CLASDN- An Extension in Networking for Efficient Multimedia Data Transmission
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.83-88, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.8388
Abstract
Network communication has been experiencing major changes over the last few decades as the number of Internet applications is increasing at an exponential rate. The devices that are used to access the internet, the applications that are accessed over the internet and the types of networks are changing continuously. Although layering is based on sound engineering principles and was a huge success in wired networks, the layered stack of protocols is not tuned to handle multimedia applications in interactive environment and to address this cross-layer conception is envisioned. Cross-layer collaborations can work between an existing stack of protocols and are a promising solution. To exploit adaptability cross-layering allows sharing across protocols and layers and allows information exchange. In this paper, we proposed a working technique called Cross-Layer Approach-based Software Defined Networking (CLASDN) technique that makes the multimedia delivery effectually in networks.
Key-Words / Index Term
Networking, Software Defined Network, Multimedia, Transmission Cross-layer
References
[1] G.N. Vivekananda, and P. Chenna Reddy, "Critical analysis of Cross-layer approach," Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on. IEEE, pp.12-16, 2015.
[2] Global SDN market by services between 2014 – 2024. https://www.reuters.com/brandfeatures/venture-capital/article?id=54081
[3] SDN Market analysis. https://www.marketresearchfuture.com/reports/software-defined-networking-market-1607
[4] G.N. Vivekananda, and P. Chenna Reddy, " Packet Loss Minimizing Approach Based on Traffic Prediction for Multi-streaming Communication over MANET,” Int. J. Advanced Media and Communication, 2018.
[5] G.N. Vivekananda, and P. Chenna Reddy, " A Congestion Avoidance Mechanism in Multimedia Transmission over MANET using Multi-streaming,” Springer, 2018. doi: 10.1007/s10586-018-2602-4.
[6] G.N. Vivekananda, and P. Chenna Reddy, " Efficient Video Transmission Technique using Clustering and Optimization Algorithms in MANETs,” Int. J. Advanced Intelligence Paradigms, 2018.
[7] G.N. Vivekananda, and P. Chenna Reddy. "Critical Analysis of Congestion Control for the Future Networks." Emerging Trends in Electrical, Communications and Information Technologies. Springer, pp.175-181, Singapore, 2017.
[8] Cheng, Rung-Shiang, and Hui-Tang Lin, "A cross-layer design for TCP end-to-end performance improvement in multi-hop wireless networks," Computer Communications, Vol.31, No.14, pp.3145-3152, 2008.
[9] Xie, Fei, Kien A. Hua, and Ning Jiang, "A cross-layer framework for video-on-demand service in multi-hop WiMax mesh networks," Computer communications, Vol.31, No.8, pp.1615-1626, 2008.
[10] Chen, Lijun, Steven H. Low, and John C. Doyle, "Cross-layer design in multihop wireless networks," Computer Networks, Vol.55, No.2, pp.480-496, 2011.
[11] Scheuermann, Björn, Christian Lochert, and Martin Mauve, "Implicit hop-by-hop congestion control in wireless multihop networks," Ad Hoc Networks, Vol. 6, No.2, pp.260-286, 2008.
[12] Yaghmaee, Mohammad Hossein, and Donald A. Adjeroh, "Priority-based rate control for service differentiation and congestion control in wireless multimedia sensor networks," Computer Networks, Vol.53, No.11, pp.1798-1811, 2009.
[13] Fu, Bo, "A survey of cross-layer designs in wireless networks," IEEE Communications Surveys & Tutorials, Vol. 16, No.1, pp.110-126, 2014.
[14] Rosario, Denis, "Assessment of a robust opportunistic routing for video transmission in dynamic topologies," Wireless Days (WD), IFIP. IEEE, 2013.
[15] Hakiri, Akram, "Software-defined networking: Challenges and research opportunities for future internet," Computer Networks, Vol. 75, pp.453-471, 2014.
[16] Xia, Wenfeng, "A survey on software-defined networking," IEEE Communications Surveys & Tutorials, Vol.17, No.1,pp.27-51, 2015.
[17] Jammal, Manar, "Software-defined networking: State of the art and research challenges," Computer Networks, Vol. 72, pp.74-98, 2014.
[18] Gong, Yili, "A survey on software-defined networking and its applications," Frontiers of Computer Science, Vol. 9, No.6, pp. 827-845, 2015.
[19] Foukas, Xenofon, Mahesh K. Marina, and Kimon Kontovasilis, "Software Defined Networking Concepts," Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture, Vol.21, 2015.
[20] Son, Jungmin, and Rajkumar Buyya, "A Taxonomy of Software-Defined Networking (SDN)-Enabled Cloud Computing," ACM Computing Surveys (CSUR), Vol. 51, No. 3, 2018.
[21] Venkatraman, G. I. K, and G. Ilakkia, "Wireless network managed through sdn," International Journal of Computer Science and Mobile Computing, Vol. 2, No. 11, pp.155-160, 2013.
[22] N. Nikalje, and S.R. Devane, “Improvement in Gain and Bandwidth using Current Mode Technique,” International Journal of Scientific Research in Network Security and Communication, Vol.5 , No.1 , pp.1-5, Apr-2017.
[23] J. Srilakshmi, S.S.S.N. Usha Devi N., Secure and Efficient Multipath Routing Using Overlay Nodes, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.6, No..5, pp.16-19, Oct-2018
Citation
S. Vasundra, D. Venkatesh, "CLASDN- An Extension in Networking for Efficient Multimedia Data Transmission," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.83-88, 2018.
A Router based Hybrid Approach for Congestion Control in High speed Wired Networks
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.89-100, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.89100
Abstract
Efficient management of congestion problem in High speed wired networks is a challenging issue due to higher bandwidth, large queuing delay, high burstiness and heterogeneous traffic flows. In this paper a hybrid router based mechanism New-Fair-Queuing-CoDel (nfqCoDel) has been proposed by incorporating the functionality of both, a packet scheduler and active queue manager in a single module called ‘Fair Active Queue Manager (FAQM)’. nfqCoDel actively manage the router queue length with an objective to control the excessive delay experienced by source host and maintain the weighted fairness among different hosts. Thus nfqCoDel is able to solve the buffer-bloat issue while providing weighted fairness among different sources. Simulation results, implemented in NS-2, prove that ‘nfqCoDel’ performs better than other AQMs by providing maximum and stable throughput, stable average queue length, controlled delay at router buffer and weighted fairness among competing traffic sources.
