e-Census Based Decision Making for Employment Planning
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.596-600, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.596600
Abstract
e-Governance refers to the delivery of government information and services using Information and Communications Technology (ICT) to citizens or businesses or government. Census is a government activity of citizen socio-economic data collection process for the preparation of the citizen database. Census data is used for various activities planning like increasing literacy rate, removal of unemployment and healthcare issues etc. The aim of the paper is to present web based spatial dimensional modeling of the job seekers for assisting in taking high level decisions for government institutions like National Institution for Transforming India (NITI) Aayog and State Governments etc. The proposed system employs Online Analytical Processing (OLAP) and Data mining techniques for finding the job seeker population correlations among multiple fields like gender, the age structure of the population, geographical area and educational qualification in census database. OLAP techniques like roll-up, drill-down, slice and dice are implemented for dimensional modeling of the proposed system. Microsoft Visual Studio is used as an integrated environment for prototype development of a web based application with c# as the programming language. Microsoft SQL server is used as a backend relational database management system. It is concluded that the census database can be effective and efficient in achieving sustainable development goals of government as it can provide accurate and timely information within a reasonable amount of time.
Key-Words / Index Term
Unemployment, Dimensional modeling, Census, e-Governance
References
[1] Ljubljana, Slovenia, “Multi-relational data mining: an introduction,” ACM SIGKDD Explore, Vol. 5, pp. 1–16, 2003. DOI: http://doi.acm.org/10.1145/959242.959245,.
[2] A. Dutta and M. S. Devi, “E-Governance Status in India,” International Journal of Computer Sciences and Engineering, Vol 3, Issue-7, pp. 27–31, 2015.
[3] R. Rupnik and M. Kukar, “Data Mining Based Decision Support System to Support Association Rules,” Electro Technical, Vol. 74, pp. 195–200, 2007.
[4] M. H. Peyravi, “A Schema Selection Framework for Data Warehouse Design,” International Journal of Machine Learning and Computing, Vol. 2, No. 3, June 2012.
[5] T. Abdellatif, M. Abo Elsoud, and H. Arafat Ali, “Comparing Online Analytical Processing and Data Mining Tasks In Enterprise Resource Planning Systems,” International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, pp 161-174, November 2011.
[6] Al-Hashmi and A. Darem, , “Understanding phases of E-government project,” Emerg. Technol. E-Government, pp. 152–157, 2008.
[7] N. Padhy and R. Panigrahi, “Multi Relational Data Mining Approaches : A Data Mining Technique International Journal of Computer Applications,Vol 57, No.17, pp. 23–32, November 2012.
[8] O. C. Okeke and C. Boniface, “Using Data-Mining Technique for Census Analysis to Give Geo- Spatial Distribution of Nigeria .,” Journal of Computer Engineering, Vol. 14, no. 2, pp. 1–5, 2013.
[9] J. Choi and S. A. Chun, “SecureGov: secure data sharing for government services”, Proceedings of the 14th Annual International Conference on Digital Government Research, pp. 127–135, June 2013, DOI 10.1145/2479724.2479745
[10] V. R. Rao, “A Framework for e-Government Data Mining Applications ( eGDMA ) for Effective Citizen Services ” -An Indian Perspective,” International Journal of Computer Science and Information Technology Research, Vol. 2, no. 4, pp. 209–225, Dec 2014.
[11] J. Hareesh and V. V. Kumari, “Decision Tree Based Information System for Improving School Facilities,” International Journal of Science and Research, Vol. 4, no. 10, pp. 2013–2016, Oct 2015.
[12] Siriginidi Subba Rao, "Achieving millennium development goals: Role of ICTS innovations in India", Telematics and Informatics 26, Vol 26, Issue 2, pp 127-143, February 2008
[13] A. Vijayaraj and C.-T. Nadu, “Design and Implementation of Census Data Collection System using PDA,” vol. 9, no. 9, pp. 28–32, 2010.
[14] S. Mahendra Dev and M. Venkatanarayana, “Youth employment and unemployment in India,” International Journal of Accounts, Economics & Business Management, Vol. 1 No. 1, pp 1-6, Sep. 2012.
Citation
Ajay Dutta, M. Syamala Devi, Manish Arora, "e-Census Based Decision Making for Employment Planning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.596-600, 2018.
Comparison of Various Techniques for Load Balancing in Cloud Computing
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.601-606, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.601606
Abstract
Cloud computing is innovative technology that provide various applications and services to users. Cloud services are offered to user on the basis of utility, users have to pay only that amount for which they have used the services. Many challenges are there for cloud computing include virtual machine migration strategy fault tolerance, availability, scalability, load balancing and security. An optimal solution for load balancing is to manage proper resource utilization, minimum consumption of resources, minimum fail over, proper scaling etc[1]. Static load balancing algorithm does not adaptive quality of load balancing at run time while dynamic load balancing work dynamically at run time for better result. All nodes with its details properties are required in advance to handle traffic load balancing. Software requires for operating, handling, and integrating the services of various applications over the cloud. Comparison of static and dynamic load balancing done on various parameters analyzed in this paper that includes overhead incurred, support fault tolerance, proper resource management, scalable property etc.
Key-Words / Index Term
Cloud computing, Fault tolerance, Virtualization, Static load balancing, Dynamic load balancing
References
[1] Vignesh V, Sendhil Kumar KS, Jaisankar N “Resource management and scheduling in cloud environment”, School of Computing Science and Engineering, VIT University Vellore, Tamil, Nadu, India – 632 014 International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013
[2] R. D. Caytiles, S. Lee and B. J. Park, “Cloud Computing: The Next Computing Paradigm”, International Journal of Multimedia and Ubiquitous Engineering (IJMUE), vol. 7, no. 2, SERSC, (2012), pp. 297-302.
[3] Y. E. Gelogo and B. J. Park, “Next Generation Cloud Computing Issues and Solutions”, International Journal of Control and Automation (IJCA), vol. 5, no. 1, SERSC, (2012), pp. 63-70.
[4] Bhathiya Wickremasinghe, Rodrigo N. Calheiros, and Rajkumar Buyya. “CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications”,20-23 April 2010 Page No 446-452.
[5] Zehua Zhang and Xuejie Zhang,” A Load Balancing Mechanism Based on Ant Colony and Complex Network Theory in Open Cloud Computing Federation” 2010 2nd International Conference on Industrial Mechatronics and Automation. 30-31 May 2010 Page No 240-243.
[6] Uddalak Chatterjee Ȧ* Ȧ Department of CSE, “A Study on Efficient Load Balancing Algorithms in Cloud Computing Environment” International Journal of Current Engineering and Technology December 2013, Vol.3, No.5 (December 2013)
[7] Peter Mell, and Tim Grance, The NIST Definition of Cloud Computing. Information Technology Laboratory. 2009.
[8] Hayes, B.. Cloud Computing. Communications of the ACM, 51, pp. 9 – 11. 2008
[9] Qi Zhang, Lu Cheng, Raouf Boutaba. Cloud computing: state-of-art and research challenges. The Brazillian Computer Society. , 2010
[10] Abbas Karimi, Faraneh Zarafshan, Adznan, b. Jantan, “A new fuzzy approach for dynamic load balancing algorithm”, International Journal of Computer Science and Information Security(IJCSIS), 2009, 6(1).
