A Novel Conceptual Solution for Security Enhancement in Internet of Things
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.153-156, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.153156
Abstract
Internet of Things (IOT) makes the smart devices eventually as stepping stones for cyber-physical smart pervasive framework development. IOT is a dynamic global network infrastructure where large amount of information is being transferred through network with interoperable communication protocols. Research and innovation is being carried out in the areas of IOT on semantic interoperability, cyber-physical system, security, and various network technologies. Security is the major challenge among these different areas in the fields of IOT. In this paper, we propose a new conceptual solution to enhance the security in IOT applications based on the feature level fusion of iris and fingerprint biometric traits through deep learning feature extractor Extreme Learning Machine (ELM). Forward Error Correction (FEC) is employed on the fused multimodal biometric traits to encrypt and secure the biometric data.
Key-Words / Index Term
Extreme Learning Machine; Internet of Things; Information; Multimodal Biometrics; Security
References
[1] L. Mainetti, L. Patrono, and A. Vilei, “Evolution of wireless sensor networks towards the Internet of Things: A survey`” in Proc. 19th Int. Conf. Softw., Telecommun. Comput. Netw. (SoftCOM), pp. 1_6, Sep. 2011.
[2] Dr.Madhavi Gudavalli, Dr.S.Viswanadha Raju, Dr.A.VinayaBabu and Dr.D.Srinivasa Kumar, “MultiModal Biometrics-Sources, Architecture & Fusion Techniques: An Overview”, IEEE-International Symposium on Biometrics and Security Technologies (ISBAST’12), Taipei, Taiwan, March 26-29, 2012.
[3] SubhashV.Thul, AnuragRishishwar, NeeteshRaghuwanshi, “Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for Multimodal Biometrics Identification”, International Research Journal of Engineering and Technology (IRJET), Volume: 03, Issue.02, Feb 2016.
[4] Ashraf Aboshosha, Kamal A. El Dahshan, Eman A. Karam, Ebeid A. Ebeid, “Score Level Fusion for Fingerprint, Iris and Face Biometrics”, International Journal of Computer Applications by IJCA Journal, Volume 111 - Number 4, DOI: 10.5120/19530-1171, 2015.
[5] Erik Cambria, Guang-Bin Huang, Liyanaa rachchi Lekamalage ChamaraKasun, Hongming Zhou, Chi Man Vong, Jiarun Lin, Jianping Yin, ZhipingCai, Qiang Liu, “Extreme Learning Machines Trends & Controversies”, IEEE Intelligent Systems, DOI: 10.1109/MIS.2013.140, Volume: 28, Issue: 6, pp. 30-59, Feb 2014.
[6] Dr.S.Viswanadha Raju, P.Vidyasree, Dr.Madhavi Gudavalli “Reinforcing The Security In India’s Voting Process Through Biometrics”, International conference on Advanced computer science and information technology, Chennai September 2014.
[7] S.N.Deepa, B.Arunadevi, “Extreme learning machine for classification of brain tumor in 3D MR images”, Informatologia, Vol.46 No.2, http://hrcak.srce.hr/106430, Jun 2013.
[8] Zhiyong Huang, Yuanlong Yu, Jason Gu, Huaping Liu, “An Efficient Method for Traffic Sign Recognition Based on Extreme Learning Machine”, IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2016.2533424, Volume: PP, Issue: 99,pp. 1-14, Mar 2016.
[9] P.Vidyasree, Dr.S.ViswanadhaRaju, Dr.Madhavi Gudavalli, “Desisting The Fraud In India’s Voting process through Multi modal Biometrics”,IEEE 6th International Conference on Advanced Computing 2016.
[10] J. Höller, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand, and D. Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence”, Amsterdam, The Netherlands: Elsevier, 2014.
[11] Gurpeet Kaur, Manreet Sohal, “IOT Survey: The Phase Changer in Healthcare Industry” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue 2, April 2018.
[12] Anusha Bharati, Ritika Thakur, Kavita Mhatre, “Protection of Industrial and Residential areas by Wireless Gas Leakage Detector using IOT and WSN”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.62-67, June 2017.
[13] National Highway Traffic Safety Administration, "Traffic safety facts 2012," DOT HS 812 012, U.S. Department of Transportation, April 2014, pp. 42.
Citation
Madhavi Gudavali, Vidyasree P, Viswanadha Raju S, "A Novel Conceptual Solution for Security Enhancement in Internet of Things," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.153-156, 2018.