Key-Words / Index Term
High Speed Networks, Congestion Control, Fair Queuing Approach, Active Queue Management, Buffer-Bloat
References
[1] J. Gettys, K. Nichols, “Bufferbloat: dark buffers in the internet”. Communications of the ACM, Vol.55 (1), pp: 57-65, 2012.
[2] H. To, T M Thi, W Hwang, “Cascade Probability Control to Mitigate Bufferbloat under Multiple Real-World TCP Stacks” in Special Issue of Control Problem of Nonlinear Systems with Applications, Mathematical Problems in Engineering, vol.2015, 2015.
[3] S. Floyd, V. Jacobson, “Random early detection gateways for congestion avoidance”. IEEE/ACM Transactions on Networking, Vol.1 (4), pp: 397–413, 1993.
[4] V. P. Rao, Mohit P. Tahiliani, Udaya Kumar K. Shenoy, “Analysis of sfqCoDel for Active Queue Management”, Applications of Digital Information and Web Technologies (ICADIWT), 2014.
[5] K. Nichols, V. Jacobson, “Controlling queue delay”. Communications of the ACM, Vol.55 (7), pp: 42-50, 2012.
[6] T. Hoeiland-Joergensen et al., “The Flow Queue CoDel Packet Scheduler and Active Queue Management Algorithm” RFC 8290, January 2018.
[7] Ns-2 Network Simulator. (n. d.). Retrieved from: 〈http://www.isi.edu/nsnam/ns/〉.
[8] D. Leith, R. Shorten, “H-TCP: TCP for high-speed and long distance networks”. In: Proceedings of the PFLDnet, 2004.
[9] K. Tan, J. Song, “Compound TCP: a scalable and TCP-friendly congestion control for high-speed networks”. In Proc. 4th International Workshop on Protocols for FAST Long-Distance Networks, 2006.
[10] I. Rhee, L. Xu, “CUBIC: a new TCP-friendly high-speed TCP variant”. SIGOPS Operating System Review, Vol.42 (5), pp: 64–74, 2008.
[11] L. Xue et al., “Afcd: An approximated-fair and controlled-delay queuing for high speed networks”. In proceeding of 22nd International Conference on Computer Communications and Networks (ICCCN), pp: 1-7. IEEE, 2013.
[12] C. Vijith C and M. Azath, “Survey on CHOKe AQM Family”, International Journal of Computer Science International Journal of Computer Sciences and Engineering, Volume-2, Issue-11, pp- 81-85, 2014.
[13] R. Pan et al., “PIE: a lightweight control scheme to address the bufferbloat problem”, in Proc.of the IEEE International Conference on High Performance Switching and Routing (HPSR), Jul. 2013.
[14] M. H. MacGregor, W. Shi, “Deficits for Bursty Latency critical Flows: DRR++”, Proc. IEEE ICON ‘00, Singapore, pp: 287-293, 2000.
[15] G. Hong, J. Martin, J. M. Westall, “On fairness and application performance of active queue management in broadband cable networks”. Computer Network. 91, 390–406, 2015.
[16] R. Al-Saadi, G. Armitage, “Dummynet AQM v0.2 – CoDel, FQ-CoDel, PIE and FQ-PIE for FreeBSD’s ipfw/dummynet framework,” Centre for Advanced Internet Architectures, Swinburne University of Technology, Melbourne, Australia, Tech. Rep. 160418A, 18 April 2016.
[17] N. S. Ko, M. H. Kim, H. S. Park, “FD-AQM: Fairness-Aware Delay-Controlled Active Queue Management in 802.11s-Based Multi-Radio Multi-Channel Wireless Mesh Networks”, IEEE Communications Letters, Vol. 19, No. 5, pp: 839-842, 2015.
[18] X. Jiang, G. Jin, “CFD: an efficient active queue management algorithm with CFD”, Electronics Letters IET, Vol. 52, Issue. 24, pp: 2015-2017, 2016.
[19] M. Menth, S. Veith, “Active Queue Management Based on Congestion Policing (CP-AQM)”. In Proceeding of International Conference on Measurement, Modelling and Evaluation of Computing Systems. LNCS, Vol. 10740, pp: 173-187, 2018.
[20] G. Armitage, R. Collom, “Benefits of FlowQueue-based Active Queue Management for Interactive Online Games”, In Proceeding of 26th International Conference on Computer Communications and Networks (ICCCN 2017), Vancouver, BC, Canada, 2017.
[21] J. Ye, K. C. Leung and V. O. K. Li, S. H. Low,”Combating Bufferbloat in Multi-Bottleneck Networks: Equilibrium, Stability, and Algorithms”, Centre for Advanced Internet Architectures, Swinburne University of Technology, Melbourne, Australia, Tech. Rep. 2018-001, 2018.
[22] V. Ganesh Babu and K.Saraswathi, “Packet Mark Methodology for Reduce the Congestion”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 1, pp: 39-42, 2013.
[23] G.P. Sunitha , B.P. Vijay Kumar , S.M. Dilip Kumar, “A Nature Inspired Optimal Path Finding Algorithm to Mitigate Congestion in WSNs”, International Journal of Scientific Research in Network Security and Communication, Volume-6, Issue-3, June 2018.
[24] V. Kushwaha , R. Gupta, “Congestion control for high-speed wired network: a systematic literature review“. Journal of Network and Computer Applications, Vol.45, pp: 62–78, 2014.
[25] S. Ryu, C. Rump, C. Qiao, “Advances in active queue management (AQM) based TCP congestion control”. Telecommunication Systems, Vol. 25(3–4), pp: 317–351, 2004.
[26] S. Ramabhadran,J. Pasquale, “The Stratified Round Robin Scheduler: Design, Analysis, and Implementation”, IEEE/ACM Transactions on Networking, Vol. 14(6), pp: 1362-1373, 2006.
Citation
V. Kushwaha, R. Gupta, "A Router based Hybrid Approach for Congestion Control in High speed Wired Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.89-100, 2018.
Color Directional Binary Code for Image Indexing and Retrieval
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.101-106, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.101106
Abstract
This research paper proposes a novel algorithm meant for image indexing and retrieval, by integrating color and texture features. First, the RGB image is converted to HSV space, then these space features are collected by constructing H & S space histograms and texture features, which are collected from V space of an image by Directional Binary Code (DBC). In the proposed algorithm both, color histograms and texture feature, are then concatenated to generate the feature vector. Using feature vector of query image, similar images are then extracted using different distance measures. The retrieval results for this proposed algorithm is tested over Corel 1000 image database. After investigation, results demonstrate the substantial improvement in terms of retrieval precision and recall as equated to LBP, DBC feature algorithms.
