Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint
Research Paper | Journal Paper
Vol.4 , Issue.4 , pp.95-101, Apr-2016
Abstract
By increasing the use of distributed systems and increasing software attacks, software security is considered very important and treated as an active research area. Security is usually taken into account after design and implementation of the system, whereas like other quality attributes, it must be considered from the beginning of the process of building software, such as architectural design. Considering 1) the long-term effects of design stage decisions on final software product, 2) one of the important design decisions, is selection of suitable software architecture style, and 3) the quantitative impact of software architecture style on quality attributes, especially security, has not been investigated, the aim of this research is quantification of the impact of architectural styles on security quality attribute. This study aims at evaluating the software architectural styles from the viewpoint of the security quality attribute based on scenario-based evaluation method. In this study, by presenting security scenarios, the architectural styles are evaluated from the perspective of security. Then architectural styles are ranked based on the results of the evaluation and importance of scenarios using Analytical Hierarchy Process, in terms of supporting software security. The most important contribution of this paper is to propose an approach to select the software architecture style in which security attribute plays a major role.
Key-Words / Index Term
Security; Scenario-based Evaluation; Software Architecture Styles
References
[1] P. T. Devanabu and S. Stubblebine, Software engineering for security: a roadmap”, in ICSE ’00: Proceedings of the Conference on the Future of Software Engineering. ACM, 2000, pp. 227–239.
[2] J. Juerjens, Secure Systems Development with UML, Springer, 2005.
[3] D.G. Rosado, E. Fernández-Medina, and M. Piattini, Comparison of Security Patterns, International Journal of Computer Science and Network Security, Vol. 6. Issue 2B. pp. 139-146, 2006.
[4] Len. Bass, Paul. Clements P, Rick. Kazman, 2003, “Software Architecture in Practice”, Addison-Wesley Professional Publisher ,Second Edition, 2003, Addison-Wesley, ISBN: 0321154959
[5] Len. Bass, Paul. Clements, and Rick. Kazman, “Software Architecture in Practice”, Pearson Education Publisher, Third Edition, 2013, ISBN: 9332502307
[6] F.Losavio, et al, ISO Quality Standards for Measuring Architectures, The Journal of System and Software 72, Page No. 209-223, Elsevier, 2004.
[7] M. AlSharif, et al, "ding the Complexity of Software Architecture", ACM Southeast Regional Conference, Proc. of the 42nd annual southeast regional conference, Huntsville, Alabama, 2004.
[8] S. Jingqiu and H. Behrouz, “Development of an Intelligent System for Architecture Design and Analysis”, Canadian Electrical and Computer Engineering, Conference, pp. 539- 542, 2004.
[9] H. Koh, S. Kung, and J.Park, “The Method to Choose Architectural Approaches in the Software Architecture Design Phase”, ICITA (1), pp. 103-106, 2005.
[10] H. Reza, D. Jurgens, J. White, J. Anderson, and J. Peterson, “An architectural design selection tool based on design tactics, scenarios and nonfunctional requirements”, Electro Information Technology, 2005 IEEE Int. Conf. , pp: , 2005.
[11] G. Zayaraz, and P. Thambidurai, “Software Architecture Selection Framework Based on Quality Attributes”, Annual IEEE INDICON, pp. 167– 170, December 11-13, 2005, ISBN:0-7803-9503-4
[12] N.B. Harrison and P. Avgerinos, “Leveraging Architecture Patterns to Satisfy Quality Attributes”, 1th European Conf. on Software Architecture Springer, pp (263-270), ECSA 2007 Madrid, Spain, September 24-26,
[13] P. Avgeriou, U. Zdun, “Architectural patterns revisited: a pattern language”, Proc. of 10th European Conf. on Pattern Languages of Programs, pp.1-39, 2005 , Butterworth-Heinemann,
[14] G.R.Shahmohammadi, “Reliability Evaluation of Software Architecture Styles”, 5-th International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA-2016), pp. 117-129, January 2th-3th,,2016, ISBN: 978-1-921987-45-8.
[15] G.R.Shahmohammadi, 2014, “Evaluation of the Software Architecture Styles from Maintainability Viewpoint”, International Conference on Foundations of Computer Science & Technology, Zurich, Switzerland, pp. 183-197, January 2th-4th , 2014.
[16] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, “Pattern-Oriented Software Architecture: A System of Patterns”, Vol. 1, Wiley, 1996, ISBN: 978-0-471-95869-7.
[17] M. Shaw, D. Garlan, 1996, “Software Architecture: Perspectives Discipline on an Emerging”, Prentice Hall.
