Construct a phonetic database and develop a phonetic transcription in Gujarati language
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.892-896, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.892896
Abstract
Last few decades are witness of development of phonetic transcription as a part of linguistic research in various languages like American English, Spanish, and Japanese etc. Few amount of work has been done for Indian languages by researchers. So this paper particular focuses in Gujarati Language which is official regional Indian language. This research paper mainly contains two important parts as far as linguistic research is concern first one is creation of phonetic database and second is to develop a phonetic transcription in Guajarati language. For better analysis for bilingual and multilingual analysis phonetic transcription of Gujarati language has been compared with American English.
Key-Words / Index Term
Phonetic database, Phonetic Transcription, Gujarati Language, International Phonetic Alphabet (IPA), PRAAT Software
References
[1] Bimal Krishna Matilal, “The Word and the World: India`s Contribution to the Study of Language”, Oxford University Press, pp. 351-358, 1990.
[2] Biswajit Sharma and S R Prasanna, “Acoustic–Phonetic Analysis for Speech Recognition: A Review”, IETE Technical Review, pp. 1-23, 2017.
[3] International Phonetic Association, “Handbook of the International Phonetic Association: A guide to the use of the International Phonetic Alphabet”, Cambridge: Cambridge University Press. ISBN 0-521-65236-7, 1999.
[4] Vishal Tank, S K Hadia, Manthan Manavadaria “Research and Development of various Text to Speech synthesisers in Gujarati Language”, International Journal of Technical Innovation in Modern Engineering & Science (IJTIMES), e-ISSN: 2455-2585, Vol 4(4),pp. 268-270, 2018.
[5] S.M. Siniscalchi, D. Yu, L. Deng, C.-H.i Lee, "Exploiting deep neural networks for detection-based speech recognition", Neurocomputing, vol. 106, pp. 148-157, 2013.
[6] Brij Kishor Sharma, ”Introduction to Constitution of India”, PHI Publications,Seventh edition, 2015.
[7] Peri Bhakararao, "Salient phonetic features of Indian languages", Sadhana, vol. 36, Part 5, pp. 587–599, Oct 2011.
[8] Vyas, K. B., “An Introduction to the Origin, Development and Structure of the Gujarati Language”, Amadavad: University Granth Nirman Board, Gujrat State, 1997.
[9] JJ Kothari, CK Kumbharana, “A Phonetic Study for Constructing a Database of Gujarati Characters for Speech Synthesis of Gujarati Text”, International Journal of Computer Applications, Vol 117(19), pp. 6-11, 2015.
[10] Barry Heselwood,”Phonetic Transcription in Theory and Practice”, Edinburgh University Press Ltd, 2013.
[11] Hemant Patil, M Madhvi, K Malde, B Vachhani,”Phonetic Transcription of Fricatives and Plosives for Gujarati and Marathi Languages”, International conference on Asian language Processing, pp. 177-180, 2012.
[12] Tanmay Bhowmik; Shyamal Kumar Das Mandal,”Detection and classification of place and manner of articulation for Bengali continuous speech”, 4th International Conference on Signal Processing and Integrated Networks (SPIN), 2017.
[13] Vaishali Patil and Preeti Rao, “Acoustic Cues to Manner of Articulation of Obstruents in Marathi,” Proc. of Frontiers of research on Speech and Music (FRSM), Kolkata, India, pp. 1-5 2008.
[14] Suthar, Babu.,”Gujarati – English Learners’ Dictionary: Second Draft,( Philadelphia: A Nirman Foundation Project, Department of South Asia Studies, University of Pennsylvania,2008.
[15] Modi, B.,”Problems of Gujarati Phonological Structure, Dialects and Standardization”, Atad , Atad Publication,2006 .
[16] Ketan Vyas,”A comparative study of English and Gujarati phonological systems”, Ph.D. Thesis, Saurashtara University, pp. 41-119, 2011.
[17] Ulrike Halsband,” Bilingual and multilingual language processing”, Journal of Physiology, pp. 355-369, 2006.S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012.
[18] A.B. Patil, S.C. Pawar, “Keyword based Marathi Interface to the Database using Natural Language Processing”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.6, Issue.1, pp.50-55, 2018.
[19] V.K. Jain, N. Tripathi, “Speech Features Analysis and Biometric Person Identification in Multilingual Environment”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.7-11, 2018.
Citation
V.P. Tank, M.S. Manavadaria, "Construct a phonetic database and develop a phonetic transcription in Gujarati language," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.892-896, 2018.
3P Invovlement in Software Requirement Engineering Process
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.897-899, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.897899
Abstract
This paper focuses on software project management’s one of the important issues- 3P. 3P involves “People”, “Process” and “Product”. These are the key factors any project may have involved. Also it discusses various issues encountered while a project is being developed. Issues may be technical or personal. Main aim of this research paper is to focus on various aspects of software development and impact while key factors involved. The paper describes Software Requirement Engineering process in short and 3P involvement in them. People from various levels and of various levels participating to develop a product are often tend to succeed if followed a particular functioning. Concepts of 3P are discussed in terms of requirement engineering are explained in this research paper.
Key-Words / Index Term
Project management, software requirement engineering, Software Development, Client’s invovlement, Software Processing, Project planning
References
[1] Kuloor, c., and Eberlian, A., “Requirement engineering for software products”, The University of Calgary, Canada, pp 1-12.
[2] The Standish Group. The CHAOS Report. Denish, MA: The Standish Group, 1994.
[3] Pfleggeer S. L., “Software engineering Theory and practices”, Prentice Hall, New Jersey, 1998.
[4] Reifer D. J., “Requirement Management: The search for Nirvana”, in IEEE software, May/June 2000, pp 45-47
[5] U. K. Jannat , “Green Software Engineering Adaption In Requirement Elicitation Process,” INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 5, no. 8, pp. 94–98, 2016.
Citation
Akshara B. Dave, S.M. Shah, "3P Invovlement in Software Requirement Engineering Process," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.897-899, 2018.
