An Automated Power Conservation System (APCS) using Particle Photon and Smartphone
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.983-990, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.983990
Abstract
Nowadays, people use electricity in all aspects of their lives so that electricity consumption increases gradually. There can be wastage of electricity due to various reasons, such as human negligence, daylighting, etc. Hence, conservation of energy is the need of the day. This paper deals with the fabrication of an "Automated Power Conservation System (APCS)" that has multiple benefits like saving on power consumption there by saving on electricity bills of the organization, eliminating human involvement and manpower which is often required to manually toggle the lights and electrical devices on/off, and last but most importantly conserve the precious natural resources by reducing electrical energy consumption. Two IR sensors are used in this project and these two sensors are used for detecting the presence of a person in the classroom. When the existence of the person is detected by the APCS it automatically turns on the fans and lights in that classroom and during the absence they will be automatically turned off, thus paving the easiest way to conserve power. This hardware is integrated with the Android app, where the user can get data on his smartphone regarding the number of fans and lights that are turned on at a particular instance of time. The user can also switch on/off the fans and lights from anywhere in the world by using the Android App.
Key-Words / Index Term
Internet of Things, Particle Photon, Android App, Thingspeak, Automated Power Conservation System
References
[1] R. K. Kodali, V. Jain, S. Bose, and L. Boppana, “IoT Based Smart Security and Home Automation System,” pp. 1286–1289, 2016.
[2] R. L. Kumar Mandula, Ramu Parupalli, CH.A.S.Murty, E.Magesh, “Mobile-based Horne Automation using the Internet of Things (IoT),” pp. 340–343, 2015.
[3] V. Patchava, H. B. Kandala, and P. R. Babu, “A Smart Home Automation technique with Raspberry Pi using IoT,” 2015 Int. Conf. Smart Sensors Syst. IC-SSS 2015, pp. 3–6, 2017.
[4] H. S. Raju and S. Shenoy, “Real-time remote monitoring and operation of industrial devices using IoT and cloud,” Proc. 2016 2nd Int. Conf. Contemp. Comput. Informatics, IC3I 2016, pp. 324–329, 2016.
[5] B. Jadhav and S. C. Patil, “Wireless Home monitoring using Social Internet of Things (SIoT),” Int. Conf. Autom. Control Dyn. Optim. Tech. ICACDOT 2016, pp. 925–929, 2017.
[6] D. Pavithra and R. Balakrishnan, “IoT based monitoring and control system for home automation,” Glob. Conf. Commun. Technol. GCCT 2015, no. Gcct, pp. 169–173, 2015.
[7] D. Tejani, A. M. A. H. Al-Kuwari, and V. Potdar, “Energy conservation in a smart home,” IEEE Int. Conf. Digit. Ecosyst. Technol., no. May 2011, pp. 241–246, 2011.
[8] D. K. Sharma, “Smart System : loT for University,” pp. 1586–1593.
[9] A. I. Abdul-Rahman and C. A. Graves, “Internet of things application using tethered MSP430 to Thingspeak cloud,” Proc. - 2016 IEEE Symp. Serv. Syst. Eng. SOSE 2016, pp. 352–357, 2016.
Citation
Chandra Sekhar Sanaboina, Harish Bommidi, "An Automated Power Conservation System (APCS) using Particle Photon and Smartphone," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.983-990, 2018.
Transgression of WCAG 2.0 Constraint in Indian Government Websites
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.991-996, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.991996
Abstract
Sites of Indian Government fills in as a medium of transmission of Information. Along these lines, the sites of government organizations ought to be available to all. Since, an ordinary individual can get to the sites effortlessly however a man with incapacity (PwD) who might be outwardly disabled couldn`t get to the sites effectively. This is the way Web availability came into picture. Ordinariness of WCAG 2.0 rules by site pages is a noteworthy factor in estimating the availability of sites all around. The principle point of this investigation is to decide if the general population with inabilities can access and utilize State Government sites in India effortlessly or not. By utilizing web availability assessment instrument namely Power Mapped Sort Site, we have assessed 10 sites of Indian Government and gave the after effects of examination in this paper. Likewise, we came to a resolution where dominant part of the sites doesn’t meet the necessities WCAG 2.0. In this paper we have recognized and examined the most damaged WCAG. Our exploration may bring issues to light to the web engineer about these encroachments and urge them to manufacture sites that can wind up available to all.