[11] Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I., “Cloud Computing and emerging IT platforms: Vision, type, type, and reality for delivering computing as the 5th utility”, Future Generation Computer Systems, 25,(6), pp.599-616c.
[12] Bhupesh Kumar Dewangan1* , Amit Agarwal2 , Venkatadri M3 , Ashutosh Pasricha “Resource Scheduling in Cloud: A Comparative Study” International Journal of Computer Sciences and Engineering Open Access Review Paper Vol.-6, Issue-8, Aug 2018
[13] Afsana1, Suman Deswal2* “An Algorithm for Load Balancing in Cloud Computing “, International Journal of Computer Sciences and Engineering Vol.-6, Issue-8, Aug 2018
Citation
Sunita Gond, Shailendra Singh, "Comparison of Various Techniques for Load Balancing in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.601-606, 2018.
Review Study on Piezoelectric Energy Harvesters and Their Applications
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.607-616, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.607616
Abstract
To minimize the requirement of external power source and maintenance for electric devices such as wireless sensor networks, the energy harvesting technique based on vibrations has been a dynamic field of studying interest over past years. This presents a challenge for the researchers to optimize the energy output of piezoelectric energy harvesters, due to the relatively high elastic moduli of piezoelectric materials used to date. This paper reviews the current state of research on piezoelectric energy harvesting devices for low frequency (0–100Hz) applications. Various key aspects that contribute to the overall performance of a piezoelectric energy harvester are discussed.
Key-Words / Index Term
Piezoelectric, power sources, optimize energy harvester, Wireless sensor networks
References
[1]. S. Roundy and P. K. Wright, Smart Mater. Struct. 13(5), 1131–1142 (2004).
[2]. S. R. Anton and H. A. Sodano, Smart Mater. Struct. 16(3), R1–R21 (2007)
[3]. Choi WJ, Jeon Y, Jeong JH, Sood R, Kim SG. Energy harvesting MEMS device based on thin film piezoelectric cantilevers. J Electroceram 2006;17(2–4):543–8.
[4]. Shen D, Park J-H, Noh JH, Choe S-Y, Kim S-H, Wikle Iii HC, et al. Micromachined PZT cantilever based on SOI structure for low-frequency vibration energy harvesting. Sens Actuators A: Phys 2009;154(1):103–8.
[5]. Dongna S, Jung-Hyun P, Jyoti A, Song-Yul C, Howard, III CW, Dong-Joo K. The design, fabrication, and evaluation of a MEMS PZT cantilever with an integrated Si proof mass for vibration energy harvesting. J Micromech Microeng 2008;18(5):055017.
[6]. Roundy S, Wright PK, Rabaey J. A study of low level vibrations as a power source for wireless sensor nodes. Comput Commun 2003; 26(11):1131–44.
[7]. Eli SL, Paul KW. Resonance tuning of piezoelectric vibration energy scavenging generators using compressive axial preload. Smart Mater Struct 2006; 15(5):1413.
[8]. DuToit NE, Wardle BL. Experimental verification of models for microfabricated piezoelectric vibration energy harvesters. AIAA J 2007; 45(5):1126–37.
[9]. Dutoit NE, Wardle BL, Kim S-G. Design considerations for mems-scale piezoelectric mechanical vibration energy harvesters. Integr Ferroelectr 2005; 71(1):121–60.
[10]. Erturk A. Electromechanical modeling of piezoelectric energy harvesters. Blacksburg: Virginia Polytechnic Institute and State University; 2009.
[11]. Erturk A, Inman DJ. A distributed parameter electromechanical model for cantilevered piezoelectric energy harvesters. J Vib Acoust 2008; 130(4), [41002].
[12]. Erturk A, Inman DJ. On the mechanical modeling of cantilevered piezoelectric vibration energy harvesters. J Intell Mater Syst Struct 2008;19:15.
[13]. Erturk A, Inman DJ. An experimentally validated bimorph cantilever model for piezoelectric energy harvesting from base excitations. Smart Mater Struct 2009;18(2):025009.
[14]. Erturk A, Inman DJ. Issues in mathematical modeling of piezoelectric energy harvesters. Smart Mater Struct 2008;17(6):065016.
[15]. Roundy S, Leland ES, Baker J, Carleton E, Reilly E, Lai E, et al. Improving power output for vibration-based energy scavengers. Pervas Comput IEEE 2005;4(1):28–36.
[16]. Elfrink R, Kamel TM, Goedbloed M, Matova S, Hohlfeld D, Andel Yv, et al. Vibration energy harvesting with aluminum nitride-based piezoelectric devices. J Micromech Microeng 2009;19 (9):094005.
[17]. Chen Z, Yang Y, Lu Z, Luo Y. Broadband characteristics of vibration energy harvesting using one-dimensional phononic piezoelectric cantilever beams. Physica B: Condens Matter 2013;410:5–12.
[18]. Wei W, Tongqing Y, Xurui C, Xi Y, Qifa Z. Vibration energy harvesting using piezoelectric circular diaphragm array. In: Applications of Ferroelectrics (ISAF/ PFM), 2011 international symposium on and 2011 international symposium on piezoresponse force microscopy and nanoscale phenomena in polar materials. 2011.
[19]. Ericka M, Vasic D, Costa F, Poulin G, Tliba S. Energy harvesting from vibration using a piezoelectric membrane. In: J de Phys IV (Proceedings). EDP Sciences. 2005.
[20]. Minazara E, Vasic D, Costa F, Poulin G. piezoelectric diaphragm for vibration energy harvesting. Ultrasonics 2006; 44(Supplement):Se699–Se703.
[21]. Clark W, Mo C. Piezoelectric energy harvesting for bio-MEMS applications. In: Priya S, Inman D, editors. Energy harvesting technologies. US: Springer; 2009. p. 405–30.
[22]. Sodano HA, Park G, Inman DJ. An investigation into the performance of microfiber composites for sensing and structural vibration applications. Mech Syst Signal Process 2004;18(3):683–97.
[23]. Rezaeisaray M, Gowini ME, Sameoto D, Raboud D, Moussa W. Low-frequency piezoelectric energy harvesting at multi vibration mode shapes. Sens Actuators A: Phys 2015;228:104–11.
[24]. Kymissis J, Kendall C, Paradiso J, Gershenfeld N. Parasitic power harvesting in shoes. In: Wearable computers, 1998. Digest of papers. Second international symposium on. 1998.
[25]. Shenck NS, Paradiso JA. Energy scavenging with shoe-mounted piezoelectrics. Micro IEEE 2001;21(3):30–42.
[26]. 102. Xu, C.D., Ren, B., Di, W.N., Liang, Z., Jiao, J., Li, L.Y., Li, L., Zhao, X.Y., Luo, H.S., and Wang, D. (2012). Cantilever driving low-frequency piezoelectric energy harvester using single crystal material 0.71 Pb(Mg1/3Nb2/3)O3-0.29PbTiO3. Appl. Phys. Lett. 101, 033502.