Ransomware: Detection And Prevention
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.900-905, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.900905
Abstract
Now a day everyone wants data to be secure from malicious users. What happens when data is hijacked? Ransomware hijacks user data on different OS like the window, Android, Mac etc. Ransomware is most popular and destructive malware in the cyber world. It can be dispersed via affected spam emails, infected application, infected external storage device and negotiated sites. Ransomware blocks system in a different way. One way to lock the system and another is (crypto ransomware wh¬¬ich) to encrypt the data. After encrypting/locking the system data ransom money will be demanded and time is allotted by the hacker for decryption/unlocking. The main goal of Ransomware is always force to pay money not like other types of attack. Ransom money is in the form of bitcoin because it is harder to trace. There are some tools are invented to prevent system from attack like heldroid, honeypot, and wannakiwi etc. This paper focuses on ransomware prevention technique which helps you to detect and remove ransomware from the system.
Key-Words / Index Term
encryption, decryption, malware, hijack, ransom, bitcoin, EternalBlue, IDS
References
[1] Azad Ali, “Ransomware: A research and a personal case study of dealing with this Nasty Malware” Issues in Information Science +Information Technology, Vol. 14, 2017.
[2] Daniel Gonzalez and Thaier Hayajneh, “Detection and prevention of Crypto-ransomware,” IEEE, 978-1-5386-1104-3/17, 2017.
[3] Timothy Gallo, Allan Liska, “Ransomware” published by O`Reilly Media, Inc., ISBN: 9781491967874,Release Date: December 2016.
[4] “Ransomware holding your data hostage,” Deloitte Development Lcc, issue date: August 12, 2016, Serial: W-TS-EN-16-00734.
[5] Amin Kharraz “Techniques and Solutions for Addressing ransomware Attacks”, College of Computer and Information Science Northeastern University, July 2017.
[6] Nadeem Shah and Mohammed Farik, “Ransomware-Threats, Vulnerabilities And Recommendation”, International Journal Of Scientific & Technology Research(IJSTR), ISSN:2277-8616, Vol. 6, Issue.06 June, 2017.
[7] Chris Moore, “Detecting ransomware with Honeypot technique”, CyberSecurity and Cyberforensic conference IEEE,978-1-5090-2657-9/16,2016.
[8] Lam Zhanhui and Nor Azlina Adb Rahman,“A Review on ransomware Trend of Attacks and Prevention”, International Journal of Applied Engineering Research, ISSN:0973-4562, Vol. 12, No. 16, pp.6201-6210, 2017.
[9] Sherya Chadha and Utham Kumar , “Ransomware : Let’s Fight Back !”, International Conference on Computing, Communication and Automation (ICCCA2017).ISBN:978-1-5090-6471-7/17 IEEE 2017.
[10] Sonu B. Surati, Ghanshyam I. Prajapti , “ A Review on Ransomware detection and prevention” International journal of research and Scientific Innovation, Vol. 5, Serial no 9 Sept, 2017 ISSN:2321-2705
[11] Muhammet Baykara and Baran Sekin, “A Novel Approach to Ransomware: Designing a Safe Zone System”, ISBN: 978-1-5386-3449-3, 2018 IEEE.
[12] Kevin Savage, Peter Coorgen, and Hon Lau “The evolution of Ransomware”, Security Response, Symantec, version 1.0 August 6, 2015.
[13] Adam Alessandrini “RANSOMWARE Hostage Rescue Manual” published by Knownbe4, Tel: 855-KNOWBE4 (566-9234)
[14] Dr.P.B.Pathak, “A Dangerous Trend of Cybercrime: Ransomware Growing Challenge”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278-1323,Volume 5, Issue 2, February 2016.
[15] Nolen Scaife,Henry Carter,Patrick Traynor and Kevin R.B. Butler, “CryptoLock (and Drop It):Stopping Ransomware Attacks on User Data ”, ISSN NO-1063-6927,IEEE 2016.
[16] S.Mahmudha Fasheem, P.Kanimozhi, and B.AkoraMurthy,“Detection and Avoidance of Ransomware”, International Journal of Engineering Development and Research, Volume 5, Issue 1, ISSN: 2321-9939, 2017.
[17] K. Cabaj and W. Mazurczyk, “Using Software-Defined Networking for ransomware mitigation: The case of cryptoWall”, ISSN: 0890-8044, Vol. 30, No. 6, pp. 14-20, Dec 2016, IEEE.
[18] K.V.G.N. Naidu and P. Sireesha “A Study on WannaCry Ransomware Attack ”, International Journal of recent innovation in engineering and Research.e-ISSN:2456-2084,2017.
[19] Savita Mohurle and manisha Patil, “A brief study of Wannacry Threat: Ransomware Attack 2017”, International Journal of advanced Research in Computer Science, ISSN No: 0976-5697, Vol. 8, No. 5, May 2017.
[20] The computer emergency Response team Mauritius (CERT-MU), “The Petya Cyber-attack”, Whitepaper .June 2017.
[21] Segun I. Popoola, Ujioghosa B. Iyekekpolo, Samuel O. Ojewande, Faith O. Sweerwilliams, Samuel N. John, and Aderemi A. Atayero, “Ransomware: Current Trend, challenges, and Research Directions”, World congress on Engineering and Computer Science, Vol.1, ISSN. 2078-0958, ISBN: 978-988-14047-5-6, Oct 2017, WCECS.
[22] POPOOLA, Segun Isaiah, “Ransomware :Most Recent Threat to Computer Network Security”, 2017 CU EIE Seminar on Computer Network Security, Ota, Covenant University, DOI:10.13140/RG.2.2.31592.67841.
[23] Lucian Constantin, “Researchers Release Free Decryption Tools for Powerware and Bart Ransomware”, PC Word from IDG, July 22, 2016.
[24] S. Zanero and F. M. B, “HELDROID: Dissecting and Detecting Mobile Ransomware ”, pp. 382-404, 2015
[25] Monika, Pavol Zavarsky and Dale Lindskog,“Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization”, International Workshop on Future Information Security, Privacy & Forensics for Complex Systems, ISSN. 1877-0509, doi: 10.1016,2016 ELSEVIER.
[26] Tianliang Lu, Lu Zhang, Shunye Wang and Qi Gong,“Ransomware Detection Based on V-detector Negative Selection Algorithm”, ISBN: 978-1-5386-3016-7, IEEE 2017.