Deadline aware fuzzy scheduler for parallel computing environment
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.157-161, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.157161
Abstract
Parallel computing has been gaining much attention in recent years due to the fact that many real-world applications have become more complex and dynamic. Due to advances in parallel computing, the user base of cloud computing is increasing hugely and therefore there is need of scheduling algorithms in order to schedule all those resources provided by parallel servers. It has been found that the scheduling techniques developed so far have some limitations; i.e. no one is perfect in every case. The majority of the existing techniques have neglected one of these issues: the most of the existing researchers have neglected the use of the deadline constraint of jobs while designing the fuzzy membership functions for efficiently scheduling the jobs in parallel environment. The majority of existing researchers who have designed fuzzy based job scheduling techniques have neglected the use of job co-allocation while scheduling the jobs on available servers. In this paper a new rule based and deadline aware fuzzy scheduler have been proposed which outperforms the existing schedulers.
Key-Words / Index Term
Deadline; scheduling; Co-allocation; Fuzzy logic; Fuzzy rules
References
[1] Jun Wang ,Dezhi Han1, Ruijun Wang ”A new rule-based power-aware job scheduler for Supercomputers” Springer Science& Business Media, LLC, part of Springer Nature 2018.
[2] NirmalaH , Dr.Girijamma H A “Priority based Scheduling algorithm using Fuzzy Technique” 2016 International Conference on Computational Systems and Information Systems for Sustainable Solutions.
[3] Zhijia Chen, Yuanchang Zhu, Yanqiang Di, and Shaochong Feng “A Dynamic Resource Scheduling Method Based on Fuzzy Control Theory in Cloud Environment” Journal of Control Science and Engineering Volume 2015.
[4] John Yen, Jonathan Lee, Nathan Pfluger, and Swami Natarajan “Designing a Fuzzy Scheduler for Hard Real-Time Systems” https://ntrs.nasa.gov/search.jsp?R=19930020348 2018-05-17.
[5] Oğuzhan Ahmet Arık & M. Duran Toksarı “Multi-objective fuzzy parallel machine scheduling problems under fuzzy job deterioration and learning effects” International Journal of Production Research, 2017 https://doi.org/10.1080/00207543.2017.1388932.
[8] Giovanni Mazzuto, Maurizio Bevilacqua and Filippo E. Ciarapica “A heuristic scheduling algorithm based on fuzzy logic and critical chain project management” Int. J. Project Organisation and Management, Vol. 9, No. 4, 2017.
[9] M.M.M. Fahmy “A fuzzy algorithm for scheduling non-periodic jobs on soft real-time single processor system” Elsevier 2010.
[11] Shatha J. Kadhim, Kasim al-aubidy “Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm” January 2010.
[12] Rajani Kumari, Vivek Kumar Sharma, Sandeep Kumar “Design and Implementation of Modified Fuzzy based CPU Scheduling Algorithm” International Journal of Computer Applications. 2013
[13] Matthew T. Ogedengbe, Moses A. Agana “New Fuzzy Techniques for Real-Time Task Scheduling on Multiprocessor Systems” International journal of computer trend and technology 2017.
[14] Nirmala H, Dr.Girijamma H A “Fuzzy Scheduling Algorithm for Real –Time multiprocessor system” International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014.
[15] Zhijia Chen, Yuanchang Zhu, Yanqiang Di, and Shaochong Feng “A Dynamic Resource Scheduling Method Based on Fuzzy Control Theory in Cloud Environment” Journal of Control Science and Engineering Volume 2015.
[16] Er. Inderpal Singh, Er. Aman Arora “Fuzzy Based Improved Multi Queue Job Scheduling For Cloud Computing” International Journal of Advanced Research in Computer Science, May-June, 2015.
[17] S. Saravana Kumar “Improved CPU Utilization using Advanced Fuzzy Based CPU Scheduling algorithm (AFCS)” International Journal of Scientific Research in Science, Engineering and Technology 2016.
[18] Jian li, meili tang, wenhai shen “Improved FIFO Scheduling Algorithm Based on Fuzzy Clustering in Cloud Computing” MDPI 2017.
[19] Ming; Yi, John; Zeng, Edward ”fuzzy based scheduling algorithms”
[20] Dr. G. Geetharamani, C. Daniel Sundar Rajan, J. Arun Pandian “Fuzzy Based Task Scheduling For Heterogeneous Distributed Computing” International Journal of Innovative Research in Science Engineering and Technology Vol. 6, Issue 12, December 2017.
[21] Anindita Kundu “A New Approach for Task Scheduling of Cloud Computing Using Fuzzy” International Journal of Innovative Research in Computer Science & Technology ,Volume-3, Issue-2, March 2015.
