Telemedicine Based on Healthcare System
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.594-602, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.594602
Abstract
Telemedicine is the process that allows the professionals of the healthcare to assess, diagnose and to treat the patients with the help of modern technology i.e., telecommunication technology even from a long distance. In this paper some of the topics of last 40years has been discussed i.e. where the work of Telemedicine has been held, what advantages it provided to the health care system, what was the main use of those advantages and so on. Thus from our study we get to know that the fundamental of Telemedicine is mainly to transfer the medical data, and for that purpose several telecommunication technologies such as Radio frequency communication, satellite communication, are used. The main use of telemedicine can be seen in rural sphere. Thus day by day the technology of Telemedicine has provided many facilities to the health care system and has increased patient’s satisfaction level to its top and hopefully will provide a lot of amazing features in the future.
Key-Words / Index Term
Telemedicine
References
[1] John Craig, Victor Patterson, “Introduction to the practice of Telemedicine”, Journal of Telemedicine and Telecare, Vol.11, Issue.1, pp.3-9, 2005.
[2] Earl Dunn, David Conrath, Helen Acton, Chris Higgins, Harry Bain, “Telemedicine links patients in Sioux Lookout with doctors in Toronto”, CMA Journal, Vol. 12 2, Issue.4, pp.484-487, 1980.
[3] Don B. Blakeslee, William J. Grist, Max E. Stachura, Betsey S. Blakeslee, “Practice of Otolaryngology via Telernedicine”, Laryngoscope, Vol. 108, Issue.1, pp.1-7, 1998.
[4] K. Shimizu, “Telemedicine By Mobile Communication”, IEEE Publisher, Vol.18, Issue.4, pp.32-44, 1999.
[5] B. Agroyannis, C. Fourtounas, G. Romagnoli, M. Skiadas, C. Tsavdaris, C. Chassomeris, H. Tzanatos, I. Kopelias, D. Lymberopoulos, J. Psarras, “Telemedicine technology and applications for home hemodialysis”, The International Journal of Artificial Organs, Vol. 22, Issue.10, pp.679-683, 1999.
[6] Y Tountas, G Saroglou, S Frissiras, A Vatopoulos and F Salaminios, “Remote access to an expert system for infectious diseases”, Journal of Telemedicine and Telecare, Vol.6, Issue.6, pp.339-342, 2000.
[7] S Khoor, J Nieberl, K Fugedi, E Kail, “Telemedicine ECG-Telemetry with Bluetooth Technology”, Computers in Cardiology 2001. Vol.28(Cat. No. 01CH37287), Rotterdam,Netherlands, pp.585-588, 2001.
[8] Patrick Y.K. Chau, Paul Jen-Hwa Hu, “Investigating healthcare professionals’ decisions to accept telemedicine technology: an empirical test of competing theories”, Information & Management, Vol.39, Issue.4, pp.297-311, 2001.
[9] Lynne P. Baldwin, Malcolm Clarke, Tillal Eldabi, Russell W. Jones, “Telemedicine and its role in improving Communication in healthcare”, Logistics Information Management, Vol.15, Issue.4, pp.309-319, 2002.
[10] S Khoor, J Nieberl, K Fugedi, E Kail, “Internet-based, GPRS, Long Term ECG Monitoring and Non Linear Heart-rate Analysis for Cardiovascular Telemedicine Management”, Computers in Cardiology 2003, Thessaloniki Chalkidiki, Greece, pp.209-212, 2003.
[11] Patricia Ryan, R.N., M.S., Rita Kobb, M.S., M.N., A.R.N.P., B.C., and Patricia Hilsen, R.N., B.S.N., “Making the Right Connection: Matching Patients to Technology”, Telemedicine Journal and e-Health, Vol.9, Issue.1, pp.81-88, 2003.
[12] Li-Sheng Chen, Ching-Yao Tsai, Tzeng-Ying Liu, Tao-Hsin Tung, Yueh-Hsia Chiu, Chang-Chuan Chan, Der-Ming Liou and Tony Hsiu-Hsi Chen, “Feasibility of tele-ophthalmology for screening for eye disease in remote communities”, Journal of Telemedicine and Telecare, Vol.10, Issue.6, pp.337-341, 2004.
[13] Indian Space Research Organisation, “Telemedicine Healing Touch Through Space”, Publications and Public Relations Unit, ISRO, pp.1-8, 2005.
[14] D Ryan, W Cobern, J Wheeler, D Price and L Tarassenko, “Mobile phone technology in the management of asthma”, Journal of Telemedicine and Telecare, Vol.11, Issue.1_suppl, pp.43-46, 2005.
[15] Daniel Lucani, Giancarlos Cataldo, Julio Cruz, Guillermo Villegas, and Sara Wong, “A portable ECG monitoring device with Bluetooth and Holter capabilities for telemedicine applications”, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, New York, USA, pp.5244-5247, 2006.
[16] Charles R. Doarn, Francis McVeigh, and Ronald Poropatich, “Innovative New Technologies to Identify and Treat Traumatic Brain Injuries: Crossover Technologies and Approaches Between Military and Civilian Applications”, Telemedicine and e-Health, Vol.16, Issue.3, pp.373-381, 2010.
[17] Juliane Sengpiel, Thomas Fuehner, Christiane Kugler, RN, Murat Avsar, Isabelle Bodmann, Annelies Boemke, RN, Andre Simon, Tobias Welte, Jens Gottlieb, “Use of telehealth technology for home spirometry after lung transplantation: a randomized controlled trial”, Progress in Transplantation, Vol.20, Issue.4, pp.310-317, 2010.
[18] A. Rashkovska, I. Tomašić and R. Trobec, “A Telemedicine Application: ECG Data from Wireless Body Sensors on a Smartphone”, 2011 Proceedings of the 34th International Convention MIPRO, Opatija, Croatia, 2011.
[19] Asadullah Shaikh, “The impact of SOA on a system design for a telemedicine healthcare system”, Springer Vienna Publisher, pp.1-16, 2015.
[20] Lawrence R. Wechsler, Bart M. Demaerschalk, Lee H. Schwamm, Opeolu M. Adeoye, Heinrich J. Audebert, Christopher V. Fanale, David C. Hess, Jennifer J. Majersik, Karin V. Nystrom, Mathew J. Reeves, Wayne D. Rosamond, Jeffrey A. Switzer, “Telemedicine Quality and Outcomes in Stroke”, Stroke Publisher, Vol.48, Issue.1, pp.e1-e23, 2017.
Citation
Tania Ghosh, B. B. Bhowmik, "Telemedicine Based on Healthcare System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.594-602, 2018.
Survey On Semantic Segmentation
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.603-606, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.603606
Abstract
The Image segmentation is referred to as one of the most important processes of image processing. Image segmentation is the technique of dividing or partitioning an image into parts, called segments. It is mostly useful for applications like image compression or object recognition, because for these types of applications, it is inefficient to process the whole image. So, image segmentation is used to segment the parts from image for further processing. Semantic image segmentation is a vast area for computer vision and machine learning researchers. Many vision applications need accurate and efficient image segmentation and segment classification mechanisms for assessing the visual contents and perform the real-time decision making. There exist several image segmentation techniques, which partition the image into several parts based on certain image features like pixel intensity value, color, texture, etc. These all techniques are categorized based on the segmentation method used. The application area includes remote sensing, autonomous driving, indoor navigation, video surveillance and virtual or augmented reality systems etc. This survey paper provides a review of different traditional methods of image segmentation.