[27] A. K Maurya, N. Kumar, A. Agrawal and R. A. Khan, “Ransomware: Evolution, Target and Safety Measures”, International journal of Computer Science and Engineering, Vol.6, Issue.1,E-ISSN:2347-2693, 2017.
[28] Sanggeun Song, Bongjoon Kim, and Sangjun Lee,Research Article “The Effective ransomware prevention Technique using process Monitoring on Android platform” Vol no 2016, Article Id.2946735 Hindawi Publishing Corporation Mobile Information Systems.
[29] Amin Kharaaz, W. Robertson, D. Balzarotti, L. Bilge, and E. kirda,”Cutting the Gordian knot: A look under the hood of ransomware attacks”, 12th conference on detection of Intrusion and malware &vulnerability Assessment (DIMVA 2015), July 9-10, 2015, Milan Italy.
[30] Dae-Youb Kim, Geun-Yeong Choi, and Ji-Hoon Lee, “White List-based Ransomware Real-time Detection and Prevention for User Device Protection”, ISSN: 978-1-5386-3025-9-18,2018 IEEE.
Citation
Annu, Monika Poriye, Vinod Kumar, "Ransomware: Detection And Prevention," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.900-905, 2018.
MANET Expansion Security Challenges Attacks and Intriguing future Trends
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.906-915, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.906915
Abstract
In recent years, the interest in wireless networks has grown up because of the provision of wireless communication devices. While planning an ad hoc network specifically, we are worried about the abilities and confinements that the physical layer forces on the network performance. While designing MANET one can keep in mind, the types of difficulties we face, including signal security, the reliability of Portable devices and dynamic nature of nodes. Specialist brings up that the MANET, now a state of business investigates, was at first used as a piece of military endeavours, joining into vital frameworks and Defence Advanced Research Projects Agency (DARPA) wanders. In this paper we have depicted the advancement and essential issues of wireless ad-hoc network system and in addition we have also discussed vulnerabilities of MANET and Security services it has. This paper also highlights some intriguing future application of the MANET. At last we have proposed that how one can make MANET more powerful by the use of SMART DUST Technology.
Key-Words / Index Term
MANET, Routing Protocols, Wireless Networks, Ad hoc Networking, Smart Dust
References
[1] Ram Ramanathan and Jason Redi “A Brief Overview Of Ad Hoc Networks: Challenges and Directions” In the Proceedings of the 2002 IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002.
[2] Jeoren Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demester “An Overview of Mobile ad hoc Netwroks: Applications & Challenges.”
[3] Ankur O. Bang and Prabhakar L. Ramteke, “MANET: History, Challenges and Applications”, In the Proceedings of the 2013 International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 9, September 2013.
[4] J. Freebersyser and B. Leiner, “A DoD Perspective on Mobile Ad Hoc Networks,” Ad Hoc Networking, ed. C. E. Perkins, Addison-Wesley, 2001, p.29-51.
[5] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers” Proc. ACMSIGCOMM`94,ct.1994.
[6] D. B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts” Proc. ACM Mobicom`94, ec. 1994
[7] Ram Ramanathan and Jason Redi “A Brief Overview of Ad Hoc Networks: Challenges and Directions” IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002
[8] Ankur O. Bang and Prabhakar L. Ramteke, “MANET: History, Challenges And Applications”, in Proc. of International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 9, September 2013.
[9] Mohit Kumar and Rashmi Mishra, “An Overview of MANET: History, Challenges and Applications”, et al / Indian Journal of Computer Science and Engineering (IJCSE)
[10] Mahima Chitkara et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.2, February- 2014, pg. 432-437.
[11] Tripathi Lalit Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (5), 2016, 2381-2384
[12] Aarti, IJARCSSE, “Study of MANET: Characteristic, Challenges, Applications and Security Attacks”, Vol.3, Issue: 5, ISSN: 2277-128X, pp: 252-257 (2013).
[13] Diaa Eldein Mustafa Ahmed, Othman O. Khalifa, “An Overview of MANETs: Applications, Characteristics, Challenges and Recent Issues”, in proc. Of International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-6 Issue-4, April 2017.
[14] Prabhleen Kaur, Sukhman, “An Overview on MANET- Advantages, Characteristics and Security Attacks”, in proc. Of International Journal of Computer Applications (0975 – 8887) 4th International Conference on Advancements in Engineering & Technology (ICAET 2016)
[15] I. Chlamtac, A. Lerner, Link allocation in mobile radio networks with noisy channel, in: IEEE INFOCOM, Bar Harbour and FL April 1986.
[16] I. Chlamtac, A. Lerner, Fair algorithms for maximal link activiation in multi-hop radio networks, IEEE Transactions on Communications COM-35 (7) (1987).
[17] Bakshi Aditya et.al, IJITEE, “Significance of Mobile AdHoc Network (MANET)”, Vol.2, Issue: 4, ISSN: 2278- 3075 (2013).
[18] H. k. Paramjit singh, “Review of Various MANET Protocols,” International Journal of Electrical and Electronics Engineers (IJEEE), vol. 7, pp. 318 – 329, 2015.
[19] Umesh Kumar Singh and Kailash Phuleria, “An analysis of Security Attacks found in Mobile Ad-hoc Network”, in proc. Of International Journal of Advanced Research in Computer Science, Volume 5, No. 5, May-June 2014.
[20] Priyanka Goyal, Vinti Parmar and Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application”, in proc. Of IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
[21] A Mishra and K.M Nadkarni, security in wireless Ad - hoc network, in Book. The Hand book of Ad Hoc Wireless Networks (chapter 30), CRC press LLC, 2003.
[22] Sampada Ganesh Daley and Taha Ansari, “Mobile Ad-Hoc Networks Its Advantages and Challenges”, in proc. Of International Journal of Electrical and Electronics Research, Vol. 3, Issue 2, pp: (491-496), Month: April - June 2015.
[23] HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,ǁ, Pg. 38-47, Vol 11, issue 1, Feb 2004.
[24] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.), year-2006 Springer, pp. 1-38.
[25] Sevil Şen, Joh n A. Clark, Ju an E. Tapiad or, “Security Threats in Mobile Ad Hoc Networks”, Department of Computer Science, University of York, YO10 5DD, UK, pp.1-22.
