A Study and Analysis on Feature Extraction in Content-Based Image Retrieval
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.305-307, Jun-2017
Abstract
The digital image data is rapidly growing in quantity and heterogeneity. The existing information retrieval techniques does not meet the user’s demand, so there is need to develop an efficient system for content based image retrieval. Content Based Image Retrieval (CBIR) is a technique which uses visual features of image such as color, shape, texture, etc... to search user required image from large annotated image database according to user`s requests, in the form of a query image. In this paper we present a study on some technical aspects of current content-based image retrieval systems and feature extraction. Features such as color, shape and texture are analysed to develop a high retrieval accurate cbir system.
Key-Words / Index Term
CBIR, visual database, texture, feature extraction, color correlogram
References
[1] D. A. Kumar and J. Esther, “Comparative Study on CBIR based by Color Histogram, Gabor and Wavelet Transform”, Int’l Journal of Computer Applications (0975 – 8887), vol. 17, no. 3, (2011) March, pp. 37.
[2] Khan,W., Kumar,S., Gupta,N., Khan,N., A Proposed Method for Image Retrieval using Histogram values and Texture Descriptor Analysis, IJSCE, ISSN: 231-2307, Volume-I Issue-II,( May 2011).
[3] F. Long, H. J. Zhang and D. D. Feng, “Fundamentals of Content-based Image Retrieval, Multimedia Information Retrieval and Management”, D. Feng Eds, Springer, (2003).
[4] L. Haldurai and V. Vinodhini, "Parallel Indexing on Color and Texture Feature Extraction using R-Tree for Content Based Image Retrieval", International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.11-15, 2015.
[5] L. Zheng, S. Wang, and Q. Tian, “Lp-norm IDF for scalable image ns. Image Process., vol. 23, no. 8, pp. 3604–3617, Aug. 2014
Citation
Nadira T., Rehna K., Fepslin Athish Mon, "A Study and Analysis on Feature Extraction in Content-Based Image Retrieval," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.305-307, 2017.
Integration of Different Wireless Technology and Methodology for Future Generation of Wireless Communication
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.308-313, Jun-2017
Abstract
There are many technologies and methodologies present to support existing wireless mobile communication. We propose a concept to integrate best methodologies and technologies that suits the future generation in terms of high system, spectral efficiency, and energy efficiency etc. Our approach to achieve requirement of next or upcoming generation 1stly we analyze best technology and methodologies (like multi input multi output (MIMO), orthogonal frequency division multiple access (OFDMA), Direct-device to device (D2D) communication, MIMO, Mm wave, Spatial modulation, Radio access technology etc.) of each generation and then check the possibility of integration of technologies and methodologies. And design architecture with integrated technologies and methodologies with respect to future generation. So, we check the possibility and try to integrate various technologies and methodologies of different generation to fulfill the requirement of next generation.
Key-Words / Index Term
Cognitive radio, SDR, Spectrum Secrecy, Spectrum Efficiency, MIMO, Mm Wave, D2D
References
[1] Deivanai Devi S, Rathi S, Thanushkodi K, November, Challenges Faced For Developing 4th Generation Mobile Communication System, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5
[2] Dr. Anwar M. Mousa, September 2012, Prospective of Fifth Generation Mobile Communications, International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3.
[3] Frederick W Vook, Amitava Ghosh, Timothy A. Thomas, amitava.ghosh, 2014, MIMO and Beam forming Solutions for 5G Technology, IEEE.
[4] Shilpa Talwar, Debabani Choudhury, Konstantinos Dimou, Ehsan Aryafar, Boyd Bangerter, Kenneth Stewart Intel Corporation, Santa Clara, CA, 2014, Enabling Technologies and Architectures for 5G Wireless, IEEE.
[5] Prof. D. U. Adokar1, Priti J. Rajput, October 2012, Wireless Evolution with 4G Technologies, Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol.1, Issue 4.
[6] www.3gpp.org.
[7] F. Rusek, D. Persson, B. K. Lau et al., 2013, Scaling up MIMO: opportunities and challenges with very large arrays, IEEE Signal Processing Magazine, vol.30, no.1, pp.40–60.
