1,2 DAVCET Kanina Mohinderrgarh Haryana India
Mobile sensor networks (MSNs) have been widely studied in recent years and are expected to be applied in a variety of applications such as battlefield surveillance, event detections, hostile environment monitoring, and wild animal tracking. In this report, we list out the existing routing protocol for wireless sensor networks. A WSN is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it. The position of sensor nodes need not be engineered or predetermined. This allows random deployment in inaccessible terrains or disaster relief operation. In this paper we study different type of routing protocol for sensor network like flooding, SPIN (Sensor Protocols for Information via Negotiation), LEACH (Low Energy Adaptive Clustering Hierarchy) in details and check how they different from the ad hoc network. SPIN and LEACH routing protocol are compared with flooding protocol.
1Asso Prof. Dept of Comp Sc, KSW University Bijapur Krnataka India
2Prof Dept of Comp Sc& Engg D college of Engg Bangalore India
In this paper we offers lossless compression method of medical images using biorthogonal wavelet transform based on embedded zero tree wavelet. Wavelet transforms offers wide space for image coding because of its excellent space frequency location. Efficient image compression solution one becoming more critical with the recent growth of data, multimedia based web application. Biorthogonal wavelets base can be constructed freely according to the wavelet performance, and it can quickly the implementations speed of the wavelet transform. The experimental results indicates that the biorthogonal wavelet has good performance with EZW
1Computer Engg Dept SIMT
2rewari Vaish College of Engg Rohtak
3Computer Engg Dept SIMT Rewari India
Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver); Integrity (not modified by any one to integrity of message); Non repudiation (sender can't refuse the claim of not sending); and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. There are two approaches for the generation of encryption/decryption keys i.e software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from encoding and decoding of data vis four different channels at different times. Selections of channels will be guided by timer and decoder circuits. one form to another from at transmitter end receiver end respectively. The purpose of this paper is to generate the key code using electronic circuits to make the data secure.
1ME Student Guru Nanak Dev Engineering College Ludhiana India
2Principal of RIMT Engg College Gobindgarh Mandi
3Associate Professor Guru Nanak Dev Engineering College Ludhiana India
A Health Management Information System (HMIS) can be a powerful tool to make health care delivery more effective and far more efficient. Health Management Information System where the health data are recorded and stored from which the any patient and doctor can easily find the information. The lot of paper work is reduced during the health management information system. Health Metrics Network (HMN) is working to improve health and lives by strengthening and aligning health information systems around the world. The Electronic Health Record (EHR) is an online record, which tracks and details a patient's care during the time spent in hospital. The EHR replace paper-based records by integrating patient information in a central system and allows authorized clinicians to access a patient's records from any location. HL7 is a standard. Data sharing among local hospitals is being increasingly realized with the proliferation of the healthcare information system interoperability Standard, Health Level Seven (HL7).
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License