Multipath Content Transmission Mechanism Based Determining Cache Node Locations in CCN
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.680-686, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.680686
Abstract
In the point of internet users they give preference to content information, when compare to content information now current scenario gives more important to location based information. WSN face many limitations of cache techniques in terms of short communication range, reliability, security, privacy, mobility, poor processing capabilities, small storage and limited bandwidth availability. The services or data are offered to a broad category of users via the internet by the virtualization of the resources in the clouds. The tasks of the applications are executed after scheduling to proper machines and assigning with appropriate resources. The cache nodes which helps to find the user through fast and easiest way, reduce the hop count as an existing integer linear programming (ILP) problem when path of cache nodes destination to the user. So therefore ILP not able to solve in time, thought another method of approach have been introduced that is novel multipath routing transmission mechanism based on the network coding (MRNC). Quantitatively analysis of Proposed system Optimality of the shortest-path routing in Content-Centric Networking (CCN) in terms of application-level performance metrics. By using network coding technology, users Interest packet is divided into multiple child interest packet, and the content is divide and random linear codes and the content, thus the content is cache fragmentation. Content retrieval process is become into more child content. Proposed method more efficient to track paths, fastest short paths and reduce computation time comparatively integer linear programming (ILP).
Key-Words / Index Term
Information centric networking, network coding, energy efficiency, caching strategy
References
[1]. D. Kim, S. W.Lee, Y. B. Ko , Jae-HoonKim, (2015, April) Cache capacity-aware content centric networking under flash crowds, Journal of Network and Computer Applications, Vol:50, , PP- 101-113.
[2]. W. K. Chai , D. He, I. Psaras, G. Pavlou., (2013) Cache ‘‘less for more’’ in information-centric networks. (extended version), Computer Communications, Vol. 36. PP-758–770.
[3]. S. Wassermann, K. Faust., (1994) Social Network Analysis: Methods and Applications, Cambridge University Press, Cambridge.
[4]. K. Suksomboony, S. Tarnoiz, Y. Jiyz, M. Koibuchiyz, K. Fukudayz, S. Abeyz, N. Motonoriyz, M. Aokiyz, S. Urushidaniyz and S. Yamada., (2014, March) PopCache: Cache More or Less Based on Content Popularity for Information-Centric Networking, IEEE Conference on Local Computer Networks.
[5]. M. Xie, I. Widjaja, H. Wang., (May 2012) Enhancing cache robustness for content-centric networking, IEEE INFOCOM. Orlando, USA.
[6]. Y. Xu, Y. Li, T. Lin, G. Zhang, Z. Wang, S. Ci., (2012, March) A Dominatingset- based Collaborative Caching withRequest Routing in Content Centric Networking, IEEE International Conference on Communications (ICC), pp.3624 – 3628.
[7]. S. Guha and S. Khuller., (1998) Approximation algorithms for connecteddominating sets”, Algorithmica, Vol-20(4), pp-374–387.
[8]. Ahlswede R, Cai N, Li S-Y, Yeung R.,(2000) Network information flow. IEEE Trans Inf Theory,” vol. 46, pp. 1204–1216.
[9]. Wang J, Ren J, Lu K, Wang J, Liu S, Westphal C., (2014) An optimal cache management framework for information-centric networks with network coding, In: 2014 IFIP networking conference. Trondheim, Norway, pp. 1-9.
[10]. Yang M, Yang Y., (2014) Applying network coding to peer-to-peer file sharing, IEEE Trans Computer, vol. 63, pp. 1938–50.
[11]. Zhang X, Li B., (2009) Optimized multipath network coding in lossy wireless networks. Selected Areas in Communication, IEEE Journal on. vol. 27, pp. 622-634.
Citation
K. Girija, V. Vijaya Deepa , "Multipath Content Transmission Mechanism Based Determining Cache Node Locations in CCN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.680-686, 2018.
A Secure & Smart Shopping System: A Review
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.687-691, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.687691
Abstract
With the recent emergence of social E-commerce the act of shopping is evolving. The physical shopping destination like commercial shopping Center, Wall-Mart`s, supermarket also seek smartly and securely in shopping experience. Consumers with QR (Quick Response) code applications, RFID tag, Zig-Bee system, NFC systems can find a modernistic way of buying the products and goods. It collects knowledge about the technical details, working and pros and cons of individual technique as me The paper represent aforementioned techniques that can be deployed for smart shopping experience mentioned previously. The study is carried out to help new user for selecting particular technique in his area of do main
Key-Words / Index Term
QR-code, RFID tag, Zig-Bee system, NFC systems
References
[1] Manoj Dhande “QR-code Based Effective Time and Space Management in Shopping Malls”, IJIR, vol-3, Issue-3,pp.1795-1798, 2017.
[2] Devi Ramakrishnan, “IoT APPLICATIONS ON SECURE SMART SHOPPING SYSTEM”, IRJET, Vol:05, Issue: 03,pp.1881-1885, March 2018,
[3] P. Sathishkumar, A. “SMART SHOPPING USING QRCODE”, isr journals, Vol: 4, Issue: 3, pp.684-689,2016,2321- 3337,Apr 2016.
[4] Monika S. Borkar, "A Secure Application for Shopping in Mall using NFC ", IJCSIT, Vol. 6, pp.5490-5492, 2015, 5490-5492, 2015.
