Hybrid Cloud Data Security Model Using Splitting Technique
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.108-112, Jun-2016
Abstract
Cloud computing is an enticing technology that delivers services over the internet. It allows business organizations to use different applications and store information without accessing their personal files. In the recent years IT organizations prefer to move towards the adoption of Hybrid Cloud as it can be easily incorporated with the existing infrastructures of the enterprises. The cost of the implementation of hybrid cloud is quite low and it also provides the advantages of both public and private clouds. However, with the measurement of power, stability and the security of cloud one cannot ignore unlike coercion to user’s data on cloud storage. In this paper, a security model has been proposed that secures sensitive and critical data with the help of symmetric cryptography and data splitting techniques. It also uses multi cloud service providers for the protection of overall cloud model. Data to be stored in the cloud will be first encrypted using AES encryption and then it will be split into numerous chunks. After splitting, these chunks of data will be stored in dissimilar clouds in a random manner.
Key-Words / Index Term
Hybrid cloud, Data splitting, AES encryption, Cloud Computing
References
[1] State of the Cloud Report from RightScale. www.rightscale.com/lp/2016-state-of-the-cloud. 2016.
[2] Cloud deployment model. http://transformcustomers.com/cloud-computing-benefits-and-challenges.
[3] AES Encryption. https://countuponsecurity.com/tag/openssl
[4] Vijayanand K.S. and Mala T., ‘A Framework for Preserving Data Security in Hybrid Cloud Environment using Trusted Multiple Cloud Service Providers’, Sixth International Conference on Advanced Computing (ICoAC), ISBN: 978-1-4799-8466-4, Page No. (14 – 18), Dec 17-19, 2014.
[5] Anitha Y, ‘Security Issues in Cloud Computing- A Review’, International Journal of Thesis Projects and Dissertations (IJTPD), Volume 1, Issue 1, pp: (1-6), December 2013.
[6] Anjali Nigam and Vineet Singh, ‘A Study on Data Transmission Security Threats in Cloud’, International Journal of Innovative Research in Computer and Communication Engineering, Volume 4, Issue 5, ISSN (Online): 2320-9810, May 2016.
[7] Munwar Ali Zardari, Low Tang Jung and Mohamed Nordin B.Zakaria, ‘Hybrid Multi-cloud Data Security (HMCDS) Model and Data Classification’, International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Page No. (166-171), Dec 23-24, 2013.
[8] Advanced Encryption Standard. http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard.
[9] Rajleen Kaur and Amanpreet Kaur, ‘A Review Paper on Evolution of Cloud Computing, its Approaches and Comparison with Grid Computing’, (IJCSIT) International Journal of Computer Science and Information Technologies, Volume 5, Issue 5, ISSN: 0975-9646, May 2014.
[10] Ritu Pahal and Vikas Kumar, ‘Efficient Implementation of AES’, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.
[11] Koushik Annapureddy, ‘Security Challenges in Hybrid Cloud Infrastructures’, Seminar on Network Security, 2010.
[12] Akanksha V. Patil and Navnath D. Kale, ‘A Secure Authorized Hybrid Cloud Distributed Key Generation for Encrypted Deduplication of Data’, International Journal of Science and Research (IJSR), ISSN: 2319-7064, 2013.
[13] K.R. Monisha, ‘Secure Cloud Computing using AES and RSA Algorithms’, Proceedings of 20th IRF International Conference, ISBN: 978-93-84209-01-8, March 1, 2015.
[14] Anukrati Dubey, Gunjita Shrivastava & Sandeep Sahu, ‘Security in Hybrid Cloud’, Global Journal of Computer Science and Technology Cloud and Distributed, Volume 13, Issue 2, ISSN: 0975-4350, February 2013.
[15] Pasquale Donadio, Giovanni B. Fioccola, Roberto Canonico and Giorgio Ventre, ‘Network security for Hybrid Cloud’, Euro Med Telco Conference (EMTC), ISBN: 978-8-8872-3721-4, Page No. (1-6), Nov 12-15, 2014.
[16] Ranjit Panigrahi, M.K. Ghose and Moumita Pramanik, ‘Cloud Computing: A new Era of Computing in the Field of Information Management’, International Journal of Computer Science Engineering (IJCSE), Volume 2, No. 5, ISSN: 2319-7323, September 2013.
[17] Siddharth Mishra, Puneet Sharma ‘A Study on Concerns and Impetus Aspects for Hybrid Cloud Adoption’, International Journal of Innovative Research in Computer and Communication Engineering, Volume 4, Issue 3, ISSN (Online): 2320-9810, March 2016.
Citation
Siddharth Mishra, Puneet Sharma, "Hybrid Cloud Data Security Model Using Splitting Technique," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.108-112, 2016.
A Review on Sweep Coverage in Wireless Sensor Networks
Review Paper | Journal Paper
Vol.4 , Issue.6 , pp.113-117, Jun-2016
Abstract
There are lots of applications where only periodic monitoring (sweep coverage) is sufficient instead of continuous monitoring. The main goal of sweep coverage problem is to minimize the number of mobile sensor nodes moving with uniform velocity required to guarantee coverage as per given sweep time. In the sweep coverage scenario, deployment of static sensor nodes may partially solve the purpose but it suffers from poor efficiency and unnecessary extra overhead. Moreover, static sensor network suffers from static sink neighborhood problem in which the sensors which lie near to the sink node dies due to which the sink disconnects from rest of the network.
Key-Words / Index Term
Sweep coverage; Approximation algorithm; Mobile sensor; TSP; MST; Euler tour; Tessellations
References
[1] Vijay V. Vazirani, “Approximation Algorithms”, Springer, First Edition-2003, ISBN:978-3-662-04565-7.
[2] Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, ManiB. Srivastava,“ Coverage Problems in Wireless Ad-hoc Sensor Networks ”, Twentieth Annual Joint Conference of the IEEE Computer and Communications Society, Org by- Anchorage, AK, USA, pp(1380–1387), April 22nd-26th, 2001, ISBN: 0-7803-7016-3.
[3] Edoardo S. Biagioni, Galen Sasaki,“Wireless sensor placement for Reliable and Efiicient data collection”,IEEE 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the - Big Island, HI, USA, January 6th-9th, 2003, ISBN:0-7695-1874-5.
[4] Guiling Wang.Guohong Cao,T. LaPorta, “A bidding protocol for deploying mobile sensors ”, Transactions on Mobile Computing ,Volume-06,Issue-05,Page No(563-576) , May 2007.
[5] Mingming Lu, Jie Wu, MihaelaCardei, Minglu Li, “Energy-efficient connected coverage of discrete targets in wireless sensor networks ”, Springer: Networking and Mobile computing , Volume-3619, Page No(43–52) , May 2005.