Key-Words / Index Term
Feature Extraction, Local Binary Patterns, Directional Binary Code, Texture, Pattern Recognition, Image Retrieval.
References
[1] Y. Rui and T. S. Huang, “Image retrieval: Current techniques, promising directions and open issues”, J.. Vis. Commun. Image Represent., 10 (1999) 39–62.
[2] A. W.M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain,” Content-based image retrieval at the end of the early years”, IEEE Trans. Pattern Anal. Mach. Intell., 22 (12) 1349–1380, 2000.
[3] M. Kokare, B. N. Chatterji, P. K. Biswas, “A survey on current content based image retrieval methods”, IETE J. Res., 48 (3&4) 261–271, 2002.
[4] Ying Liu, Dengsheng Zhang, Guojun Lu, Wei-Ying Ma, “A survey of content-based image retrieval with high-level semantics”, Elsevier J. Pattern Recognition, 40, 262-282, 2007.
[5] M. J. Swain and D. H. Ballar, “Indexing via color histograms”, Proc. 3rd Int. Conf. Computer Vision, Rochester Univ., NY, (1991) 11–32.
[6] M. Stricker and M. Oreng, “Similarity of color images”, Proc. SPIE, Storage and Retrieval for Image and Video Databases, (1995) 381–392.
[7] G. Pass, R. Zabih, and J. Miller, “Comparing images using color coherence vectors”, Proc. 4th ACM Multimedia Conf., Boston, Massachusetts, US, (1997) 65–73.
[8] J. Huang, S. R. Kumar, and M. Mitra, “Combining supervised learning with color correlograms for content-based image retrieval”, Proc. 5th ACM Multimedia Conf., (1997) 325–334.
[9] Z. M. Lu and H. Burkhardt, “Colour image retrieval based on DCT domain vector quantization index histograms”, J. Electron. Lett., 41 (17) (2005) 29–30.
[10] J. R. Smith and S. F. Chang, “Automated binary texture feature sets for image retrieval”, Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Columbia Univ., New York, (1996) 2239–2242.
[11] H. A. Moghaddam, T. T. Khajoie, A. H Rouhi and M. Saadatmand T., “Wavelet Correlogram: A new approach for image indexing and retrieval”, Elsevier J. Pattern Recognition, 38 (2005) 2506-2518.
[12] H. A. Moghaddam and M. Saadatmand T., “Gabor wavelet Correlogram Algorithm for Image Indexing and Retrieval”, 18th Int. Conf. Pattern Recognition, K.N. Toosi Univ. of Technol., Tehran, Iran, (2006) 925-928.
[13] A. Ahmadian, A. Mostafa, “An Efficient Texture Classification Algorithm using Gabor wavelet”, 25th Annual international conf. of the IEEE EMBS, Cancun, Mexico, (2003) 930-933.
[14] H. A. Moghaddam, T. T. Khajoie and A. H. Rouhi, “A New Algorithm for Image Indexing and Retrieval Using Wavelet Correlogram”, Int. Conf. Image Processing, K.N. Toosi Univ. of Technol., Tehran, Iran, 2 (2003) 497-500.
[15] M. Saadatmand T. and H. A. Moghaddam, “Enhanced Wavelet Correlogram Methods for Image Indexing and Retrieval”, IEEE Int. Conf. Image Processing, K.N. Toosi Univ. of Technol., Tehran, Iran, (2005) 541-544.
[16] M. Saadatmand T. and H. A. Moghaddam, “A Novel Evolutionary Approach for Optimizing Content Based Image Retrieval”, IEEE Trans. Systems, Man, and Cybernetics, 37 (1) (2007) 139-153.
[17] L. Birgale, M. Kokare, D. Doye, “Color and Texture Featuresfor Content Based Image Retrieval”, International Conf. Computer Grafics, Image and Visualisation, Washington, DC, USA, (2006) 146 – 149.
[18] M. Subrahmanyam, A. B. Gonde and R. P. Maheshwari, “Color and Texture Features for Image Indexing and Retrieval”, IEEE Int. Advance Computing Conf., Patial, India, (2009) 1411-1416.
[19] Subrahmanyam Murala, R. P. Maheshwari, R. Balasubramanian, “A Correlogram Algorithm for Image Indexing and Retrieval Using Wavelet and Rotated Wavelet Filters”, Int. J. Signal and Imaging Systems Engineering.
[20] T. Ojala, M. Pietikainen, D. Harwood, “A comparative sudy of texture measures with classification based on feature distributions”, Elsevier J. Pattern Recognition, 29 (1): 51-59, 1996.
[21] T. Ojala, M. Pietikainen, T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns”, IEEE Trans. Pattern Anal. Mach. Intell., 24 (7): 971-987, 2002.
[22] M. Pietikainen, T. Ojala, T. Scruggs, K. W. Bowyer, C. Jin, K. Hoffman, J. Marques, M. Jacsik, W. Worek, “Overview of the face recognition using feature distributions”, Elsevier J. Pattern Recognition, 33 (1): 43-52, 2000.
[23] T. Ahonen, A. Hadid, M. Pietikainen, “Face description with local binary patterns: Applications to face recognition”, IEEE Trans. Pattern Anal. Mach. Intell., 28 (12): 2037-2041, 2006.
[24] G. Zhao, M. Pietikainen, “Dynamic texture recognition using local binary patterns with an application to facial expressions”, IEEE Trans. Pattern Anal. Mach. Intell., 29 (6): 915-928, 2007.
[25] M. Heikkil;a, M. Pietikainen, “A texture based method for modeling the background and detecting moving objects”, IEEE Trans. Pattern Anal. Mach. Intell., 28 (4): 657-662, 2006.
[26] X. Huang, S. Z. Li, Y. Wang, “Shape localization based on statistical method using extended local binary patterns”, Proc. Inter. Conf. Image and Graphics, 184-187, 2004.
[27] M. Heikkila, M. Pietikainen, C. Schmid, “Description of interest regions with local binary patterns”, Elsevie J. Pattern recognition, 42: 425-436, 2009.
[28] M. Li, R. C. Staunton, “Optimum Gabor filter design and local binary patterns for texture segmentation”, Elsevie J. Pattern recognition, 29: 664-672, 2008.
