Developing of Facebook AddictionScaleforTurkishAdolescents
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.1-9, Dec-2015
Abstract
This study intends to develop a scale to determine the facebook addiction levels of adolescents. A data set obtained from 364 high school students was used in order to study the factor construct of the scale through Exploratory Factor Analysis (EFA) and it was observed with the analysis that 9 items were removed from the scale and the remaining 25 items were collected under 3 factors. Confirmatory Factor Analysis (CFA) was applied to the data set obtained from 536 students from a similar high school group in order to confirm the construct that was determined by the exploratory factor analysis and it was found that the construct revealed by EFA and thus created dimensions were statistically confirmed and that the convergence validity criteria including values like composite reliability and average variance extracted were statistically satisfactory. It was observed that the coefficients on the whole of the scale and on each factor were satisfactory. In conclusion, Cronbach's alpha internal consistency coefficients and values obtained as a result of EFA and CFA demonstrated that the scale had a reliable and valid measurement results to define the facebook addiction level.
Key-Words / Index Term
Facebook Addiction, Scale Development, Factor Analysis, Convergence Validity
References
[1] Dewson, A.,Houghton D. &Patten J.‘’Bloggingand otherSocial Media: Exploitingthe TechnologyandProtecting the Enterprise’’, New Jersey: Gower Publishing, 2008.
[2] Erkul, R.E.“SosyalMedyaAraçlarının (Web 2.0) KamuHizmetleriveUygulamalarındaKullanılabilirliği”, TürkiyeBilişimDerneği, (116), 2009, pp.96-101.
[3] Facebook. ‘’Facebook reports second quarter 2015 resulsts’’, Retrieved July 7, from http://investor.fb.com/, 2015.
[4] Retrieved August31, 2015 from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/, 2015.
[5] Özgür, H. ‘’Öğretmena day ların ın sosyal ağbağımlılığı, etkileşimkaygısıvey alnızlıkdüz eyiarasın dakii lişkinini ncelenmesi’’, International Journal of Human Sciences, 10(2),2013, pp.667-690.
[6] Ellison, N.,Steinfield, C., &Lampe, C. ‘’Spatiallyboundedonlinesocial Networks andsocialcapital: The role of Facebook’’. Proceedings of theAnnual Conference of the International CommunicationAssociation, 36,2006, pp.1–37.
[7] Viswanath, B.,Mislove, A., Cha, M., &Gummadi, K. P. ‘’On theevolution of userinteraction in Facebook’’, InProceedings ofthe 2nd ACM Workshop on Online Social Networks. New York, NY: ACM, 2009.
[8] Boyd, D.,Ellison, N. ‘’Social network sites: definition, history, andscholarship’’. J. Comput. Mediat. Commun. 13 (1),2007, pp.210–230.
[9] Koç, M., andGülyağcı, S. "Facebook Addiction Among Turkish College Students: the Role of Psychological Health, Demographic, and Usage Characteristics",Cyberpsychology, Behavior, and Social Networking. 16.4, 2013, pp.279-284
[10] Hong, F.-Y, S.-L Chiu, D.-H Huang, and H.-Y Lin. "Analysis of thePsychologicalTraits, Facebook Usage, and Facebook Addiction Model of TaiwaneseUniversityStudents", Telematicsand Informatics. 31, 4, 2014, pp.597-606
[11] Das, B. &Sahoo, J. S. ‘’Socialnetworkingsites-A criticalanalysis of itsimpact on personaland social life’’, International Journal of Business andSocialScience 2(14),2011, pp.222-228.
[12] Wilson, K.,Fornasier, S., & White, K. ‘’Psychological predictors of young adults' use of social net working sites’’, Cyber Psychology, Behavior&Social Networking, 13(2), 2010, pp.173-177.
[13] Rouis, S.,Limayem, M., &Sangari, E. ‘’Impact of Facebook usage on students’ academic achievement: Role of self-regulation and trust’’, Electronic journal of research in educational psychology, 9(3), 2011, pp.961-994.
[14] Kirschner, P.A &Karpinski, A.C. ‘’Facebook and academic performance. Computers and Human Behaviour’’, 2010, pp.1237-1245
[15] Davila J, Stroud CB, Starr LR, et al. ‘’Romantic and sexual activities, parent-adolescent stress, and depressive symptoms among early adolescent girls’’, J Adolesc.32 (4),2009, pp.909–924.
[16] Edson C. TandocJr.,PatrickFerrucci, Margaret Duffy. ‘’Facebook use, envy, anddepressionamongcollegestudents: Is facebookingdepressing?’’, Computers in Human Behavior, 4,2015, pp.139-146.
[17] Mai-Ly N. Steers, Robert E. Wickham, andLinda K. Acitelli. ‘’Seeing Everyone Else’s Highlight Reels: How Facebook Usage is Linked to Depressive Symptoms’’, Journal of Socialand Clinical Psychology, 33,2014, pp. 701-731.
[18] Sturm S. ‘’Social net working psych studies: Research shows teen Facebook users prone to depression’’, Trend Hunter. Available at: www.trendhunter.com/trends/depression-from-facebook. Accessed September 7, 2010.
[19] Young,K. ‘’Facebook Addiction Disorder?’’, The Center for Online Addiction: Bradford, PA, USA, 2009. Retrieved August 08, 2015 fromhttp://www.netaddiction.com/index.php?option=com_blog&view=comments&pid=5&Itemid=0, 2009.
[20] American Psychiatric Association. ‘’Diagnostic and Statistical Manual of Mental Disorders (5th ed.)’’, Arlington, VA: Author, 2013.
[21] Karaiskos, D. Tzavellas, E. Balta, G, &Paparrigopoulos, T. Social network addiction: A clinical disorder? EuropeanPsychiatry, 25,2010, pp.855.
[22] Griffiths, M. D. ‘’Facebook Addiction: Concerns, Criticism and Recommendations a Response ToAndreassen and Colleagues’’, 1. Psychological Reports, 110(2),2012, pp.518-520.
[23] Young, K. S. ‘’Internet addiction: Theemergence of a new clinical disorder’’,Cyber Psychology&Behavior, 1(3),1998, pp.237-244.
[24] Young, K. ‘’Addictive use of the Internet: A case that breaks the stereotype’’, Psychology of computer use: XL. Psychological Reports, 79,1996, pp.899–902.
[25] Goldberg, I. ‘’Internet addictiondisorder’’, RetrievedAugust 08, 2015 from http://www.cog.brown.edu/brochures/people/duchon/humor/Internet.addiction.html, 1996.
[26] Griffiths, M. D. ‘’Behavioral addictions: An issue for everybody?’’, Journal of Workplace Learning, 8,1996, pp.19–25.
[27] Shapira, N. A.,Lessig, M. C., Goldsmith, T. D., Szabo, S., Lazoritz, M., Gold, M. S., &Stein, D. J. ‘’Problematic Internet use: Proposed classification and diagnostic criteria’’, Depression&Anxiety, 17,2003,pp.207–216.
[28] Ko, C.-H.,Chen, C.-C., Chen, S.-H., & Yen, C.-F. ‘’Proposed diagnostic criteria of Internet addiction for adolescents’’, Journal of Nervousand Mental Disease, 193,2005,pp.728–733.
[29] Mehdizadeh, S. ‘’Self-presentation 2.0: narcissism and self-esteem on Facebook’’,Cyberpsychology, Behavior, and Social Networking, 13, 2010, pp.357-364.
[30] Andreassen, C. S.,Torsheim, T., Brunborg, G.S., &Pallesen, S. ‘’Development of Facebook addiction scale’’, Psychological reports, 110 (2),2012, pp.501-5017.