[18] K. Jiwnani and M. Zelkowitz, 2002, “Maintaining Software with a Security Perspective”, Proc. of the International Conference on Software Maintenance, pp. 194 – 203, ISBN: 0-7695-1819-2
[19] Gholamreza. Shahmohammadi, and Saeed. Jalili, “Scenario-Based Quantitative Evaluation of Software Architecture Style from Maintainability Viewpoint”, 14st Annual of CSI Computer Conference (CSICC 2009), Iran, Amirkabir University, 2009.
Citation
Gholamreza Shahmohammadi, "Scenario-based Evaluation of Software Architecture Styles from the Security Viewpoint," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.95-101, 2016.
Android Based Management System for Library
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.102-105, Apr-2016
Abstract
Library management system is a project which aims in developing a computerized system to maintain all the daily work of library .This project has many features which are generally not available in normal library management systems like facility of user login and a facility of teachers log-in .It also has a facility of admin log-in through which the admin can monitor the whole system .It also has facility of an online notice board where teachers and student can put up information about workshops or seminars being held in our colleges or nearby colleges and librarian after proper verification from the concerned institution organizing the seminar can add it to the notice board . It has also a facility where student after log-in their accounts can see list of books issued and its issue date and return date and also the students can request the librarian to add new books by filling the book request form. The librarian after log-in into his account i.e. admin account can generate various reports such as student individual issue report, teacher individual issue report, over all issue report and books availability report. Overall, this project is developed to help the students as well as staffs of institute to maintain the library in organised manner and also reduce the human efforts.
Key-Words / Index Term
Android Operating System, SQLite data base, Library Access Application, Login Page
References
[1]. Ashutosh Tripathi & Ashish Srivastava, Online Library Management System, Iosr Journal Of Engineering (Iosrjen), Vol. 2 Issue 2, Feb.2012, Pp. 180- 186.
[2]. C. Srujana, B. Rama Murthy, K. Tanveer Alam, U. Sinitha, Mahammad D.V, P. Thimmaiah, Development Of Rfid Based library management system using matlab, International Journal Of Engineering and advanced Technology (Ijeat)Issn: 2249 – 8958, Volume-2, Issue-5, June 2013.
[3]. G. Dhillon, J. Ohri, Optimizing Security In E-Commerce Through Implementation Of Hybrid Technologies, Csecs'06 Proceedings Of The 5th Wseas International Conference On Circuits, Systems, Electronics, Control & Signal Processing, Pages 165 – 170.
[4]. G.Eason, B. Noble, And I.N. Sneddon, Mercury 4 Rfid Reader Manual Www.Thingmagic .Com, “On Certain Integrals Oflipschitz-Hankel Type Involving Products Of Bessel Functions,” Phil. Trans. Roy. Soc. London, Vol. A247, Pp. 529-551, April 1955.
[5]. I.S. Jacobs And C.P. Bean, “Fine Particles, Thin Films And Exchange Anisotropy,” In Magnetism, Vol. Iii, G.T. Rado And H. Suhl, Eds. New York: Academic, 1963, Pp. 271-350
[6]. P. Jarupunphol, C. Mitchell, Measuring 3-D Secure And 3d Set Against E-Commerce End-User Requirements, Proceedings Of The 8th Collaborative Electronic Commerce Technology And Research Conference (Collecter (Europe) 2003).
[7]. R. Alonso And H.F. Korth, ªdatabase Systems Issues In Nomadic Computing,º Technical Report Mitl-Tr-36-92, Matsushita Information Technology Laboratory, Princeton, N.J. 08542- 7072, Dec. 1992.
[8]. X. Zhang, Implementation Of A Suggested E-Commerce Model Based On Set Protocol, Software Engineering Research, Management And Applications (Sera), 2010 Eighth Acis International Conference On, Pages 67 – 73
Citation
Vikash Kumar Shukla, Shahbaz Hassan Faizi, Anurag Sharma, Mitesh Mukhia and Tshering Bhutia, "Android Based Management System for Library," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.102-105, 2016.
Internet of Things for Remote Healthcare
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.106-111, Apr-2016
Abstract
IoT is a innovative innovation which bridges interoperability challenges to radically change the way in which healthcare will be delivered, driving better outcomes, increasing efficiency and making healthcare affordable. Industry analysts predict that the ability for patients to take more responsibility of their health and the promotion of preventive measures are capable of disrupting current care delivery and will shape the future of healthcare. In this paper, we discuss today´s issues, including benefits and difficulties, as well as approaches to find a way the problems of employing and integrating Internet of Things devices in healthcare systems. It proposes few applications of IoT in rural healthcare and ways to improve primary health needs of the developing nations.
