Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.133-138, Oct-2016
Abstract
Using cloud storage is rapidly increasing at present in all the service and commercial zone. Safety and security concern of the data always uncertain in private, public and hybrid cloud storage system. In particular, mobile data on cloud storage facing enormous challenges and security issues. There is no limitation of mobile users, mobile data and its various services on mobile environment. Increase and deployment of mobile usage much needed to store their vast information in cloud environment, which establish to Mobile data storage on cloud environment. Cloud storage system promotes usage of cloud based services in a mobile environment. Encryption algorithm plays a vital role in securing mobile cloud system in security aspects. The core objective of this paper is to secure the mobile data on cloud environment. In this research article, we comparatively studied and analyzed various encryption algorithms used in mobile cloud base security with proposed new encryption model. Our proposed encryption/decryption method holds the higher security because the more dynamics and randomness are adaptively added into the key generation process with the help of key distribution centre (KDC).
Key-Words / Index Term
Mobile cloud computing, Cloud storage, Cloud Computing; Mobile cloud, Block cipher algorithm. Data encryption/decryption etc
References
[1] Prakash Kuppuswamy, and Saeed Q Y Al-Khalidi, �Analysis of security threats and prevention in cloud storage: Review report�, International Journal of Advanced Research in Engineering and Applied Sciences ISSN: 2278-6252, Vol. 3, January 2014.
[2] Prakash Kuppuswamy, and Saeed Q. Y. Al-Khalidi, �Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm�, MIS Review Vol. 19, No. 2, March 2014, pp. 1-13.
[3] Prakash Kuppuswamy, �Security implementation on Cloud Storage using New Public key algorithm based on Block cipher�, International Journal of Management, IT and Engineering, Volume 4, Issue 5 ISSN: 2249-0558, May 2014.
[4] P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2016, pp. 663-666
[5] R. Ferzli, and I. Khalife, �Mobile cloud computing educational tool for image/video processing algorithms�, In IEEE Digital Signal Processing Workshop and IEEE Signal Processing Education Workshop, 2015, pp. 529-533.
[6] Md Asif Mushtaque, "Comparative Analysis on Different parameters of Encryption Algorithms for Information Security", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (76-82), Apr -2014
[7] Dhanalakshmi, S., S. Suganya, and K. Kokilavani. "Mobile learning using cloud computing." International Journal of Computer and Engineering 2.11 (2014): 102-108.
[8] Parsi kalpana, and Sudha singaraju, �Data Security in Cloud Computing using RSA Algorithm�, International Journal of Research in Computer and Communication technology, ISSN 2278-5841, Vol. 1, Issue 4, September 2012.
[9] M. Sujithra, and G. Padmavathi, �Ensuring Security on mobile device data with two phase RSA algorithm over cloud storage�, Journal of Theoretical and Applied Information Technology, Vol.80. No.2 ISSN: 1992-8645, October 2015.
[10] Mohd Rizuan Baharon, Qi Shi, David L, and Lewellyn-Jones, �A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing�, 978-1-5090-0154-5/15, IEEE International Conference on 2015.
[11] John Rhoton, �Cloud Computing Explained: Implementation Handbook for Enterprises�, 2013.
[12] P. Menezes, Van Oorschot, and S. Vanstone, �Handbook of Applied Cryptography�, CRC Press, 1996.
[13] Prakash kuppuswamy, and C.Chandrasekar, �Enrichment of security through cryptographic public key algorithm based on block cipher�, Indian Journal of Computer Science and Engineering (IJCSE), ISSN : 0976-5166 Vol. 2 No. 3 Jun-Jul 2011.
[14] Prakash Kuppuswamy, C. Chandrasekar, �Optimisation of Public key Algorithm in Block Cipher using Negative Variables�, International Journal of Computer Science Research and Application, Vol. 01, Issue. 01, 2010, pp. 11-23.
[15] Pradeep Sharma, and S. S. Gautam. "Classification of Efficient Symmetric Key Cryptography Algorithms." International Journal of Computer Science and Information Security 14.2 (2016): 105.
[16] E. Ahmed Youssef, �A Framework for secure Healthcare systems based on Big data analytics in mobile cloud computing environments�, International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.2, June 2014.
[17] K. Priyanka and Nagarathna Kulennavar, �A Survey On Big Data Analytics In Health Care�, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, PP.5865-5868.
[18] Javier Andreu-Perez, C.Y. Carmen Poon, D. Robert Merrifield, T.C. Stephen Wong, and Guang-Zhong Yang, �Big Data for Health�, IEEE Journal of biomedical and health informatics, Vol.19 No.4, July 2015.
Citation
P. Kuppuswamy, "Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.133-138, 2016.
A Study on Genetic Algorithm and its Applications
Review Paper | Journal Paper
Vol.4 , Issue.10 , pp.139-143, Oct-2016
Abstract
In order to obtain best solutions, we need a measure for differentiating best solutions from worst solutions. The measure could be an objective one that is a statistical model or a simulation, or it can be a subjective one where we choose better solutions over worst ones. Apart from this the fitness function determines a best solution for a given problem, which is subsequently used by the GA to guide the evolution of best solutions. This paper shows how GA is combined with various other methods and technique to derive optimal solution, increase the computation time of retrieval system the applications of genetic algorithms in various fields.
Key-Words / Index Term
Genetic Algorithm; Optimal Solution; Fitness function
References
[1] J. Holland, �Adaptation in natural and artificial systems�, University of Michigan press, Ann Arbor, 1975.
[2] Noraini Mohd Razali, John Geraghty �A genetic algorithm performance with different selection strategies�, Proceedings of the World Congress on Engineering Vol II, 2011.
[3] D. E. Goldberg, �Genetic Algorithm in Search, Optimization and Machine Learning, Reading, MA: Addison-Wesley, 1989.