[31] Daria J. Kuss and Mark D. Griffiths.‘’Excessive online social networking: Can adolescents become addicted to Facebook?’’, Education and Health 29(4),2011, pp.68-71.
[32] Ryan, T., Chester, A., Reece, J., and Xenos, S. ‘’The uses and abuses of Facebook: A review of Facebook addiction’’, Journal of Behavioral Addictions 3, 3, 133--16. DOI=10.1556/JBA.3.2014.016, 2014
[33] Satıcı, B., Sarıcalı, M., Satıcı, S. A., &Eraslan-Capan, B. ‘’Social competence and psychological vulnerability as predictors of Facebook addiction’’, StudiaPsychologica, 56(4),2014, pp.301-308.
[34] Satıcı, S. A., &Uysal, R. ‘’Well-being and problematic Facebook use’’ Computers in Human Behavior, 2015.
[35] Günüç, S. ‘’İnternet BağımlılıkÖlçeğininGeliştirilmesiveBazıDemografikDeğişkenlerile İnternet BağımlılığıArasındakiİlişkilerinİncelenmesi’’, Yükseklisanstezi, YüzüncüYılÜniversitesiSosyalBilimlerEnstitüsü, Van, 2012.
[36] Andreassen, C. S.,Torsheim, T., Brunborg, G.S., &Pallesen, S. ‘’Development of Facebookaddictionscale’’, Psychologicalreports, 110 (2), 501-5017. DOI 10.2466/02.09.18.PR0.110.2, 2012, pp.501-517.
[37] Retrieved September 2, 2015 from http://www.who.int/maternal_child_adolescent/topics/adolescence/dev/en/
[38] Tavşancıl, E. ‘’Tutumlarınölçülmesive SPSS ileveriAnalizi’’ (3.Baskı). Ankara: Nobel Yayınları, 2006.
[39] Tezbaşaran, A.A. ‘’Likert tipi ölçekhazırlamakılavuzu’’, Mersin: 3.Sürüm E-Kitap, 2008.
[40] Kline, R. B. ‘’Principles and practice of structural equation modeling’’, (3rd ed.). New York: Guilford, 2010.
[41] Tabachnick, B. G. &Fidell, L. S. ‘’Using multivariate statistics’’ (4th ed.). Needham Heights, MA: Allyn& Bacon, 2001.
[42] Morales, G.M. ‘’Partial Least Squares (PLS) Methods: Origins, Evolution and Application to Social Science’’, E-Prints, Madrid: Universidad Complutense, 2011.
[43] Henseler, J., Ringle, C. M. veSinkovics, R.R. ‘’The Use of Partial Least Squares Path Modeling in International Marketing’’ New Challenges to International Marketing, 20, 2009, pp.277-319.
[44] Afthanorhan, W.M. ‘’A Comparison of Partial Least Square Structural Equation Modeling (PLS-SEM) and Covariance Based Structural Equation Modeling (CB-SEM) for Confirmatory Factor Analysis’’ International Journal of Engineering Science and Innovative Technology, 2(5),2013,pp.198-205.
[45] Fornell, C. veLarcker, D.F. ‘’Evaluating Structural Equation Models with Unobservable Variables and Measurement Error’’, Journal of Marketing Research, 18(1), 1981, pp.39-50.
[46] Tabachnick, B. G. &Fidell, L. S. ‘’Using multivariate statistics’’, (5th ed.). Boston: Pearson/ Allyn& Bacon, 2007.
[47] Kline, P. ‘’An Easy Guide to Factor Analysis’’, New York, 1994. Henson, R. K.; Roberts, J. Kyle. “Use of Exploratory Factor Analysis in Published Research”, Educational and Psychological Measurement, Volume 66/3, 2006.
[48] Hair, J. F., Black, W. C., Balin, B. j., &Anderson, R. E. Multivariate data analysis: Maxwell Macmillan International Editions, 2010.
[49] Bentler, P. M. ‘’Comparative fit indexes in structural models’’, Psychological Bulletin, 107, 1990, pp.238-246.
[50] Ghadi, İ., Alwi, N. H., Bakar, K. A. veTalib, O. ‘’Construct Validity Examination of Critical Thinking Dispositions for Undergraduate Students in University Putra Malaysia’’, Higher Education Studies, 2 (2),2012, pp.138-145.
[51] Chau PYK. ‘’Reexamining a model for evaluating information center success using a structural equation modeling approach’’, Decision Sciences, 28,1997, pp.309–334.
[52] Bollen, K. A., & Long, J. S. ‘’Testing structural equation models’’, Newbury Park, CA: Sage, 1993.
[53] Hair, J. F.,Anderson, R. E., Babin, J. F. & Black, W. ‘’Multivariate Data Analysis’’, (7th ed.). New York: Macmillan, 2010.
[54] Bayraktar, F. ‘’İnternet KullanımınınErgenGelişimindekiRolü’’, YüksekLisansTezi, EgeÜniversitesi, İzmir, 2001.
[55] Akin, A., Demirci, İ., Akin, U., Ocakci, H.,Akdeniz, C., and Akbas, Z. Ş. ‘’Turkishversion of the Facebook AddictionScale’’, Paperpresented at the 13th European Conference on Personality, July, Stockholm, Sweden, 2013, pp.9-12.
Citation
CemOktayGüzeller, Ph.D., GökhanAksu, M.S. and Mehmet Taha Eser, M.S., "Developing of Facebook AddictionScaleforTurkishAdolescents," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.1-9, 2015.
Probe of Password Authenticated 3P-EKE Protocols
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.10-22, Dec-2015
Abstract
To establish a secure communication over unreliable networks, Password-Authenticated Encrypted Key Exchange (PA-EKE) protocols plays a pivotal role. Diffie & Hellman (D-H) (1976) proposed a first key agreement protocol, which is suffered from man-in-the-middle attack. To overcome a flaw, many authors proposed password-authenticated key agreement protocols. Chang & Chang (2004) proposed a novel password-authenticated 3P-EKE protocol with round efficiency. In contrast, Yoon & Yoo (2008) notified an undetectable online dictionary attack on this protocol and proposed an improvement over it. Later, Padmavathy et al. cryptanalyzed the Yoon-Yoo’s protocol and proposed PSRJ Protocol. Subsequently, Archana et al. (2012) notified a detectable online dictionary attack on PSRJ Protocol. Afterward, an improvement over the Yoon-Yoo’s protocol is proposed by Raj et al. (2013), which is cryptanalyzed by Archana et al. (2013). In this paper we have analyzed all the above protocols at their performance level.
Key-Words / Index Term
Password authentication, Encrypted Key Exchange (EKE), Three Party-EKE Protocols, , Detectable On-line Dictionary Attacks, Undetectable On-line Dictionary Attacks.
References
[1] Chin-Chen Chang*, Ya-fen Chang, “A novel three-party encrypted key exchange protocol”, Elsevier, Computer Standards & Interfaces, Volume-26, Issue/No-5, Page No (471 – 476), 2004.
[2] Y. Ding and P. Horster, “Undetectable on-line password guessing attacks,” ACM Operating Systems Review, Volume-9, Issue/No-4, Page no (77-86), 1995.
[3] W. Diffie and M. E. Hellman. “New directions in cryptography”. IEEE Transactions on Information Theory, Volume-22, Issue/No-6, Page No (644– 654), 1976.
[4] S.M. Bellovin and M. Merritt, “Encrypted key exchange: password-based protocols secure against password guessing attacks,” in Proc. of 1992 IEEE Symposium on Research in Security and Privacy, Page No (72–84), 1992.