[5] Rhythm Mehta, "Smart Shopping using QR codes for Bill Calculation and RFID system ", IRJET, vol.04, Issue: 04, pp.3467-3471, Apr -2017.
[6] Purva S. Puranik, “IoT Application on Smart and Secure Shopping System using RFID, Zig-Bee and Gossamer Protocol ", ijet journal, Vol. 4, Issue 3, pp.374-378, May – June 2018.
[7] Ruinian Li, " IoT applications on Secure Smart Shopping System ", IJISET , DOI 10.1109,2017.
[8] Meenakshi Jangid1, "Smart Shopping using QR ", IJESC, Vol.8, Issue: 3, pp.16130-16133, 2018.
[9] G.Venkatachalam1, “QR Code Generation for Mall Shopping Guide System with Security ", AJAST, Vol.1, Issue 4, pp. 37-39, May 2017.
Citation
Janhavi Borse, Harshada Raut, Priyanka Divate, Sujata Tungar, Meghna Patil, "A Secure & Smart Shopping System: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.687-691, 2018.
Data Mining in Career Counselling for Efficient and Effective Education System (EDM)
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.692-694, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.692694
Abstract
This is a review paper on using Data mining techniques for students in their career path and their prediction of performance .Many Techniques of data mining like Classification, Clustering, and Association Rules are used for Educational Data Mining System. Educational Data Mining is knowledge extraction from many datasets, databases and data repository in different perspective. This Paper studies many papers which surveys data mining applications and techniques that can help students for their career counseling. Weka is the powerful tool used for Data Mining Techniques. Weka J48 tool is used for decision tree classifier .Supervised Learning is used here for improving efficiency of EDM. The algorithms like classification, clustering, outlier detection, association rule, prediction etc which are used in Educational Data Mining Systems Data Mining Techniques are also here used for improving the Education System Efficiency .There is need for right counseling of student such that proper productivity of Human Resource Can be Utilized
Key-Words / Index Term
Education Data Mining,Weka,Clustering,Classification,Association,Academic Performance (key words)
References
[1]. D.K. Sofia University “St. Kl. Ohridski”, Sofia 1000Email: dorina@fmi.uni-sofia.bg “predicting Student Performance by Using Data MiningMethods for Classification”. Print ISSN: 1311-9702; Online ISSN: 1314-4081DOI: 10.2478/cait-2013-0006
[2]. R.A.SamanHina,, S.I.HaqueN.E.D University of Engineering of Technology,Karanchi,Pakistan,IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017
[3]. Sunita B Aher ,ME (CSE) Student , Mr. LOBO L.M.R.J. Associate Professor & Head, Department of IT Walchand Institute of Technology Solapur “Data Mining in Educational System using WEKA, International Conference on Emerging Technology Trends “(ICETT) 2011 Proceedings published by International Journal of Computer Applications® (IJCA)
[4]. N.Gorad, I. Zalte .”Career Counseling using Data Mining, Vidyalankar Institute of Technology”, Mumbai, India ISSN XXXX XXXX © 2017 IJESC, Volume 7 Issue No.4
[5]. Subhalaxmi Panda, Department of Computer Science & Engineering, Siksha `O` Anusandhan University, Bhubaneswar, Odisha”A Higher Education Predictive Model Using Data Mining Techniques”
[6]. J. S.Ph.D. Scholar, Jaipur National University, Jaipur “Data Mining in Education Sector”, Special Conference Issue: National Conference on Cloud Computing & Big Data
[7]. M. S. Bhullar “Use of Data Mining in Education Sector”, Proceedings of the World Congress on Engineering and Computer Science 2012 Vol I WCECS 2012, October 24-26, 2012, San Francisco, USA ISBN: 978-988-19251-6-9 .ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
Citation
Anshu Singla, Sachin Garg, "Data Mining in Career Counselling for Efficient and Effective Education System (EDM)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.692-694, 2018.
A Critical Study of Big Data Techniques and Predictive Analytics Algorithms
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.695-700, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.695700
Abstract
Big data is defined as the collection of a broad set of data. The tremendous increase in the usage of the internet over social media applications and forums such as mailing system, e-collection of research scholar articles, retrieval and online transaction data in the field of health leads to high exponential growth in the storage of data. These vast collections of data may lead to arising problems in big data analytics. Subsequently, the predictions based on unknown future events were performed by using Predictive analytics. This approach is found to utilize numerous techniques such as machine learning, statistics, data mining, modelling, and artificial intelligence in analysing the data for predicting the future. However, in past few decades, there have been significant developments in various techniques, architecture, tools, and platforms for managing the enormous amount of big data and to predict its future events considering predictive analytic algorithms. This paper provides a detailed survey of existing techniques, computing tools used in big data analysis and predictive analytic algorithms with its advantages and limitations. Further, this paper discusses the essential aspects considered to overcome the analytic data problems regarding availability and scalability and its various applications
Key-Words / Index Term
Bigdata, Machine learning algorithms, predictive analytics
References
[1] Lyman P, Varian H. How much information 2003? Tech. Rep, 2004. [Online]. Available: http://www2.sims.berkeley.edu/research/projects/how-much-info-2003/printable_report.pdf.
[2] Xu, R., & Wunsch, D. II.(2009). Clustering. Hoboken.
[3] Kaisler, S., Armour, F., Espinosa, J. A., & Money, W. (2013, January). Big data: Issues and challenges moving forward. In System sciences (HICSS), 2013 46th Hawaii international conference on (pp. 995-1004). IEEE.
