Analysis of IPTV services in LAN/WLAN networks
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.80-83, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.8083
Abstract
The Internet Protocol Television (IPTV) is becoming one of the most promising applications over next generation networks. With the recent released of IEEE 802.16d/e, it is capable ensuring high bandwidths and low latency and suitable for delivering multimedia services. Importance of perceptual quality has arisen as one of the major issues to successfully deploy IPTV services. Therefore, guaranteeing a certain level of network QoS is well and widely understood, but it is much more important to notice perceptual quality as perceived by the user. In this paper, we have designed a new network consists of FTP server and HTTP server which are connected to four subnets and IP cloud. We have evaluated the performance of this network and quality of service considering the parameters throughput, delay, load and data dropped.
Key-Words / Index Term
IPTV, Opnet, Quality of Service, Wireless
References
[1]. Abukharis S, MacKenzie R, Farrell “TO Improving QoS of Video Transmitted Over 802.11 WLANs Using Frame Aggregation. London Communications Symposium.” London, United Kingdom, September 03–04,2009
[2]. Alejandro Canovas, Fernando Boronat, Carlos Turro and Jaime Lloret (2009) “Multicast TV over WLAN in a University Campus Network”, The Fifth International Conference on Networking and Services (ICNS 2009), Valencia (Spain), April 20–25
[3]. Alfonsi B (2005) “I want my IPTV: Internet Protocol television predicted a winner,” IEEE Distributed Systems Online, vol.6, no.2
[4]. Birlik F, Gurbuz Ö, Ercetin O , “IPTV Home Networking via 802.11 Wireless Mesh Networks: An Implementation Experience”. IEEE Trans. on Consumer Electronics, Vol. 55, No. 3,2009
[5]. Cai LX, Ling X, Shen X, Mark JW, Cai L “Supporting voice and video applications over IEEE 802.11n WLANs. Wireless Networks “15:443–454
[6]. Cunningham G, Perry P, Murphy J, Murphy L “Seamless Handover of IPTV Streams in a Wireless LAN Network”. Transactions on Broadcasting, IEEE 55(4):796–801,2009
[7]. Dai Z, Fracchia R, Gosteau J, Pellati P, Vivier G (2008) Vertical Handover Criteria and Algorithm in IEEE802.11 and 802.16 Hybrid Networks, IEEE International Conference on Communications, 2008. ICC’08. Beijing, China, 19–23
[8]. Gidlund M, Ekling J , “VoIP and IPTV distribution over wireless mesh networks in indoor environment” . IEEE Trans Consum Electron 54(4):1665–1671,2008
[9]. Hellberg C, Greene D, Boyes T , “Broadband network architectures: designing and deploying triple- play services”. Prentice Hall PTR Upper Saddle River, NJ, USA, 2007
[10]. Hsu H-T, Kuo F-Y, Lu P-H “Design of WiFi/WiMAX dual-band E-shaped patch antennas through cavity model approach. Microw Opt Technol Lett” 52(2):471–474,2010
Citation
Ritu Sindhu, "Analysis of IPTV services in LAN/WLAN networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.80-83, 2018.
Exam Time Table Scheduling using Graph Coloring Approach
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.84-93, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.8493
Abstract
One of the most common academic scheduling problems which can be perceived in any educational system is the exam time table generation. The presence of vast numbers of students and offered courses makes it difficult to schedule exams in a limited epoch of time. An appropriate schedule can be designed by utilizing different resources like subjects, teachers, students and classrooms in a way to evade conflicts by fulfilling special types of constraints. Graph coloring is one decent approach which can deal with timetable scheduling problem and can satisfy changing requirements. In this work, we have framed a systemic model by applying graph vertex coloring approach for generating exam timetabling with the help of a course matrix generated from given data of an educational institute. From the problem domain, different types of constraints viz., hard and soft are figured out and while solving emphasis is focused on the degree of constraint satisfaction. Workflow of the system is described by using a case study and the output which it has generated is efficient and satisfactory.
Key-Words / Index Term
Time table, Graph coloring, Scheduling, Hard constraints, Soft constraints, Course matrix
References
[1] Welsh D.J.A., and Powell M.B., “An Upper Bound for the Chromatic Number of a Graph and it`s Application to Timetabling Problems”, The Computer Journal. (1967), Vol.10, No.1, pp. 85-86.
[2] Mohammad M., Mohammad A.H., and Osama A.H., “A new exam scheduling algorithm using graph coloring”, The International Arab Journal of Information Technology, (2008), Vol. 5, No.1, pp. 80- 86.
[3] Burke K.E., Mccollum B., Meisels A.,and Petrovic S., “A Graph-Based Hyper-Heuristic for Educational Timetabling Problems”, European Journal of Operational Research (2007), Vol-176, pp. 177-192.
[4] Somasundaram M.R., “Discrete Mathematical structures”, 2nd edition, PHI, 2010.
[5] Bhasin H., “Algorithms Design and Analysis”, 1st edition, Oxford University Press, 2015.
[6] Akbulut A., and Yılmaz G., “University Exam Scheduling System Using Graph Coloring Algorithm and RFID Technology”, International Journal of Innovation, Management and Technology, (2013), Vol. 4, No. 1, pp. 66-72.
[7] Hussain B., Basari A.S.H., and Asmai S.A., “Exam Timetabling Using Graph Colouring Approach”, In the proceedings of IEEE Conference on Open Systems (ICOS2011), (2011), pp.139-144.
[8] Verma O.P., Garg. R.,and Bisht V.S., “Optimal Time-Table Generation by Hybridized Bacterial” Foraging and Genetic Algorithm”, In Proceedings of International Conference on Communication Systems and Network Technologies (CSNT’12), (2012), pp. 919-923.
[9] Jha. S.K., “Exam Timetabling Problem using Genetic algorithm”, International Journal of Research in Engineering and Technology, (2014),Vol.3, No.5, pp. 649-655.
