Emerging Cloud based Content Delivery Networks
Review Paper | Journal Paper
Vol.4 , Issue.9 , pp.64-71, Sep-2016
Abstract
A content delivery network or content distribution network (CDN) using cloud resources such as storage and compute have started to emerge. Unlike traditional CDNs hosted on private data centers, cloud-based CDNs take advantage of the geographical availability and the pay-as-you-go model of cloud platforms. The Cloud-based CDNs (CCDNs) promote content-delivery-as-a-service cloud model. Though CDNs and CCDNs share similar functionalities, introduction of cloud impose additional challenges that have to be addressed for a successful CCDN deployment. Several papers have tried to address the issues and challenges around CDN with varying degree of success. However, to the best of our knowledge, there is no clear articulation of issues and challenge problems within the context of cloud-based CDNs. Hence, this paper aims to identify the open challenges in cloud-based CDNs. In this regard, we present an overview of cloud-based CDN followed by a detailed discussion on open challenges and research dimensions.
Key-Words / Index Term
Content delivery networks, Cloud, Cloud-based CDN, pay-as-you-go model, content-delivery-as-a-service
References
[1] IDC, �Data Growth, Business Opportunities, and IT Imperatives�. Available: http://www.emc.com/leadership/digital- universe/2014iview/executive-summary.htm. Accessed: 10/09/2014.
[2]. Akamai, �The Importance of Delivering A
Great Online Video Experience�. Available: http://www.akamai.com/dl/reports/jupiter_onlinevideoexp.pdf. Accessed: 10/09/2014.
[3] IneoQuest, �The Case for Leveraging the Cloud for Video Service Assurance�. Available: http://www.ineoquest.com/wpcontent/uploads/2013/10/Whitepaper_Cloud_Services.pdf. Accessed: 10/09/2014
[4] Big Data & CDN, Available: http://www.slideshare.net/pavlobaron/bigdata-cdnoop2011-pavlo-baron, Accessed: 03/07/2014
[5]. Wang L, Kunze M, Tao J, Laszewski G (2011) �Towards building a cloud for scientific applications�. Adv Eng Softw 42(9):714�722
[6] Wang L, Fu C (2010), �Research advances in modern cyber infrastructure�. New GenerComput 28(2):111�112
[7] P. Mell and T. Grance, "The NIST definition of cloud computing (draft)," NIST special publication, vol. 800, p. 145, 2011.
[8] Mastin. P; �Is the Cloud a CDN Killer�, Available: http://cloudcomputing.sys-con.com/node/2628667. Accessed: 03/07/2014.
[9] Compton. K; �Marching towards cloudCDN� Available: http://blogs.cisco.com/sp/marching-towards-cloud-cdn/. Accessed: 03/07/2014.
[10] Hao Yin; Xuening Liu; Geyong Min; Chuang Lin, "Content delivery networks: a bridge between emerging applications and future IP networks," Network, IEEE , vol.24, no.4, pp.52,56, July-August 2010
[11] Li Ling; Ma Xiaozhen; Huang Yulan, "CDN cloud: A novel scheme for combining CDN and cloud computing," Measurement, Information and Control (ICMIC), 2013 International Conference on , vol.01, no., pp.687,690, 16-18 Aug. 2013.
[12] Lizhe Wang, Dan Chen, Jiaqi Zhao, Jie Tao:Resource management of distributed virtual machines. IJAHUC 10(2): 96-111 (2012) .
[13] Lizhe Wang, Dan Chen, Yangyang Hu, Yan Ma, Jian Wang: Towards enabling Cyberinfrastructure as a Service in Clouds. Computers & Electrical Engineering 39(1): 3-14 (2013).
[14] Microsoft Azure Cloud Services: http://www.windows.azure.com.Accessed: 10/09/2014 .
[15]AmazonCloudFront.http://aws.amazon.com/cloudfront/, Accessed: 10/09/2014
[16]. P. Mell and T. Grance, "The NIST definition of cloud computing (draft)," NIST special publication, vol. 800, p. 145, 2011.
[17]. K. Krauter, R. Buyya, et al., "A Taxonomy and Survey of Grid Resource Management Systems for Distributed Computing," Software: Practice and Experience (SPE), vol. 32, pp. 135-164, February 2002.
[18] L. Hui, "Realistic Workload Modeling and Its Performance Impacts in Large-Scale eScience Grids," IEEE Transactions on Parallel and Distributed Systems, vol. 21, pp. 480-493, 06/15 2010.
[19] IneoQuest, �The Case for Leveraging the Cloud for Video Service Assurance�. Available: http://www.ineoquest.com/wp-content/uploads/2013/10/Whitepaper_Cloud_Services.pdf. Accessed: 10/09/2014
[20] Akamai Technologies, Inc., www.akamai.com, 2014
[21]. Li. H; Zhong. L; Liu. J; Li. B; Xu. B, "Cost-Effective Partial Migration of VoD Services to Content Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on, vol., no., pp.203,210, 4-9 July 2011
[22]. Zhang. X; Du. H; Chen. J-Q; Lin. Y; Zeng. L-J, "Ensure Data Security in Cloud Storage," Network Computing and Information Security (NCIS), 2011 International Conference on, vol.1, no., pp.284,287, 14-15 May 2011
[23]. No SQL, http://nosql-database.org/, Accessed: 8/06/2014 Wang. L, Pai. V and Peterson. L, �The Effectiveness of Request Redirection on CDN Robustness�,web.cs.wpi.edu/~rek/DCS/D04/CDN_Redirection.ppt, accessed: 10/09/2014
[24] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013.