Key-Words / Index Term
Image segmentation, Conditional Random Field, Deep learning, semantic video segmentation
References
[1]S.Maldonado-Bascon, S.Lafuente-Arroyo, P. Gil-Jimenez, H. Gomez-Moreno, and F. Lopez-Ferreras, “Road-sign detection and recognition based on support vector machines,” Intelligent Transportation Systems, IEEE Transactions on,vol. 8, no. 2, pp. 264–278, Jun. 2007.
[2]N.Moon, E. Bullitt, K. Van Leemput, and G. Gerig, “Automatic brain and tumor segmentation,” in Medical Image Computing and Computer-Assisted Intervention MICCAI 2002. Springer, 2002, pp.372–379.
[3]G.-Q. Wei, K. Arbter, and G. Hirzinger, “Automatic tracking of laparoscopic instruments by color coding,” in CVRMed-MRCAS’97, ser. 1997, vol. 1205, pp. 357–366.
[4]“Memory based active contour algorithm using pixel-level classified images for colon crypt segmentation,” Computerized Medical Imaging and Graphics, Nov. 2014.
[5] C. Huang, L. Davis, and J. Townshend, “An assessment of support vector machines for land cover classification,” International Journal of remote sensing, vol. 23, no. 4, pp. 725–749, 2002.
[6] Krahenbuhl, P. and Koltun, V. E_cient inference in fully connected crfs with gaussian edge potentials.In NIPS, 2011.
[7]Jonathan Long, Evan Shelhamer, Trevor Darrell Fully Convolutional Networks for Semantic Segmentation CVPR 2015 arXiv:1411.4038
[8]B. Hariharan, P. Arbelaez, R. Girshick, and J. Malik. Hypercolumns for object segmentation and _new grained localization. In Computer Vision and Pattern Recognition, 2015
[9]L.C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille. Semantic image segmentation with deep convolutional nets and fully connected crfs. In ICLR, 2015
[10] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet, Z. Su, D. Du, C. Huang, and P. Torr. “Conditional random fields as recurrent neural networks”. In ICCV, 2015
[11]Kundu, Abhijit, Vineet, Vibhav, and Koltun, Vladlen. “Feature space optimization for semantic video segmentation”. In CVPR, 2016
[12]M. Everingham, L. Van Gool, C.K.I. Williams, J. Winn, A. Zisserman, "The PASCAL Visual Object Classes Challenge 2007 (VOC2007) Results", 2010
[13]G. J. Brostow, J. Fauqueur, and R. Cipolla. “Semantic object classes in video: A high-de nition ground truth database”. Pattern Recognition Letters, 30(2), 2009
[14]M. Cordts, M. Omran, S. Ramos, T. Rehfeld, M. Enzweiler, R. Benenson, U. Franke, S. Roth, and B. Schiele. “The Cityscapes dataset for semantic urban scene understanding”. In CVPR, 2016
[15]A. Geiger, P. Lenz, C. Stiller, and R. Urtasun, “Vision meets robotics The kitti dataset," 2013
[16]A. Geiger, P. Lenz, and R. Urtasun, “Are we ready for autonomous driving? the kitti vision benchmark suite," in CVPR, 2012
Citation
P.S.Gunde, S.K.Shirgave, "Survey On Semantic Segmentation," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.603-606, 2018.
Sanjeevani: A Centralized Data Repository to Search Real-Time Emergency Medical Supplies
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.607-611, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.607611
Abstract
These days, with a bustling way of life individuals of all age aggregate battle with well-being related issues. Also searching for suitable blood groups and medicines in an emergency situation is strenuous task for family members which requires most extreme time and human exertion and now and then turns out to be exceptionally important that may cost the life of the patient. In this manner, HealthCare has turned into a required need of each family. To solve health related problem, we propose a Web based platform to ease the process of finding suitable blood groups from nearby Blood Banks in the area. Likewise, the application discovers conventional and its substitute drug from Medicine Shops accessible in the region utilizing Real time Location of the particular client/s through GPS. Subsequently, it reduces paperwork on daily basis of hospital blood banks by maintaining a database that will work in real-time for blood record maintenance.
Key-Words / Index Term
GPS, Generic Medicine, Healthcare System, Emergency Medical Supplies, Web based application.
References
[1] Ahmed Imteaj and Muhammad Kamrul Hossain, “A Smartphone based Application to Improve the Health Care System of Bangladesh”, 978-1-5090-5421-3/16/$31.00 ©2016 IEEE.
[2] Anjanikumar Pandey, Atharva Joglekar, Naishadh Kalyanpur, Vaibhav Kangane, Prof. Samira Nigrel, “Automation of Generic Prescription”, International Conference on Innovative and Advanced Technologies in Engineering (March-2018).
[3] Rehab S. Ali, Tamer F. Hafez, Ali Badawey Ali and Nadia Abd-Alsabour, “Blood Bag: A Web Application to Manage All Blood Donation and Transfusion Processes”, the IEEE WiSPNET 2017 conference, 978-1-5090-4442-9,2017 IEEE.
[4] Prof.D.V. Chandran, SayaliAdarkar, Apurva Joshi, PreetiKajbaje, “Digital Medicine: An android based application for health care system”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 04 | Apr -2017, e-ISSN: 2395 -0056.
[5] Deeptha Hegde, Agnus Kuriakose, Amitha Mariya Mani, Anju Philip, Annamma P Abraham Assistant Professor, “Design and Implementation of E-Blood Donation System Using Location Tracking”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 5, May 2017, ISSN(Online): 2320-9801.
[6] N. Amreenkubra, N. Brundha, S. Nethra, V. Sivasakthi and R. Vasugi Assistant Professor, “Mobile Application for Checking the Status of Stock Availability in Pharmacy” PMC Tech Chennai, Dept of CSE.
[7] Author: Vikas Kulshreshtha Research Scholar, Dr. Sharad Maheshwari, Associate Professor, “Blood Bank Management Information System in India”, International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.260-263, [ISSN: 2248-9622].
[8] Shafiqurrahman Abu Aamir Shaikh, Sadiya Munir Wagho, Samreen Yusuf Shaikh, Ubaid Mukati, Sufiyan Tamboli, Prof Amer Sayed, Prof Sameer Panwala, “Analysis & Locating Branded and Generic Medicine Using GPS Navigation System”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 10, October 2015.
[9] D.M.S. Kumari and A.N. Wijayanayake, “An efficient inventory model to reduce the wastage of Blood in the National Blood Transfusion Service”, Proceedings of the 1st Manufacturing & Industrial Engineering Symposium 22 October 2016, Colombo, Sri Lanka, 978-1-5090-3629-5/16/$31.00 ©2016 IEEE
[10] Lisa Graham, Mohammad Moshirpour, Michael Smithand Behrouz H. Far,” Designing Interactive Health Care Systems: Bridging the Gap Between Patients and Health Care Professionals”, 978-1-4799-2131-7/14/$31.00 ©2014 IEEE.
[11] Yemi-Peters, Victoria I., Okon Emmanuel O., JoshuaB. Agbogun, “Healthcare and Economic Growth in Nigeria: A Repository Database System for Traditional Herbal Medicines Used in Healthcare”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT Volume 2, Issue 6, ISSN: 2456-3307.