[22] Shatha J. Kadhim and Kasim M. Al-Aubidy “Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm”
[23] Vikash Goswami,Dr.R.K.Shrivastava “HMM and Fuzzy Logic Based Algorithm for Efficient Task Scheduling and Resource Management in Cloud Systems” International Journal of Mathematics Trends and Technology (IJMTT) February 2018.
[24] Prerna Ajmani and Manoj Sethi “Proposed Fuzzy CPU Scheduling Algorithm (PFCS) for Real Time Operating Systems” International Journal of Information Technology 2013
[25] Carsten Franke, Joachim Lepping, and Uwe Schwiegelshohn “On Advantages of Scheduling using Genetic Fuzzy Systems”
Citation
Vandana, A. Chhabra, "Deadline aware fuzzy scheduler for parallel computing environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.157-161, 2018.
A Secure Authentication Scheme against password Guessing Attacks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.162-166, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.162166
Abstract
With the rapid growth of websites, the registered users accounts across the websites increased from aggressive manner. The user may contain multiple accounts in a single website or across the different websites. So, for the different accounts the user may use the same password or the similar password which is already used, but with the prefix or postfix. As the result, guessing a single password may leak the remaining passwords which lead to the major concern of the security and user may forget the passwords of different sites. Hence a secure authentication scheme against password guessing attacks is necessary for logging in to the account with the single password reused for all the accounts in a secure manner with Single Sign on (SSO). In SSO, the tool allows a user to register and sign in with one set of credentials and gain access to the multiple applications and services. SSO increases security by using the difficult passwords which restrict guessing attacks, and also provides a better user experience for customers, employees by reducing the number of required accounts, passwords and provides simple access to all the applications and services they need.
Key-Words / Index Term
Security, Authentication, Password guessing attacks, Brute force attacks, Dictionary attacks
References
1] D. Florencio and C. Herley, “A large-scale study of web password habits, “in Proceedings of the 16th international conference on World Wide Web- WWW ’07, 2007, p. 657.
2] J. Yan A. Blackwell R. Anderson A. Grant "Password memorability and security: Empirical results" IEEE Security Privacy vol. 2 no. 5 pp. 25-31 Sep. /Oct. 2004.
3] Kostas Theoharoulis Ioannis Papaefstathiou "Implementing Rainbow Tables in high end FPGAs for superfast password Cracking" International Conference on field programmable Logic and applications (FPL) ISBN: 978-l-4244- 7842-2 Aug. 2010.
4] T. Arai H. Yamaguchi T. Sekiguchi and Y. Takemi "Fundamental technology to support cloud computing” IT platform 2010
5] Z. Li, W. He, D. Akhawe, and D. Song. The emperor’s new password manager: Security analysis of web-based password managers. In USENIX Security, 2014.
6] Weili Han, Zhigong Li and Minyue Ni “Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis”
7] Chang, C.C and Lee, C.Y. (2012) a secure single sign-on mechanism for distributed computer networks. IEEE Trans. Ind. Electron., 59, 629–637
8] Csdncleartext passwords 2011.
9] R. Wang, S. Chen, and X. Wang. Signing me onto your accounts through Facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 365–379, 2012.
10] N.LiandMarkovesecurity.org/TC/SP2014/papers/AStudyofProbabilisticPasswordModels
11] D. Llewellyn-Jones and G. Rymer. Cracking pwdhash: A brute force attack on client-side password hashing. In The 11th International Conference on Passwords (Passwords 2016). Springer, 2017.
12] T. Acar M. Belenkiy A. Küpçü "Single password authentication" Computer. Networks vol. 57 no. 13 pp. 2597-2614 Sep. 2013.
Citation
C.A. Thriveni, K. Madhavi, "A Secure Authentication Scheme against password Guessing Attacks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.162-166, 2018.
Dental Biometrics for Human Identification using Bag of Features
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.167-173, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.167173
Abstract
Identification of human, based on dental records is one of the popular and emerging trends in Biometrics. An efficient technique to identify human based on their dental records using bag of features and multi-class Support Vector machine proposed in this paper. The dental images of 34 persons were collected using digital camera. The captured images were pre-processed, and SURF bag of features were extracted using image processing. The extracted SURF features are used to design Multi-class Support Vector Machine for human identification. The accuracy for human identification using dental features of proposed model is 98.85 percent for training data and 97.95 percent for testing data.
Key-Words / Index Term
Dental Biometrics, Bag of Features, Surf Feature, Multi-class SVM
References
[1] Robert J. Schalkoff, Digital image processing and computer vision: Wiley, Australia, pp17,1989.
[2] Steven L.Eddins Rafel C.Gonzalez Richard E.Woods, Digital image processing Using Matlab. : McGraw Hill, CHENNAI, India, pp. 12, 2017.