[4] Gaidhani, Chaitali R., Vedashree M. Deshpande, and Vrushali N. Bora. "Image Steganography for Message Hiding Using Genetic Algorithm." (2014).
[5] Radwan A., Latef B., Ali A., and Sadek O., �Using Genetic Algorithm to Improve Information Retrieval Systems�, World Academy of Science and Engineering Technology, 17, Issue-2, Page No (6-13), 2006.
[6] K. Krishna and M. N. Murty, �Genetic K-Means Algorithm�, IEEE Transaction on Systems, Man, and Cybernetics�Part B: CYBERNETICS, Vol. 29, No. 3, June 1999.
[7] Shrivastava, Animesh, and Singh Rajawat. "An implementation of hybrid genetic algorithm for clustering based data for web recommendation system." Int J Comput Sci Eng 2.4 (2014): 6-11.
[8] Yi Lu1, Shiyong Lu1, Farshad Fotouhi1, Youping Deng, d. Susan, J. Brown,� an Incremental genetic K- means algorithm and its application in gene expression data analysis�, BMC Bioinformatics 2004.
[9] Sangari, Fardin Esmaeeli, and Mehrdad Nabahat. "Efficacy of Different Strategies in Graph Coloring with Parallel Genetic Algorithms." (2014): 138-141.
[10] LI Jie, G. Xinbo, �A GA-Based Clustering Algorithm forLarge Data Sets With Mixed Numeric and Categorical Values�,IEEE, Proceedings of the Fifth International Conference onComputational Intelligence and Multimedia Applications(ICCIMA�03) 0-7695-1957-1/03, 2003.
[11] Y. Liu, Kefe and X. Liz,� A Hybrid Genetic Based Clustering Algorithm�, Proceedings of the Third InternationalConference on Machine Leaming and Cybernetics, Shanghai,26-29 August 2004.
[12] S. Chiang, S. C. Chu, Y. C. Hsin and M. H. Wang, �Genetic Distance Measure for K-Modes Algorithm�,International Journal of Innovative Computing, Informationand Control ICIC,ISSN 1349- 4198, Volume 2, Number 1, pp.33-40 February 2006.
[13] L. Haldurai and V. Vinodhini, "Parallel Indexing on Color and Texture Feature Extraction using R-Tree for Content Based Image Retrieval", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (11-15), Nov -2015, E-ISSN: 2347-2693
[14] Praveen Ranjan Srivastava and Tai-hoon Kim, �Application of genetic algorithm in software testing� International Journal of software Engineering and its Applications, 3(4), pp.87- 96, 2009.
[15] Ruilian zhao, shanshan lv, �Neural network based test cases generation using genetic algorithm� 13th IEEE international symposium on Pacific Rim dependable computing. IEEE, pp.97 � 100, 2007.
[16] Sreedharamurthy S K and H.R.Sudarshana Reddy, "Feature Subset Selection Using Genetic Algorithms for Handwritten Kannada Alphabets Recognition", International Journal of Computer Sciences and Engineering, Volume-03, Issue-06, Page No (94-99), Jun -2015.
[17] Aly, A.H. and R.C. Peralta,: Comparison of a genetic algorithm and mathematical programming to the design of groundwater cleanup systems, Water Resources Research, 35(8), pp. 2415-2425, 1999.
[18] Amin Dastanpour, Suhaimi Ibrahim and RezaMashinchi, "Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System", International Journal of Computer Sciences and Engineering, Volume-04, Issue-10, Page No (10-18), Oct -2016
[19] Shieh, H-J. and R.C. Peralta,: Optimal system design of in-situ bioremediation using genetic annealing algorithm. In Ground Water: An Endangered Resource, Proceedings of Theme C, Water for a changing global community, 27th Annual Congress of the International Association of Hydrologic Research, pp 95-100, 1997.
[20] Fayad, H, Application of neural networks and genetic algorithms for solving conjunctive water use problems, Ph.D. Dissertation, Utah State University, 152 pp, 2001.
[21] Barth, H, Oceanographic Experiment Design II: Genetic Algorithms, Journal of Oceanic and Atmospheric Technology, 9, 1992, pp. 434-443, 1992.
[22] Porto, V.W., D.B. Fogel, and L.J. Fogel, Alternative neural network training methods, IEEE Expert Syst, June 1995.
Citation
L. Haldurai, T. Madhubala, R. Rajalakshmi, "A Study on Genetic Algorithm and its Applications," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.139-143, 2016.
Automatic Tumor Classification of Brain MRI Images
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.144-151, Oct-2016
Abstract
Brain tumor classification is an active research area in medical image processing and pattern recognition. Brain tumor is an abnormal mass of tissue in which some cells grow and multiply uncontrollably, apparently unregulated by the mechanisms that control normal cells. The growth of a tumor takes up space within the skull and interferes with normal brain activity. The detection of the tumor is very important in earlier stages. Automating this process is a challenging task because of the high diversity in the appearance of tumor tissues among different patients and in many cases similarity with the normal tissues. This paper depicts a novel framework for brain tumor classification based on Gray Level Co-occurrence matrix (GLCM) statistical features are extracted from the brain MRI images, which signify the important texture features of tumor tissue. The experiments are carried out using BRATS dataset, considering two classes viz (normal and abnormal) and the extracted features are modeled by Support Vector Machines (SVM), k-Nearest Neighbor (k-NN) and Decision Tree(DT)for classifying tumor types. In the experimental results, Decision Tree exhibit effectiveness of the proposed method with an overall accuracy rate of 98.68%, this outperforms the SVM and k-NN classifiers.