[6] Santosh kumar, Ten H .Lai, Anish Arora,“Barrrier coverage with wireless sensors”,Mobicom’05 Proceedings of the 11th annual international conference on Mobile computing and networking,Org by-ACM, NY, USA, pp(284-298) , August 28,2006,ISBN: 1-59593-020-5.
[7] Ming Ma, Yuanyuan Yang,“Adaptive triangular deployment algorithm for unattended mobile sensor networks”, IEEE Transaction on Computer , Volume- 56 ,Issue-07, Page No(946-958), July 2007.
[8] Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu, Mo Li, “Run to potential:sweep coverage in wireless sensor networks” ,IEEE: International Conference on Parallel Processing (ICPP-2009),Sponsored by-IACC, Vienna , Austria , pp ( 50–57) ,September 22nd-25th , 2009 ,ISBN: 978-0-7695-3802-0.
[9] Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed A. Ibnkahla, “Connectivity optimization for wireless sensor networks applied to forest monitoring”, In: Proceedings of the 2009 IEEE International Conference on Communications, (ICC-09), IEEE Press, Piscataway, NJ, USA, pp( 285–290),June 14th-18th,2009, ISBN: 978-1-4244-3435-0.
[10] Hung-Chi Chu, Wei-Kai Wang, Yong-Hsun Lai,“Sweep coverage mechanism for wireless sensor networks with approximate patrol times”, Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), Xian, Shaanxi, pp( 82–87) ,October 26th-29th,2010,ISBN: 978-0-7695-4272-0.
[11] Barun Gorian and Partha Sarthi Mandal, “Point and area sweep coverage in wireless sensor networks”,11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), Tsukuba Science City, pp (140-145) ,May 13th-17th ,2013,ISBN : 978-1-61284-824-2.
[12] Novella Bartolini, Tiziana Calamoneri, Emanuele G. Fusco, Annalisa Massini, Simone Silvestri , “ Push & pull: autonomous deployment of mobile sensors for a complete coverage”, Wireless Netw. ,Volume-16,Issue-3,Page No(607–625),Jan 2009.
[13] Junzhao Du, Yawei Li, Hui Liu, Kewei Sha,“On sweep coverage with minimum mobile sensors”, In:Proceedings of the 2010 IEEE 16th International Conference on Parallel and Distributed Systems, ICPADS’10, IEEE Computer Society,Washington, DC, USA, pp( 283–290),Dec 8th-10th, 2010, ISBN: 978-0-7695-4307-9.
[14] Mo Li, Wei-Fang Cheng, Kebin Liu, Yunhao Liu,Xiang-Yang Li, Xiangke Liao,“Sweep coverage with mobile sensors”, IEEE: Transaction on Mobile. Computing, Volume-01, Issue-11, Page No (1534–1545), Nov 2011.
[15] Adrian Dumitrescu, MinghuiJiang, “Sweeping an oval to a vanishing point”, Elsevier: Discrete applied mathematics, Volume-159, Issue-14, Page No(1436-1442) , Aug 2011.
[16] Gautam K. Das, Robert Fraser, Alejandro López-Ortiz, Bradford G. Nickers,“On the discrete unit disk cover problem”, WALCOM: Algorithms and Computation, Volume-6552,Page No(146–157), 2011.
[17] Dinesh Dash, Arijit Bishnu, Arobinda Gupta, Subhas C. Nandy, “Approximation algorithms for deployment of sensors for line segment coverage in wireless sensor networks”, wireless networks,Volume-19,Issue-5, Page No(857-870) , Sep 2012.
[18] Nasimkhazan,Ali Braumandinia and Nima Ghazanfari Motlagh,“Node Placement and coverage in Asymmetric area”, International Journal of Advanced Research in Computer Science and Software Engineering,Volume-2,Issue-11,Page No(278-282), Nov 2012.
[19] Barun Gorian and Partha Sarthi Mandal, “Approximation algorithim for sweep coverage in wireless sensor networks ” , Journal of Parallel and Distributed Computing , Volume-74, Issue-8, Page No(2699-2707), Aug 2014.
Citation
Gurbax Kaur, Ritesh Sharma, "A Review on Sweep Coverage in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.113-117, 2016.
Analysis of the Soil Data Using Classification Techniques for Agricultural Purpose
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.118-122, Jun-2016
Abstract
India has more than sixty percent of its total area for agricultural purpose. Agricultural sector is the backbone for all the developing countries. Agriculture sector continue to play a vital role in the development of the economy. Data Mining supports decision making process and prediction. Agriculture needs the decision support system in variety of ways such as type of crop to be cultivated. There were many researches going on to support the agriculture using data mining. Analyzing soil provides major contribution to the support of the farmers. This paper analyzing Salem District soil data using data mining techniques.
Key-Words / Index Term
Agricultural Soil, J48, Naïve Bayes Classification, Weka, Data mining
References
REFERENCES
[1] Mucherino.A, Petraq Papajorgji and P.M.Pardalos, “A survey of data mining techniques applied to agriculture”. Published online 2009 © Springer-verlag.
[2] G.M. Nasira , N. Hemageetha ,“Perspective on Classification Techniques in Agriculture”,International Journal of Computing Technology and Information Security Vol.1, No.2, pp. 40-46 , December, 2011. ISSN: 2231-1998 © 2011.
[3] G.M. Nasira , N. Hemageetha, “Vegetable price prediction using data mining classification technique” Preceedings of the International Conference on pattern Recognition, Informatics and Medical Engineering (PRIME 2012), PP. 99-102 ISBN No:978-1-4673-1038-3. © 2012 IEEE.
[4] G.M. Nasira , N. Hemageetha, “ Forecasting Model for Vegetable Price Using Back Propagation Neural Network” International Journal of Computational Intelligence and Informatics, Vol 2, no.2 sep 2012 PP 110-115..
[5] G.M. Nasira , N. Hemageetha, “ Radial Basis Function Model for Vegetable Price Prediction “ Preceedings of the International Conference on pattern Recognition, Informatics and Mobile Engineering (PRIME 2013), PP. 424 – 428 ISBN No.978-1-4673-5843-9 © 2013 IEEE.
[6] N. Hemageetha, “A Survey on appliation of Datamining Techniques to Analyze the Soil for Agricultural purpose”, Proceedings of the 10th INDIACom; INDIACom-2016; IEEE Conference ID: 37465 2016 3rd International Conference on “Computing for Sustainable Global Development”, ISSN 0973-7529; ISBN 978-93-80544-20-IEEE.
[7] http://agritech.tnau.ac.in.
[8] Soil Testing Kit Hand Book.
[9] R.Santhi et at (2014) ,GIS based Soil map for salem district of Tamilnadu. TechInical Folder, TNAU,Coimbatore.