[27]. Zou, H.-X., Zhang, W.-M., Li, W.-B., Hu, K.-M., Wei, K.-X., Peng, Z.-K., and Meng, G. (2017). A broadband compressive-mode vibration energy harvester enhanced by magnetic force intervention approach. Appl. Phys. Lett. 110, 163904.
[28]. Wu, J., Chen, X., Chu, Z., Shi, W., Yu, Y., and Dong, S. (2016). A barbell-shaped high-temperature piezoelectric vibration energy harvester based on BiScO3-PbTiO3 ceramic. Appl. Phys. Lett. 109, 173901.
[29]. Yang, Z., and Zu, J. (2014). High-efficiency compressive-mode energy harvester enhanced by a multi-stage force amplification mechanism. Energy. Convers. Manag. 88, 829–833.
[30]. Yang, Z., Zhu, Y., and Zu, J. (2015). Theoretical and experimental investigation of a nonlinear compressive-mode energy harvester with a high power output under weak excitations. Smart Mater. Struct. 24, 025028.
[31]. Wang, X., Shi, Z., Wang, J., and Xiang, H. (2016). A stack-based flex-compressive piezoelectric energy harvesting cell for large quasi-static loads. Smart Mater. Struct. 25, 055005.
[32]. Xu, T.-B., Jiang, X., and Su, J. (2011). A piezoelectric multilayer-stacked hybrid actuation/transduction system. Appl. Phys. Lett. 98, 243503.
[33]. 189. Zhao, J., and You, Z. (2014). A shoe embedded piezoelectric energy harvester for wearable sensors. Sensors 14, 12497–12510.
[34]. Jung, W.-S., Lee, M.-J., Kang, M.-G., Moon, H.G., Yoon, S.-J., Baek, S.-H., and Kang, C.-Y. (2015). Powerful curved piezoelectric generator for wearable applications. Nano Energy 13, 174–181.
[35]. Daniels, A., Zhu, M., and Tiwari, A. (2013). Design, analysis, and testing of a piezoelectric flex transducer for harvesting bio-kinetic energy. J. Phys. Conf. Ser. 476, 012047.
[36]. Xie, L., and Cai, M. (2014). Increased piezoelectric energy harvesting from human footstep motion by using an amplification mechanism. Appl. Phys. Lett. 105, 143901.
[37]. Ylli, K., Hoffmann, D., Willmann, A., Becker, P., Folkmer, B., and Manoli, Y. (2015). Energy harvesting from human motion: exploiting swing and shock excitations. Smart Mater. Struct. 24, 025029.
[38]. Ansari, M., and Karami, M.A. (2017). Experimental investigation of fan-folded piezoelectric energy harvesters for powering pacemakers. Smart Mater. Struct. 26, 065001.
[39]. Dagdeviren, C., Yang, B.D., Su, Y., Tran, P.L., Joe, P., Anderson, E., Xia, J., Doraiswamy, V., Dehdashti, B., Feng, X., et al. (2014). Conformal piezoelectric energy harvesting and storage from motions of the heart, lung, and diaphragm. Proc. Natl. Acad. Sci. USA 111, 1927–1932.
[40]. Bedell, S.W., Fogel, K., Lauro, P., Shahrjerdi, D., Ott, J.A., and Sadana, D. (2013). Layer transfer by controlled spalling. J. Phys. D 46, 152002.
[41]. Potkay, J.A., and Brooks K. An arterial cuff energy scavenger for implanted microsystems. in Bioinformatics and Biomedical Engineering, 2008. ICBBE 2008. The 2nd International Conference. 2008. IEEE.
[42]. Zhang, H., Zhang, X.-S., Cheng, X., Liu, Y., Han, M., Xue, X., Wang, S., Yang, F., Smith, A.S., Zhang, H., and Xu, Z. (2015). A flexible and implantable piezoelectric generator harvesting energy from the pulsation of the ascending aorta: in vitro and in vivo studies. Nano Energy 12, 296–304.
[43]. Bowen, C., and Arafa, M. (2015). Energy harvesting technologies for tire pressure monitoring systems. Adv. Energy Mater. 5, https://doi.org/10.1002/aenm.201401787.
[44]. Kubba, A.E., and Jiang, K. (2014). A comprehensive study on technologies of tyre monitoring systems and possible energy solutions. Sensors (Basel) 14, 10306–10345.
[45]. Mak, K.H., McWilliam, S., and Popov, A.A. (2013). Piezoelectric energy harvesting for tyre pressure measurement applications. J. Automobile Eng. 227, 842–852.
[46]. Van Schaijk, R., Elfrink, R., Oudenhoven, J., Pop, V., Wang, Z., and Renaud, M. (2013). A MEMS vibration energy harvester for automotive applications. Proc. SPIE. https:// doi.org/10.1117/12.2016916.
[47]. Elfrink, R., Matova, S., de Nooijer, C., Jambunathan, M., Goedbloed, M., van de Molengraft, J., Pop, V., Vullers, R.J.M., Renaud, M., and van Schaijk, R. (2011). Shock-induced energy harvesting with a MEMS harvester for automotive applications. In Electron Devices Meeting (IEDM), 2011 IEEE International. IEEE.
[48]. Zheng, Q., Tu, H., Agee, A., and Xu, Y. (2009). Vibration energy harvesting device based on asymmetric air-spaced cantilevers for tire pressure monitoring system. Proceedings of Power MEMS, 403–406.
[49]. Sadeqi, S., Arzanpour, S., and Hajikolaei, K.H. (2015). Broadening the frequency bandwidth of a tire-embedded piezoelectric-based energy harvesting system using coupled linear resonating structure. IEEE/ASME Trans. Mechatronics 20, 2085–2094.
[50]. Zhu, B., Han, J., Zhao, J., and Deng, W. (2017).The practical design of an energy harvester considering wheel rotation for powering intelligent tire systems. J. Electron. Mater. 46, 2483–2493.
[51]. Jousimaa, O.J., Parmar, M., and Lee, D.-W. (2016). Energy harvesting system for intelligent tyre sensors. in Intelligent Vehicles Symposium (IV), 2016 IEEE. IEEE.
[52]. Wu, X., Parmar, M., and Lee, D.-W. (2014). A seesaw-structured energy harvester with superwide bandwidth for TPMS application. IEEE/ASME Trans. Mechatronics 19, 1514–1522.
[53]. Roundy, S., and Tola, J. (2014). Energy harvester for rotating environments using offset pendulum and nonlinear dynamics. Smart Mater. Struct. 23, 105004.
[54]. Erturk, A. (2011). Piezoelectric energy harvesting for civil infrastructure system applications: moving loads and surface strain fluctuations. J. Intell. Mater. Syst. Struct. 22, 1959–1973.
[55]. Zhang, Y., Cai, S.C., and Deng, L. (2014). Piezoelectric-based energy harvesting in bridge systems. J. Intell. Mater. Syst. Struct. 25, 1414–1428.
[56]. Xie, X., Wu, N., Yuen, K.V., and Wang, Q. (2013). Energy harvesting from high-rise buildings by a piezoelectric coupled cantilever with a proof mass. Int. J. Eng. Sci. 72, 98–106.
