Earticle

현재 위치 Home

A Heuristic Approach for Mobile Phone Bases Information Management System in Wireless Sensor Network

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJGDC) 바로가기
  • 간행물
    International Journal of Grid and Distributed Computing 바로가기
  • 통권
    vol.2 no.3 (2009.09)바로가기
  • 페이지
    pp.1-12
  • 저자
    Kheyali Mitra, Debnath Bhattacharyya, Sattarova Feruza Y, Tai-hoon Kim
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A147733

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Mobile Phone based Information Management in Wireless Sensor Network is a heuristic approach where mobile phone will be the main access point of information in Wireless Sensor Network. The system will be as simple as possible providing all the facilities those are available in internet while managing information regarding this. A wireless mesh network furnishes the WSN and the mobile phones are going to be the nodes of this network. Here, any standard mobile phone(supporting Java applications) will be used as any nodes of this WSN and a single phone will be enough to send or retrieve remote data rather information through this WSN. Not only the queries of mobile user, some predefined activities i.e., proactive message passing based on situations (especially error messages or warning messages after sensing the system environment) can also be available in this system. A simple user friendly GUI is implemented for user who will avail this facility from his/her mobile phone after logging in successfully. There is a server to authenticate the logged in user, listen to the requests submitted by user and respond them accordingly. The user has two choices using which he/she can get the required information namely (i) get the reports regarding all/individual tags and or routes, sensors, emergency messages and also the location information; (ii) send actuation command to the server so that based on the command, proper measure(s) can be taken at server side. The user can see the report in their phone’s display screen. All that a user rather a remote client has to do is to install the software into his/her mobile phone and must enable the WLAN connection in the phone. And the most important thing is that user must have a valid user account. Otherwise he/she is not going to avail this facility to get information anywhere, anytime which is the main objective of our approach.

목차

Abstract
 1. Introduction
 2. Related works and study
 3. Our approach
  3.1. System study
  3.2. Algorithms
 4. Result
 5. Discussion
 6. Conclusion
 References

키워드

WSN node tags routers actuation command WLAN.

저자

  • Kheyali Mitra [ Computer Science and Engineering Department, Heritage Institute of Technology ]
  • Debnath Bhattacharyya [ Computer Science and Engineering Department, Heritage Institute of Technology ]
  • Sattarova Feruza Y [ Hannam University ]
  • Tai-hoon Kim [ Hannam University ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJGDC) [Science & Engineering Research Support Center, Republic of Korea(IJGDC)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Grid and Distributed Computing
  • 간기
    격월간
  • pISSN
    2005-4262
  • 수록기간
    2008~2016
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Grid and Distributed Computing vol.2 no.3

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장