[4] Huang, W., Wang, H., Zhang, Y., & Zhang, S. (2017). A novel cluster computing technique based on signal clustering and analytic hierarchy model using hadoop. Cluster Computing, 1-8.
[5] Gao, S., Li, L., Li, W., Janowicz, K., & Zhang, Y. (2017). Constructing gazetteers from volunteered big geo-data based on Hadoop. Computers, Environment and Urban Systems, 61, 172-186.
[6] Ji, C., Xiong, Z., Fang, C., Hui, L. V., & Zhang, K. (2017, July). A GPU Based Parallel Clustering Method for Electric Power Big Data. In Information Science and Control Engineering (ICISCE), 2017 4th International Conference on (pp. 29-33). IEEE.
[7] Malakar, R., & Vydyanathan, N. (2013, February). A CUDA-enabled Hadoop cluster for fast distributed image processing. In Parallel Computing Technologies (PARCOMPTECH), 2013 National Conference on (pp. 1-5). IEEE.
[8] Iqbal, M. H., & Soomro, T. R. (2015). Big data analysis: Apache storm perspective. International journal of computer trends and technology, 19(1), 9-14.
[9] Requeno, J. I., Merseguer, J., & Bernardi, S. (2017, August). Performance Analysis of Apache Storm Applications using Stochastic Petri Nets. In Information Reuse and Integration (IRI), 2017 IEEE International Conference on (pp. 411-418). IEEE.
[10] Shvachko, K., Kuang, H., Radia, S., & Chansler, R. (2010, May). The hadoop distributed file system. In Mass storage systems and technologies (MSST), 2010 IEEE 26th symposium on (pp. 1-10). Ieee.
[11] Zhang, T., Ramakrishnan, R., & Livny, M. (1997). BIRCH: A new data clustering algorithm and its applications. Data Mining and Knowledge Discovery, 1(2), 141-182.
[12] Chakraborty, S., & Nagwani, N. K. (2014). Analysis and study of Incremental DBSCAN clustering algorithm. arXiv preprint arXiv:1406.4754.
[13] Chakraborty, S., & Nagwani, N. K. (2014). Analysis and study of Incremental DBSCAN clustering algorithm. arXiv preprint arXiv:1406.4754.
[14] Cui, X., Zhu, P., Yang, X., Li, K., & Ji, C. (2014). Optimized big data K-means clustering using MapReduce. The Journal of Supercomputing, 70(3), 1249-1259.
[15] Rebentrost, P., Mohseni, M., & Lloyd, S. (2014). Quantum support vector machine for big data classification. Physical review letters, 113(13), 130503.
[16] Bolón-Canedo, V., Sánchez-Maroño, N., & Alonso-Betanzos, A. (2015). Recent advances and emerging challenges of feature selection in the context of big data. Knowledge-Based Systems, 86, 33-45.
[17] Jeong, Y. S., Shin, K. S., & Jeong, M. K. (2015). An evolutionary algorithm with the partial sequential forward floating search mutation for large-scale feature selection problems. Journal of The Operational research society, 66(4), 529-538.
[18] Chen, B., Haas, P., & Scheuermann, P. (2002, July). A new two-phase sampling based algorithm for discovering association rules. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 462-468). ACM.
[19] Lee, G., Yun, U., & Ryu, K. H. (2014). Sliding window based weighted maximal frequent pattern mining over data streams. Expert Systems with Applications, 41(2), 694-708.
[20] Kumar, B., & Kumar, D. (2017). A Matrix based Maximal Frequent Itemset Mining Algorithm without Subset Creation. International Journal of Computer Applications, 159(6).
[21] M.J. Zaki, “SPADE: An efficient algorithm for mining frequent sequences”, Machine learning, 42(1-2), pp.31-60, 2001.
[22] Ayres, J., Flannick, J., Gehrke, J., & Yiu, T. (2002, July). Sequential pattern mining using a bitmap representation. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 429-435). ACM.
[23] Kumar, A., Sinha, R., Bhattacherjee, V., Verma, D. S., & Singh, S. (2012, March). Modeling using K-means clustering algorithm. In Recent Advances in Information Technology (RAIT), 2012 1st International Conference on (pp. 554-558). IEEE.
[24] Lavanya, B., & Divya, B. (2017). BIG DATA ANALYSIS USING SVM AND K-NN DATA MINING TECHNIQUES. International Journal of Computer Science and Mobile Computing (IJCSMC), 6(1), 84-91.
[25] Boukenze, B., Mousannif, H., & Haqiq, A. Predictive analytics in healthcare system using data mining techniques. Computer Science & Information Technology, 1.
Citation
B. Jogeswara Rao, M.S. Prasad Babu, "A Critical Study of Big Data Techniques and Predictive Analytics Algorithms," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.695-700, 2018.
A Comprehensive Study of Deep Learning Architectures, Applications and Tools
Review Paper | Journal Paper
Vol.6 , Issue.12 , pp.701-705, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.701705
Abstract
The Deep learning architectures fall into the widespread family of machine learning algorithms that are based on the model of artificial neural network. Rapid advancements in the technological field during the last decade have provided many new possibilities to collect and maintain large amount of data. Deep Learning is considered as prominent field to process, analyze and generate patterns from such large amount of data that used in various domains including medical diagnosis, precision agriculture, education, market analysis, natural language processing, recommendation systems and several others. Without any human intervention, deep learning models are capable to produce appropriate results, which are equivalent, sometime even more superior even than human. This paper discusses the background of deep learning and its architectures, deep learning applications developed or proposed by various researchers pertaining to different domains and various deep learning tools.