Key-Words / Index Term
MRI, GLCM, SVM, K-NN, DT, Brain Tumor, Tumor detection, BRATS
References
[1] Ahmed kharrat, Karim Gasmi, et.al, �A Hybrid Approach for Automatic Classification of Brain MRI Using Genetic Algorithm and Support Vector Machine,� Leonardo Journal of Sciences, pp.71-82, 2010.
[2] Ahmed Kharrat, Mohamed Ben Messaoud, et.al, �Detection of Brain Tumor in Medical Images,� International Conference on Signals, Circuits and Systems IEEE, pp.1-6, 2009.
[3] Priyanka, Balwinder Singh. "A review on brain tumor detection using segmentation." International Journal of Computer Science and Mobile Computing (IJCSMC) 2.7 (2013): 48-54.
[4] Ramteke, R. J., and Y. Khachane Monali. "Automatic medical image classification and abnormality detection using K-Nearest Neighbour." International Journal of Advanced Computer Research 2.4 (2012): 190-196.
[5] Vishnumurthy T D, Mohana H S Vaibhav A Meshram and Pramod Kammar, "Suppression of Herringbone Artifact in MR Images of Brain Using Combined Wavelet and FFT Based Filtering Technique", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (66-71), Feb -2016
[6] Azzeddine Riahi, "Image Segmentation Techniques Based on Fuzzy C-Means and Otsu, Applied to the Brain MRI in Tumor Detection", International Journal of Computer Sciences and Engineering, Volume-03, Issue-12, Page No (89-101), Dec -2015
[7] Qurat-Ul-Ain, Ghazanfar Latif, �Classification and Segmentation of Brain Tumor using Texture Analysis,� Recent Advances In Artificial Intelligence, Knowledge Engineering And Data Bases, pp 147-155, 2010.
[8] Vipin Y. Borole, Seema S. Kawathekar, "Study of various DIP Techniques used for Brain Tumor detection and tumor area calculation using MRI images", International Journal of Computer Sciences and Engineering, Volume-04, Issue-07, Page No (39-43), Jul -2016,
[9] G Vijay Kumar and G V Raju, "A Real-Time Approach to Brain Tumor Detection Implementing Wavelets and ANN", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (89-93), Nov -2015
[10] Parag P. Bharne and Deepak Kapgate, "A Review of Classification Techniques in Brain Computer Interface", International Journal of Computer Sciences and Engineering, Volume-02, Issue-12, Page No (68-72), Dec -2014.
[11] Menze, Bjoern H., et al. "The multimodal brain tumor image segmentation benchmark (BRATS)." IEEE Transactions on Medical Imaging 34.10 (2015): 1993-2024.
[12] F. Albregtsen, �Statistical texture measures computed from GLCM�, Image processing Laboratory, Dept of Informatics, University of Oslo, 2008.
[13] Nello Cristianini and John Shawe-Taylor, An introduction to support vector machines and other kernel-based learning methods, Cambridge university press, 2000.
[14] Vladimir Naumovich Vapnik and Vlamimir Vapnik, Statistical learning theory, vol. 1, Wiley New York, 1998.
[15] Keller, James M., Michael R. Gray, and James A. Givens. "A fuzzy k-nearest neighbor algorithm." IEEE transactions on systems, man, and cybernetics 4 (1985): 580-585.
[16] N. Bhatia et al, Survey of Nearest Neighbor Techniques. International Journal of Computer Science and Information Security, Vol. 8, No. 2, 2010.
[17] Leo Breiman, Jerome Friedman, Charles J Stone, and Richard A Olshen, Classification and regression trees, CRC press, 1984.
[18] J. Ross Quinlan, �Induction of decision trees,� Machine learning, vol. 1, no. 1, pp. 81�106, 1986.
[19] Geetika Gupta, RupinderKaur, ArunBansal, MunishBans al, �Analysis and Comparison of Brain Tumor Detection and Extraction Techniques from MRI Images.� International Journal of Advanced Research in Electrical,Electronics and Instrumentation Engineering. Vol. 03(11), pp. 13272-13284, Novembe r 2014.
[20] ManojKKowarandSourabhYadav,�BrainTumor Detction and Segmentation Using Histogram Thresholding.�International Journal of Engineering and Advanced Technology. Vol. 01(04), pp. 16-20, April 2012.
[21] D.Selvaraj et.al / Indian Journal of Computer Science and Engineering (IJCSE)� Mri Brain Image Segmentation Techniques - A Review -ISSN : 0976-5166Vol. 4 No.5 Oct-Nov 2013
Citation
V. Vani, M.K. Geetha , "Automatic Tumor Classification of Brain MRI Images," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.144-151, 2016.
Resource Allocation for Multi-user Multi-Traffic Class in UWB MANET
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.152-156, Oct-2016
Abstract
In this paper we propose to design a Resource allocation for Multi-user Multi-Traffic technique for UWB ad hoc networks as an extension work to MAC protocol for UWB MANET, which combines the DEX Protocol with DU-MAC protocol. Initially the incoming traffic is classified according to their QoS requirements. The packets with strict QoS constraints (like real-time video or voice) are stored in a special queue and other packets are stored in a normal queue. Then resource allocation is done according to packet reception rate (PRR) and queue size. Our work in the paper includes an algorithm for classification of packets, mechanisms for resource allocation for multi-user environment besides estimation of probability of error rate. Our extensive simulations revealed that the proposed approach outperforms existing one in terms of average packet delivery ratio, average end-to-end-delay, packet drop, overhead.
Key-Words / Index Term
UWB MANET, Scheduling, Multi-user
References
[1] Bhavana.B.Turorikar, and M.A.Shukla, �Multicasting Over MANET through Segmp by Secure Zone Leader Election�, International Journal of Computer Trends and Technology, Vol. 4, No. 2, 2013.