Key-Words / Index Term
Internet Of Things,WSN
References
[1] L. Mainetti, L. Patrono, and A. Vilei, “Evolution of wireless sensornetworks towards the internet of things: A survey,” in Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th International Conference on. IEEE, 2011, pp. 1–6.
[2] Harvard University. CodeBlue project: Wireless Sensor Networks for Medical Care. Available: http://www.eecs.harvard.edu/~mdw/proj/codeblue/
[3] I.F.Akyildiz,W.Su,Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks 38 (2002) 393– 422.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
[4] A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, T. Razafindralambo, A survey on facilities for experimental Internet of Things research, IEEE Communications Magazine 49 (2011) 58–67.
[5] Jayavardhana Gubbi, Rajkumar Buyyab, Slaven Marusic, Marimuthu Palaniswami. 24 February 2013. Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems 29 (2013) 1645–1660.
[6] David Niewolny. 18 Oct 2013. How the Internet of Things Is Revolutionizing Healthcare, Freescale Semic Mikhail Simonov, Riccardo Zich, Flavia Mazzitelli. Personalised healthcare communication in Internet of Things.
[7] K. Vasanth and J. Sbert. Creating solutions for health through technology innovation. Texas Instruments. [Online]. www.ti.com/lit/wp/sszy006/sszy006.pdf, accessed Dec. 7, 2014.
[8] O. Vermesan and P. Friess, " Internet of Things Strategic Research and Innovation Agenda," Internet of Things-. Converging technologies for smart environment and Integrated Ecosystems: River Publishers, 2013, pp. 54
[9] Zhibo Pang, "Technologies and Architectures of the Internet-ofThings (IoT) for Health and Well-being," Doctoral Thesis, KTH – Royal Institute of Technology Stockholm, Sweden, January 2013.
[10] J. Höller, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand, and. Boyle, From Machine-to-Machine to the Internet of Things: Introduction To a New Age of Intelligence. Amsterdam, The Netherlands: Elsevier,2014
[11] Satish Ram, “Internet-of-Things(IoT) Advances Home Healthcare for Seniors ," (Embedded Intel), [online] March 26th 2013
www.preventice.com/bodyguardian/clinicalapplications/ (Accessed: 23 August 2014).
[12] L.Atzori, A.Iera, nad, G. Morabito. ”The internetOfThings“:Asurvey,”Vol.54,no.15,pp27872805,Oct.2010”IEEECommun.Magsurvey,”Vol.49,no.11,pp30-31,Oct.2011
[13] D. Christin, A. Reinhardt, P. S.Mogre, and R. Steinmetz. Proceedings of the 8th GI/ITG KuVS Fachgespräch “Drahtlose Sensornetze” (FGSN), pages 31–34, 2009.
Citation
P K Mishra, M. R Pradhan and M.Panda, "Internet of Things for Remote Healthcare," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.106-111, 2016.
Study of Various Load Balancing Techniques in Cloud Environment- A Review
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.112-117, Apr-2016
Abstract
Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up and boot the required resources and they have to pay only for the required resources. Thus, in the future providing a mechanism for efficient resource management and assignment will be an important objective of Cloud computing. Cloud Computing is a new trend emerging in IT environment with huge requirements of infrastructure and resources. Load Balancing is an important aspect of cloud computing environment. Efficient load balancing scheme ensures efficient resource utilization by provisioning of resources to cloud user’s on-demand basis in pay-as-you-say-manner. Load Balancing may even support prioritizing users by applying appropriate scheduling criteria.
Key-Words / Index Term
Cloud Computing, Virtual Machine, Load balancing, Genetic, Resource scheduling, Service level agreement (SLA)
References
[1] Mayanka Katyal, Atul Mishra, “A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment”, International Journal of Distributed and Cloud Computing, Volume 1, Issue 2, 2013.
[2] Bhaskar. R, Deepu. S, “Dynamic Allocation Method for Efficient Load Balancing in Virtual Machines for Cloud Computing Environment”, Advanced Computing: An International Journal, Vol.3, No. 5, 2012.
[3] Chandrasekaran K., “Load Balancing of Virtual Machine Resources in Cloud Using Genetic Algorithm”, Elsevier Publications, pp (156-168), 2013.
[4] S.Sujitha and S. J. Mohana, "Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (181-184), Sep -2015, E-ISSN: 2347-2693
[5] Kapil B. Morey, Sachin B. Jadhav, "Grid Computing Approach for Dynamic Load Balancing", International Journal of Computer Sciences and Engineering, Volume-04, Issue-01, Page No (40-42), Jan -2016.