[57]. Cahill, P., Nuallain, N.A.N., Jackson, N., Mathewson, A., Karoumi, R., and Pakrashi, V. (2014). Energy harvesting from the train-induced response in bridges. J. Bridge Eng. 19, 04014034.
[58]. Karimi, M., Karimi, A., Tikani, R., and ZiaeiRad, S. (2016). Experimental and theoretical investigations on piezoelectric-based energy harvesting from bridge vibrations under traveling vehicles. Int. J. Mech. Sci. 119, 1–11.
[59]. Bhaskaran, P.R., Rathnam, J.D., Koilmani, S., and Subramanian, K. (2017). Multiresonant frequency piezoelectric energy harvesters integrated with high sensitivity piezoelectric accelerometer for bridge health monitoring applications. Smart Mater. Res. 2017, https://doi.org/10.1155/2017/6084309.
[60]. Maruccio, C., Quaranta, G., DeLorenzis, L., and Monti, G. (2016). Energy harvesting from electrospun piezoelectric nanofibers for structural health monitoring of a cable-stayed bridge. Smart Mater. Struct. 25, 085040.
[61]. Peigney, M., and Siegert, D. (2013). Piezoelectric energy harvesting from traffic-induced bridge vibrations. Smart Mater. Struct. 22, 095019.
[62]. Lee, S., Youn, B.D., and Jung, B.C. (2009). Robust segment-type energy harvester and its application to a wireless sensor. Smart Mater. Struct. 18, 095021.
[63]. Rhimi, M., and Lajnef, N. (2012). Tunable energy harvesting from ambient vibrations in civil structures. J. Energy Eng. 138, 185–193.
[64]. Zhang, Y., Cai, C., and Zhang, W. (2014). Experimental study of a multi-impact energy harvester under low-frequency excitations. Smart Mater. Struct. 23, 055002.
Citation
N. K. Dixit, K. J. Rangra, Y. C Sharma, "Review Study on Piezoelectric Energy Harvesters and Their Applications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.607-616, 2018.
A Comprehensive Review of Recent Advancement in Optical Communication Networks
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.617-626, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.617626
Abstract
Optical fiber communication along with the advanced optical networking technologies and advanced modulation formats is an evolving field of research. The enormous bandwidth and long distance reach of optical networks makes them a suitable candidate to be used in backhaul networks. This paper presents a comprehensive review of various advanced optical networks: Wavelength Division Multiplexing (WDM) based networks, Radio over Fiber (RoF) networks, Passive Optical Networks (PONs) and recently proposed Elastic Optical Networks (EONs) along with recent work reported in literature. A briefs description of optical amplifiers and several architectural advancements in these optical networks is also discussed in a holistic manner .
Key-Words / Index Term
WDM, RoF, PON, EONs, Orthogonal Frequency Division Multiplexing (OFDM), Bandwidth variable-wavelength cross-connects (BV-WXC).
References
G. P. Agarwal, “Fiber-Optic Communication Systems”, John Wiley & Sons, New York, 1997.
[2] G. Keiser, “Optical Fiber Communication”, 3rd Ed., Mc Graw Hill, Singapore, 2000.
[3] Rajbir, S., Payal, & Deepak, S. (2018). Performance Evaluation of Different Channels in Optical Communication Systems using Optisystem Simulator. International Journal of Innovations & Advancement in Computer Science , 7 (5), 186-192.
[4] M.A. Othman, M.M. Ismail , M.H. Misran, M.A.M. Said and H.A. Sulaiman, “Erbium Doped Fiber Amplifier (EDFA) for C-Band Optical Communication System”, International Journal of Engineering & Technology IJET-IJENS, Vol 12, No. 4, pp. 48-50, 2012.
[5] Deepak, S. (2016). Design and Analysis of a Hybrid Optical Amplifier using EDFA and Raman Amplifier . International Journal of Enhanced Research in Management & Computer Applications , 5 (9), 16-22.
[6] Payal, Suresh, K., & Deepak, S. (2017). A Review of Optical Communication link design using EDFA. International Journal of Enhanced Research in Management & Computer Applications , 5 (9), 11-22.
[7] Suresh, K. (2012). Study WDM Technology to Achieve Higher Bandwidth Requirements in Optical Fiber Based Backbone Network in Communication Systems. MERI Journal of Management & IT , 5 (2), 65-69.
[8] Payal, Suresh, K., & Deepak, S. (2017). Performance Analysis of NRZ and RZ Modulation Schemes in Optical Fiber Link Using EDFA. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) , 7 (8), 161-168. DOI: 10.23956/ijarcsse/V7I8/0102 .
[9] Deepak, S., Payal, & Rajbir, S. (2017). Performance Investigation of Dispersion Compensation Techniques in 32-Channel DWDM System. International Journal of Electronics Electrical and Computational Systems (IJEECS) , 7 (8), 420-427.
[10] Payal, Deepak, S., & Rajbir, S. (2018). Analyzing EDFA Performance using different Pumping Techniques. International Journal of Computer Sciences and Engineering , 6 (5), 195-202. doi: 10.26438/ijcse/v6i5.195-202.
[11] Payal, Rajbir, S., & Deepak, S. (2017). Performance Comparison of Hybrid Optical Amplifiers with Different Modulation Formats. International Journal of Electronics Electrical and Computational Systems (IJEECS) , 6 (11), 315-320.
[12] Rajbir, S., Manoj, A., & Deepak, S. (2017). A Review of Radio Over Fiber Communication System. International Journal of Enhanced Research in Management & Computer Applications , 6 (4), 23-29.
[13] Kamaljit Singh Bhatiaa, Sandeep Singh “Performance Analysis of RoF link using Mach-Zehnder Modulator and its parameters,”An International Journal of Engineering Sciences, Special Issue ICTMS-15, 29-30 December 2015 ISSN: 2229-6913 (Print), ISSN: 2320-0332
[14] Fan Wei, Hanyi Zhang, and Bingkun Zhou Tsinghua, “Carrier Phase and Amplitude Manipulation for Linearization and Dispersion compensation in Radio-over-Fiber Systems Using Mach-Zehnder Modulator - Progress In Electromagnetic Research Symposium Abstracts,”Electromagnetics Research Symposium Proceedings, Stockholm, Sweden, Aug. 12-15, 2013 1311.
[15] Kumar, Suresh & Nain, Abhimanyu. (2016). Simulative investigation of WDM RoF systems including the effect of the Raman crosstalk using different modulators. Telecommunications and Radio Engineering. Vol. 75. Issue 14 pp- (1243-1254). 10.1615/TelecomRadEng.v75.i14.20.
[16] Nain, A., Kumar, S. & Singla, S. (2016). Impact of XPM Crosstalk on SCM-Based RoF Systems. Journal of Optical Communications, 38(3), pp. 319-324. Retrieved 15 Sep. 2018, from doi:10.1515/joc-2016-0045
[17] Jincy John and Sreenesh Shashidharan, “Design and Simulation of a Radio over Fiber System and its Performance Analysis.” Optical Networking Technologies and Data Security - OPNTDS 2012IEEE.
[18] Sai Naing Min Htet, “Generation of Optical Carrier Suppressed Signal for Radio-over-Fiber (RoF) System Using Dual-Drive MachZehnder Modulator, ” International Journal of Scientific and Research Publications, Volume 4, Issue 9, September 2014 1 ISSN 2250-3153.