[2]. Rajaram Ayyasamy and Palaniswami Subramani, �An Enhanced Distributed CertificateAuthority Scheme for Authentication in Mobile Ad-hoc Networks�, The International Arab Journal of Information Technology, Vol. 9, No. 3, May 2012.
[3] Kyul Park , Hiroki Nishiyama , Nirwan Ansari and Nei Kato, �Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks�, Vehicular technology conference (VTC 2010-Spring).
[4] Bozidar Radunovic and Jean-Yves Le Boudec, Optimal Power Control, Scheduling and Routing inUWB Networks, IEEE Journal on Selected Areas in Communications, 2004.
[5] Arjunan Rajeswaran, Gyouhwan Kim and Rohit Negi, "A scheduling framework for UWB & cellularne tworks," Broadband Networks, In Proceedings of First International Conference on Broad Nets, 2004.
[6] Kuang-Hao Liu, Lin Cai, and Xuemin Shen, "Multiclass Utility-Based Scheduling for UWB Networks," IEEE Transactions on Vehicular Technology, Vol. 57, No. 2, 2008.
[7] ZOU ChuanYun, HAAS Zygmunt & ZOU Sheng, �Throughput maximization in UWB-basedad-hoc networks,�Springer-Verlag Berlin Heidelberg, Vol. 53, No. 12, 2010.
[8] P.Sangeetha and Dr.R.Mala, "Cross-Layer arrangement for Wireless Mesh Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-09, Page No (85-89), Sep -2014
[9] Dongsheng Ning, Xiaoyan Xu, Yanping Yu, Xinxin Liu, Xiaoyan Wang, "UWB-based Receiver Initiated MAC Protocol with Packet Aggregation and Selective Retransmission," Journal of Computers, Vol. 8, No. 11, 2013.
[10] Tommaso Melodia, and Ian F. Akyildiz, Cross-Layer QoS-Aware Communication for Ultra Wide Band Wireless Multimedia Sensor Networks," IEEE Journal on Selected Areas in Communications, Vol. 28, No. 5, 2010 .
[11] Kuang-Hao Liu, Lin Cai, and Xuemin Shen, "Exclusive-Region Based Scheduling Algorithms for UWB WPAN," IEEE Transactions on Wireless Communications, Vol. 7, No. 3, 2008.
[12] Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)." International Journal of Computer Science and Information Security 9.4 (2011): 106.
[13] Kishore, Nand, Sukhvir Singh, and Renu Dhir. "Energy Based Evaluation of Routing Protocol for MANETs." International Journal of Computer Science and Engineering (IJCSE) 2.3 (2014): 14-17.
Citation
Y.V.A. Satyanarayana, K. P. Raju, P V. Naganjaneyulu, "Resource Allocation for Multi-user Multi-Traffic Class in UWB MANET," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.152-156, 2016.
Using Green Computing Resources to find Fraud Mobile Apps Based Reviews and Ratings
Review Paper | Journal Paper
Vol.4 , Issue.10 , pp.157-160, Oct-2016
Abstract
The model of Green Computing (GC) is gaining increasing popularly extent in the preceding years. GC is a dynamic research extent which studies proficient use of calculating resource. We apply the GC concept in mobile app development to decrease the time & find scam apps from the app store. The Mobile App is a very widely held and well-known concept due to the fast development in the portable technology. In this concept, we are proposing two enhancements. First of all, utilizing endorsement of scores by the administrator to recognize the correct surveys and rating scores. Next, by a same individual for pushing up that application on the pioneer board are confined. Two different constraints are considered for accepting the feedback given to an application. We are likewise contributing the three kinds of proofs: Ranking grounded confirmation, Rating grounded proof and Review grounded proof. In addition, we propose an enhancement grounded application to incorporate every one of the confirmations for extortion recognition in light of EIRQ (Efficient Information Retrieval for Ranked Query) calculation utilizing GC. Finally, the proposed technique will be assessed with genuine App information which is to be gathered from the App Store for quite a while period.
Key-Words / Index Term
Mobile Apps, Ranking scam Detection, Green Computing, Rating nd Review
References
[1] Neha Tiwari, �Green Computing�, in International Journal of Innovative Computer Science & Engineering, Volume 2 Issue 1; 2015, Page No.01-04.
[2] Vivek Pingale, Laxman Kuhile, Pratik Phapale, Pratik Sapkal, Prof. Swati Jaiswal, �Fraud Detection & Prevention of Mobile Apps using Optimal Aggregation Method�, in IJARCSSE, Vol.6, Issue.3, March 2016.
[3] Nai-Wei Lo, Kuo-Hui Yeh, Chuan-Yen Fan, �Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid�, IEEE Systems Journal, Vol.10, Issue.4, Dec. 2016.
[4] Gaurav Jindal, �Green Computing-Future of Computers�, in International Journal of Emerging Research in Management &Technology, PP:14-18, Dec 2012.
[5] Saurabh Patodi, Richa Sharma, Aniruddha Solanki, �Green Computing: Driving Economic and Environmental Conditions�, in IJCSIT, Vol. 6, Issue.4, 2015,
[6] Hengshu Zhu, Chuanren Liu, Yong Ge, Hui Xiong ; Enhong Chen, �Popularity Modeling for Mobile Apps: A Sequential Approach�, IEEE Transactions on Cybernetics ( Volume: 45, Issue: 7, July 2015 )
[7] Piotr Pazowski, �Green Computing: Latest Practices and Technologies for ICT Sustainability�, in TIIM, May 2015.
[8] N.V., Vijesh Joe, C. and Narmatha, K. Veenaa Deeve, �Study on Benefits of Green Computing�, International Journal of Current Research, Vol.7, Issue.4, April, 2015.
