Social Network Analysis as Counter Terrorism Tool
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.655-661, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.655661
Abstract
Social network analysis is no more only bound to studying the relationship between the actors to discover the hidden trends and find scope in them but there is a darker side as well. The deep ocean of network has allowed people to counter attack on different countries via acting from various locations by issuing fake identities. The cycle of events that take place with the evil intentions to disrupt and cause fear not only physically but mentally too is referred to terrorism. SNA allows this act to counter prevent and associate the links by identifying the intentions and working of the actors. Various studies have been conducted after 9/11 attack and people all over the world are monitored so as to track the status and if any conviction is predicted, the complete network is examined. The sole purpose of these studies is to prevent thwarting and prepare oneself to counter terrorism. This paper outlines certain methods that recognize the terrorist activities which need to be monitored so as to detect the pre-event occurrence and counter attack on their planning.
Key-Words / Index Term
Social Network Analysis, Counter Terrorism, Information Analysis, Intelligence analysis
References
[1] D.Charabarti and C. Faloutsos. “Graph Mining: Laws, Generators, and Algorithms.” ACM Computing Surveys 38:1(2006) p.4.
[2] J.R.Tyler, D.M.Wilkinson, and B.A. Huberman. “Email as Spectroscopy: Automated discovery of community structure within organizations.” In Communities And Technologies (2003) pp. 81- 96.
[3] J.G. Augustson and J.Minker. “An Analysis Of Some Graph Theoretical Cluster Techniques.” Journal of ACM 17:4 (1970) pp. 571-588.
[4] A. Calvo-Armengol and Y. Zenou. “Social networks and crime decisions: The Role Of Social Structure In Faciliating Delinquent Behaviour.” CEPR Discussion papers (2003) 3966.
[5] A.L. Barabasi. “Linked: The New Science ofNetworks”. Cambridge, MA: Perseus Publishing, 2002.
[6] R. Cross and A. Parker. “The Hidden Power ofSocial Networks.” Cambridge, MA, Harvard Business School Press, 2004.
[7] D. Knoke and S. Yang. ” Social network analysis (Quantitative applications in the social sciences).” New York: Sage Publications. (2008)
[8] S. Koschade. (2006). “A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence”. Studies in Conflict and Terrorism, 29(6), 559–575.
[9] S.F. Everton. (2012). “Disrupting dark networks”. New York: Cambridge University Press.
[10] S.F. Everton & D. Cunningham. (2012). “Detecting significant changes in dark networks”. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94–114.
[11] G. Bichler & S. Bush. (2015). Networks in a nutshell. In G. Bichler & A. Malm (Eds.), Disrupting criminal networks: Network analysis in crime prevention (pp. 233–244). Boulder, CO: Lynne Reinner Publishers, Inc.
[12] M. Granovetter (1973). “The strength of weak ties.” American Journal of Sociology, 78(6), 1360–1380.
[13] R. Burt. (1992). “Structural holes: The social structure of competition.” Cambridge, MA: Harvard University Press.
[14] D.J. Watts. (2003). “Six degrees: The science of a connected age”. New York: W.W. Norton & Company.
[15] V.E. Krebs. (2001). “Mapping networks of terrorist cells”. Connections, 24(3), 43–52.
[16] M. Sageman. (2004). “Understanding terror networks.” Philadelphia, PA: University of Pennsylvania Press.
[17] J. Xu & H. Chen. (2008). “The topology of dark networks.” Communications of the ACM, 51(10), 58-65.
[18] J. Magouirk, S. Atran, & M. Sageman. (2008). Connecting terrorist networks. Studies in Conflict and Terrorism, 31(1), 1–16.
[19] D. M. Akbar Hussain. “Terrorist Networks Analysis through Argument Driven Hypotheses Model”. In Second International Conference on Availability, Reliability and Security (ARES`07). IEEE 0-7695-2775-2. 2007.
[20] Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference (2004)
[21] Tsvetovat, M., Carley, K.M.: On effectiveness of wiretap programs in mapping social networks. Computational and Mathematical Organization Theory 13(1), 63–87 (2006).
[22] NETEST: Estimating a Terrorist Network’s Structure. In: 11th European Intelligence and Security Informatics Conference (EISIC), Athens (2011).
[23] Aparna Basu. “Social Network Analysis: A Methodology for Studying Terrorism”. M. Panda, S. Dehuri, and G.-N. Wang (eds.), Social Networking Intelligent Systems Reference Library 65, Springer International Publishing Switzerland 10.1007/978-3-319-05164-2_9. (2014). pp.215-242.
[24] Clifford Weinstein, William Campbell, Brian Delaney, Gerald O’Leary.” Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition” IEEE. 978-1-4244-2622-5 (2009) . pp. 1-16.
[25] Richard M. Adler,” A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support” IEEE. 1-4244-1330-3. (2007). Pp. 47-54.
[26] Julei Fu and Jian Chai “Multi-factor analysis of terrorist activities based on social network” In Fifth International Conference on Business Intelligence and Financial Engineering, IEEE 978-0-7695-4750-3. (2012) pp. 476-480.
Citation
A. Srivastava, A. Pillai, D. J. Gupta, "Social Network Analysis as Counter Terrorism Tool," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.655-661, 2018.
A Comprehensive Review on Cluster based Energy Efficient Routing Protocols in Wireless Sensor Networks
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.662-668, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.662668
Abstract
Recent technological advancements like internet of things, home automation, disaster management etc shed light on wireless sensor networks. Thousands of micro sensor nodes are geographically located to capture a remote environment. The communication and computing process consume more energy from the nodes. Prolong usage of same path to transfer data may lead to decrease of the residual energy in the sensor nodes, thus causes the node to death. Power conservation in the nodes is the major concern in hostile environments. Clustering is an energy saving scheme that enables the nodes to communicate data to the nominated cluster heads, from where the cluster heads communicate the gathered data to the sink. This gain focus on two factors of increasing the node life time, namely - the selection of cluster head that has more residual energy and the periodic change of cluster heads. This paper surveys on various energy-aware clustering schemes involved in routing data from the sensor nodes to sink.
Key-Words / Index Term
Wireless Sensor Networks, Energy Consumption, Clustering, Cluster head selection, Routing protocols
References
[1] Akylidiz, I., Su,W., Subramaniam, S., and E.Cayrici, “A survey on sensor networks”, IEEE Communications Magazine, Volume: 40 Issue: 8, August 2002, pp.102-114.
[2] Akkaya, K. and Younis, M., “A survey of Routing Protocols in Wireless, Sensor Networks”, Elsevier Ad Hoc Network Journal, 2005, pp 325-349.
[3] Al-Karaki, J.N.; Kamal, A.E., “Routing techniques in wireless sensor networks: A survey”, IEEE Wirel. Commun. 2004, 11, 6–28.