[26] Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal, “Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)”, International Journal of Computer Applications (0975 – 8887) Volume 68– No.4, pp.25-29, April 2013.
[27] X.Zhao, Z. You, Z. Zhao, D. Chen, and F. Peng, “Availability Based Trust Model of Clusters for MANET,” presented at the 7th International Conference on Service Systems and Service Management (ICSSSM), 2011.
[28] Zhang Y., Lee W. (2005) Security in Mobile Ad-Hoc Networks. In: Mohapatra P., Krishnamurthy S.V. (eds) Ad Hoc Networks. Springer, Boston, MA.
[29] Jin-Hee Cho and Ing-Ray Chen “A Survey on Trust Management for Mobile Ad-Hoc Networks” IEEE Communications Surveys & Tutorials, Vol.13, No. 4, (2011, Oct).
[30] N.Dixit, S. Agrawal, and V. K. Singh, "A Proposed Solution for security Issues In MANETs," International Journal of Engineering Research & Technology(IJERT), vol. 2, 2013.
[31] P. Goyal, S. Batra and A. singh, “A Literature Review of Security Attack in Mobile Ad-hoc Networks”, in proc. Of International Journal of Computer Applications (0975 – 8887) Volume 9– No.12, November 2010.
[32] Latha Tamilselvan, Dr. V. Sankaranarayanan “Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks” IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.3, March 2007.
[33] Y. Hu, A. Perrig and D. Johnson, Ariadne: A, “Secure On-demand Routing Protocol forAd hoc Networks”, in Proceedings of ACM, MOBICOM’02, 2002.
[34] Vaithiyanathan, S. R. Gracelin, E. N. Edna, and S. Radha, "A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm," presented at the International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), 2010
[35] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. “A survey of routing attacks in mobile ad hoc networks” Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
[36] V.P.and R. P. Goyal, "MANET: Vulnerabilities, Challenges, Attacks, Application," IJCEM International journal of Computational Engineering & management, vol. 11, 2011.
[37] J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Wireless Telecommunications Symposium (WTS), 2012
[38] J.Su and H. Liu, “Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network,” Applied Informatics and Communication Communications in Computer and Information Science, vol. 224, pp. 233-240, 2011.
[39] H.Yang, X. Meng, S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,” ACM WiSe, 2002.
[40] Jyoti Thalor, Ms.Monika, “Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks,” A Review, International Journal of Advanced Research in Computer Science and Software Engineering.
[41] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-demand Secure Routing Protocol Resilient to Byzantine Failures,” Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
[42] A.K.Rai, R. R. Tewari, and S. K. Upadhyay, “different type of attacks on integrated MANET- internet comunication,” international jornal of computer science and security (IJCSS), vol. 4.
[43] C. Adjih, D. Raffo, and P. Muhlethaler, “Attacks against OLSR: Distributed Key Management for Security”, 2nd OLSR Interop/Wksp., Palaiseau, France, July 28–29, 2005.
[44] D.Sharma, P. G. Shah, and X. Huang, "Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key”
[45] P. Yi et al., “A New Routing Attack in Mobile Ad Hoc Networks”, Int’l. J. Info. Tech., vol. 11, no. 2, 2005.
Citation
Swati Agarwal, Rupinder Kaur, Tushar Agarwal, "MANET Expansion Security Challenges Attacks and Intriguing future Trends," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.906-915, 2018.
Pattern Recognition of Iris flower using Neural Network based Particle Swarm Optimization
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.916-920, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.916920
Abstract
In machine learning, classification is a technique to identify the category to which an observation belongs, based on a labeled training data. It is a task of approximating a mapping function from input variables to discrete output variables. Pattern classification delivers this approximation by automatically discovering the regularities in the data using learning algorithms. It is an important sub-topic of machine learning with interesting applications like speech recognition and classification of rocks. In this paper, propose a hybrid approach Artificial Neural Network with Particle Swarm Optimization (ANNPSO) algorithm for pattern recognition. The ANNPSO works under the two main principles, first the error is calculated by using artificial neural network and second, error is optimized using Particle swarm optimization algorithms. Model tested on well known standard pattern IRIS flower dataset. Performance of presented model is evaluated with five-fold cross validation which produces 99.33% testing accuracy. Experimental results are superior than the existing ones. Therefore, ANNPSO provides better testing results in Iris pattern classification problems.
Key-Words / Index Term
Artificial Neural Network, Pattern Classification, Particle Swarm Optimization
References
[1] Kennedy James and Eberhart, Russell, “Particle swarm Optimizat-
ion”, in Proceedings of IEEE International Conference on Neural Networks, Volume 4,pp. 1942 -1948, 1995.
[2] R. A. Fisher, “The use of multiple measurements in taxonomic problems”, Annals of Eugenics, Volume 7 (2), pp.179-188, 1936.
[3] V. Borovinskiy, “Classification of Iris data set”, University of Ljubljana, Ljubljana, 2009.
[4] H. Chang and A. Astolfi, “Gaussian Based classification with application of the iris dataset”, In Proceedings of the 18th World Congress The International Federation of Automatic Control Milano (Italy) August 28 - September 2, 2011.
[5] V. Kumar and N. Rathee, “Knowledge discovery from database Using an integration of clustering and classification”, International Journal of Advanced Computer Science and Application, Volume 2, No.3,pp. 29-33, 2011.
[6] D. Dutta, A. Roy and K. Choudhury, “Trainning Aritificial Neural Network using Particle swarm Optimization Algorithms”, IJARCSSE , volume 3, Issue 3, pp. 430-434, 2013.
[7] S. Vyas 1 and D. Upadhyay, “Identification of Iris Plant Using Feed Forward Neural Network On The Basis Of Floral Dimensions”, IJIRSET, Volume 3, Issue 12, pp. 18200 - 18204 2014.
[8] Shashidhar T. Halakatti and Shambulinga T. Halakatti, “Identification Of Iris Flower Species Using Machine Learning”, International Journal of Computer Science, Volume 5, Issue 8, pp. 59-69, 2017.
[9] K. H. Wandra1 and L.P. Gagnani, “Classification Techniques in WEKA: A Review”, International Journal of Computer Sciences and Engineering,Volume 5, Issue 8, pp. 49-52, 2017.