Key-Words / Index Term
deep learning, architectures, applications, tools
References
[1]M. Nielsen, "Neural networks and deep learning," 2017. [Online]. Available: http: //neuralnetworksanddeeplearning.com/.
[2]U. V. SurajitChaudhuri, " Anoverview of business intelligence technology," Communications of the ACM, vol. 54, no. 8, p. 88–98, 2011.
[3]A. P. Sanskruti Patel, "Deep Leaning Architectures and its Applications A Survey," INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING , vol. 6, no. 6, pp. 1177-1183, 2018.
[4]I. S. a. G. E. H. A. Krizhevsky, "Imagenet classification with deep convolutional neural networks," Advances in neural information processing systems, p. 1097–1105, 2012.
[5]A. P. J. Y. W. J. C. C. D. M. A. Y. N. a. C. P. R. Socher, "Recursive deep models for semantic composition- ality over a sentiment treebank," in in Proceedings of the conference on empirical methods in natural language processing, Citeseer, 2013.
[6]Y. D. K. Y. Y. B. L. D. D. H.-. T. X. H. L. H. G. T. D. Y. a. G. Z. G. Mesnil, "Using recurrent neural networks for slot filling in spoken language understanding," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 3, pp. 530-539, March, 2015.
[7]Q. V. Le, "Building high-level features using large scale unsupervised learning," in IEEE International Conference on Acoustics, Speech and Signal Processing, May-2013.
[8]G. E. H. a. T. J. S. S. E. F. G. E. H. a. T. J. S. S. E. Fahlman, "Massively parallel architectures for AI: Netl, thistle, and Boltzmann machines," Washington, DC, USA, 1983.
[9]T. J. S. a. D. H. A. G. E. Hinton, "Boltzmann machines: Constraint satisfaction networks that learn," Technical Report CMU-CS-84-119, CarnegieMellon University, Pittsburgh, PA, USA, 1984.
[10]D. b. n. S. 4. Geoffrey E. Hinton (2009), "Deep belief networks, Scholarpedia," 2009.
[11]H. &. C. Y. &. C. L. Wang, "A Vehicle Detection Algorithm Based on Deep Belief Network," The Scientific World Journal, vol. 10.1155/2014/647380, 2014.
[12]J. Schmidhuber, "Deep Learning," Scholarpedia.
[13]S. U. z. d. n. N. Hochreiter, " Diploma thesis," in German, 1991.
[14]Y. S. P. &. F. P. Bengio, " Learning long-term dependencies with gradient descent is difficult," IEEE Trans, vol. Neural Networks 5, p. 157–166 , 1994.
[15]S. &. L. B. &. Y. S. Min, "Deep Learning in Bioinformatics. Briefings in Bioinformatics.," 18. 10.1093/bib/bbw068, 2016.
[16]N. A. a. G. M, "A Review on Deep Convolutional Neural Networks," IEEE Xplore, pp. 0588-0592, 2017.
[17]I. S. a. G. E. H. A. Krizhevsky, "ImageNet classification with deep convolutional neural networks," in in Proc. NIPS, 2012.
[18]K. S. a. A. Zisserman, "Very deep convolutional networks for large-scale image recognition," CoRR, vol. vol. abs/1409.1556, Apr. 2015.
[19]C. S. e. al, "Going deeper with convolutions," in in Proc. CVPR, 2015.
[20]"4. Convolutional Neural Networks Tutorial in TensorFlow, retrieved from http://adventuresinmachinelearning.com/convolutional-neural-networks-tutorial-tensorflow/," May 2018. [Online].
[21]H. Z. W. G. H. J. N. a. W. Y. Z. Chen, "A streaming-based network monitoring and threat detection system," in IEEE 14th International Conference on Software EngineeringResearch, Management and Applications (SERA), 2016.
[22]T. S. L. a. D. Mumford, "Hierarchical Bayesian inference in the visual cortex," J. Opt. Soc. Am. A, vol. Vol. 20, July 2003.
[23]S. O. Y.-W. T. Geoffrey E. Hinton, "A Fast Learning Algorithm for Deep Belief Nets," Neural Computation, pp. Pages 1527-1554, July 2006.
[24]A. M. a. G. Hinton, "Three new graphical models for statistical language modelling," ICML `07 Proceedings of the 24th international conference on Machine learning, pp. 641-648, 20 - 24 June 2007.
[25]G. D. a. G. H. Abdel-rahman Mohamed, "Deep Belief Networks for phone recognition," in Proceedings of the NIPS Workshop on Deep Learning for Speech Recognition and Related Applications, 2009.
[26]V. N. a. G. E. Hinton, "Rectified linear units improve restricted boltzmann machines," ICML`10 Proceedings of the 27th International Conference on International Conference on Machine Learning, pp. 807-814 , June 2010.
[27]Y. T. a. C. Eliasmith, "Deep networks for robust visual recognition," in Proceedings of the 27th International Conference on Machine Learning (ICML-10), Haifa, Israel, 2010.