[4] Chong, C.Y. and Kumar, S. P., “Sensor networks: Evolution, opportunities, and challenges”, Proceedings of the IEEE 91(8), 2003, pp. 1247-1256.
[5] Ye, M.; Li, C.; Chen, G.; Wu, J., ”EECS: An Energy Efficient Clustering Scheme in Wireless Sensor Networks”, in Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC), Phoenix, AZ, USA, 7–9 April 2005; pp. 535–540.
[6] R.S. Walse , G.D. Kurundkar , P. U. Bhalchandra, “A Review: Design and Development of Novel Techniques for Clustering and Classification of Data”, International Journal of Scientific Research in Computer Sciences and Engineering,
Vol.06 , Special Issue.01 , pp.19-22, Jan-2018.
[7] Ding, P.; Holliday, J.; Celik, A, “Distributed Energy Efficient Hierarchical Clustering for Wireless Sensor Networks”, in Proceedings of the 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina Del Rey, CA, USA, 8–10 June 2005; pp. 322–339.
[8] Murugunathan, S.D.; Ma, D.C.F.; Bhasin, R.I.; Fapajuwo, A.O., “A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Network”, IEEE Radio Commun. 2005, 43, S8–S13.
[9] U. Korupolu, S. Kartik, GK. Chakravarthi, “An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks”, Isroset-Journal (IJSRCSE) Vol.4 , Issue.3 , pp.26-29, Jun-2016.
[10] D.J. Baker, A. Ephremides, “The architectural organization of a mobile radio network via a distributed algorithm”, IEEE Transactions on Communications, COM-29 (11) (1981) 1694– 1701.
[11] I. F. Akyildiz,W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Netowrks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, Aug 2002.
[12] S.D.N. Hayath Ali, M. Giri, “A Study on Current Challenging Issues and Optimal Methods for Video Streaming over Heterogenous Wireless Network,” IJSRNSC, Vol.6 , Issue.2 , pp.40-44, Apr-2018.
[13] B. Warneke, M. Last, B. Liebowitz, Kristofer, and S. Pister, “Smart Dust: Communicating with a Cubic Millimeter Computer,” Computer Magazine, vol. 34, no. 1, pp. 44–51, Jan 2001.
[14] Loscri, V.; Morabito, G.; Marano, S., “A Two-Level Hierarchy for Low-Energy Adaptive Clustering Hierarchy”, in Proceedings of the 2nd IEEE Semiannual Vehicular Technology Conference, Dallas, TX, USA, 25–28 September 2005; pp. 1809–1813.
[15] Ye, M.; Li, C.; Chen, G.; Wu, J., “EECS: An Energy Efficient Clustering Scheme in Wireless Sensor Networks” in Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC), Phoenix, AZ, USA, 7–9 April 2005; pp. 535–540.
[16] S.D.N. Hayath Ali1 , M. Giri, “A Study on Current Challenging Issues and Optimal Methods for Video Streaming over Heterogenous Wireless Network”, IRSRNSC, Vol.6 , Issue.2 , pp.40-44, Apr-2018.
Citation
A. Gopi Saminathan, V. Nivedhitha, "A Comprehensive Review on Cluster based Energy Efficient Routing Protocols in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.662-668, 2018.
A Survey of Machine Learning Appliacations In Decision Making To Improve Farming
Survey Paper | Journal Paper
Vol.6 , Issue.9 , pp.669-683, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.669683
Abstract
Machine learning has developed with huge information innovations and best outline to make new opportunity for data science in the multi-disciplinary agriculture domain. In this paper, we present a far reaching review of research devoted to applications of machine learning in agrarian generation frameworks. The works broke down were classified in (a)crop management, including applications on yield expectation, infection identification, weed discovery, crop quality, and species acknowledgment; (b) domesticated animals management, including applications on creature welfare and animals generation; (c) water management; and (d) soil management. The review reports the application of machine learning techniques with artificial neural networks, Bayesian networks, support vector machines and k-means. The filtering and classification of the reviewed articles show how farming will benefit from machine learning advancements. By applying machine learning to sensor information, cultivate administration frameworks are advancing into ongoing artificial insight empowered projects that give rich proposals also, bits of knowledge for agriculturist choice help and activity.
Key-Words / Index Term
Machine learning, Artificial Intelligence, Big data, Artificial neural networks, Bayesian networks, Support vector machines and K-means
References
[1] Meena Kushwaha and D. V. R. Raghuveer, "Survey of Impact of Technology on Effective Implementation of Precision Farming in India," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 5, no. 6, p. 11, 2017.
[2] T. Ranjeet and L. Armstrong, “An artificial neural network for predicting crops yield in Nepal”, Proceedings of the 9th Conference of the Asian Federation for Information Technology in Agriculture “ICT’s for future Economic and Sustainable Agricultural Systems”, Perth, Australia, pp.376-386, 2014.
[3] S. Jabjone and S. Wannasang, "Decision Support System Using Artificial Neural Network to Predict Rice Production in Phimai District, Thailand," International Journal of Computer and Electrical Engineering, vol. 6, no. 2, pp. 162-166, 2014.
[4] N. Gandhi, L. J. Armstrong, and O. Petkar, “PredictingRice crop yield using Bayesian networks,” 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 795–799, 2016.
[5] S. Dahikar and S. Rode, "Agricultural Crop Yield Prediction Using Artificial Neural Network Approach", International Journal of Innovative Research in Electrical, Electronics, Instrumentation, and Control Engineering, vol. 2, no. 1, 2014.
[6] D. Jiang, X. Yang, N. Clinton, and N. Wang, "An artificial neural network model for estimating crop yields using remotely sensed information," International Journal of Remote Sensing, vol. 25, no. 9, pp. 1723-1732, 2004.
[7] M. Kaul, R. L. Hill, and C. Walthall, "Artificial neural networks for corn and soybean yield prediction," Agricultural Systems, vol. 85, no. 1, pp. 1-18, 2005.
[8] K. Movagharnejad and M. Nikzad, "Modeling of tomato drying using the artificial neural network," Computers and Electronics in Agriculture, vol. 59, no. 1-2, pp. 78-85, 2007.
[9] M. R. O`Neal, B. A. Engel, D. R. Ess, and J. R. Frankenberger, "AE—Automation and Emerging Technologies," Biosystems Engineering, vol. 83, no. 1, pp. 31-45, 2002.
[10] K. Ostad-Ali-Askari, M. Shayannejad, and H. Ghorbanizadeh-Kharazi, "Artificial neural network for modeling nitrate pollution of groundwater in the marginal area of Zayandeh-Rood River, Isfahan, Iran," KSCE Journal of Civil Engineering, vol. 21, no. 1, pp. 134-140, 2016.