Citation
A. Lakshmi, N.V. Devi, "Using Green Computing Resources to find Fraud Mobile Apps Based Reviews and Ratings," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.157-160, 2016.
Green Computing Approaches on Vanet Using ACPN Method
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.161-165, Oct-2016
Abstract
VANET`s are a confident instruments to permit correspondence between methods for transportation on streets. VANET deals with the consistent premise of ongoing framework where the automobile s more as hubs and go with rapid on streets. There are numerous security issues like verification, passage assaults, insightful framework approach, impact identification, clog shirking and so on.,. Various techniques have been offered to manage different issues in VANET. In this manuscript, we demonstrate a model of Authentication Structure with Restricted Privacy-Preservation and Non-Repudiation automobile way to deal with bolster green automobile correspondence for urban operation safeguard. Utilizing vehicular innovation could beneï¬t operation protect automobile s by empowering every automobile spreads the data related before landing at the episode put. With an end goal to comprehend the operation protect exercises, thinks about working on this issue study are briefly examined. Green automobile interchanges necessities are displayed to demonstrate the signiï¬cance of utilizing vehicular innovation. Tests utilizing .Net to quantify the normal defer time per trek and normal throughput for three distinct situations are exhibited.
Key-Words / Index Term
VANET, Vehicle Communication, Green Computing, Ad Hoc Network, Wireless Network, ACPN
References
[1] Xiaohu Ge, Hui Cheng, Guoqiang Mao, Yang Yang & Song Tu, �Vehicular Communications for 5G Cooperative Small-Cell Networks�, in IEEE Vehicular Technology, Vol.65, Issue.10, Oct. 2016.
[2] M.Boban & P.M. d`Orey, �Exploring the Practical Limits of Cooperative Awareness in Vehicular Communications�, in IEEE Vehicular Technology, Vol.65, Issue.6, June 2016.
[3] M.Uysal, Z.Ghassemlooy, A.Bekkali, A.Kadri & H.Menouar, �Visible Light Communication for Vehicular Networking: Performance Study of a V2V System Using a Measured Headlamp Beam Pattern Model�, in IEEE Vehicular Technology Magazine, Vol.10, Issue.4, Dec.2015.
[4] Li Li, D.Wen & D.Yao, �A Survey of Traffic Control with Vehicular Communications�, in IEEE on Intelligent Transportation Systems, Vol.15, Issue.1, Feb.2014.
[5] U.Rajput, F.Abbas & Heekuck Oh, �A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET�, in IEEE, Vol. 4, October 2016.
[6] Arrate Alonso Gomez & Christoph F. Mecklenbr�uker, �Dependability of Decentralized Congestion Control for Varying VANET Density�, in IEEE Vehicular Technology, Vol. 65, Issue.11, Nov.2016.
[7] A.Karmokar & A.Anpalagan, �Green Computing and Communication Techniques for Future Wireless Systems and Networks�, in IEEE Potentials, Vol.32, Issue.4, July-Aug. 2013.
[8] Qutaiba Ibrahim, �Design, implementation and optimization of an energy harvesting system for vehicular ad hoc networks` road side units�, in IET Intelligent Transport Systems, Vol.8, Issue.3, May.2014.
[9] W.Feng, H.Alshaer, J.M.H.Elmirghani, �Green information and communication technology: energy efficiency in a motorway model�, in IET Communications, Vol.4, Issue.7, April.2010.
[10] R.Singh & S.Miglani, �Efficient and secure message transfer in VANET�, in: Inventive Computation Technologies (ICICT), Aug. 2016
[11] M.Dixit, R.Kumar & Anil Kumar Sagar, �VANET: Architectures, research issues, routing protocols, and its applications�, in Computing, Communication and Automation (ICCCA), 2016 International Conference on April 2016.
[12] N.Goel, G.Sharma & I.Dhyani, �A study of position based VANET routing protocols�, in Computing, Communication and Automation (ICCCA), 2016 International Conference on April 2016.
[13] Y.Mao, H.Luan, W.Liu, R.Yang, M.Jin, X.Jin & Z.Xu, �Experimental investigation of carrierless amplitude-phase transmission for vehicular visible light communication systems�, in Communication Systems (ICCS), 2016 IEEE International Conference on Dec. 2016.
[14] Jamal Toutouh & Enrique Alba, �Green OLSR in VANETs with Differential Evolution�, GECCO�12, July 2012.
[15] Maazen Alsabaan, �Greener electric vehicles with VANETs�, in: Electrical and Computer Engineering (CCECE), May 2015.
Citation
S. Suganya, N.V. Devi, "Green Computing Approaches on Vanet Using ACPN Method," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.161-165, 2016.
Improved Random Area Selective Image Steganography with LSBMR
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.166-171, Oct-2016
Abstract
Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganogra- phy can break the stego system. To prevent the breakdown of the stego system data is embedded in the selected area of an image which reduces the probability of detection. Most of the existing adaptive image steganography techniques achieve low embedding capacity. In this paper a high capacity Predictive Edge Adaptive image steganography technique is proposed where selective area of cover image is predicted using Modified Median Edge Detector (MMED) predictor to embed the binary payload (data). The cover image used to embed the payload is a grayscale image. Experimental results show that the proposed scheme achieves better embedding capacity with minimum level of distortion and higher level of security. The proposed scheme is compared with the existing image steganography schemes. Results show that the proposed scheme achieves better embedding rate with lower level of distortion.