[12] R. Bhavani, K. S. Suganya, D. Yazhini Priyanka, “Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework”, International Journal of Scientific Research in Network Security and Communication, ISSN: 2321-3256.
Citation
Shabana Tadvi, Husain Kagalwala, Mustufa Amrelia, Zenab Kagdiwala, "Sanjeevani: A Centralized Data Repository to Search Real-Time Emergency Medical Supplies," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.607-611, 2018.
Internet of things based advanced telematics system for electric vehicles
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.624-627, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.624627
Abstract
The Internet of Things (IoT) will break newfangled ground for automobile manufacturers by introducing entirely new layers to the traditional concept of a car. Traditional LCD/LED dashboard displays have a constraint of space i.e. the data display is restricted exclusively to the drivers which make it infeasible for other concerned people to view and know about the various parameters of the vehicle. IoT along with cloud computing will help to store the sensor values and other crucial data on encrypted cloud servers which can help set up a telematics solution along with a data acquisition system accessible from anywhere in the world.
Key-Words / Index Term
Blynk cloud,data-analytics,connectivity,NodeMCU
References
[1] K. G. Pranay Kujur, “Smart Interaction of Object on Internet of Things,” International Journal of Computer Sciences and Engineering , vol. 3, no. 1, pp. 15-19, 2015.
[2] A. G. ,. A. A. ,. M. T. A. Pandey, “IOT Based Home Automation Using Arduino and ESP8266,” International Journal of Computer Sciences and Engineering, vol. 6, no. 4, pp. 267-270, 2018.
Citation
Arvindsingh Rathore, "Internet of things based advanced telematics system for electric vehicles," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.624-627, 2018.
Named Entity Disambiguation Anaphora Resolution and Question Answering in Speech
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.628-632, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.628632
Abstract
Speech Recognition, Named Entity Disambiguation(NED), Anaphora Resolution and Question Answering(QA) are some of the major areas of research in Natural Language Processing(NLP). Speech recognition systems will convert the human voice into corresponding text. Named Entity Disambiguation will identify the entity types in the given text. Anaphora Resolution is the process of finding antecedents of an anaphor and it has become a challenging task in the Computational Linguistics and Natural Language Processing(NLP). Question answering will develop systems that automatically answers the questions in natural language. Question answering system and Named Entity Disambiguation are the important fields intended to enhance the performance of the Information Retrieval System. This work mainly focused on integrating the above three tasks in a single system. Moreover this system will perform these tasks by receiving human speech as input and then converting it into the corresponding text. After the text conversion, Entity Disambiguation is performed on it. Real time speech input are given as the input. Anaphora resolution is also integrated with the disambiguation phase. The Question Answering System completely depends on the efficiency of entity disambiguation. The Answers are retrieved by searching based on these disambiguated entities. Anaphora Resolution will provide greater support for those entities that are not correctly identified in the disambiguation phase. Also the problem that anaphors that couldn`t find proper antecedents can easily find the correct ones since their entity type is correctly identified. The Question Answering System will perform better if the entities are correctly identified and disambiguated.
Key-Words / Index Term
Speech Recognition, Named Entity Disambiguation, Anaphora Resolution, Question Answering, Natural Language Processing(NLP), Computational Linguistics
References
[1] Mena B. Habib, Maurice van Keulen , “NEED4Tweet: A Twitterbot for Tweets Named Entity Extraction Disambiguation”, Proceedings of ACL-IJCNLP 2015 System Demonstrations, pp. 31- 36, 2015.
[2] Danica Damljanovic and Kalina Bontcheva “Named Entity Disambiguation using Linked Data”, In proceedings of the 9th Extended Semantic Web Conference ESWC2012, pp. 334-336, 2012.
[3] Lev Ratinov, Dan Roth, Doug Downey, Mike Anderson “Local and Global Algorithms for Disambiguation to Wikipedia”, In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Volume 1, pp. 1375-1384, 2011.
[4] Mark Dredze, Paul McNamee, Delip Rao, Adam Gerber, Tim Finin, “Entity Disambiguation for Knowledge Base Population”, COLING ’10 Proceedings of the 23rd International Conference on Computational Linguistics, pp. 277- 285, 2010.
[5] Vipin Kumar, Pandey Shreya, Solanki Kamini Sharma, “A Technique for Anaphora Resolution of Text”, In proceedings of the International Journal of Applied Information Systems IJAIS, volume 5, pp. 0868-2249, 2013.
[6] Eugene Charniak and Micha Elsner, “EM Works for Pronoun Anaphora Resolution”, In Proceedings of the 12th Conference of the European Chapter of the ACL EACL 2009, pp. 146-158, 2009.
[7] Kalyani P. Kamune, Avinash Agrawal, Hybrid Approach to Pronominal Anaphora Resolution in English Newspaper Text, International Journal of Intelligent Systems and Applications(IJISA), vol 7, pp. 56-64, 2015.
[8] Smita Singh, Priya Lakhmani, Dr. Pratistha Mathur, Dr.Sudha Morwal, Analysis of Anaphora Resolution System for English Language, In proceedings of International Journal on Information Theory (IJIT), vol 3, pp. 51-57, 2014.
[9] Niyu Ge, John Hale, Eugene Charniak, A Statistical Approach to Anaphora Resolution, In proceedings of the workshop on very large corpora, pp. 161-170, 1998.
[10] Gayatri Chavan, Sonal Gore, Design of the Effective Question Answering System by Performing Question Analysis using the Classifier,International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA, vol 139, pp. 1-3, 2016.
[11] Marcus Klang, Pierre Nugues, Named Entity Disambiguation in a Question Answering System, The Fifth Swedish Language Technology Conference (SLTC 2014), 2014.
[12] Rohini Srihari, Wei Li, A Question Answering System Supported by Information Extraction, In Proceedings of the sixth conference on Applied natural language processing, pp. 166-172, 2000.
[13] Taniya Mishra, Srinivas Bangalore, Qme! : A Speech based Question-Answering system on Mobile Devices, In Proceeding HLT ’10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pp. 55-63, 2010.
Citation
C H. Chithira , "Named Entity Disambiguation Anaphora Resolution and Question Answering in Speech," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.628-632, 2018.
A Survey: Dual watermarking Techniques using 2 DWT, DCT & SVD
Survey Paper | Journal Paper
Vol.6 , Issue.12 , pp.633-641, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.633641
Abstract
Digital image watermarking (DIW)is the way toward embedding watermark into a digital image (DI) for validation and in this way protecting the DI from copyright encroachment. In this paper, a versatile undetectable watermarking plan is proposed in dual watermarking process. It is expected that the simplicity with which advanced media can be replicated will prompt an expansion of copyright encroachment.. The implement work calculation is depicted in subtle elements. The calculation has 2 strategies; the watermark installing strategy and the watermark extraction systems. This zone gives two changes used as a piece of the proposed computation to watermark government report pictures. The 2 changes are the 2 level DWT and SVD. The 2 transform and dual watermarking are useful in course in such an approach to misuse their appealing properties.