Citation
V. Suresh, B. Venkatesh, A. Anjaneyulu, "Emerging Cloud based Content Delivery Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.64-71, 2016.
Survey on Recent Researches on High Level Image Retrieval
Survey Paper | Journal Paper
Vol.4 , Issue.9 , pp.72-77, Sep-2016
Abstract
To obtain retrieval accuracy of content based images retrieval systems, the prime notice is on reduction of �semantic gaps� between the visual features and human linguistics than designing low-level feature extraction algorithm. This paper elucidates a comprehensive study on recent technical updates in high-level semantic-based image retrieval. Major recent publications are enclosed during this survey covering different aspects of the research during this space, as well as low-level image feature extraction, similarity mensuration, and deriving high-level linguistics options. We have a tendency to establish 5 major classes of the progressive techniques in narrowing down the� linguistics gap�: (1) victimisation object metaphysics to outline high-level concepts; (2) victimisation machine learning ways to associate low-level options with question concepts; (3) victimisation relevance feedback to find out user�s intention; (4) generating linguistics template to support high-level image retrieval; (5) fusing the evidences from markup language text and also the visual content of pictures for computer network image retrieval. Other connected problems reminiscent of image workand retrieval performance evaluation are mentioned.
Key-Words / Index Term
CBIR,Feedback,Machine Learning,semantic,Linguistic template
References
[1].Gui-Song Xia, Julie Delon, Yann Gousseau �Accurate Junction Detection and Characterization in Natural Images � International Journal of Computer Vision , Volume 106, Issue 1, pp 31�56 ,January 2014.
[2] Herv�J�gou ,Christian Wengert, MatthijsDouze, �Bag-of-colors for improved image search� Proceeding MM `11 Proceedings of the 19th ACM international conference on Multimedia Pages 1437-1440 , ACM New York, NY, USA �2011, ISBN: 978-1-4503-0616-4.
[3] .Dengxin Dai, Luc Van Gool , �Ensemble Projection for Semi-supervised Image Classification � ICCV `13 Proceedings of the 2013 IEEE International Conference on Computer Vision Pages 2072-2079 , IEEE Computer Society Washington, DC, USA �2013
[4] Mamta R. Nagpure, Suchita S. Mesakar, Sonali R. Raut and Vanita P.Lonkar, "Image Retrieval System with Interactive Genetic Algorithm Using Distance", International Journal of Computer Sciences and Engineering, Volume-02, Issue-12, Page No (109-113), Dec -2014,
[5] Dengxin Dai ; Wen Yang �Satellite Image Classification via Two-Layer Sparse Coding With Biased Image Representation� IEEE Geoscience and Remote Sensing Letters ,Volume: 8, Issue: 1,Page(s): 173 � 176, Jan. 2011 .
[6] Emma Izquierdo-Verdiguier ; Luis G�mez-Chova ; Lorenzo Bruzzone ; Gustavo Camps-Valls , � Semi-supervised Nonlinear Feature Extraction For Image Classification� Geoscience and Remote Sensing Symposium (IGARSS), 2012 IEEE International Date of Conference: 22-27, July 2012.
[7] J�gou H1, Douze M, Schmid C.�Product Quantization for Nearest Neighbor Search�, IEEE Trans Pattern Anal Mach Intell. 33(1):117-2, Jan 2011.
[8] L. Haldurai and V. Vinodhini, "Parallel Indexing on Color and Texture Feature Extraction using R-Tree for Content Based Image Retrieval", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (11-15), Nov -2015,
[9] Aasish Sipani, Phani Krishna and Sarath Chandra, "Content Based Image Retrieval Using Extended Local Tetra Patterns", International Journal of Computer Sciences and Engineering, Volume-02, Issue-11, Page No (11-17), Nov -2014
[10] Shraddha S.Katariya and Ulhas B.Shinde, "Review of Content Based Image Retrieval Using Low Level Features", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (91-97), Mar -2016, E-ISSN: 2347-2693
Citation
G. Vidya, S. Omprakash, "Survey on Recent Researches on High Level Image Retrieval," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.72-77, 2016.
Web Resources Development Methdology Based on Web Composition Using Ontology for User�s Optimal Goal
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.78-86, Sep-2016
Abstract
The proposed algorithm expands the meaning of a user�s goal using ontology then derives a group of keywords to discover services and web composition are used to select the web services based on QoS to find the optimality solution of their user goal. The efficiency of the web service matching and composition becomes more important than ever because of the vast number of the web services. For this purpose we propose a web service composition algorithm based on the annotated ontology using semantic matching to achieve exact service for user�s constraint. We design a resource graph to represent the semantic relationship among Web resources. By analyzing the relations among Web resources and using ontologies, A semantic web services would require careful usage combined technologies this semantic web service is realized to show that they ensure interoperability. Four aspects of web services are presented 1) Standard of XML web services 2) Semantic annotation 3) Web service composition 4) Performance Evolution. Our framework can generate ad-hoc processes for composing Web resources. We have built a prototype to demonstrate that the repetitive tasks in the Web resources can be automatically and tracked and the user can change simple Web resources into reusable services by annotating the data with them.