[10] Mohan P.M, Paul N. K, Prakash M., Praveen K. D and Chidambaram S, “Comparative Evaluation of Various Techniques for Fisher’s Iris Classification”, International Journal of Innovative Research in Science, Engineering and Technology, Volume 7, Issue 1, pp. 198-202, 2018.
[11] D. E. Rumelhart, G. E. Hinton, and R. J. Williams, “Learning internal representations by error propagation”, in Parallel Distributed Processing: Explorations in the Microstructure of Cognition, Vol. 1, D. E. Rumelhart, J. L. McClelland, and PDP Research Group, Eds., pp. 318–362, MIT Press, Cambridge, Mass, USA, 1986.
[12] R C, Eberhart and Kennedy, James, “A New Optimizer Using Particle Swarm Theory”, MHS`95. Proc. Sixth Int. Symp. Micro Mach. Hum. Sci., pp.39 - 43, 1995.
Citation
D. T. Mane, U. V. Kulkarni, "Pattern Recognition of Iris flower using Neural Network based Particle Swarm Optimization," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.916-920, 2018.
An Empirical study on Massive Open Online Courses(MOOCs)
Survey Paper | Journal Paper
Vol.6 , Issue.5 , pp.921-925, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.921925
Abstract
The term Massive Open Online Courses (MOOCs) have drawn a lot of attention from various institutions across the world. There is an immense amount of idealism and altruism in the words of drivers who are making the MOOC movement. It is perhaps the most versatile form of educating interested learners because of its openness and availability. Over the recent years, it has brought upon a very innovative way of learning and made Technology Enhanced Learning (TEL) effective. An encouragement has been brought upon the elite universities in setting up learning platforms like the edX, Coursera, Udactity and various others. In other words, the data being collected through this learning platform can be used to retrieve useful information and henceforth be used to help students on having improvements academically. It is therefore crucial for modern learners to understand the concept of MOOCs. This empirical study has been carried out to give insights about what MOOCs actually is. The history, the motivation behind the development of this style of education, the different forms of MOOCs and some of the major challenges which the designers are still struggling to overcome have been identified and discussed in this paper.
Key-Words / Index Term
Massive Open Online Courses (MOOCs), Technology Enhanced Learning (TEL), e-assignment, Higher Education (HE), peer assessment, Open Educational Resources (OER)
References
[1] Thanasis Daradoumis, Roxana Bassi “A review on massive e-learning (MOOC) design, delivery and assessment”, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[2] Rebecca Griffiths “MOOCs in the classroom”.
[3] Ahmed Mohamed Fahmy Yousef, Marold Wosnitza “What Drives a Successful MOOC? An Empirical Examination of Criteria to Assure Design Quality of MOOCs” 2014 IEEE 14th International Conference on Advanced Learning Technologies.
[4] Fiona M. Hollands, Teacher’s college, Columbia University “Why do institutions offer MOOCs?”
[5] “MOOCs and Open Education: Implications for Higher Education”, Li Yuan, Stephen Powell.
[6] Judy kay, Peter, Elliot, Bob, University of Sidney, “MOOCs: So Many Learners, So Much Potential”.
[7] “A reference model for Learning Analytics”, M.A.Chatti, A.L. Dyckhoff, International Journal of Technology Enhanced Learning Analytics (IJTEL).
[8] “MOOCs and Quality: A Review of the Recent Literature”, July 2015, Dr. Sarah Hayes.
[9] Student-participation data from the inaugural MITx (now edX) course—6.002x: Circuits and Electronics—unpacks MOOC student behavior, by Daniel T. Seaton, Yoav Bergner, Isaac Chuang,Piotr Mitros, and David E. Pritchard.
[10] “A Reference Model for Learning Analytics”, M.A. Chatti, A.L. Dyckhoff, U. Schroeder, and H. Thüs.
[11] Ahmed Mohamed Fahmy Yousef1, Mohamed Amine Chatti1, Ulrik Schroeder1Marold Wosnitza2 and Harald Jakobs3, “A Review of the State-of-the-Art” MOOCs.
[12] “Studying Learning in the Worldwide Classroom Research into edX’s First MOOC”, Lori Breslow, Ph.D. Massachusetts Institute of Technology, David E. Pritchard, Ph.D. Massachusetts Institute of Technology
http://www.rpajournal.com/studying-learning-in-the-worldwide-classroom-research-into-edxs-first-mooc/.
[13] Jeffrey A. Greene, Christopher A. Oswald, Jeffrey Pomerantz, University of North Carolina at Chapel Hill “Predictors of Retention and Achievement in a Massive Open Online Course” American Educational Research Journal.
[14] “Who does what in a massive open online course?” Seaton, Daniel T.; Bergner, Yoav; Chuang, Isaac et al. Communications of the ACM 57, 4 (April 2014).
Citation
Ganeshayya Shidaganti, Alex Loukham, Prakash S., "An Empirical study on Massive Open Online Courses(MOOCs)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.921-925, 2018.
Mathematical Model to Predict the Soil Macronutrients Status under the Influence of Phosphorus and Manure for Continuous Cropping System
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.926-933, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.926933
Abstract
— In the present work we studied, how phosphorus fertilizer and manure affect the soil status of other macronutrients like nitrogen and potassium using mathematical model. By knowing the status of nutrients availability, a producer can manage things and get high crop yield. The model was applied to five fertilizer practices of a two year field experiment entitled “Integrated nutrient management in blackgram”, conducted in Rajasthan College of Agriculture, Udaipur, Rajasthan, India.
Key-Words / Index Term
Phosphorus, mathematical model, macronutrients, nitrogen soil status, potassium soil status
References
[1]. R. Burt, J. Chataway, J. Cotter, B. D. Vrillon, G. Debailleul, A. Grundyet, Agriculture at a Crossroads. International Assessment of Agricultural Knowledge, Science and Technology for Development. Island Press, Washington, DC, pp. 20–78, 2009.
[2]. M.C. Martinez-Ballestra, L. Lopez-Perez, M. Hernandez, C. Lopez- Berenguer, N. Fernandez-Garcia, M. Carvajal, “Agricultural practices for enhanced human health”, Phytochem. Rev, Vol. 7, pp.251–260, 2008.