[5] M. Steiner, G. Tsudik, and M. Waidner, “Refinement and extension of encrypted key exchange”, ACM Operating Systems Review, Volume-29, Issue/No-5, Page No (22-30), 1995.
[6] C. L. Lin, H. M. Sun, and T. Hwang, “Three party encrypted key exchange: attacks and a solution”, ACM Operating Systems Review, Volume -34, Issue/No-4, Page No (12-20), 2002.
[7] Feng Zhu, Duncan S. Wong, Agnes H. Chan, Robbie Ye ”Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks” Information Security, Lecture Motes in Computer Science, Volume -2433, Page No (150-161), 2002.
[8] Yeh H-T, Sun H-M, Hwang T, “Efficient three-party authentication and key agreement protocols resistant to password guessing attacks”, Journal of Information Science and Engineering, Volume-19, Issue/No-6, Page No (1059-1070), 2003.
[9] T. f. Lee, T. Hwang, and C. L. Lin, “Enhanced three party encrypted key exchange without server public Keys”. Computers and Security, Volume-23, Issue/No-7, Page No (571-577), 2004.
[10] Eun-Jun Yoon, Kee-Young Yoo, “Improving the novel three-party encrypted key exchange protocol”, Elsevier, Computer Standards and Interfaces, Volume-30, Issue/No-5, Page No (309-314) , 2008.
[11] R.Padmavathy , Tallapally Shirisha , M.Rajkumar , JayadevGyani, “Improved analysis on Chang and Chang Password Key Exchange Protocol”, IEEE International Conference on Advances in Computing, Control, and Telecommunication Technologies, Page No (781-783), 2009.
[12] Archana Raghuvamshi, P.Venkateshwara Rao,and Prof.P.Premchand , “Cryptanalysis of Authenticated Key Exchange 3P-EKE Protocol and its Enhancement”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012), Page No (659-666), March 30-31, 2012.
[13] P.Rajkumar, C.Manoharan, M.Ananthi, “Performance Analysis Of 3pek Exchange Protocol Using Parallel Message Transmission Technique”, International Journal of Engineering Research & Technology (IJERT), Volume-1, Issue/No-7, Page No (1-5) Sep 2012.
[14] Archana Raghuvamshi , Prof.P.Premchand ,“A Weakness in 3pek Exchange Protocol using Parallel Message Transmission Technique”, International Journal of Advanced Research in Computer Science(IJARCS), Volume-4, Issue/No-11, Page No (104-108), Dec 2013
[15] Y. Gertner, T. Malkin, O. Reingold, “On the impossibility of basing trapdoor functions on trapdoor predicates”, Proceedings of the 42nd IEEE Symposium on foundations of Computer Science, Las Vegas, Mevada, Page No (126 – 135), Oct 2001.
Citation
Archana Raghuvamshi, Premch and Parvataneni, "Probe of Password Authenticated 3P-EKE Protocols," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.10-22, 2015.
Response Based Tunning of Proportional and Integral Constants in PI Controlled Six Phase PMSM Drive
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.23-28, Dec-2015
Abstract
This paper deals with the modeling of six phase Permanent Magnet Synchronous Motor (PMSM) which has been done with the aid of Matlab and then the complete drive system is designed which consists primarily of two inverter and a Proportional integral controller. Proportional-Integral controller is most commonly used in drives system. The combination of proportional and integral is important to increase the speed of response and also to eliminate the steady state error.It also gives the reason of choosing six phase over three phase and superiority of PMSM with other motors like DC motors and Induction motor.Performance analysis with Manual tunning of proportional (Kp) and integral (Ki) constant is studied which shows the best suited value of Kp and Ki in the drive system by of these values.
Key-Words / Index Term
Multiphase, Permanent magnet synchronous motor (PMSM), PI controller, Proportional constant (Kp) and Integral constant (Ki)
References
[1] T.J.E. Miller and M.I. McGilp “Analysis of Multi-Phase Permanent-Magnet Synchronous Machines” SPEED Laboratory, University of Glasgow, UK, 2010
[2] Filippo Milanesi “Design optimization and control strategies for PMMultiphase Tubular Linear Actuator” Power Electronics, Machines And Drives,Thesis 2009
[3] Jussi Puranen, “Induction motor versus permanent magnet synchronous motor in motion control applications: a comparative study” Lappeenranta University of Technology; Thesis 2006.
[4] Ho-Yong Choi, Sun Jung Park, Young Kyung Kong”Design of Multi-phase Permanent MagnetMotor for Ship Propulsion”IEEE trans.2001
[5] Leila Parsa Taehyung Kim,“Reducing Torque Pulsation of Multi-Phase Interior Permanent Magnet Machines”IEEE trans., pages 1978-1983, 2006
[6] Mingzhong Qiao , Xiaofeng Zhang, Xiuming Ren “Research of the Mathematical Model and Sudden Symmetrical Short Circuit of the Multi-phase Permanent-magnet Motor”IEEE trans. pages 769-774, 2002
[7] P.Pillay and R.Krishanan, “Modeling, simulation, and analysis of permanent-magnet motor drives”, part 1: The permanent magnet synchronous motor drive. IEEE Trans. Ind. Appl., vol. 25, No. 2, March-April, 1989.
[8] P.Pillay and R.Krishanan, “Application characteristics of permanent-magnet synchronous and brushless DC motor for servo drives”, IEEE Trans. Ind. Appl., vol. 27, No. 5, Sep-Oct, 1991.
[9] Marc Vila mani A quick overview on rotatory Brush and Brushless DC Motors Motion Control Department C./Llacuna 162, Barcelona – Spain, 2005.
[10] Xiao Xi, Li Yongdong, Li Min, “Performance control of PMSM using a self –tuning PID”, IEEE Conf., pages 1053-1057, 2005.
[11] Urs Kafader, “Selecting Dc Brush and Brushless Motors” Maxon Precision Motor, Machinedesign.com.
[12] T.A.Lipo, ”A d-q model for six phase induction motor” 1980.
[13] Yifan zhao, T.A.Lipo "space vector PWM control of Dual three phase induction machine using vector space decomposition"IEEE Trans. vol.31 no.5, 1995.
[14] J. Karttunen, S. Kallio, P. Peltoniemi, P. Silventoinen, and O. Pyrhonen “Dual Three-Phase Permanent Magnet Synchronous Machine Supplied by Two Independent Voltage Source Inverters”IEEE trans, pages 741-747, 2012
[15] Faa-Jeng Lin, Ying-Chih HungA Takagi-Sugeno-Kang” Fault-Tolerant Control of Six-Phase Motor Drive System Using Takagi- Sugeno-Kang Type Fuzzy Neural Network With Asymmetric Membership Function”IEEE trans, pages 1-14, 2011.
[16] Leila Parsa Hamid A. Toliyat ”Multi-Phase Permanent Magnet Motor Drives”IEEE trans, pages 401-408,2003
[17] Anurag Singh Tomer, S.P.Dubey ‘’Performance Analysis of Six Phase PMSM Drive Fed By Two Invereter’’4th IEEE international conference ,Nirma University Ahmedabad, 28-30 Oct 2013.
[18] Araki M., "PID CONTROL," Control Systems, Robotics, and Automation.vol-2.
[19] Kiam Heong Ang and Gregory Chong, "PID Control System Analysis, Design,and Technology," IEEE Transactions on control systems technology, vol. 13, no. 4, pp. 559-575, july 2005.