[6] Dharmesh Kashyap, “A Survey of Various Load Balancing Algorithms In Cloud COmputing”, International Journal of Scientific & Technology Research, VOLUME 3, ISSUE 11, 2014.
[7] Martina Poulose and M. Azath, "A Study of Load Balancing Techniques in Cloud", International Journal of Computer Sciences and Engineering, Volume-03, Issue-01, Page No (24-27), Jan -2015.
[8] Radha G. Dobale, “Review of Load Balancing for Distributed Systems in Cloud”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, 2015.
[9] Gunpriya Makkar, “A Review of Load Balancing in Cloud computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, 2015.
Citation
Rajdeep Kaur and Amanpreet Kaur, "Study of Various Load Balancing Techniques in Cloud Environment- A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.112-117, 2016.
Proposed Quality Paradigm for End User Development
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.118-122, Apr-2016
Abstract
The IT industry across the globe has rapidly evolved in recent times. The evolution has been primarily driven by factors like changing regulation policies, progression in information technology, globalization, changing customer demands and business needs, collaborations, mergers & acquisitions. Due to changing demands and business needs of end users, End User computing strategy can be expected to have a positive influence on end user behaviour. End users were significantly more satisfied with applications they can develop themselves. This paper review the concept of end user development, commonly used end user development methodologies and mentions some end user development software. It also proposes the EUD qualities that if inbuilt into the system will enhance the end users inclination towards the software hence will increase the end user satisfaction.
Key-Words / Index Term
End User Computing (EUC), End User Development (EUD), End User Programming(EUP), End User Software Engineering (EUSE), ubiquity, Programming-by-example, script based creation, block Programming
References
[1] H. Lieberman, F. Patern`o, and V.Wulf, Eds., End-User Development, HumanComputer Interaction Series, Springer,NewYork, NY, USA, 2006.
[2] McKendric, J. (2012). “Employees: We’ll Build our own Technology Solutions, Thank You”. zdnet.com
[3] Mørch, A.I. Tailoring tools for system development. JEUC 1998, 10, 22–29.
[4] Mørch, A.I.; Stevens, G.; Won, M.; Klann, M.; Dittrich, Y.; Wulf, V. Component-based technologies for end-user development. CACM 2004, 47, 59–62.
[5] Hartmann, B.; Wu, L.; Collins, K.; Klemmer, S.R. Programming by a Sample: Rapidly Creating Web Applications with d.mix. In Proceedings of the 20th Annual ACM Symposium on User Interface Software and Technology, Newport, RI, USA, 7–10 October 2007; pp. 241–250.
[6] Kovatsch, M.; Weiss, M.; Guinard, D. Embedding Internet Technology for Home Automation. In Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (ETFA), Bilbao, Spain, 13–16 September 2010; pp. 1–8.
[7] Ousterhout, J.K. Scripting: Higher level programming for the 21st century. Computer 1998, 31, 23–30.
[8] Miller, R.C. End User Programming for Web Users. In Proceedings of the End User Development Workshop at CHI Conference, Ft. Lauderdale, FL, USA, 5–10 April 2003.
[9] Won, M.; Stiemerling, O.; Wulf, V. Component-based approaches to Tailorable systems. In End User Development; Lieberman, H., Paternò, F., Wulf, V., Eds.; Springer: Dordrecht, The Netherlands, 2006; Volume 9, pp. 115–141.
[10] Honkola, J.; Laine, H.; Brown, R.; Tyrkko, O. Smart-M3 Information Sharing Platform. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Riccione, Italy, 22–25 June 2010; pp. 1041–1046.
[11] Kotkaluoto, S.; Leino, J.; Oulasvirta, A.; Peltonen, P.; Räihä, K.J.; Törmä, S. Review of Service Composition Interfaces; University of Tampere: Tampere, Finland, 2009.
[12] Stiemerling, O. Component-Based Tailorability; University of Bonn: Bonn, Germany, 2000.
[13] EUD-Net’s Roadmap to End-User Development, Markus Klann Fraunhofer Institute for Applied Information Technology (FhG/FIT).
[14] Ruby on Rails. http://www.rubyonrails.org, accessed August 2008.
[15] Turau, V. 2002. A Framework for Automatic Generation of Web-based Data Entry Applications Based on XML. Proceedings of the 2002 ACM symposium on Applied computing. Madrid, Spain, pp. 1121--1126.
[16] Shah, S.K. Motivation, governance, and the viability of hybrid forms in open source software development. Management Science 52, 7 (2006), 1000–1014.
[17] Cale, E. G. (1994). Quality issues for end-user developed software. Journal of Systems Management(January), 36-39.