Key-Words / Index Term
WebAccessibility, Government Websites, PwD, WCAG, PowerMapper
References
[1] Yakup AKGÜL,“The most violated WCAG 1.0 guidelines by the developers of university websites in Turkey.” 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) (2017): 1-7.
[2] Sergio Luján Mora, “Web accessibility among the countries of the European union: a comparative study”, Actual problems of Computer Science, vol. 1, no 3, pp. 18-27, 2013.
[3] Abid Ismail, K. S. Kuppusamy, “Accessibility Analysis of North Eastern India Region Websites for Persons with Disabilities” in ICADW, 2016.
[4] Introduction to Web Accessibility [Online]. Available: https://www.w3.org/WAI/fundamentals/accessibility-intro/
[5] Abid Ismail, K.S. Kuppusami, “Accessibility of Indian Universities’ homepages: An exploratory study [Online]. Available: https://doi.org/10.1016/j.jksuci.2016.06.006
[6] Accessible India Campaign [Online]. Available:http://pib.nic.in/newsite/printrelease.aspx?relid=159009
[7] National Policy on Universal Electronic Accessibility [Online]. Available: http://pib.nic.in/newsite/PrintRelease.aspx?relid=99845
[8] The Rights of Person with Disability Act, 2016 [Online].Available: http://www.disabilityaffairs.gov.in/upload/uploadfiles/files/RPWD%20ACT%202016.pdf
[9]Web Accessibility Evaluation Tool list [Online]. Available: https://www.w3.org/WAI/ER/tools/
[10] Power Mapped Sort Site [Online]. Available: https://www.powermapper.com/products/sortsite/
[11] Accessibility Testing Tools and Techniques [Online]. Available: https://www.3pillarglobal.com/insights/accessibility-testing-tools-and-techniques?cn-reloaded=1&cn-reloaded=1
Citation
Ashok Koujalagi, "Transgression of WCAG 2.0 Constraint in Indian Government Websites," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.991-996, 2018.
Multilevel Multi-Hop Technique for more than one Forward Node to increase the Stability of Wireless Body Sensor Networks
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.997-1000, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.9971000
Abstract
As wireless body area network is used to keep watch on patient body by deploying nodes on human body, in this work we propose a heterogeneous model to enhance the network lifetime by minimizing path loss, low power consumption, increase throughput and dividing the load through the nodes with more than one forwarder node in each round. The selection of the forwarder nodes is based on cost equation having minimum distance from the sink and maximum energy. Which helps in having high stability and contribute high packet delivering to the sink.
Key-Words / Index Term
Wireless Body Area Network, Forwarder Node, Residual Energy, Cost Function
References
[1] Q. Nadeem et et al, “SIMPLE: Stable increased throughput- multihop protocol for link efficiency in wireless body area networks”, vol1, 2013.
[2] Professor Guang-Zhong Yang, “Body Sensor Networks –Research Challenges and Applications” Imperial College London.
[3] Yiming, Fan, and Yu Jianjun."The communication protocol for wireless sensor network about LEACH." Computational Intelligence and Security Workshops, International Conference on. IEEE ,2007.
[4] Karthick .K et al, ” An Energy-Saving Routing Algorithm for Wireless Body Sensor Network using Data Compression Technique”, ijca-2015.
[5] Shakshi Mehta et al “ Improved Multi-Hop Routing Protocol in Wireless Body Area Networks “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7, July 2015.
[6] Jung, W. S., Lim, K. W., Ko, Y. B., & Park, S. J. “A hybrid approach for clustering-based data aggregation in wireless sensor networks”, In Digital Society,. ICDS`09. IEEE, Third International Conference on (pp. 112-117), 2009.
[7] Muhammad Nasir Khan* and Mohsin Jamil,” Performance Improvement in Lifetime and Throughput of LEACH”, ijst 2016.
[8] Satyajeet R. Shinge, “Increase the Lifetime of Wireless Sensor Network using Clustering and Compression”, ijca-2015.
[9] Aslam, M., Nadeem Javaid, A. Rahim, U. Nazir, Ayesha Bibi, and Z. A. Khan. "Survey of extended LEACH-Based clustering routing protocols for wireless sensor networks." IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 1232-1238, 2012.
[10] Li, Hongjuan, Kai Lin, and Keqiu Li. "Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks." Computer Communications 34.4 (2011): 591-597.