Citation
Anurag Singh Tomer and S.P.Dubey , "Response Based Tunning of Proportional and Integral Constants in PI Controlled Six Phase PMSM Drive," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.23-28, 2015.
Effectiveness of Symlets in De-noising Fingerprint Images
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.29-34, Dec-2015
Abstract
This paper examines the effectiveness of symlets in de- noising fingerprint images. The 'fingerprint' test image is corrupted with Additive White Gaussian Noise and the noisy image is de-noised using Discrete Wavelet Transform employing symlet wavelets of different orders. The effectiveness of de-noising with each member of the selected set of members of the symlet wavelet family is examined with the standard performance measures namely the MSE and PSNR, along with the apparent visual quality of the de-noised images. The study is repeated with a set of random values for the noise variance.
Key-Words / Index Term
Symlets; Vanishing moments; Orthhogonal wavelets;Discrete wavelet transform; AWGN, Thresholding
References
[1] Minakshi Kumar, “Satellite Remote Sensing and GIS Applications in Agricultural Meteorology”, Proceedings of a Training Workshop on Digital Image Processing held at Dehra Dun, India, Page No.(81-102), . July 7-11, 2003.
[2] P P Vaidyanathan and Igor Djokovic, “An Introduction to Wavelet Transforms”, California Institute of Technology, Page No. (1-116), .1994.
[3] P L Patil and V B Raskar,”MRI Images Techniques”, Int. Journal of Advancd Research in Computer and Communication Engineering, Vol-04, Issue-02, Page No.(304-308), Feb 2015, ISSN 22278-1021.
[4] J Kaur and R Kaur, “Biomedical Images denoising using Symlet Wavelet with Wiener filter”, Int. Journal of Engineering Research and Applications, Vol-03, Issue-03, Page No..(548-550), May-Jun 2013, ISSN: 2248-9622.
[5] T Varma, V Chitre and D Patil, “The Haar Wavelet and The Biorthogonal Wavelet Transforms of an Image”, National Conference on Emerging Trends in Engineering & Technology (VNCET), 30 Mar2012, Page No.(288-291), .Int. Journal of Engineering Research and Applications.
[6] I Daubechies, “Ten Lectures on Wavelets”, Regional Conference Series in Applied Mathematics, SIAM, 1992. ISBN 978-0-89871-274-2.
[7] G. Strang and T. Nguyen, “Wavelets and Filter Banks”, Wellesley-Cambridge Press, Second Edition, ISBN-13: 978-0961408879, 1996.
[8] V Singh and R Sharma, “Wavelet Based Method for Denoising of Electroencephalogram”, Int. Journal of Advanced Research in Computer Science and Software Engineering, Vol-05, Issue -04, Page No. (1113-1117), April 2015, ISSN: 2277 128X.
[9] Myung-S Song, ‘Wavelet Image Compression’, Page No.(1-33), Mathematics Subject Classification. Primary 42C40. Contemporary Mathematics, Southern Illinois, University Edwardsville, Edwardsville, USA. 1991
[10] L Passrija, A S Virk and M Kaur, “Performance Evaluation of Image Enhancement Techniques in Spatial and Wavelet Domains”, Int. Journal of Computers & Technology, Volume - 03, No.- 01, Page No. (162-166), Aug 2012, ISSN: 2277- 3061.
[11] P Gravel, G Beaudoin and J A D Guise, “A Method for Modeling Noise in Medical Images”, IEEE TRANSACTIONS ON MEDICAL IMAGING, Vol--23, No.- 10, Page No.(1221-1232), Oct 2004.
[12] Sumit Kushwaha and Dr. Rabindra Kumar Singh, “ Study of Various Image Noises and Their Behavior”, Int. Journal of Computer Sciences and Engineering,Vol-03, Issue-03, Page No.(13-17), Mar 2015, ISSN: 2347-2693.V
[13] T N Tilak and S Krishnakumar, “De-noising with Different Bi-orthogonal Spline Wavelets using DWT ”, Int. Journal of Engineering Research & Technology, Vol-04, Issue- 04, Page No. (238-242), April 2015, ISSN:2278-0181. DOI: 10.17577/IJERTV4IS040422., Issue-
[14] P Rajput and S K S Tomar, “Development of Novel Denoising Technique using Total Variation and Symlet Wavelet Filter”, Int Journal of Engineering Trends and Technology, Vol - 22, No.- 03, Page No.(109-114), April 2015, ISSN: 2231-5381.
[15] G Chang, B Yu, and M Vetterli, “Adaptive Wavelet Thresholding for Image Denoising and Compression”, IEEE TRANSACTIONS ON MEDICAL IMAGING, Vol.-09, No.-09, Page No. ( 1532- 1546), Sept 2000.
[16] H Om and M Biswas, “An Improved Image Denoising Method Based on Wavelet Thresholding”, Journal of Signal and Information Processing, 3, Page No. (109-116), Feb 2012, ISSN: 2159-4481
[17] F Luisier, T Blu, and M Unser, “A New SURE Approach to Image Denoising: Interscale Orthonormal Wavelet Thresholding”, IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol-16, No.-03, Page No.(593-606), Mar 2007.
Citation
T.N. Tilak and S. Krishnakumar , "Effectiveness of Symlets in De-noising Fingerprint Images," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.29-34, 2015.
A Taxonomy of Network Intrusion Detection System for Wireless Communication
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.35-42, Dec-2015
Abstract
Now a days, it is essential to give a high-level security to protect highly sensitive and private information. Network Technology and Internet Application sector plays a vital role in today’s trend. Over a few years, we are able to see a tremendous growth towards the network technology. With the help of internet facility, we are able to carry out different tasks such as internet banking, online education, social networking and so on, which make our life more comfortable. Numbers of clients are being connected with the technology day by day. Despite being hacked by unwanted intruder or malicious. This cause a great damage to the documents, software and the confidential data’s. Terms such as worms, viruses and Trojans create fear in the internet clients. Because of security and safety against these acts, it can be done only with our system, which will be able to sense and reply these attack or penetration. A very helpful tool in this is Intrusion Detection System (IDS), which detects the attacks and analysis it to take appropriate decision against it. Intrusion Detection System has a great impact on cyber security and network vulnerability. Once the detection is marked, the corresponding action could be taken by IDS. Intrusion detection system is a software and hardware device. This paper will illustrate us an overview of IDS and to create a secure zone in the sector of networking. Furthermore, appropriate problems and challenges in this field are consequently illustrated and discussed.
Key-Words / Index Term
Security Signature, Intrusion detection, Network Attacks, Prevention System, Analyzer, DOS, Misuse detection, Anomaly detection
References
[1] R. Bace and P. Mell, “Special Publication on Intrusion DetectionSystems,”Tech.Report SP 800-31, National Institute of Standards and Technology, Gaithersburg, Md., Nov 201.
[2] David W. Cooke, Rapporteur, “The Resilience of the Electric Power Delivery System in Response to Terrorism and Natural Disasters” Summary of a workshop in National Research council. ISBN: 978-0-309-29395-2, Page No (1-42).
[3] Defeng Wang, Yeung, D.S., and Tsang, E.C., “Weighted
Mahalanobis Distance Kernels for Support Vector
Machines”, IEEE Transactions on Neural Networks,
Volume-18, No-5, Page No (1453-1462), Sep 207.
[4] Inella, Paul. “The Evolution of Intrusion Detection Systems.”[Online]Available http://www.securityfocus.com/infocus/1514, Nov 16, 201.