[10] Natesan et at(2007),. Technical Bulletinon “Soil test crop response based fertilizer prescription for different soils and crops in tamil nadu” ,AICRP-STCR TamilNadu Agricultural University, Coimbatore
[11] Random forest “Wikipedia”.
Citation
N. Hemageetha, G.M. Nasira, "Analysis of the Soil Data Using Classification Techniques for Agricultural Purpose," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.118-122, 2016.
Enhancing Properties of Fiber Amplifier using Quantum Dots
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.123-131, Jun-2016
Abstract
In recent years, semiconductor nanocrystals quantum dots (QDs) have been extensively studied because of their unique optical and electronic properties compared to their bulk counterparts. This ability to tune the bandgap of the QDs through the control of the particle size can provide near-infrared emission covering the important wavelength region for the fiber optic communication. We have doped the optical fiber core by quantum dots (QDs) to integrate the emission characteristics of quantum dots with propagation characteristics of optical fiber. In particular, narrow bandgap materials such as PbS and PbSe have attracted much attention. Due to the large bulk exciton Bohr radii of PbS (18 nm), quantum confinement effect can be achieved over the wide range of the particle size. Application specific QDs can be incorporated into the optical fiber core. It was reported that PbS nanoparticles could provide the emission over the whole transmission window (1200–1700 nm) of silica fibers, and therefore could be promising for all-wave optical amplifiers. We have carried out numerical investigation such amplifier characteristics and have shown incremental gain values. Simulation results show that it is possible to design an optical amplifier with flattened gain characteristics over S, C, and L bands with low noise figure, moderate optical signal to noise ratio and minimum gain of 10 dB.
Key-Words / Index Term
Quantum dots; excitons; nanoparticles; quantum confinement; amplified stimulated emission
References
[1] W. Huang, Y.-Z. Chi, X. Wang, S.-F. Zhou, L. Wang, E. Wu, H.-P. Zeng, and J. R. Qiu, “Tunable infrared luminescence and optical amplification in PbS-doped glasses,” Chin. Phys. Lett., vol. 25, pp. 2518–2520, 2008.
[2] H. Jong and L.Chao, “Pbs quantum-dots in glassmatrix for universal fiber optic amplifier”, J. Mater. Sci: Mater. Electron., vol. 18, pp. S135–S139, 2007.
[3] G. P. Agrawal, “Fiber-Optic Communication Systems,” 3 ed. John Wiley & Sons, Inc., New York, 2002.
[4] http://en.wikipedia.org/wiki/Quantum_dot
[5] D. Bimberg, M. Grundmann, and N. N. Ledentsov, “Quantum dot heterostructures,” John Wiley, Chichester, 1999.
[6] S. M. Reimann and M. Manninen, “Electronic structure of quantum dots”, Rev. Mod. Phys., vol. 74, pp. 1283-1342, 2002.
[7] X. Michalet, F. F. Pinaud, L. A. Bentolila, J. M. Tsay, S. Doose, J. J. Li, G. Sundaresan, A. M. Wu, S. S. Gambhir, and S. Weiss, “Quantum dots for live cells, in vivo imaging and diagnostics,” Science, vol. 307, pp. 538-544 (2005).
[8] Y. Masumoto and T. Takagahara, “Semiconductor Quantum Dots,” Springer Verlag, Berlin, Heidelberg, New York, 2002.
[9] A. E. Zhukov, A. R. Kovsh, N. A. Maleev, S. S. Mikhrin, V. M. Ustinov, A. F. Tsatsul'nikov, M. V. Maximov, B. V. Volovik, D. A. Bedarev, Yu. M. Shernyakov, P. S. Kop'ev, Zh. I. Alferov, N. N. Ledentsov, and D. Bimberg, “Long wavelength lasing from multiply stacked InAs/InGaAs quantum dots on GaAs substrates,” Appl. Phys. Lett., vol. 75, pp. 1926-1934, 1999.
[10] C. R. Giles and D. Emmanuel, “Modeling erbium-doped fiber amplifiers,” J. Lightw. Technol., vol. 9, no. 2, pp. 271–283, 1991.
[11] T. Wang, F. Pang, K. Wang, R. Zhang and G. Liu, “Evanescent wave coupled semiconductor quantum dots fiber amplifier based on reverse Micelle method,” Proceedings of the 7th IEEE, International Conference on Nanotechnology, Hong Kong, pp. 819–822, Aug. 2–5, 2007.
[12] Y. Wang, A. Suna, W. Mahler, R. Kasowski, “PbS in polymers. From molecules to bulk solids,” J. Chem. Phys., vol. 87, pp. 7315-7322, 1987.
[13] L. E. Brus, “Electron-Electron and Electron-Hole Interaction in Small Semiconductor Crystallites: The Size Dependence of The Lowest Excited Electronic State,” J. Chem. Phys., vol. 80, pp. 4403-4418, 1984.
[14] M. V. R. Krishna, and R. A. Friesner, “Quantum Confinement Effects inSemiconductor Clusters,” J. Chem. Phys., vol. 95, pp. 8309-8321, 1991.
[15] F. W. Wise, “Lead salt quantum dots: The limit of strong quantum confinement,” Acc. Chem. Res., vol. 33, no. 11, pp. 773–780, 2000.
[16] K. Nakagawa, S. Nishi, K. Aida, and E. Y oneda, "Trunk and distribution network application of Erbium-doped fiber amplifier," J. Lightwave Technol.,vol.9, pp. 198-221, 1991.
[17] C. Jiang, “Ultrabroadband Gain Characteristics of a Quantum-Dot-Doped Fiber Amplifier,” IEEE J. Sel. Top. Quantum Electron., Vol. 15(1), pp. 140–144, 2009.
[18] L. Chao, H. Jong, Z. Xianghua, and A. Jean-Luc, “Photoluminescence of PbS quantum dots embedded in glasses,” J. Non-Cryst. Solids, vol. 354, pp. 618–623, 2008.
[19] F. C. BECKER, N. A. OLSSON, J. R. SIMPSON, “Erbium-Doped Fiber Amplifiers Fundamentals and Technology,” Optics and Photonics, New York, 1997.
[20] C. R. Giles and D. Emmanuel, “Modeling erbium-doped fiber amplifiers,” J. Lightw. Technol., vol. 9, no. 2, pp. 271–283, 1991.
[21] K. Thyagarajan, Jagneet Kaur, “A novel design of an intrinsically gain flattened erbium doped fiber,” Optics Communications, vol. 183. pp. 407–413, 2000.
[22] Cheng Cheng, “A Multiquantum-Dot-Doped Fiber Amplifier with Characteristics of Broadband, Flat Gain, and Low Noise,” J. of Lightw . Technol., vol. 26, no. 11, pp. 1404-1410, 2008.
Citation
Parnika De and Shailendra Singh, "Enhancing Properties of Fiber Amplifier using Quantum Dots," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.123-131, 2016.
