Kheyali Mitra, Debnath Bhattacharyya, Sattarova Feruza Y, Tai-hoon Kim
언어
영어(ENG)
URL
https://www.earticle.net/Article/A147733
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Mobile Phone based Information Management in Wireless Sensor Network is a heuristic approach where mobile phone will be the main access point of information in Wireless Sensor Network. The system will be as simple as possible providing all the facilities those are available in internet while managing information regarding this. A wireless mesh network furnishes the WSN and the mobile phones are going to be the nodes of this network. Here, any standard mobile phone(supporting Java applications) will be used as any nodes of this WSN and a single phone will be enough to send or retrieve remote data rather information through this WSN. Not only the queries of mobile user, some predefined activities i.e., proactive message passing based on situations (especially error messages or warning messages after sensing the system environment) can also be available in this system. A simple user friendly GUI is implemented for user who will avail this facility from his/her mobile phone after logging in successfully. There is a server to authenticate the logged in user, listen to the requests submitted by user and respond them accordingly. The user has two choices using which he/she can get the required information namely (i) get the reports regarding all/individual tags and or routes, sensors, emergency messages and also the location information; (ii) send actuation command to the server so that based on the command, proper measure(s) can be taken at server side. The user can see the report in their phone’s display screen. All that a user rather a remote client has to do is to install the software into his/her mobile phone and must enable the WLAN connection in the phone. And the most important thing is that user must have a valid user account. Otherwise he/she is not going to avail this facility to get information anywhere, anytime which is the main objective of our approach.
목차
Abstract 1. Introduction 2. Related works and study 3. Our approach 3.1. System study 3.2. Algorithms 4. Result 5. Discussion 6. Conclusion References
키워드
WSNnodetagsroutersactuation commandWLAN.
저자
Kheyali Mitra [ Computer Science and Engineering Department, Heritage Institute of Technology ]
Debnath Bhattacharyya [ Computer Science and Engineering Department, Heritage Institute of Technology ]
보안공학연구지원센터(IJGDC) [Science & Engineering Research Support Center, Republic of Korea(IJGDC)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Grid and Distributed Computing
간기
격월간
pISSN
2005-4262
수록기간
2008~2016
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Grid and Distributed Computing vol.2 no.3