[11] J. Y. Shin, M. Ajmal, J. Yoo, and T.-W. Kim, "A Bayesian Network-Based Probabilistic Framework for Drought Forecasting and Outlook," Advances in Meteorology, vol. 2016, pp. 1-10, 2016.
[12] Aalders, “Modeling land-use decision behavior with Bayesian belief networks”, Ecology and Society, vol.13, no. 1, pp. 16, 2008.
[13] G. C. Chunguang Bi "Bayesian Networks Modeling for Crop Diseases," IFIP International Federation for Information Processing 2011, p. 8, 2011.
[14] M. A. E. Forio et al., "Bayesian belief network models to analyze and predict ecological water quality in rivers," Ecological Modelling, vol. 312, pp. 222-238, 2015.
[15] N. Gandhi, L. Armstrong, and O. Petkar, "Predicting Rice Crop Yield using Bayesian Networks", In Proceedings of IEEE 5th International Advances in Computing, Communications, and Informatics, E-ISBN: 978-1-5090-2029-4, 2016.
[16] S. Madadgar and H. Moradkhani, "Spatio-temporal drought forecasting within Bayesian networks," Journal of Hydrology, vol. 512, pp. 134-146, 2014.
[17] S. Maiti and R. K. Tiwari, "A comparative study of artificial neural networks, Bayesian neural networks and adaptive neuro-fuzzy inference system in groundwater level prediction," Environmental Earth Sciences, vol. 71, no. 7, pp. 3147-3160, 2013.
[18] G. S. Nearing, H. V. Gupta, and W. T. Crow, "Information loss in approximately Bayesian estimation techniques: A comparison of generative and discriminative approaches to estimating agricultural productivity," Journal of Hydrology, vol. 507, pp. 163-173, 2013.
[19] C. Perez-Ariza, A. Nicholson and M. Flores, "Prediction of coffee rust disease using Bayesian networks", In Proceedings of the Sixth European Workshop on Probabilistic Graphical Models, pp. 259-266, 2012.
[20] J. M. Quinn, R. M. Monaghan, V. J. Bidwell, and S. R. Harris, "A Bayesian Belief Network approach to evaluating complex effects of irrigation-driven agricultural intensification scenarios on future aquatic environmental and economic values in a New Zealand catchment," Marine and Freshwater Research, vol. 64, no. 5, 2013.
[21] A. Sharma and M. Goyal, "Bayesian network model for monthly rainfall forecast", 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp. 241-246, 2015.
[22] C.-J. Du and D.-W. Sun, "Pizza sauce spread classification using color vision and support vector machines," Journal of Food Engineering, vol. 66, no. 2, pp. 137-145, 2005.
[23] V. Anandhi and R. Chezian, “Support Vector Regression in forecasting”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 10, pp. 4148-4151, 2013.
[24] S. Brdar, D. Culibrk, B. Marinkovic, J. Crnobarac and V. Cmojevic, “Support Vector Machines with Features Contribution Analysis for Agricultural Yield Prediction”, 2011
[25] K. Brudzewski, "Classification of milk by means of an electronic nose and SVM neural network," Sensors and Actuators B: Chemical, vol. 98, no. 2-3, pp. 291-298, 2004.
[26] S. Fagerlund, "Bird Species Recognition Using Support Vector Machines," EURASIP Journal on Advances in Signal Processing, vol. 2007, no. 1, 2007.
[27] A. Bharadwaj, S. Dahiya and R. Jain, "Discretization based Support Vector Machine (D-SVM) for Classification of Agricultural Datasets", International Journal of Computer Applications, vol. 40, no. 1, pp. 8-12,2012.
[28] N. Gandhi, L. Armstrong, O. Petkar and A. Tripathy, "Rice Crop YieldPrediction in India using Support Vector Machines", In Proceedings of IEEE The 13th International Joint Conference on Computer Science and Software Engineering (JCSSE), 2016.
[29] B. Huang, C. Xie, and R. Tay, "Support vector machines for urban growth modeling," GeoInformatica, vol. 14, no. 1, pp. 83-99, 2009.
[30] Y. Karimi, S. O. Prasher, R. M. Patel, and S. H. Kim, "Application of support vector machine technology for weed and nitrogen stress detection in corn," Computers and Electronics in Agriculture, vol. 51, no. 1-2, pp. 99-109, 2006.
[31] G. Camps-Valls, L. Gomez-Chova, J. Calpe-Maravilla, E. Soria-Olivas, JD. Martin-Guerrero and J. Moreno, “Support vector machines for crop classification using hyperspectral data”, Lect Notes CompSci, 2652, pp. 134–141, 2003.
[32] B. S. Shedthi, S. Shetty, and M. Siddappa, “Implementation and comparison of K-means and fuzzy C-means algorithms for agricultural data,” 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), 2017.
[33] Stewart, J., Stewart, R., & Kennedy, S. (2017). Dynamic IoT management system using K-means machine learning for precision agriculture applications. Proceedings of the Second International Conference on Internet of things and Cloud Computing - ICC `17.
[34] P. K. Dr. SUJATHA S, "Smart Farming using K-means Clustering and SVM Classifier in Image Processing," International Journal of Science, Engineering and Technology Research, vol. 6, no. 11, p. 5, 2017.
[35] G. Chen, Y. Yang, H. Guo, X. Sun, H. Chen, and L. Cai, "Analysis and Research of K-means Algorithm in Soil Fertility Based on Hadoop Platform," Computer and Computing Technologies in Agriculture VIII IFIP Advances in Information and Communication Technology, pp. 304–312, 2015.
[36] J. Baghel and P. Jain, “Disease Detection in Soya Bean using K-Means Clustering Segmentation Technique,” International Journal of Computer Applications, vol. 145, no. 9, pp. 15–18, 2016.
[37] A. Khatra, "Yellow Rust Extraction in Wheat Crop-based on Color Segmentation Techniques," IOSR Journal of Engineering, vol. 3, no. 12, pp. 56–58, 2013.
[38] A. Tellaeche, X.-P. Burgosartizzu, G. Pajares, and A. Ribeiro, “A Vision-Based Hybrid Classifier for Weeds Detection in Precision Agriculture Through the Bayesian and Fuzzy k-Means Paradigms,” Advances in Soft Computing Innovations in Hybrid Intelligent Systems, pp. 72–79, 2007.
[39] T Williams and Dr. P. ShanthiBala, "To Recognize the Crop Growth Rate in Agricultural Land By Using K-Means Clustering Algorithm and Contrast Enhancement Algorithm," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3, no. 5, pp. 41–47, 2018.
[40] J. Tang, D. Wang, Z. Zhang, L. He, J. Xin, and Y. Xu, "Weed identification based on K-means feature learning combined with convolutional neural network," Computers and Electronics in Agriculture, vol. 135, pp. 63-70, 2017.