A Proposed Decision Support System to Sustainable Production of Rice Using GIS Tools
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.132-135, Jun-2016
Abstract
Rice is an important crop in the world and India holds the second position among the rice producing country. As the population increases day by day and the total cultivating land is remains fixed, the demand is getting high whereas production remains almost constant. So in this paper a GIS based decision support system for rice production is proposed to increase the yield of production. The system takes data related to ongoing practice of rice cultivation and different parameters which affects the production of rice, store these data to a database and helps to take decision in an efficient manner.
Key-Words / Index Term
Raster Image, Digitization
References
[1] “Rice production in West Bengal of India”, www. tradingeconomics.com/india, 2016.
[2] “Problem in rice production in India” ,www.gov.my/c/document_library, 2016.
[3] Das S. and Mandal J.K., “ A GIS based Bio Informatics Tool for Tea Garden Management”, Proceedings of the National Conference on Bioinformatics Computing, TIET, Patiala, 18 – 19 March, 2005, pp.119-125.
[4] Das S, Dutta A, Banik S and Mandal, J. K, “ Weed Control System of Tea Garden using GIS based Database Management System”, Proceedings of International Conference on Modeling and Simulation (CITICOMS 2007), Coimbatore, 27-29 August, 2007 , pp. 1252-1257.
[5] Das S. and Mandal J.K,”A Fertilizer Scheduling Approach on Tea Bushes Using GIS based Database Management System”, Proceedings of National Conference on Information Technology: Present Practices and challenges (NCIT), New Delhi, August 31- Sept 1), 2007, pp. 502-506
[6] Das G, “The study of crop combination regions in Jalpaiguri District, West Bengal, India”, “Acme International Journal of Multidisciplinary Research, Volume- I, Issue- IX”, Sept., 2013, pp. 27-33.
[7] Bureau of Applied Economics and Statistics, Department of Statistics and Programme Implementation, Government of West Bengal: District Statistical Hand Book, Jalpaiguri, 2011.
[8] District Census Hand Book, Jalpaiguri, 2011, Government of India.
[9] “ Rice production in Jalpaiguri”, www.nrdms.gov.in, 2016.
[10] Biswas S,”Nature of soil properties and their function in different parts of Jalpaiguri district”, The Journal of Bengal Geographer, Vol II, No. I, January, 2013, pp. 58-66.
[11] “Rice production in Jalpaiguri”, www.nfsm.gov.in, 2016.
[12] “ Annual rainfall in Jalpaiguri District” , www. wbagrimarketingboard.gov.in, 2016.
Citation
Swarup Das , "A Proposed Decision Support System to Sustainable Production of Rice Using GIS Tools," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.132-135, 2016.
Preserving Privacy using Column Masking and Data Encryption Techniques
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.136-141, Jun-2016
Abstract
Information Technology plays an important role in Multi-National corporations with thousands of computer systems to small business organizations with a single system. Every business organization maintains IT Sector which is charged with maintaining and monitoring information. As rapid increase in information technology and omnipresent of internet has caused information breaches to grow faster. An information breach is a security incident in which confidential data of the organization has been stolen and used by unauthorized personnel. Information breaches may involve financial, personal information such as credit card or bank details, personal identification details, health insurance details and trade secret information of organizations. So protecting such confidential data has become a vital and integral part of each and every organization. This paper deals with security breaches, vulnerabilities in information systems and demonstrates security with column masking and data encryption techniques.
Key-Words / Index Term
Data Masking, Column Masking and Data Encryption
References
[1] B. Lakshmi, K. Parish Venkata Kumar, A. Shahnaz Banu and K. Anji Reddy, “Data Confidentiality and Loss Prevention using Virtual Private Database.”, International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 5 No. 03 Mar 2013 143.
[2] Ravikumar G K, Manjunath T N, Ravindra S Hegadi, Umesh I M, “A Survey on Recent Trends, Process and Development in Data Masking for Testing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
[3] Ajayi, Olusola Olajide, Adebiyi, Termidayo Olarewaju, “ Application of Data Masking in Achieving Information Privacy” IOSR Journal of Engineering, ISSN (e): 2250-3021, ISSN (p): 2278-8719, Vol. 04, Issue 02 (February. 2014), ||V1|| PP 13-21.
[4] Insiders Behaving Badly, IEEE Security & Privacy (Volume:6 , Issue: 4 )
[5] A Review on Database Security, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[6] http://spdp.di.unimi.it/papers/wiley.pdf
[7] http://www.cse.hcmut.edu.vn/~c503002/Files/TRUONGQuynhChi/Slides/Chap9_DBS.pdf
[8] https://www.dtc.umn.edu/umssia/resources/day7a_08.pdf
[9] Emil Burtescu, “Database Security - Attacks And Control Methods”, Journal of Applied Quantative Methods http://www.jaqm.ro/issues/volume-4,issue-4/pdfs/burtescu.pdf
Citation
Lakshmi B, Ravindra Babu H and Murali Krishna A, "Preserving Privacy using Column Masking and Data Encryption Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.136-141, 2016.
Hand Writing Code-PHP Or Wire shark Ready Application Over Tier Architecture with Windows Servers Operating Systems or Linux Server Operating Systems
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.142-149, Jun-2016
Abstract
Before the Information Communication Technology (ICT) era; most of the systems in Kurdistan Region Independent (KRI) were in a traditional way. But nowadays systems is not fully electronic because all systems are working with human activity, thus hundred percentages of systems in KRI is neither traditional nor fully electronic, but it’s Semi Electronic (SE) due to impossibility of services without human activity. The human activity and the ICT facilities (i.e. SMS, email, mobile and landline phone, Answering machine, Viber and Fax) are both working to reach to target. The fully Electronic Systems (FES) is much better than SES because of the real time availability and controlled by administrator of the Internet facility and as fewer as of human interfering. The proposed electronic hospital system (EHS) in this paper has the facility of integrating all prototypes are in one home page and connected by the hyperlink-unintelligent recommendation method. The proposed EHS is designed and implemented using both (Two and Three) Tier Architectures named (2TA and 3TA) respectively. To determine server(s) efficiency (i.e. response-time) for both of 2TA and 3TA, two different techniques are depended. First one is traditional hand-writing program by Hypertext Preprocessor (PHP) script code, and second one is ready application namely Wireshark (Network Protocol Analyzer). Two different platforms (i.e. Operating System (OSs)) are depended for performance analysis which are; Linux-Ubuntu version14.04 and Microsoft Windows-7.
Key-Words / Index Term
Client/Serve architecturer; Tiers Architecture Web Applications; Database Systems
References
[1] D. Amor, “The E-business(R) Evolution: Living and Working in an Interconnected World”, Prentice Hall PTR, 2000.