[28]A.-r. M. H. J. G. P. Ossama Abdel-Hamid, "Applying Convolutional Neural Networks concepts to hybrid NN-HMM model for speech recognition," in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012.
[29]K. H. X. Z. S. R. J. Sun, "Deep Residual Learning for Image Recognition," in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 2015.
[30]A. H. a. m. David Silver, "Mastering the game of Go with deep neural networks and tree search," in Nature 529(7587):484-489, 2016.
[31]Y. P. J. Z. a. W. X. Y. Dong, "Learning to Read Chest X-Ray Images from 16000+ Examples Using CNN," in 2017 IEEE/ACM International Conference on Connected Health: Applications , Systems and Engineering Technologies (CHASE), Philadelphia, 2017.
[32]O. B. F. B. P. L. R. P. G. D.-. j. J. T. D. W.-F. a. Y. B. J. Bergstra, "Theano: A cpu and gpu math compiler in python," in 9th Python in Science Conf, 2010.
[33]E. S. J. D. S. K. J. L. R. G. S. G. a. T. D. Y. Jia, "Caffe: Convolutional architecture for fast feature embedding," in 22nd ACM interna- tional conference on Multimedia. ACM, 2014.
[34]K. K. a. C. F. R. Collobert, "Torch7: A matlab-like environment for machine learning," in in BigLearn, NIPS Workshop, no. EPFL-CONF-192376, 2011.
Citation
Nilay Ganatra, Atul Patel, "A Comprehensive Study of Deep Learning Architectures, Applications and Tools," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.701-705, 2018.
Performance Analysis of AODV & MAODV Protocol in Mobile ADHOC Networks
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.706-712, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.706712
Abstract
A Mobile Adhoc Network made up of mobile nodes which are wireless. Mobile Adhoc Network is self organized and self configurable. In MANET mobile nodes move randomly. Like a router, the mobile nodes in MANET can forward and receive packets. Routing is a critical issue in MANET. A recent trend in adhoc network routing is the reactive on-demand philosophy where routes are established only when they are required. Most of the protocols in on -demand category are not associating with proper security features. The adhoc environment can be accessed by both legitimate network users and attackers. It has been monitored that different protocols need different security strategies. This paper will discuss the performance analysis of AODV & MAODV protocol in Mobile Adhoc Network.
Key-Words / Index Term
AODV, MAODV, Mobile Adhoc Networks
References
[1] Malkin, G.: RIP version 2, STD 56, November 1998, ftp://ftp.isi.edu/in-notes/std/std56.txt
[2] Moy, J.: OSPF version 2, STD 54, April 1998, ftp://ftp.isi.edu/in-notes/std/std54.txt
[3] Adams, A., Siadak, W. : Protocol Independent Multicast – Dense Mode (PIM-DM) Protocol Specification (Revised), Internet-draft, November 2001, http://www.ietf.org/internet-drafts/draft-ietf-pim-dm-new-v2-00.txt
[4] Fenner, B., Handley, M., Holbrook, H., Kouvelas, I. : Protocol Independent Multicast – Sparse Mode (PIM-SM) Protocol Specification (Revised), Internet-draft, November 2001, http://www.ietf.org/internet-drafts/draft-ietf-pim-sm-v2-new-04.txt
[5] Royer, E., Perkins, C.: Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing, Internet-draft, July 2000, draft-ietf-manet-maodv-00.txt
[6] Port numbers, March 2002, http://www.iana.org/assignments/port-numbers
[7] C. Perkins, E. Royer, and S. Das. Ad hoc on demand distance vector (AODV), Internet-draft, March 2000, http://search.ietf.org/internet-drafts/draft-ietf-manet-aodv-10.txt
[8] Jetcheva, G., et.al., A Simple Protocol for Multicast and Broadcast in Mobile Ad Hoc Networks, July 2001, http://www.ietf.org/internet-drafts/draft-ietf-manet-simple-mbcast-01.txt
[9] Jetcheva, G., et.al., The Adaptive Demand-Driven Multicast Routing Protocol for Mobile Ad Hoc Networks (ADMR), July 2001, http://search.ietf.org/internet-drafts/draft-jetcheva-manet-admr-00.txt
[10] Labiod, H., Moustafa, H.: The Source Routing-based Multicast Protocol for Mobile Ad Hoc Networks (SRMP), November 2001, http://search.ietf.org/internet-drafts/draft-labiod-manet-srmp-00.txt
Citation
Gurjeet Singh, Vijay Dhir, "Performance Analysis of AODV & MAODV Protocol in Mobile ADHOC Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.706-712, 2018.
Identification of Nobel Framework for Knowledge Portal in Higher Secondary Education Sector
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.713-717, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.713717
Abstract
Knowledge portal is highly integrative Knowledge Management System which provides a free and online subscription service. Day by day utility of knowledge portal is increasing. The backbone of education is higher secondary level in which student choices their stream. Every time a student requires syllabus, books, question papers etc. He/she waste time as well as money. It is available on the internet but they confused which is best. We decide to design and develop the knowledge portal for higher secondary sector. This portal will help the student, teachers as well as parents for the above purposes. How it will be more secure and powerful? Students, parents, teachers, syllabus, books, notes, unsold question papers etc are basic elements of the developing knowledge portal. Online lectures will be the root of the portal. Open source software’s are linsence free software. It is freely available on the Internet. In this paper, we will focus on and discuss the fundamental requirements for its development and also discuss portal elements.