Key-Words / Index Term
Ontology, Service-oriented architecture, Service composition, Service discovery and Web services
References
[1]. R. Alarc�n and E. Wilde. �RESTler: Crawling RESTful services.� In Proceedings of the 19th international conference on World Wide Web, WWW `10, pages 1051{1052, New York, NY, USA, 2010. ACM.
[2]. A. Almonaies, J.R. Cordy, T.R. Dean, "Legacy System Evolution towards Service-Oriented Architecture", Proc. International Workshop on SOA Migration and Evolution (SOAME 2010), Madrid, Spain, pp. 53-62.
[3]. A. Alowisheq, D. E. Millard, and T. Tiropanis, �EXPRESS: EXPressing REstful Semantic Services Using Domain Ontologies.� International Semantic Web Conference 2009: 941-948
[4]. M. Athanasopoulos and K. Kontogiannis, �Identification of REST-like Resources from Legacy Service Descriptions, WCRE 2010.
[5]. D. Beckett, B. McBride (editors), �RDF/XML Syntax Specification (Revised),� W3C Recommendation 10 February, 2004
[6]. B. Upadhyaya, F. Khomh. Y. Zou, A. Lau and J. Ng, A Concept Analysis Approach for Guiding Users in Service Discovery, IEEE International Conference on Service-Oriented Computing and Applications (SOCA`12) , Taipei , Taiwan.
[7]. Rajneesh Shrivastava, Shivlal Mewada and Pradeep Sharma, "An Approach to Give First Rank for Website and Webpage Through SEO", International Journal of Computer Sciences and Engineering, Volume-02, Issue-06, pp (13-17), Jun -2014
[8]. M. P. Carlson, A H. H. Ngu, R. M. Podorozhny, L. Zeng, �Automatic Mash Up of Composite Applications,� International Conference on Service Oriented Computing (ICSOC) 2008, Sydney, Australia, December 1-5, 2008, pages: 317-330
[9]. C. Engelke and C. Fitzgerald, �Replacing Legacy Web Services with RESTful Services,� WS-REST 2010 First International Workshop on RESTful Design
[10]. R. Ennals and D. Gay. �Building Mashups by Example�, Proceedings of IUI (2008)
[11]. R. J. Ennals, M. N. Garofalakis, �MashMaker: mashups for the masses,� Proceedings of the 2007 ACM SIGMOD international conference on Management of data, ACM.
[12]. Yahoo Pipes: Rewire the web, http://pipes.yahoo.com/pipes/
[13]. Animesh Shrivastava and Singh Rajawat, "An Implementation of Hybrid Genetic Algorithm for Clustering based Data for Web Recommendation System", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (6-11), Apr -2014
[14]. I. Foster, C. Kesselman, J. Nick, S. Tuecke, �The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration,� Technical report, Global Grid Forum (2002)
[15]. Dublin Core Metadata Initiative, http://dublincore.org/, last accessed on September 9, 2010
[16]. Facebook, http://www.facebook.com/, last time accessed on August 22, 2011
[17]. R. Fielding. �Architectural Styles and The Design of Network-based Software Architectures�. PhD thesis, University of California, Irvine (2000)
[18]. Flickr, http://www.flickr.com/, last time accessed on Aug. 29, 2011
[19]. Gleaning Resource Descriptions from Dialects of Languages (GRDDL), http://www.w3.org/2004/01/rdxh/spec, lat accessed on October 12, 2010
[20]. B. Upadhyaya, R. Tang and Y. Zou. An approach for mining service composition patterns from execution logs. Journal of Software Evolution and Process; DOI: 10.1002/smr.1565, 2011.
[21]. Hassina Nacer, Djamil Aissani, �Review: Semantic web services: Standards, applications, challenges and solutions�, Journal of Network and Computer Applications, Volume 44, September, 2014 , Pages 134-151
[22]. Mallayya, D., Ramachandran, B., Viswanathan, S(2015) �An Automatic Web Service Composition Framework Using QoS-Based Web Service Ranking Algorithm�,The Scientific World Journal, pp.1-14.
Citation
G. Narayanan, P. Periasamy, "Web Resources Development Methdology Based on Web Composition Using Ontology for User�s Optimal Goal," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.78-86, 2016.