[19] Rajbir, S., Manoj, A., & Deepak, S. (2017). Study and Performance Analysis of Radio over Fiber using Mach-Zehnder Modulator. International Journal of Advanced Research in Computer Science(IJARCS) , 8 (5), 1095-1100.
[20] Rajbir, S., Deepak, S., & Anjali. (2017). Radio over Fiber Performance Analysis usingMach Zehnder Modulator. International Journal of Enhanced Research in Management & Computer Applications , 6 (6), 16-25.
[21] Nain, Abhimanyu & Kumar, Suresh. (2017). Mitigation of FWM induced crosstalk in WDM RoF systems by employing different fibers. Vol. 46 Issue 4 pp (492-498) Journal of Optics (India). https://doi.org/10.1007/s12596-017-0413-2.
[22] Abhimanyu Nain, Suresh Kumar, Shelly Singla (2017) Performance Estimation of WDM Radio-over-Fiber Links Under the Influence of SRS Induced Crosstalk. In: Singh R., Choudhury S. (eds) Proceeding of International Conference on Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 479. Springer, Singapore
[23] Nain, A. & Kumar, S. (2017). Performance Investigation of Different Modulation Schemes in RoF Systems under the Influence of Self Phase Modulation . Journal of Optical Communications, 39(3), pp. 343-347. Retrieved 15 Sep. 2018, from doi:10.1515/joc-2016-0155
[24] Suresh, K., Deepak, S., & Abhimanyu, N. (2017). Evaluation of Sub Carrier Multiplexing based RoF System against Non-Linear Distortions using Different Modulation Techniques. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) , 7 (6), 454-461 DOI: 10.23956/ijarcsse/V7I6/0191 .
[25] R. Kaur, Sanjeev Dewra, “A Review on Passive Optical Network”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 4, April 2015.
[26] M. Agarwal, M.G.Wani, “Four Extended-Reach TDM PONs Sharing a Bidirectional Hybrid CWDM Amplifier,” International Journal of Current Trends in Engineering & Research (IJCTER) e-ISSN 2455–1392 Volume 2 Issue 6, June 2016 pp. 321 – 327
[27] S. Khant, A. Patel, “Designing four-Channel High Rate TDM Passive Optical Network with NRZ Scheme for Wired Environment”. International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 22 (2017) pp. 12746-12751
[28] A.B. Dar, F Zahoor, RK Jha, N Tripathi, M Sabraj, “An Analysis of 16 Channel 64 User Hybrid WDM/TDM Topology in the Optiwave Simulation Environment,” International Journal of Computer Sciences and Engineering. VOL-4 Issue 5 pp(31-35). ISSN 2347-2693. 2016
[29] F. Effenberger et al., "An introduction to PON technologies [Topics in Optical Communications]," in IEEE Communications Magazine, vol. 45, no. 3, pp. S17-S25, March 2007. doi: 10.1109/MCOM.2007.344582
[30] P. P. Iannone et al., "Four Extended-Reach TDM PONs Sharing a Bidirectional Hybrid CWDM Amplifier," in Journal of Lightwave Technology, vol. 26, no. 1, pp. 138-143, Jan.1, 2008.
doi: 10.1109/JLT.2007.913072
[31] K. Khairi, Z. A. Manaf, D. Adriyanto, M. S. Salleh, Z. Hamzah and R. Mohamad, "CWDM PON system: Next generation PON for access network," 2009 IEEE 9th Malaysia International Conference on Communications (MICC), Kuala Lumpur, 2009, pp. 765-768. doi: 10.1109/MICC.2009.5431392
[32] B. Zhu and D. Nesset, "GPON reach extension to 60 km with entirely passive fibre plant using Raman amplification," 2009 35th European Conference on Optical Communication, Vienna, 2009, pp. 1-2.
[33] C. Zhang, J. Huang, C. Chen, and K. Qiu, "All-optical virtual private network and ONUs communication in optical OFDM-based PON system," Opt. Express 19, 24816-24821 (2011).
[34] B. Chen, C. Gan, Qi, Y., et al. “A Novel Reliable WDM-PON System”. Journal of Optical Communications, 32(4), pp. 247-250. (2011) doi:10.1515/JOC.2011.050
[35] Deepak, S., Payal, & Suresh, K. (2018). Q Factor Based Performance Evaluation of Bidirectional TDM PON Network Using Hybrid Amplifier Configurations. International Journal of Computer Sciences and Engineering. Vol.6. Issue 4, pp (51-60) April , 6 (4), 51-60. doi: 10.26438/ijcse/v6i4.5160.
[36] Deepak, S., & Suresh, K. (2017). An Overview of Elastic Optical Networks and its Enabling Technologies. International Journal of Engineering and Technology (IJET) , 9 (3), 1643-1649. DOI: 10.21817/ijet/2017/v9i3/170903022.
[37] O. Gerstel, M. Jinno, A. Lord, and S. B. Yoo, “Elastic optical networking: A new dawn for the optical layer?” IEEE Commun. Mag., vol. 50, no. 2, pp. s12–s20, Feb. 2012.
[38] K. Christodoulopoulos, I. Tomkos, and E. Varvarigos, “Elastic bandwidth allocation in flexible OFDM-based optical networks,” J. Lightw. Technol., vol. 29, no. 9, pp. 1354–1366, May 2011.
[39] M. Jinno et al., “Spectrum-efficient and scalable elastic optical path network: Architecture, benefits, and enabling technologies,” IEEE Commun. Mag., vol. 47, no. 11, pp. 66–73, Nov. 2009
[40] S. Talebi et al., “Spectrum management techniques for elastic optical networks: A survey,” Opt. Switching Netw., vol. 13, pp. 34–48, Jul. 2014.
[41] G. Zhang, M. De Leenheer, A. Morea, and B. Mukherjee, “A survey on OFDM-based elastic core optical networking,” IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 65–87, 1st Quart. 2013.
[42] Dian Palupi Rini, Siti Mariyam Shamsuddin, Siti Sophiyati Yuhaniz, “Particle Swarm Optimization: Technique, System and Challenges”, International Journal of Computer Applications (0975 – 8887) Volume 14– No.1, January 2011.
[43] K. Christodoulopoulos, I. Tomkos, and E. A. Varvarigos, “Routing and spectrum allocation in OFDM-based optical networks with elastic bandwidth allocation,” in IEEE Global Telecommunications Conf., 2010.
[44] Deepak, S., & Suresh, K. (2017). Design and Evaluation of OFDM Based Optical Communication Network. Journal of Engineering and Applied Sciences , 12 (Special Issue 2), 6227-6233 DOI:10.3923/jeasci.2017.6227.6233
[45] Deepak, S., & Suresh, K. (2018). Evaluation of Network Blocking Probability and Network Utilization Efficiency on Proposed Elastic Optical Networks using RSA Algorithms. Journal of Optical Communications , 0-0. doi:10.1515/joc-2017-0204
[46] Deepak, S., & Suresh, K. (2018). Network Blocking Probability Based Evaluation of Proposed Spectrum Assignment Strategy for a Designed Elastic Optical Network Link. Journal of Optics, Springer , 0 (0), 0-0. DOI: https://doi.org/10.1007/s12596-018-0479-5.