Key-Words / Index Term
Edge adaptive .High level bit plane .Low level bit plane .Predictive image
References
[1]. Alattar M (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
[2]. Böhme R (2010) Principles of modern steganography and steganalysis. In: Böhme R (ed) Advanced statistical steganalysis, 1st edn. Springer, Berlin Heidelberg, pp 11–77
[3]. Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side-match vector quantiza- tion. IEEE Trans Circuits Syst Video Technol 16(10):1301–1308
[4]. Cheddad, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752
[5]. Farid H (2002) Detecting hidden messages using higher-order statistical models. IEEE Image Process IntConfProc 2:905–908
[6]. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security, pp 27–30. doi:10.1145/1232454.1232466
[7]. Harmsen J, Pearlman W (2003) Steganalysis of additive-noise modelable information hiding. SPIE Electron Imaging ConfProc 5020:131–142
[8]. Hempstalk K (2006) Hiding behind corners: using edges in images for better steganography. In: Computing Women’s Congress Proceedings, Hamilton, New Zealand
[9]. Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140
[10]. Huang F, Li B, Huang J (2007) Attack LSB matching steganography by counting alteration rate of the number of neighborhood gray levels. IEEE Image Process ConfProc 1:401–404
[11]. Huang F, Zhong Y, Huang J (2014) Improved algorithm of edge adaptive image steganography based on LSB matching revisited algorithm. Digital-forensics and watermarking. Lect Notes ComputSci 8389:19–31
[12]. Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. Lect Notes ComputSci 4283:348–361
[13]. Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090
[14]. Ker D (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444
[15]. Khosravi MJ, Naghsh-Nilchi AR (2014) A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems 20(2):215–226
[16]. Kim K, Lee M, Lee H, Lee H (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083–3096
[17]. Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591
[18]. Luo XY, Wang DS, Wang P, Liu FL (2008) A review on blind detection for image steganography. Signal Process 88:2138–2157
[19]. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193
[20]. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214
[21]. Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel value differencing scheme. Multimed Tools Appl 52(2–3):407–430
[22]. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
[23]. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
[24]. Ou D, Sun W (2014) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl. doi:10.1007/s11042-014-2059-2
[25]. Roy R, Changder S, Sarkar A, Debnath NC (2013) Evaluating image steganography techniques: future research challenges. In: Proceedings of International Conference on Computing, Management and Telecommunications (ComManTel), pp 309–314. doi:10.1109/ComManTel.2013.6482411
[26]. Thodi M, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
[27]. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
[28]. Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143
[29]. Ulutas G, Ulutas M, Nabiyev VV (2012) Secret image sharing with reversible capabilities. International Journal of Internet Technology and Secured Transactions 4(1):1–11
[30]. Vetterli M (1987) A theory of multirate filter banks. IEEE Trans Acoust Speech Signal Process 35(3):356– 372
[31]. Walton S (1995) Image authentication for a slippery new age. Dr Dobbs J Softw Tools Prof Program 20:18–26
[32]. Wu HC, Wang HC, Tsai CS, Wang CM (2010) Reversible image steganographic scheme via predictive coding. Displays 31:35–43
[33]. Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226–2238
Citation
Neethan Elizabeth Abraham, Reshm Chandran, Jyothisree, Sunu Ann Thomas, "Improved Random Area Selective Image Steganography with LSBMR," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.166-171, 2016.
Improved of Stair Climbing Wheelchair for Differently Abled People
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.172-179, Oct-2016
Abstract
This paper presents a new version of Wheelchair’s, a wheelchair with stair climbing ability. The wheelchair is able to climb single obstacles or staircases thanks to a hybrid wheel- leg locomotion unit with a triple-wheels cluster architecture. The new concept presented in this work represents an improvement respect to previous versions. Through a different arrangement of functional elements, the wheelchair performances in terms of stability and regularity during movement on stair have been increased. In particular, attention has been paid to ensure a regular and comfortable motion for the user during stair climbing operation. For this reason, a cam mechanism has been introduced and designed with the aim to compensate the oscillation generated on the wheelchair frame by the locomotion unit rotation. A design methodology for the cam pro?le is presented. Moreover, a para- metric analysis on the cam pro?le and on the mechanism dimensions has been conducted with the aim to ?nd a cam pro?le with suitable dimensions and performances in terms of pressure angle and radius of curvature.
Key-Words / Index Term
Stair-climbing wheelchair, Triple-wheels, Cam mechanism, Mechanism design, Architectural barriers
References
[1] Papworth Trust, Disability in the United Kingdom 2014: Facts and Figures, 2014.
[2] U.S Census Bureau, Americans with Disabilities: 2005, 2008.
[3] Disability Statistics Center Institute for Health and Aging, Mobility Device Use in the United States, University of California, 2000.
[4] L. Bruzzone, G. Quaglia, Review article: locomotion systems for ground mobile robots in unstructured environments, Mech. Sci. 3 (2012) 49–62.
[5] Y. Sugahara, et al., Walking up and down stairs carrying a human by a biped locomotor with parallel mechanism, in: Proceeding of International Conference on Intelligent Robots and Systems (IROS), Edmonton, Alberta, Canada, 2005, pp. 1489–1494.
[6] S. Yu, T. Wang, et al., A tip-over and slippage stability criterion for stair-climbing of a wheelchair robot with variable geometry single tracked mecha- nism, in: Proceeding of International Conference on Information and Automation (ICIA), Shenyang, China, 2012, pp. 88–93.
[7] S. Yu, T. Wang, et al., Con?guration and tip-over stability analysis for stair-climbing of a new-style wheelchair robot, in: Proceeding of International Conference on Mechatronics and Automation (ICMA), Xi’an, China, 2010, pp. 1387–1392.
[8] H. Wang, W. Zhang, et al., Research on a kind of leg-wheel stair-climbing wheelchair, in: Proceeding of International Conference on Mechatronics and Automation (ICMA), 2014, pp. 2101–2105.
[9] Y. Bang, C. Lee, et al., Two-legged stair-climbing wheelchair and its stair dimension measurement using distance sensors, in: Proceeding of Interna- tional Conference on Control, Automation and Systems (ICCAS), Gyeonggi -do, Korea, 2011, pp. 1788–1791.