[29] B. Zhang, Y. Gao, S. Zhao, J. Liu, “Local derivative pattern versus local binary pattern: Face recognition with higher-order local pattern descriptor”, IEEE Trans. Image Proc., 19 (2): 533-544, 2010.
[30] B. Zhang, L. Zhang, D. Zhang, L. Shen, “Directional binary code with application to PolyU near-infrared face database”, Pattern Recognition Letters 31 (2010) 2337–2344.
[31] N. Jhanwara, S. Chaudhuri, G. Seetharamanc, and B. Zavidovique, “Content based image retrieval using motif co-occurrence matrix””, Image and Vision Computing 22, (2004) 1211–1220.
[32] C H Lin, Chen R T, Chan Y K A., Smart content-based image retrieval system based on color and texture feature”, Image and Vision Computing 27 (2009) 658-665.
[33] Corel 1000 and Corel 10000 image database. [Online]. Available: http://wang.ist.psu.edu/docs/related.shtml.
Citation
M. V. Bonde, D. D. Doye, "Color Directional Binary Code for Image Indexing and Retrieval," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.101-106, 2018.
Distributed Efficient Joint Resource Allocation using Conjugate Gradient Method for Software-Defined Networking
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.107-112, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.107112
Abstract
Network operators run various applications on the control platform to perform different management tasks, like routing, monitoring, load balancing and firewall. These applications have complex interactions with each other, making it difficult to deploy and reason about their behaviours. To solve these kinds of problem, this paper presents a Distributed efficient joint resource allocation using conjugate gradient method (DEJRA-CG) is to accurately calculate the average energy consumption for all case in the dynamic network. The proposed method follows a SDN model for finding the Shortest Distances in gradient search estimation was formulated using three algorithms, namely Resource Allocation, Searching algorithm and Distributed Power Efficient Scheduling algorithm based on the identified network path in SDN. According to the experimental results the proposed algorithm mainly focused on SDN based caching and computing time using MATLAB R2013a platform. The achieved DEJRA-CG has less distance variation with less computation time when comparing to Building the Dependency Graph and software-defined networking, caching, and computing (SD-NCC) algorithms.
Key-Words / Index Term
Networking, caching, computing, resource allocation, energy efficient
References
[1] J. Baliga, R. W. A. Ayre, K. Hinton, and R. S. Tucker, “Green cloud computing: Balancing energy in processing, storage, and transport,” Proc. IEEE, vol. 99, no. 1, pp. 149–167, Jan. 2011.
[2] N. Choi, K. Guan, D. C. Kilper, and G. Atkinson, “In-network caching effect on optimal energy consumption in content-centric networking,” in Proc. IEEE ICC, Jun. 2012, pp. 2889–2894.
[3] S. Salsano, N. Blefari-Melazzi, A. Detti, G. Morabito, and L. Veltri, “Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed,” Comput. Netw., vol. 57, no. 16, pp. 3207–3221, Nov. 2013.
[4] A. Chanda and C. Westphal, “ContentFlow: Adding content primitives to software defined networks,” in Proc. IEEE GLOBCOM, Dec. 2013, pp. 2132–2138.
[5] B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, “DDoS attack protection in the era of cloud computing and software-defined networking,” in Proc. IEEE 22nd Int. Conf. Netw. Protocols, Oct. 2014, pp. 624–629.
[6] D. Kreutz, F. Ramos, P. E. Veríssimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-defined networking: A comprehensive survey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.
[7] G. Liu, F. R. Yu, H. Ji, and V. C. M. Leung, “Virtual resource management in green cellular networks with shared full-duplex relaying and wireless virtualization: A game-based approach,” IEEE Trans. Veh. Technol., vol. 65, no. 9, pp. 7529–7542, Sep. 2016.
[8] B. Wang, W. Song, W. Lou, and Y. T. Hou, “Privacy-preserving pattern matching over encrypted genetic data in cloud computing,” in Proc. IEEE INFOCOM, May 2017, pp. 1–9.
[9] Q. Chen et al., “An integrated framework for software defined networking, caching, and computing,” IEEE Netw., vol. 31, no. 3, pp. 46–55, May/Jun. 2017.
[10] Qingxia Chen, F. Richard Yu, Tao Huang, Renchao Xie, Jiang Liu, and Yunjie Liu, “Joint Resource Allocation for Software-Defined Networking, Caching, and Computing”, IEEE/ACM Transactions on Networking, vol. 26, no. 1, February 2018.
Citation
Roshna. K, B. Rosiline Jeetha, "Distributed Efficient Joint Resource Allocation using Conjugate Gradient Method for Software-Defined Networking," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.107-112, 2018.
Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.113-119, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.113119
Abstract
A wireless sensor network includes incalculable number of nodes spread over a specific region, where we have to deal with the movements proceeding there. A sensor center, generally, contains sensors, actuators, memory, a processor and they do have correspondence limit. These sorts of networks are much feeble against security attacks. Numerous sorts of dynamic and detached attacks are possible in the sensor network. Among all the possible dynamic attacks, selective forwarding attack is the most generally perceived and ruinous attack. This attack degrades network execution and prompts denial of service attack. The malicious hub activates the attack, which is accessible in the network. In this work, a novel technique has been proposed to perceive and withdraw malicious nodes from the network, which is responsible for triggering the attack. The proposed technique depends on the threshold technique for recognition of malicious nodes. The exploratory outcomes will exhibit that proposed methodology distinguishes and separate the malicious nodes from the network capably. It will upgrade network adequacy to the extent package adversity, concede and grow throughput of the network. NS2 simulator instrument will be used as a piece of it.
Key-Words / Index Term
Wireless, Sensor Network, Sink Node, Sensor Node, Blackhole Attack, Denial of Service Attack, Selective Forwarding Attack, Collision Attack, Man-In-The-Middle Attack, Misdirection Attack, Node Replication Attack, Wormhole Attack
References
[1] Ali, S., Al Balushi, T., Nadir, Z., & Hussain, O. K. (2018). WSN Security Mechanisms for CPS. In Cyber Security for Cyber Physical Systems (pp. 65-87). Springer, Cham.
[2] Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
[3] Raghunandan, G. H., & Lakshmi, B. N. (2011, February). A comparative analysis of routing techniques for Wireless Sensor Networks. In Innovations in Emerging Technology (NCOIET), 2011 National Conference on (pp. 17-22). IEEE.