[41] R. K N, C. N, O. S N, M. B. Meenavathi, and R. V, "Detection of Rows in Agricultural Crop Images Acquired by Remote Sensing from a UAV," International Journal of Image, Graphics and Signal Processing, vol. 8, no. 11, pp. 25-31, 2016.
Citation
Ankita Bissa, Meena Kushwaha, Mayank Patel, "A Survey of Machine Learning Appliacations In Decision Making To Improve Farming," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.669-683, 2018.
Integrated Tamil News Storage and Analysis Using Big Data Analytics
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.684-686, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.684686
Abstract
This is a Application of Big data analytic. In this concept all Tamil news are stored into Big data analytical tools such as R Tool, MangoDB, Hadoop etc. The News is stored in the form of text, Photos, videos, audio etc. The News is gathered from all daily Tamil news paper, Epaper, Ebook and Social Media Content. Then this News will be analysed in various Angle. Moreover Government Policies, Plan, Advertisement etc. will be stored into the big data Tool. This information is stored into Date wise, month wise and year wise. The news will be classified into various types such as political, Sports, International, national, Local news etc. This is stored into the current details as well as past details. So, we can analysis the every news which is arising in the current problem. Now days Social Networks impact all areas of society. So, the Social Media information’s are stored into big data tools. The news is collected over 100 years. So, all the information’s are digitized. This proposed project is stored information’s of Old literatures of Tamil. Moreover the proposed project stored information’s of archaeological information like stone inscription, Palm leaf etc. So, this project consists of all details of Tamil. So, we can store and analyse information’s. Moreover it will be stored into Cloud Computing Environment. So, we can access anywhere else. The proposed project is stored all type of Tamil news come from various sources. Now days all the daily are converted into pdf format. So, that will be stored into Big Data Tool. The Proposed Project Consist of old literature of Tamil, Tamil Stone Age arts, palm leaf letters etc.
Key-Words / Index Term
Bigdata Analytic, Cloud Computing, MangoDB, Hadoop, R Tool
References
[1]. Facebook 2017 Statistics Report.
[2]. Social Media growth statistical report.
[3]. Big Data Analytics, Tools and Technology for effective Planning by Arun k.Somani, Ganesh Chandra Deka.
[4]. Internet of Things, A Hands on Approach by Arshdeep Bahga,vijay Madisetti
Citation
B. Anandakumar ,R. Manimegalai, "Integrated Tamil News Storage and Analysis Using Big Data Analytics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.684-686, 2018.
An Attribute Involved Non deterministic Cryptosystem using Composite Residuosity Class Problem
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.687-690, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.687690
Abstract
In this paper, we design a public key encryption scheme, is based on the composite residuosity classes and having the property as randomization, also called as non- determinism. The non-deterministic nature of this cryptosystem produces dissimilar ciphertexts for a given same plaintext character on each iteration. The intractability of factorization of this scheme is achieved through the concept of composite residuosity class problem. The key involved in the encryption procedure of the scheme uses the credentials like unique identities of the sender to ensure the authenticity of the user. These identities, are also called attributes of the user, include email, Social Security Number (SSN) or Aadhaar number etc. While encrypting the message, the sender will use any of his identity value as a key in the procedure. The recipient can calculate this attribute value in the decryption procedure.
Key-Words / Index Term
Attributes, Composite residuosity classes, Decryption, Encryption, and Intractability
References
[1] S. Goldwasser and S. Micali., “Probabilistic Encryption”, in Journal of Computer and System Sciences, 28, pp 270–299, 1984.
[2] D. Naccache and J. Stern, “A New Cryptosystem based on Higher Residues” , in Proc. of the 5th CCCS, pp 59–66. ACM press, 1998.
[3] T. Okamoto and S. Uchiyama, “A new public key cryptosystem as secure as factoring”, in Proc. Eurocrypt ’98, pp 310–318, 1998.
[4] P. Paillier, “Public-Key Cryptosystems Based on Discrete Logarithms Residues”, in Eurocrypt ’99, LNCS 1592, pp 223–238. Springer-Verlag, 1999.
[5] J C. Benaloh, “Verifiable Secret-Ballot Elections”, PhD Thesis, Yale University, 1988.
[6] G. Sumalatha, D.S.R. Murthy and K. Shirisha , “A Secure Intractable Public Key Cryptosystem Involving p-Sylow Subgroup” , International journal of Network Security, in press.
[7] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, in Communications of the ACM, 21(2), pp120–126, 1978.
[8] V. Kapoor, “Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
[9] Sumalatha Gunnala, Shirisha Kakarla and Sreerama Chandra Murthy Dasika , “An Attribute Involved Public Key Cryptosystem Based on p-Sylow Subgroups and Randomization” , Journal of Applied Computer Science & Mathematics , vol. 12, Issue 1/2018, pp 34-38, 2018.
[10] Sarita Sharma, Rakesh Gaherwal, “Comparative Study and Analysis of Unique Identification Number and Social Security Number”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.27-30, 2017.
Citation
Sumalatha Gunnala, D.S.R. Murthy, Shirisha Kakarla, "An Attribute Involved Non deterministic Cryptosystem using Composite Residuosity Class Problem," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.687-690, 2018.
A Taxonomy and Survey of Energy Efficient Resource Allocation Schemes for Cloud Datacenter
Survey Paper | Journal Paper
Vol.6 , Issue.9 , pp.691-998, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.691998
Abstract
The cloud computing is gaining the popularity rapidly due to its esteem services benefits and high computational demand of social, business, web and scientific applications. The cloud datacenters across the world are consuming high volume of energy thus affecting the environment also. The resource allocation in cloud is a key factor to achieve energy efficiency. In this paper, we reviewed the energy concept and different kinds of resource allocation schemes being used in cloud datacenters and went on to derive a taxonomical classification of these strategies based upon various metrics.
Key-Words / Index Term
Energy efficiency, QoS, Virtual Machine, Datacenters, Cloud Service Provider, Resource Allocation
References
[1] Yue Gao, “An Energy and Deadline a Aware Resource Provisioning, Scheduling and Optimization Framework for Cloud Systems”, International conference on Hardware/Software Codesign and system synthesis (CODES+ISSS), Montreal, QC, Canada 2013
[2] Arm burst M, Fox, “A view of Cloud computing”. Vol. 53, Issue.4, pp:50-58.