[8] Vikram Chandrasekhar and Jeffrey G. Andrews, September 2008, Femto cell Networks: A Survey, IEEE Communications Magazine.
[9] Mansour Zuair, 31st May 2013, Development of an Access Mechanism For Femto Cell Networks , Journal of Theoretical and Applied Information Technology, Vol. 51 No.3 .
[10] Dieter Ederle , LTE vs. Wi-MAX 4th generation telecommunication networks,
[11] Halil Saygili, September 2013, A comparison of spatial modulation and spatial multiplexing systems in multipath fading channels.
[12] Marja Matinmikko (editor), Marko Höyhtyä, Miia Mustonen, Heli Sarvanko, Atso Hekkala, Marcos Katz, Aarne Mämmelä, Markku Kiviranta, Aino Kautio, Cognitive radio: An intelligent wireless communication system, Research Report VTT-R-02219-08
[13] Singh S, Mushtaq G, Tiwari NK, Singh AP (2015) Cognitive Radio With Software Defined Radio and Mimo for Future Generation Wireless Communication. J Comput Sci Syst Biol 8:166-169. doi:10.4172/jcsb.1000184.
[14] Goutam Ghosh1 , Prasun Das2 and Subhajit Chatterjee3, March 2014, Cognitive Radio And Dynamic Spectrum Access – A Study, International Journal of Next-Generation Networks (IJNGN) Vol.6, No.1.
[15] Zengmao Chen1, Cheng-Xiang Wang1, Xuemin Hong1, John Thompson2, 2011, Interferance Mitigation for Cognitive Radio MIMO Systems Based on Practical Precoding, IEEE Transaction on Wireless Communications, Vol. XX, No. Y, Month.
[16] F. Gao, R. Zhang, Y.C. Liang, and X. Wang, Apr. 2010, Design of learning-based MIMO cognitive radio systems, IEEE Trans. Veh.Technol., vol. 59, no. 4, pp. 1707–1720.
[17] Shashank Singh, Prashant Kumar Tripathi, Gowher Mushtaq, Neeraj Kumar Tiwari, April 2015, Integration of Existing Wireless Communication Technologies in Respect to Future Generation, MAIOJET, ISSN:2348 – 3326.
Citation
Shashank Singh, Himanshu Kumar Shukla, Rohit Sharma , "Integration of Different Wireless Technology and Methodology for Future Generation of Wireless Communication," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.308-313, 2017.
An Enhancement of Bubble Sorting Algorithm
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.314-316, Jun-2017
Abstract
Sorting is an important technique of data structure which finds its place in many real-life applications. There are various sorting algorithms are in existence till date. In this paper, we have tried to improve upon execution time of the Bubble Sort algorithm by implementing the algorithm using an enhancement of it. An extensive analysis has been done by us on the new algorithm and the algorithm has been compared with the traditional method of Bubble Sort. Observations have been obtained on comparing this new approach with the existing approaches of Bubble Sort. The new proposed approach was tested for Average Case analysis, Best Case analysis and Worst case analysis. It has been analysed that the new approach has given very good results on Average Case and Worst Case analysis. The new approach was tested on random data of various ranges from small to large. It has been observed that the new approach has given efficient results in terms of execution time. Hence, we have reached to the conclusion through the experimental observations that the new algorithm given in this paper is better than the traditional Bubble Sort.
Key-Words / Index Term
Sorting, Bubble sort
References
[1] Kruse R., and Ryba A., Data Structures and Program Design in C++, Prentice Hall, 1999.
[2]Boolos, George & Jeffrey, Richard (1974, 1980, 1989, 1999), Computability and Logic (4th ed.), Cambridge University Press, London, ISBN 0-521-20402-X: cf. Chapter 3 Turing machines where they discuss "certain enumerable sets not effectively (mechanically) enumerable".
[3] Knuth, D. The Art of Computer Programming, Vol. 3: Sorting and Searching, Third edition. Addison- Wesley, 1997. ISBN 0-201-89685-0. pp. 106-110 of section.