[5] Koral Ilgun, Richard A. Kemmerer, Fellow, IEEE, and Phillip A. Porras, “A State Transition Analysis: A Rule - Based Intrusion Detection Approach”, IEEE Transactions on Software Engineering, Volume-21, No-3, Page No (181 – 199), Mar 195.
[6] L Ertoz, E. Eilertson, A. Lazarevic, P. Tan, J. Srivastava, V. Kumar and P. Dokas, “The MINDS - Minnesota Intrusion Detection System, in Data Mining”, A. Joshi H. Kargupta, K. Sivakumar, Y. Yesha, “Next Generation Challenges and Future Directions”, Ed., 204.
[7] Intrusion.com, Intrusion Secure Host, white paper available at: www.intrusion.com/products/hids.asp, 203.
[8] W. Jansen, P. Mell,” Mobile Agents in Intrusion Detection and Response”, In Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, Page No (77-91), Sep 210.
[9] C. Kruegel, T. Toth,” Distributed Pattern Detection for Intrusion Detection”, In Proceedings of the Network and Distributed System Security Symposium Conference, Internet Society, Los Angeles, CA, Feb 202.
[10] E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo,”A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, in Applications of Data Mining in Computer Security”, 202, S. Jajodia D. Barbara, “Advances In Information Security”, Ed. Boston: Kluwer Academic Publishers, 212.
[11] M. Esmaili, R. Safavi-Naini, B. Balachandran and Pieprzyk, J. “A Case Based Reasoning for Intrusion Detection System”, In Proceedings of the 12th Annual Computer Security Applications Conference, ISSN: 1063-9527, Page No (214 -223), Dec 196.
[12] German Florez-Larrahondo, Zhen Liu, Yoginder S. Dandass, Susan M. Bridges, and Rayford Vaughn, “Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems”, Dynamic Publishers, Inc.Journal of Information Assurance and Security. Volume-1, No-1, ISSN: 1554-1010, Page No (59–77), 206.
[13] C. Krugel, T. Toth,” A Survey on Intrusion Detection Systems”, Technical University of Vienna Technical, report, PageNo (410-417), Apr210, http://citeseerx.ist.psu.edu/viewdoc/summary?.
[14] “Network Intrusion Detection System”, http://en.wikipedia.org/wiki/Network_intrusion_detection_system, Jul 1, 209.
[15] “The concept of Intrusion Detection Systems”, http://maltainfosec.org/archives/26.html, http://rsmus.com/what-we-do/services/risk-advisory/the-ultra-secure-network-architecture.html, 211.
[16] N. Einwechter, “An introduction to distributed intrusion detection systems”, http://www.securityfocus.com/infocus/1532, 202.
[17] Y. Zhang and W. Lee, “Intrusion detection in wireless
adhoc networks”, In Mobile Computing and Networking, MOBICOM , Boston, MA, USA, Page No (275–283), 200.
[18] Ghosh and A. Schwartzbard,”A Study in Using Neural Networks for Anomaly and Misuse Detection”, In Proceedings of the Eighth USENIX Security Symposium, Washington, D.C., Page No (141-152), Aug 199.
[19] Amrita Anand, Brajesh Patel,” An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols”, International Journal Of Advanced Research in Computer Science and Software Engineering, Volume-02, No-08, ISSN: 2277 128X, Page No (94-98), Aug 212.
[20] G. Helmer, J.S.K Wong, V. Honavar and L. Miller, “Intelligent Agents for Intrusion Detection”, In Proceedings of the IEEE Information Technology Conference, Syracuse, NY, Page No (121-124), Sep 207.
[21] Deris Stiawan, Ala’ Yaseen Ibrahim Shakhatreh, Mohd. Yazid Idris, Kamarulnizam Abu
Bakar, Abdul Hanan Abdullah,” Intrusion Prevention System: A Survey”, Journal of Theoretical and Applied Information Technology, Volume-40, No-1, ISSN: 1992-8645, Page No (44-54), June 15, 212.
Citation
R. Karthik and B.L. Shivakumar, "A Taxonomy of Network Intrusion Detection System for Wireless Communication," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.35-42, 2015.
An Efficient Model for S.M.S Security and SPAM Detection: A Review
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.43-49, Dec-2015
Abstract
Short message service (S.M.S) security is a very important issue in today’s time. In spite of the fact that instant messengers have become very popular, S.M.S is still used. S.M.S is prone to several attacks and is not yet marked as a safe means for communication. Security in S.M.S includes message authentication, user authentication, encryption and decryption of the message and Spam .This paper deals with the survey of all these aspects of security in order find the best options available for each of them today .It is found that the most widespread functions are SHA-1(Secure Hash Algorithm- 1) and MD5(Message Digest) , MD5 hash algorithm when used with RSA provides a very strong means for authentication of the user , ElGamal algorithm is the most effective for encryption/decryption of SMS and SVM(Support Vector Machine) is the best machine learning technique for SPAM detection.
Key-Words / Index Term
Elgamal , MD5, HMAC, Message digest, non spam , SMS, spam, support vector machines (SVM)
References
[1] S.Sharma, J.S.Yadav and P.Sharma, “Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm”,IJARCSSE, volume 2, August, 2012.
[2] S.Amari, S.Wu,"Improving support vector machine classifiers by modifying kernel functions". Neural Networks, Page No(783– 789),1999.
[3] M. Kim, J. Kim, and J. H. Cheon, “Compress Multiple Ciphertexts using ElGamal Encryption Schemes”, J. Korean Math. Soc, vol. 50, Page No(361-377),2013.
[4] M. Hassinen, “Java based public key infrastructure for sms messaging”, Proc. 2nd International Conference on Information and Communication Technologies,ICTTA’06,Page No (88-93),2006.
[5] S. Singh and E. K. Saurabh, “Providing Security in Data Aggregation using RSA algorithm”, International Journal of Computers & Technology, vol. 3, Page No(60-65) ,2012,.
[6] D. Lisonek and M. Drahansky, “Sms encryption for mobile communication”, Proc. International Conference on Security Technology, SECTECH’08,Page No(198-201),2008,
[7] A. De Santis, A. Castiglione, G. Cattaneo, M. Cembalo, F. Petagna, and U. F. Petrillo, “An extensible framework for efficient secure SMS”, Proc. International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), Page No(843-850), 2010.
[8] N.Saxena and N. S. Chaudhari, “Secure encryption with digital signature approach for Short Message Service”, Proc. World Congress on Information and Communication Technologies (WICT),Page No(803-806), 2012.
[9] I. Yiakoumis, M. Papadonikolakis, H. Michail and A. P. Kakarountas, “Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code”,eurocon 2005 , Serbia & Montenegro, Belgrade, Page No (22-24), November 2005.
[10] V. Patidar, D. Singh, A. Singh, “A Novel Technique of Email Classification for Spam Detection”, International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 5 – No. 10, August 2013.
[11] V. R. Pallipamu, T. R. K, S. V. P, “Design of RSA digital scheme using a novel cryptographic hash algorithm”, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, June 2014.
[12] Prof. Rashmi RameshChavan and Prof. ManojSabness,“Secured mobile messaging” , International conference On computing,doi:10.1109/ICCEET.2012.6203858,Page No (1036 – 1043),2012.
[13] A. De Santis, A.Castiglione, G.Cattaneo, M.Cembalo ,F.Petagna, and U.F.Petrillo, “ An extensible framework for efficient secure SMS”, Proc. International Conference on Complex Intelligent and Software Intensive System,2010
[14] “Spam”,http://www.kaspersky.com/about/news/spam,2015
[15] Zahra S.Torabi, Mohammad H.NadimiShahraki, Isfahan,Iran and Akbar Nabiollahi,”Efficient Support Vector Machines for SpamDetection: A Survey",(IJCSIS) International Journal of Computer Science and Information Security,Vol. 13, No. 1, January 2015.