[3]. V. Shukla and L.B. Nalk, “Agro-Technique for Malvaceae Vegetables. In: Ifovance in Horticulture”, Malhotra Publishing House, New Delhi, India, pp.399-425, 1993.
[4]. A.S. Umar, M. Iqbal, “Nitrate accumulation in plants, factors affecting the process, and human health implications: a review”, Agron. Sustainable Dev, Vol. 27, pp.45–57, 2006.
[5]. P. Santamaria, “Nitrate in vegetables: toxicity, content, intake and EC regulation”. Journal of the Science of food and Agriculture, Vol. 86 (1), pp. 10–17, 2006.
[6]. L. Marton, “Climate change and NPK and Mg fertilization effects analysis at Tisza-river basin in a long term field experiment”, Szent István University, pp: 21, 2001.
[7]. A. Kovats, L. Marton and L. Szabo, “Analysis of the relation between humus and pH on the ground of results of soil investigations on farm-scale plots”, Plant Prod., Vol.34, pp.507-512, 1985.
[8]. F.M. Kihanda, “The role of farmyard manure in improvement of maize production in the sub-humid highlands of central Kenya”, Ph.D Thesis, Reading University, United Kingdom, 1996.
[9]. J.A. Adepetu, and R.B. Corey, “Organic phosphorus as a predictor of plant-available phosphorus in soils of southern Nigeria”, Soil Sci., Vol. 122, pp.159-164, 1976.
[10]. M. Abitwe and K. Kibret, “Effect of Bradyrhizobium japonicm, Nitrogen and phosphorus Fertilizers on growth, nodulation, yield and yield components of soybean at Pawe Northwestern Ethiopia”, World journal of agricultural science, Vol. 13(1), pp.53-62, 2017.
[11]. A. A. M. Mohsen and M. K. Abdel-Fattah, “Effect of Different Levels of Nitrogen and Phosphorus Fertilizer in Combination with Botanical Compost on Growth and Yield of Okra (Abelmoschus esculentus L.) under Sandy Soil Conditions in Egypt”, Asian Journal of Agricultural Research, Vol.9 (5), pp.249-258, 2015.
[12]. A. Elgharably , “Wheat response to combined application of nitrogen and phosphorus in a saline sandy loam soil”, Soil Science and Plant Nutrition, Vol. 57, pp.396—402, 2011.
[13]. T. Tana and M. Woldesenbet, “Effect of Combined Application of Organic and Mineral Nitrogen and Phosphorus Fertilizer on Soil Physico-chemical Properties and Grain Yield of Food Barley (Hordeum vulgare L.) in Kaffa Zone, South-western Ethiopia”, Momona Ethiopian Journal of Science, Vol. 9(2), pp.242-261, 2017.
[14]. M. Waseem, A. Ali, M . Tahir, and K. Mehmood, “Mitigative effect of diverse use of nitrogen sources on bulk density, organic matter and grain yield of hybrid maize”, Pakistan Journal of Animal and Plant Sciences, Vol. 23(3), pp.900-905, 2013.
[15]. D. S. Rathore, Integrated nutrient management in blackgram, doctoral diss., Maharana pratap university of agriculture and technology, Udaipur, India, 2008.
[16]. M . Dejene, and M. Lemlem, “Integrated agronomic crop managements to improve tef productivity under terminal drought”, Water Stress, In Technology Open Science, pp. 235- 254, 2012.
[17]. A. Efthimiadou, D. Bilalis, Karkanis and B. Froud, “Combined organic and inorganic fertilization enhances soil quality and increased yield, photosynthesis and sustainability of sweet maize crop”, Australian Journal of Crop Science, Vol.4 (9), pp.722-729, 2010.
[18]. M. khajanchi, R. Sharma and R. Sharma, “A mathematical model to predict soil phosphorus status under varying fertilizer practices and its residual effects on soil phosphorus status for another continuous crop”, International journal of advance research in science and engineering Vol.6(12), pp. 928-937, 2017.
[19]. R. W. Leggett and L. R. Williams, “A Reliability Index for Models”, Ecological Modelling, Vol. 13, 303-312, 1981.
Citation
M. Khajanchi, R. Sharma, U. Pancholi, "Mathematical Model to Predict the Soil Macronutrients Status under the Influence of Phosphorus and Manure for Continuous Cropping System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.926-933, 2018.
Cluster and Grid Computing: A Detailed Comparison
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.934-940, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.934940
Abstract
Computing power has gained momentum in the last few years with the incorporation of cluster and grid computing models. With supercomputers, some issues need to be tackled in terms of solving the intensive computational problem tasks in an economical way. Even high performance computing but with low cost was not possible earlier with supercomputers but with the advent of cluster and grid computing technologies it is no more restricted to the multi-institutional virtual organizations but becomes a reality for the small scale organizations also. This paper discusses the cluster and grid computing technologies, and gives an insight details in terms of vital features of clusters and grids, challenges, applications, tools and simulation environment for their implementation and comparative analysis of the same.
Key-Words / Index Term
Cluster computing, Grid computing, Computational grid, Data grid, Scavenging grid, Nimrod, Globus, Condor
References
[1] N. Sadashiv, S. M. D. Kumar, “Cluster, Grid and Cloud Computing: A Detailed Comparison”, In the Proceedings of 2011 The 6th International Conference on Computer Science & Education (ICSSE 2011), Singapore, pp. 477-482, 2011.
[2] S. M. Hashemi, A. K. Bardsiri, “Cloud Computing Vs. Grid Computing”, ARPN Journal of Systems and Software, Vol. 2 No. 5, pp. 188-194, 2012.
[3] I. Nwobodo, “Cloud Computing: A Detailed Relationship to Grid and Cluster Computing”, International Journal of Future Computer and Communication, Vol. 4, No. 2, pp. 82-87, 2015.
[4] S. K. Singh, K. Kaur, A. Aggarwal, D. Verma, “ Achieving High Performance Distributed System: Using Grid, Cluster and Cloud Computing”, International Journal of Engineering Research and Applications, Vol. 5, No. 2, pp. 59-67, 2015.