[4] Cormen T., Leiserson C., Rivest R., and Stein C., Introduction to Algorithms, McGraw Hill,2001
[5] Owen Astrachan Bubble Sort: An Archaeological Algorithmic Analysis, SIGCSE ’03, February 19-23, Reno, Nevada, USA. Copyright 2003 ACM 1-58113-648-X/03/0002.
[6] Cooper, D. Oh My! Modula-2! W.W. Norton, 1990.
[7] Aho A., Hopcroft J., and Ullman J., The Design and Analysis of Computer Algorithms, Addison Wesley, 1974.
[8] Astrachanm O., Bubble Sort: An Archaeological Algorithmic Analysis, Duk University, 2003.
[9] Jehad Alnihoud and Rami Mansi, “An Enhancement of Major Sorting Algorithms,” The International Arab Journal of Information Technology, Vol.7, No. 1, January 2010.
[10] Knuth, D. The Art of Computer Programming: Sorting and Searching, 2 ed., vol. 3. Addison-Wesley, 1998.
[11] Iverson, K. A Programming Language. John Wiley,1962.
[12] http://linux.wku.edu/~lamonml/algor/sort/bubble.html
Citation
Harsh N. Nankani, Mukesh Bhandari, "An Enhancement of Bubble Sorting Algorithm," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.314-316, 2017.
PAPR in OFDM Systems Different Techniques
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.317-321, Jun-2017
Abstract
A non-constant envelope with high peaks is a main disadvantage of Orthogonal Frequency Division Multiplexing (OFDM). These high peaks produce signal excursions into non-linear region of operation of the Power Amplifier (PA) at the transmitter, thereby leading to non-linear distortions and spectral spreading. Many Peak to Average Power Ration (PAPR) reductions methods have been proposed in the literature. The objective of this review is to give a clear understanding of different techniques to reduce PAPR of the signal.
Key-Words / Index Term
OFDM,PAPR,PA
References
[1]. Md. Mahmudul Hasan et.al, “An Overview of PAPR Reduction Techniques in OFDM Systems”, International Journal of Computer Applications, vol. 60, no. 15,pp. 33-37, dec. 2012.
[2]. Aparna P. More et.al , “ The reduction of PAPR in OFDM system using clipping and SLM method”, IEEE , vol. 1, year 2011.
[3]. Brijesh Ahirwar and Vishal Pasi, "A Survey Paper on Inter-carrier Interference Reduction Techniques in OFDM Systems", International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.26-29, 2015.
[4]. Komal Gupta et.al , “PAPR reduction of OFDM using a new phase sequence in SLM technique”,IEEE, vol. 2, no. 2 , pp. 125-129, year 2013.
[5]. Gagandeep Kaur et.al, “Compare SLM (selective mapping) and PTS (partial transmit) technique for PAPR reduction of an MC-CDMA (multi-carrier complex division multiple access)”, IJERA, vol. 2, no. 4, pp. 779-784, jul-aug 2012.
[6]. Arpit Maheshwari, Puneet Khanna and Neelu Trivedi, "PAPR Reduction in OFDM System by Using Discrete Cosine Transform and µ-law Companding", International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.22-25, 2015.
[7]. Md. Ibhrahim Abdullah et.al, “Comparative Study of PAPR Reduction Techniques in OFDM”,ARPN journal of system and software, vol. 1, no. 8 ,pp 263-269, nov 2011.
[8]. Komal Gupta et. al. , “PAPR reduction of OFDM using a new phase sequence in SLM technique”, IJAEEE, vol-2, issue-2 , pp.125-109, 2013.
[9]. Filbert H. Juwano et.al , “ PAPR reduction using Huffman coding combined with clipping and filtering for OFDM transmitter to mitigate PAPR (peakto-average power ratio) in OFDM”, (CITISIA 2009), vol. 8 , PP. 344-347, year 2009.