[3] Richard. Szeliski, Computer vision: algorithms and Applications. Springer Science & Business Media, 2010.
[4] Revti Shriram Shubhangi C. Dighe, "Preprocessing, Segmentation and Matching of Dental radiograph used in Dental Biometrics," ResearchGate, vol. vol. 1, May-June 2012.
[5] Hong, and Anil K. Jain Chen, "Dental biometrics: Alignment and matching of dental radiographs, IEEE, vol. WACV/MOTIONS`05 Volume 1. Seventh IEEE Workshops on. Vol. 1., 2005.
[6] David R. Senn and Paul G. Stimson, Forensic Dentistry.: Taylor and Francis group, ch. 2, p. 11.
[7] Aparecido Nilceu Marana Michael Hofer, "Dental Biometrics: Human Identification based on Dental Work Information," IEEE, vol. 1, April 2017.
[8] Rickne C. Scheid and Gabriela Weiss, Woelfel’s Dental Anatomy .: Lippincott Williams & Wilkins, pp. 243,2012.
[9] Narendra C. Chauhan Kavindra R. jain, "Efficiency of Digital Image Processing Techniques In Intra Oral Dentistry," International Jounral of Current Engineering and Scientific Research, vol. 2, no. 2, pp. 174-181, 2015.
[10] Ulaganathen Gurunathan, J.Prabin Jose G. Jaffino A.Banumati, "Texture Based Person Identification Using Dental Radiograph and Photograph in Forensic Odontology," Springer International Publishing, pp. 322-336, AUG 2017.
[11] Soma Datta & Nabendu Chaki, "Person Identification Technique Using RGB Based Dental Images," International Federation for Information Processing, pp. 169-180, 2015.
[12] Dipali Rindhe and Ganesh Sable, "Teeth Feature Extraction and Matching for Human Identification Using Scale Invariant Feature Transform Algorithm," Europian Jounral Of Advances in Engineering and Technology, vol. 2(1), pp. 55-64, 2015.
[13] Banumati Arumugan Vijaya Kumari pushparaj Ulaganathen Gurunathan, "Victim identification with dental images texture and morphological operations," jounral of electronic imaging, jan 2014.
[14] Amina Khatra, "Dental radiographs as Human Biometric Identifier: An Eigen Values/Eigen Vector Approach," Cibtech Jounral of Bio-protocols, vol. 2(3), pp. 6-9, September-December 2013.
[15] Kayastha Vijay S, HarpaleVarsha K. Bhosale Swapnali B, "FEATURE EXTRACTION USING SURF," International Journal of Technical Research and Applications, vol. 2, no. 4, July-Aug 2014.
[16] Wu Na and Song Huajun Hu Shuo, "Object Tracking Method Based on SURF," ELSEVIER, 2012.
[17] G. Santhosh Kumar and Sreeraj. M Muhammed Anees V, "Automatic Image Annotation Using SURF Descriptors," IEEE, Jan 2013.
[18] S R Panchal and S K Shah P M Panchal, "A Comparison of SIFT and SURF," International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 2, April 2013.
[19] Zengchang Qin, Tao Wan, XI Zhang Jing Yu, "Feature integration analysys of bag of Features Modelfor image retrival," ELSEVIER, pp. 355-364, March 2013
[20] Yanshan Xiao, Longbing Cao Bo Liu, "SVM based multi-state mapping approach for multi-class Classification," ELSEVIER, May 2017.
[21] Clovis Francis, Lara Kannan and Others Maya Kallas, "Multi Class SVM Classification Combined With Kernal PCA EXtraction of ECG Signals," IEEE, 2012.
[22] Qing Yu and Lihui Wang, "Least Square twin SVM decision tree for multi class classification," IEEE, 2016.
[23] Anindhita Sigit Nugroho, Bilqis Amaliah and Agus Zainal Arifin Anny Yuniarti, "Classification and Nubering of Dental Radiographs for Automated Dental Identification System," TELKOMNIKA, vol. 1, pp. 137-146, october 2012.
[24] C.K Modi, "A Proposed Feature Extraction Technique for Dental X-ray Image Based on Multiple Features," IEEE, 2011
Citation
Deepak Pandey, Amit Yerpude, Toran Verma, "Dental Biometrics for Human Identification using Bag of Features," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.167-173, 2018.