RRDVCR: Real-Time Reliable Data Delivery Based on Virtual Coordinating Routing for Wireless Sensor Networks
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.87-95, Sep-2016
Abstract
Wireless Sensor Networks are being deployed in industrial application which requires routing path that can delivery sensed data in reliable, energy efï¬cient and low end-to-end delay. A velocity based protocol proposed in [13] co-relates velocity offered by two hop neighbor to required delay of application and determines successor node in path to sensed data toward sink. However, velocity based protocol have more control packets overhead. We propose a Real-Time Reliable Data delivery based on Virtual Coordinates Routing (RRDVCR) protocol, which uses the hop count between source and destination instead of geographic distance. Further, process of finding forwarding node is on advancement of packet offered by node�s two-hop neighbor, success probability of link and residual energy at the two-hop neighbor nodes, the data packets are serviced depending on their real-time requirements. To provide differentiated services to each packet, packet progress, link quality and residual energy parameters are co-related by co-relation factor. To reduce control overhead selective acknowledgment scheme is used in proposed protocol. Simulation results of proposed protocol demonstrate that decrease in energy utilization is about 22% and 9.5% in comparison to SPEED [8] and THVR [13] protocol, packet success delivery is about 16% and 38% increase in comparison to THVR [13] and SPEED [8] protocol, and control overhead in proposed protocol is 50% less than THVR[13].
Key-Words / Index Term
Link Reliability, Maximum Transmission Count [MTX], Virtual Coordinating Routing, Dynamic Co-relation Factor: f(rt).
References
[1] Jung J, Park S, Lee E, Oh S, Kim SH �OMLRP: Multi-hop Information Based Real-time Routing Protocol in Wireless Sensor Networks,� IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, 2010.
[2] Y. Li, C. S. Chen, Y.-Q. Song, Z. Wang, and Y. Sun �A Two-Hop Based Real-Time Routing Protocol for Wireless Sensor Networks,� in Proceedings. IEEE WFCS, pp. 65-74 May 2008.
[3] K. S. Prabh and T. F. Abdelzaher �On Scheduling and Real-Time Capacity of Hexagonal Wireless Sensor Networks,� in Proceedings. ECRTS, pp. 136-145, 2007.
[4] J. Polastre, J. Hill, and D. Culler, �Versatile Low Power Media Access for Wireless Sensor Networks� in Proceedings ACM SenSys, pp. 95-107, 2004.
[5] M. A. Spohn and J. J. Garcia-Luna-Aceves, �Enhancing Broadcast Operations in Adhoc Networks with Two-Hop Connected Dominating Sets,� in Proceedings. IEEE MASS, pp. 543-545, 2004.
[6] V. Rajendran, K. Obraczka1, and J. J. Garcia-Luna-Aceves, �Energyefficient, Collision-free Medium Access Control for Wireless Sensor Networks� IEEE Transactions on Mobile Computing, Wireless Networks, vol. 12, no. 1, pp. 63-78, Feb. 2006.
[7] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview & Study of Security Issues in Mobile Ado Networks�, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.
[8] T.He,J.Stankovic, T.Abdelzahar, and C. Lu, �A Spatiotemporal Communication Protocol for Wireless Sensor Networks� IEEE Transaction on Parallel Distributed System, vol. 16, no. 10, pp. 995-1006, October 2005.
[9] Payel Ray, Ranjan Kumar Mondal, Debabrata Sarddar, "Efficient Path Reconstruction for Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (140-146), May -2016
[10] Sujata Agrawal, K.D. Kulat and M. B.Daigavane, "Evaluation of Routing Algorithm for Ad-hoc and Wireless Sensor Network Protocol", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (11-18), Oct -2013
[11] E. Felemban, C. G. Lee, and E. Ekici, �MMSPEED: Multipath MultiSPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks� IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 738-754, June 2006.
[12] O. Chipara, Z. He, G. Xing,Q. Chen, X. Wang, C. Lu, J. Stankovic, and T. Abdelzaher, �Real-time Power-aware Routing in Sensor Networks� in Proceedings 14th IEEE International Workshop Quality Service, pp. 83-92, June 2006.
[13] Yanjun Li, Chung Shue Chen,Ye-Qiong Song, Zhi Wang, Member and Youxian Sun, �Enhancing Real-Time Delivery in Wireless Sensor Networks With Two-Hop Information,� IEEE Transactions on Industrial Informatics, vol. 5, no. 2, pp 113-122, May 2009.
[14] B. Nefzi and Y.-Q. Song, �Performance Analysis and Improvement of Zigbee Routing Protocol,� in Proceedings IFAC FET, pp. 199-206, November 2007.
[15] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014
[16] N. Boughanmi and Y.-Q. Song, �A New Routing Metric for Satisfying Both Energy and Delay Constraints in Wireless Sensor Networks� Journal on Signal Processing System, vol. 51, no. 2, pp. 137-143, 2008.
[17] K. Akkaya and M. Younis, �An Energy-aware QoS Routing Protocol for Wireless Sensor Networks� in Proceedings ICDCS, pp. 710-715, May 2003.
[18] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
[19] Pham Tran Anh Quang and Dong-Sung Kim, �Enhancing Real-Time Delivery of Gradient Routing for Industrial Wireless Sensor Networks� IEEE Transaction on Industrial Informatics., vol. 8, no. 1, pp. 61-68, February 2012.
[20] Jianwei Niu,Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, �R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks� IEEE Transaction on Industrial Informatics, vol. 10, no. 1, pp. 784-794, 2013.
[21] Pradeep Sharma, Shivlal Mewada and Aruna Bilavariya, "Group Rekeying Management Scheme for Mobile Ad-hoc Network", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-05, pp (5-12), Nov -Dec 2013..