[10] Alon N., “A Note on Graph Colorings and Graph Polynomials,” Journal of Combinatorial Theory Series B”, (1997), Vol. 70, No. 1, pp. 197-201.
[11] Gross J. and Yellen J., Handbook of Graph Theory, Discrete Mathematics and its Applications, CRC Press, Vol. 25, 2003.
[12] Norberciak. M., “Universal Method for Timetable Construction based on Evolutionary Approach” World Academy of Science, Engineering and Technology, (2006), pp. 91-96.
Citation
Rubul Kumar Bania, Pinkey Duarah, "Exam Time Table Scheduling using Graph Coloring Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.84-93, 2018.
Inter-class and Intra-class Fuzzy Clustering with Pruning Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.94-99, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.9499
Abstract
The paper proposes a new supervised fuzzy clustering algorithm based on inter-class and intra-class clustering technique to create the clusters i.e. fuzzy hyperspheres (FHSs) and pruning technique to prune redundant FHSs which are camouflaged by the other FHSs of the same class. The proposed clustering technique finds the centroid and the width of the FHS based on the spread of inter-class patterns and then groups intra-class patterns using fuzzy membership function, whereas the pruning technique creates the optimal number of FHSs from the FHSs created in the earlier stage. This algorithm is independent of parameters, limits the interference of outliers and converges quickly to create an optimal number of clusters. The main feature of the proposed fuzzy clustering algorithm is that it camouflages the clustered patterns giving 100% accuracy for any training dataset. The performance of the proposed algorithm is tested on eleven benchmark datasets and it is observed that the proposed algorithm results are superior and comparable with classifiers using clustering algorithm.
Key-Words / Index Term
Fuzzy clustering, Fuzzy membership function, Fuzzy hyperspheres, pruning
References
[1] K. Rose, F. Guerewitz, G. Fox, “A Deterministic annealing Approach to Clustering”, Pattern Recognition Let., Vol. 11, Issue. 9, pp. 589-594, 1990.
[2] L. Bai, J. Liang, C. Dang, F. Cao, “A Novel Fuzzy Clustering Algorithm With Between-Cluster Information for Categorical Data”, Fuzzy Sets Syst., Vol. 215, pp. 55-73, 2013.
[3] F. Tung, A. Wong, D. A. Clausi, “Enabling Scalable Spectral Clustering for Image Segmentation”, Pattern Recogn., Vol 43, Issue. 12, pp. 4069-4076, 2013.
[4] Y. Yan, L. Chen, W. C. Tjhi, “Fuzzy Semi-Supervised Co-Clustering for Text Documents”, Fuzzy Sets Syst., Vol 215, pp. 74-89, 2013.
[5] B. Sun, W. Liu, Q. Zhong, “Hierarchical Speaker Identification Using Speaker Clustering,” Int. Conf. on Natural Language Processing and Knowledge Engineering, pp. 299-304 2003.
[6] B. Dogan, M. Korurek, “A New Ecg Beat Clustering Method Based On Kernelized Fuzzy C-Means And Hybrid Ant Colony Optimization for Continuous Domains”, Appl. Soft Comput.,Vol 12 , Issue. 11, pp. 3442–3451, 2012.
[7] Y. Chen, J. Wang, And R. Krovetz, “Clue: Cluster-Based Retrieval Of Images By Unsupervised Learning”, IEEE Trans. on Image Processing, Vol.14, Issue. 8, pp. 1187–1201, 2005.
[8] C. R. Lin And M. Gerla, “Adaptive Clustering for Mobile Wireless Networks”, Journal on Selected Areas in Communication, Vol. 15, Issue. 7, pp.1265-1275, 1997.
[9] R.N. Dave, R. Krishnpuram, “Robust Clustering Method: A Unified View”, IEEE Trans. Fuzzy System, Vol. 5, Issue. 2, pp. 270-293, 1997.
[10] J. C. Bezdek, “Pattern Recognition With Fuzzy Objective Function Algorithms”, Plenum press, New York, 1981.
[11] L. Kaufman, P.J. Rousseeuw, “Finding Groups In Data: An Introduction to Cluster Analysis”, Wiley, Hoboken, 2005.
[12] N. R. Pal, K. Pal, J. M. Keller, J. C. Bezdek, “A Possibilistic Fuzzy C-Means Clustering Algorithm”, IEEE Trans. Fuzz,Y Syst., Vol.13, No.4, pp. 508-516, 2005.
[13] Simpson P. K.,“Fuzzy Min-Max Neural Networks Part-2: Clustering”, IEEE Trans. Fuzzy System, Vol. 1, Issue. 1, pp.32-45, 1993.
[14] U. V. Kulkarni, T. R. Sontakke, A. B. Kulkarni, “Fuzzy Hyperline Segment Clustering Neural Network”, Electronics Letters, Vol.37, Issue. 5, pp. 301-303, 2001.
[15] J. C. Bezdek, N. R. Pal, “Generalized Clustering Networks And Kohonen’s Self-Organizing Scheme”, IEEE Neural Networks, Vol. 4, Issue. 4, pp. 549-557, 1993.
[16] G. Carpenter, S. Grossberg, N. Maukuzon, J. Reynolds, And D. B. Rosen, “Fuzzy Artmap: A Neural Network Architecture for Incremental Supervised Learning Of Analog Multidimensional Maps”, IEEE Trans. Neural Networks,Vol. 3, Issue. 5, pp. 698-713, 1992.
[17] A. Likas, N. Vlassis, Verbeek, “The Global K-Means Clustering Algorithm”, Pattern Recog. Let., Vol. 36, pp. 451-461, 2003.
[18] D. W. Kim, K. H. Lee, D. Lee, “Fuzzy Cluster Validation Index Based On Inter-Cluster Proximity,” Pattern Recognition Letters, Vol. 24, Issue. 15, pp. 2561-2574, 2003.