Automated Forest Monitoring Techniques Using Multiple Technologies
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.174-177, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.174177
Abstract
In this proposed system forest disaster like forest fireflood will be monitoring through the wireless sensor network. Moreover the climate change will affect forest total area. So, we are analysing climate change effect in forest area. In this proposed system we can detect human illegal activity. Moreover we can monitor animal migration. It will helpful for animal research and animal growth census. So, this proposed system is multiple purpose we can use it. We are fixing the various sensor, actuators, CCTV camera etc into the forest area. So, this sensor operated through the wireless sensor network. There are various information come from forest will be stored into the cloud storage. These cloud data will be analysed using the big data analytics. Based on this analysis we are improving the forest area as well as animal growth. So, we improve the biodiversity in the forest environment. If rainy season there is a flood occurred in the forest. It will analysed and intimate to the plain area people. Moreover if the summer period there is forest fire occurred. So, we detect forest fire and that will destroy. Moreover the forest animal likes elephant, tiger which come from forest area to people living area. So, it will be immediately detect and appropriate action will be taken immediately. So, the proposed System is the multipurpose system. It will applicable to rain forest, mangrove forest etc. This proposed system is operating through the IOT, cloud computing, big data analytics and wireless sensor network.
Key-Words / Index Term
IOT, Sensor, Cloud Computing, Wireless Sensor Network
References
[1]. Forest Cover Report by Forest Survey of India, Ministry of Environment, Forest and Climate change
[2]. International Forest policy by Report from the Secretariat for International Forestry Issues, SIFI.
[3]. Motion Sensor and its usage taken from Various website.
[4]. Climate change details taken from Forest cover report , Ministry of Environment, Forests and Climate Change
[5]. Indian state forst Forest Report 2017 released by Ministry of Environment
[6]. Scheme for Flood Control and Flood Forecasting released by Union Government, Ministry of Water resources, River Development and Ganga Rejuvenation.
[7]. Annual Report 2017-2018 from Ministry of Environment, Forest and Climate change.
[8]. Yifan Bo “The Application of Cloud Computing and the Internet of Things in Agriculture and Forestry” IEEE Conference on May25-27, 2011 at taipei,Taiwan.
[9]. Abdalhaq B, Cortés A, Margalef T, Luque E. 2005. Enhancing wild land fire prediction on cluster systems applying evolutionary optimization techniques. Future Generation Comp. Syst. 21(1): 61-67 Crossref, Google Scholar.
[10]. Alexis K, Nikolakopoulos G, Tzes A, Dritsas L. 2009. Coordination of helicopter UAVs for aerial forest-fire surveillance. Applications of intelligent control to engineering systems. : 169-193 Crossref, Google Scholar.
[11]. Alonso-Betanzos A, Fontenla-Romero O, Guijarro-Berdiñas B, Hernández-Pereira E, Andrade MIP, Jiménez E, Soto JLL, Carballas T. 2003. An intelligent system for forest fire risk prediction and firefighting management in Galicia. Expert Syst. Appl. 25(4): 545-554 Crossref, Google Scholar.
[12]. Ambrosia, V. 2002. Remotely piloted vehicles as fire imaging platforms: the future is here [online]. Available from http://geo.arc.nasa.gov/sge/UAVFiRE/completeddemos.html [accessed 28 February 2015]. Google Scholar
[13]. Arrue BC, Ollero A, Martinez-de Dios, JR. 2000. An intelligent system for false alarm reduction in infrared forest-fire detection. IEEE Intell. Syst. 15(3): 64-73 Crossref, Google Scholar.
[14]. Beard RW, McLain TW, Nelson DB, Kingston D, Johanson D. 2006. Decentralized cooperative aerial surveillance using fixed-wing miniature UAVs. Proc. IEEE 94(7): 1306-1324 Crossref, Google Scholar.
[15]. Berni JAJ, Zarco-Tejada PJ, Surez L, Fereres E. 2009. Thermal and narrowband multispectral remote sensing for vegetation monitoring from an unmanned aerial vehicle. IEEE Trans. Geosci. Remote Sens. 47(3): 722-738 Crossref, Google Scholar.
[16]. Bosch, I., Serrano, A., and Vergara, L. 2013. Multisensor network system for wildfire detection using infrared image processing. Sci. World J., Article ID 402196. 10.1155/2013/402196. Crossref, Google Scholar.
Citation
A.Uthiramoorthy, R. Muralidharan, "Automated Forest Monitoring Techniques Using Multiple Technologies," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.174-177, 2018.
Automation of Temperature and Humidity Monitoring System – Application of IoT
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.178-181, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.178181
Abstract
This paper mainly focuses on the aspects of simplifying people’s lives by implementing the ways of IOT in daily used home appliances. The major focus of this paper lies in automation of air conditioning using a thermostat and watering of plants without human intervention using a moisture sensor. A DHT11 temperature sensor integrated with internet of things using a Raspberry pi facilitate the above-mentioned implementation of internet of things. The thermostat is used as source of information for the conditioner to adjust the temperature in the room and the moisture sensor acts as a switch to water the plants once the soil moisture content falls below the minimum threshold.