[2] I. S. BOLBOACĂ , C. Napoca, R. Lorentz , ” PHP AND MYSQL Medical Application Based On Tanner Whitehouse Standard”, International Science Conference 20-23 November 2003, Gabrovo.
[3] K. Clare-Marie, B. Jan, K. John,”Designing Personalized User Experiences In eCommerce”, Kluwer Academic Publishers, 2004.
[4] K. Faraj, “Design and Implementation of an Automated E-Recruitment System”, PhD. Thesis, Sulamani University, 2009.
[5] L. Sallau,” Design and Implementation of Telemedicine System”, University of IT Software System, Nigeria University of Technology Nigeria, 2011.
[6] B. Oguntunde , M.Odim ,” A framework for a multi-tier Internet Service architecture for doctors’ directory”, International Journal of Computers & Technology, India, Volume 4, No.2, 2013.
[7] W.Liu, E.Park, “e-Healthcare Interconnection Networking Services”, Journal of Communications Vol. 8, No. 9, September 2013.
[8] N. Ahmed, N. Yasin, “FACTORS AFFECTING COOPERATION AMONG PHYSICIANS IN SHARING INFORMATION WITHIN THE HOSPITAL ENVIRONMENT: A STUDY OF TWO HOSPITALS”, Journal of Computer Science, 2014.
[9] S. Mandip,”Development of 3 Tier Revenue Forecasting System”, B.Sc thesis, Computer Science Department, University of Greenwich, 2001.
[10] D.Akunyili,” ICT and E-government” The World Congress on Information Technology, Amasterdam, The Netherlands 25th-27thmay 2010.
URL http://www.goafrit.wordpress.com/2010/06/12/ict-and-e-government-in-nigeria- prof-akunyili/Access Date: 20 July 2014.
[11] I.Esposito, E.Seker,” E-government and e-health portals”, Information Systems Research Group, Department of Informatics, University of Fribourg, 7 December 2007.
[12] J. Houghton,” Information Technology and the Revolution in Healthcare”, Victoria University of Technology, Australia, 2002.
[13] S. Sanderson,” Electronic Health Records in the Physician Office”, McKesson Corporation, 2007.
[14] S.CARINA-ELENA,S.VALENTIN ”INFORMATION SYSTEMS AS A BUSINESS RESOURCE” Published Paper through Open Text Book Challenge by the Saylor Academy, 2014.
[15] J. Zhang," DEVELOPMENT OF E-COMMERCE WEB APPLICATION USING WAMP”, San Diego State University, 2010.
[16] J. Greenspan, B. Bulger, ”Mysql/PHP Database Applications”, M&T Books, 2001.
[17] R. Prakash, R .Anala, G .Shobha” Performance analysis of transport protocol during Live migration of virtual machines e”, Journal of Computer Science and Engineering (IJCSE), Indian, 2011.
Citation
Gheyath M. Othman Zebari, Kamaran Faraj , Subhi R. M. Zeebaree, "Hand Writing Code-PHP Or Wire shark Ready Application Over Tier Architecture with Windows Servers Operating Systems or Linux Server Operating Systems," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.142-149, 2016.
Design and Analysis of Modified Sierpinski Gasket Fractal Antenna
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.150-155, Jun-2016
Abstract
A Modified Sierpinski Fractal patch antenna has been designed and analyzed in this paper. As research in the field of antenna design has already established, therefore it is exceptional that a novel approach is used over conventional antenna design methods to optimize the existing sierpinski fractal antenna. This fractal structure is implemented on square and several iterations are applied on initial shape. The space filling and self-similarity property are used to design above said antenna. The proposed fractal antenna is designed on RT-DUROID substrate of thickness 1.6mm and relative permittivity of 2.2 and mounted above the ground plane at a height of 6mm using IE3D simulation software. Here, microstrip line feed is used to excite the antenna. Performance has been analyzed in terms of return loss, VSWR, input impedance, gain, and bandwidth in the 1 GHz to 5 GHz frequency range. The proposed antenna provides an impedance bandwidth of 56 % and high gain around the resonant frequency of 0.55 GHz .This antenna design can be used in Ground Penetration Radar (GPR), which is found to be suitable for land mine detection.
Key-Words / Index Term
Fractal Antenna, Return Loss, VSWR, IE3D, Sierpinski Gasket, Simulation
References
[1] James, J.R. and Hall, P. S., "Handbook of Microstrip Antennas" (Peter Peregrinus).
[2] Constantine A. Balanis, "Antenna Theory, Analysis and Design" (John Wiley & Sons), 2005.
[3] B.B.Mandelbort, “The Fractal Geometry of Nature,” New York, W. H. Freeman, 1983.
[4] D. H. Werner, Randy L. Haupt , Pinajuan L. Werner, " The Theory And Design of Fractal Antenna Arrays " IEEE Antennas and Propagation Magazine, Vol.41, No.5, October 1999.
[5] H. O. Peitgen,H. Jurgens, and D. Sauge, "Chaos and Fractals," New Frontiers in Science , NewYork : Springer-Verlag, 1992.
[6] D. L. Jaggard, “On Fractal Electrodynamics,” in H. N. Kritikos and D. L. Jaggard (eds.), Recent Advances in Electromagnetic Theory, New York, Springer-Verlag, pp. (183-224), 1990.
[7] D. L. Jaggard, “Fractal Electrodynamics: From Super Antennas to Superlattices,” in I. L. Vehel, E. Lutton, and C. Tricot (eds.),Fractals in Engineering, New York, Springer-Verlag, pp.(204-221), 1997.
[8] D. H. Werner , Suman Ganguly , "An Overview of Fractal Antenna Engineering Research" ,IEEE Antennas And Propagation Magazine, Vol. 45, No. 1, pp.(38-57), Febrary 2003.
[9] J. Q. Howell, “Microstrip Antennas”, IEEE Trans. Antennas Propagation, Vol.23, pp.(90-9), 1975.
[10] D. M. Pozar, D. H. Schauber , "Design of microstrip antennas and arrays," IEEE Press, NewYork,1995.
[11] Carles P. ,"An iterative model for fractal antennas: applications to the Sierpinski Gasket antenna," IEEE Trans. antennas Propag , Vol. 48, May 2000.
[12] C. Puente, J. Romeu, R. Pous and A. Cardama, “On the behavior of the Sierpinski multiband fractal antenna," IEEE Trans. Antennas Propagat., Vol.46, No.4,pp. (517–524), 1998.
[13] IE3D user's manual, release 9, Zeland Software Inc.
[14] C. T. P. Song, P. S. Hall, and P. S. Ghafouri-Shiraz, “Shorted Sierpinski gasket monopole antenna,” IEEE Electron. Lett., Vol.37, No. 16, pp.( 1000–1001), 2001.