[47] M. Zhang, W. Shi, L. Gong, W. Lu, and Z. Zhu, “Bandwidth defragmentation in dynamic elastic optical networks with minimum traffic disruptions,” in IEEE International Conference on Communications (ICC), Budapest, 2013, pp. 3894-3898.doi: 10.1109/ICC.2013.6655165.
[48] J. Comellas, X. Calzada, and G. Junyent, “Efficient spectrum assignment in elastic optical networks,” in 18th International Conference on Transparent Optical Networks (ICTON), Trento, 2016, pp. 1-4. doi: 10.1109/ICTON.2016.7550506
[49] D. Amar, E. Le Rouzic, N. Brochier, J.-L. Auge, C. Lepers, and N. Perrot, “Spectrum fragmentation issue in flexible optical networks: analysis and good practices,” Photon. Netw. Commun., vol. 29, no. 3, pp. 230–243, (2015) https://doi.org/10.1007/s11107-015-0487-1
[50] W. Shi, Z. Zhu, M. Zhang, and N. Ansari, “On the effect of bandwidth fragmentation on blocking probability in elastic optical networks,” IEEE Trans. on Commun., vol.61, no.7, pp.2970–2978,(2013). doi: 10.1109/TCOMM.2013.053013.120853
[51] Deepak, S., & Suresh, K. (2018). Network Blocking Probability Based Evaluation of Spectrum Fragmentation in Elastic Optical Networks. International Journal of Computer Sciences and Engineering , 6 (7), 1353-1362.
Citation
Vinita, "A Comprehensive Review of Recent Advancement in Optical Communication Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.617-626, 2018.
A Survey of Emerging Trends on Medical Image Enhancement Techniques
Survey Paper | Journal Paper
Vol.6 , Issue.9 , pp.627-634, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.627634
Abstract
During image acquisition, inadequate brightness may cause poor contrast and noise in many images like medical, satellite images. So it is required to improve the contrast and eliminate the noise to increase image quality. So image enhancement is required in medical image to improvement in quality. In this paper, we describe the overview of medical image enhancement techniques, classification of image enhancement techniques, researches done in the field of medical image enhancement, shortcoming comes after reviews, Parameter used to check the quality of enhanced images, and general needs required in this field of active research.
Key-Words / Index Term
Medical Image, Spatial Domain, Frequency Domain, Fuzzy Domain
References
[1] K. Hasikin and N. A. M. Isa, "Enhancement of The Low Contrast Image Using Fuzzy Set Theory", 14th International Conference on Modelling and Simulation, IEEE, 2012.
[2] S. S. Bedil, R. Khandelwal, "Various Image Enhancement Techniques - A Critical Review" International Journal of Advanced Research in Computer and Communication Engineering Vol.2, Issue.3, March 2013.
[3] R. Maini and H. Aggarwal, "A Comprehensive Review of Image Enhancement Techniques", Journal of Computing, Vol.2, Issue.3, 2010.
[4] M. Hanmandlu and D. Jha, "An Optimal Fuzzy System for Color Image Enhancement”, Image Processing, IEEE Transactions on, Vol.15, pp. 2956-2966, 2006.
[5] F. G. Mohammed, H. M. Rada, S. G. Mohammed, "Contrast and Brightness Enhancement for Low Medical X-Ray Images", International Journal of Scientific & Engineering Research, Vol.4, Issue.5, 2013.
[6] P. Rasti, M. Daneshmand, F. Alisinanoglu, C. Ozcinar, and G. Anbarjafari, "Medical Image Illumination Enhancement and Sharpening by Using Stationary Wavelet Transform", 24th IEEE Conference on Signal Processing and Communication Application Conference (SIU), 2016.
[7] I. Isa, S. N. Sulaiman, and M. F. Abdullah, "New Image Enhancement Technique for WMH Segmentation of MRI FLAIR Image", IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2016.
[8] G. D. Licciardo, C. Cappetta, L. D. Benedetto, “New Application Specific Image Processor for HDR Medical Image”, IEEE International Workshop on Advances in Sensors and Interfaces (IWASI), 2017.
[9] P. Pandey, S. Jain, S. K. Khatri “Medical Images enhancement using Kalman Filter”, IEEE international Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), 2017.
[10] E. S. Yelmanova, Y. M. Romanyshyn, “Histogram-Based Methods using the Known No-Reference Contrast Metrics”, IEEE 37th International Conference on Electronics and Nanotechnology, 2017.
[11] Y. Shen and W. Zhu, "Medical Image Processing using A Machine Vision-based Approach", International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.6, No. 3, 2013.
[12] Ritika, S. Kaur, "Contrast Enhancement Techniques for Images – A Visual Analysis", International Journal of Computer Applications, Vol.64 – pp. 17, 2013.
[13] T. K. Agarwal, M. Tiwari, S. S. Lamba, "Modified Histogram Based Contrast Enhancement using Homomorphic Filtering for Medical Images", IEEE Conference 2014.
[14] N. Senthilkumaran and J. Thimmiaraja, "Histogram Equalization for Image Enhancement Using MRI Brain Images", IEEE Conference on World Congress on Computing and Communication Technologies, 2014.
[15] T. Gong, T. Fan, L. Pei and Z. Cai, "Improved Immune Algorithm for Medical Image Enhancement", International Workshop on Artificial Immune Systems (AIS), 2015.
[16] P. Joris, W. Develter, W. V. D. Voorde, P. Suetens, F. Maes, D. Vandermeulen, P. Claes, “Preprocessing of Heteroscedastic Medical Images”, IEEE Access, Vol.6, 2018.
[17] N. S. Lele, "Image Classification Using Convolutional Neural Network", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26, 2018.
[18] G. Pannu, S. Verma, U. Arora and A. K. Singh, "Comparison of various Anonymization Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.16-20, 2017.
Citation
Vijay Panse, Rajendra Gupta, "A Survey of Emerging Trends on Medical Image Enhancement Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.627-634, 2018.
A Review on Optimizing Clustering Technique for Data Stream using Genetic Algorithm
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.635-637, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.635637
Abstract
In the current world , various sources like sensors, social media, web logs, network monitoring devices, traffic monitoring devices are generating lots of data. This huge data is arriving continuously, with high speed and changing its nature with time. Extracting useful information from the data stream demands enhancement in existing technologies of Data Mining. Clustering is an important part of data mining in which similar data points are merge into one group. Use of genetic algorithm in clustering data stream is an emerging technology. In this paper, we are discussing clustering techniques for data stream using Genetic Algorithm.
Key-Words / Index Term
Data Stream, Genetic Algorithms, Clustering
References
[1] Gaber, Mohamed Medhat, Arkady Zaslavsky, and Shonali Krishnaswamy. "Mining data streams: a review." ACM Sigmod Record 34.2 (2005): 18-26.
[2] Mahdiraji, Alireza Rezaei. "Clustering data stream: A survey of algorithms." International Journal of Knowledge-based and Intelligent Engineering Systems 13.2 (2009): 39-44.