Key-Words / Index Term
IoT, DHT11, Humidity Monitoring System, Network
References
[1]. K. Ashton, That ‘‘Internet of Things’’ thing, RFiD Journal (2009).
[2]. Pascal Von Rickenbach, “Energy-Efficient Data Gathering in Sensor Networks".
[3]. Basil Hamed, Design & Implementation of Smart House Control Using LabVIEW, International Journal of Soft Computing and Engineering (IJSCE), 1 (6), 2012.
[4]. Vasumsetty Uday Aditya, “GSM based wireless control of electrical appliances”, 2014
[5]. Girish Birajdar “Implementation of Embedded Web Server Based on ARM11 and Linux using Raspberry PI” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-3 Issue-3, July 2014
[6]. Ms. Padwal S. C., Prof. Manoj Kumar, “Application of WSN for Environment Monitoring in IoT Applications”, International Conference On Emerging Trends in Engineering and Management Research (ICETEMR-16) – 23rd March 2016
[7]. Raspberry Pi Technology [Online]. Available.
[8]. https://www.elprocus.com/home-automation-system-applications/
[9]. Robotics D, DHT11 Humidity & Temperature Sensor, 2010.
[10]. http://electronut.in/dht11-rpi-cloud-plot/
[11]. Folea S. C. & Mois G. 2015. A low-power wireless sensor for online ambient monitoring. IEEE Sensors Journal. 15(2): 742-749
Citation
Ravi Teja, SVHN Krishna Kumari, "Automation of Temperature and Humidity Monitoring System – Application of IoT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.178-181, 2018.
Reliability Constrained Energy Sharing Mechanism Among Smart Homes
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.182-187, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.182187
Abstract
According to the load curve, the load of each home is changing with the time. During the time in which load is less compared to the Generation in this condition smart home has an opportunity for energy sharing among the smart homes which are equipped with energy sources such as rooftop Solar Cells, EVs. In the proposed energy sharing scheme, the enticement is given in terms of priority to the SHs which participate as an energy provider. EVs energy also use in sharing if has access energy stored in the batteries then requirement. In this paper the Priority-Based energy sharing approach is discussed among the nearness Smart Homes (SHs) which are located in the physical proximity of each other. The approach is a non-pricing based. The Distributed Network Management System helps the SHs in sharing energy on the basis of Demand, past energy contribution and reliability factor. The SHs acting as an energy provider will be rewarded in respect of money and priority index if require energy in future. The simulation result of energy sharing mechanism in practical world is shown in this paper.
Key-Words / Index Term
Smart homes, Renewable Energy, Nash equilibrium, Game theory, Energy sharing mechanism
References
[1] Sonvir Singh, Tushar Srivastava, Sudhir Kumar Singh."Ehybrid Vehicle – Next Generation and Energy Efficient Vehicle", Volume 5, Issue IX, International Journal for Research in Applied Science and Engineering Technology (IJRASET) Page No: , ISSN : 2321-9653,2017.
[2] Lior, Noam. "Sustainable energy development: the present situation and possible paths to the future." Energy35.10 (2010): 3976-3994, 2009.
[3] Comprehensive Policy for Grid-connected Power Projects based on New and Renewable (Non-conventional) Energy Sources - 2015. Available: http://www.mahaurja.com.
[4] Methodology for the installation of projects under the comprehensive policy for grid-connected power projects based on New and Renewable (Non-conventional) Energy sources -2015.
Available: http://www.mahaurja.com.
[5] Maharashtra Electricity Regulatory Commission, Net Metering for
Roof-top Solar Photo Voltaic Systems Regulations, 2015. Available: http://www.mercindia.org.in/Regulations.htm.
[6] Wang, Huangxin, Jean X. Zhang, and Fei Li. "Incentive mechanisms to enable fair renewable energy trade in smart grids." Green Computing Conference and Sustainable Computing Conference (IGSC), 2015 Sixth International. IEEE, 2015.
[7] D. J. Unger, “Want a solar home? consider batteries.” http://www.csmonitor.com/Environment/2013/0427/Want-a-solar-home-Consider-batteries, 2013.
[8] Barbato, Antimo, et al. "House energy demand optimization in single and multi-user scenarios." Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on. IEEE, 2011.