[4] younis Abdullah, M., Hua, G. W., & Alsharabi, N. (2008, June). Wireless sensor networks misdirection attacker challenges and solutions. In Information and Automation, 2008. ICIA 2008. International Conference on (pp. 369-373). IEEE.
[5] Sachan, R. S., Wazid, M., Singh, D. P., Katal, A., & Goudar, R. H. (2013, January). Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction. In Intelligent Systems and Control (ISCO), 2013 7th International Conference on (pp. 427-432). IEEE.
[6] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393-422.
[7] Bhushan, B., & Sahoo, G. (2018). Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks. Wireless Personal Communications, 98(2), 2037-2077.
[8] Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
[9] Sachan, R. S., Wazid, M., Singh, D. P., & Goudar, R. H. (2013, April). A cluster based intrusion detection and prevention technique for misdirection attack inside WSN. In Communications and Signal Processing (ICCSP), 2013 International Conference on (pp. 795-801). IEEE.
[10] Rani, L., & Rani, E. V. A Novel Study on Data Flow Routing with Energy Optimization under Different Attacks in WSN.
[11] Modares, H., Salleh, R., & Moravejosharieh, A. (2011, September). Overview of security issues in wireless sensor networks. In 2011 Third International Conference on Computational Intelligence, Modelling & Simulation (pp. 308-311). IEEE.
[12] Dhulkar, R., Pokharkar, A., & Pise, M. R. (2015). Survey on different attacks in Wireless Sensor Networks and their prevention system.
[13] Jadidoleslamy, H. (2011). A hierarchical intrusion detection architecture for wireless sensor networks. International Journal of Network Security & Its Applications, 3(5), 131.
[14] Wang, C. H., & Li, Y. T. (2013, July). Active black holes detection in ad-hoc wireless networks. In Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on (pp. 94-99). IEEE.
[15] Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009, September). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering (No. 9). WSEAS.
[16] Singh, V. P., Jain, S., & Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. International Journal of Computer Science Issues (IJCSI), 7(3), 23.
[17] Zhang, Y. Y., Li, X. Z., & Liu, Y. A. (2012). The detection and defence of DoS attack for wireless sensor network. The journal of china universities of posts and telecommunications, 19, 52-56.
[18] Tan, H., Ostry, D., Zic, J., & Jha, S. (2013). A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Computers & Security, 32, 36-55.
[19] Zhan, G., Shi, W., & Deng, J. (2010, February). Tarf: A trust-aware routing framework for wireless sensor networks. In European Conference on Wireless Sensor Networks (pp. 65-80). Springer, Berlin, Heidelberg.
[20] Sachan, R. S., Wazid, M., Singh, D. P., & Goudar, R. H. (2013, April). A cluster based intrusion detection and prevention technique for misdirection attack inside WSN. In Communications and Signal Processing (ICCSP), 2013 International Conference on (pp. 795-801). IEEE.
[21] Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
[22] Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
[23] Lv, S., Wang, X., Zhao, X., & Zhou, X. (2008, December). Detecting the sybil attack cooperatively in wireless sensor networks. In Computational Intelligence and Security, 2008. CIS`08. International Conference on (Vol. 1, pp. 442-446). IEEE.
[24] Xin-Sheng, W., Yong-Zhao, Z., Shu-ming, X., & Liang-min, W. (2009, October). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC`09. International Conference on (pp. 226-232). IEEE.
[25] Kaplantzis, S., Shilton, A., Mani, N., & Sekercioglu, Y. A. (2007, December). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on (pp. 335-340). IEEE.
[26] Baviskar, B. R., & Patil, V. N. (2014). Black hole Attacks mitigation and prevention in wireless sensor network. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 1(4), 167-169.
[27] Wang, C. H., & Li, Y. T. (2013, July). Active black holes detection in ad-hoc wireless networks. In Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on (pp. 94-99). IEEE.
[28] Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE wireless communications, 11(1), 48-60.
[29] young Kim, J., Caytiles, R. D., & Kim, K. J. (2012). A review of the vulnerabilities and attacks for wireless sensor networks. 9(3), 241-250.
[30] Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
[31] Collins, M., Dobson, S., & Nixon, P. Securing Wireless Sensor Networks: Introducing ASLAN-A Secure Lightweight Architecture for WSNs.
[32] Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.
[33] Anand, C., & Gnanamurthy, R. K. (2016). Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network. Wireless Personal Communications, 90(2), 847-859.
[34] Said, O., & Elnashar, A. (2015). Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments. EURASIP Journal on Wireless Communications and Networking, 2015(1), 46.
[35] Biswas, S., & Adhikari, S. (2015). A survey of security attacks, defenses and security mechanisms in wireless sensor network. International Journal of Computer Applications, 131(17), 28-35.
Citation
Reenu, Amarvir Singh, "Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.113-119, 2018.
An Effective Interlaced Separation Vedic Multiplier in FPGA Platform
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.120-130, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.120130
Abstract
A Multiplier is one of the essential components in the embedded system and digital signal processing (DSP) applications like digital filtering, digital communications, digital image processing, and spectral analysis etc. Parallel multiplication concept was implemented earlier to achieve higher speed. But in order to design an effective multiplier, speed is not the only consideration, area and power also must be taken into account while designing a circuit. To achieve this, a new technique has been introduced here for fast multiplication of two numbers. Inputs are separated into partitions where one number is again separated by two and zeros are interlaced in each alternate partition. Then it is followed by component multipliers and adders to get the final product. Based on the application requirement, the component adders and component multipliers can be selected in order to balance area and speed. The proposed system is synthesized using Xilinx tool. Experimental results show that the proposed interlaced separation Vedic multiplier is faster and has greater power efficiency in Field Programmable Gate Array (FPGA) implementation.
Key-Words / Index Term
Vedic Multiplier, Ripple Carry Adder, FPGA, VLSI
References
[1] Christopher Fritz, and Adly T. Fam, “Interlaced Partition Multiplier”, IEEE Transactions on Computers, Vol. 65, No. 8, pp. 2652-2658, 2016.
[2] C. S. Wallace, “A suggestion for a fast multiplier,” IEEE Transactions on Electronic Computers, Vol. EC-13, No. 1, pp. 14–17, 1964.
[3] L. Dadda, “Some schemes for parallel multipliers,” Alta Frequenza, Vol. 34, pp. 349–356, 1965.