[15] Y. J. Sung , Bandwidth enhancement of a wide slot using fractal shaped sierpinski ,IEEE Transaction Antennas Propagation Vol. 59,(3076-3079 ), August 2011.
[16] Krzysztofik W J , Modified sierpinski fractal monopole antenna for ism bands handset applications, IEEE Trans Antennas Propag. Vol. 57 , pp.(606-615), March 2009.
Citation
Mehak, Shashi B. Rana and Yogesh Bhomia, "Design and Analysis of Modified Sierpinski Gasket Fractal Antenna," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.150-155, 2016.
A New Efficient Color Image Segmentation Approach Based on Combination of Histogram Equalization with Watershed Algorithm
Research Paper | Journal Paper
Vol.4 , Issue.6 , pp.156-167, Jun-2016
Abstract
Image segmentation is an important part of any image analysis process. Meyer’s Watershed algorithm is one of the classical algorithms used for this purpose. But, the results of this algorithm usually suffer from over segmentation problem. To solve this problem, in this paper a new approach for color image segmentation is presented. In this approach, first the input RGB image is converted into HSV one and then the V channel of the later has been extracted. The histogram of the extracted V channel has been equalized to enhance the hidden edges. Here, through experiments, we have found that together Otsu’s thresholding with Sobel Filter forms a better preprocessing step for an image than any of them alone. So, focusing on this fact, the resultant equalized image is thresholded with Otsu’s method and after that filtered by Sobel filter. The filtered image is then sent as input to the watershed algorithm which produces the final segmented image. The output found is free from the over segmentation. Also, the evaluated values of the other image quality metrics like AMBE, NAE, MSE and PSNR show the efficiency of the proposed approach.
Key-Words / Index Term
Image Segmentation, Color Image Segmentation,Histogram Equalization, HSV Color Space, Otsu’s Method, Sobel Filter and Watershed Algorithm
References
[1] Chris Solomon, Toby Breckon , “Fundamentals of Digital Image Processing”, ISBN 978 0 470 84472 4 .
[2] R. M. Haralick, L. G.Shapiro, “Image Segmentation Techniques”,CVGIP, vol. 29, 1985,pp. 100-132.
[3] S. M. Aqil Burney, Humera Tariq, “ K-Means Cluster Analysis for Image Segmentation”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.4, June 2014, pp. 1-8.
[4] Chin-Ya Huang, Mon-Ju Wu , “Image Segmentation”, ECE 533 Final Project, Fall 2006 University of Wisconsin- Madison, pp 1-3.
[5] Amanpreet Kaur Bhogal, Neeru Singla,Maninder Kaur, “Color image segmentation using k-means clustering algorithm”, International Journal on Emerging Technologies 1(2), 2010,pp. 18-20.
[6] Poonam Chauhan, R. V. Shahabade, “Mean shift segmentation on Enhanced Color image”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. V (Nov – Dec. 2014), PP 40-44.
[7] Saleh MD, Eswaran C, Mueen A. “An automated blood vessel segmentation algorithm using histogram equalization and automatic threshold selection”, Journal of digital imaging. 2011;24(4), pp. 564–72.
[8] Rajesh kumar Rai , Puran Gour , Balvant Singh, “Underwater Image Segmentation using CLAHE Enhancement and Thresholding”, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 1, January 2012), pp. 118-123.
[9] Saikat Kumar Shome , Siva Ram Krishna Vadali, “Enhancement of Diabetic Retinopathy Imagery Using Contrast Limited Adaptive Histogram Equalization”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (6) , 2011, pp. 2694-2699
[10] Mohan, K.R.; Thirugnanam, G., "A dualistic sub-image histogram equalization based enhancement and segmentation techniques for medical images," in Image Information Processing (ICIIP), 2013 IEEE Second International Conference on , doi: 10.1109/ICIIP.2013.6707655, vol., no., 9-11 Dec. 2013, pp.566-569.
[11] D.J. Bora, A.K. Gupta, “A New Approach towards Clustering based Color Image Segmentation”, International Journal of Computer Applications (0975 – 8887) Volume 107 – No 12, December 2014, pp. 23-30.
[12] Rahman, M.H.,Islam, M.R., "Segmentation of color image using adaptive thresholding and masking with watershed algorithm," Informatics, Electronics & Vision (ICIEV), 2013 International Conference on , vol.,no., 17-18 May 2013,pp.1-6.
[13] Jingqi Ao; Mitra, S.; Long, R.; Nutter, B.; Antani, S., "A hybrid watershed method for cell image segmentation," in Image Analysis and Interpretation (SSIAI), 2012 IEEE Southwest Symposium on , vol., no., 22-24 April 2012
doi: 10.1109/SSIAI.2012.6202445, pp.29-32.
[14] Hamarneh G, Li XX.. Watershed Segmentation Using Prior Shape and Appearance Knowledge. Image and Vision Computing. 27(1), 2009,pp.59-68.
[15]D.J. Bora, A.K. Gupta, F.A. Khan, “Comparing the Performance of L*A*B* and HSV Color Spaces with Respect to Color Image Segmentation”, International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 2, February 2015,pp. 192-203.
[16] The hue-saturation-value (HSV) color model
http://infohost.nmt.edu/tcc/help/pubs/colortheory/web/hsv.html
[17] S. Sural, G. Qian, and S. Pramanik, “Segmentation and histogram generation using the HSV color space for image retrieval”, presented at IEEE International Conference on Image Processing, Rochester, New York, 2002
[18] Ed Sutton, "Histograms and the Zone System". Illustrated Photography.
[19] R.C. Gonzalez, R.E. Woods, and S.L. Eddins, “Digital image processing using MATLAB”, volume 2. Gatesmark Publishing Knoxville, 2009.
[20] R. C. Gonzalez and R. E.Woods, “Digital Image Processing”, Third Edition, 2008.
[21] Hameed, Z.; Wang, C., "Edge detection using histogram equalization and multi-filtering process," in Circuits and Systems (ISCAS), 2011 IEEE International Symposium on , vol., no., 15-18 May 2011, pp.1077-1080,
doi: 10.1109/ISCAS.2011.5937756.
[22] Shapiro, Linda G. & Stockman, George C., "Computer Vision",Prentice Hall,2002, ISBN 0-13-030796-3.
[23]Qingqiang Yang, Wenxiong Kang, “General Research on Image Segmentation Algorithms”, I.J. Image, Graphics and Signal Processing, 2009, 1,pp. 1-8.
[24] Wang Xingcheng, “Advanced Image Processing Technique”, Beijing: Chinese Scientific & Technological Press, 2000.
[25]N. Otsu, "A Threshold Selection Method from Gray-Level Histograms," IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, no. 1,1979, pp. 62-66.