[19] A. B. Kulkarni, S. V. Bonde, U. V. Kulkarni, “A Novel Fuzzy Clustering Algorithm for Radial Basis Function Neural Network”, International Journal on Future Revolution in Computer Science and Communication Engineering, Vol. 4, Issue. 4, pp.751-756, 2018.
[20] M. Rouhani, D. S. Javan, “Two Fast And Accurate Heuristic Rbf Learning Rules for Data Classification”, Neural Networks, Vol.75, pp. 150-161, 2016.
[21] Yuanshan Liu, He Huang, Ting Wen Huang B, Xusheng Qian,“An Improved Maximum Spread Algorithm With Application to Complex-Valued Rbf Neural Networks”, Neurocomputing, Vol. 216, pp. 261-267, 2016.
Citation
A. B. Kulkarni, S.V. Bonde, U.V. Kulkarni, "Inter-class and Intra-class Fuzzy Clustering with Pruning Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.94-99, 2018.
Simulation and Analysis of AODV and DYMO Protocols under CBR in Wireless Sensor Network using Qualnet
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.100-105, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.100105
Abstract
One of the major challenges in wireless CBR network is the design of roboust routing protocols .Routing protocol are designed to establish correct and efficient path between source and destination. .Wireless sensor is considered the best technology for the study of the performance parameters. MANET is self configured .All MANETs in wireless is connected through wireless link. AODV and DYMO are made to establish a correct relation between the sender and the receiver. Many protocols have been discovered in last few years. These are two of them. They have different property under the different application. Constant bit rate is used here to define the AODV and DYMO Protocols. In this paper, present the two mobile CBR network routing protocol, i.e. CBR on (AODV), CBR on (DYMO) . The performance analysis is done on the basis of network metric such as End to End delay, Average (jitter), total packet received and throughput.
Key-Words / Index Term
AODV, DYMO, QUALNET
References
[ 1] Bijoy cheetri, Praveen Kumar pradhana,”Analysis of MAC layer protocol of wireless sensor network using QUALNET”, IJCSE, volume 7, N0.2, Date:-2Feb, 2015.
[ 2] . A.S. Raghuvanshi,S.Tiwari,”DYMO as routing protocol for IEEE802.15.4 Enabled wireless sensor network”,IEEE,2010,
[ 3] . Seema Rahul, Sanjay Kumar Maura, Yashi Rajvanshi, Sandeep Vijay, “Performance analysis of AODV, DYMO and Bellman Routing Protocols in Mobile Ad-hoc network”, CAC2S, 2013.
[ 4] .Richa Agrawal, Rajeev Tripathi,Sudarshan Tiwari,”Performance Comparison of AODV and DYMO MANET protocols under wormhole attack environment, “International Journal of computer Applications.,Volume:44-No.9,April 2012.
[ 5] .Ayaz Hassan Moon, N.A.Shah, Ummer Iqbal, Adil Ayub,”Simulating and analysis basic security Attacks in wireless Sensor Network using Qualnet”2013 International Conference on Machine Intelligence Research and Advancement.
[ 6] .Jogender kumar, Annapurna Singh, M.K.Panda, H.S.Bhadauria,”Study and performance Analysis of Routing Protocol Based on CBR”, Procedia computer science 85(2016)23-30, International conference on computational modeling and security
[ 7] .Mr.Shridhar kabbur ,Dr.G.F.Ali Ahammed,Dr. Rashma Banu,”Impact of CBR Traffic on Energy consumpation in MANET,” ICMAEM-2017
[ 8] .Anjali Goyal, Sandip Vijay, Dharmendra kumar,”Simulation and Performance Analysis of Routing Protocols in wireless sensor network using qualnet”, International Journal of Computer applications, Volume 52, NO.2, August 2012.
[ 9] .Md Niaz Imtiaz,Md. Mohidal Hasan, Md.Imran Ali, Md. Mostak Shaikh,”Performance Evaluation of Routing Protocols”ICMAEM-2017
[ 10] A.Boomarani Malany, V.R.Sharma Dhulipala, R Chandraeskaran,”Throughput and Delay comparison of MANET Routing Protocols.”ICSRS, vol2, NO.3, Sept 2009.
Citation
N. Radhey, V. Nandal, "Simulation and Analysis of AODV and DYMO Protocols under CBR in Wireless Sensor Network using Qualnet," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.100-105, 2018.
Automatic Wheeze Detection in Lung Sounds
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.106-110, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.106110
Abstract
Lung disease is mainly characterized by the variations that occur in breathing sound of human being. The variations are characterized as wheezes, crackles, etc. Wheezes are one of the most important adventitious sounds in pulmonary system. They are observed in asthma, chronic obstructive pulmonary disease (COPD) and bronchitis. The current method of detecting a lung disease for example asthma involves usage of spirometers and stethoscope. The results with these techniques are not efficient. A wheezing detection system may help physicians to monitor patients over the long-term. This technique involves on board capture and processing methodology. This paper involves the system for breath sound acquisition and real time pre-processing and detection of abnormality in lung sounds using DSP processor. The aim of the system is to design and develop portable device for acquisition and detection of abnormality in lung sounds.
Key-Words / Index Term
Lung Diseases, Stethoscope, DSP Processor, FFT, Wheeze, Android application
References
[1] Acharya, Jyotibdha Basu, Arindam Ser, Wee, “Feature Extraction Techniques for Low-Power Ambulatory Wheeze Detection Wearables”, 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2017) pp. 4574-4577.
[2] D. Chamberlain, J. Mofor, R. Fletcher, R. Kodgule, “Mobile Stethoscope and Signal Processing Algorithms for Pulmonary Screening and Diagnostics”, IEEE 2015 Global Humanitarian Technology Conference pp. 3074-3080
[3] Jianmin Zhang,Wee Ser,Jufeng Yu, T.T.Zhang., “A Novel Wheeze Detection Method For Wearable Monitoring System”, IEEE Computer Society., 2009.pp 331-334
[4] Bor-Shing Lin,Tian-Shiue Yen, “An FPGA based Rapid Wheezing detection System”, Int. J. Environ. Res Pubic Health, pp. 1573-1593, 2014.