[22] Fariborz Entezami, Martin Tunnicliffe, and Christos Politis, �Find the Weakest Link� IEEE Vehicular Technology Magazine, pp. 28-38, September 2014.
[23] J. Jung, S. Park, E. Lee, S. Oh, and S. H. Kim, �OMLRP: Multihop Information Based Real-time Routing Protocol in Wireless Sensor Networks� in Proceedings of IEEE Wireless Communication Network Conference, pp. 1-6 April 2010.
[24] Crossbow Motes, [Online]. Available: http://www.xbow.com.
[25] NS-2,[Online].Available: http://www.isi.edu/nsnam/ns/
Citation
Venkatesh, C.S. Sengar, K.R. Venugopal , S.S. Iyengar, L.M. Patnaik, "RRDVCR: Real-Time Reliable Data Delivery Based on Virtual Coordinating Routing for Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.87-95, 2016.
Colorization of Grayscale Images Using KPE and LBG Vector Quantization Techniques
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.96-102, Sep-2016
Abstract
Colorization is a practice of adding colors to gray scale images and videos. This research aims at replacing each pixel value of grayscale image by the required color pixel value. Adding colors to grayscale images makes them more attractive and observable. It is easy for human visual system to recognize color information more proficiently as compared to gray information. Automation of this process is very important as manual colorization takes a lot of time and effort. In the proposed method, Kekre�s Proportionate Error (KPE) codebook is used and five different vector quantization (VQ) codebook sized alias 32, 64, 128, 256 and 512 are considered. By using eight different color models: RGB, Kekre�s LUV, YCbCr, YUV, YIQ, and Kekre�s Biorthogonal color models and five VQ codebooks, total 40 versions of proposed colorization method are found. Testing is done on 30 images of different classes and results are compared with the existing method of LBG based image coloring. It is observed that the use of higher codebook sizes and YCbCr color model enhances the colorization.
Key-Words / Index Term
Colorization; Codebook; VQ; LBG; KPE; Color Model
References
[1] Ambika Kalia, Balwinder Singh, �Colorization of Grayscale Images: An Overview�, Journal of Global Research in Computer Science, vol. 2, no. 8, pp. 34-37, August 2011.
[2] Ami A. Shah, Mitika Gandhi, Kalpesh M Shah, �Medical Image Colorization using Optimization Technique�, International Journal of Scientific and Research Publications, vol. 3, issue 3, March 2013.
[3] H.B.Kekre, Sudeep D. Thepade, Nikita Bhandari, �Colorization of Grayscale Images using Kekre�s Biorthogonal Color Spaces and Kekre�s Fast Codebook Generation�, CSC Advances in Multimedia- An International Journal (AMIJ), vol. 1, issue 3, pp. 48-58, December 2011.
[4] Sudeep D. Thepade , Padale Supriya, Atul Pawar, �Performance Comparison of Color Spaces in Thepade`s Transform Error Vector Rotation Algorithms of Vector Quantization for Grayscale Image Colorization with Slant and Hartley transforms�, IEEE Conference on Industrial Instrumentation and Control (ICIC), pp. 400-405, May 2015.
[5] H. B. Kekre, Sudeep D. Thepade, �Color Traits Transfer to Grayscale Images�, First International Conference on Emerging Trends in Engineering and Technology, IEEE Conference, pp. 82-85, July 2008.
[6] H. B. Kekre, Dhirendra Mishra, Rakhee S. Saboo, �Comparison of image fusion techniques in RGB & Kekre`s LUV color space�, Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), IEEE Conference, pp. 114-120, Feb 2015.
[7] Sudeep D. Thepade, Vandana Mhaske, Vedant Kurhade, �New Clustering Algorithm for Vector Quantization using Slant Transform�, Emerging Trends and Applications in Computer Science (ICETACS), IEEE Conference, pp. 161-166, Sept 2013.
[8] Bang Huang, Linbo Xie, �An Improved LBG Algorithm for Image Vector Quantization�, Computer Science and Information Technology (ICCSIT), vol. 6, 3rd IEEE International Conference, pp. 467- 471, July 2010.
[9] Dr.H.B.Kekre & Tanuja K. Sarode, �Two-level Vector Quantization Method for Codebook Generation using Kekre�s Proportionate Error Algorithm�, International Journal of Image Processing, vol. 4, issue 1, Jan 2010.
[10] Dr. H. B. Kekre, Dr. Sudeep D. Thepade, Dr. Tanuja K. Sarode, Ms. Nikita Bhandari, �Colorization of Grayscale Images using LBG VQ Codebook for different Color Spaces�, International Journal of Engineering Research and Applications (IJERA), vol. 1, issue 4, pp.1274-1283, Feb 2011.
Citation
N. Bhandari, G. Kaur, "Colorization of Grayscale Images Using KPE and LBG Vector Quantization Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.96-102, 2016.
