Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 1, Issue 1, July (2015)

S.No Tile & Authors Full Text
1 Inter-Cell Interference Avoidance Techniques in OFDMA based Cellular Networks: A Survey
Virpartap Singh and Gagandeep Kaur
Abstract – Orthogonal Frequency Division Multiple Access (OFDMA) technique is extensively deployed in existing and next generation cellular networks to reduce interference and improve average network throughput. The OFDMA cellular network suffers from inter-cell interference (ICI) and the users found at the cell boundaries are more prone from ICI problem. Effective management of ICI is of paramount importance in order to improve cell edge throughput. Inter-cell interference avoidance is a method to improve the overall performance of the network. This paper surveys key issues in managing interference by using static frequency reuse techniques and provide a summary of the current developments of an efficient interference avoidance technique to reduce ICI in OFDMA based cellular networks.
Download
2 Data Aggregation Algorithms in Wireless Sensor Network:A Survey
Shikha and Priyanka Dayal
Abstract – Wireless sensor networks (WSN) have huge range of applications such as traffic analysis, localization, monitoring environment, industrialized monitoring, and tactical systems. Wireless sensor networks are large-scale networks; these are expected to play an important role in future inhabitant and military application. In wireless sensor network, Data aggregation is a fundamental problem that had attracted great attention in recent years. Energy consumption between sensors, with the help of data aggregation, is well balanced to achieve the satisfactory network lifetime. In this paper, a survey on different data aggregation algorithms is presented. To overcome the limitations like low computation ability, limited memory size, limited energy resources, and the make use of insecure wireless communication channels and also achieves reliable data in wireless sensor networks.
Download
3 Secure and Efficient Search Over Cloud: A Comparative Study of various Searching Techniques
Rajpreet kaur and Manish Mahajan
Abstract – Wireless sensor networks (WSN) have huge range of applications such as traffic analysis, localization, monitoring environment, industrialized monitoring, and tactical systems. Wireless sensor networks are large-scale networks; these are expected to play an important role in future inhabitant and military application. In wireless sensor network, Data aggregation is a fundamental problem that had attracted great attention in recent years. Energy consumption between sensors, with the help of data aggregation, is well balanced to achieve the satisfactory network lifetime. In this paper, a survey on different data aggregation algorithms is presented. To overcome the limitations like low computation ability, limited memory size, limited energy resources, and the make use of insecure wireless communication channels and also achieves reliable data in wireless sensor networks.
Download
4 Design and Implementation of Mobility Based Network Reconfiguration System to Enhance Security in Wireless Sensor Networks
Nupur Gupta, Gagangeet Singh Aujla, Sahil Vashist
Abstract – In this work, it proposes mobility based dynamic reconfiguration system in WSN. By providing access for the user to construct different virtual fields, proposed protocol accomplishes the goal of meeting the need of different applications and different network conditions. In this work, an environmental data collection scenario is taken. In this, all nodes are in dynamic nature and moves randomly. Sensor nodes are prone to failure due to energy depletion and their deployment in an uncontrolled or even hostile environment, also providing a convenient method for the administrator of the WSN to reconfigure the system just by a remote application. It can achieve the goal that adopt to different applications and different network conditions. This protocol will give the administrator of the WSN a powerful ability. With this great ability, the administrator can reconfigure remotely to adopt different applications and different network conditions. Reconfiguration is performed when the QoS attributes exceed a set threshold. The proposed mechanism was implemented with MATLAB. The time required for a particular network to reconfigure its components is around 15 to 20 seconds, which is very less when compared to the cost of manually stopping and restarting the application with the correct components.
Download
5 Performance Improvement of Vision Based Fire Detection System
Supriya Bhargava, Anand Vardhan Bhalla
Abstract – In this paper an optimized fire detection system using image processing is proposed. This system is based on combination of various methods used for fire detection using image processing. This system can also be adjusted according to different sensitive area requirement by applying different combination of fire detecting techniques. The proposed system gives optimized way to detect the fire in terms of fewer false alarms by giving the accurate result of fire occurrence. Conventional fire detection systems use physical sensors to detect fire. Chemical properties of particles in the air are acquired by sensors and are used by conventional fire detection systems to raise an alarm. However, this can also cause false alarms. In order to reduce false alarms of conventional fire detection systems, we proposed vision-based fire detection system. The proposed fire detection system consists of main parts: fire edge detection, colour detection, motion detection, gray-cycle pixel detection of smoke and area spread.
Download





Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com

Copyright

COPYRIGHT © EverScience Publications