[5] Dinko Oletic, Bruno Arsenali and Vedran Bilas, “Low-Power Wearable Respiratory Sound Sensing”, Sensors 2014 ISSN 1424-8220
[6] R.J.Riella, P.Nohama and J.M.Maia, “Method for automatic detection of wheezing in lung sounds”, Brazilian Journal of Medical and Biological Research., pp. 674-684, 2009.
[7] Sandra Reichert, “Analysis of Respiratory Sounds: State of the Art”, Clinical Medicine: Circulatory, Respiratory and Pulmonary Medicine 2008:2 45–58
[8] Styliani A. Taplidou, Leontios J. Hadjileontiadis, “Wheeze detection based on time-frequency analysis of breath sounds”, Computers in Biology and Medicine 37 (2007) 1073 – 1083
[9] Marcin Wiśniewski, Tomasz Zieliński, “Digital Analysis Methods of Wheezes in Asthma”, The International Conference on Signals and Electronic Systems, Gliwice, Poland, September 7-10, 2010.
[10] Sameer Alsmadia,Yasemin P. Kahyab, “Design of a DSP-based instrument for real-time classification of pulmonary sounds”, Computers in Biology and Medicine 38 (2008) 53 – 61
[11] Jayant V. Mankar, Prof. Sunil Kureel, “Analysis of Lung Diseases and Detecting Deformities in Human Lung by Classifying Lung Sounds”, International Journal of Research in Advent Technology, Vol.2, No.10, October 2014 E-ISSN: 2321-9637
[12] A.P. Mohod, A. Pankar, A Mohite, A. Dondalkar, A. Kadhe, Manish Naik, “Digital Health Record and Prescription”,International Journal of Scientific Research in Computer Sciences and Engineering, Vol.6 , Issue.1 , pp.60-62, Feb-2018
[13] J. Joseph, S. Devane, “Low Profile Microwave Band Pass Filter”, International Journal of Scientific Research in Network Security and Communication, Vol.5 , Issue.2 , pp.1-6, May-2017
[14] Shih-Hong Li,Bor-Shing Lin,Chen-Han Tsai,Cheng-Ta Yang and Bor-Shyh Lin,”Design of Wearable Breathing Sound Monitoring
System for Real-Time Wheeze Detection”, Sensors 2017, 17, 171; doi: 10.3390/s17010171
Citation
K.S. Kulkarni, S.S. Chorage, "Automatic Wheeze Detection in Lung Sounds," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.106-110, 2018.
An Arnold DCT based Non-Blind Watermarking Technique for Medical Images
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.111-117, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.111117
Abstract
Telemedicine is a blend of medical information system and information technology that incorporates the transmission of medical data over the internet. The potential difficulties involved in implementation are confidentiality, robustness against attacks and integrity. In this paper, a dual-transform domain watermarking model has been proposed based on Arnold transform used for spatial de-correlation of the host image applied after Discrete Cosine Transform domain-based watermark insertion. The salient feature of this method is to accomplish improved robustness while safeguarding the originality of the image. This paper attempts to substantiate the guaranteed features by simulating the quality metrics on the benchmark images (MRI, X-Ray and US-Scan). The consequences of examinations have been exhibited through quality measures such as Structural Similarity Index (SSIM), Normal Cross Correlation (NCC) and Peak Signal-to-Noise Ratio (PSNR).
Key-Words / Index Term
Arnold, DCT, Integrity, Medical Imaging, Watermarking
References
[1] S. Kaur, O. Farooq, R. Singhal, B. S. Ahuja, “Digital watermarking of ECG data for secure wireless communication.” IEEE Transactions on Telecommunication and Computing, 2010, pp. 140-144.
[2] N. V. Rao, V. Meena Kumari, “Watermarking in Medical Imaging for Security and Authentication” Information Security Journal: A Global Perspective,T & F, Vol. 20, issue 20,2011
[3] A. G. Bors and I. Pitas, "Image watermarking using DCT domain constraints," Proceedings of 3rd IEEE International Conference on Image Processing, Lausanne, 1996, pp. 231-234 vol.3.
[4] B. Tao and B. Dickinson, "Adaptive watermarking in the DCT domain," 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, Munich, 1997, pp. 2985-2988 vol.4.
[5] S. Liu, Z. Pan and H. Song, "Digital image watermarking method based on DCT and fractal encoding," in IET Image Processing, vol. 11, no. 10, pp. 815-821, 10 2017
[6] S. Tyagi, H. V. Singh and R. Agarwal, "Image watermarking using genetic algorithm in DCT domain," 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2017, pp. 1-6
[7] L. Umaroh, C. A. Sari, Y. P. Astuti and E. H. Rachmawanto, "A robust image watermarking using hybrid DCT and SLT," 2016 International Seminar on Application for Technology of Information and Communication (semantic), Semarang, 2016, pp. 312-316.
[8] M. Jamali, S. Samavi, N. Karimi, S. M. R. Soroushmehr, K. Ward and K. Najarian, "Robust watermarking in non-ROI of medical images based on DCT-DWT," 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Orlando, FL, 2016, pp. 1200-1203
[9] S. H. Soleymani and A. H. Taherinia, "Robust image watermarking based on ICA-DCT and noise augmentation technique," 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, 2015, pp. 18-23.
[10] S. A. Parah, S. Ashraf and A. Ashraf, "Robustness Analysis of a Digital Image Watermarking Technique for Various Frequency Bands in DCT Domain," 2015 IEEE International Symposium on Nanoelectronic and Information Systems, Indore, 2015, pp. 57-62.