Citation
Nitu Choudhary, Deepak Kumar, "Multilevel Multi-Hop Technique for more than one Forward Node to increase the Stability of Wireless Body Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.997-1000, 2018.
Performance Comparison of Machine Learning Techniques in Intrusion Detection using Rapid Miner
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.1001-1005, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.10011005
Abstract
Information security is becoming a more important issue for modern computer generation, progressively. Intrusion Detection System (IDS) as the main security defensive technique and is widely used against many category of attacks. Intrusion Detection Systems are used to detect various kinds of attack in very large datasets. Data Mining (DM) and Machine Learning (ML) techniques are powerful enough and proved useful in the Network Intrusion Detection research area. In Recent years, many ML methods have also been introduced by researchers, to obtain high accuracy and good detection rate. A potential drawback of all those methods is how to classify different intrusion attacks effectively. Looking at such inadequacies, the RapidMiner tool is tested for the few ML techniques in this work. As most of the research works using tools like MATLAB, WEKA etc. the purpose of this work is to test and evaluate the ML techniques on RapidMiner. This paper presents a performance comparison of three ML techniques including: K-NN, Decision tree, Naïve Bayes using RapidMiner tool. This paper will provide an insight for the future research. The techniques were tested based on Detection rate and False Alarm rate. The result analysis and evaluation obtained by applying these approaches to the KDD CUP`99 data set.
Key-Words / Index Term
Intrusion Detection System (IDS), Data Mining, Classification, Data Science, Machine Learning, RapidMiner, Security, KDD CUP’99
References
[1] Hua TANG, Zhuolin CAO “Machine Learning-based Intrusion Detection Algorithms” Journal of Computational Information Systems5:6(2009) 1825-1831 Available at http://www.JofCI.org
[2] YU-XIN MENG “The Practice on Using Machine Learning For Network Anomaly Intrusion Detection” 2011 IEEE
[3] Chi Cheng, Wee Peng Tay and Guang-Bin Huang “Extreme Learning Machines for Intrusion Detection” - WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia
[4] Naeem Seliya , Taghi M. Khoshgoftaar “Active Learning with Neural Networks for Intrusion Detection” IEEE IRI 2010, August 4-6, 2010, Las Vegas, Nevada, USA 978-1-4244-8099-9/10/2010 IEEE
[5] Kamarularifin Abd Jalill, Mohamad Noorman Masrek “Comparison of Machine Learning Algorithms Performance in Detecting Network Intrusion” 201O International Conference on Networking and Information Technology 978-1-4244-7578-0, 2010 IEEE
[6] Jingbo Yuan , Haixiao Li, Shunli Ding , Limin Cao “Intrusion Detection Model based on Improved Support Vector Machine” Third International Symposium on Intelligent Information Technology and Security Informatics 978-0-7695-4020-7/10, 2010 IEEE
[7] Mohammadreza Ektefa, Sara Memar, Fatimah Sidi, Lilly Suriani Affendey “Intrusion Detection Using Data Mining Techniques” IEEE 2010.
[8] Anand Motwani, Vaibhav Patel, Anita Yadav, “Optimal Sampling for Class Balancing with Machine Learning Technique for Intrusion Detection System”, International Journal of Electrical, Electronics and Computer Engineering 4(2): 47-51(2015)
[9] Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani “A Detailed Analysis of the KDD CUP 99 Data Set” Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2009).
[10] Stuti Nathaniel, Anand Motwani, Arpit saxena, "Cloud based Predictive Model for Detection of ‘Chronic Kidney Disease’ Risk", International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.185-188, 2018
[11] http://www.rapidminer.com/
Citation
Sanjeet Choudhary, Varsha Namdeo, Abhijit Dwivedi, "Performance Comparison of Machine Learning Techniques in Intrusion Detection using Rapid Miner," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1001-1005, 2018.
Database Transaction Processing with Effective Locking Mechanism for Consistency in Cloud Database
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.1006-1009, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.10061009
Abstract
The cloud infrastructure provides Database Management System as a service with scalability and elasticity. Cloud DBMS is a less expensive platform for managing our data resources. Cloud data are replicated for high data availability. Concurrent transactions are done in the cloud database. Database users expect that data should be consistent when two users access to the same data at the same time and can see the same value. Due to replication of data in cloud environment, data inconsistency may occur between different replicated nodes. Hence Effective locking mechanisms are needed to handle such replicated cloud database. This paper proposes a novel algorithm for transaction processing to solve inconsistency and to control concurrency using lock managers and queue supervisor.