[3] Zoltan Adam “Rigorous results on the effectiveness of some heuristics for the consolidation of virtual machines on cloud data center” Vol 51, pages 1-6, 2015
[4] S Ali “Profit-aware DVFS enabled resource management of IaaS cloud”. Vol. 10, Issue 2, pp-237-247, 2013
[5] Nasrin Ak., “Energy aware resource allocation of cloud data center: review and open issues” Vol. 19. Issue 3, pp-1163-1182, 2016
[6] Abdul Hameed “A Survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems”. Vol. 98. Issue 7, pp-751-774, 2016
[7] Anton Beloglazov: A taxonomy and survey of energy efficientDCs and cloud computing systems.” Adv comput, Vol.82, pp :47-111, 2011
[8] Anton Beloglazov, Rajkumar,“Energy Efficient Resource Management in Virtualized Cloud Data Centers” International Conference on Cluster, Cloud and Grid Computing, Melbourne, VIC, Australia 2010
[9] S. Singh, I chana, “QoS-aware automatic cloud computing for ICT”. International conference on information and communication technology for suitable development, pp: 569-577, 2015.
[10] Marston S, “A Cloud Computing. The business perspective”, Decision support system, Vol 51, Issue 1, pp -176-189.
[11] Tarandeep Kaur “ Energy Efficiency techniques in cloud computing” ACM Computing Surveys, Vol.48, No.2, Article 22, 2015
[12] Renewable Energy Outlook. 2013, “World Energy Outlook published by International Energy Associa- tion”. Retrieved on August 5, 2014
[13] Tarandeep Kaur and Inderveer Chana, “Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy”, Vol. 48, Issue 2, pp 46, 2015.
[14] Koomey J, “Estimating total power consumption by servers in the US and the world”. Lawrence Berkeley National Laboratory, Analytics Press, 2007
[15] Singh T, “Smart metering the clouds”. In: 18th IEEE international workshops on enabling technologies: infrastructures for collaborative enterprises, pp 66–71
[16] J Baliga, “Energy consumption in optical IP networks”. J Lightweight Technol Vol.27, Issue 13, pp:2391–2403, 2009
[17] O Tamm : “A Eco-sustainable system and network architectures for future transport networks”. Bell Labs Tech J, Vol. 14, Issue 4, pp:311-327, 2010
[18] A Vukovic “DCs network power density challenges”. J ASHRAE Vol. 47, pp:55–59, 2005
[19] J Liu “ Challenges towards elastic power management in internet datacenters". International conference on distributed systems, pp: 65–72
[20] JA Paradiso, “Energy scavenging for mobile and wireless electronics”. Pervasive Compute Vol.4, Issue, pp : 18-27
[21] Cook G, Horn J “How dirty is your data”. GreenPeace International, Amsterdam, 2011
[22] Satveer , Mahendra Singh Aswal “A Comparative Study of Resource Allocation Strategies for a Green Cloud”, International Conference on Next Generation Computing Technologies (NGCT-2016) Dehradun, India, 14-16 October 2016
[23] S Singh, I Chana, “Cloud resource provisioning: survey, status and future research directions” Knowl Inf Syst, Vol. 59, pp: 1005-1069
[24] Yousafzail,“Cloud Resource Allocation Schemes:Review, Taxonomy, and Opportunities”, Knowl Inf Syst, Vol. 50, Issue-2 pp :347–381, 2017
[25] V.P Anuradha “Surey on Resource Allocation Strategies in Cloud Computing”,InternationalConference on Information Communication and Embedded Systems (ICICES2014), Chennai, India ,IEEE.
[26] Morshedlou “Decreasing impact of SLA violations: a proactive resource alloca- tion approach for cloud computing environments”. IEEE Trans Cloud Comput Vol. 2, Issue 2, pp:156–167, 2014
[27] Hussin,“Efficient energy management using adaptive reinforcement learning-based scheduling in large-scale distributed systems”, International Conference on Parallel Processing In: ICPP, Taipei City, Taiwan, pp 385–393, 2011
[28] Lee, “Resource Allocation and Scheduling in Heterogeneous Clooud Enviroments” Ph.D. dissertation, Univ. California, Berkeley, Technical Report No UCB/EECS-2012-78, spring 2012
[29] TVT. Duy, “Performance evaluation of a green scheduling algorithm for energy savings in cloud computing”. International Symposium on Parallel and distributed processing, workshops and PhD forum (IPDPSW), Atlanta, GA, USA Atlanta, GA, USA pp 1–8, 19–23, 2010
[30] Mezmaz, “A parallel island-based hybrid genetic algorithm for precedence-constrained applications to minimize energy consumption and makespan”. International Conference on Grid Computing, Brussels, Belgium, pp 274–281, 2011
[31] Y. Chen, “Minimizing data center SLA violations and power consumption via hybrid resource provisioning”.Second international green computing conference (IGCC), pp 1–8, 2011
[32] E. Kalyvianaki,“Resource provisioning for virtualized server applications”. Technical Report UCAM-CL-TR-762, Computer Laboratory, University of Cambridge, 2009
[33] Anton Beloglazov “Adaptive Threshold-Based Approach for Energy-Efficient Consolidation of Virtual Machines in Cloud Data Centers”: MGC , Bangkore, India ISBN: 978-1-4503-0453-5 ,
[34] Mohan Raj: “Heterogeneity and thermal aware adaptive heuristics for energy efficient consolidation of virtual machines in infrastructure clouds” Journal of Computer and System Sciences, Vol.82, Issue. 2, pp: 191-212
[35] Fahimeh, “Energy Aware Consolidation Algorithm based on K-nearest Neighbor Regression for Cloud Data Centers”, International Conference on Utility and Cloud Computing, Dresden, Germany 2013
[36] Nasrin Akhter, “Energy aware resource allocation of cloud data center: Review and open issues” Cluster Compute, New York, Vol 19, Issue, 3,pp: 1163-1182 2016
[37] More,“Energy-efficiency in cloud computing environments: towards energy savings without performance degradation”. International Journal of computer Applications, Vol. 1, Issue. 1, pp:17–33, 2011
[38] C, Reid, “Coordination of energy efficiency and demand response”. Environmental Energy Technologies Division, Berkeley National Laboratory, LBNL-3044E, 2010
[39] N, Scherer, “Thermal-aware workload scheduling for energy efficient data centers”. International conference on autonomic computing (ICAC) Washington, DC, USA, pp 169–174.