An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.103-110, Sep-2016
Abstract
: Scheduling and broadcasting of data through network tunnels is always a big challenge in closed network topologies. Each and individual tunnel or part of network will be having its own capacity to transmit and receive the packets. Adoptive and open networks are easy to transmit the data but the challenges will occur in synchronization of data transmission among them. So clustering, tracking, log maintenance of the data transmission among the channels or tunnels and retransmission with respect energy levels and synchronization can be achieved by incremental tracking retransmission (ITR[1]) approach. Energy levels will be monitored by network monitor and assigns scheduling depends on the network capacity of the available methodologies. Here the three methodologies are 1.Memory less channels[2] , 2. Modulated channel[3], 3.Joint and uniform scheduling[4] for data transmission with respect to scheduling. Considerable throughput criteria is framed with incremental flow with our work to end up fair and best accuracy levels. This ITR method is totally unique in open networks. Here open networks means which can adopt with legacy and other adoptive open networks in tunnelling or bridge level transmission. The packet buffering and delivery is always depends on previous cluster or next cluster and chance of losing the packets. So to overcome our work is practically implemented in chunks mechanism. Totally 3 or more chunks will be framed as clusters which acts as incremental growth in transmission with respect to losing of the packets. The central frame work which works as auto deployment methodology to track the tunnels. The loss of frequency is traceable using this frame work and adopts the lost and non lost packets addresses and flushes to next level to fulfil ITR method. The practical implementation depends on asynchronous services to roll back to any level/cluster. The feasible transmission is achieved in incremental level of clusters which will get the log or track information about the data from central frame work.
Key-Words / Index Term
open networks ,topology, clusters, channel , tunnel. ITR
References
[1] L. Georgiadis, M. Neely, and L. Tassiulas, Resource Allocation and Cross-Layer Control in Wireless Networks. Delft, The Netherlands:Now, 2006.
[2] Y. Hawar, at al, �3G UMTS wireless system physical layer:Baseband processing hardware implementation perspective,� IEEECommun. Mag., vol. 44, no. 9, pp. 52�58, Sep. 2006.
[2] J. Padhye, V. N. Padmanabhan, andL.Qiu,�Impactofinterferenceonmulti-hop wireless network performance,�Wireless Netw.,vol.11,pp.471�487, Sep. 2005.
[3] K. Jagannathan, S. Mannor, I. Menache, and E. Modiano, �A state action frequency approach to throughput maximization over uncertain wireless channels,� inProc. IEEE INFOCOM Mini-Conf.,Apr.2011, pp. 491�495
[4] E. Modiano, D. Shah, and G. Zussman, �Maximizing throughput in wireless networks via gossip,� inProc. ACM SIGMETRICS/Perform.,Jun. 2006, pp. 27�38.
[5] M. J. Neely, Stochastic Network Optimization With Application to Communication and Queueing Systems. San Rafael, CA, USA: Morgan & Claypool, 2010.
[6] M. J. Neely, E. Modiano, and C. E. Rohrs, �Dynamic power allocation and routing for time-varying wireless networks,�IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 89�103, Jan. 2005.
[7] M. J. Neely, E. Modiano, and C. E. Rohrs, �Power allocation and routing in multi-beam satellites with time-varying channels,� IEEE Trans. Netw., vol. 11, no. 1, pp. 138�152, Feb. 2003.
[8] M. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. Hoboken, NJ, USA: Wiley, 2005.
[9] V. Raman and N. Vaidya, �Short: A static-hybrid approach for routing real time applications over multichannel, multihop wireless networks,� in Proc. WWIC, Jun. 2006, pp. 77�94.
[10] Rama Koteswara Rao.G , Satya Prasad.R , Patanjali Sastri.A , Prasad.PESN �Enhancing the impregnability of linux Servers, International Journal of network security & its applications(IJNSA) Vol6 ,No2, March2014
[11]S. Tamilarasan1* and P. Kumar2 Dynamic Resource Allocation in Cognitive Radio Networks � Priority Scheduling approach: Literature Survey " JCSE International Journal of computer Sciences and Engineering, Volume-4, ISSUE-9, E-ISSN:2347-2693 (2016)
[12] Manel Guerrero Zapata and N. Asokan: "Securing Ad hoc Routing Protocols". In Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), pages 1-10. September 2002.
[13] Adamson, B., "Tactical Radio Frequency Communication Requirements for IPng", RFC 1677, August 1994.
[14] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview & Study of Security Issues in Mobile Ado Networks�, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.
[15] Zhou L. and Haas Z.J, �Securing Ad Hoc Networks,� IEEE Network Magazine, vol. 13, no. 6, 1999
[16] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, �Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, Aug 2012.
[17] M.Bhuvaneswari and L.VijayaKalyani, "Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects", International Journal of Computer Sciences and Engineering, Volume-02, Issue-09, Page No (90-99), Sep -2014
[18] Mayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014,
[19] Srihari Babu.Kolla and B.B.K. Prasad, "A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (20-25), Apr -2014
[20] Rama Koteswara Rao.G , Satya Prasad.R , Patanjali Sastri.A , Prasad.PESN �Enhancing the impregnability of linux Servers, International Journal of network security & its applications(IJNSA) Vol6 ,No2, March2014
Citation
M.J. Bollarapu and G.R. Rao , "An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.103-110, 2016.
