You are on page 1of 1

International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 84

International Conference on Advances & Challenges in Interdisciplinary Engineering and


Management 2017 [ICACIEM 2017]

ISBN 978-81-933235-1-9 VOL 01


Website icaciem.org eMail icaciem@asdf.res.in
Received 10 January 2017 Accepted 28 - January 2017
Article ID ICACIEM167 eAID ICACIEM.2017.167

Asynchronous Power Management Using Grid


Deployment Method for Wireless Sensor Networks in
Critical Situation
Dheepika Rajamanickam1, S Pavithra2, K Rajalakshmi3, N Udhaya4, P J Shriidhar5
1,2,3,4,5
Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India

Abstract: A correct node operation and power administration are significant issues in the wireless sensor network system. Ultrasonic, dead reckoning,
and radio frequency information is obtained by using localization mechanism and worked through a specific filter algorithm. In this paper, a well-
organized grid deployment method is applied to split the nodes into multiple individual grids. The tiny grids are used for improved resolution and
bigger grids are used to decrease the complexity of processing. The efficiency of each grid is obtained by environmental factors such as redeployed nodes,
boundaries, and obstacles. To decrease the power usage, asynchronous power management method is designed. In network communication, power
management method is applied by using an asynchronous awakening scheme and n-duplicate coverage algorithm is engineered for the coverage of nodes.

ISBN 978-81-933235-1-9 VOL 01


Website icaciem.org eMail icaciem@asdf.res.in
Received 10 January 2017 Accepted 28 - January 2017
Article ID ICACIEM168 eAID ICACIEM.2017.168

Denial to Analysis on Control Cloud Data Entrance


Freedom and Ambiguity with Entirely Anonymous
Attribute-Based Encryption
P Praveen Kumar1, T Tamilselvan2, V Prabhakaran3, K Meiyalakan4
1,2,3,4
Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India

Abstract: Cloud computing is a revolutionary computing pattern, which enables flexible, on-demand, and low-cost usage of computing possessions,
but the data is outsourced to some cloud servers, and various privacy concerns appear from it. Various schemes based on the attribute-based encryption
have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the entrance organize, while less attention
is paid to the privilege control and the identity privacy. In our proposed we offer complete user security and data security. Encryption /Decryption
algorithms are used for data security, for user the password is automatically generated by the system. If the user wants to upload the data the authority
will send a 16 bit private key to the data owner. After putting this key data owner can upload his documents to the cloud, drop box is a public cloud
here we are used.
This paper is prepared exclusively for International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM
2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr K Samidurai and Editors
Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this
notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the
owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.

2017 Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]

You might also like