Quazi Ehsanul Kabir Mamun

Learn More
Periodical information collection from unreachable remote terrain and then transmit information to a remote base station is one of the targeted applications of sensor networks. But the energy restriction of battery operated sensor nodes certainly makes this task difficult and complicated because once deployed in the target field, it is not feasible to(More)
Energy awareness plays an important role in developing routing protocol for the battery powered wireless sensor networks. As the replacement of the battery is often unfeasible in practical situations, we present here an optimal solution for the maximum utilization of precious available energy at the same time trying to minimize the latency in data delivery.(More)
In this paper we present a new token based protocol for group mutual exclusion in distributed systems. The protocol uses one single token to allow multiple processes to enter the critical section for a common session. One of the significant characteristics of the protocol is - concurrency, throughput and waiting time can be regulated adjusting the time(More)
Intrinsic restrictions of sensor nodes and unreliable nature of wireless communication direct the designers to develop power efficient and resource utilizing protocols for wireless sensor networks(WSNs). Different types of energy-efficient protocols have been proposed based on different topologies. In this paper we address the issue of logical topology of(More)
Resource-constraint nature of wireless sensor network (WSN) turns the security issue certainly into a big challenge. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present two versions of a secured key management protocol (SecCOSEN) adopted on COSEN, a chain oriented sensor network, which is used for(More)
We have already some technologies to perform these types of application such as: Bluetooth, IR. However these are used in a limited area which we can easily come over in the proposed system. This system has two sections one is Remote Section (RS) where the client will place the request and another is Local Section (LS) where the telephone line is connected(More)
Energy consumption and lifetime of networks are the two most important constraints for wireless sensor networks (WSNs). Moreover, for perceiving events with respect to time, WSNs need to maintain coverage quality. This paper focuses on coverage problem with a number of sensors selected from deployed sensor nodes, which develop chain oriented(More)
Due to energy constraints and limited lifetime, sensor nodes are usually deployed densely in the target fields. Moreover, some applications do not require 100% coverage all the time. In view of these two concepts we may turn off some of the sensor nodes exploiting the redundancy of deployed sensor nodes. On the other side, the underlying communication(More)
Whereas the two-phase commit protocol guarantees global atomicity, its biggest drawback is that it is a blocking protocol-whenever the coordinator fails, cohort sites will have to wait for its recovery. Although three-phase commit protocol was devised to reduce blocking situation, it increases latency. In this paper we propose a proxy based two-phase atomic(More)
  • 1