Different approach Analysis for Static Code in Software Development
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.111-118, Sep-2016
Abstract
Static analysis examines program code and reasons over all possible behaviors that might arise at run time. Tools based on static analysis can be used to find defects in programs. Recent technology advances has brought forward tools that do deeper analyses that discover more defects and produce a limited amount of false warnings. The aim of this work is to succinctly describe static code analysis, its features and potential, giving an overview of the concepts and technologies behind this type of approach to software development as well as the tools that enable the usage of code reviewing tools to aid programmers in the development of applications, thus being able to improve the code and correct errors before an actual execution of the code.
Key-Words / Index Term
static analysis, code review, code inspection, source code, bugs, dynamic analysis, software testing, manual review
References
[1] Ernst. M,� Static and dynamic analysis: synergy and duality�, MIT Lab for Computer Science, Cambridge, Workshop on Dynamic Analysis, ICSE�03 International Conference on Software Engineering Portland, Oregon (2003), Volume-05, Issue-07, Page No (9-16), Mar -2003.
[2] McGraw, G, Chess, B.�Static Analysis for Security�, IEEE Computer Society (2004), Volume-03, Issue-05, Page No (21-28), Oct -2004.
[3] Klocwork. �Early bug detection comprehensive coverage�. Klocwork Inc. (2008), http://www.klocwork.com /solutions/defectDetection.asp, Volume-08, Issue-04, Page No (35-41), Aug -2008.
[4] Humphrey, W,� The Personal Software ProcessSM (PSPSM)�, Carnegie Mellon University, Massachusetts (2000), IJCSCL, Volume-05, Issue-07, Page No (58-66), Mar -2000.
[5] Faria, J. P,� Software Reviews and Inspections�, FEUP, Porto(2008), Volume-09, Issue-02, Page No (36-42), June -2008.
[6] Basili, V,�Experimentation in Software Engineering. Experimental Software Engineering Group�, IJRIT, Volume-08, Issue-05, Page No (96-103), Mar -2002.
[7] Emanuelsson, P.Nilsson, �A Comparative Study of Industrial Static Analysis Tools�, University Electronic Press (2008),IJAR, Volume-03, Issue-08, Page No (221-228), July -2008.
Citation
N. Sudheer, S.H. Raju, "Different approach Analysis for Static Code in Software Development," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.111-118, 2016.
Password Authentication in Wireless Networking using Neural Network Techniques
Review Paper | Journal Paper
Vol.4 , Issue.9 , pp.119-122, Sep-2016
Abstract
There are various mechanisms that provide security to the users and resources in Wireless Networking. Password authentication is one of the important procedure that enhance the security measures of the system. Drawbacks of traditional password authentication system like stolen, forgotten etc. are overcome by the technologies used for authentication mechanism like Neural Network approaches. In this paper, the two algorithms of Neural Network have been taken for conducting the experiment. Neural Network is an emerging field of Artificial Intelligence that works like a human brain. One is the Backpropagation algorithm which follows feed forward procedure and the second one is Hopfield Neural Network which works on auto associative properties of the network.
Key-Words / Index Term
Backpropagation algorithm; Hopfield Neural Network; Password authentication; Wireless Networking
References
[1] 802.11a: A Very-High-Speed, Highly Scalable Wireless LAN Standard, White Paper, www.proxim.com, 2002.
[2] L. Sachin, �Security in MANET: Vulnerabilities, Attacks and Solutions�, International Journal of Multidisciplinary and current research, Volume.02, Page No (62-68), Jan-Feb 2014.
[3] Shivlal Mewada, Aarti Shrivastava, Pradeep Sharma, N Purohit and S.S. Gautam" Performance Analysis of Encryption Algorithm in Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-03, Issue-03, pp (83-89), Jun -2014
[4] K. Sumedha, S. Ankur, �Network Security using Cryptographic Techniques�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume.02, Issue-12, Page No (105-107), December 2012.
[5] C. Zhen-Guo, C. Tzu-an, C. Zhen-Hua, �Feed Forward Neural Networks Training: a Comparison Between Genetic Algorithm and Back-Propagation Learning Algorithm�, International Journal of Innovative Computing , Information and Control, Volume.07, Isuue-10, Page No (5839-5850), October 2011.
[6] Neha Shukla, Meena Arora, "Prediction of Diabetes Using Neural Network & Random Forest Tree", International Journal of Computer Sciences and Engineering, Volume-04, Issue-07, Page No (101-104), Jul -2016
[7] I. Mukhopadhyay, M. Chakraborty, S. Chakrabarti, T. Chatterjee, � Back Propagation Neural Network Approach to Intrusion Detection�, IEEE International Conference on Recent Trends in Information Systems, pp (303-308), December 21th-23rd 2011, INSPEC Accession Number: 12542068.
[8] Dahiya. M, �Back Propagation Neural Network for Wireless Networking�, International Journal of Computer Science and Engineering, Volume.04, Issue-04, Page No (123-125), May 2016.
[9] ASN Chakravarthy, P S Avadhani, PESN Krishna Prasad, N. Rajeev, D. Rajasekhar Reddy, �A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network�, Advanced Computing: An International Journal (ACIJ), Volume.02, Issue-04, Page No (33-46), July 2011.
[10] Shouhong Wang and Hai Wang, �Password Authentication using Hopfield Neural Network�, IEEE Transactions on Systems, Man and Cybernetics- Part C: Applications and Reviews, Volume.38, Issue-02, Page No (265-268), March 2008.