[9] Schulke, Anett, Jochen Bauknecht, and Johannes Haussler. "Power demand shifting with smart consumers: A platform for power grid friendly consumption control strategies." Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. IEEE, 2010
[10] T. Zhu, Z. Huang, A. Sharma, J. Su, D. Irwin, A. Mishra, D. Menasche, and P. Shenoy, “Sharing renewable energy in smart microgrids,” in ACM/IEEE ICCPS, pp. 219–228, 2013.
[11] A. Jossen, J. Garche, and D. U. Sauer, “Operation conditions of batteries in PV applications,” Solar Energy, vol. 76, no. 6, pp. 759 – 769, 2004.
[12] Jadhav, A. M., & Patne, N. R. Priority-Based Energy Scheduling in a Smart Distributed Network With Multiple Microgrids. IEEE Transactions on Industrial Informatics, 13(6), 3134-3143, 2017.
[13] S. Park, J. Lee, S. Bae, G. Hwang, and J. K. Choi, “Contribution-Based Energy-Trading Mechanism in Microgrids for Future Smart Grid: A Game Theoretic Approach,” IEEE Trans. Ind. Electron., vol. 63, no. 7,pp. 4255–4265, July. 2016.
[14] P. J. Reny, “Non-cooperative games: Equilibrium existence,” in New Palgrave Dictionary of Economics, 2nd ed., Palgrave Macmillan, 2008.
Citation
Sonvir Singh, Tushar Srivastava2, "Reliability Constrained Energy Sharing Mechanism Among Smart Homes," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.182-187, 2018.
Prevention of Phishing Attack using Hybrid Blacklist Recommendation Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.188-191, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.188191
Abstract
This is the era of high end technologies which requires faster connectivity through internet and its variety of applications with prime concern of serving ease in transition, convey messages and data from one end of the world to another. These methods are consuming various sensitive information for their own record. Loose design formation and lower coupling with security approaches of web applications are waved of by attackers to get the system access from malicious activities which create the trouble in real life situations. The primary aim of this presented work is to study about various phishing techniques and their effects on our daily life additionally finding some acceptable and/ or adoptable detection and prevention techniques by which system automatically detects a phishing web URL uses data mining techniques. Along with the studying the work had also identified the problems associated with the current detection. As far as older systems are concerned detection are having larger ratio of false positive nature served with static patterns and rules. This work proposes a hybrid anti-phishing approach using some of the well-known phishing detection factors like MAC address of web pages. This works also elaborates the comparative study of most implemented recommendations algorithms to proposed Hybrid recommendations approach.
Key-Words / Index Term
Blacklisting Recommendation System, Content Based, Collaborative Based, Knowledge Based System, Phishing, Pattern Analysis, MAC, Pattern Similarity Index (PSI)
References
[1] Artus Krohn-Grimberghe, Alexandros Nanopoulos, Lars Schmidt-Thieme, “A Novel Multidimensional Framework for Evaluating Recommender Systems” Barcelona, Spain, Sep 30, 2010. pp.34-51.
[2] Fabio Soldo, Anh Le, Athina Markopoulou “Blacklisting Recommendation System: Using Spatio-Temporal Patterns to Predict Future Attacks,” IEEE Journal on selected areas in communication vol.29,no.7 Aug 2011.pp.1423-1437.
[3] J. Zhang, P. Porras, and J. Ullrich, “Highly predictive blacklisting,” in USENIX Security, San Jose, CA, USA, Jul. 2008.pp.16-32.
[4] Yehuda Koren, “Collaborative Filtering with Temporal Dynamics,” in KDD’09, June 28–July 1, 2009, Paris, France.
[5] Andreas Töscher, Michael Jahrer, and Robert Legenstein “Improved Neighborhood-Based Algorithms for Large-Scale Recommender Systems,” in 2nd Netflix-KDD Workshop, August 24, 2008, Las Vegas, NV, USA.
[6] A. Ramachandran, N. Feamster, and S. Vempala, “Filtering spam with behavioral blacklisting,” in ACM CCS, Alexandria, VA, Oct 2007.
[7] Zan Huang , Daniel Zeng and Hsinchun Chen, “A Comparative Study of Recommendation Algorithms in Ecommerce Applications,” in Proc. of ACM KDD ’04, Seattle, WA, USA, Aug. 2004, pp. 79–88.
[8] F. Soldo, A. Le, and A. Markopoulou, “Predictive Blacklisting as an Implicit Recommendation System,” in IEEE INFOCOM, San Diego, CA, USA, Mar. 2010.pp.1-11.
Citation
Pritesh Saklecha, Jagdish Raikwar, "Prevention of Phishing Attack using Hybrid Blacklist Recommendation Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.188-191, 2018.