Key-Words / Index Term
Digital image Watermarking, DCT, DWT, SVD, Image processing, copyright protection
References
[1] Maha Sharkas, Dahlia ElShafie, and Nadder Hamdy, “A Dual Digital-Image Watermarking Technique”. International Science Index, Computer and Information Engineering Vol:1, No:5, 2007 waset.org/Publication/12060
[2] BODDULA MADHAVI 1 DR. RAJKUMAR L BIRADAR2 DR. K. RAMA LINGA REDDY, “A SURVEY ON DIGITAL WATERMARKING APPROACH BASED ON INTEGER WAVELET TRANSFORM”. INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume VI /Issue 1 /NOV 2015
[3] Ankita Agrawal, Anubha prajapati, “A Survey on Digital Image Manjinder Kaur and Varinder Kaur Attri, “A Survey on Digital Image Watermarking and Its Techniques”. International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 5 (2015), pp. 145-150 http://dx.doi.org/10.14257/ijsip.2015.8.5.15
[4] Dr. Rajukumar L Biradar, Manjunath R. Hudagi, Sachin A. Urabinahatti, “Dual Watermarking Techniques for Efficient Watermarks”. International Journal of Engineering Technology, Management and Applied Sciences www.ijetmas.com February 2016, Volume 4, Issue 2, ISSN 2349-4476
[5] VANDANA S INAMDAR1,∗ and PRITI P REGE2, “Dual watermarking technique with multiple biometric watermarks”. S¯adhan¯ a Vol. 39, Part 1, February 2014, pp. 3–26. c Indian Academy of Sciences
[6] N. Mohananthini1 *, G. Yamuna2 , C. Ananth3 , M.Karthikeyan, “Literature Review on Multiple Watermarking for Images using Optimization Techniques” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 6, Issue 6, June 2017
[7] Lilly Anusha, S., & AnuRadha, B. (2013). Generic Approach for Visible Watermarking, International Journal of Computer Applications Technology and Research, 2 (1), 37-40
[8] Sundararajan, M., & Yamuna Govindarajan. (2012). DWT Based Color Image Watermarking using Area of Best Fit, European Journal of Scientific Research, 88 (3), 380-389.
[9] Namita Tiwari and Sharmila, “Digital Watermarking Applications, Parameter Measures and Techniques”. IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017
[10] Yusuf Perwej1 , Firoj Parwej2 , Asif Perwej, “An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”. The International Journal of Multimedia & Its Applications (IJMA) Vol.4, No.2, April 2012.
[11] Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, and Yixian Yang, “A Novel Digital Watermarking based on General Non-negative Matrix Factorization”. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMM.2018.2794985, IEEE Transactions on Multimedia
[12] Ninny Mittal, Anand Singh Bisen, Rohit Gupta, “An Improved Digital Watermarking Technique Based on 5-DWT,FFT & SVD”. International Conference on Trends in Electronics and Informatics ICEI 2017. 978-1-5090-4257-9/17/$31.00 ©2017 IEEE
[13] Alifa D’Silva, Nayana Shenvi, “Data Security Using SVD Based Digital Watermarking Technique”. International Conference on Trends in Electronics and Informatics ICEI 2017, 978-1-5090-4257-9/17/$31.00 ©2017 IEEE
[14] Sandaruwan G.W.R., “Robust and Adaptive Watermarking Technique for Digital Images”. ICIIS`2017 1570371967, 978-1-5386-1676-5/17/$31.00 ©2017 IEEE
[15] Mohammad Rasool Mirzaei, Maryam Karimi, Nader Karimi, Shadrokh Samavi, “Blind Image Watermarking Based on Local Analysis of Gradients”. 2017 25th Iranian Conference on Electrical Engineering (ICEE) IEEE 20 17© $3l.00/978-1-5090-5963-8/17
[16] V Muni SekharI, Ch Sravan Kumar, K V G RaoI, N Sambasiva RaoII, M Gopichand, “A Reversible RIE based Watermarking Scheme”. 2017 IEEE 7th International Advance Computing Conference, 978-1-5090-1560-3/17 $31.00 © 2017 IEEE DOI 10.1109/IACC.2017.179
[17] Andjela Draganić*, Milan Marić**, Irena Orović* and Srdjan Stanković, “Identification of image source using serialnumber-based watermarking under CompressiveSensing conditions”. MIPRO 2017, May 22- 26, 2017, Opatija, Croatia.
[18] Mashruha Raquib Mitashe, Ahnaf Rafid Bin Habib, Anindita Razzaque, Ismat Ara Tanima, Jia Uddin, “An Adaptive Digital Image Watermarking Scheme with PSO, DWT and XFCM”.978-1-5090-60047/17/$31.00©2017 IEEE
[19] Radhika G. Kabra and Sushma S. Agrawal, “Robust Embedding of Image Watermark using LWT and SVD”. International Conference on Communication and Signal Processing, April 6-8, 2016, India. 978-1-5090-0396-9/16/$31.00 ©2016 IEEE
[20] Ali Al-Haj , Hussam Barouqa, “Copyright Protection of E-Government Document Images Using Digital Watermarking”. 2017 3rd International Conference on Information Management. 978-1-5090-6306-2/17/$31.00 ©2017 IEEE
[21] Sudhanshu Suhas Gonge, Ashok A.Ghatol, “An Enhancement in Security and Copyright Protection Technique Used for Digital Still Image”. 2017 International Conference on Nascent Technologies in the Engineering Field (ICNTE-2017). 978-1-5090-2794-1/17/$31.00 ©2017 IEEE
[22] Sanjay Kumar, Ambar Dutta, “A Study on Robustness of Block Entropy Based Digital Image Watermarking Techniques with respect to Various Attacks”. IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India. 978-1-5090-0774-5/16/$31.00 © 2016 IEEE
[23] Abhishek Basu , Subhrajit Sinha Roy , Avik Chattopadhyay , “Implementation of a Spatial Domain Salient Region Based Digital Image Watermarking Scheme”. 978-1-5090-1047-9/16/$31.00 ©2016 IEEE
[24] N. SenthilKumaran, and S. Abinaya, “Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique”. International Conference on Communication and Signal Processing, April 6-8, 2016, India, 978-1-5090-0396-9/16/$31.00 ©2016 IEEE
Citation
D.S. Somra, M. Gupta, "A Survey: Dual watermarking Techniques using 2 DWT, DCT & SVD," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.633-641, 2018.
All-Optical Linear Binary Code Generator Using Optical Nonlinear Material Based Devices
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.642-656, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.642656
Abstract
The transmission of information occurs simultaneously over the same available channel bandwidth in Code Division Multiple Access (CDMA) technique. The spread spectrum (SS) technique is employed in CDMA systems for transmission of information by employing spreading codes. A unique spreading code, acts as a signature code, is assigned for each individual user. The signal occupies a bandwidth much larger than the minimum necessary to send the information in SS modulation technique. A synchronized reception with the code at the receiver is applied for dispreading the information before data recovery. From a long-term, Walsh-Hadamard codes have been employed as spread spectrum codes in CDMA communications due to their ease of generation than the efficiency of these codes. Walsh-Hadamard codes are absolutely orthogonal linear binary codes which have so many favorite applications in synchronous multicarrier communications though they perform poorly for asynchronous multi-user communications. Now, the optical application of these Walsh-Hadamard codes is important for optical CDMA. In these designs nonlinear optical property is exploited for capable of controlling multi-valued signals. To this purpose, it is proposed with exploiting the polarization properties of light an all-optical design of Walsh-Hadamard codes generator in this paper.