[11] J. P. Maheshwari, M. Kumar, G. Mathur, R. P. Yadav and R. K. Kakerda, "Robust Digital Image Watermarking using DCT based pyramid transform via image compression," 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, 2015, pp. 1059-1063.
[12] H. Dong, M. He and M. Qiu, "Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi`an, 2015, pp. 310-313.
[13] H. B. Kekre, T. Sarode and S. Natu, "Robust watermarking by SVD of watermark embedded in DKT-DCT and DCT wavelet column transform of host image," 2015 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, 2015, pp. 1-6.
[14] S. L. Agrwal, A. Yadav, U. Kumar and S. K. Gupta, "Improved invisible watermarking technique using IWT-DCT," 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, 2016, pp. 283-285.
[15] S. Gaur and V. K. Srivastava, "A hybrid RDWT-DCT and SVD based digital image watermarking scheme using Arnold transform," 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, 2017, pp. 399-404.
[16] Xinshan Zhu, Jie Ding, Honghui Dong, Kongfa Hu, Xiaobin Zhang, “Normalized correlation-based quantization modulation for robust watermarking” IEEE Transactions on Multimedia, 2014, 16(7), pp1888 – 1905.
[17] L. Venkateswarlu, N. V. Rao and B. E. Reddy, "A Robust Double Watermarking Technique for Medical Images with Semi-fragility," 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), Bangalore, India, 2017, pp. 126-131.
[18] X. Zhang and S. Wang, “Statistical fragile watermarking capable of locating individual tampered pixels,” IEEE Signal Process. Lett., vol. 14, no. 10, pp. 727–730, Oct. 2007.
[19] Zhang Huaxiong, Qiu Peiliang, “The application of scrambling technology in watermarking [J]”, Journal of Circuits and Systems, 2001, 6(3), pp.32-36.
[20] Venkateswarlu Lendale, B. Eswara Reddy, N. Vyaghreswara Rao. "Arnold-wavelet based robust watermarking technique for medical images." ICT in Business Industry & Government (ICTBIG), International Conference on. IEEE, 2016.
[21] L. Venkateswarlu, N. V. Rao and B. E. Reddy, "A Robust Double Watermarking Technique for Medical Images with Semi-fragility," 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), Bangalore, India, 2017, pp. 126-131.
[22] BarreS. DICOM Medical image samples http://barre.nom.fr/medical/samples/
Citation
Lendale Venkateswarlu, N Vyagreswara Rao and B Eswara Reddy, "An Arnold DCT based Non-Blind Watermarking Technique for Medical Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.111-117, 2018.
SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.118-125, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.118125
Abstract
Cloud computing is fast growing technology that enables the users to store and access their data remotely. While accessing the data from cloud, different users may have relationship among them depending on some attributes, and thus sharing of data along with user privacy and data security becomes important to get effective result. In this paper, we design and implement Secure Data Sharing Approach i.e. SDSA, for dynamic groups in public cloud environment. In this technique, user uploaded their data on cryptographic server in encrypted format using Homomorphic encryption algorithm tiger hash algorithm is used for key generation which is input in the encryption algorithm. In SDSA a user is able to share data with others in the group without revealing characteristics privacy to the other user. Moreover, SDSA supports efficient user revocation and fresh user joining. More especially, efficient user revocation can be achieved through a public revocation list without harming security of the other remaining users in user portal. In addition, the storage overhead and the encryption decryption computation cost are constant. Extensive analyses show that this proposed scheme satisfies the desired security requirements along with the secure sharing with other and preserve privacy policy when group sharing is processed that guarantees efficiency as well.
Key-Words / Index Term
Cloud Computing, Homomorphic Encryption, Security, Secure Sharing, Cryptography, Cryptographic Server, Decryption
References
[1] Stallings, William. Cryptography and network security: principles and practice. Pearson Education India, 2003
[2] Nadeem, Aamer, and M. Younus Javed. "A performance comparison of data encryption algorithms", In Information and communication technologies, 2005. ICICT 2005, First international conference on, pp. 84-89. IEEE, 2005.
[3] Denning, Dorothy E., and Peter J. Denning. "Data security." ACM Computing Surveys (CSUR) 11, no. 3 (1979): 227-249.
[4] Herdman, R. "Information security and privacy in network environments." The Office of Technology Assessment (OTA) (1994).
[5] Sattarova Feruza Y. and Tao-hoon Kim, “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security”, International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, April, 2007
[6] Wei, Jianghong, Wenfen Liu, and Xuexian Hu. "Secure data sharing in cloud computing using revocable-storage identity-based encryption." IEEE Transactions on Cloud Computing (2016).
[7] B. V. Varshini, M. Vigilson Prem and J. Geethapriya, “A Review on Secure Data Sharing in Cloud Computing Environment”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 6, Issue 3, March 2017.
Citation
T. Aaliya, R. Sharma, "SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.118-125, 2018.
Machine-learning Techniques for Clinical Decision-making and Prediction: A Review
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.126-133, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.126133
Abstract
The incredible growth in medical technologies has increased in accumulation of loads of data in various forms. Application of medical informatics techniques and tools transform data into various forms of stuff which are sutable for mining. Implementing data mining techniques on clinical data enable the discovery of priceless knowledge from the huge collection of information stored. This study aims to conduct a review systematically on the classification techniques applied on clinical data from the perspective of (i) Medicine and (ii) Health care. The outcomes of this study indicate that maximum amount of research was published in the years 2015 and 2016. In medical data mining research, the most popular algorithm used was decision tree. Elsevier was identified as the leading publisher, which has published plenty of articles in this domain. 75% of the articles belonged to the category ‘medicine’ and rest of the articles belonged to the category ‘health care’. Out of the 75% articles, most of them were related to prognosis and diagnosis of diseases and fewer studies have been conducted in treatment recommendation. Choosing the best therapy and identifying the ideal treatment plan is a challenging task in case of diseases like heart failure and cancer. Moreover there is insufficient machine-learning research conducted in kidney diseases especially in chronic kidney disease and end-stage renal disease which are considered a global threat nowadays.