[18] John F. Pane, Brad A. Myers, and Leah B. Miller. “Using HCI Techniques to Design a More Usable Programming System”, Proceedings of IEEE 2002 Symposia on Human Centric Computing Languages and Environments (HCC 2002), pp 198—206, Arlington, VA, September 3-6, 2002.
Citation
Archana Srivastava, S.K.Singh and Syed Qamar Abbas, "Proposed Quality Paradigm for End User Development," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.118-122, 2016.
Back Propagation Neural Network for Wireless Networking
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.123-125, Apr-2016
Abstract
The development in computers and network have changed the world very rapidly in recent years. So, the task of safeguarding the networks is very challenging. Different security algorithms and protocols have been proposed for the proper development of security mechanism. An Artificial Neural Network which is a data processing system consisting of large number of highly interconnected processing elements (neurons) in multiple layers inspired by the structure of human brain that follows a Back Propagation Algorithm can be implemented as a Wireless Network Security system. This paper demonstrates that Neural Network concept is more efficient in the area of Wireless Network Security.
Key-Words / Index Term
Artificial Neural Network, Back Propagation, Wireless Network
References
[1] M. Mathis, J. Heffner, P. O'Neil, P. Siemsen, "Pathdiag: Automated SVChosting", PAM 2008.
[2] J. C. Honig, D. Katz, M. Mathis, Y. Reckhter and J. Y. Yu, “Applications of database chaining in the Internet”, RFC1164 USC/Information Sciences Institute, June 1990.
[3] L. O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication”, Proceedings of IEEE, Vol. 91, No. 12, pp. 2019-2040,Dec 2003.
[4] Bruce Schneier, “Security Pitfalls in Cryptography” 1998.
[5] Lin, I., OU, H. & Hwang, M. (2005). A UserAuthentication System Using Back-Propagation Network. Neural Computing and Applications, 14, 2005, PP. 243-249.
[6] R. L. Clay, J. Mahdavi, G. J. McRae, “Scheduling in the Presence of Uncertainty in database chaining. The Linear Assignment Problem,” Proceedings of AICHE National Meeting, August, 1991.
[7] J. Principe, N. Euliano, W. Lefebvre, “Neural and Adaptive System: Fundamentals through Simulations”, Wiley, 2000, ISBN: 978-0-471-35167-2
[8] S. Haykin, “Neural Networks – A Comprehensive Foundation”, Prentice Hall, 2nd edition 2000. ISBN: 0132733501
[9]www.it.iitb.ac.in/~palwencha/assg/wlan_sec.pdf www.ece.tamu.edu/~reddy/ee689.../indira-monica.pdf
[10 wireless-technology-advisor.com/ wireless- technology-trends .html
[11]www1.cse.wustl.edu/~jain/cse574- 06/ftp/j_2trn.pdf
[12]www.afn.org/~afn48922/downs/wireless/wireless_wan.pdf
Citation
Menal Dahiya, "Back Propagation Neural Network for Wireless Networking," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.123-125, 2016.
A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.126-131, Apr-2016
Abstract
Data mining in WSN is the process of extracting model and pattern that are application oriented with possible accuracy from continuous, rapid flow of data. The whole huge amount of data cannot be stored and processed immediately. That is why the mining algorithm should be fast enough to process high speed arriving data. There are many conventional data mining techniques, but they are not able to handle dynamic amount of data. It is difficult to handle WSN data. There are several challenges that it has to face in WSN. The main aim of wireless sensor networks is to transmit data in such a manner that increased lifetime of the network and energy efficient routing can be done with significant accuracy. Data mining is the process of discovering interesting patterns (or knowledge) from large amounts of data. Knowledge discovery process attains several steps and can be interactive, iterative and user-driven. Data mining techniques of wireless sensor network are different from traditional techniques. Data mining techniques can be frequent pattern mining, sequential pattern mining, clustering and classification. All these techniques can use centralized or distributed approach, even after that the focus is decided that either you can focus on application or performance of wireless sensor network. Data mining techniques that work on sensor network-based application are still facing shortcomings in existing techniques. By seeing these shortcomings and special characteristics of WSNs, there is a need for data mining technique designed for WSNs.In this paper, we are finding the difference between traditional and sensor data processing. Also comparing the different data mining techniques used in wireless sensor network where all these methods have their own processing architecture and method of sensor distribution depending upon the attributes.
Key-Words / Index Term
Centralized Mining; Distributed Mining; Sequential Mining; Pattern Mining; WSN
References
[1] R. Agrawal, T. Imieli´nski, and A. Swami, “Mining association rules between sets of items in large databases,” in Proceeding of SIGMOD, pp. 207–216.