Key-Words / Index Term
Knowledge repository, Discussion Forum, Software Tools Panel, Knowledge Testing, Virtual Laboratory
References
[1] Zaihisma Che Cob, Nor’Ashikin Ali, Hidayah Sulaiman and Wan Muhammad Ilya Wan Mazuri, “Islamic Knowledge Portal: an analysis on knowledge portal requirements”, ARPN journal of engineering and applied sciences, vol. 10, no. 2, February 2015, ISSN 1819-6608, 451-456
[2] David Kalper, Eduard Hovy,” A taxonomy and a knowledge portal for cyber security” https://www.researchgate.net/publication/266659372_A_taxonomy_and_a_knowledge_portal_for_cybersecurity
[3] D.Venkata Subramanian, Angelina Geetha, “Evaluation Strategy for Ranking and Rating of Knowledge Sharing Portal Usability”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012, ISSN (Online): 1694-0814, 395-400 www.IJCSI.org
[4] Hanadi “M.R” Al-Zegaier and Samer M. Barakat, “Mobile Knowledge Portals: A new way of Accessing Corporate Knowledge”, American Academic & Scholarly Research Journal Vol. 4, No. 4, July 2012, www.aasrc.org/aasrj
[5] Nur Razia Mohd Suradi, Hema Subramaniam, Marina Hassan, and Siti Fatimah Omar, “Development of Knowledge Portal using Open Source Tools: A Case Study of FIIT, UNISEL”, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering Vol:4, No:2, 2010, Pg. 94-97, scholar.waset.org/1999.10/15873
[6] Z. V. Apanovich, P. S. Vinokurov, V. A. Elagin, “An approach to visualization of knowledge portal content”, Bull. Nov. Comp. Center, Comp. Science, 29 (2009), 17{32© 2009 NCC Publisher
[7] Mihaela I. MUNTEAN, “Knowledge Management Approaches in Portal-Based Collaborative Enterprises”, Informatica Economică vol. 13, no. 4/2009
[8] Maria A. Wimmer, “Implementing a knowledge portal for eGovernment based on semantic modelling: the e-government intelligent portal”, Proceedings of the 39th Hawaii International Conference on System Sciences – 2006
[9] Irina Kondratova and Ilia Goldfarb, knowledge portal as a new paradigm for scientific publishing and collaboration, ITcon Vol. 9 (2004), Kondratova et Goldfarb pg 161-174, http://www.itcon.org/2004/11/
[10] Zoltán Baracskai and Jolán Velencei, “Knowledge on Knowledge in Knowledge Portal”, 26th Int. Conf. Information Technology Interfaces ITI 2004, June 7-10, 2004, Cavtat, Croatia, https://www.researchgate.net/publication/4112728
[11] I.T. Hawryszkiewycz, “Customizable Knowledge Portals for Teaching”, Informing Science, InSITE - “Where Parallels Intersect” June 2002
[12] Steffen Staab and 1Alexander Maedche, Knowledge Portals— Ontologies at Work http://www.aaai.org/ojs/index.php/aimagazine/article/view/1561/1460
[13] Christoph M. JANSEN, Volker BACH,Hubert ÖSTERLE, “Knowledge Portals: Using the Internet to Enable Business Transformation”, 2000, https://www.isoc.org/inet2000/cdproceedings/7d/7d_2.htm
[14] Alhawary A. Faleh, Irtaimeh J. Hani, Hamdan Bany Khaled, “Building a Knowledge Repository: Linking Jordanian Universities E-library in an Integrated Database System”, International Journal of Business and Management, Vol. 6, No. 4; April 2011, Pp:129-133, www.ccsenet.org/ijbm
Citation
Santosh Kumar Miri, Neelam Sahu, "Identification of Nobel Framework for Knowledge Portal in Higher Secondary Education Sector," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.713-717, 2018.
Password Control Multi Line Circuit Breaker Using IoT
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.718-724, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.718724
Abstract
Security is the prime disquiet in our everyday life while playing out any action. In the present situation, inadvertent demise of lineman is regularly perused and prove. Toward this path, a wellbeing measure to safe watch the administrator is discovered extremely essential investigating the present working style. The electric lineman security framework is intended to control the control board entryways and electrical switch by utilizing a secret word for the wellbeing. Basic electrical mishaps to lineman are on the ascent amid electric line fix might be because of absence of correspondence and co-appointment between the support staff and electric substation staff. The proposed framework gives an answer that guarantees wellbeing of lineman. In this proposed system the control (ON/OFF) of the electrical lines lies with line man in IOT. This project is arranged in such a way that maintenance staff or line man has to enter the password in mobile or webpage to ON/OFF the electrical line. Now if there is any fault in electrical line then line man will switch off the power supply to the line by entering password and comfortably repair the electrical line, and after coming to the substation line man switch on the supply to the particular line by entering the password
Key-Words / Index Term
Security, Arduino microcontroller, Internet of Thing
References
[1] Viral P. Solanki, Ajit J. Parmar, Nikul S. Limbachiya, Rakesh Koringa, and Shivangi Patel, “Arduino Based Protection System for Wireman,” Int. J. Electr. Electron. Res., vol. 3, no. 1, pp. 76–79, 2015.