Key-Words / Index Term
Transaction Processing, Consistency, Database Management System, Cloud computing
References
[1] D. Abadi, “Consistency tradeoffs in modern distributed database system design: Cap is only part of the story,” Computer, Vol No. 2, Feb. 2012.
[2] D. J. Abadi, “Data management in the cloud: Limitations and opportunities,” IEEE Data Eng. Bull., vol. 32, no. 1, pp. 3–12, 2009.
[3] P. S. Almeida, A. Shoker, and C. Baquero, “Efficient State-based Credits by Delta Mutation” in Proceedings of third International Conference Networked Systems (NETYS), 2015.
[4] P. Alvaro, P. Bailis, N. Conway, and J. M. Hellerstein, “Consistency without borders” in Proceedings of the 4th Annual Symposium on Cloud Computing, ser. SOCC’13. New York, NY, USA: ACM, 2013, pp. 23:1–23:10.
[5] R Anandhi, K Chitra, “A challenge in improving the consistency of transactions in cloud databases-scalability”, International Journal of Computer Applications 52 (2), 12-14, 2012.
[6] E. Anderson, X. Li, M. A. Shah, J. Tucek, and J. J. Wylie, “What consistency does your key-value store actually provide?” in Proceedings of the Sixth international conference on Hot topics in system dependability, ser. HotDep’10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1–16.
[7] B Jeevarani, K Chitra, “Improved consistency model in cloud computing databases”, 2014 IEEE Computational Intelligence and Computing Research (ICCIC), 2014.
[8] O. Khan, R. C. Burns, J. S. Plank, W. Pierce, and C. Huang, “Rethinking erasure codes for cloud file systems: minimizing I/O for recovery and degraded reads,” in Proceedings of the 10th USENIX conference on File and Storage Technologies, FAST, San Jose, CA, USA, February 14-17, 2012, p. 20.
[9] A. Khanafer, M. Kodialam, and K. Puttaswamy, “The constrained ski-rental problem and its application to online cloud cost optimization,” in Proceedings of the IEEE INFOCOM, April 2013, pp. 1492–1500., 2014
[10] C. Li, D. Porto, A. Clement, J. Gehrke, N. Preguic¸a, and R. Rodrigues, “Making geo-replicated systems fast as possible, consistent when necessary,” in Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI’12. Berkeley, CA, USA: USENIX Association, 2012, pp. 265–278.
[11] S.L. Mewada, “A Proposed New Approach for Cloud Environment using Cryptic Techniques”, In the Proceedings of the 2016 International Conference on Computer Science and Engineering, India, pp.542-545, 2016.
[12] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Citation
A. Aasha Begum, K. Chitra, "Database Transaction Processing with Effective Locking Mechanism for Consistency in Cloud Database," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1006-1009, 2018.
Impact of Shared Leadership on Innovation Self-Efficacy and Self-Organization among Human Capital in Knowledge Ecosystem
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.1010-1014, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.10101014
Abstract
The study investigates the impact of Shared Leadership on Innovation Self-Efficacy and Self-Organization among members of the human capital within a knowledge ecosystem. It aims to understand the effect of shared leadership style on human capital component of the knowledge ecosystem with respect to innovation self-efficacy behaviours and their self-organization. The study also examines how ecosystem processes impact self-organization of the human capital and its impact on organizational innovation. Thus, the study recommends the development of shared leadership style among human capital in the knowledge ecosystem to facilitate learning, knowledge coordination and self-organization.
Key-Words / Index Term
Knowledge Ecosystem, Shared Leadership, Self-Organization in Individuals and Teams, Innovation Self-Efficacy, Innovation Performance, Nature of Knowledge Ecosystem
References
[1] Chang, V., & Tan, A. (2013, January). ‘An ecosystem approach to knowledge management’ ,7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing (pp. 25-35). Springer Berlin Heidelberg
[2] Bray, D. (2007). ‘Knowledge Ecosystems: A Theoretical Lens for Organizations Confronting Hyperturbulent Environments’ Organizational Dynamics of Technology-based Innovation: Diversifying the Research Agenda: IFIP TC 8 WG 8.6 International Working Conference, June 14-16, Manchester, UK (Vol. 235, p. 457). Springer Science & Business Media.