Key-Words / Index Term
Classification, Data mining, Decision tree
References
[1] Afzal, M., Hussain, M., Khan, W. A., Ali, T., Lee, S., Huh, E. N., & Hydari, M. A., “Comprehensible knowledge model creation for cancer treatment decision making”, Computers in biology and medicine, Vol.82, pp.119-129.2017.
[2] Amaral, J. L., Lopes, A. J., Veiga, J., Faria, A. C., & Melo, P. L., “High-accuracy detection of airway obstruction in asthma using machine learning algorithms and forced oscillation measurements”, Computer methods and programs in biomedicine, Vol.144, pp.113-125, 2017.
[3] Armengol, E., “Classification of melanomas in situ using knowledge discovery with explained case-based reasoning”, Artificial Intelligence in Medicine, 51(2), pp.93-105, 2011.
[4] Askland, K. D., Garnaat, S., Sibrava, N. J., Boisseau, C. L., Strong, D., Mancebo, M., & Eisen, J., “Prediction of remission in obsessive compulsive disorder using a novel machine learning strategy”, International journal of methods in psychiatric research, 24(2), pp.156-169, 2015.
[5] Beaudoin, M., Kabanza, F., Nault, V., & Valiquette, L., “Evaluation of a machine learning capability for a clinical decision support system to enhance antimicrobial stewardship programs”, Artificial intelligence in medicine, 68, pp.29-36, 2016.
[6] Çakır, A., & Demirel, B., “A software tool for determination of breast cancer treatment methods using data mining approach”, Journal of medical systems, 35(6), pp.1503-1511, 2011.
[7] Cheruku, R., Edla, D. R., & Kuppili, V., “SM-RuleMiner: Spider monkey based rule miner using novel fitness function for diabetes classification”, Computers in biology and medicine, 81, pp.79-92, 2017.
[8] Chia, C. C., Rubinfeld, I., Scirica, B. M., McMillan, S., Gurm, H. S., & Syed, Z., “ Looking beyond historical patient outcomes to improve clinical models”, Science translational medicine, 4(131), 131ra49-131ra49, 2012.
[9] Christopher, J. J., Nehemiah, H. K., & Kannan, A., “A swarm optimization approach for clinical knowledge mining”, Computer methods and programs in biomedicine, 121(3), pp.137-148, 2015.
[10] Chuang, C. L., “Case-based reasoning support for liver disease diagnosis”, Artificial Intelligence in Medicine, 53(1), pp.15-23, 2011.
[11] Cruz-Ramirez, M., Hervas-Martinez, C., Fernandez, J. C., Briceno, J., & De La Mata, M., “Predicting patient survival after liver transplantation using evolutionary multi-objective artificial neural networks”, Artificial intelligence in medicine, 58(1), pp.37-49, 2011.
[12] Dean, J. A., Wong, K. H., Welsh, L. C., Jones, A. B., Schick, U., Newbold, K. L., ... & Gulliford, S. L., “Normal tissue complication probability (NTCP) modelling using spatial dose metrics and machine learning methods for severe acute oral mucositis resulting from head and neck radiotherapy”, Radiotherapy and Oncology, 120(1), pp.21-27, 2016.
[13] Deng, Y., Groll, M. J., & Denecke, K., “Rule-based Cervical Spine Defect Classification Using Medical Narratives”, Studies in health technology and informatics, 216, pp.1038-1038, 2015.
[14] Faria, B. M., Gonçalves, J., Reis, L. P., & Rocha, Á., “A clinical support system based on quality of life estimation”, Journal of medical systems, 39(10), pp.114, 2015.
[15] Gaebel, J., Kolter, T., Arlt, F., & Denecke, K., “Extraction Of Adverse Events From Clinical Documents To Support Decision Making Using Semantic Preprocessing”, Studies in health technology and informatics, 216, pp.1030-1036, 2015.
[16] Goodman, K. E., Lessler, J., Cosgrove, S. E., Harris, A. D., Lautenbach, E., Han, J. H., & Tamma, P. D., “A clinical decision tree to predict whether a bacteremic patient is infected with an extended-spectrum β-Lactamase–producing organism”, Clinical Infectious Diseases, 63(7), pp.896-903, 2016.
[17] Guerrero, J. M., Martínez-Tomás, R., Rincón, M., & Peraita, H., “Diagnosis of Cognitive Impairment Compatible with Early Diagnosis of Alzheimer’s Disease”, Methods of Information in Medicine, 55(01), pp.42-49, 2016.
[18] Ichikawa, D., Saito, T., Ujita, W., & Oyama, H., ”How can machine-learning methods assist in virtual screening for hyperuricemia? A healthcare machine-learning approach”, Journal of biomedical informatics, 64, pp.20-24, 2016.
[19] Lee, G., Gurm, H. S., & Syed, Z., “Predicting complications of percutaneous coronary intervention using a novel support vector method”, Journal of the American Medical Informatics Association, 20(4), pp.778-786, 2013.
[20] Liu, X., Lu, R., Ma, J., Chen, L., & Qin, B., “Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification”, IEEE journal of biomedical and health informatics, 20(2), pp.655-668, 2016.
[21] Nahato, K. B., Harichandran, K. N., & Arputharaj, K., “Knowledge mining from clinical datasets using rough sets and backpropagation neural network”, Computational and mathematical methods in medicine, 2015.
[22] Ochab, M., & Wajs, W., “Expert system supporting an early prediction of the bronchopulmonary dysplasia”, Computers in biology and medicine, 69, pp.236-244, 2016.
[23] Ozden, F. O., Ozgonenel, O., Ozden, B., & Aydogdu, A., “Diagnosis of periodontal diseases using different classification algorithms: a preliminary study”, Nigerian journal of clinical practice, 18(3), pp.416-421, 2015.