[26] Hetal J. Vala, Astha Baxi, “A Review on Otsu Image Segmentation Algorithm”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013,
[27] Liu Jian-zhuang, Li Wen-qing, “The Automatic threshold of gray level pictures via Two-dimentional Otsu Method”, Acta Automatic Sinica,1993
[28] D.J. Bora, A.K. Gupta, F.A. Khan, “Color Image Segmentation Using An Efficient Fuzzy Based Watershed Approach”, Signal & Image Processing : An International Journal (SIPIJ),Vol.6, No.5, October 2015, pp. 15-34.
[29] Irwin Sobel, History and Definition of the Sobel Operator, 2014.
[30] Raman Maini, Dr. Himanshu Aggarwal, “Study and Comparison of Various Image Edge Detection Techniques ,“International Journal of Image Processing (IJIP), Jan-Feb 2009, Volume (3) Issue (1), pp.1-11.
[31] D.J. Bora, A.K. Gupta, “A Novel Approach Towards Clustering Based Image Segmentation”, International Journal of Emerging Science and Engineering (IJESE), Volume-2 Issue-11, September 2014,pp. 6-10.
[32] Yu-Hsiang Wang, “Tutorial: Image Segmentation”, Graduate Institute of Communication Engineering National Taiwan University, Taipei, Taiwan. Available: http://disp.ee.ntu.edu.tw/meeting/%E6%98%B1%E7%BF%94/Segmentation%20tutorial.pdf.
[32] Jos B.T.M. Roerdink , Arnold Meijster, “The Watershed Transform: Definitions, Algorithms and Parallelization Strategies”, Fundamenta Informaticae 41 (2001), IOS Press, pp. 187–228.
[33] Meyer, Fernand, "Topographic distance and watershed lines," Signal Processing , Vol. 38, July 1994, pp. 113-125.
[34] Berkeley Image Segmentation Dataset,
http://www.eecs.berkeley.edu/Research/Projects/CS/vision/bsds/BSDS300/html/dataset/images.html .
[35] S.D. Chen and A. R. Ramli, “Preserving brightness in histogram equalization based contrast enhancement techniques”, Digital Signal Processing, vol. 14, (2004), pp. 413-428.
[36] S.D. Chen, “A new image quality measure for assessment of histogram eualization-based contrast enhancement technique”, Digital Signal Processing, vol. 22,2012,pp. 640-647.
[37] Raju. A , Dwarakish. G. S and D. Venkat Reddy, “A Comparative Analysis of Histogram Equalization based Techniques for Contrast Enhancement and Brightness Preserving”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.6, No.5 (2013), pp.353-366
doi : http://dx.doi.org/10.14257/ijsip.2013.6.5.31
[38] Ratchakit Sakuldee, Somkait Udomhunsakul, “Objective Performance of Compressed Image Quality Assessments”, Proceedings Of World Academy Of Science, Engineering And Technology Volume 26 December 2007 Issn 1307-6884, pp. 434-443.
[39] Q. Huynh-Thu, M. Ghanbari, "Scope of validity of PSNR in image/video quality assessment," Electronics Letters, vol. 44, no. 13,June 2008, pp. 800-801
Citation
Dibya Jyoti Bora, Anil Kumar Gupta, "A New Efficient Color Image Segmentation Approach Based on Combination of Histogram Equalization with Watershed Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.156-167, 2016.
A Review on Coverage Optimization in Heterogeneous Network
Review Paper | Journal Paper
Vol.4 , Issue.6 , pp.168-172, Jun-2016
Abstract
Smart and flexible wireless devices brings with them, associate degree ever continued challenge of finding economical suggests that for resource usage. Scope and avenues for capability and coverage improvement in cellular networks area unit perpetually explored. Readying of little cells like microcells, picocells, hotspots, and relays established a good answer to enhance network coverage and capability. However, this will increase in performance occurs with the price of preparation and maintenance of extra base stations. Another fascinating answer to enhance coverage and network capability is that the use of user instrumentality with relaying support.
Key-Words / Index Term
Heterogeneous Network, UE Relays, Coverage Optimization
References
[1] 3GPP TR 36.913,”Requirements for further advancements for Evolved UTRA or EUTRA Release 10”, version 10.0.0., March 2011. Available: www.3gpp.org.
[2] A. Bou Saleh, O¨ . Bulakci, S. Redana, B. Raaf, J. Ha¨ma¨la¨inen.: ”Enhancing LTE advanced relay deployments via biasing in cell selection and handover decision”, IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications , September 2010.
[3] T. Beniero,S. Redana, B. Raaf, J. H¨am¨al¨ainen.: “Effect of relaying on coverage in 3GPP LTE-advanced”, IEEE 69th Vehicular Technology Conference Spring 2009, April 2009.
[4] A. Bou Saleh, S. Redana, B. Raaf, J. H¨am¨al¨ainen.: ”On the coverage extension and capacity enhancement of inband relay deployments in LTE-advanced networks”, Journal of Electrical and Computer Engineering - Special issue on LTE/LTE advanced cellular communication networks archive Volume 2010, Article No. 4,January 2010.
[5] E. Lang,S. Redana, B. Raaf.: ”Business impact of relay deployment for coverage extension in 3GPP LTE-advanced”, IEEE International Conference on Communications Workshops, 2009. ICC Workshops2009, June 2009.
[6] Bulakci, S. Redana, B. Raaf, J. H¨am¨al¨ainen.: ”Performance enhancement in LTE advanced. relay networks via relay site planning”, IEEE 71st Vehicular Technology Conference , May 2010.
[7] Bou Saleh, S. Redana, B. Raaf, J. H¨am¨al¨ainen. “On the coverage extension and capacity enhancement of inband relay deployments in LTE-advanced networks”, Journal of Electrical and Computer Engineering - Special issue on LTE/LTEadvanced cellular communication networks archive Volume 2010, Article No. 4, January 2010.
[8] A. Bou Saleh, .Bulakci, S. Redana, B. Raaf, J. Ha¨ma¨la¨inen. “Enhancing LTE advanced relay deployments via biasing in cell selection and handover decision”, IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications , September 2010.
[9] S.pingYeh, S. Talwar, G. Wu, N. Himayat, and K. Johnsson, “Capacity and coverage enhancement in heterogeneous networks,” WirelessCommunications, IEEE, vol. 18, no. 3, 2011.
[10] C.E. Shannon, “A mathematical theory of communication”, Bell system Tech. J. 27 July and October 1948.
[11] A.Damnjanovic, J. Montojo, Y. Wei, T. Ji, T. Luo, M. Vajapeyam, T. Yoo, O. Song, and D. Malladi, “A survey on 3gpp heterogeneous networks,” Wireless Communications, IEEE.