[3] Por, G. (1997, September). ‘Designing knowledge ecosystems for communities of practice’, Präsentation an der ICM conference on Knowledge Management (pp. 29-30).
[4] Hoch, J. E. (2013). ‘Shared leadership and innovation: The role of vertical leadership and employee integrity’, Journal of Business and Psychology, 28(2), 159-174.
[5] Okonkwo, C. (2014). Science Self-Efficacy and Innovative Behavior (IB) in Nigerian College Students Enrolled in Science, Technology, Engineering, and Mathematics (STEM) Programs, (Doctoral dissertation, The Ohio State University).
[6] Plowman, D. A., Solansky, S., Beck, T. E., Baker, L., Kulkarni, M., & Travis, D. V. (2007). ‘The role of leadership in emergent, self-organization’, The Leadership Quarterly, 18(4), 341-356.
[7] Pearce, C. L. (2004). ‘The future of leadership: Combining vertical and shared leadership to transform knowledge work’, Academy of Management Perspectives, 18(1), 47-57.
[8] Lambert, L. (2002). ‘A framework for shared leadership’. Educational leadership, 59(8), 37-40.
[9] Sharma Alka (2018). ‘A Study of Empowerment of Employees and Organizational Effectiveness in the J & K Bank Pvt. Ltd. A Case of Poonch District’, International Journal of Computer Sciences and Engineering, Vol 6, Special Issue -5, June 2018
[10] Kharade Jyoti, Prajapati Sneha, Narkar Dakshata, Kharade Dhanaji S (2018). ‘Role of Agile Methodology for software product development’, International Journal of Computer Sciences and Engineering, Vol-6, Issue -5, May 2018
[11] Tambe G.U, Bhaladare P.R (2017), ‘Efficient Resource Sharing in Heterogenous Environments’, International Journal of Scientific Research in Network Security and Communication, Vol -5, Issue -3, June 2017
[12] Sai Sirisha M, Usha Devi N. S.S.S.S.N, ‘A Secure Social Network Question and Answer System’, International Journal of Scientific Research in Computer Science and Engineering, Vol -6, pp 30 -35, Oct 2018
Citation
Sujata Dhopte, Anupama Iyer, "Impact of Shared Leadership on Innovation Self-Efficacy and Self-Organization among Human Capital in Knowledge Ecosystem," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1010-1014, 2018.
Improved Localization and Detection of Nodes in VANET
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.1015-1019, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.10151019
Abstract
In present day world, the quantities of vehicles are expanding eccentrically and therefore mishaps, criminal traffic offenses; vehicle robbery and so forth additionally expanded a ton. Following definite area of every vehicle (hub) might be helpful in taking care of numerous such issues. From metropolitan to provincial the thickness of traffic, width of the street, network inclusion and so forth might change; this makes confinement of vehicle a difficult errand. The development of transport framework doesn`t give a genial answer for these issues and here and there it even makes such issues more serious. This paper centers around the review of area discovery for every vehicle as well concerning the walkers alongside different directing procedures in a VANET.
Key-Words / Index Term
VANET, localization, intelligent transportation system
References
[1] S Rehman, M. A Khan, T A. Zia, L Zheng “Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges”, Journal of Wireless Networking and Communications, Vol . 3, Issue. 3, pp. 29-3,2013.
[2] N Lu, N Cheng, N Zhang, J Mark “Connected Vehicles: Solutions and Challenges”, IEEE Internet of Things Journal, Vol. 1,Issue. 4 , pp. 289-299, 2014
[3] H. Varun Chand, J. Karthikeyan “Recent Survey on Traffic Optimization in Intelligent Transportation System”, Journal of Advanced Research in Dynamical & Control Systems, 15-Special Issue, (2017): pp. 89-100.
[4] H. Varun Chand, J. Karthikeyan “Survey on the Role of IoT in Intelligent Transportation System”, Indonesian J. of Electrical Engineering and Computer Science, Vol. 11, Issue. 3, pp. 936~941,2018
[5] F Llorca, David, R Quintero Minguez, I P Alonso, C Fernandez Lopez, I G Daza, M A Sotelo, and C A Cordero. “Assistive Intelligent Transportation Systems: The Need for User Localization and Anonymous Disability Identification”, IEEE Intelligent Transportation Systems Magazine,Vol. 9,Issue 2, pp. 25-40, 2017.