[2] J.Veena, G.Srivani, Afreen, M.Sunil Kumar, J.Santhosh, and K.B.V.S.R.Subrahmanyam, “Electric Lineman Protection Using User Changeable Password Based Circuit Breaker,” Int. J. Curr. Eng. Sci. Res., vol. 2, no. 5, pp. 44–49, 2015.
[3] P. N. Mahadik, P. A. Yadav, S. B. Gotpagar, and H. P. Pawar, “Electric Line Man Safety using Micro Controller with GSM Module,” Int. J. Sci. Res. Dev., vol. 4, no. 1, pp. 205–207, 2016.
[4] M. Hassan Ali, “Enhancement of a GSM Based Control System,” in Advances in Circuits, Systems, Signal Processing and Telecommunications, 2015, pp. 189–202.
[5] D. R. Brooks, “Arduino-Based Dataloggers: Hardware and Software,” 1.3, 2016.
[6] M. Gibb, “New Media Art, Design, And The Arduino Microcontroller: A Malleable Tool,” School of Art and Design, Pratt Institute, 2010.
[7] Veena, “Electric line man safety system with OTP based circuit breaker”, SR Engineering College, Volume: 2, May 2015.
[8] Muhaad Ali Mazidi and Janice Gillisllispie Mazid, “The Microcontroller and embedded system”, Person Education, 2nd edition, Issue: 1999.
[9] Dr.Neelam Rup, Prakash, “International Journal of Engineering Trends and Technology”, (IJETT), Volume 13, page: 261, Issue: 3 – Jul 2014.
[10] Mark Halpin: “National Code Committee”, Volume40, page: 228, Issue: 2002.
[11] Deepak Sharma & Major Sing Goraga: “International Journal Of Current Engineering And Scientific Research (IJCESR)” Volume2, issue-May 2015.
[12] Athira P Nair: “electric line man safety system with OTP based circuit breaker” BTC College of Engineering, Kerala, Volume: 04, issue: April, 2011.
[13] VINCENTB DEL TORO: “Electrical Engineering Fundamentals”, Issue: 1-Jan 1986.
[14] John M.Osepchuk: “IEEE Engineering in Medicine and Biology Volume 15(1), Page: 116- 120, issue: June 1996.
[15] David J. Marne, “National Electrical Safety Code” issue: 1997.
[16] Mohammad Tasdighi: “Inductive FCL`s impact on circuit breaker`s interruption condition during short-line faults” North American Power Symposium (NAPS), Issue: 22-24 Sept2013.
Citation
G.Nandakumar, B.Praveenkumar, K.Selvakumar, L. Sarojini, "Password Control Multi Line Circuit Breaker Using IoT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.718-724, 2018.
A Sentiment Analysis on Book and Hotel review Using Sentiment Association Index Classification
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.725-729, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.725729
Abstract
With the quick development of internet based life, conclusion investigation, likewise called sentiment mining, has turned out to be a standout amongst the most dynamic research territories in regular dialect preparing. Its application is additionally across the board, from business administrations to political crusades. Sentiments, assessments, frames of mind, and feelings are the subjects of investigation of conclusion analysis and supposition mining. The commencement and fast development of the field harmonize with those of the social media on the Web, e.g., surveys, gathering exchanges, online journals, smaller scale sites, Twitter, and social networks, on the grounds that without precedent for mankind`s history, we have a gigantic volume of stubborn information recorded in computerized shapes. Since, estimation analysis has become a standout amongst the most dynamic research territories in characteristic dialect handling. It is generally examined in information mining, Web mining, and content mining. In propose a novel cross-space sentiment opinion classification dependent on sentiment associated index, to dissect the supposition extremity for short messages. Sentiment associated index to extend include vectors dependent on unlabeled information from the objective area. As of late, modern exercises encompassing notion analysis have additionally flourished. Various new companies have risen. Numerous vast partnerships have fabricated their very own in-house capacities. Opinion analysis frameworks have discovered their applications in pretty much every business and social space. The objective of this report is to give a prologue to this interesting issue and to display a system which will perform supposition analysis on hotel and book review using sentiment association index compared with support vector machine.
Key-Words / Index Term
Opinion Mining, support vector machine, sentiment association index
References
[1] Andrea Esuli and Fabrizio Sebastiani, “Determining the semantic orientation of terms through gloss classification”, Proceedings of 14th ACM International Conference on Information and Knowledge Management,pp. 617-624, Bremen, Germany, 2005.
[2] Bai, and R. Padman, “Markov blankets and meta-heuristic search: Sentiment extraction from unstructured text,” Lecture Notes in Computer Science, vol. 3932, pp. 167–187, 2006.
[3] Bing xu, tie-jun zhao, de-quan zheng, shan-yu wang, “Product features mining based on conditional random fields model”, Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 11-14 July 2010.
[4] Chaovalit,Lina Zhou, “Review Mining: a Comparison between Supervised and Unsupervised Classification Approaches”, Proceedings of the 38th Hawaii International Conference on System Sciences – 2005.
[5] Chau, M., & Xu, J., “Mining communities and their relationships in blogs: A study of online hate groups”. International Journal of Human – Computer Studies, 65(1), 57–70., 2007.
[6] Christopher Scaffidi, Kevin Bierhoff, Eric Chang, Mikhael Felker, Herman Ng and Chun Jin, “Red Opal: productfeature scoring from reviews”, Proceedings of 8th ACM Conference on Electronic Commerce, pp. 182-191, New York, 2007.