[24] Parodi, S., Filiberti, R., Marroni, P., Libener, R., Ivaldi, G. P., Mussap, M., ... & Muselli, M., “Differential diagnosis of pleural mesothelioma using Logic Learning Machine”, BMC bioinformatics, 16(9), S3, 2015.
[25] Prilutsky, D., Rogachev, B., Marks, R. S., Lobel, L., & Last, M., “Classification of infectious diseases based on chemiluminescent signatures of phagocytes in whole blood”, Artificial intelligence in medicine, 52(3), pp.153-163, 2011.
[26] Rahulamathavan, Y., Veluru, S., Phan, R. C. W., Chambers, J. A., & Rajarajan, M., “Privacy-preserving clinical decision support system using gaussian kernel-based classification”, IEEE journal of biomedical and health informatics, 18(1), pp.56-66, 2014.
[27] Ramezankhani, A., Pournik, O., Shahrabi, J., Khalili, D., Azizi, F., & Hadaegh, F., “Applying decision tree for identification of a low risk population for type 2 diabetes. Tehran Lipid and Glucose Study”, Diabetes research and clinical practice, 105(3), pp.391-398, 2014.
[28] Ruiz-Fernandez, D., Torra, A. M., Soriano-Payá, A., Marin-Alonso, O., & Palencia, E. T., “Aid decision algorithms to estimate the risk in congenital heart surgery”, Computer methods and programs in biomedicine, 126, pp.118-127, 2016.
[29] Santos, R. S., Malheiros, S. M., Cavalheiro, S., & De Oliveira, J. P., “A data mining system for providing analytical information on brain tumors to public health decision makers”, Computer methods and programs in biomedicine, 109(3), pp.269-282, 2013.
[30] Settouti, N., Chikh, M. A., & Saidi, M., “Generating fuzzy rules for constructing interpretable classifier of diabetes disease”, Australasian physical & engineering sciences in medicine, 35(3), pp.257-270, 2012.
[31] Shahhoseini, R., Ghazvini, A., Esmaeilpour, M., Pourtaghi, G., & Tofighi, S., “Presentation of a model-based data mining to predict lung cancer”, Journal of research in health sciences, 15(3), pp.189-195, 2015.
[32] Somu, N., Raman, M. G., Kirthivasan, K., & Sriram, V. S., “Hypergraph based feature selection technique for medical diagnosis”, Journal of medical systems, 40(11), pp.239, 2016.
[33] Tang, H., Poynton, M. R., Hurdle, J. F., Baird, B. C., Koford, J. K., & Goldfarb-Rumyantzev, A. S., “Predicting three-year kidney graft survival in recipients with systemic lupus erythematosus”, ASAIO Journal, 57(4), pp.300-309, 2011.
[34] Taylor, R. A., Pare, J. R., Venkatesh, A. K., Mowafi, H., Melnick, E. R., Fleischman, W., & Hall, M. K., “Prediction of In‐hospital Mortality in Emergency Department Patients with Sepsis: A Local Big Data–Driven, Machine Learning Approach”, Academic emergency medicine, 23(3), pp.269-278, 2016.
[35] Tuti, T., Agweyu, A., Mwaniki, P., Peek, N., & English, M., “An exploration of mortality risk factors in non-severe pneumonia in children using clinical data from Kenya”, BMC medicine, 15(1), pp.201-210, 2017.
[36] Valdes, G., Solberg, T. D., Heskel, M., Ungar, L., & Simone II, C. B., “Using machine learning to predict radiation pneumonitis in patients with stage I non-small cell lung cancer treated with stereotactic body radiation therapy”, Physics in Medicine & Biology, 61(16), pp.6105-6112, 2016.
[37] Wang, Z., Wen, X., Lu, Y., Yao, Y., & Zhao, H., “Exploiting machine learning for predicting skeletal-related events in cancer patients with bone metastases”, Oncotarget, 7(11), pp.12612-12620, 2016.
[38] Weakley, A., Williams, J. A., Schmitter-Edgecombe, M., & Cook, D. J., “Neuropsychological test selection for cognitive impairment classification: A machine learning approach”, Journal of clinical and experimental neuropsychology, 37(9), pp.899-916, 2015.
[39] Wu, J. L., Tseng, H. S., Yang, L. H., Wu, H. K., Kuo, S. J., Chen, S. T., & Chen, D. R., “Prediction of axillary lymph node metastases in breast cancer patients based on pathologic information of the primary tumor”, Medical science monitor: international medical journal of experimental and clinical research, 20, pp.577-585, 2014.
[40] Zhu, K., Lou, Z., Zhou, J., Ballester, N., Kong, N., & Parikh, P., “Predicting 30-day Hospital Readmission with Publicly Available Administrative Database”, Methods of information in medicine, 54(06), pp.560-567, 2015.
[41] O.A. Mohamed Jafar, "A Study of Different Similarity Measures on the Performance of Fuzzy Clustering", International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.168-173, 2018.
[42] N. Radha and S. Ramya , "Performance Analysis of Machine Learning Algorithms for Predicting Chronic Kidney Disease", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.72-76, 2015.
[43] Pier Luca Lanzi, “Machine Learning and Data Mining”,Technology, Education, 2007.
Citation
K. Jeberson, M. Kumar, R. Yadav, "Machine-learning Techniques for Clinical Decision-making and Prediction: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.126-133, 2018.