[6] Ahmad, Fawad, and S Ali Mahmud. “Poster: Accurate Vehicle Detection in Intelligent Transportation Systems (ITS) using Wireless Magnetic Sensors”, In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, : pp. 385-386,2015.
[7] Gregor, Derlis, S. Toral, T. Ariza, F Barrero, Raúl Gregor, Jorge Rodas, and M Arzamendia. “A methodology for structured ontology construction applied to intelligent transportation systems”, Computer Standards & Interfaces, Vol. 47 pp. 108-119,2016.
[8] Giovanna, Chilà, Musolino Giuseppe, P Antonio, R Corrado, R Francesco, and V Antonino. “Transport models and intelligent transportation system to support urban evacuation planning process”, IET Intelligent Transport Systems, Vol. 10, Issue. 4 : pp. 279-286,2016.
[9] Guan, Ke, Bo Ai, A Fricke, Danping He, Z Zhong, David W. Matolak, and T Kürner. “Excess Propagation Loss Modelling of Semiclosed Obstacles for Intelligent Transportation System”, IEEE Transactions on Intelligent Transportation Systems, Vol. 17, Issue. 8 , pp. 2171-2181,2017
[10] Ko, Young Dae, Young Jae Jang, and Min Seok Lee. “The optimal economic design of the wireless powered intelligent transportation system using genetic algorithm considering nonlinear cost function”, Computers & Industrial Engineering, Vol. 89 , pp. 67-79,2015
[11] Tang, Suhua, N Kubo, N Kawanishi, R Furukawa, Akio Hasegawa, and Y Takeuchi. “Cooperative relative positioning for intelligent transportation system”, International Journal of Intelligent Transportation Systems Research Vol.13, Issue 3 pp. 131-142,2015.
[12] M de Souza, R S Yokoyama, G Maia, A Loureiro, and L Villas, “Real-time path planning to prevent traffic jam through an intelligent transportation system”, In Computers and Communication (ISCC), IEEE Symposium, pp. 726-731, 2016
[13] A C Hosu, Z I Kiss, I A Ivanciu, M Varga, and Z A Polgar, “Integrated ubiquitous connectivity and centralised information platform for intelligent public transportation systems”, IET Intelligent Transport Systems Vol. 9, Issue. 6 pp. 573-581,2016
[14] R Tomar, M Prateek, G. H. Sastry. Vehicular Adhoc Network (VANET) - An Introduction, International Journal of Control Theory and Applications, International Science Press, Vol. 9, No. 18, (2016), pp.8883-8888.
[15] P Ranjan, K K Ahirwar, Comparative Study of VANET and MANET Routing Protocols. In Proceedings of the International Conference on Advanced computing and communication Technologies (2011), pp. 517-523.
[16] S Rehman, M A Khan, T A Zia, L Zheng Vehicular Ad-Hoc Networks (VANETs) - An Overview and Challenges Journal of Wireless Networking and Communications, Vol. 3, No. 3, (2013), pp.29-38.
[17] J Petajajarvi, K Mikhaylov, A Roivainen, T Hanninen, M Pettissalo, On the Coverage of LPWANs: Range Evaluation and Channel Attenuation Model for LoRa, IEEE 14 th International Conference on ITS Telecommunications, (2015), pp. 55-59. https://doi.org/10.1109/ITST.2015.7377400.
Citation
Simy Mary Kurian, Jinu P Sainudeen, Sujitha M, Neena Joseph, "Improved Localization and Detection of Nodes in VANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1015-1019, 2018.
Agent Based Access Point Selection Mechanism
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.1020-1025, Nov-2018
Abstract
The last few years have visible a brilliant boom in the deployment of 802.Eleven Wireless Local Area Networks (WLANs). The proliferation of wi-fi users and the promise of converged voice, information and video technology is predicted to open new numerous possibilities for 802.Eleven based totally WLANs in the networking market.When the WLAN design turned into first advanced in 1990, the model assumes that a WLAN deployment accommodates one stand on my own Access Point (AP).In truth, any such device gives exceptional consumer experience as lengthy as there may be few customers with exceptionally light site visitors load and one AP. Due to fast boom of wireless users and the requirement for continuous insurance, multi-AP WLANs now a days span homes or floors. Some neighboring APs have to be configured on the same channel due to the constrained quantity of channels the 802.11 fashionable supports.In WLANs frequently a station can doubtlessly companion with multiple AP. Therefore, a relevant query is which AP to pick out great from a list of candidate ones. In IEEE 802.Eleven, the consumer certainly buddies to the get entry to factor with the most powerful acquired sign strength.Hence a multiobjective technique(ie.More than one parameters are taken into consideration)and fuzzy primarily based selection making is proposed.Here every node are handled as agent which looking to access first-class AP.Fuzzy based totally decision making ensures effective usage of professional information.