Key-Words / Index Term
Optical nonlinear material, Optical switches, Polarization converter, Polarization converter mask, Walsh-Hadamard code
References
[1] D. Woods & T.J. Naughton, Photonic neural networks. Nature Physics, 8, doi: 10.1038/nphys2283, 257 (2012).
[2] B. M. Popovic, “Spreading sequences for multicarrier CDMA systems,” IEEE Trans. Communication., vol. 47, no. 5, pp. 918 (1999).
[3] H.J. Caulfield, S. Dolev & W.M.J. Green, Appl. Opt. A, 48 (Optical High-Performance Computing feature issue), http://dx.doi.org/10.1364/AO.48.0OHPC1 (2009).
[4] S. P. Maity, M. Mukherrjee, “On Optimization of CI/MC-CDMA System”, In: 20th IEEE Personal, Indoor and Mobile Radio Comm. Symp., Japan, pp. 3203 (2009).
[5] T. Reed, G. Mashanovich, F.Y. Gardes & D.J. Thomson, Silicon optical modulators. Nature Photonics, 4, doi:10.1038/nphoton.2010.179, 518 (2010).
[6] G. W. Wornell, “Spread-signature CDMA: Efficient multi-user comm-unication in the presence of fading,” IEEE Trans. Inform. Theory, vol. 41, no. 5, pp. 1418 (1995).
[7] H.J. Caulfield & S. Dolev, Why future supercomputing requires optics. Nature Photonics, 4, doi:10.1038/nphoton.2010.94, 262 (2010)
[8] C. Taraphdar, T. Chattopadhyay & J.N. Roy, Designing of Polarization encoded all-optical ternary multiplexer and Demultiplexer. Recent Patents on Signal Processing, 1(2), 143, doi:10.2174/1877612411101020143 (2011).
[9] J. Li, L. Li, L. Jin and C. Li, “All-optical switch and limiter based on nonlinear polarization in Mach-Zehnder interferometer coupled with a polarization maintaining fiberring resonator,” Optics Communication, vol.260, pp.318 (2006).
[10] T. Chattopadhyay, J.N. Roy & A.K. Chakraborty, Polarization encoded alloptical quaternary R-S flip-flop using binary latch. Optics Communications, 282, 1287-1293, DOI:10.1016/j.optcom.2008.12.022 (2009).
[11] C. Ji, R. G. Broeke, Y. Du, J. Cao, N. Chubun, P. Bjeletich, F. Olsson, S. Lourdudoss, R. Welty, C. Reinhardt, P. L. Stephan, and S. J. B. Yoo, "Monolithically integrated InP based photonic chip development for O-CDMA systems," IEEE J. Select. Topics Quantum Electron, vol. 11, pp. pp66 (2005).
[12] S. Liu, C. Li, J. Wu and Y. Liu, “Optoelectronic multiple-valued logic implementation,” Optics Letters, vol.14(14), pp.713 (1989).
[13] G. Eichmann, Y. Li and R. R. Alfano, “Optical binary coded ternary arithmetic and logic,” Applied Optics, vol.25(18), pp.3113 (1986).
[14] G. K. Maity, S. P. Maity and J. N. Roy, “All-Optical Manchester Code Generator using TOAD-based D Flip-Flop,” ICDCS (2012).
[15] G.K. Maity & S.P. Maity, Realization of Orthogonal Codes in Optical Information Processing, IEEE International Conference on Emerging Applications of Information Technology, 978-1-4673-1827, 307 (2012).
[16] G. K. Maity, S. P. Maity and J. N. Roy, “TOAD-based All-Optical Gold Code Generator,” ICDCS (2012) .
[17] G. Shvets, Optical polarsizer/isolator based on a rectangular waveguide with helical grooves, arxiv:physics/0606206v1 [physics.Optics], 1 (2006).
[18] J. P. Sokoloff, P. R. Prucnal, I. Glesk, M. Kane, A terahertz optical asymmetric demultiplexer (TOAD), IEEE Photon. Techno. Lett. 5 (7), 787-789, 1993.
[19] J. P. Sokoloff, I. Glesk, P. R. Prucnal, R. K. Boneck, Performance of a 50 Gbit/s Optical Time Domain Multiplexed System Using a Terahertz Optical Asymmetric Demultiplexer, IEEE Photon. Techno. Lett.6 (1), 98-100, 1994.
[20] Y.K.Huang, I.Glesk, R.Shankar, P.R.Prucnal, Simultaneous all-optical 3R regeneration scheme with improved scalability using TOAD, Optics Express, 14(22), 10339-10344, 2006.
[21] Z.Y. Shen and L. L. Wu, Reconfigurable optical logic unit with a terahertz optical asymmetric demultiplexer and electro-optic switches, Appl. Opt. 47(21), 3737-3742, 2008.
[22] B.C. Wang, V. Baby, W. Tong, L. Xu, M. Friedman, R.J. Runser, I. Glesk, P. R. Pruncnal, A novel fast optical switch based on two cascaded Terahertz Asymmetric Demultiplexers(TOAD), Optics Express 10(1), 15-23, 2002.
[23] Y. J. Jung, S. Lee, N. Park, All-optical 4-bit gray code to binary coded decimal converter, Optical Components and Materials, Proceedings of the SPIE, Volume 6890, 68900S, 2008.
[24] J.N.Roy, D.K.Gayen, Integrated all-optical logic and arithmetic operations with the help of TOAD based interferometer device – alternative approach, Appl. Opt. 46(22), 5304-5310, 2007.
[25] J. N. Roy, G. K. Maity, D. Gayen, T. Chattopadhyay, Terahertz Optical Asymmetric Demultiplexer based tree-net architecture for all-optical conversion scheme from binary to its other 2n radix based form, Chinese Optics Letter 6(7), 536-540, 2008.
[26] R. Menzel, Photonics Linear and Nonlinear Interactions of Laser Light and Matter (Springer-Verleg, Barlin, Heidelberg, Chap. 4 (2006).
[27] G.S. He, Prog. Quantum Electron. 26 (3) (2002) 131.
[28] A. Yariv, D.M. Pepper, Opt. Lett. 1 (1) (1977) 16.
[29] A.W. Lohmann, Polarization and optical logic, Applied Optics, 25, 1594 (1988).
[30] J.M. Tang, & K.A. Shore, Strong picosecond optical pulse propagating in semiconductor optical amplifiers at transparency. IEEE Journal of Quantum Electronics, 34(7), 1263-1269, doi: 10.1109/3.687871 (1998).
[31] A.W. Domanski, Polarization degree fading during propagation of partially coherent light through retarders. Opto-Electronics Review, 7th International Workshop on Nonlinear Optics applications, 13(2), 171 (2005).
[32] S.L. Hurst, Multiple-Valued Logic-Its Status and its Future, IEEE Transactions on computers, C-33(12), 1160, Doi:10.1109/TC.1984.1676392 (1984).
[33] F. Bruyere & O. Andouin, Penalties in long-haul optical amplifiers systems due to polarization dependent loss and gain. IEEE Photonics Tech. Letters, 6(5), 654, doi: 10.1109/68.285570 (1994).
[34] L.E. Nelson, T.N. Nielson & H. Kogelnik, Observation of PMD-induced coherent crosstalk in polarization-multiplexed transmission. IEEE photonics tech. letter, 13(7), 738, DOI:10.1109/68.930432 (2001).