[10]. Chavvi Sharma et.al , “ A modified iterative amplitude clipping and filtering technique for PAPR reduction in OFDM system”, IEEE , vol. 2 , pp. 365-367, year 2011
Citation
Shaik.Rasool Saheb, K.Krishna Murthy, "PAPR in OFDM Systems Different Techniques," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.317-321, 2017.
A Study on Neurological Diseases like Alzheimer’s, Dementias, its Causes and an attempt To Develop a Rule-Based Expert System
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.322-328, Jun-2017
Abstract
Dementia is a general term for a gathering of brain disorders. Alzheimer`s disease is the most widely recognized sort of dementia, representing 60 to 80 percent of cases. This fact sheet quickly talks about Alzheimer`s and some different dementias. A wide range of dementia includes mental decrease that: Influences more than one of the following four core mental abilities Recent memory, Language, Visuospatial function, Executive capacity. The paper likewise introduces a Rule-based Expert System for Memory Loss Disease with the assistance of principles and truths. It is an endeavor to concentrate on some of critical illnesses identified with memory loss like Alzheimer`s disease, Parkinson`s disease, Huntington`s disease and dementia which are among the most widely recognized sorts of memory loss diseases. This Expert System will help the patients to get the required guidance about the diverse issue assault to them because of their nervous system disorders. The expert rules were developed on the symptoms of each type of neurological disease, and they were presented using decision tree and inferred using forward-chaining method. The knowledge base comprises of data about the memory loss and all the diseases related to it identified with it which is gathered from books and specialists (area specialists) about neurology and its disorders.
Key-Words / Index Term
Rule-based Expert System, Alzheimer’s, Dementia
References
[1]. [ Chaitali Suratkar and et all,2011] Chaitali Suratkar and V, Gaikwad, “A Fuzzy Expert System for Cancer Diagnosis”, International Journal of Advanced Research in Computer Science, vol2,No.6, December 2011.
[2]. [Durkin, 1994] Durkin, Application of artificial neural networks in the diagnosis of urological dysfunctions”, Expert Systems with Applications, Article in press,1994.
[3]. [Folstein M and et al,1975] Folstein M, Folstein S, McHugh S, Mini Mental State:a practice method for grading the cognitive status of patients for the clinician. Journal of Psychiatric Research,12:189-198, 1975.
[4]. [Goethe and Bronzino,1995] J W Goethe and J D Bronzino, “An expert system for monitoring psychiatric treatment”, IEEE Engineering in Medicine and Biology, Nov-Dec 1995.
[5]. [Klaus-Dieter Althoff, 2012] Klaus-Dieter Althoff, “Case- Based Reasoning and Expert Systems”, German Research Center for Artificial Intelligence (DFKI), 2012.
[6]. [L S Goggin, et al.,2007] L S Goggin, Robert H Eikelboom, and Marcus D Atlas, “Clinical decision support systems and computer aided diagnosis in otology. Otolaryngology-Head and Neck Surgery, 136:S21,S26, 2007.
[7]. [M Sasikumar, S Ramani, and et all,2007], M Sasikumar, S Ramani,S Muthu Raman, KSR Anjaneyulu, R Chandrasekar. “A Practical Introduction to Rule Based Expert Systems.” New Delhi : Narosa Publishers, 2007. p. 294 .
[8]. [Maitri Patel, Atul Patel and et all, 2013]Maitri Patel,Atul Patel,Paresh Virparia, “Rule Based Expert System for Viral Infection Diagnosis”, International Journal of Advanced Research in Computer Science and Software
Engineering,Volume 3, Issue 5, May 2013.
[9]. [Remzi, Waldert and Djavan,2005] M Remzi, M Waldert,and B Djavan, “Preoperative nomograms and artificial neural networks (anns) for identification of surgical candidates”, EAU Update Series, 3(2), June 2005.
[10]. 2005 – 2/2010 Health Information Translations Unless otherwise stated, user may print or download information from www.healthinfotranslations.org for personal, non-commercial use only.