[10] J. Yuan, S. Hirose, Research on leg-wheel hybrid stair-climbing robot, Zero Carrier, in: Proceeding of International Conference on Robotics and Biomimetics (ROBIO), Shenyang, China, 2004, pp. 654–659.
[11] M.J. Lawn, T. Ishimatsu, Modeling of a stair-climbing wheelchair mechanism with high single-step capability, Neural Syst. Rehab. Eng. 11 (3) (2003) 323–332.
[12] J. Liu, Y. Wu, et al., High-order sliding mode-based synchronous control of a novel stair-climbing wheelchair robot, J. Control Sci. Eng. (2015).
[13] A. Gonzalez, R. Morales, et al., Improving the mechanical design of new staircase wheelchair, Ind. Robot 34 (2) (2007) 110–115.
[14] A. Gonzalez, E. Ottaviano, M. Ceccarelli, On the kinematic functionality of a four-bar based mechanism for guiding wheels in climbing steps and obstacles, Mech. Mach. Theory 44 (8) (2009) 1507–1523.
[15] J. Chocoteco, R. Morales, V. Feliu, Improving the climbing/descent performance of stair-climbing mobility systems confronting architectural barriers with geometric disturbances, Mechatronics 30 (2015) 11–26.
[16] R. Morales, V. Feliu, et al., Coordinated motion of a new staircase climbing wheelchair with increased passenger comfort, in: Proceeding of Interna- tional Conference on Robotics and Automation (ICRA), Orlando, Florida, USA, 2006, pp. 3995–4001.
[17] R. Morales, V. Feliu, A. González, Optimized obstacle avoidance trajectory generation for a recon?gurable staircase climbing wheelchair, Rob. Autom. Syst. 58 (1) (2010) 97–114.
[18] S. Motoki, N. Tomokuni, et al., Wheeled inverted pendulum type robotic wheelchair with integrated control of seat slider and rotary link between wheels for climbing stairs, in: Workshop on Advanced Robotics and its Social Impacts (ARSO), Evanston, Illinois, USA, 2014, pp. 121–126.
[19] N.M.A. Ghani, A.N.K. Nasir, M.O. Tokhi, Optimization of fuzzy logic scaling parameters with spiral dynamic algorithm in controlling a stair climbing wheelchair: ascending task, in: Proceeding of International Conference on Methods and Models in Automation and Robotics (MMAR), Mie?dzyzdroje, Poland, 2014, pp. 776–781.
[20] C. Chen, H. Pham, Design and fabrication of a statically stable stair-climbing robotic wheelchair, Ind. Robot 36 (6) (2009) 562–569.
[21] Y. Sugahara, N. Yonezawa, K. Kosuge, A novel stair-climbing wheelchair with transformable wheeled four-bar linkages, in: Proceeding of International Conference on Intelligent Robots and Systems (IROS), Taipei, Taiwan, 2010, pp. 3333–3339.
[22] Kenneth Ray Cox, “Battery Powered Stair-Climbing Wheelchair”, U.S. Patent No. 6484829, Nov. 26, 2002.
[23] G. Quaglia, et al., The Epi. q-1 hybrid mobile robot”, Int. J. Rob. Res. 29 (1) (2009) 81–91.
[24] G. Quaglia, L. Bruzzone, et al., A modular approach for a family of ground mobile robots, Int. J. Adv. Rob. Syst. 10 (2013).
[25] G. Quaglia, M. Nisi, Design and construction of a new version of the Epi.q UGV for monitoring and surveillance tasks, Proceeding of the International Mechanical Engineering Congress & Exposition (IMECE), 2015. Houston, Texas.
[26] G. Quaglia, W. Franco, R. Oderio, Wheelchair. q, a motorized wheelchair with stair climbing ability, Mech. Mach. Theory 46 (11) (2011) 1601–1609.
[27] G. Quaglia, W. Franco, R. Oderio, Wheelchair.q, a mechanical concept for a stair climbing wheelchair, in: Proceeding of International Conference on Robotics and Biomimetics (ROBIO), Guilin, China, 2009, pp. 800–805.
[28] G. Quaglia, W. Franco, M. Nisi, Design of a recon?guration mechanism for an electric stair-climbing wheelchair, Proceeding of the International Me- chanical Engineering Congress & Exposition (IMECE), 2014. Montreal, Quebec, Canada.
[29] G. Quaglia, W. Franco, M. Nisi, Evolution of wheelchair.q, a stair-climbing wheelchair, Proceeding of the 14th World Congress in Mechanism and Machine Science, 2015. Taipei, Taiwan.
[30] R.L. Norton, Design of Machinery: An Introduction to the Synthesis and Analysis of Mechanisms and Machines, McGraw-Hill Professional, 2004.
[31] P.L. Magnani, G. Ruggieri, Meccanismi per macchine automatiche, Utet, 1986.
Citation
Arun Jose, Leneesh N Gopal, Jishnu M, Harikrishnan A R, "Improved of Stair Climbing Wheelchair for Differently Abled People," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.172-179, 2016.
Design and Implementation of Automatic Field Irrigation System using Sensors
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.180-185, Oct-2016
Abstract
Agriculture needs 85 percent of the available freshwater and its requirement may increase in future. Hence, a system is needed to utilize water e?ciently in agriculture. The automatic irrigation control system is used to achieve this aim.The modern drip irrigation system lessens a signi?cant amount of water usage compared to the traditional methods. And some crops need variable amounts of water as it grow e.g. paddy. This paper proposes an automation of drip irrigation in which the smartphone initially captures soil image, calculates its wetness level and transmits the data onto the microcontroller through GSM module intermittently. The microcontroller decides the irrigation and sends the status of the ?eld to the Farmer’s mobile phone. The system is tested for paddy ?eld for over a period of three months. It is observed from the experimental setup, that it saves nearly 41.5percentage and 13percentage of water compared to the conventional ?ood and drip irrigation methods respectively.