[3] Gao, Ming-ming, Chang Tai-hua, and Xiang-xiang Gao. "Application of Gaussian mixture model genetic algorithm in data stream clustering analysis."Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on. Vol. 3. IEEE, 2010.
[4] Zhou, Aoying, et al. "Distributed data stream clustering: A fast EM-based approach." Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. IEEE, 2007.
[5] Heng, Liang. "Fast Clustering Optimization Method of Large-Scale Online Data Flow Based on Evolution Incentive."2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA). IEEE, 2014.
[6] Alsayat, Ahmed, and Hoda El-Sayed. "Social media analysis using optimized K-Means clustering." Software Engineering Research, Management and Applications (SERA), 2016 IEEE 14th International Conference on. IEEE, 2016.
Citation
Neha Sharma, Pawan Makhija, "A Review on Optimizing Clustering Technique for Data Stream using Genetic Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.635-637, 2018.
An Approach for BOT NET in Data Mining
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.638-641, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.638641
Abstract
In this research work, we are trying to focus the need of protecting the big amount of data using BOT NET. Here data mining means extracting some important data from the information house. The data mining process results in instances and learning whereas the coal or valuable stone mining result in coal or jewel.
Key-Words / Index Term
BOT NET, Ad Fraud, Methbot, botmaster
References
[1] K. Lee, J. Caverlee, S. Webb, "Uncovering social spammers: social honeypots+ machine learning", Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, pp. 435-442, 2010.
[2] B. Perozzi, R. Al-Rfou, S. Skiena, "Deepwalk: Online learning of social representations", Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 701-710, 2014.
[3] E. Ferrara, O. Varol, C. Davis, F. Menczer, A. Flammini, The rise of social bots, 2014.
[4] M Paul , G Sanyal , Debabrata Samanta, Gia Nhu Nguyen ; Dac-Nhuong Le, Admission Control Algorithm Based-on Effective Bandwidth in V2I Communication, IET Communications, 10 pp.DOI: 10.1049/iet-com.2017.0825 , Online ISSN 1751-8636.
[5] M Paul , Debabrata Samanta, and G Sanyal,” Dynamic job Scheduling in Cloud Computing based on horizontal load balancing”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp. 1552-1556, 2011, ISSN: 2229-6093.
[6] Manoj Mukherjee, Titan Paul, Debabrata Samanta,” Detection of damaged paddy leaf detection using image processing”, Journal of Global Research in Computer Science (JGRCS), pp.7-10, Volume 3, No. 10, October 2012, ISSN: 2229-371X.
[7] Debabrata Samanta, M Paul and G Sanyal , ”Segmentation Technique of SAR Imagery using Entropy”, International Journal of Computer Technology and Applications (IJCTA) , Vol. 2 (5), pp.1548-1551, 2011,ISSN: 2229-6093.
[8] Debabrata Samanta and G Sanyal, Development of Edge Detection Technique for Images using Adaptive Thresholding, Proc. of Fifth International Conference on Information Processing (ICIP-2011), CCIS 157, pp. 671-676, 5-7 Aug.2011. @ Springer-Verlag Berlin Heidelberg.
[9] Syed K A Khadri,, Debabrata Samanta, and M Paul, "Approach of Message Communication Using Fibonacci Series: In Cryptology", Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 168-171, June 2014. doi: 10.12720/lnit.2.2.168-171.
[10] Debabrata Samanta, Prajna Paramita Chaudhury, Arya Ghosh ,” Scab Diseases Detection of Potato using Image Processing” , International Journal of Computer Trends and Technology (IJCTT) , pp. 109-113 , Jan – 2012 Volume no 3 Issue1. ISSN: 2231-2803.
[11] Anna-senpai. [FREE] world’s largest net:Mirai botnet, client,echo loader, CNC source code release. https://hackforums.net/showthread.php?tid=5420472.
[12] M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster.Building a dynamic reputation system for DNS. In 19th USENIXSecurity Symposium, 2010.
[13] M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. AbuNimeh, W. Lee, and D. Dagon. From throw-away traffic to bots:Detecting the rise of DGA-based malware. In 21st USENIX SecuritySymposium, 2012.
[14] Arbor Networks. Worldwide infrastructure security report.https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf.
[15] H. Asghari, M. Ciere, and M. J. G. Van Eeten. Post-mortem ofa zombie: Conficker cleanup after six years. In 24th USENIXSecurity Symposium, 2015.
Citation
Nirmala H.G., Dhruv Kumar Thakur, Ananya Kundu, Abhishek Paul, Gurunath R, "An Approach for BOT NET in Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.638-641, 2018.
An overview of Applications, Concepts, Challenges in 5G Technology
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.642-645, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.642645
Abstract
This paper provides a comprehensive overview of advance wireless communication technology that is known as 5G. In 5G there are more advancement is happening towards the development of World Wide Wireless Web (WWWW), Dynamic Ad-hoc Wireless Networks (DAWN) and Real Time Wireless Communication. The most important technologies for 5G technologies are 802.11 and 802.16, Wireless Personal Area Network. 5G technology will include several standards under a common umbrella, similar to 4G. 5G technology is to make use of mobile phones within very high bandwidth. This paper is also trying to show the future of wireless system to the users of current 4G users.
Key-Words / Index Term
Wireless generations (1G, 2G, 3G, 4G), 5G network, architecture, strategies for 5G network
References
Maryam Fizza, Munam Ali Shah, “5G Technology: An Overview of Applications, Prospects, Challenges and Beyond,” Proceedings of the IOARP International Conference on Communication and Networks (ICCN 2015.)
[2]. Asvin Gohil; Hardik Modi; Shobhit K Patel,” 5G technology of mobile communication: A survey” published in 2013 International Conference on Intelligent Systems and Signal Processing (ISSP) , 1-2 March 2013’
[3]. A. Bria, F. Gessler, O. Queseth, R. Stridth, M. Unbehaun, J. Wu, J. Zendler, "4-the Generation Wireless Infrastructures: Scenarios and Research Challenges", IEEE Personal Communications, Vol. 8, No.6, December 2001.
[4]. Toni Janevski, “A System for PLMN-W LAN Internetworking”, Journal of Communications and Networks (JCN), pp. 192-206, Vol 7, No. 2, June 2005.
[5]. Janise McNair, Fang Zhu, “Vertical Handoffs in Fourth-
Generation Multinetwork Environments”, IEEE Wireless
Communications, June 2004.
[6]. Toni Janevski, “Traffic Analysis and Design of Wireless IP Networks”, Artech House Inc., Boston, USA, May 2003.
[7]. Suk Yu Hui, Kai Hau Yeu ng, “Ch allenges in the Migration to 4G Mobile Systems”, IEEE Communications Magazine, December 2003
[8]. Willie W. Lu, “An Open Baseband Processing Architecture for Future Mobile Terminals Design”, IEEE Wireless Communications, April 2008.