[11] Komal R. Hole, Vijay. S. Gulhane. Sipna College of Engineering & research, Amravati. IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 3, May 2014. www.ijiset.com ISSN 2348 - 7968
Citation
T.M. Girish1, V.K. Sing, D.K. Sreekantha, "A Study on Neurological Diseases like Alzheimer’s, Dementias, its Causes and an attempt To Develop a Rule-Based Expert System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.322-328, 2017.
Task Scheduling and Resource Optimization in Cloud Computing Using Deadline-Aware Particle Swarm Technique: A Review
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.329-332, Jun-2017
Abstract
Cloud computing is defined as that type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing is used to achieve coherence and economy of scale over a network. Basically, cloud computing is a general term for the delivery of hosted services over the internet. Various characteristics which comes under cloud computing includes its location independent, multi-tenancy, its reliability and security, and its on-demand self service etc. Cloud Computing is spreading through IT world with innovative start-ups. Companies in the financial sector are also adopting cloud computing for specific workloads. Various strategies are used for optimization in cloud computing in which particle swarm optimization is one of them. It is used to achieve task scheduling algorithm. To achieve better results and performance, we used Particle Swarm Optimization.
Key-Words / Index Term
Cloud computing, architecture, scheduling, computing in IT sector, Particle Swarm Optimization
References
[1] Dr. M. Sridhar and Dr. G. Rama Mohan Babu, R.V.R & J.C College of
Engineering, Guntur, INDIA, 2015 IEEE International Advance Computing Conference (IACC).
[2] Zhi-hui Zhan, Jun Zhang, Yun Li, and Henry Chung, “Adaptive particle swarm optimization”, IEEE Transactions on System, Man, and Cybernetics, Vol. 39, No. 6, pp. 1362-1381, 2006
[3] Xingquan Zuo, Member, IEEE, Guoxiang Zhang, and Wei Tan, Member, IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 11, NO. 2, APRIL 2014.
[4] Nuttapong Netjinda, Booncharoen Sirinaovakul, Tiranee Achalakul Departmet of Computer Engineering King Mongkut’s University of Technology Thonburi Bangkok, Thailand, Thailand Research Fund through the Royal Golden Jubilee Ph.D. Program (grant no. PHD/0031/2553).
[5] BU Yanping1, 2 ZHOU Wei3 YU Jinshou1 1.Research Institute of Automation, East China University of Science and Technology, Shanghai 200237 China; 2. School of Technology, Shanghai Jiaotong University, Shanghai 201101 China; 3. School of Business, East China University of Science and Technology, Shanghai 2002 37 China, 2008 International Symposium on Computer Science and Computational Technology.
[6] A. Salman, “Particle swarm optimization for task assignment Problem”, Microprocessors and Microsystems, Vol. 26, No.8, pp.363–371, 2009.
[7] Azadi Khalili and Seyed Morteza, School of Electrical and Computer Engineering Kashan University, Babamir, 2015 23rd Iranian Conference on Electrical Engineering (ICEE).
[8] L. Zhang, Y.H. Chen, R.Y Sun, S. Jing, and B. Yang, “A task scheduling algorithm based on PSO for Grid Computing", International Journal of Computational Intelligence Research, pp.37-43, 2008.
[9] Lizheng Guo, Shuguang Zhao, Shigen Shen, and Changyuan Jiang, “Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm”, Journal of Networks, Vol.7, No.3, 2012.
[10] ChienHung Chen, JennWei Lin, and SyYen Kuo, Fellow, IEEE.
[11] Zahraa Tarek, Magdy Zakria and Fatma A. Omara, “PSO Optimization algorithm for Task Scheduling on The Cloud Computing Environment”, international Journal of Computers and Technology, Vol. 13, No. 9, 2014.
[12] Himani, Global Institute of management & emerging technology, Amritsar, India and Harmanbir Singh Sidhu, Chandigarh Group Of Colleges, India, 2015 Second International Conference on Advances in Computing and Communication Engineering.
Citation
Shruti, Meenakshi Sharma, "Task Scheduling and Resource Optimization in Cloud Computing Using Deadline-Aware Particle Swarm Technique: A Review," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.329-332, 2017.