[4] P. Kogge and H. Stone, “A parallel algorithm for the efficient solution of a general class of recurrence equations,” IEEE Transactions on . Computers., Vol. C-22, No. 8, pp. 783–791, 1973.
[5] H. Eriksson, P. Larsson-Edefors,M. Sheeran, M. Sjalander, D. Johansson, and M. Scholin, “Multiplier reduction tree with logarithmic logic depth and regular connectivity,” in Proceedings of the 2006 IEEE International Symposium on Circuits and Systems, Canada, pp. 4–8.
[6] R. Waters and E. Swartzlander, “A reduced complexity Wallace multiplier reduction,” IEEE Transactions on Computers, Vol. 59, No. 8, pp. 1134–1137, 2010.
[7] M. Schulte and E. Swartzlander, “Parallel reduced area multipliers,” Journal of VLSI Signal Processing Systems, Vol. 9, pp. 181–191, 1995.
[8] E.L.Brawn, “Digital Computer Design”, New York Academic Press, New York, pp. 494-498, 1963.
[9] A.Habibbi and P.A.Wintz, “Fast Multipliers”, IEEE Transactions on Computers, Vol.C-19, pp. 153-157, 1970.
[10] K.C.Bickerstaff, M.J.Schulte, and EE.Swartzlander,Jr., “Reduced Area Multipliers”, Proceedings of the 1993 International Conference on Application Specific Array Processors, USA, pp. 478-489.
[11] D. Naresh, Giri Babu Kande, “High Speed Signed multiplier for Digital Signal Processing Applications”, IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) ,Vol 8, Issue 2 , pp 57-61,2009.
[12] Mohammed Hasmat Ali, Anil Kumar Sahani, “Study, Implementation and Comparison of Different Multipliers based on Array, KCM and Vedic Mathematics Using EDA Tools”, International Journal of Scientific and Research Publications, Vol. 3, Issue 6, 2013.
[13] S.K.Panda, R.Das, S.K.Saifur Raheman, Tapasa Ranjan Sahoo, “VLSI Implementation of Vedic Multiplier Using Urdhva– Tiryakbhyam Sutra in VHDL Environment: A Novelty”, Vol. 5, No 1, pp.17-24, 2015.
[14] A Debasish Subudhi, Kanhu Charan Gauda, Abinash Kumar Pala, Jagamohan Das,” Design and Implementation of High Speed 4x4 Vedic Multiplier”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 11, pp.362-366, 2014.
[15] W. J. Townsend, E. E. Swartzlander Jr., and J. A. Abraham “A comparison of Dadda and Wallace multiplier delays,” in the 2003 proceedings of SPIE. on Advanced Signal Processing Algorithms, Vol. 5205, pp. 552–560.
[16] T. K. Callaway and Jr. E. E. Swartzlander, "Optimizing Multipliers for WSI," in the 1993Proceedings of the Fifth Annual IEEE International Conference on Wafer Scale Integration, USA, pp. 85-94.
[17] Chandan Singh, “Realization of FIR Filter using Distributed Arithmetic Architecture”, International Journal of Scientific Research in Computer Science and Engineering Vol. 3, Issue-4, pp. 7-12, 2015.
[18] Anil Pratap, “Analysis of Full and Half Adder Using Different Logic Style”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 4, Issue.1, pp. 6-9, 2016.
Citation
M. Isaivani, V. Malathi, E. Sakthivel, "An Effective Interlaced Separation Vedic Multiplier in FPGA Platform," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.120-130, 2018.
A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.131-140, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.131140
Abstract
Privacy preservation in big data is a need of the time because of the specialties of the data. Many researches have been made to tackle the issues of privacy in big data still some conflicts arises. Hence, an efficient method for the privacy preservation of data should be introduced. In this proposed work, a novel framework is designed for conserving the data in a secure manner. The personal and medical datasets are taken and are being merged which is under the control of hospital admin. This dataset is preprocessed to remove the noise following the normalization technique in order to convert the string into integers. Then, the efficient partial least square regression model is applied for the extraction of features such as sensitive and non-sensitive attributes. After the identification of this sensitive and non-sensitive attributes, ε-differential privacy preservation algorithm, the sensitive data are encrypted with the use of novel identity based encryption technique by generating the key. By the use of this code the user can decrypt the data which is anonymous format. The performance analysis is made on comparing the existing techniques which shows that the proposed methodology provides a better efficiency in terms of encryption cost, key generation cost, overall execution cost, security scheme, and computation complexity.
Key-Words / Index Term
Privacy preservation, Sensitive attributes, Non-sensitive attributes, ε-differential privacy preservation, encryption, Identity based encryption
References
[1] S. Ananthi and A. Periwal, "Data Security Based On Big Data Storage," Global Journal of Pure and Applied Mathematics, vol. 12, pp. 1491-1500, 2016.
[2] K. He, et al., "On the security of two identity-based conditional proxy re-encryption schemes," Theoretical Computer Science, vol. 652, pp. 18-27, 2016.
[3] S. Wang, et al., "Attribute-based data sharing scheme revisited in cloud computing," IEEE transactions on information forensics and security, vol. 11, pp. 1661-1673, 2016.
[4] A. Azaria, et al., "Medrec: Using blockchain for medical data access and permission management," in Open and Big Data (OBD), International Conference on, 2016, pp. 25-30.
[5] J. Luo, et al., "Big data application in biomedical research and health care: a literature review," Biomedical informatics insights, vol. 8, p. BII. S31559, 2016.
[6] I. A. T. Hashem, et al., "The rise of “big data” on cloud computing: Review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015.
[7] R. Kune, et al., "The anatomy of big data computing," Software: Practice and Experience, vol. 46, pp. 79-105, 2016.
[8] X. Wu, et al., "Data mining with big data," IEEE transactions on knowledge and data engineering, vol. 26, pp. 97-107, 2014.
[9] S. Sicari, et al., "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015.
[10] M. S. Hossain and G. Muhammad, "Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring," Computer Networks, vol. 101, pp. 192-202, 2016.
[11] A. Mehmood, et al., "Protection of big data privacy," IEEE access, vol. 4, pp. 1821-1834, 2016.
[12] S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data," IEEE access, vol. 4, pp. 2751-2763, 2016.
[13] D. Baker, et al., "Privacy-Preserving Linkage of Genomic and Clinical Data Sets," IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2018.
[14] G. Manogaran, et al., "A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system," Future Generation Computer Systems, vol. 82, pp. 375-387, 2018.