[12] “A survery on 3GPP Heterogeneous networks” Aleksandardamnjanovic ,juanmontojoYongbinwel, tingfangji, taoluo,madhavanvajapeyan ,taesangyoo ,osoksong, durgamalladi ,qualcomminc.
[13] J. Andrews, H. Claussen, M. Dohler, S. Rangan, and M. Reed, “Femtocells: Past, Present, and Future,” IEEE Journal on Selected Areas inCommunications,, vol. 3,April 2012.
[14] J. Kim, J. R. Yang, and D. I. Kim, “Optimal relaying strategy for ue relays,” in Communications , 2011 17th Asia-Pacific Conferenceon, 2011.
[15] K. Vanganuru, S. Ferrante, and G. Sternberg, “System capacity and coverage of a cellular network with d2d mobile relays,” in MILITARYCOMMUNICATIONS CONFERENCE, 2012.
[16] Z. Shi, M. Zhao, H. Wang, and M. Reed, “On the uplink capacity and coverage of relay-assisted umts cellular network with multiuser detection in Wireles Communication and Networking Conference (WCNC), 2012 IEEE, 2012.
[17] I. Katzela and M. Naghshineh, “Channel assignment schemes for cellular mobile telecommunication systems: A comprehensive survey,” IEEECommunications Surveys Tutorials, vol. 3, no. 2, June 2000.
[18] S. Tombaz, M. Usman, J. Zander, “Energy Efficiency Improvements Through Heterogeneous Networks in Diverse Traffic Distribution Scenarios,” CHINACOM’11, Aug., 2011.
[19] Qualcomm, “LTE Advanced: Heterogeneous networks,” Qualcomm HP, January 2011.
[20] K. Kikuchi and H. Otsuka, “Proposal of adaptive control CRE in heterogeneous networks,” in Proc. PIMRC 2012, NET7, Sept. 2012.
[21] 4G Americas; “4G mobile broadband evolution: 3GPP release 10 and beyond,” 4G Americas HP, Feb. 2011.
[22] 3GPP, TR36.806 (V9.0.0), “Relay architectures for E-UTRA (LTEAdvanced),” Mar. 2010.
[23] H. Otsuka, H. Masuda, and A. Nakajima, “Design and performance of fiber-optic relay node for mobile communication systems,” in Proc.EuMW 2012, Oct. 2012.
[24] P. Tian, H. Tian, J. Zhu, L. Chen, and X. She, “An adaptive bias onfiguration strategy for Range Extension in LTE-Advanced Heterogeneous Networks,” in Proceedings of the IET International Conferenceon Communication Technology and Application, October 2011.
[25] S. Strzyz, K. Pedersen, J. Lachowski, and F. Frederiksen, “Performance optimization of pico node deployment in LTE macro cells,” in Proceed-ings of the Future Network and Mobile Summit, June 2011.
[26] A. Bou Saleh, O. Bulakci, S. Redana, B. Raaf, and J. Hamalainen, “Enhancing LTE-Advanced relay deployments via Biasing in cell selection and handover decision,” in Proceedings of the IEEE InternationalSymposium on Personal Indoor and Mobile Radio Communications, September 2010.
[27] “Cell Selection Techniques in Heterogeneous LTE-Advanced System” Dhaval M. Tandel, Tanvi Shah, Department of the Electronics and communication, Parul Institute of the Engineering, Limda, Vadodara. International Journal on Recent and Innovation Trends in Computing and Communication.
[28] “Enhancing LTE-Advanced Relay Deployments via Biasing in Cell Selection and Handover Decision” AbdallahBou Saleh, Omer Bulakci, Simone Redana,Bernhard Raaf Nokia Siemens Networks St.-Martin-Strasse 76, 81541, Munich, Germany.
[29] R. Shah, S. Roy, S. Jain, and W. Brunette, “Data mules: Modeling a three-tier architecture for sparse sensor networks,” in Proc. IEEESNPA, May 2003.
[30] R. Thakur, A. Sengupta, and C. Siva Ram Murthy, “Improving capacity and energy efficiency of femtocell based cellular network through cell biasing,” in Proceedings of the 11th International Symposium onModeling Optimization in Mobile, Ad Hoc Wireless Networks, 2013.
[31] 3GPP, 3rd generation partnership project; Technical specification group radio access network; ‘‘Way forward on time-domain extension of Rel 8/9 backhaul-based ICIC’’,R1-105779, October 2010.
[32] E. Dahlman, S. Parkvall, J. Sk¨old,”4G LTE/LTE-advanced for mobile broadband” Elsevier Ltd, 1st Ed. 2011.
[33] H. Holma, A. Toskala,:”LTE for UMTS evolution to LTE-Advanced”, John Wileyand Sons Ltd, 2nd Ed. 2011.
[34] A. Bou Saleh, S. Redana, B. Raaf, TaneliRiihonen, RistoWichman, J. H¨am¨al¨ainen”Performance of amplify-and-forward and decode-and-forward relays in LTEadvanced”, IEEE 70th Vehicular Technology Conference (VTC 2009-Fall), September 2009.
[35] Jsydir “ Harmonized contribution on 802.16j (Mobile Multihop Relay) usage models,” IEEE 802.16 Broadband Wireless Access Working Group, September, 2006.
[36] Nagata, S.; Yan, Y.; Gao, X.; Li, A.; Kayama, H.; Abe, T.; Nakamura,T. “Investigation on system performance of L1/L3 relays in LTE-advanced downlink”, IEEE 73rd Vehicular Technology Conference (VTC Spring), May 2011.
[37] G. Shen, K. Zhang, D. Wang, J. Liu, X. Leng, W. Wang, S. Jin.”Multi-hop relay operation modes”, Alcatel Shanghai Bell, IEEE 802.16 Broadband Wireless Access Working Group, October 2008.
[38] 3GPP TR 36.814, “Requirements for further advancements for Evolved UTRA Release 9,” physical layer aspects version 9.0.0., March 2010. Available: www.3gpp.org.
[39] Z. Ma, Y. Zhang, KanZheng, W. Wang, M. Wu.: “Performance of 3GPP LTEadvanced networks with type I relay nodes”, 5th International ICST Conference on Communication and Networking in China (CHINACOM), August 2010.
[40] X. Wang, A. V. Vasilakos, M. Chen, Y. Liu, and T. T. Kwon, “A Survey of Green Mobile Networks: Opportunities and Challenges,” ACM MobileNetworks and Applications, vol. 17,February 2012.
[41] Book Simulation: The Practice of Model Development and Use by Stewart Robinson (Feb 13, 2004) .
[42] Matloff, Norm.”Introduction to Discrete –Event Simulation and Simply Language” Retrieved 24 January 2013.
Citation
Priya Mehta, Sujeet Singh, Syed Imran Ali , "A Review on Coverage Optimization in Heterogeneous Network," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.168-172, 2016.