[40] Heger, “Optimized Resource Allocation & Task Scheduling Challenges in Cloud Computing Environments”. 2010, dheger@ dhtusa. com
[41] I, Aida, “Applying double-sided combinational auctions to resource allocation in cloud computing”. International symposium on applications and the internet. Seoul, South Korea, pp 7–14, 2012
[42] MM. Mashayekhy “Truthful greedy mechanisms for dynamic virtual machine provisioning and allocation in clouds”. IEEE Transactions on Parallel and Distributed Systems Vol: 26 , Issue: 2 , pp: 594–603, 2015
[43] Y, Niyato, “An auction mechanism for resource allocation in mobile cloud computing systems”. International Conference on Wireless Algorithms, Systems, and Applications, pp76-87, 2013
[44] W-Y. Lin, “Dynamic auction mechanism for cloud resource allocation”. International conference on, cluster, cloud and grid computing (CCGrid),IEEE, Melbourne, VIC, Australia, pp 591–592, 2010
[45] Li Z, “An anti-cheating bidding approach for resource allocation in cloud computing environments”. Journal of Computational Information Systems, Vol 8, Issue: 4, pp:1641–1654, 2012
[46] Dharmesh Kakadia: “Network-aware Virtual Machine Consolidation for LargeDataCenters” NDM, proceding of the third international workshop on Network aware data management, 2013
[47] S. Grosu, “A combinatorial auction-based mechanism for dynamic VM provisioning and allocation in clouds”. IEEE Trans Cloud Comput, Vol 1, Issue 2, pp:129–141, 2013
[48] Ajit Singh, “Cluster Based Bee Algorithm for virtual Machine Placement in CloudDC” Journal of Theoretical and Applied Information Technology, Vol. 57, 2013.
[49] K.Mukkherjee,“Green Cloud:An Algorithmic Approach” International Journal of Computer Applications” (0975-8887) Vol. 9,2010
[50] J. Wang “An auction and league championship algorithm based resource allocation mechanism for distributed cloud”. In: Wu C, Cohen A (eds) Advanced parallel processing technologies, Vol. 8299., pp 334–346, 2013
[51] C, Wang, “A cloud resource allocation mechanism based on mean-variance optimization and double multi-attribution auction”. In: Hsu C-H, Li X, Shi X, Zheng R (eds) Network and parallel computing, vol 8147, pp 106–117, 2013
[52] W-L, Xie, “Thermal-aware task allocation and scheduling for embedded systems”. Proceedings of the conference on design, automation and test in Europe, vol 2, pp 898–899, 2005
[53] S, Kansal, “Energy aware consolidation for cloud computing”. In: Confer- ence on power aware computer and systems, San Diego, California ,2008
[54] A, Ahuja P, Neogi A (2008) “pMapper: power and migration cost aware application placement in virtualized systems”. International conference on middleware, pp 243–264, 2008
[55] R, Schwan K,“VirtualPower: coordinated power management in virtualized enterprise systems”. In: 21st ACM SIGOPS symposium on operating systems principles, Vol.41, Issue. 6, pp: 265–278, 2007.
[56] Hadi Khani, “Distributed consolidation of VMs for power efficiency in heterogeneous cloud data centers”, Journal of computers and Electrical Engineering, Vol. 47 Issue C, pp: 173-185, 2015
[57] Anton Beloglazov, “Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centers” Journal of concurrency and computation, Vol. 24, Issue. 13, 2012
[58] Anton “Energy Aware resource allocation heuristics for efficient management of cloud DCs” Future generation computing system VOl. 28, pp: 755-768, 2012
[59] Alfredo Goldman “Consolidation of VMs to improve Energy Efficiency in cloud Environments” 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, Vitoria,Brazil, 2015
[60] Hui Wang “Energy-aware Dynamic Virtual Machine Consolidation for CloudDCs” IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, 2014
[61] Bruno Cesar Ribas: “On Modelling Virtual Machine Consolidation to Pseudo-Boolean Constraints” J. Pavo´n et al. (Eds.) pp. 361–370, 2012.
[62] Dabiah Ahmed, “Energy-aware Virtual Machine Consolidation for Cloud Data” International Conference on Utility and Cloud Computing Centers” London UK , 2014
[63] Sina Esfandiarpoor “Sturecture-aware online VM Consolidation for datacenter energy improvement in cloud cloud computing” Computers and Electrical Engineering, Vol. 42, pp:74-75, 2015
[64] ChaoTung, “Green Power Management with Dynamic Resource Allocation for Cloud Virtual Machines”, International Conference on High Performance Computing and Communications Banff, AB, Canada 2011
Citation
Satveer, Mahendra Singh, "A Taxonomy and Survey of Energy Efficient Resource Allocation Schemes for Cloud Datacenter," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.691-998, 2018.
A Fuzzy based Fishbone Method for Goal-Oriented Requirements Analysis
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.699-704, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.699704
Abstract
Decision-making in requirements engineering plays a vital role in building quality software. Significant research is being applied in the requirements engineering field towards finding the reasons for high failure rates in software development. However, the industry still fails to produce quality requirements. Based on our literature review, we identifying that major contributing factor in getting a low rate of success is due unclear and imprecise requirements. In this paper, we proposed a novel fuzzy based fishbone method for decision making in Goal Oriented Requirements Engineering. It facilitates active stakeholder involvement in decision making process by integrating GORE with existing approaches in requirements engineering with respect to decision making. The main objective of this work is to present a formal framework to aid the decision making in a software development process, with ambiguous and vague data. GORE lays focus on the activities before the formulation of software system requirements. Finally, the proposed method improves the quality of decision making system and obtains high-quality products along with finer productivity.
Key-Words / Index Term
Requirements Engineering, Fuzzy set theory, Fishbone, GORE, Software quality
References
[1] Emilio Insfran, Gary Chastek, Patrick Donohoe and Julio César Sampaio,” Requirements engineering in software product line engineering”, Requirements Engineering, Volume 19, Issue 4, pp 331–332,2014.
[2] Chen, S.J., Hwang, C.L., 1992. Fuzzy Multiple Attribute Decision Making: Methods and Applications. Springer- Verlag, Berlin.
[3] Chu, T. C., & Lin, Y. C.,” Improved extensions of the TOPSIS for group decisionmaking under fuzzy environment. Journal of Information and Optimization Sciences, 23, 273–286, 2002.
[4] Van Lamsweerde,”Goal-Oriented Requirements Engineering: A Guided Tour”, Proc. 5th IEEE International Symposium on Requirements Engineering, Toronto, Canada, 2001.
[5] Chan, F. T. S., & Kumar, N.,”Global supplier development considering risk factors using fuzzy extended AHP-based approach”, OMEGA, 35, 417–431, 2007.
[6] Chen, C. T.,” Extensions of the TOPSIS for group decision-making under fuzzy environment”, Fuzzy Sets and Systems, 114, 1–9, 2000.
[7] Chen, S.J., Hwang, C.L., “Fuzzy Multiple Attribute Decision Making: Methods and Applications. Springer, 1992.
[8] Chen, T. Y., & Tsao, C. Y.,”The interval-valued fuzzy TOPSIS methods and experimental analysis”, Fuzzy Sets and Systems. doi:10.1016/j.fss.2007.11.004, 2007.
[9] Faulk S R, “Software Requirements in Software Engineering”, IEEE Computer Society Pres, 1997 .
[10] Metin Dag˘deviren, Serkan Yavuz, Nevzat Kılınç,”Weapon selection using the AHP and TOPSIS methods under fuzzy environment”, Expert Systems with Applications 36 8143–8151, 2009.