[16] “Spam News”,https://en.wikipedia.org/wiki/Acision,2015
[17] Bharat Gupta, Dr. Rajeev Gupta,”Performance Evaluation of Modified Signcryption Scheme”, International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397, Vol. 4 No. 12, Page No ( 1881-1889), Dec 2012.
Citation
Nikhila Zalpuri and Meena Arora, "An Efficient Model for S.M.S Security and SPAM Detection: A Review," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.43-49, 2015.
A Comparative Study on Image Segmentation Techniques
Review Paper | Journal Paper
Vol.3 , Issue.12 , pp.50-56, Dec-2015
Abstract
Image segmentation is the first step from image processing to image analysis. Image segmentation is the partition of image into multiple segments to have clear distinction between object and background of image. In existing method, in order to obtain threshold accurately, discrete wavelet transform (DWT) method is used which decompose the image into four sub-bands via high and low pass filters. To determine threshold value, Otsu’s method is applied on low pass filter and on high pass filter edge enhancement is implemented. The overall objective of this paper is to review the image segmentation techniques and find their limitations.
Key-Words / Index Term
Image Segmentation, gray stretch, fuzzy c- means
References
[1] S. Saini, and K. Arora “A Study Analysis on the Different Image Segmentation Techniques”, International Journal of Information & Computation Technology, Vol.4, Issue-14, 2014, pp.1445-1452.
[2] A. M. Khan, and Ravi. S, “Image Segmentation Methods: A Comparative Study”, International Journal of Soft Computing and Engineering (IJSCE), Vol.3, Issue-4, 2013 pp.84-92.
[3] M. Angelopoulou, K. Masselos, P. Cheung, and Y. Andreopoulos, “A Comparison of 2-D Discrete Wavelet Transform Computation Schedules on FPGAs”, Field Programmable Technology, FPT 2006 IEEE International Conference, 2006, pp.181-188.
[4] M. Kociołek, A. Materka, M. Strzelecki, and P. Szczypiński, “Discrete Wavelet Transform – Derived Features for Digital Image Texture Analysis”, Proc. of International Conference on Signals and Electronic Systems, Vol.18, Issue-21, 2001, pp.163-168.
[5] R. Biswas, and J. Sil, “An Improved Canny Edge Detection Algorithm Based on Type-2 Fuzzy Sets”, Procedia Technology Novel, Issue-4, 2012, pp.820-824.
[6] J. Lan, and Y. Zeng, “ Multi-threshold Image Segmentation Using Maximum Fuzzy Entropy Based on a New 2D Histogram”, Optik - International Journal for Light and Electron Optics, Vol. 124, Issue-18, 2013, pp.3756-3760.
[7] B. G. Jeong, and I. K. Eom, “Image Manipulation Detection Using Edge-Based Segmentation and Statistical Property of Wavelet Coefficients”, Electronics, Information and Communications (ICEIC), International Conference, Vol.15, Issue-18, 2014, pp.1-2.
[8] T.C. R. Kumar, S. A. Perumal, and N. Krishnan, “Fuzzy Based Contrast Stretching for Medical Image Enhancement”, Ictact Journal On Soft Computing: Special Issue On Fuzzy In Industrial And Process Automation, Vol.2, Issue-1, 2011, pp. 233-236.
[9] S. S. Al-amri, N.V. Kalyankar, and K.S.D., “Image Segmentation by Using Threshold Techniques”, Journal of Computing, Vol.2, Issue-5, 2010, no., pp. 83-86.
[10] W. Rongrong, D. Yongshou, Z. Manman, and Z. Peng, “A New Mixed-Phase Wavelet Extraction and Evaluation Method Based on Adaptive Segmentation in Non-Stationary Seismogram”, Electronics Information and Emergency Communication (ICEIEC), 5th International Conference, Vol.14, Issue-16, 2015, pp. 301-304.
[11] P. P. Sarangi, B. S. P. Mishra, B. Majhi, and S. Dehuri, “Gray-Level Image Enhancement Using Differential Evolution Optimization Algorithm”, Signal Processing and Integrated Networks (SPIN), International Conference, Vol.20, Issue-21, 2014,no., pp.95-100.
[12] A. Dutta, and K. K. Sarma, “SAR Image Segmentation Using Wavelets and Gaussian Mixture Model”, Signal Processing and Integrated Networks (SPIN), International Conference, Vol.20, Issue-21, 2014, no., pp.466-770.
[13] A.F .M. G. Kibria, and Md. M. Islam, “Reduction of over Segmentation in JSEG Using Canny Edge Detector”, Informatics, Electronics & Vision (ICIEV), International Conference, Vol.18, Issue-19, 2012, no., pp.65-69.
[14] R. Dhar, R. Gupta, and K. L. Baishnab, “An Analysis of CANNY and LAPLACIAN of GAUSSIAN Image Filters in Regard to Evaluating Retinal Image”, Green Computing Communication and Electrical Engineering (ICGCCEE), International Conference, Vol.6, Issue-8, 2014, no., pp.1-6.
[15] Z. Ding , S. Qian, Y. Li, and Z. Li, “An Image Matching Method Based on the Analysis of Grey Correlation Degree and Feature Points”, Aerospace and Electronics Conference, NAECON- IEEE National , Vol.24, Issue-27, 2014, pp.157-162.
[16] P. Shanmugavadivu, and A. Kumar, “Modified Eight-Directional Canny for Robust Edge Detection”, Contemporary Computing and Informatics (IC3I), International Conference, Vol.27, Issue-29, 2014, no., pp.751-756.
[17] A.F.M.G. Kibria, and Md. M. Islam, “Color Image Segmentation Using Visible Color Difference and Canny Edge Detector”, Computer and Information Technology (ICCIT), 15th International Conference, Vol.22, Issue-24, 2012, pp.138-143.
[18] P. Sun, and L. Deng, “An Image Fusion Method Based on Region Segmentation and Wavelet Transform”, GEOINFORMATICS, 20th International Conference, Vol.15, Issue-17, 2012, pp.1-5.
[19] S.L. Jui, C. Lin, H. Guan, A. Abraham, A. E. Hassanien, and K. Xiao, “Fuzzy C-Means with Wavelet Filtration for MR Image Segmentation”, Nature and Biologically Inspired Computing (NaBIC), Sixth World Congress, 2014, pp.12-16.
[20] N.J. Gandhi, V. J. Shah, Jr., R. Kshirsagar ,“Mean Shift Technique for Image Segmentation and Modified Canny Edge Detection Algorithm for Circle Detection”, Communications and Signal Processing (ICCSP), International Conference, Vol.3, Issue-5, 2014, pp.246-250.
[21] R.S. Sengar, A. K. Upadhyay, M. Singh, and V.M. Gadre, “Segmentation of Two Dimensional Electrophoresis Gel Image Using the Wavelet Transform and the Watershed Transform”, Communications (NCC), National Conference, Vol.3, Issue-5, 2012, pp.1-5.
[22] A. Z. Arifin, and A. Asano, “Image Segmentation by Histogram Thresholding Using Hierarchical Cluster Analysis”, Pattern Recognition Letters, Vol.1, Issue-13, 2006, pp.1515-1521.
[23] S. M. Youssef, “HFSA-AW: A Hybrid Fuzzy Self-Adaptive Audio Watermarking”, Communications, Signal Processing, and their Applications (ICCSPA), 1st International Conference, Vol.12, Issue-14, 2013, pp.1-6.
