Entity

Time filter

Source Type


Halder S.,Dr. B. C. Roy Engineering College | DasBit S.,Bengal Engg And Science University
MSWiM'12 - Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems | Year: 2012

Continuous monitoring of the environment in coal mines is an important application area in wireless sensor networks. It is very essential to know the conditions that exist in coal mines for ensuring safe working inside the mines. Based on the characteristics of room-and-pillar mining technique and the requirements for mine safety monitoring, we propose a heterogeneous node deployment strategy. To obtain real time and comprehensive monitoring, nodes are deployed in some strategic locations of the underground coal mine. We claim that the strategic locations are chosen in such a way that the proposed deployment scheme ensures 1-coverage and 3-connectivity. The claim has been justified by supporting lemma and proof. The present work achieves enhanced network lifetime by ensuring efficient energy usage amongst the nodes thereby prolonging network lifetime. Further, exhaustive simulation is performed considering a realistic routing protocol to substantiate our claim of energy efficiency and subsequent enhancement of network lifetime. Finally the scheme is compared with two existing deployment schemes. The results confirm our scheme's supremacy over both the existing schemes in terms of the performance metrics such as energy efficiency and network lifetime. Source


Giri C.,Bengal Engg And Science University
Advances in Intelligent Systems and Computing | Year: 2013

To design an efficient Wireless Sensor Network application one need to understand the behavior of the sensor nodes deployed. To understand the behavior of a systemwe need a very good model, that can represent the system in amore realistic manner. There is a vagueness that we can identify in defining the sensing coverage of any sensor node. The human like reasoning that best suits for this vagueness is the fuzzy reasoning. Here in this paper, we are proposing a fuzzy based model and inference system to best way represent the sensing behavior of sensor nodes. Also, we propose a measure that can be used to check or compare the WSN system performance. © 2013 Springer-Verlag. Source


Halder A.,Bengal Engg And Science University | Giri C.,Bengal Engg And Science University | Halder A.,Thomas College
International Conference on Electronics, Communication and Instrumentation 2014, ICECI 2014 | Year: 2014

In this paper, we propose an efficient brain tumor detection method, which can detect tumor and locate it in the brain MRI images. This method extracts the tumor by using K-means algorithm followed by Object labeling algorithm. Also, some preprocessing steps (median filtering and morphological operation) are used for tumor detection purpose. It is observed that the experimental results of the proposed method gives better result in comparison to other techniques. © 2014 IEEE. Source


Maity S.P.,Bengal Engg And Science University
2013 4th National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, NCVPRIPG 2013 | Year: 2013

A generalized form of reversible contrast mapping (RCM), analogous to M-ary modulation in communication, is developed here for reversible watermarking in digital images. Then an optimized distortion control framework in M-ary scheme is considered to improve data hiding capacity while meeting the embedding distortion constraint. Simulation results show that the combination of different M-ary approaches, using the different points representing the different RCM transformation functions, outperforms the embedding rate-visual quality-security of the hidden information compared to the existing RCM, difference expansion (DE) and prediction error expansion (PEE) methods during over embedding. Numerical results show that an average of 20% improvement in visual quality, 35% improvement in security of the hidden data at 1 bpp embedding rate is achieved for the proposed method compared to the existing PEE works. All these effectiveness are demonstrated with a number of simulation results. © 2013 IEEE. Source


Giri C.,Bengal Engg And Science University
Proceedings of the 2012 International Conference on Communications, Devices and Intelligent Systems, CODIS 2012 | Year: 2012

Communication coverage is one of the very important problem of any Wireless Sensor Network (WSN) application. To get very good design and better performances we need to use a very efficient model that can truly represent the behavior of sensor nodes in respect of data communication. Qualitatively we can argue that there is a fuzziness in the communication behavior of sensors. In this paper we are proposing a fuzzy based communication model, find the membership function and inference rules that may truly represent the behavior of sensor nodes. © 2012 IEEE. Source

Discover hidden collaborations