[11] Wang, Y. M., & Elhag, T. M. S. ,” Fuzzy TOPSIS method based on alpha level sets with an application to bridge risk assessment”, Expert Systems with Applications, 31, 309–319, 2006.
[12] Wang, J., Liu, S. Y., & Zhang, J.,” An extension of TOPSIS for fuzzy MCDM based on vague set theory”, Journal of Systems Science and Systems Engineering, 14, 73-84, 2005.
Citation
Jameela Bano, L. S. S. Reddy, Hedi Khammari, "A Fuzzy based Fishbone Method for Goal-Oriented Requirements Analysis," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.699-704, 2018.
An Ethical Survey on Non-Delay Tolerant Routing Protocols for VANET
Survey Paper | Journal Paper
Vol.6 , Issue.9 , pp.705-711, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.705711
Abstract
Intelligent Transportation system is a potential system which uses Vehicular Ad hoc Networks (VANET) with internet for its safety driven applications. VANET is infrastructure less and the vehicles form a self-structured network. During data forwarding, the vehicles undergo congestion which is a vital issue related to VANET. To overcome this the data has to be propagated in a particular path in optimized fashion . Routing protocols play a vital role for the propagation of data among nodes. This paper reveals the general idea of position routing protocols with much emphasize on Non delay routing protocols. Various parameters such as packet delivery ratio , end to end delay , throughput and cost were analyzed using hybrid NDTN routing protocols. It also focuses on various aspects of VANET like architecture, an overview of routing protocols, position based routing protocols, classification and related works contributed by various researchers.
Key-Words / Index Term
Beacon,Overlay,End to End delay, Packet Delivery ratio
References
[1] Wenshuang Liang1, Zhuorong Li1, Hongyang Zhang1,Yunchuan Sun2, and Rongfang Bie1,”Vehicular Ad Hoc Networks: Architectures,Research Issues, hallenges and Trends “ Springer International Publishing Switzerland 2014.
[2] Hannes Hartenstein,University of Karisruhe,Kenneth .P.Laberteaux,Toyota Technical center, ” A Tutorial Survey on Vehicular Adhoc Networks” ,IEEE Communication Magazine June 2008
[3] Neha goel ,Isha Dyani,Gaurav sharma,.”A Study of Position based VANET routing protocol”, IEEE 2016
[4] Balasubramani, Karthikeyan.L Deepalakshmi.V. “Comparison study on Non Delay Tolerant Routing protocols in vehicular networks “ , Science Direct-Proceedia -2015
[5] R.Brendha, Dr.V.Sinthu Janita Prakash,”A Survey on Routing protocols for Vehicular Ad Hoc Networks”,2017,International conference on Advanced computing and communication(ICACCS 2017)
[6] Zineb Squali Hussaini,Imane Ziami- ‘Improvement of GPSR protocol by using Future position estimation of participating nodes in VANET’, IEEE 2016, pg 87-94.
[7] Rewadkar, Dharmpal Doye, (2017) “FGWSO-TAR:Fractional Glowworm swarm optimization for traffic aware routing in urban VANET”, International Journal of Communication Systems Volume 31, Issue 1,Wiley Online Library.
[8] Moez Jerbi* Rabah Merdah, “GyTAR: Improved Greedy Traffic Aware Routing Protocol for Vehicular Ad Hoc Networks in City Environments” ,Proceeding of the 3rd international workshop on Vehicular Adhoc networks ISBN: 1-59593-540-1.
[9] Konstantinos Katsaros, Mehrdad Dianati, “CLWPR - A Novel Cross-Layer Optimized Position Based Routing Protocol for VANETs”, Vehicular Networking Conference (VNC), 2011 IEEE.
[10] Anant Ram ,Manas Kumar Mishra ,”Density Aware Position Based Routing (DAPBR) protocol for VANET “, 2016 pages 142-146,IEEE Conference.
[11] Gen Li,Maode Ma ,(2015), “Adaptive fuzzy multiple attribute decision routing in VANET”- Wiley Online Library https:/doi.org/10.1002/dac.3014.
[12] Abdel muttlib Ibrahim Abdalla Ahmed,Abdullah gani,(2017), “Intersection Based Distance and Traffic Aware Routing (IDTAR) protocol for Smart Vehicular Communication”, IEEE 2017. 13th International Wireless Communications and Mobile Computing Conference (IWCMC) Year: 2017 Pages: 489 – 493.
[13] Harinder Kaur, Meenakshi ,” Analysis of VANET Geographic Routing Protocols on Real City Map”, 2017 2nd IEEE International Conference On Recent Trends in Electronics Information & Communication Technology (RTEICT), May 19-20, 2017, India
[14] Neha Goel,Isha Dhyani,Gaurav sharma-“An Acute Position Based VANET routing protocol”- IEEE 2016, International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE) Year: 2016, Pages: 139 – 144 .
[15] Nizar Alsharif Xuemin Shen “iCAR-II: Infrastructure-Based Connectivity Aware Routing in Vehicular Networks”, Page(s): 4231 – 4244,IEEE 2016
[16] Ahmed Nazar Hassan, Omprakash Kaiwartya , ”Inter Vehicle Distance Based Connectivity Aware Routing in Vehicular Adhoc Networks“ -Springer Science+Business Media,LLC 2017.
[17] Michele Rondinone , Javier Gozalvez ,” Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks”,Elsevier Computer Networks ,Volume 57, Issue 8, 4 June 2013, Pages 1821-1837
[18] Kamlesh Kumar Rana, Sachin tripathi, Ram Shringer Raw, “Analytical Analysis of Improved Directional Location Added Routing Protocol for VANETs”, Springer Science+Business Media,LLC2017 DOI 10-1007 /11277-017-4980-y.
[19] Raj K Jaiswal, “Predicted Position Based Routing Protocol Using Kalman Filter for Vehicular Ad-hoc Network”, ICDCN `17 Proceedings of the 18th International Conference on Distributed Computing and Networking.
Citation
S. Suguna Devi, A. Bhuvaneswari, "An Ethical Survey on Non-Delay Tolerant Routing Protocols for VANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.705-711, 2018.
A Review on Cluster Based Routing Protocols in Vehicular Adhoc Networks
Review Paper | Journal Paper
Vol.6 , Issue.9 , pp.712-718, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.712718
Abstract
Vehicular Adhoc Networks is an emerging technology for the communication of vehicles with the support of Intelligent Transportation Systems(ITS) to avoid fatal collisions and crashes on road and to ensure the road safety among the vehicles. The vehicles can be communicated through a wireless medium. Due to the rapid movement of vehicles and change in the topology leads to some message overheads with delays. Hence connectivity among the vehicles disappears and there is a need to identify an optimal path to be identified from source to destination for effective routing. A cluster will be formed to achieve a better link stability between the nodes and able to forward data to other members in case of any emergency situation. The safety message will be disseminated to other nodes in a limited short span of time. This paper gives a review on Vehicular Adhoc Networks(VANET) with its architecture, applications and various strategies which can be applied to form a cluster that yields high performance and evaluated with Quality of Service parameters.