Key-Words / Index Term
WLANs, mutiobjectivetechnique, Fuzzy, AP
References
[1] Murad Abusubaih, Sven Wiethoelter, James Gross, Adam Wolisz, Inter- national Journal of Parallel, Emergent and Distributed Systems,”A new access point selection policy for multi- rate IEEE 802.11 WLANS” (Aug 2008).
[2] T.J.Ross,Fuzzy Logic with Engineering Applications, McGraw-Hill, (1995)
[3] G. Holland, N. Vaidya, and P. Bahl,A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks, in Proc. of ACM/IEEE Mobicom, (July 2001).
[4] M. Heusse, F. Rousseau, G. Berge-Dabbatel, and A. Duda,Performance Anomaly of 802.11b, in Proc. of IEEE Infocom, (March 2003).
[5] A. Kumar and V. Kumar, Optimal Association of Stations and APs in an IEEE 802.11 WLAN,in Proc. of Nat. Conf. on Communications (NCC), (February 2005).
[6] M.Abusubaih, J. Gross, S. Wiethoelter, and A.Wolisz, On Access Point Selection in IEEE 802.11
[7] Anthony J. Nicholson, Yatin Chawathe, Mike Y. Chen, Brian D. Noble, and David Wetherall,Improved Access Point Selection, In Proceedings of MobiSys, June,(2006).
[8] EE Std. 802.11-2007, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specications, IEEE Std. 802.11, 2007 edition.
[9] Poornaselvan, K.J. Kumar, T.G. Vijayan, V.P.Dept. of EEE, Gov. Coll. of Technol.,Coimbatore ,Agent Based Ground Flight Control Using Type- 2 Fuzzy Logic and Hybrid Ant Colony Optimization to a Dynamic Environment Emerging Trends in Engineering and Technology, ICETET 2008.
Citation
Vinodh P. Vijayan, Neema George, Simy Mary Kurian, Sujitha M., "Agent Based Access Point Selection Mechanism," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1020-1025, 2018.
Enhancement of Web security through the design and implementation of gesture-based CAPTCHA challenge
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.1026-1031, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.10261031
Abstract
In the rapidly evolving landscape of cybersecurity, safeguarding web applications against malicious attacks remains a top priority. While traditional text-based CAPTCHA mechanisms provide some level of security, they are vulnerable to automated bots and sophisticated attacks. Addressing these challenges, this research paper proposes an innovative approach to bolster web security through the design and implementation of a gesture-based CAPTCHA challenge. By harnessing the intuitive nature of human gestures, this novel CAPTCHA solution aims to offer robust protection against automated threats while ensuring a smooth user experience. The paper delineates the design principles, implementation specifics, and evaluation criteria for the gesture-based CAPTCHA challenge, underscoring its effectiveness in thwarting attacks and improving overall web security. Through empirical studies and real-world testing, the paper showcases the efficacy and user-friendliness of the proposed solution, highlighting its potential to significantly enhance the security posture of web applications. Furthermore, the paper explores the implications of integrating gesture-based CAPTCHA challenges into existing web authentication frameworks and identifies avenues for future research in this domain. In sum, this research contributes to ongoing efforts to strengthen web security amidst evolving cyber threats, providing a promising avenue for mitigating unauthorized access and malicious activities on the internet.
Key-Words / Index Term
Gesture-based CAPTCHA, Security, CAPTCHA, Cybersecurity
References
[1] Bursztein E., Bethard S., Fabry C., & Mitchell J.C. How good are humans at solving CAPTCHAs? A large scale evaluation. Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp.399-413, 2014.
[2] Mori G., Malik J., & Renals S. A Hierarchical Approach to Line Extraction from Noisy Documents. International Journal of Document Analysis and Recognition, Vol.5, Issue.1, pp.27-38, 2003. DOI: 10.1007/s10032-002-0110-0.
[3] Yan J., & El Ahmad A.S. A Low-cost Attack on a Microsoft CAPTCHA. Proceedings of the 15th ACM conference on Computer and Communications Security, pp.543-554, 2008. DOI: 10.1145/1455770.1455832.