[5] R. Geetha, D. Ramyachitra, “Security Issues in Grid Computing”, In the Proceedings of 2013 International Conference on Research Trends in Computer Technologies ( ICRTCT-2013) , pp. 33-37, 2013
[6] K. Kaur, A. K. Rai, “ A Comparative Analysis: Grid, Cluster and Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 3, pp.5730-5734, 2014.
[7] P. Samimi, A. Patel, “A Review of Pricing Models for Grid & Cloud Computing”, In the Symposium of 2011 IEEE Symposium on Computers & Informatics, pp. 634-639, 2011.
[8] P. Sharma, “Grid Computing Vs. Cloud Computing” International Journal of Information and Computation Technology, Vol. 3, No. 6, pp. 577-582, 2013.
[9] R. Kumar, S. Charu, “Comparison between Cloud Computing, Grid Computing, Cluster Computing and Virtualization”, International Journal of Modern Computer Science and Applications (IJMCSA), Vol. 3, No. 1,pp. 42-47, 2015.
Citation
A. Ahuja, "Cluster and Grid Computing: A Detailed Comparison," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.934-940, 2018.
An Analysis of Applications, Challenges and Security Attacks in MANET
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.941-947, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.941947
Abstract
Mobile ad-hoc networks (MANETs) are the independent collection of devices connected without the usage of manipulates base station or gets admission to factors. Mobile ad-hoc network includes a group of nodes outfitted with wireless interfaces, which are ready to communicate among themselves within the elimination of network infrastructure. In MANETs, nodes can operate records immediately with every different and every node perform like a router. As compared with stressed out networks. MANETs are greater defenseless because of safety attacks attributable to an infrastructure much less community. Presenting the protection measures has changed into a critical part in MANETs. This paper presents an impression of MANETs with various applications, plenty of attacks and demanding situations.
Key-Words / Index Term
MANETs, Defenceless,Router, Attacks,Infrastructure less network
References
[1] Vishnu BalanE,PriyanMK,GokulnathC, Prof.Usha Devi G,”Fuzzy Based Intrusion Detection Systems in MANET,” Elsevier, Vol.50, pp.109-114, 2015.
[2] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang,Han-ChiehChao,andChin-FengLai, “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach,” IEEE Systems Journal,Vol.9, pp.65-75,2015.
[3] C.Chang,Y.Wang, and H.Chao, “An efficient Mesh-based core multicast routing protocol on MANETs,”InternetTechnology.,Vol.8, pp.229–239, 2007.
[4] SarikaSa,PravinAb,VijayakumarAc, SelvamaniKd,” Security Issues In Mobile Ad Hoc Networks,” 2nd InternationalConference on Intelligent Computing,Communication&Convergence,Vol.94, pp.329 –335,2016.
[5] Amitabh Mishraand Ketan M. Nadkarni, “Security inWirelessAdHocNetworks”, in Book The Handbook ofAdHocWirelessNetworks (Chapter30), CRCPress LLC,2003
[6] Sk. HeenaKauser, P. Anil Kumar, “MANET: Services, Parameters,Applications, Attacks&Challenges,” IJSRSET,Vol.2, Print Online ISSN:2394-4099.2016, 2016.
[7] JSandeepa,JSatheeshKumarb1,”Efficient Packet Transmission and Energy Optimization in Military Operation Scenarios of MANET,”Elsevier,Vol.47, pp.400– 407,2015.
[8] Meenakshi Tripathi,M.S.Gaur,V.Laxmi,”Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN,”The 8th International Symposium on Intelligent Systems Techniques for AdHoc and Wireless Sensor Networks (IST- AWSN),Vol.19, pp.1101–1107,2013.
[9] Mr.VikasKumar,Mr.AmitTyagi, Mr.Amit Kumar,“Mobile Ad-hocNetwork:Characteristics, Applications, Security Issues,Challenges and Attacks”,,International JournalofAdvanced Research inComputer Science and Software Engineering,Vol.5, pp.258-262,2015.
[10] SonuKumar,AdityaSoni,RaviKumar,”Remote Patient Monitoring and MANET:Applications and Challenges,”InternationalJournal on Recent and Innovation TrendsinComputing and Communication, Vol. 3 , pp.4275-4283,2015.
[11] C Ramakristanaiah R.PraveenSam,”A SurveyonMANETs inDisasterRescue Operations,” International JournalofScienceand Research (IJSR) ,Vol.4, ISSN(Online): 2319-7064,2015.
[12] Aftab,M.U.,Nisar,A.,Asif,D.,Ashraf,A.andGill,B.”RBAC Architecture Design Issues in Institutions Collaborative Environment,”.InternationalJournalofComputer Science,Vol.10 ,pp.216-221,2013.
[13] Aftab, M.U., Habib, M.A., Mehmood, N., Aslam, M. and Irfan, M. ,” Attributed Role Based Access Control Model,” IEEE Conference on Information Assurance and Cyber Security(CIACS),pp.83-89.,2015.
[14] Goyal, P.,Parmar,V.andRishi,R ,”Manet: Vulnerabilities, Challenges, Attacks, Application,”International Journalof Computational Engineering &Management, Vol.11, pp.32-37,2011.
[15] Hao Yang, HaiyunLuo, Fan Ye, Songwu Lu, And Lixia Zhang,” Security In Mobile Ad Hoc Networks: Challenges And Solutions “IEEE Wireless Communications ,ISSN.1536-1284, 2004.
[16] HongqiangZhai and Yuguang Fang “A Solution To Hidden Terminal Problem Over A Single Channel In Wireless Ad Hoc Networks”IEEE , ISSN. 2155-7578 ,2007.
[17] G. S. Mamatha, Dr. S. C. Sharma, “Analyzing The Manet Variations, Challenges, Capacity And Protocol Issues” International Journal Of Computer Science & Engineering Survey (IJCSES) Vol.1, pp.14-21,2010.
[18] Lei Chen, and Wendi B. Heinzelman,”QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks” IEEE Journal On Selected Areas In Communications, Vol.23, 2005.
[19] Naeem Raza, Muhammad Umar Aftab, Muhammad Qasim Akbar, Omair Ashraf, Muhammad Irfan, “Mobile Ad-Hoc Networks Applications and Its Challenges” Communications and Network, Scientific Research Publishing ,pp.131-136,2016.