[15] A. Lounis, et al., "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks," Future Generation Computer Systems, vol. 55, pp. 266-277, 2016.
[16] C. Guo, et al., "Fine-grained database field search using attribute-based encryption for e-healthcare clouds," Journal of medical systems, vol. 40, p. 235, 2016.
[17] H. K. Patil and R. Seshadri, "Big data security and privacy issues in healthcare," in Big Data (BigData Congress), 2014 IEEE International Congress on, 2014, pp. 762-765.
[18] A. N. Kho, et al., "Design and implementation of a privacy preserving electronic health record linkage tool in Chicago," Journal of the American Medical Informatics Association, vol. 22, pp. 1072-1080, 2015.
[19] D. Vatsalan, et al., "Privacy-preserving record linkage for big data: Current approaches and research challenges," in Handbook of Big Data Technologies, ed: Springer, 2017, pp. 851-895.
[20] K. Liang, et al., "Privacy-preserving ciphertext multi-sharing control for big data storage," IEEE transactions on information forensics and security, vol. 10, pp. 1578-1589, 2015.
Citation
Johny Antony P, Antony Selvadoss Thanamani, "A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.131-140, 2018.
Performance Evaluation of Proactive, Reactive and Hybrid Protocols by Varying Vehicle Nodes in Vehicular Ad-hoc Network
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.141-146, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.141146
Abstract
Routing protocols govern a network to facilitate the communication easier under specific network topology. Network researchers have presented various routing protocols for VANETs having different categories. Among these, the proactive, reactive and hybrid protocols are mostly prominent. Performance analysis of these routing protocols for MANET has been proposed earlier. But the main motive of this paper is to analyze the different performance metrics (throughput, end to end delay, routing overhead, packet delivery ratio, dropped packet) individually by which these protocols are compared in VANET. We have carried out the performance evaluation of Destination-Sequenced Distance Vector (DSDV), Zone Routing Protocol (ZRP), Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (AODV) as proactive, hybrid and reactive routing protocols, respectively, using NS2 simulator. In this paper, for simulation a particular scenario has been discussed. On the completion of this simulation we could have a clear view in what conditions VANET can be operated in more efficient manner compared to present VANET network arrangements. The simulation is performed on each routing protocol for varying vehicle nodes with source nodes 10 and 20.
Key-Words / Index Term
VANET, Routing Protocols, Throughput, End to End delay, Routing Overhead, Packet Delivery Ratio, Dropped Packet, NS2 (Simulator)
References
[1] B. Marzak, H. Toumi, E. Benlahmar, M. Talea, “Performance Analysis of Routing Protocols in Vehicular Ad-hoc Network”, pp.31-42, November 2017.
[2] Y. Ding, C. Wang, and L. Xiao, "A static-node assisted adaptive routing protocol in vehicular networks" Proceedings of the fourth ACM international workshop on Vehicular Ad-hoc networks, Pages 59-68, ACM New York, USA, September 10, 2007.
[3] S. Chauhan, S. B. Tyagi, “Performance Evaluation Of Reactive Routing Protocols In VANET”, International Journal of Innovations and Advancement in Computer Science, Volume 3, Issue 9, pp. 189-193, November 2014.
[4] M. Kaur, R. Rajni and P. Singh, “Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET”, Advances in Intelligent Systems and Computing: Preface, pp. 757-763, 2012.
[5] B. Marzak, H. Toumi, K. E. Guemmat, A. H. Benlahmar and M. Talea, “A Survey on Routing Protocols for Vehicular Ad-Hoc Networks”, Indian Journal of Science and Technology, Vol 9 (S1), December 2016.
[6] N. Fida, F. Khan, M. A. Jan, and Z. Khan, “Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing”, pp.157-166, January 2017.
[7] A. Abunei, C. Comşa and I. Bogdan, "Implementation of a Cost-effective V2X hardware and software platform" 2016 International Conference on Communications (COMM), Bucharest, pp. 367-370, 2016.
[8] J. Zhang, W. Li, D. Cui, X. Zhao and Z. Yin, "The NS2-Based Simulation and Research on Wireless Sensor Network Route Protocol", 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1-4, 2009.
[9] R. Kumari, P. Nand, “Performance Analysis for MANETs using certain realistic mobility models: NS-2”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.70-77, February, 2018.
[10] P. Chouksey, “Introduction to MANET”, International Journal of Scientific Research in Network Security and Communication, Volume-4, Issue-2, April, 2016.
Citation
Madhav Kahar Goud, N. M. Istiak Chowdhury, Md. Faqhrul Islam Nahiyan, "Performance Evaluation of Proactive, Reactive and Hybrid Protocols by Varying Vehicle Nodes in Vehicular Ad-hoc Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.141-146, 2018.
Improved Prediction Based Mining Approach for Classification using Association rules
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.147-157, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.147157
Abstract
Classification is one of the important data mining applications in the areas of decision sciences and knowledge extraction from the data. Classification using Association Rule Mining(ARM) is in great demand today with an aim of building moderate sized classifier consisting of limited number of rules from the database with higher classification accuracy rate. This classification approach integrates two important data mining strategies ARM and classification. Association rule mining aims to discover rules without any target based on association among the frequent items in the data where as classification based rule mining aims to discover targeted rules towards a predetermined class. The integration of these two techniques focuses on mining a set of Association Rules (CARs) which is a subset of association rules generate by some ARM technique. This integration also helps to resolve few problems associated with traditional classification systems. This paper attempts to improve the performance of CBA classifier with some modifications and performs the experimental evaluation against traditional classifier C4.5 in terms of error rate, number of classification association rules generated and the execution time.
Key-Words / Index Term
Rule mining, Classification Association rules, Classifier, Rule Pruning, CBA, Discretization.
References
[1]. Liu, B., Hsu, W., Ma, Y. CBA: Integrating Classification and Association Rule Mining. In KDD’98, New York, NY, Aug. 1998.
[2]. Agrawal,R. and Srikant, R., Fast algorithms for mining association rules, in Proc. 20th Int. Conf. Very Large Data Bases, VLDB, edited by J.B. Bocca, M. Jarke, and C. Zaniolo, Morgan Kaufmann 12 (1994) 487-499.
[3]. Kurgan. L and Cios, K.J.: Discretization Algorithm that Uses Class-Attribute Interdependence Maximization, Proceedings of the 2001 International Conference on Artificial Intelligence (IC-AI 2001), pp.980-987, Las Vegas, Nevada. (Pub. 2001.)