[2] J. Han, J. Pei, Y. Yin, and R. Mao, “Mining frequent patterns without candidate generation: a frequent-pattern tree approach,” Data Mining and Knowledge Discovery, vol. 8, no. 1. pp. 53–87, 2004.
[3] M. Halatchev and L. Gruenwald, “Estimating missing values in related sensor data streams,” in Proceedings of the 11th International Conference on Management of Data (COMAD’05), 2005.
[4] J N. Jiang, “Discovering association rules in data streams based on closed pattern mining,” in Proceedings of the SIGMOD Workshop on Innovative Database Research, 2007.
[5] N. Jiang and L. Gruenwald, “Estimating missing data in data streams,” Advances in Databases: Concepts, Systems and Applications,pp. 981–987, 2007.
[6] N. Jiang and L. Gruenwald, “CFI-stream: mining closed frequent item sets in data streams,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’06), pp. 592–597, August 2006.
[7] K. Loo, I. Tong, and B. Kao, “Online algorithms for mining inter-stream associations from large sensor networks,” in Advances in Knowledge Discovery and Data Mining, pp. 291–302, 2005.
[8] G. S. Manku and R. Motwani, “Approximate frequency counts over data streams,” in Proceedings of the 28th International Conference on Very Large Data Bases, pp. 346–357, 2002.
[9] S. K. Tanbeer, C. F. Ahmed, B.-S. Jeong, and Y.-K. Lee, “Efficient mining of association rules from
[10] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693
[11] K. Romer,“Distributed mining of spatiotemporal event patterns in sensor networks,” in Proceedings of the 1st Euro-American Workshop on Middleware for Sensor Networks (EAWMS ’06), 2006.
[12] A. Boukerche and S. Samarah, “A novel algorithm for mining association rules in Wireless Ad Hoc Sensor Networks,” IEEE
[13] Transactions on Parallel and Distributed Systems, vol. 19, no. 7, pp. 865–877, 2008.
[14] F. Esposito, T. M. A. Basile, N. Di Mauro, and S. Ferilli, “A relational approach to sensor network data mining,” Information Retrieval and Mining in Distributed Environments, pp. 163–181, 2010.
[15] F. Esposito, N. Di Mauro, T. M. A. Basile, and S. Ferilli,“Multi-dimensional relational sequence mining,” Fundamenta Informaticae, vol. 89, no. 1, pp. 23–43, 2008.
[16] D. J. Cook, M. Youngblood, E. O. Heierman III et al., “MavHome: an agent-based smart home,” in Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications (PerCom ’03), pp. 521–524, March 2003.
[17] J. Rabatel, S. Bringay, and P. Poncelet, “SO MAD: sensor mining for anomaly detection in railway data,” in Advances in Data Mining. Applications andTheoretical Aspects, pp. 191–205, 2009.
[18] P. H. Wu, W. C. Peng, and M. S. Chen, “Mining sequential alarm patterns in a telecommunication database,” in Databases in Telecommunications II, pp. 37–51, 2001.
[19] V. S. Tseng and E. H.-C. Lu, “Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns,” Journal of Systems and Software, vol.82, no. 4, pp. 697–706, 2009.
[20] V. S. Tseng and K.W. Lin, “Energy efficient strategies for object tracking in sensor networks: a data mining approach,” Journal of Systems and Software, vol. 80, no. 10, pp. 1678–1698, 2007.
[21] C. Liu, K.Wu, and J. Pei, “A dynamic clustering and scheduling approach to energy saving in data collection from wireless sensor networks,” in Proceedings of the 2nd Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON ’05), pp. 374–385, September 2005.
[22] Tuhin Das, "A Study on Identity Based Attack Detection and Localization by the Clustering in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (96-99), Feb -2016, E-ISSN: 2347-2693
[23] M. H. Yeo, M. S. Lee, S. J. Lee, and J. S. Yoo, “Data correlation based clustering in sensor networks,” in Proceedings of the International Symposium on Computer Science and its Applications (CSA ’08), pp. 332–337, October 2008.
[24] S. Yoon and C. Shahabi, “The Clustered Aggregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 3, no. 1, Article ID1210672, 2007.
[25] K.Wang, S. A. Ayyash, T. D. C. Little, and P. Basu, “Attribute based clustering for information dissemination in wireless sensor networks,” in Proceedings of the 2nd Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON ’05), pp. 498–509, Santa Clara, Calif, USA, September 2005.
[26] B. Chikhaoui, S. Wang, and H. Pigot, “A new algorithm based on sequential pattern mining for person identification in ubiquitous environments,” in Proceedings of the 4th International Workshop on Knowledge Discovery form Sensor Data (ACM SensorKDD ’10), pp. 20–28,Washington, DC, USA, 2010.