[35] A. Mecozzi & M. Shtaif, ‘The statistics of polarization dependent loss in optical communication systems’. IEEE photonics tech. letter, 14(3), 313, DOI: 10.1109/68.986797 (2002).
[36] T. Chattopadhyay, G. K. Maity, J. N. Roy, “Designing of all-optical tri-state logic system with the help of optical nonlinear material,” Journal of Nonlinear Optical Physics and Materials, vol.17, No. 3, 315 (2008).
[37] J.L. Walsh, A closed set of normal orthogonal functions. American Journal of Mathematics, 45(1), 5 (1923).
[38] F. Bruyere & O. Andouin, O ‘Penalties in long-haul optical amplifiers systems due to polarization dependent loss and gain’. IEEE Photonics Tech. Letters, 6(5), 654, doi: 10.1109/68.285570 (1994).
Citation
Ashis Kumar Mandal, "All-Optical Linear Binary Code Generator Using Optical Nonlinear Material Based Devices," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.642-656, 2018.
Internet of Things: Security Issues and Countermeasures
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.657-661, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.657661
Abstract
Internet of Things (IOT) is an emanate trend, that exploits the vast number of inter-connected daily used smart-devices to provide numerous services. These devices may vary in size, computational power, capacity and their usability. Tremendous amount of data is transmitted and collected by these devices, there is a high risk of data theft, object manipulation, identity and network manipulation. Moreover, misuse of IOT devices can also lead to possibility of cyber-attack and to organize crime. While a tremendous rise has been seen in the usage of such devices, security vulnerabilities also rise accordingly. Therefore, it is necessary to identify the security issues and address them accordingly. In this paper we discuss the IoT reference model, some of its applications, security challenges, and their countermeasures. The primary goal of this research is to address security issues in IoT and discuss the countermeasures.
Key-Words / Index Term
IOT security, vulnerabilities, Data Encryption, DoS (Denial of Service), IDSs (Intrusion Detection Services)
References
[1] S. Karnouskos, P. J. Marrn, G. Fortino, L. Mottola, and J. R. Martinez deDios, “Applications and Markets for Cooperating Objects. Springer Briefs in Electrical and Computer Engineering,” Springer, 2014, pp. i-xiv, 1-120.
[2] H. Xiao, N. Sidhu, and B. Christianson, “Guarantor and reputation based trust model for Social Internet of Things,” in Proc. International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, 2015, pp. 600-605.
[3] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The Internet of Things architecture, possible applications and key challenges,” in Proc. IEEE 10th Int. Conf. Frontiers of Information Technology, 2012, pp. 257–260.
[4] “The Internet of Things reference model.” CISCO, 2014. [Online] Available: http://cdn.iotwf.com/resources/71/IoT Reference Model White Paper June 4 2014.pdf
[5] Imen Ben Ida, Abderrazak Jemai and Adlen Loukil, A survey on security of IoT in the context of eHealth and clouds,2016 11th International Design Test Symposium (IDT), 18-20 Dec. 2016, Hammamet, Tunisia.
[6] I. Stojmenovic, ‘‘Machine-to-machine communications with in-network data aggregation, processing and actuation for large scale cyber-physical systems,’’ IEEE Internet Things J., vol. 1, no. 2, pp. 122–128, Apr. 2014.
[7] D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, “Internet of Things: Vision, Applications and Research Challenges”. Volume 10, Issue 7, pp. 1497-1516, Ad Hoc Networks, (September 2012).
[8] O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and Security inInternet of Things and Wearable Devices,” IEEE Transactions on Multi-Scale Computing Systems, vol. 1, no. 2, pp. 99-109, April-June 1 2015.
[9] H. Salmani and M. M. Tehranipoor, “Vulnerability analysis of a circuit layout to hardware Trojan insertion,” IEEE Trans. Information Forensics and Security, vol. 11, no. 6, pp. 1214–1225, 2016.
[10] A. Agah and S. K. Das, “Preventing DoS attacks in wireless sensor networks: A repeated game theory approach,” Int. J. Network Security, vol. 5, no. 2, pp. 145–153, 2007.
[11] B. Dorsemaine, J. P. Gaulier, J. P. Wary, N. Kheir and P. Urien, "A new approach to investigate IoT threats based on a four layer model," 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Paris, 2016, pp. 1-6.
[12] N. Kushalnagar, G. Montenegro, and C. Schumacher, “IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals,” RFC 4919, Aug. 2007.[13] X. Wang, S. Chellappan, W. Gu, W. Yu, and D. Xuan, “Search-based physical attacks in sensor networks,” in Proc. IEEE 14th Int. Conf. Computer Communications and Networks, 2005, pp. 489–496.
[14] S. H. Weingart, “Physical security devices for computer subsystems: A survey of attacks and defenses,” in Proc. Cryptographic Hardware and Embedded Systems. Springer, 2000, pp. 302–317.
[15] M. Mozaffari-Kermani, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, “Systematic poisoning attacks on and defenses for machine learning in healthcare,” IEEE J. Biomedical and Health Informatics, vol. 19, no. 6, pp. 1893–1905, Nov. 2015.
[16] V. Luong, “Intrusion detection and prevention system: SQL-injection attacks,” Master’s thesis, San Jose State University, 2010.
[17] Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu and Dechao Qiu, “Security of the Internet of Things: perspectives and challenges”, Wireless Netw ,2014.
[18] J. R. Douceur, “The Sybil attack,” in Peer-to-peer Systems. Springer, 2002, pp. 251–260.
[19] B. Revathi and D. Geetha, “A survey of cooperative black and gray hole attack in MANET,” Int. J. Computer Science and Management Research, vol. 1, no. 2, pp. 205–208, 2012.
[20] Z. Karakehayov, “Using REWARD to detect team black-hole attacks in wireless sensor networks,” in Proc. Wkshp. Real-World Wireless Sensor Networks, 2005, pp. 20–21.
[21] L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and countermeasures in the RPL-based Internet of Things,” Int. J. Distributed Sensor Networks, vol. 2013, 2013.
[22] O. Garcia-Morchon, S. Kumar, R. Struik, S. Keoh, and R. Hummen, “Security considerations in the IP-based Internet of Things.” [Online]. Available: https://tools.ietf.org/html/draft-garcia-core-security-04
[23] A. N. Nowroz, K. Hu, F. Koushanfar, and S. Reda, “Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1792–1805, 2014.
[24] T. Iwase, Y. Nozaki, M. Yoshikawa, and T. Kumaki, “Detection technique for hardware Trojans using machine learning in frequency domain,” in Proc. IEEE 4th Global Conf. Consumer Electronics. IEEE, 2015, pp. 185–186.
[25] M. Tehranipoor, H. Salmani, and X. Zhang, “Hardware Trojan detection: Untrusted manufactured integrated circuits,” in Integrated Circuit Authentication. Springer, 2014, pp. 31–38.
[26] M. Tehranipoor and F. Koushanfar, “A survey of hardware Trojan taxonomy and detection,” IEEE Design and Test of Computers, vol. 27, no. 1, pp. 10–25, 2010.
[27] A. Nejat, S. M. H. Shekarian, and M. S. Zamani, “A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting,” Microprocessors and Microsystems, vol. 38, no. 3, pp. 246–252, 2014.