[4]. PDF) Data Mining Discretization Methods and Performances. Available from: https://www.researchgate.net/publication/264886861_Data_Mining_Discretization_Methods_and_Performances [accessed Jul 03 2018].
[5]. AL-Zawaidah, Farah Hanna., Jbara ,Yosef Hasan, “An Improved Algorithm for Mining Association Rules in Large Databases”, World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221-0741 Vol. 1, No. 7, 311-316, 2011. 7.
[6]. Agrawal R., Imielinski T. and Swami A. (1993) Mining Association rules between sets of items in large databases, In the Proc. of the ACM SIGMOD International Conf. on Management of Data (ACM SIGMOD , 93), Washington, USA, 207-216.
[7]. Hassan M. Najadat, Mohammed Al-Maolegi, Bassam Arkok, “An Improved Apriori Algorithm for Association Rules”, International Research Journal of Computer Science and Application Vol. 1, No. 1, June 2013, PP: 01 – 08.
[8]. Mahta, M., Agrawal, R. and Rissanen, J. 1996. SLIQ: A fast scalable classifier for data mining. Proc. of the fifth Int’l Conference on Extending Database Technology.
[9]. Antonie, M. . Za¨ıane ,O. R. An Associative Classifier based on Positive and Negative Rules. In DMKD ’04 Paris, France, June 13, 2004,
[10]. S.Rani, S.Kaushik, “Application of Data Mining techniques for predicting Diabetes” in International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol 3(3),pp-1996-2004, 2018.ISSN-2456-3307.
[11]. A.Sharma, N.K.Tiwari. “ Mining Association Rules in Cloud Computing Environments using Modified Apriori” in International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol 3(1),pp-629-634, 2018.ISSN-2456-3307.
[12]. http://cgi.csc.liv.ac.uk/~frans/KDD/Software/CBA/cba.html
[13]. ANALYTICS VIDHYA CONTENT TEAM, Mining frequent items bought together using Apriori Algorithm (with code in R) AUGUST 11, 2017 https://www.analyticsvidhya.com/blog/2017/08/mining-frequent-items-using-apriori-algorithm/
[14]. Merz, C. J. & Murphy, P. (1996). UCI Repository of Machine Learning Database. Available: http://www. ics.uci.edu/~mlearn/MLRepository
Citation
Mittal. K, Aggarwal. G , Mahajan. P, "Improved Prediction Based Mining Approach for Classification using Association rules," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.147-157, 2018.
Power Factor Improvement of Buck-Boost AC-DC Converter using Pulse Width Modulation Strategy
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.158-163, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.158163
Abstract
In power electronics converters applications, the input current to the converter contains a harmonic current which leads to the low power factor. The paper attempts to develop a pulse width modulation (PWM) strategy with a view to improve the input power factor of a buck boost ac-dc converter. The difficulties in the choice of corner frequencies for filter circuits emphasize a resurgent focus on the boundaries of PWM approaches and arbitrate to traverse a fresh direction for enjoying its benefits. The theory relates to the use of two level saw tooth carrier to arrive at the appropriate pulses for both the switches. The philosophy manifests to reshape the input current waveform in an effort to phase align the same with the supply voltage. The scope travels to examine the performance of the methodology using MATLAB based simulation and involve the use of an experimental prototype to validate the results and there from establish its suitability for use in the practical world.
Key-Words / Index Term
Input power factor, Buck Boost converter, PWM, Microcontroller
References
[1] K.Matsui, I.Yamamoto, T.Kishi, M.Hasegava, “A Comparison of Various Buck-Boost Converters and Their Application To PFC”, IEEETrans Power Electronics,VoI. 50, July, 2002, pp. 30-36.
[2] Haw Wang, Jinjun Liu And Dan Hou, “Piecewise Broken Line Approximation Method Implementation In Stability Analysis Of Bidirectional Buck/Boost Converters Cascaded System”,IEEE Trans Power Electronics, Vol 75, July 2009, pp1317-1322.
[3] LeopoldoRossetto, Giorgio SpiazziAnd Paolo Tenti, “Boost PFC With 100-Hz Switching Frequency Providing Output Voltage Stabilization And Compliance With EMC Standards”, IEEE Trans. Power Electronics,Vol 60, July 2004, pp. 931-938.
[4] L.Rossetto, G.Spiazzy, and P.Tenti "Control Techniques for Power factor correction converters”. IEEE Trans.Indu.Elect., Vol 49, Jan 2002, pp 642-651.
[5] Positive to negative Buck-Boost converter using LM267X simple switcher regulator, national semiconductor application note 1157, November 2000.
[6] Micah Ortuzar, Juan Dixon And Jorge Moreno, “Design,Construction And Performance of A Buck Boost Converter for An Ultra capacitor- Based Auxiliary Energy System for Electric Vehicles”, IEEE Trans Power Electronics, Vol 55,Oct. 2003, pp2889-2894.
[7] Suja C Rajappan, K.Sarabose, Neetha John “An Efficient AC/DC converter with Power Factor Correction”, International Journal of Emerging Technology and Advanced Engineering, Volume 3, pp.815-820, Issue 3, March 2013.
[8] Pritam Das, Member, IEEE, Majid Pahlevaninezhad, Member, IEEE, and Gerry Moschopoulos, Senior Member, IEEE “Analysis and Design of a New AC–DC Single-Stage Full Bridge PWM Converter With Two Controllers” IEEE Transactions on Industrial Electronics, vol. 60,pp- no. 11, November 2013.
[9] Dixon J. W., “Boost type PWM rectifiers for high power applications,” Ph.D dissertation, Dept. Elect. Comput. Eng., McGill Univ., Montreal, QC, Canada, Jun. 1988.
[10] El-Habrouk M., Darwish M. K., and Mehta P., “Active power filters: a review”, Proc. IEEE Electric Power Applications, vol. 147, pp. 493-513, Sept. 2000.
[11] Huai Wei, Issa Batarseh, Guangyong Zhu, Peter Kornetzky “A Single-Switch AC–DC Converter with Power Factor Correction” IEEE Transactions on Power Electronics, vol. 15, no.3, pp.421-430, may 2000.
Citation
Rajalakshmi G , Ashok Kumar R, Asokan K, "Power Factor Improvement of Buck-Boost AC-DC Converter using Pulse Width Modulation Strategy," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.158-163, 2018.