[24] A. H. Rangkuti, N. Hakiem, R. B. Bahaweres, A. Harjoko, and A. E. Putro, “Analysis of Image Similarity with CBIR Concept Using Wavelet Transform and Threshold Algorithm”, Computers & Informatics (ISCI), IEEE Symposium, Vol.7, Issue-9, 2013, pp.122-127.
[25] R. Canonico, J. Scharcanski, and G. Verdoolaege, “Image Segmentation Using Wavelet Coefficients and Geodesic Distance between Elliptical Distributions for Applications in Street View”, Instrumentation and Measurement Technology Conference (I2MTC), IEEE International, Vol.13, Issue-16, 2012, pp.216-219.
[26] A. Ahmad, J. Alipal, N. H. Ja’afar , and A. Amira,“Efficient Analysis of DWT Thresholding Algorithm for Medical Image De-noising”, Biomedical Engineering and Sciences (IECBES), IEEE EMBS Conference, Vol.17, Issue-19, 2012, pp.772-777.
[27] Archana , A. Verma , S. Goel , and N. Kumar ,“Gray Level Enhancement to Emphasize less Dynamic Region within Image Using Genetic Algorithm”, Advance Computing Conference (IACC), IEEE 3rd International, Vol.22, Issue-23, 2013, pp.1171-1176.
[28] L. Liu, N. Yang, J. Lan, J. Li ,“Image Segmentation Based on Grey Stretch and Threshold Algorithm”, Optik - International Journal for Light and Electron Optics , Vol.126, Issue-6, 2015, pp. 626-629.
[29] A. Singh, P. I. Singh, and P. Kaur, “Digital Image Enhancement with Fuzzy Interface System”, International Journal of Information Technology and Computer Science (IJITCS), Vol.4, Issue-10, 2012, pp. 51-56.
Citation
Balpreet Kaur and Prabhpreet Kaur, "A Comparative Study on Image Segmentation Techniques," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.50-56, 2015.
A Survey of Image Registration Techniques Using Neural Networks
Review Paper | Journal Paper
Vol.3 , Issue.12 , pp.57-60, Dec-2015
Abstract
The importance of using neural networks for image registration has increased since the enhancement in technology responsible for capturing images. Traditional methods rely on manual selection of control points and/or finding a suitable geometric transformation that maps two images. This approach is especially tedious and time consuming for registering multiple images. Further, traditional methods are not able to register images effectively if non-linear transformations are used to convert one image into another. To provide a robust and efficient way of registering images, neural networks provide a powerful alternative. They have proved to be highly reliable especially with medical and satellite imaging; making room for uncertainty and imprecision. This paper highlights the important image registration approaches that make use of neural networks and performs a comparative analysis of these approaches. It also suggests suitable areas in which research can be carried out to improve the efficacy and scalability of the techniques.
Key-Words / Index Term
Image registration; neural networks; non-linear transformations
References
[1] Abche, A.B.; Yaacoub, F.; Maalouf, A.; Karam, E., "Image Registration based on Neural Network and Fourier Transform," in Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE , vol., no., pp.4803-4806, Aug. 30 2006-Sept. 3 2006
[2] B. S. Reddy and B. N. Chatterji, “An FFT-based technique for translation, rotation, and scale-invariant image registration,” IEEE Trans. Image Processing, vol. 5, no. 8, pp. 1266-1270, August 1996
[3] H. G. Barrow, J. M. Tenenbaum, R. C. Bolles, and H. C. Wolf, Parametric correspondence and chamfer matching, Proc. 5th Int’l J. Conf. Artificial Intelligence, pp. 659–663, 1977.
[4] D. I. Barnea and H. F. Silverman, A class of algorithms for fast digital image registration, IEEE Trans. Computers, vol. 21, no. 2, pp. 179–186, 1972.
[5] D. P. Huttenlocher, G. A. Klanderman, and W. J. Rucklidge, Comparing images using the Housdroff distance, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 9, pp. 850–863, 1993.
[6] Elhanany, Itamar, Mati Sheinfeld, Arie Beck, Yagil Kadmon, Naftali Tal, and Dan Tirosh. "Robust image registration based on feedforward neural networks." In Systems, Man, and Cybernetics, 2000 IEEE International Conference on, vol. 2, pp. 1507-1511. IEEE, 2000.
[7] G. Borgefors, Hierarchical chamfer matching: A parametric edge matching algorithm, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 10, no. 6, pp. 849–865, 1998.
[8] Chalermwat, Prachya. "High performance automatic image registration for remote sensing." PhD diss., George Mason University, 1999.
[9] Gajre, Rachna P., and Leena Ragha. "Comparison of Image Registration Methods for Satellite Images." International Journal of Scientific and Research Publications, ISSN: 2250-3153.
[10] G. C. Stockman, S. Kopstein, and S. Bennet, Matching images to models for registration and object detection via clustering, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 4, pp. 229–241, 1982.
[11] Goshtasby, A. Ardeshir. Image registration: Principles, tools and methods. Springer Science & Business Media, 2012.
[12] Le Beux, S.; Cazuguel, G.; Solaiman, B.; Roux, C., "Automatic feature determination using unsupervised neural networks. Application to image registration," in Neural Networks, 1996., IEEE International Conference on , vol.3, no., pp.1406-1409 vol.3, 3-6 Jun 1996
[13] Misra, I.; Moorthi, S.M.; Dhar, D.; Ramakrishnan, R., "An automatic satellite image registration technique based on Harris corner detection and Random Sample Consensus (RANSAC) outlier rejection model," in Recent Advances in Information Technology (RAIT), 2012 1st International Conference on , vol., no., pp.68-73, 15-17 March 2012
[14] P. E. Anuta, Spatial registration of multispectral and multitemporal digital imagery using fast Fourier transform techniques, IEEE Trans. Geoscience Electronics, vol. 8, no. 4, pp. 353–368, 1970.
[15] Piraino, D.; Kotsas, P.; Richmond, B.; Recht, M.; Kormos, D., "Three dimensional image registration using artificial neural networks," in Neural Networks, 1994. IEEE World Congress on Computational Intelligence., 1994 IEEE International Conference on , vol.6, no., pp.4017-4021 vol.6, 27 Jun- 2 Jul 1994
[16] Sarnel, H.; Senol, Y.; Sagirlibas, D., "Accurate and robust image registration based on radial basis neural networks," in Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on , vol., no., pp.1-5, 27-29 Oct. 2008
[17] Zhebin Qian; Jie-Gu Li, "Use of Hopfield neural network for complex image registration," in Tools with Artificial Intelligence, 1997. Proceedings., Ninth IEEE International Conference on , vol., no., pp.204-207, 3-8 Nov 1997
[18] W. K. Pratt, Correlation techniques of image registration, IEEE Trans. Aerospace and Electronic Systems, vol. 10, no. 3, pp. 353–358, 1974.
[19] Jianzhen Wu; Jianying Xie, "Zernike moment-based image registration scheme utilizing feedforward neural networks," in Intelligent Control and Automation, 2004. WCICA 2004. Fifth World Congress on , vol.5, no., pp.4046-4048 Vol.5, 15-19 June 2004
[20] Shuxiu Wang; Sheng Lei; Faliang Chang, "Image registration based on neural network," in Information Technology and Applications in Biomedicine, 2008. ITAB 2008. International Conference on , vol., no., pp.74-77, 30-31 May 2008
Citation
Takshak Desai, Udit Deshmukh and Prof. Ruhina Karani, "A Survey of Image Registration Techniques Using Neural Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.57-60, 2015.