[27] K. Sharma, M. Rajpoot, and L. K. Sharma, “Nearest neighbour classification for wireless sensor network data,” International Journal of Computer Trends and Technology, no. 2, 2011.
Citation
Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav, "A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.126-131, 2016.
NFC Based Toll Management System
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.132-135, Apr-2016
Abstract
The NFC based toll collection system can be used in places like toll-naka, police check-naka, license or vehicle paper checking, insurance and other vehicle related paper checking .It will be useful in reducing the time required for each vehicle at such places. This will help in reducing the jams and pollution caused by vehicles at places like highways. Architecture for collecting vehicles toll using Near Field Communication (NFC) is presented in this paper. This is a completely automated system where the driver just needs to swipe his card; no real money or other papers will be needed. A PC connected to the system will display the driver details. The booth-operators can also click on a button to collect the money from the driver. The money will be debited automatically from the card. After the tax is collected, the booth operators can then open or close the door. The performance of the system is evaluated in VB.NET.
Key-Words / Index Term
NFC, automated, toll collection, VB.NET
References
[1] Guo-Huang Hsu, Liang-Rui Lin, Rong-Hong Jan, and Chien Chen ,” Design of ETC Violation Enforcement System for Non-payment Vehicle Searching”, ICACT Transactions on Advanced Communications Technology (TACT) Vol. 2, Issue 1, March 2013
[2] Wern-Yarng Shieh, Chen-Chien (James) Hsu, Shen-Lung Tun,,Po-Wen Lu, Ti-Ho Wang, and Shyang-Lih Chang,” Design of Infrared Electronic- Toll-Collection Systems With Extended Communication Areas and Performance of Data Transmission”, IEEE Transactions On Intelligent Transportation Systems, Vol. 12, No. 1, March 2011
[3] Z. Feng, Y. Zhu, P. Xue and M. Li, “Design and realization of expressway vehicle path recognition and ETC system based on RFID,” 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT),vol. 7, pp.S6- 90, 2010.
[4] Saijie Lu, Tiejun He, Zhaohui Gao,” Design of Electronic Toll Collection System based on Global Positioning System Technique”, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management 978- 1- 4244-4246-1/09/$25.00 ©2009 IEEE CCCM
[5] WY. Shieh, WH. Lee, S.L. Tung, B.S. Jeng, and C.H. Liu,”Analysis of the optimum configuration of roadside units and onboard units in dedicated short-range communication systems,” IEEE Trans. Intel!. Transp.Systems, vol. 7, no. 4, pp. 565-571,2006.
[6] WY. Shieh, WH. Lee, S.L. Tung, and C.D. Ho, “A Novel Architecture for Multilane-Free-Flow Electronic-Toll-Collection Systems in the Millimeter-Wave Range,” IEEE Trans. Intel!. Transp.Systems, vol. 6, no. 3, pp. 294-301, Sep. 2005.
[7] WH. Lee, B.S. Jeng, S.S. Tseng, and c.R. Wang,”Electronic toll collection based on vehiclepositioning system techniques,” in: Proc. 2004 IEEE Int. Conf Networking, Sensing, and Control, pp. 643-64S, 2004.
[8] D.W Lim and J.S. Jun, “Free-flow multi-lane ETC system using real-time individual vehicle tracking,” in Proc. 5th Asia-Pacific Intelligent Transportation System (ITS)Forum, Seoul, Korea, pp. TSI-TS3, 2002.
[9] C. M. Walker and W. K. Brockelsby, “Automatic Vehicle Identification(AVI) technology design considerations for highway applications,” in Proc. 41st IEEE Vehicular Technology Conf, Gateway to the Future Technology in Motion, pp. S05-S11, 1991.
[10] Shan Du, Mahmoud Ibrahim, Mohamed Shehata, Wael Badawy, ”Automatic License Plate Recognition (ALPR):A State-of-the-Art Review”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 23, No. 2, February 2013
Citation
Rohan Kelkar, Abhishek Bharambe, Akshaykumar Prajapati, Mansi Kambli, "NFC Based Toll Management System," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.132-135, 2016.
Recognition of Facial Expression Using AAM and Optimal Neural Networks
Research Paper | Journal Paper
Vol.4 , Issue.4 , pp.136-140, Apr-2016
Abstract
Human communication is a combination of both verbal and nonverbal interactions. Facial Expressions convey non-verbal cues, which acts an important role in interpersonal relations. Facial Expressions play significant role wherever Human-computer interface required. In this paper, an optimal Neural Network has been presented to recognize from facial images. In this proposed work, firstly the image is acquired and preprocessed by using adaptive median filter and then using Active Appearance Model to extract the eye feature from the preprocessed image. Finally using Optimal Neural Networks to classify the facial expression of the image. Experiments are carried out on JAFFE facial expression database.