[28] K. Hu, A. N. Nowroz, S. Reda, and F. Koushanfar, “High-sensitivity hardware Trojan detection using multimodal characterization,” in Proc. IEEE Design, Automation & Test in Europe Conference & Exhibition, 2013, pp. 1271–1276.
[29] S. S. Doumit and D. P. Agrawal, “Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks,” in Proc. IEEE Conf. Military Communications, vol. 1, 2003, pp. 609–614.
[30] C.-C. Su, K.-M. Chang, Y.-H. Kuo, and M.-F. Horng, “The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks],” in Proc. IEEE Conf. Wireless Communications and Networking, vol. 4, 2005, pp. 1927– 1932.
[31] A. Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion detection in sensor networks: A non-cooperative game approach,” in Proc. IEEE 3rd Int. Symp. Network Computing and Applications, pp. 343–346.
[32] A. P. R. da Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proc. ACM 1st Int. Wkshp. Quality of Service & Security in Wireless and Mobile Networks, 2005, pp. 16–23.
[33] A. D. Wood and J. Stankovic, “Denial of service in sensor networks,” IEEE Computer, vol. 35, no. 10, pp. 54–62, 2002.
[34] B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-H. Lau, S. Rao, N. Taft, and J. Tygar, “ANTIDOTE: Understanding and defending against poisoning of anomaly detectors,” in Proc. ACM 9th SIGCOMM Conf. Internet Measurement, 2009, pp. 1–14.
[35] R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A. Serbanati, and M. Rossi, “Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples,” in Proc. IEEE Int. Symp. World of Wireless, Mobile and Multimedia Networks, 2012, pp. 1–7.
[36] P. Bhatt, B. Thaker, N. Shah, “A Survey on deploying secure IoT Products”, Int. J. Scientific Research in Computer Science and Engineering, vol. 6, issue. 5, Oct 2018, pp. 41-44.
[37] A. Sebastian, S. Sivagurunathan, “A Survey on Load Balancing Schemes in RPL based Internet of Things”, Int. J. Scientific Research in Network Security and Communication, vol. 6, issue. 3, Jun 2018, pp. 43-49.
Citation
Pradeep Kamboj, Ajit Kumar Singh Yadav, "Internet of Things: Security Issues and Countermeasures," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.657-661, 2018.
Spitri: Single Packet ICMP Traceback Using Router Interface
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.662-669, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.662669
Abstract
Securing the Internet and its services is recognized as one of the most challenging research problems. Amongst the threats imposed on the Internet, Distributed Denial of Service (DDoS) attack has occurred recurrently with a severe impact on the economy of the organization. Regardless of the fact that security experts propose plentiful stupendous solutions to mitigate DDoS attack, it has continued to prevail over a decade. This convolutes the forensic inspection and countermeasures against DDoS offensive. Identifying the origin of the attack is an important and essential step towards deterrence and countermeasures against these attacks. However, they either require huge storage at the routers or require numerous packets to traceback the attack path. Further, most of the marking based traceback schemes are not backward compatible. This proposed system focuses on scrutinize these issues and proposes a feasible solution to identify the origin of Direct Distributed DDoS attack. Backward compatible Single Packet ICMP Traceback scheme using Router Interface (SPITRI) is proposed. It also uses an out-of-band ICMP message to track the attack path. It identifies the origin of an attack packet with a single ICMP message whereas the existing ICMP based traceback scheme requires more number of ICMP packets. Subsequently, SPITRI has undoubtedly reduced the bandwidth overhead provoke by the existing ICMP based traceback scheme. It traces back the attacker with minimal computation overhead and negligible storage at the routers. According to CAIDA dataset, SPITRI tracebacks 13000 attackers with an accuracy of 95.98%.
Key-Words / Index Term
Spoofing; Trace back; Client-Server Authentication; IP forging, Distributed Denial of Service, Single Packet ICMP Traceback scheme using Router Interface
References
[1] FORBES 2014, The Largest Cyber Attack in History has been Hitting Hong Kong Site, NEW JERSEY.
[2] Hussain, A, Heidemann, J & Papadopoulos, C 2003, „A framework for classifying denial of service attacks‟, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ed. Anja, ACM, Karlsruhe, pp. 99-110.
[3] S. Vincent and J. Raja, “A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks,” in Proc. networking, VLSI and signal processing (ICNVS), 2010.
[4] A. Belenky and N. Ansari, “IP Traceback With Deterministic Packet Marking,” in Proc. IEEE Communications Letters, 2003.
[5] R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” in Proc. USENIX Security Symposium (SSYM), 2000.
[6] H. Burch, “Tracing Anonymous Packets to Their Approximate Source,” in Proc. 14th Systems Administration Conference (LISA), 2000.
[7] A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, B. Schwartz, and S. Kent, “Single-Packet IP Traceback,” in Proc. IEEE Transactions on Networking, 2002.
[8] A. Izaddoost, M. Othman, and M. Rasid, “Accurate ICMP Traceback Model Under DoS/DDoS Attack,” in Proc. Advanced Computing and Communications (ADCOM), 2007.
[9] Z. Khan, N. Akram, K. Alghathbarl, M. She, and R. Mehmoodl, “Secure Single Packet IP Traceback Mechanism to Identify the Source,” in Proc. IEEE Internet Technology and Secured Transactions (ICITST), 2010.
[10] B. Stelte, “ISP Traceback - Attack Path Detection,” in Proc. IEEE Communications and Network Securit, 2013.
[11] C. Gong and K. Sarac, “A More Practical Approach for Single-Packet IP Traceback Using Packet Logging and Marking,” in Proc. IEEE Transactions on Parallel and Distributed Systems, 2008
[12] Belenky, A & Ansari, N 2003, „IP Traceback with deterministic packet marking‟, IEEE Communication Letters, Vol. 7, no. 4, pp. 162-164.
Citation
S. Suganya, P. Subramaniam, "Spitri: Single Packet ICMP Traceback Using Router Interface," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.662-669, 2018.
Undermining the Fractal and Stationary Nature of Earthquake
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.670-679, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.670679
Abstract
In this paper, an investigation has been made to detect the self-similarity and stationarity nature of magnitude of occurred Earthquake by exploring the fractal pattern and the variation nature of frequency of the essential parameter, Magnitude of occurred earthquake across the different place of the world. The time series of magnitude (19.04.1997 to 07.11.2017), of occurred earthquakes, collected from U.S.G.S. have been analysed for exposing the nature of scaling (fractality) and stationary behaviour using different statistical methodologies. Four conventional methods namely Visibility Graph Analysis (VGA), Wavelet Variance Analysis (WVA) Higuchi’s Fractal Dimension (HFD) and Detrended Fluctuation Analysis (DFA) are being used for computing the value of Hurst parameter. In addition, Artificial Neural Network, a pre-trained fully connected 3-layer has finally been used to compute the Hurst parameter. It has been perceived that the specified dataset reveals the anti-persistency and Short-Range Dependency (SRD) behaviour. Binary based ADF, KPSS test and Time Frequency Representation based Smoothed Pseudo Wigner-Ville Distribution (SPWVD) test is incorporated in order to explore the nature of stationarity/non-stationarity of the specified profile, which here displays the non-stationary character of the magnitude of earthquake.
Key-Words / Index Term
Earthquake; Hurst Parameter (H); Fractality; Stationarity; Artificial Neural Network (ANN)
References
[1] E. E. B. Hiroo Kanamori, “The Physics of Earthquakes,” Physics Today, p. 34, June, 2001.