Software Quality Modeling by Process
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.333-334, Jun-2017
Abstract
Our world runs on software. Every business depends on it, every mobile phone uses it, and even every new car relies on code. Without software, modern civilization would fall apart. Given this reality, the quality of that software really matters. Because it’s so widely used and so important, low-quality software just isn’t acceptable. But what exactly is software quality? It’s not an easy question to answer, since the concept means different things to different people. One useful way to think about the topic is to divide software quality into three aspects: functional quality, structural quality, and process quality. Doing this helps us see the big picture, and it also helps clarify the trade-offs that need to be made among competing goals.
Key-Words / Index Term
Quality, Methodologies, six sigma, innovation
References
[1] Humphrey, W.S. and M. Kellner, Software Process Modeling: Principles of Entity Process Models, Proc. 11th. Intern. Conf. Software Engineering, IEEE Computer Society, Pittsburgh, PA,vol.30, n0. 12, pp.331-342, 1989 june
[2]Lehman, M. M., Process Models, Process Programming, Programming Support, Proc. 9th. Intern. Conf. Software Engineering, PA,vol.20, n0. 15, pp 14-16, IEEE Computer Society, 1987 Dec.
[3]Mi, P. and W. Scacchi, A Knowledge Base Environment for Modeling and Simulating Software Engineering Processes, IEEE Trans. Knowledge and Data Engineering, PA,vol.2, n0. 3 , pp, 283-294, 1990 July.
[4]Mockus, A., R.T. Fielding, and J. Herbsleb, A Case Study of Open Software Development: The Apache Server, Proc. 22nd. International Conf. Software Engineering, Limerick, IR, PA,vol.50, n0. 12, pp 263-272, 2000 March.
[5]R. Radice, N.K. Roth, A.C. O`Hara and W.A. Ciarfella, A Programming Process Architecture. IBM Systems Journal, PA,vol.24, n0. 2, pp , 79-90,1985.Dec.
Citation
N. Rajasekhar Reddy, M. Vinaya Babu, "Software Quality Modeling by Process," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.333-334, 2017.
Intelligent Routing Algorithms Assess Mobile Network
Review Paper | Journal Paper
Vol.5 , Issue.6 , pp.335-339, Jun-2017
Abstract
The use of wireless networks is widely increasing. One of these networks, ad hoc mobile networks (Mobile ad hoc networks) is. Mobile Ad hoc Network known as network short-lived. Nature-inspired algorithms (swarm intelligence) such as ant nest optimization algorithms and genetic algorithms to solve the routing problem in recent years have introduced mobile-specific networks.
Key-Words / Index Term
Mobile Ad hoc networks, genetic algorithms, algorithms ant nest
References
[1] C.-C. Chiang, Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel, Proc. IEEE SICON’97, April 1997, pp.197-211.
[2] K. Subramanian, R. Gnanakumaran , "Analysis of Power Complexity in Existing Algorithms Against Ad-Hoc On demand Distance Vector Routing Protocol (AODV)", International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.36-45, 2016.
[3] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[4] Abhinav Gupta and Prabhdeep Singh, "Improving the performance of Mobile Wireless Sensor Networks using modified DBSCAN", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.6-10, 2015.
[5] Kritika Sood and Payal Kaushal, "Client Adaptive Load Balancing in DSR", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.26-28, 2013.
[6] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[7] J. Amol B.Suryawanshi, Baljit Kaur Saini, "Survey on Various Routing Protocols in Ad-hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.174-178, 2017.
[8] Pradeep Sharma, Shivlal Mewada and Aruna Bilavariya, "Group Rekeying Management Scheme for Mobile Ad-hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.5-12, 2013.
[9] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[10] Deepesh Tamrakar, Sreshtha Bhattacharya and Shitanshu Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.2, pp.1-5, 2014.
[11] R. Kachal, S. Suri, "Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.148-152, 2014.
[12] P. R. Gundalwar and Bhaskar Y. Kathane, "A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.75-78, 2016.
Citation
Mohsen Davoudi Monfared, Shadie Zeinali, "Intelligent Routing Algorithms Assess Mobile Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.335-339, 2017.