Distributed Clustering Based Data Aggregation Algorithm for Grid Based WSN
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.61-66, Dec-2015
Abstract
Dynamic clustering in wireless sensor networks causes asymmetric division of cluster heads and extremely variable number of nodes in the clusters. Also, some of the clusters are spread over large areas in the network, causing limited spatial correlation between sensor nodes. These irregularities in cluster position have negative impact on the efficiency of a wireless sensor network. One critical issue in wireless sensor networks is how to collect sensed data in an energy-efficient way as the energy is a rare resource in a sensor node. Grid-Cluster-based aggregation is an effective architecture for data-gathering in wireless sensor networks. In this paper, we have developed a Distributed Clustering Based Data Aggregation (DCDA) algorithm for grid based WSN. In DCDA, cluster formation mechanism is based on a virtual-grid system. Simulation results show that DCDA improves the distribution of cluster heads and reduces the energy consumption within a range of 15%to 30% as compared to the existing protocols.
Key-Words / Index Term
Aggregation,Clustering,DCDA,Sleep/awake
References
[1]. I.F.Akyildiz, W.Su, Y.Sankarasubramaniam,” Wireless sensor networks: a survey, Computer Networks” volume-38 issue-4,PP.393-422,2002
[2]. Neng-Chung Wang , Y.-K. Chiang, C.-H. Hsieh, and Y.-L. Chen” Grid-based data aggregation for wireless sensor networks” Journal of Advances in Computer Networks,vol. Vol. 1,Issue- 4, pp.329-333,2013.
[3]. Yung-Kuei Chiang,N.-C. Wang, and C.-H. Hsieh “ A cycle-based data aggregation scheme for grid-based wireless sensor networks””,in proceedings of Journal sensors,pp.8447-8464,2014.
[4]. Z. Zhou and X. Xiang , ”An energy-efficient data-dissemination protocol in wireless sensor networks””, in proceeding of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 13-22,2006.
[5]. Neng-Chung Wang, Y.-K. Chiang, Y.-L. Chen, and C.-H. Hsieh”A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks””, in proceeding of the IEEE eighth international conference of Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp.477-482,2014.
[6]. Yu, L., Wang, N., Zhang, W. and Zheng,”GROUP: A grid-clustering routing protocol for wireless sensor networks””, in proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing; pp. 1-5,2006.
[7]. Rabia Noor Enam, Rehan Qureshi, and Syed Misbahuddin”A uniform clustering mechanism for wireless sensor networks”, International Journal of Distributed Sensor Networks,2014.
[8]. Srikanth Jannu,”Energy Efficient Grid Based Clustering and Routing Algorithms for Wireless Sensor Networks”, in proceeding of IEEE Fourth International Conference on Communication Systems and Network Technologies,pp 63-68,2014.
[9]. W. R. Heinzelman,A.Chandrakasan and H.Balakrishnan ”Energy- Efficient communication Protocol for Wireless Sensor Networks”, Proceedings of the 33th Hawaii International Conference on System Sciences (HICSS), 2000.
[10]. Younis and S.Fahmy”HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks,” in IEEE Trans. Mobile Computing, Vol. 3, 366-379,2004.
[11]. A.Manjeshwar and D.P.Agarwal,”TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks”,”In Proc. IPDPS , pp. 2009-2015,2001.
[12]. A.Manjeshwar and D.P.Agarwal,”APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks,”In: Proc. of IPDPS 2002, pp. 195-202,2002.
[13]. P.Kuila and PK Jana, ”An energy balanced distributed clustering and routing algorithm for wireless sensor networks”,Proc. of Int. conf. PDGC 2012, IEEE Xplore, pp 220-225,2012.
[14]. C Li, M. Ye and G. Chen “An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor networks,”Proc. Int. Conf. MASS, pp. 596-604, 2005.
[15]. S. Lindsey and CS Raghavendra,” PEGASIS: Power efficient gathering in sensor information systems”, Proc. IEEE Aerospace and Electronic Systems Society, pp. 1125-1130,2002.
[16]. S. D. Muruganathan, D. C. F. Ma, R. I. Bhasin, and A. O. Fapojuwo,” A Centralized Energy Efficient Routing Protocol for Wireless Sensor Network””, in Proceedings of IEEE Radio Communication, pp.8-13, 2005.
[17]. DilipKumar,Trilok and R.B.Patel ”EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks”, Computer Communications. 32 (4): pp 662-667,2009.
[18]. Aman Singhal and KK Shukla” A New Energy Efficient Clustering based Communication Protocol for Wireless Sensor Networks”,Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC, pp.122-128,2014.
[19]. Amandeep Kaur and Rajneesh Kumar Gujral” E2ACM: Energy Efficient Adaptive Cluster based Multilevel Routing Protocol for Wireless Sensor Networks”in International Journal of Computer Applications ,Volume -90, No 12, pp. 0975 – 8887,2014.
Citation
Amandeep Kaur and Rajneesh Kumar Gujral, "Distributed Clustering Based Data Aggregation Algorithm for Grid Based WSN," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.61-66, 2015.
Advanced Open Source Simulator: NS-3
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.67-74, Dec-2015
Abstract
In the current scenario various network simulators are available like OPNET, QualNet etc but all these software are commercial that means for using mentioned software, first one has to get licence. Therefore we focus on open source simulator (NS2 and NS3) that is open for everyone. This paper presents guideline for understanding the NS3 (Network Simulation Tool). NS3 focuses on improvement of software integrations, core architecture, models and educational components of NS2. This paper deals with basic idea about the simulator tool, installation procedure and how to design a network using it. In this paper Solution for common error occurred during installation of simulator and running a network is also provided. The purpose of this paper is to make network’s user familiar with the NS3 and its GUI (NetAnim).
Key-Words / Index Term
NS3, NS2, NetAnim, wired, wireless
References
[1] (2011-2012) ns-3. [Online]. Available: https://www.nsnam.org/
[2] NetAnim. [Online]. Available: http://www.nsnam.org/wiki/NetAnim_1.0
[3] ns simulator. [Online]. Available: http://en.wikipedia.org/wiki/Ns_(simulator)
[4] ns-3 tutorial. [Online]. Available: http://www.nsnam.org/docs/release/3.14/tutorial/singlehtml/index.html
[5] Rakesh Kumar Jha, Pooja Kharga,"A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator", IJCNIS, vol.7, no.4, pp. 62-68, 2015.DOI: 10.5815/ijcnis.2015.04.08
[6] Rachna Choudhary, Shweta Sethi, Rita Keshari, Sakshi Goel, “A study of comparison of Network Simulator -3 and Network Simulator -2”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (1) , 2012.
[7] Atta ur Rehman Khan • Sardar M. Bilal • Mazliza Othman, “ A Performance Comparison of Open Source Network Simulators for Wireless Networks”, IEEE International Conference on Control System, Computing and Engineering; 11/2012
[8] Rakesh Kumar Jha, Pooja Kharga, “ A Journey Starts from Basic Understanding of NS2 to NS3”, LAP Lambert Academic Publishing,, ISBN-13: 9783659637582
[9] Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi , Anuradha, Shashi Kumari,"OpenFlow Technology: A Journey of Simulation Tools", IJCNIS, vol.6, no.11, pp.49-55, 2014. DOI: 10.5815/ijcnis.2014.11.07
Citation
Rakesh Kumar Jha and Pooja Kharga , "Advanced Open Source Simulator: NS-3," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.67-74, 2015.