[11] J.Suneetha and K.Sandhya Rani, "Recognition of Facial Expression Using AAM and Optimal Neural Networks", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (136-140), Apr -2016
[12] S. Humayun, Ye. Zhang, � Hopfield Neural Networks- A Survey�, AIKED�07 Proceedings of the 6th conference on 6th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Databases, Greece, pp (125-130), February 16th-19th 2007, ISBN: 978-960-8457-59-1.
Citation
M. Dahiya, "Password Authentication in Wireless Networking using Neural Network Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.119-122, 2016.
Text Mining of Unstructured Data Using R
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.123-130, Sep-2016
Abstract
Text mining is the process of acquiring high-quality information from text that is typically borrowed through the devising of patterns and trends such as statistical pattern learning .It usually involves the process of structuring the input text, deriving patterns within the structured data and finally evaluation and interpretation of the output. It can help an organization to acquire potentially valuable business insights from text-based content such as word documents, email and postings on social media streams like Facebook, Twitter and LinkedIn. Mining unstructured data with natural language processing (NLP), statistical modeling and machine learning techniques can be challenging because natural language text is often inconsistent. So, R is used to mine unstructured data which is the most exhaustive statistical analysis package and it incorporates all of the standard statistical tests, models and analyses for managing and manipulating data.
Key-Words / Index Term
R ,S,Text mining,Statistical Modeling
References
[1] Mr. Rahul Patel, Mr. Gaurav Sharma,�A survey on text mining techniques�, Int. Journal of Engineering and Computer Science, Volume-03, Issue 5, Page No. (5621-5625), May 2014.
[2] Minakshi R. Shinde1, Parmeet C. Gill, �Pattern Discovery Techniques for the Text Mining and its Applications�, Int. Journal of Science and Research (IJSR), Volume-03 Issue 5, May 2014.
[3] S.S. Patil and V.M. Gaikwad , "Developing New Software Metric Pattern Discovery for Text Mining", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (119-125), Apr -2014
[4] Abhilasha Singh Rathor, Dr. Pankaj Garg,� Analysis on Text Mining Techniques�, Int. Journal of Advanced Research in Computer Science and Software Engineering, Volume -06, Issue 2, Page No (132-137), February 2016.
[5] Vishakha D. Bhope and Sachin N. Deshmukh, �Comparative Study on Information Retrieval Approaches for Text Mining�, Int. Journal of Computer Sciences and Engineering, Volume-03, Issue-3, Page No (102-106), Mar 2015.
[6] Vishakha D. Bhope and Sachin N. Deshmukh, "Comparative Study on Information Retrieval Approaches for Text Mining", International Journal of Computer Sciences and Engineering, Volume-03, Issue-03, Page No (102-106), Mar -2015
[7] StatisticalModeling,https://en.wikipedia.org/wiki/Statistical_model, June 2016.
Citation
M.S. Lakshmi, M.D.A. Sultana, "Text Mining of Unstructured Data Using R," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.123-130, 2016.
Smart Wireless Attendance System
Research Paper | Journal Paper
Vol.4 , Issue.9 , pp.131-137, Sep-2016
Abstract
This paper describes a method for attendance monitoring through a wireless network of smart devices (IoT). Today, IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. The basic premise here is to have smart sensors collaborate directly without human involvement to deliver a new class of application. Compared with the existing technology where local sensors are deployed to monitor attendance OR where often the technology is barely used requiring human intervention, our intention here is to provide a hassle free system which is mobile and requires no human intervention (except for the unavoidable initial set-up). Not only our solution eradicates the burden on human resource but also, provides a convenient way to interact by hosting a web-page for viewing the attendance report of every student.
Key-Words / Index Term
Biometric attendance, Mobile attendance monitoring, Internet of Things
References
[1] Y. F. Solahuddin, W. Ismail �Data fusion for reducing power consumption in Arduino-Xbee wireless sensor network platform� IEEE Computer and Information Sciences (ICCOINS), 2014 International Conference on
[2] Maltoni Davide, Maio Dario, K. Jain Anil and Salil Prabhakar, "Handbook of Fingerprint Recognition" in , 2009, Springer.
[3] A. K. Jain, F. Patrick and A. Arun, "Handbook of Biometri cs" in , pp. 1-42, 2008, Springer, science Business Media, LLC.
[4] J. Sun and X. Zhang, "Study of zig8ee wireless mesh networks", 2009 Ninth International Conference on Hybrid Intelligent Information Systems and Systems vo1.02, 2009.
[5] James A. Storer, Data Compression Methods and Theory, vol. 413, 1988, Computer Science Press, ISBN -10: 0716781565.
[6] I Made Agus, Dwi Suarjaya,� A New Algorithm for Data Compression Optimization�(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.8, 2012
[7] Obulapu Hiteshreddy, Pardeep Singh and Siddharth Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-08, Page No (37-45), Aug -2015.
[8] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview & Study of Security Issues in Mobile Ado Networks�, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.ISSN: 1947-5500.
[9] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
Citation
S.C. Kohalli, R. Kulkarni, M. Salimath, M. Hegde, R. Hongal, "Smart Wireless Attendance System," International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.131-137, 2016.