[4] Garg V., & Yadav R. Audio CAPTCHA for Visual Impaired People. International Journal of Advanced Research in Computer Science, Vol.8, Issue.5, pp.157-161, 2017.
[5] Li, H., & Zhong, L. Video CAPTCHA: A New CAPTCHA Ideology Based on Video Analytics. International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.8, Issue.2, pp.369-378, 2015. DOI: 10.14257/ijsip.2015.8.2.33.
[6] Ahmed, M., & Paul, K. Slider CAPTCHA: A Practical Approach to Combat Phishing Attacks. International Journal of Computer Applications, Vol.142, Issue.10, pp.12-17, 2016. DOI: 10.5120/ijca2016909832.
[7] Bao, Xiaojun, et al. "Design and implementation of 3D CAPTCHA." 2013 IEEE International Conference on Information and Automation. IEEE, 2013.
[8] Zhu, X., Lin, Y., & Hao, H. CAPTCHA Recognition Based on Deep Learning. Proceedings of the 2nd International Conference on Computer Science and Application Engineering (CSAE), pp.216-220, 2017. DOI: 10.1109/CSAE.2017.8025469.
[9] Bursztein, E., Bethard, S., Fabry, C., & Mitchell, J. C. The Failure of Noise-Based Non-Continuous Audio CAPTCHAs. Proceedings of the 17th ACM conference on Computer and Communications Security, pp.12-23, 2010. DOI: 10.1145/1866307.1866310.
[10] Wang, X., Zhang, Y., & Jiang, B. Social Network Based CAPTCHA: Enhanced Security via Proactive Learning. International Journal of Information Security, Vol.15, Issue.5, pp.517-532, 2016. DOI: 10.1007/s10207-015-0304-x.
[11] Ding, S., & Zhao, Y. A Novel Honeypot-based CAPTCHA Scheme against Web Scraping Bots. Proceedings of the 12th International Conference on Security and Cryptography, pp.164-171, 2015. DOI: 10.5220/0005568601640171
[12] "A novel gesture-based CAPTCHA design for smart devices" by Nan Jiang, Feng Tian, BCS-HCI `13: Proceedings of the 27th International BCS Human Computer Interaction ConferenceSeptember 2013 Article No.: 49, pp.1–5, 2013.
[13] "Stathis, K., Efraimidis, P. S., & Tryfonopoulos, C. A comparative usability study of seven CAPTCHA tests. Proceedings of the 2012 Federated Conference on Computer Science and Information Systems (FedCSIS), pp.317-323, 2012.
[14] "Integration of Gesture-based CAPTCHA Challenges into Web Authentication Frameworks" by Lee and Kim, 2017.
[15] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. Building Segmentation-Based CAPTCHAs. Proceedings of the 6th Conference on Email and Anti-Spam (CEAS), 2005.
[16] Bursztein, E., Bethard, S., Fabry, C., & Mitchell, J. C. How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010.
[17] Krombholz, K., Hobel, H., Huber, M., & Weippl, E. Advanced Security Testing of CAPTCHA. Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016.
[18] Garg, V., & Yadav, R. Audio CAPTCHA for Visual Impaired People. International Journal of Advanced Research in Computer Science, Vol.8, Issue.5, pp.157-161, 2017.
[19] Thomas, B., Eyoh, I., & Hamerly, G. The Deep Web: A Survey of Recent Developments and Future Challenges. ACM Computing Surveys (CSUR), Vol.47, Issue.4, pp.1-35, 2014.
[20] Gu, G., Perdisci, R., Zhang, J., & Lee, W. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. Proceedings of the 17th USENIX Security Symposium, 2008.
[21] Zhen, Q., Hu, B., & Wang, Q. Design and Implementation of a Secure Anti-CAPTCHA Scheme Against Replay Attacks. International Journal of Security and Its Applications, Vol.9, Issue.10, pp.83-92, 2015.
[22] Pouyanfar, S., & Hao, Y. Syntactic Attack-Resistant CAPTCHA. Proceedings of the 13th International Conference on Information Technology: New Generations (ITNG), 2016.
[23] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The Failure of Noise-Based Non-Continuous Audio Captchas. Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011.
Citation
Dayanand, Wilson Jeberson, "Enhancement of Web security through the design and implementation of gesture-based CAPTCHA challenge," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1026-1031, 2018.