are also conducted to show the effectiveness of the algorithm for coverage-hole detection and area estimation (CHDAE).

Research paper thumbnail of Center of Mass and Junction based data Routing Method to Increase the QoS In VANET

AEU - International Journal of Electronics and Communications, 2019

In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the... more In this paper, we have minimized the problems for Vehicle to Vehicle communication, caused by the speed of the cars, the obstruction caused by high rise buildings and routing loop problem at the road junction. This causes less throughput and data packet drops for a given network. In order to avoid these problems, we have defined a set of fixed junction points (FJP), any particular vehicles around FJP, is assigned as a transceiver for the data communication. That vehicle, called Virtual junction point (VJP) which has assigned weight to every road, depends on number of cars on that road and the distance between two junctions points along that road. Apart from the concept of VJP, a newly developed method, we call it Center of Mass (CM) method, is used by source vehicle for selecting the next forwarding vehicle. In this method, one minimizes the sum of all the distances of all neighboring vehicles from a given imaginary point, which is the CM point. In this point, physically there may not be any vehicle, but the vehicle close to that point is used for the next forwarding vehicle in our method. Simulation result shows our method performs better than other protocols.

Research paper thumbnail of A Survey on Coverage Problems in Wireless Sensor Network Based on Monitored Region

Advances in Data and Information Sciences, 2018

These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commer... more These days, Wireless Sensor Networks (WSNs) have enormous application in both research and commercial fields such as environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, and medical science to military applications. For attaining network coverage in a WSN, normally a few to thousands of small, limited-power sensor nodes are required to be deployed in an interconnected fashion. While arranging the sensor nodes in a WSN, covering the region to be monitored is a difficult task and became a hot field of research for last few years. Coverage verifies the quality of monitoring some event in a meticulous environment by the sensor nodes. The idea behind this paper is to study thoroughly about the most recent literature of WSN coverage based on monitored region of the network. While doing so, we have mainly studied three different types: coverage area, point, and barrier coverage.

Research paper thumbnail of Literature Survey on Cross-Layer Design Architecture for Bandwidth Management in Mobile Ad-hoc Networks

International Journal of Computer Applications, 2012

Research paper thumbnail of QoS Provisioning in WMNs: Challenges and a Comparative Study of Efficient Methodologies

International Journal of Computer Applications, Mar 15, 2013

Research paper thumbnail of Performance analysis of network monitoring tool through automated software engineering approach

2015 International Conference on Signal Processing and Communication Engineering Systems, 2015

In this paper, we developed an application that can be used to monitor network packets, bandwidth... more In this paper, we developed an application that can be used to monitor network packets, bandwidth, Protocol Packets from the network and easily can monitor the system networking performance. The system uses automated software engineering approach, especially unit test in Java. The system can be used for monitoring the TCP, UDP, ARP, packets, when the system is connected with the internet. Domain IP address can be detected and packet that is lost can also be measured. The packet is captured with JPcap and WinPcap tool, integrated in JVM. Testing of this software involves developing set of test cases that are similar to the real data that the NMT is intended to manipulate. This project is a prototype of software engineering methodology and software is successfully tested.

Research paper thumbnail of An Energy-efficient Framework for Performance Evaluation of Mobile Ad-hoc Networks

The stream of qualified data in telecommunication networks requires the interaction of the differ... more The stream of qualified data in telecommunication networks requires the interaction of the different network layers. These network layers collaborate with one another in a nontrivial way to uphold qualified information exchange between the sender junction and appropriating junction. In a mobile ad hoc system, where there are fast topology up-dates due to mobility of junctions and channel fading there is a need to catch the layer interactions of the system layers. In this paper we introduce a conceptual model that recognizes the huge portions of the mobile ad hoc networks through state subordinate system control approaches. The energy-efficient control scheduling with optimal and suboptimal execution are broke down and put forth. A comprehensive perspective of the system that catches the layer interactions around obstruction administration strategies are brought at different layers. The coming about complex multi-objective improvement issue is then explained by multi-objective pursuit methods.

Research paper thumbnail of DVR-Based Hybrid Routing Protocols in Mobile Ad-Hoc Network: Application and Challenges

International Journal of Research in Engineering and Technology, 2013

DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algori... more DVR-hybrid routing protocol proposal derives from the conventional distance vector routing algorithm which, in turn, is based on Distributed Asynchronous Bellman Ford's shortest path algorithm, however, with some minor to significant variations as needed for the ad hoc and mobile nature of the MANET A major thrust of the protocol designers towards the development and deployment of DVR-based routing protocols, irrespectively in wired, wireless or even in ad hoc and sensor networks is primarily because of the conceptual and implementation simplicity and elegance coupled with the minimum information requirement by each node of the DVR. A good amount of research has been done in the past towards the improvement of routing algorithms in MANET, but the area has not become stable till date. This paper, focused on several applications, challenges and solutions, in the perspective of routing in MANET.

Research paper thumbnail of A Review of DVR-based Routing Protocols for Mobile Ad Hoc Networks

International Journal of Computer Applications, 2012

Research paper thumbnail of Analysis of Software Complexity Measures for Regression Testing

Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.201... more Page 1. Proc. of Int. Conf. on Advances in Computer Engineering 2011 © 2011 ACEEE DOI: 02.ACE.2011.02. Short Paper 158 Analysis of Software Complexity Measures for Regression Testing Mrinal Kanti Debbarma1, Nagendra Pratap Singh2, Amit Kr. ...

Research paper thumbnail of Hole Detection in Wireless Sensor Network: A Review

Advances in Intelligent Systems and Computing, 2018

Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to... more Nowadays wireless sensor networks (WSNs) have massive relevance from environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, medical science to military applications. While organizing the sensor nodes in a WSN, covering the area-to-be-monitored is a tricky job and this quality is compromised in the presence of holes. Hole may be defined as an area in WSN around which a sensor is incapable of sensing or transmitting data. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, a detail literature review is done on hole detection, categorization, characteristics, and their effect on sensor network’s performance on the basis of the most recent literature.

Research paper thumbnail of Study of Implementing Automated Attendance System Using Face Recognition Technique

International Journal of Computer and Communication Engineering, 2012

Research paper thumbnail of MAvB A Maximum Available Bandwidth based routing metric for multiradio multichannel Wireless Mesh Networks ensuring QoS provisions for real time communications

2013 IEEE International Conference on Electronics, Computing and Communication Technologies, 2013