Key-Words / Index Term
Android application, Drip irrigation, GSM module, Microcontroller
References
[1] Bindu G, Shubham A, Jatin S. Crop yield forecasting using fuzzy logic and regression model. Comput. Electr. Eng. 2018;67:383–403.
[2] Jian G, Guanghua Y, Pengfei H, Jinlu G, Lijun C. An improved back propagation neural network prediction model for subsurface drip irrigation system. Comput. Electr. Eng. 2017;60:58–65.
[3] Jino RSR, Jackuline MD. Application of wireless sensor networks- A survey. In: IEEE international conference on Innovations in Electrical, Electronics, Instrumentation and media technology ICIEEIMT; 2017. p. 325–9.
[4] Shuangyin L, Longqin X, Daoliang L. Multi-scale prediction of water temperature using empirical mode decomposition with back-propagation neural networks. Comput. Electr. Eng. 2016;49:1–8.
[5] Navarro HH, Martínez-del RJ, Domingo MR, Soto VF, Torres SR. A decision support system for managing irrigation in agriculture. Comput. Electron. Agric. 2016;124:121–31.
[6] Roshan ZA, Rajashekhar CB, Shilpa SC. Cluster-based data aggregation for pest identi?cation in coffee plantations using wireless sensor networks. Comput. Electr. Eng. 2016;56:591–607.
[7] Yuttana I, Sarun S. Android-based rice leaf color analyzer for estimating the needed amount of nitrogen fertilizer. Comput. Electron. Agric. 2015;116:228–33.
[8] Guodong S, Tao H, Gaoxiang Y, Jianbo J. Real-time and clock-shared rainfall monitoring with a wireless sensor network. Comput. Electron. Agric. 2015;119:1–11.
[9] Jose P, Gemma H, Coen D, Alberto G, Oscar C. Design of a low-cost wireless sensor network with UAV mobile node for agricultural applications. Comput. Electron. Agric. 2015;119:19–32.
[10] Farshad V, Mahmoud O, Amy K, Hossein M. Development of an android app to estimate chlorophyll content of corn leaves on contact imaging. Comput. Electron. Agric. 2015;116:211–20.
[11] Joaquin G, Juan FVM, Alejandra NG, Miguel APG. Automated irrigation system using a wireless sensor network and GPRS module. IEEE Trans. Instrum. meas. 2014;63(1):166–76.
[12] Kumar V, Vimal BK, Kumar R, Kumar M. Determination of soil PH by using digital image processing technique. J. Appl. Nat. Sci. 2014;6(1):14–18.
[13] Vyasa S, Marlin HM. Exploring energy e?cient architectures in passive wireless nodes for IoT applications. IEEE Circuits Syst. Mag. 2014;14(2):48–54.
[14] Vyasa S, Marlin HM. Low power 8051-MISA based remote execution unit architecture for IoT and RFID applications. Int. J. Circuits Architect. Des. 2013;1(1):4–19.
[15] Nilesh RP, Rahul BL, Swarup SM, Ashwin AB. Microcontroller based drip irrigation system using smart sensor. In: Annual IEEE India Conference (INDICON); 2013. p. 1–5.
[16] Aiping G, Xiang W, Zhengjun Q, Yong H. A handheld device for leaf area measurement. Comput. Electron. Agric. 2013;98:74–80.
[17] Jeroen B, Dieter C, Marloes P, Thomas B, Stijn D, Thomas JC, Patrick W, Ronald T, Ward DC. Mobile application for impedance-based biomimetic sensor readout. IEEE Sens. J. 2013;13(7):2659–65.
[18] Nicholas JC, Evan WC, John WH, Graham AM. Using a mobile phone Short Messaging Service (SMS) for irrigation scheduling in Australia – Farmers’ participation and utility evaluation. Comput. Electron. Agric. 2012;84:132–43.
[19] Vyasa S, Ajay O, Marlin HM. Low power solutions for wireless passive sensor network node processor architecture. In: Fei H, Qi H, editors. Intelligent sensor Networks: the integration of sensor Networks, signal processing and machine learning. Boca Raton, FL: CRC Press; 2012. p. 515–28.
[20] Boon GL, Wan YC. Driver alertness monitoring using fusion of facial features and bio-signals. IEEE Sens, J. 2012;12(7):2416–22.
[21] Daniel KF, Hirut K. A low-cost microcontroller-based system to monitor crop temperature and water status. Comput. Electron. Agric. 2010;74(1):168–73.
[22] Kim Y, Evans RG. Software design for wireless sensor-based site-speci?c irrigation. Comput. Electron. Agric. 2009;66(2):159–65.
[23] Mark H, Michael JL, David B, Gu-Yeon W. Survey of hardware systems for wireless sensor networks. J. Low Power Electron. 2008;4:1–10.
[24] Jury WA, Vaux HJ. The emerging global water crisis: managing scarcity and con?ict between water users. Adv. Agron. 2007;95:1–76.
[25] Xu N. A survey of sensor network applications. IEEE Commun. Mag. 2002;40(8):1–9.
[26] http://www.thehindu.com/news/national/tamil-nadu/where-paddy-requires-only-drops-of-water/article4743549.ece.
[27] Studio encoding parameters of digital television for standard 4:3 and wide screen 16:9 aspect ratios, International Telecommunication Union Recom- mendation BT.
Citation
Preethy Sebastian, Susan V Nainan, Jennies Scaria, "Design and Implementation of Automatic Field Irrigation System using Sensors," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.180-185, 2016.