Spectrum Sensing Under Different Fading Channels Using Energy Detection Technique
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.134-138, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.134138
Abstract
In this wireless era there is an exponential increase in wireless devices but the spectrum availability for these devices has become very less. Some additional spectrum band for these devices is required to make communication possible. To clear this spectrum demand the cognitive user access the unused licensed frequency band, when the band is free. The cognitive users may utilize unused channel till the band is occupied by primary user. In this paper, A MATLAB based simulation is carried out to appraise the detection performances of cognitive radio .The spectrum sensing in non fading Additive White Gaussian Noise (AWGN) environment and different fading scenarios such as Rayleigh, , Rican, Log normal shadowing Weibull and Hyot fading environment using energy detection technique are carried out. The performance analysis of energy detector designed for Average Signal-to-Noise Ratio (SNR) and different fading parameters are analyzed in provisions of Probability of missed detection (Pm) and Probability of false alarm (Pf).The spectrum sensing is analyzed by comparing the performances of various wireless fading channels.
Key-Words / Index Term
Spectrum Sensing, Energy detection Wireless Fading channels, Receiver operating curve
References
[1] Federal Communications Commission, “Spectrum policy task force report, (ET Docket No. 02-135),” Nov. 2002. [Online]. Available: hraunfoss. fcc.gov/edocspublic/attachmatch/DOC-228542A1.pdf.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Select. Areas Communication, vol. 23, pp. 201-220, Feb. 2005.
[3] Mahmood A. Abdulsattar and Zahir A. Hussein, “Energy detection technique for spectrum sensing in cognitive radio”: A survey, in International journal of computer networks & communications (IJCNC) vol.4, no.5, September 2012.
[4] S D. Cabric, S. M. Mishra, and R. W. Brodersen, “Implementation issues in spectrum sensing for cognitive radios,” in Proc. of Asilomar Conf. on Signals, Systems, and Computers, Nov. 7-10, 2004, vol. 1, pp. 772–776.
[5] F. F. Digham, M.-S. Alouini and M. K. Simon, “On the energy detection of unknown signals over fading channels,” in Proc. of IEEE International Conference on Communications (ICC’03), pp. 3575– 3579, May 2003.
[6] H. Urkowitz, “Energy detection of unknown deterministic signals,” Proceedings of IEEE, vol. 55, pp. 523–231, April 1967.
[7] C.E. Shannon, “Communication in the presence of noise,” proc. IRE, vol. 37, pp. 10-21, January 1949.
[8] A. Ghasemi and E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” in Proc. of 1st IEEE Symp. New Frontiers in Dynamic Spectrum Access Networks, Baltimore, USA, Nov. 8-11, 2005, pp. 131-136.
[9] Jiaqi Duan and Yong Li, “Performance analysis of cooperative spectrum sensing in different fading channels,” in Proc. IEEE Interantional conference on Computer Engineering and Technology (ICCET’10), pp.v3-64-v3-68, June 2010.
[10] S. Nallagonda, S. Suraparaju, S. D. Roy, and S. Kundu, “Performance of energy detection based spectrum sensing in fading channels,” in Proceedings of the 2nd International Conference on Computer and Communication Technology (ICCCT ’11), pp. 575–580, Allahabad, India, September 2011.
Citation
R. Harikrishnan, V. Padmathilgam, "Spectrum Sensing Under Different Fading Channels Using Energy Detection Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.134-138, 2018.
Behaviour Analysis of DDoS Attack and Its Detection
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.139-144, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.139144
Abstract
In recent times the internet is growing exponentially. Many important services and records are available on different websites of the government and as well as of private sectors. A valid user becomes irritated when websites become unavailable when needed. Human being accesses only those web pages in which they are interested in. Some flash crowd occurs on specific time or events. Attacker’s main aim is not to browse specific web pages of valid users’ interest but to fail the web server so that authentic users could not avail web services. The DDoS attack becomes difficult to detect when this attack imitates the behaviour of irritating and non-professional users. There is need to analyze the behaviour of sophisticated DDoS attacks using advanced tools of DDoS attack at Layer 7. This paper analyzes tool of DDoS attacks using their log records and checks behaviour of DDoS attacks and stores its pattern in ODAM (One Dimensional Access Matrix). It also proposes an efficient algorithm to detect DDoS attacks at the application layer.
Key-Words / Index Term
DDOS (Distributed Denial of Service Attack), ODAM (One Dimensional Access Matrix), Layer 7, flash crowd, application layer
References
[1] R. Kroszner and J. Munn, “Federal Financial Institutions Examination Council” Distrib. denial Serv., no. 703, pp. 2–4, 2008.
[2] S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks” IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 26–39, 2009.
[3] J. Yu, Z. Li, H. Chen, and X. Chen, “A detection and offense mechanism to defend against application layer DDoS attacks,” 3rd Int. Conf. Netw. Serv. 2007, 2007.
[4] J. Yu, C. Fang, L. Lu, and Z. Li, “Mitigating application layer distributed denial of service attacks via effective trust management,” IET Commun., vol. 4, no. 16, pp. 1952–1962, 2010.
[5] C. Ye, K. Zheng, and C. She, “Application layer DDoS detection using clustering analysis” Proc. 2012 2nd Int. Conf. Comput. Sci. Netw. Technol., pp. 1038–1041, 2012.
[6] C. Ye and K. Zheng, “Detection of application layer distributed denial of service,” Proc. 2011 Int. Conf. Comput. Sci. Netw. Technol., pp. 310–314, 2011.
[7] B. Meng, W. Andi, X. Jian, “DDOS Attack Detection System Based on Analysis of Users` Behaviours for Application Layer”, Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), 2017 IEEE International Conference on, pp. 596-599, July 2017.
[8] M. M. Najafabadi, T. M. Khoshgoftaar, C. Calvert, C. Kemp ,“User Behaviour Anomaly Detection for Application Layer DDoS Attacks” , IEEE International Conference on Information Reuse and Integration (IRI), pp. 154-161, 2017.
[9] Mahadev, V. Kumar, K. Kumar,“Classification of DDoS Attack Tool and Its Handling Techniques and Strategy at Application Layer", IEEE International Conference on Advances in Computing Communication and Automation (ICACCA), Oct 2016.
Citation
Mahadev, Vinod Kumar, "Behaviour Analysis of DDoS Attack and Its Detection," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.139-144, 2018.