Key-Words / Index Term
VANET, ITS, Cluster, Routing Protocols, DSR
References
[1]. Advanced Technologies for Intelligent Transportation Systems- Marco Picone,Stefano Busanelli,Michelle Amoretti,Francesco Zanichelli,Gianluigi Ferrari.
[2]. Saleh Yousefi,Mahmoud Siadat Mousavi and Mahmood Fathy,”Vehicular Ad Hoc Networks(VANETs):Challenges and Perspectives”, IEEE ITS Telecommunication Proceedings, pp.761-766, 2006.
[3]. Poonam Dhamal,Uma Nagaraj and Disha Devotale,”Study of various routing protocols in VANET”,Elixir Adoc Network,Vol.37A, pp.4033- 4039,2011.
[4]. Vehicular Networks-From Theory to Practices-.Stephen Olariu,Michele C.Weigle.
[5]. Samira Harrabi,Ines Ben Jaffar and Khaled Ghedira,”Novel Optimized Routing Scheme for VANETs”,Elsevier ScienceDirect Procedia Computer Science,Vol.98, pp.32-39,2016.
[6]. Jaskaran Preet Singh and Rasmeet S.Bali,”A Hybrid Backbone based Clustering Algorithm for Vehicular Adhoc Networks”, Elsevier ScienceDirect Procedia Computer Science,Vol.46,pp.1005-1013,2015.
[7]. Sourav Chhabra,Rasmeet Singh Bali and Neeraj Kumar,”Dynamic Vehicle Ontology Based Routing for VANETs”,Elsevier ScienceDirect Procedia Computer Science,Vol.57,pp.789-797,2015.
[8]. Ahmad Abuashour and Michel Kadoch,”Performance Improvement of Cluster-Based Routing Protocol in VANET”,IEEEAccess,Vol:5,2017,pp:15354-15368.
[9]. Haigang Gong,Nianbo Liu,Lingfei Yu and Chao Song,”An Efficient Data Dissemination Protocol with Roadside Parked Vehicles’Assistance in Vehicular Networks”,Hindawi Publishing Corporation International Journal of Distributed Sensor Networks,Vol.2013,pp. 1- 12,2013.
[10]. Eduardo Cambruzzi,Jean-Marie Farines,Werner Kraus and Raimundo Macedo,”A Cluster Management System for VANETs”,Springer Science+Business Media,Vol.14,pp.115-126,2016.
[11]. Yen-Wen Lin,Hao-Chun Weng,Tsung-Han Lee and Shan-Yin Hou,”An Adaptive Clustering Scheme for Improving the Scalability in Intelligent Transportation Systems, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks,Vol.2013,pp.1-18,2013.
[12]. Raghavendra Pal,Nishu Gupta,Arun Prakash and Rajeev Tripathi,”Adaptive Mobility and Range Based Clustering Dependent MAC Protcol for Vehicular Ad Hoc Networks”,Springer Science+Business Media,2017.
[13]. A.Malathi and Dr.N.Sreenath,”An Efficient Clustering Algorithm for VANET”,International Journal of Applied Engineering Research,Vol.12,pp.2000-2005,2017.
[14]. Samo Vodopivec,Janez Bester and Andrej Kos,”A Multihoming Clustering Algorithm for Vehicular Ad Hoc Networks”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks,Vol.2014,pp. 1-8,2014.
[15]. Mazen Alowish,Yasuhiro Takano,Yoshiaki Shiraishi and Masakatu Morii,”Performance Evaluation of Cluster Based Routing Protocol for VANETs”,Journal of Communications,Vol.12,pp.137-144,2017.
[16]. Mengying Ren,Lyes Khoukhi,Houda Labiod,Jun Zhang and Veronique Veque,”A Mobility based Scheme for Dynamic Clustering in Vehicular Ad-hoc Networks(VANETs)”,Vehicular Communications,2016.
[17]. Waqar Farooq,Muazzam Ali Khan and Saad Rehman,”A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks,Vol.2016,pp. 1-18,2016.
Citation
D. Radhika, A. Bhuvaneswari, "A Review on Cluster Based Routing Protocols in Vehicular Adhoc Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.712-718, 2018.
A New Device to Monitors New Born Child Health Conditions in an Incubator with Wireless Technology
Research Paper | Journal Paper
Vol.6 , Issue.9 , pp.719-722, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.719722
Abstract
Nowadays a newborn child as a immature death is increasing due to not proper monitoring in incubator by the people. if automatic control and monitor system is needed for the hospital to avoid the new born child death. The proposed work is design a new device to monitor baby condition and send alert call to parents, nurses and doctors. The arduino based New Born child incubator helps to all peoples, the cost this proposed works very less than today’s New Born child incubator which are used in big hospital. So, everyone which belongs to economical backward also use of it. This proposed work not only used for monitoring and controlling the temperature but also provide number of advantages such as controlling humidity, monitoring weight, detection of sound etc.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert (key words)
References
[1] Med A.Z.,Elyes F., and Abdelkader M., “American Journal of Engineering and Applied Sciences”, Application of Adaptive Predictive Control to a Newborn Incubator, 4 (2): 235-243, ISSN 1941-7020, 2011.
[2] Joshi N.S., Kamat R. K., andGaikwad P. K., “International Journalof Advanced Computer Research”, Development of Wireless Monitoring System for Neonatal Intensive Care Unit, (ISSN-print): 2249-7277, ISSN (online: 2277-7970) , Volume-3, Number-3 , Issue-11, September-2013.
[3] Olson K.R., and Caldwell A.C. , “Engineering in Medicine and Biology Society (EMBC)”, Designing an early stage prototype using readily available material for a neonatal incubator for poor settings, 2010 Annual International Conference of the IEEE , pp. 1100 – 1103, 2010.
[4] Kumar P., AkshayNaregalkar K., Thati A., SamaA., “International Journal of Application or Innovation in Engineering & management”, Real Time Monitoring And Control Of Neonatal Incubator Using Lab VIEW,ISSN 2319 – 4847, Volume 2, Issue 4, April 2013.
[5] Paradiso R., Loriga G., and Taccini N., “Information Technology inBiomedicine”, A wearable health care system based on knitted integrated sensors, IEEE Transactions on, vol. 9, pp. 337-344, 2005.
Citation
R. Kalai Magal , "A New Device to Monitors New Born Child Health Conditions in an Incubator with Wireless Technology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.719-722, 2018.