[9]. Jivesh Govil, Jivika Govil, “5G : Functionalities development and an Analysis of Mobile Wireless Grid”, First International Conference on Emerging Trends in Engineering and Technology
[10]. Evaluating the Performance of TCP over Routing Protocols in MANETs Using NS2 Anurag Singh, Rajnesh Singh, Sunil Gupta, Research Paper | Journal (IJSRNSC), Vol.6 , Issue.4 , pp.1-4, Aug-2018
[11]. Detection of Node Capture Attack in Wireless Sensor Networks, K. Ravikumar, V. Manikandan, Research Paper | Isroset-Journal (IJSRCSE), Vol.6 , Issue.4 , pp.56-61, Aug-2018.
Citation
Vijay Kumar Srivastava, Suman Rav, Nitin Goel, "An overview of Applications, Concepts, Challenges in 5G Technology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.642-645, 2018.
A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.646-649, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.646649
Abstract
Innovation and imagination in string coordinating can play a massive part to get time effective execution in different areas of software engineering. String coordinating calculations are fundamental for arrange gadgets that channel parcels and streams in light of their payload. Applications like interruption discovery/aversion, web sifting, hostile to infection, and against spam all raise the interest for productive calculations managing string coordinating There is expanding sorts and quantities of malevolent assaults that endeavours to bargain the trustworthiness, privacy, accessibility, and other security parts of PCs and systems.
Key-Words / Index Term
Signature based ids, Pattern matching algorithm, String matching algorithm, finite state automation
References
[1] A Fast String Searching Algorithm, with R.S. Boyer. Communications of the Association for Computing Machinery, 20(10), 1977, pp. 762-772
[2] Akhtar Rasool Amrita Tiwari et al, String Matching Methodologies: A Comparative Analysis / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3394 - 3397 Proceedings of the 6th Colloquium on
Automata, Languages and Programming, pages 118–132, London, UK, 1979 Springer.
[3] An Examination of Pattern Matching Algorithms for Intrusion Detection Systems submitted by James Kelly Dr. Frank Dehne (Director, School of Computer Science) Dr. Paul Van Oorschot (Thesis Supervisor) Carleton University, August 2006. Pages 21-39.
[4] https://brilliant.org/wiki/rabin-karp algorithm/#implementation-of-rabin- karp.
[5] https://www.geeksforgeeks.org/wildcard-pattern-matching/
[6] http://en.wikipedia.org/wiki/Boyer%E2%80%93Moore_string_search_algorithm.
[7] In 2007, Matyas Sustik and I thought of an apparently new variation that gives very good performance on small alphabets and has a small table. The algorithm is described in UTCS Tech Report TR-07-62, ``String Searching over Small Alphabets.``
[8] International Journal of Innovative Research in Computer Science and Engineering (IJIRCSE) www.ioirp.com ISSN: 2394-6364, Volume – 3, Issue – 1. March 2018 a survey on intrusion detection system using anamoly and signature based detectors submitted by Dr.K.Prabha, S.Mohanapriya, and K.Nirmaladevi.
[9] Network intrusion detection system using string matching algorithms submitted by Siddharth Saha and Telugu Praveen Kumar Department of Computer Science & Engineering National Institute of Technology Rourkela 2010. Pages 17-25
[10] Rolling Hash. Retrieved May 28, 2016, fromhttps://en.wikipedia.org/wiki/Rolling_hash.B. Commentz-Walter. A string matching algorithm fast on the average. Technical Report 79.09.007, IBM Heidelberg Scientific Center, 1979.
[11] S. Wu and U. Manber, A fast algorithm for multi-pattern searching, Technical Report TR-94-17, Department of Computer Science, University of Arizona, 1994.
[12] String searching algorithm from Wikipedia :https://en.wikipedia.org/wiki/Stringsearching_algorithm#Algorithms_using_a_finite_set_of_patterns
[13] YU Jianming, XUE Yibo, LI Jun, Memory Efficient String Matching Algorithm for
Network Intrusion Management System, Tsinghua Science and Technology.
Citation
S. Mohanapriya, K. Prabha, "A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.646-649, 2018.
Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.650-654, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.650654
Abstract
Ethernet Local Area Network (LAN) has become almost omnipresent today. Ethernet has scored over its competitor LAN technologies because of its simplicity, ruggedness and low cost as well as, the advantages it enjoyed owing to its early entry into the LAN market. Despite many research work and development efforts in the area of data communication’s security, the importance of internal local area network LAN security is still underestimated. Ethernet LAN has always been known to be an insecure technology. There is no way in the Ethernet LAN protocol to check the authentication or message integrity. Intruder can hack the IP packet header and create packets with false IP addresses or MAC addresses. In this paper we discuss about the design of a secured packet transport scheme in the IP over Ethernet LAN (IPEL) based on graph anonymization approach. To ensure secure communication, the identity of IP packet source and destination needs to be hidden from intruder. In our proposed scheme each host in the IPEL encrypts the header part of IP packet using graph anonymization algorithm and forwards to the next node. On receiving the packet host performs decryption using graph de-anonymization algorithm to read the packet header. This approach of securing IP packet header offers good scalability, possibly low cost and also promises a reasonable level of security in the IPEL.
Key-Words / Index Term
Encryption, Decryption, IPEL, IPSec, SSL, Graph Anonymization
References
[1] A.S. Tenenbaum,”ComputerNetworks”, 4th Ed., Pearson Education Asea, LPE, 2003.
[2] J.F. Kurose ad K.W. Ross, ”Computer Networking: A Top-Down Approach Featuring the Internet”, 3rd Ed., Pearson Education Asea, LPE,2005.
[3] B. A. Forouzan, "Data Communications ad Networking”, 4th Ed., Tata McGraw-Hill, New Delhi, 2004.
[4] Metcalfe, R.M ad Boggs, D.R, “Ethernet: Distributed Packet Switching for Local Computer Networks”, Communication of the ACM. Vol 19, pp 395-404, July 1976.
[5] C.E. Spurgeon,, “Ethernet-The Definitive Guide”, Orielly/Shroff Publishers & Distributors (India), 2000.
[6] A Leon,-Garcia and I. Widjaja, ”Communication Networks”, 2nd Ed., Tata McGraw-Hill, New Delhi, 2004.
[7] R. Perlman, ”Interconnections: Bridges ad Routers”, Addison Wesley,1994.
[8] L. L. Peterson ad B.S. Davie, ”Computer Networks: A systems Approach”, 3rd Ed. Morgan Kaufman, 2003
[9] D. E. Comer, “Internetworking with TCP/IP Principles, Protocols, and Architecture”, 4th Ed., Prentice-Hall, 2003
[10] W. Stallings, "Network Security Essentials: Application ad Stadards “, 4th Ed.,Pearson Eduction Asea,LPE,2013
[11] J. Katz,Y. Lindell, ”Introduction to modern cryptography” Chapman & Hall/CRC Press, 2007.
[12] N.Deo, ,”Graph Theory with Applications to Engineering and Computer Science”, New Ed, Prentice-Hall, 2003.
[13] C.C. Aggarwal, Y.Li and P.S.Yu, “On the hardness of graph annonymization.” In Proceedings of the 11th IEEE International Conference on Data Mining(ICDN’11),pp 1002-10007,IEEE,2011
[14] K. Liu, , and E. Terzi,. “Towards identity anonymization on graphs”. In SIGMOD Conference (2008), pp. 93–106.
Citation
R. Ganguli, S. Roy, "Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.650-654, 2018.