[20] Dr.Nabeel Zanoon1, Dr.Nashat Albdour2, Dr.Hatem S. A. Hamatta1, and RashaMoh`d Al- Tarawneh1, “Security Challenges As A Factor Affecting The Security Of Manet: Attacks, And Security Solutions”, International Journal of Network Security & Its Applications (IJNSA) Vol.7, pp. 1-13,2015.
[21] T.Navaneethan,M.Lalli,”Security Attacks in Mobile Ad-hoc Networks–A Literature Survey”, International Journal of Computer Science and Mobile Applications,Vol.2 , pg.1-7,2014.
[22] AbhayKumarRai ,Rajiv Ranjan Tewari.Saurabh Kant Upadhyay,”Different Types of Attacks on Integrated MANET- Internet Communication,” International Journal of Computer Science and Security (IJCSS)Vol.4, pp.265-274.
[23] Ashish kumarkhare, , Dr. R. C. Jain, Dr. J. L. Rana,”A Review: Trust, Attacks And Security Challenges In Manet” Informatics Engineering, an International Journal (IEIJ), Vol.3, pp.293-298,2015.
[24] Manjeet Singh, Gaganpreet Kaur,”A Surveys of Attacks in MANET” International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, pp.1631-1636, 2013.
[25] Gagandeep, Aashima, Pawan Kumar,“Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review,”,International Journal of Engineering and Advanced Technology (IJEAT) ,Vol.1.pp.269-275, 2012.
[26] Ms.Supriya and Mrs.Manju Khari,“Manet Security Breaches :Threattoa Secure communication Platform”, International Journal on AdHoc Networking Systems (IJANS), Vol.2, pp.45-51, 2012.
[27] Aarti Chauhan,PuneetRani.“A Detail Review of Routing Attacks in Mobile AdHoc Networks”, International Journal of Engineering Research and General Science,Vol.3, pp.1154-1163, 2015.
[28] B.Awerbuch, D.Holmer,C.Nita Rotaru and Herbert Rubens,“An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,”Proceedings of the ACM Workshop on Wireless Security , ISBN:1-58113-585-8 , pp.21-30, 2002.
[29] M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamuralidhar, JaydipSen,”A mechanism for detection of Gray Hole Attack in Mobile Ad Hoc Networks,” ICICS ,IEEE , ISBN:1-4244-0983-7, 2007.
[30] Vishnu K, Amos J Paul, ”Detection and Removal of Cooperative Black/Gray hole attack in Mobile ADHOC Networks,” International Journal of computer Application ,Vol.1, pp.38-42, 2010.
[31] Bing Wu, Jianmin Chen, Jie Wu, MihaelaCardei, “A Survey on Attacks and Counter measures in Mobile Ad Hoc Networks”, Wireless/Mobile Network Security, Springer , pp.104-109, 2006.
[32] Pradip M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S.Ali, Prof. J.S. Deshpande,” A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology ,Vol. 2(9), pp.4063-4071,2010.
[33] Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala,” DoS Attacks in Mobile Ad-hoc Networks: A Survey”, IEEE Second International Conference on Advanced Computing & Communication Technologies, pp.535-541, 2012.
[34] L.Zhouand Z.J. Haas, “Securing AdHoc Networks,”.IEEE Network Magazine, Vol.13, pp.24-30,1999.
[35] Ping Yi, YipingZhong, ShiYong Zhang,” Resisting Flooding Attacks in ad hoc Networks” IEEE International Conference on Information Technology: Coding and Computing (ITCC’05) ,ISBN:0-7695-2315-3, 2005.
[36] K. Geetha1 • N. Sreenath2,”Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol” springer , Vol.41, pp.1161-1172,2016.
[37] A.Janani, A.Sivasubramanian "Survey of Packet Dropping Attacks in MANET "Indian Journal of Computer Science and Engineering (IJCSE), Vol. 5, pp.26-31, 2014.
Citation
G. Sabeena Gnanaselvi, T.V.Ananthan, "An Analysis of Applications, Challenges and Security Attacks in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.941-947, 2018.
IoT-Future Smart Systems
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.948-952, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.948952
Abstract
IoT (Internet of Things) is the advanced concept of ICT (Information Communication Technology), connected network of physical objects-devices, vehicles, buildings, machines and sensors. Controlling of remote objects across the distributed network infrastructure and sensing them is done by Internet of Things in which all devices and services in collaboration reduce human involvement for better human life. The Internet of Things (IoT) is the result of integration of fragmented complex technologies to meet the social, economic and business challenges. The Internet revolution has given new approach to business to-consumer (B2C) industries such as media, retail and financial services. In the coming 10 years, the Internet of Things revolution will facilitate and change manufacturing, energy, agriculture, transportation and other industrial sectors to transform how people will work through new interactions between humans and machines. This technological change will bring exceptional opportunities, along with new risks, to business and society.
Key-Words / Index Term
IoT Sensors, Actuators, Smart systems, Intelligent Systems, Hyper connected society
References
[1] Gauer, A. “Smart city Architecture and its applications based on IoT”, Procedia computer science, (2015), Vol.52, pp.1089-1094.
[2] Irfan shaqiri, “Wireless Sensors for Healthcare”. International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013, ISSN 2229-5518
[3] Sapandeep Kaur, Ikvinderpal Singh, “A Survey Report on Internet of Things Applications”, International Journal of Computer Science Trends and Technology Volume 4, Issue 2, Mar - Apr 2016.
[4] Vishwajeet H. Bhide, “A Survey on the Smart Homes using Internet of Things (IoT)”, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 12, December 2014
[5] S.D.T. Kelly, N.K. Suryadevara, S.C. Mukhopadhyay, “Towards the Implementation of IoT for Environmental Condition Monitoring in Homes”, IEEE, Vol. 13, pp. 3846-3853, 2013.
[6] J. Stankovic, “A Vision of a Smart City in the Future”, Smart Cities, Vol. 1, Issue 10, Oct. 2013.
[7] Sarita A., Manik L. D.: Internet of Things – A Paradigm Shift of Future Internet Applications. Institute of technology Nirma University, 1--7 (2011)
[8] https://en.wikipedia.org/wiki/Internet_of_Things, May 3 (2018).
Citation
Simple Batra, "IoT-Future Smart Systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.948-952, 2018.