[2] E. Priyadarshini, “An Analysis of the Persistence of Earthquakes in Indonesia using Rescaled Range,” Indian Journal of Science and Technology, vol. 9, no. 21, pp. 1-, 2016.
[3] R. Yulmetyev, F. Gafarov, P. Hanggi, R. Nigmatullin and S. Kayumov, “Possibility between earthquake and explosion seismogram differentiation by discrete stochastic non-Markov processes and local Hurst exponent analysis,” PHYSICAL REVIEW E, vol. 64, no. 066132, pp. 1-14, 2001.
[4] Y. Ogata, “A Prospect of Earthquake Prediction Research,” Statistical Science, vol. 28, no. 4, pp. 521-541, 2013.
[5] G. Preethi and B. Santhi, “Study on Techniques of Earthquake Prediction,” International Journal of Computer Applications, vol. 29, no. 4, pp. 0975 - 8887, 2011.
[6] G. Michas, P. Sammonds and F. Vallianatos, “Dynamic Multifractality in Earthquake Time Series: Insights from the Corinth Rift, Greece,” Pure and Applied Geophysics, vol. 172, no. 7, p. 1909–1921, 2015.
[7] S. Fong and Z. Nannan, “Towards an Adaptive Forecasting of Earthquake Time Series from Decomposable and Salient Characteristics,” in PATTERNS 2011 : The Third International Conferences on Pervasive Patterns and Applications, 2011.
[8] J. B. Panduyos, F. P. Villanueva and R. N. Padua, “Fitting a Fractal Distribution on Philippine Seismic Data: 2011,” SDSSU Multidisciplinary Research Journal, vol. 1, no. 1, pp. 50-58, 2013.
[9] P. k. Dutta, O. P. Mishra and M. K. Naskar, “A Review of Operational Earthquake Forecasting Methodologies Using Linguistic Fuzzy Rule-Based Models From Imprecise Data With Weighted Regression Approach,” Journal of Sustainability Science and Managemen, vol. 8, no. 2, pp. 220-235, 2013.
[10] B. Enescu, Z. R. Struzik and K. Ito, “Wavelet-Based Multifractal Analysis Of Real And Simulated Time Series Of Earthquakes,” Annuals of Disas. Prev. Res. Inst., Kyoto Univ., pp. 1-14, 2004.
[11] K. S. K. Mohankumar, “A Study on Earthquake Prediction Using Neural Network Algorithms,” International Journal of Computer Sciences and Engineering, vol. 6, no. 10, pp. 200 - 204, 2018.
[12] C. Shaganpreet kaur, “Comparative Analysis of Data Mining,” International Journal of Computer Science and Engineering , vol. 6, no. 4, pp. 301-304, 2018.
[13] S. Mukherjee, R. Ray, R. Samanta, K. H. Moffazal and G. Sanyal, “Characterisation of wireless network traffic: Fractality and stationarity,” in ICRCICN 17, IEEE, Kolkata, 2017.
[14] L. Lacasa, B. Luque, J. Luque and J. Nuno, “The visibility graph: Aa new method for estimating the Hurst exponent of fractional Brownian motion,” EPL (Europhysics Letters), vol. 30001, pp. 1-5, 2009.
[15] R. Albert and A. Barabasi, “Statistical mechanics of complex networks.,” Rev Mod Phys, vol. 74(1), pp. 47-97, 2002.
[16] D. Percival and P. Guttorp, “Long Memory Process,the Allan Variance and Wavelets,” pp. 1-15, 1994.
[17] D. Percival, “Estimation of wavelet variance,” pp. 619-631, 1995.
[18] D. Percival and D. Mondal, “M-estimation of wavelet variance,” Elsevier, pp. 623-657, 2012.
[19] R. Ray, M. H. Khondekar, K. Ghosh and A. K. Bhattacharjee, “Memory persistency and nonlinearity in daily mean dew point,” 2015.
[20] T. Higuchi, “Approach to an irregular time series on the basis of the fractal theory,” Physica D: Nonlinear Phenomena, vol. 31, pp. 277-283, 1988.
[21] C. Gomez, A. Mediavilla, R. Hornero, D. Abasolo and A. Fernandez, “Use of the Higuchi`s fractal dimension for the analysis of MEG recordings from Alzheimer`s disease patients.,” Medical engineering & physics, vol. 31, no. 3, pp. 306-13, 4 2009.
[22] M. J. Wairimu, “Features Affecting Hurst Exponent estimation on time series,” in Jomo Kenyatta University Of Agriculture and Technology., Juja, 2013.
[23] K. Hu, P. C. Ivanov, Z. Chen, P. Carpena and H. Eugene Stanley, “Effect of trends on detrended fluctuation analysis,” Phys. Rev. E, vol. 64, no. 1, p. 011114, 6 2001.
[24] C.-K. Peng, S. V. Buldyrev, S. Havlin, M. Simons, H. E. Stanley and A. L. Goldberger, “Mosaic organization of DNA nucleotides,” Phys. Rev. E, vol. 49, no. 2, pp. 1685-1689, 2 1994.
[25] J. W. Kantelhardt, E. Koscielny-Bunde, H. H. A. Rego, S. Havlin and A. Bunde, “Detecting long-range correlations with detrended fluctuation analysis,” Physica A: Statistical Mechanics and its Applications, vol. 295, pp. 441-454, 2001.
[26] S..Ledesma-Orozco, J. Ruiz-Pinales, G. García-Hernández, G. Cerda-Villafaña and D. Hernández-Fusilier, “Hurst Parameter Estimation Using Artificial Neural Networks,” Journal of Applied Research and Technology, vol. 9, p. 15, 2011.
[27] A. L. Maas, A. Y. Hannun and A. Y. Ng, “Rectifier nonlinearities improve neural network acoustic models,” in ICML, 2013.
[28] T. Kocak, “Sigmoid Functions and Their Usage in Artificial Neural Networks,” https://excel.ucf.edu, 2007.
[29] W. contributors, “Mean squared error,” Wikipedia, The Free Encyclopedia, 2018.
[30] T. Tieleman and G. Hinton, “Lecture 6e rmsprop: Divide the gradient by a running average of its recent magnitude,” Coursera, 2012.
[31] “The Augmented Dickey-Fuller Test,” [Online]. Available: https://www.thoughtco.com/the-augmented-dickey-fuller-test-1145985.
[32] H. B. Nielsen, “Non-Stationary Time Series and Unit Root Tests,” [Online]. Available: http://www.econ.ku.dk/metrics/econometrics2_05_ii/slides/08_unitroottests_2pp.pdf.
[33] “Augmented Dickey-Fuller Unit Root Tests,” [Online]. Available: http://faculty.smu.edu/tfomby/eco6375/bj%20notes/adf%20notes.pdf.
[34] D. Kwiatkowski, P. C. B. Phillips, P. Schmidt and Y. Shin, “Testing the null hypothesis of stationarity against the alternative of a unit root: How sure are we that economic time series have a unit root?,” Journal of Econometrics, vol. 54, pp. 159-178, 1992.
[35] W.Wang, Nonlinearity and Forecasting of Streamflow Processes., Stochasticity, 2006.
Citation
Bikash Sadhukhan, Somenath Mukherjee, "Undermining the Fractal and Stationary Nature of Earthquake," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.670-679, 2018.