[7] O.Ata, E. Özkök, and U. Karabey, “Survival Data Mining: An Application to Credit Card Holders” Sigma Mühendislik ve Fen Bilimleri Dergisi, Cilt 26, No 1,33-42, 2003.
[8] Chunxu Wu, Lingfeng Shen , “A New Method of Using Contextual Information to Infer the Semantic Orientations of Context Dependent Opinions”, 2009.
Citation
M. Thirunavukkarasu, J. Chockalingam, "A Sentiment Analysis on Book and Hotel review Using Sentiment Association Index Classification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.725-729, 2018.
A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV
Research Paper | Journal Paper
Vol.6 , Issue.12 , pp.730-734, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.730734
Abstract
Now-a-days wireless networks are needed for mobile communication that makes wired communication impossible. The characteristics of WSN are small battery, restricted bandwidth and dynamic topology that expose Wireless Sensor Networks (WSN) to various kinds of attacks such as Black hole, Wormhole, Selective forwarding, Sink hole etc., . Therefore proper security measures will be taken while implementing WSN. Among all those attacks, wormhole attack is the most powerful attack in sensor networks. In this paper, a novelty routing protocol called attack detection ad hoc on demand distance vector (AD-AODV) is proposed to detect and prevent wormhole attack in wireless sensor network. This protocol needs no special hardware and software for the implementation. Moreover it is based on round trip time (RT), threshold round trip time (TRT) and the hop count for detecting the wormhole node. Network simulator2 (NS2) is used for implementing the proposed work.
Key-Words / Index Term
Wireless sensor Network ,Round trip time, Threshold Round trip time, Hop count and AD-AODV
References
[1] Zubair Ahmed Khan, M. Hasan Islam” Wormhole Attack: A new detection technique”978-1-4673-4451- 7/12/$31.00 ©2012 IEEE.
[2] Perkins, C., Belding-Royer, E., & Das, S. (2002). “Adhoc on-demand distance vector (AODV) Routing”,IETF RFC 3561, July 2002.
[3] Kanika Garg, RishiPal Singh, “Scheduling Algorithms in Mobile Ad Hoc Networks”, July 2012
[4] R. Graaf, I. Hegazy, J. Horton, and R. Safavi-Naini. Distributed "Detection of wormhole attacks in wireless sensor networks," Springer book chapter Ad Hoc Networks, vol. 28, pp. 208í22, 2010. [34] A.Vani,
[5] D.Sreenivasa Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks”, International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3 No. 6, pp. 2377-2384, June 2011.
[6] H.S. Chiu and K. Lui. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.
[7] S.Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” In Proc. of the first ACM workshop on Security of ad hoc and sensor networks, 2003.
[8] C. Nita-Rotaru, and H. Rubens, “An ondemand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), 2002.
[9] Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” In Proc. of INFOCOM, 2003.[9] Yith-Chun Hu” Wormhole attacks in wireless networks”IEEE Journal on Selected areas in Communication,IEEE Press Piscataway,NJ,USA ISSN:0733-8716 doi>10.1109/JSAC.2005.861394 Volume2,Issue 24,pages 370-380,
[10] Majid Khabbazian” Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure” V6T 1Z4
[11] Rupinder Singh, Jatinder Singh, and Ravinder Singh” WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks” Revised 23 October 2016; Accepted 2 November 2016
[12]Yurong Xu,Guanling Chen,James Ford,Fillia Makedon,” Detecting Wormhole Attacks in Wireless Sensor Networks“Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 253)
[13] Gu-Hsin” Detection of wormhole attacks on IPv6 mobility-based wireless sensor network”, EURASIP Journal on Wireless Communications and Networking20162016:274 https://doi.org/10.1186/s13638-016-0776-0
[14] C. Nita-Rotaru, and H. Rubens, “An ondemand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), 2002.
[15] B. Dahill, B. N. Levine, E. Royer, and C. Shields,, “A secure routing protocol for ad hoc networks,” In Proc.of the 10th Conference on Network Protocols (ICNP), 2002.
[16] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach,” In Proc. of WCNC, 2005. [5] B. Awerbuch, D. Holmer.
[17] Haseed Zafar, David Harle, “QoS-aware Multipath Routing scheme for Mobile Ad Hoc Networks”, April 2012.
[18] S. Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” In Proc. of the first ACM workshop on Security of ad hoc and sensor networks, 2003.
[19] M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” ACM WiSe, 2002.
[20] W. Weichao, B. Bharat, Y. Lu, and X. Wu. "Defending against wormhole attacks in mobile ad-hoc networks," Wireless Communication and Mobile Computing, vol. 6, no. 4, pp 483í503, 2006.
[21] I. Khalil, S. Bagchi, and N.B. Shroff. "MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks," Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344í62, 2008.
[22] R. Venkataraman, M. Pushpalatha, T.R. Rao, and R. Khemka. "A graph-theoretic algorithm for detection of multiple wormhole attacks in mobile ad-hoc networks," International Journal of Recent Trends in Engineering, vol. 1, no. 2, May 2009.
[23] Jhaveri, R.H.; Patel, S.J.; Jinwala, D.C.; , "DoS Attacks in Mobile Ad Hoc Networks: A Survey," Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on , vol., no., pp.535-541, 7-8 Jan. 2012.
Citation
N. Tamilarasi, S.G. Santhi, "A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV," International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.730-734, 2018.