Key-Words / Index Term
Preprocessing, Feature Extraction, Classification, Active Appearance Model, Neural Network
References
[1] Neeta sarode, prof. Shalini Bhatia, “Facial Expression Recognition”, International Journal of Computer Science(IJCSE), Vol- 02 ,NO :05,2010, 1552-1557.
[2] P. Ekman, W.V. Friesen,” Constants across cultures in the face and emotion”, Journal of Personality Social Psychol. 17(2) , (1971) ,Page No-124-129.
[3] A.Mehrabian, "Communication without Words", Psychology Today, Vol. 2, No. 4, Page No. 53-56, 1968.
[4] S.P.Khandait, Dr,R,C.Thool, P.D.Khandait, “Automatic Facial Feature Extraction and Expression Recognition based on Neural Network”, International Journal of Advanced Computer Science and Applications, Vol -2, No.1,January 2011.
[5] G. Hemalatha, C.P.Sumathi, “A Study of Techniques for Facial Detection and Expression Classification”, IJCSES, Vol- 5,No.2,April 2014.
[6] S L Happy, Aurobinda Routray, "Automatic Facial Expression Recognition Using Features of Salient Facial Patches", In Proceedings of IEEE Transaction on Affective Computing, Vol. 6, No. 1, 2015.
[7] Nidhi N. Khatri, Z. Shahankhana H. shah, “Facial Expression Recognition: A Survey”, Internationa Journal of computer science and Information Technology Vol- 5(1),2014
[8] G. Edwards, C.J. Taylor, and T.F. Cootes,” Interpreting Face Images Using Active Appearance Models”, Proc. Third Int'l Conf. Automatic Face and Gesture Recognition, Page No. 300-305, 1998
[9] Timothy F. Cootes, Gareth J. Edwards, and Christopher J. Taylor,“Active Appearance Models”, IEE transactions on pattern analysis and machine intelligence”, vol. 23, no. 6, june 2001
[10] Neha Gupta, Prof. Navneet Kaur, “Design and Implementation of Emotion Recognition System by Using Matlab”,IJERA, Vol -3,Issue 4,Jul-2013.
[11] Yong-Hwan Lee,Wuri Han.., “Robust Emotion Recognition Algorithm for Ambiguous Facial Expression using optimized AAM and K-NN”, International Journal of Security and its Applications, vol -8,2014.
Citation
J.Suneetha and K.Sandhya Rani, "Recognition of Facial Expression Using AAM and Optimal Neural Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.136-140, 2016.
MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature
Technical Paper | Journal Paper
Vol.4 , Issue.4 , pp.141-144, Apr-2016
Abstract
This project basically is an integrated android application based on concept of geo-map and GPS technology in case of anti- theft feature. It can easily be controlled by user. It is very reliable and also helps in locking the phone in case of theft. The thought behind this idea for our project is as follows: We generally tend to forget things in our daily routine and till the time we realize we either are too tired to go and finish it or we tend to postpone things. We came up with this idea of designing an app which will help us to remember things based on the location and prompt us with the message when we are near that location. The next feature is that of location tracker. This application will allow us to add details of our near ones and in case of danger on our single click all of them will get our location and can easily find us. The modules developed are: User Login and Registration, Location Based Reminder, Safety Alert, Anti-Theft.
Key-Words / Index Term
RemindMeBot, GPRS setting, lockout mode
References
[1] YigalBejerano, Israel Cidon, Efficient Location Management Based on Moving Location Areas at ieeeinfocom 2001.
[2] Sean J. Barbeau, Miguel A. Labrador, Philip L. Winters, Rafael Pérez, and NevineLabibGeorggi, A General Architecture in Support of Interactive, Multimedia, Location-Based Mobile Applications in IEEE Communications Magazine November 2006.
[3] Misato Sasaki,ChristianNoack, Hidetoshi Yokota, Akira Idoue , KDDI R&D Laboratories, Inc, LocationWeb: Proposal and Implementation of Location-based Web Content Search and Creation using the Mobile Phone.
[4] Reto Meier, “Creating User Interface,” in Professional Android Application Development, Indiana: Wiley, 2009, ch. 4, Page No(76-102).
[5] DonnFelker, in “Coding Your Application” Android Application Development for Dummies, Indiana: Wiley, 2011, ch. 5,Page No(118-132).
Citation
Neelam Salia and Monali Raval, "MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.141-144, 2016.