Overcurrent Protection of Feeder Using Numerical Relay
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.192-197, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.192197
Abstract
Short circuits occur in power systems when equipment insulation fails, due to system overvoltages caused by lightning or switching surges, to insulation contamination, or to other mechanical and natural causes. Careful design, operation, and maintenance can minimize the occurrence of short circuits but cannot eliminate them. Such short-circuit currents (for balanced and unbalanced faults) can be several orders of magnitude larger than normal operating currents and, if allowed to persist, may cause insulation damage, conductor melting, fire, and explosion. Windings and busbars may also suffer mechanical damage due to high magnetic forces during faults. Clearly, faults must be quickly removed from a power system. Hence, proposed journal deals with removal of fault by sensing overcurrent element using Numerical Relay REF615, meant for Feeder Protection. Along with Overcurrent Protection few more protection schemes such as CB Failure Protection and Trip Circuit Supervision (TCS) are also described here. Moreover, Relay Status can also be detected i.e., whether healthy or unhealthy. When we say that system has to be protected against fault, then it means to disconnect faulty part from healthy one by opening CB of corresponding feeder section. In case of CB failure i.e., when Main CB (downstream CB) fails to operate, Backup CB (upstream CB) must be operated after predefined time interval.
Key-Words / Index Term
Circuit Breaker, Fault, Feeder, IEC 61850, Network, Overcurrent, Protection, REF615, Relay, Substation
References
[1] Power System Protection and Switchgear by Bhuvanesh A. Oza, Nirmal Kumar C. Nair, Rashesh P. Mehta, Vijay H. Makwana.
[2] Network Protection & Automation Guide by ALSTOM.
[3] Handbook of Switchgears by BHEL.
[4] The Art & Science of Protective Relaying by C. Russell Mason.
[5] Power System Analysis and Design by J. Duncan Glover, Mulukutla S. Sarma, Thomas J. Overbye.
Citation
A. Kamani, J. Satapara, T. Patel, "Overcurrent Protection of Feeder Using Numerical Relay," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.192-197, 2018.
A Technique for Classifying Unstructured Big Data Files
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.198-200, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.198200
Abstract
In the era of technological development, more and more data is being accumulated on daily basis. Therefore it is a challenge to process, store and manage those ever increasing size of data. Before processing, classification of large amount of files needed. In this paper the authors develop a method to classify large amount of unstructured big data files into a small number of groups, each containing structured data files. The objective is that after classification the classified groups will be a better form of resource to the concerned user for further processing.
Key-Words / Index Term
Big data, r-train, identity tag, Classification, Unstructured data
References
[1] G. Noseworthy, Infographic: Managing the Big Flood of Big Data in Digital Marketing, 2012 http://analyzingmedia.com/2012/infographic-big-flood-of-big-data-in-digital-marketing.
[2] H. Moed, The Evolution of Big Data as a Research and Scientific Topic: Overview of the Literature, 2012, ResearchTrends, http://www.researchtrends.com
[3] Gartner, Big Data Definition, http://www.gartner.com/it-glossary/big-data.
[4] P. Zikipoulos, T. Deutsch, D. Deroos, Harness the Power of Big Data, 2012, http://www.ibmbigdatahub.com/blog/harness-power-big-data-book-excerpt.
[5] C. Zhu, Q. Li, L. Kong, and S. Wei, A combined index for mixed structured and unstructured data, Proc. - 2015 12th Web Inf. Syst. Appl. Conf. WISA 2015, pp. 217–222, 2016.
[6] Ahad, Mohd Abdul, Biswas, Ranjit, Comparing and Analyzing the Characteristics of Hadoop, Cassandra and Quantcast File Systems for Handling Big Data. Indian Journal of Science and Technology, [S.l.], 2017. ISSN 0974 -5645.
[7] Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, The Hadoop Distributed File System, IEEE (2010).
[8]Dhruba Borthakur, HDFS Architecture Guide, Apache Foundation https://hadoop.apache.org/docs/r1.2.1/hdfs_design.pdf, (2008).
[9] Md Tabrez Nafis, Ranjit Biswas, A Secure Clustering Technique for Unstructured and Uncertain Big Data. In Springer proceedings of 1st International Conference on Advanced Computing & Intelligent Engineering(ICACIE)(Springer),451,2016.
[10] Biswas, Ranjit., Atrain Distributed System (ADS): An Infinitely Scalable Architecture for Processing Big Data of Any 4Vs, in Computational Intelligence for Big Data Analysis Frontier Advances and Applications: edited by D.P. Acharjya, Satchidananda Dehuri and Sugata Sanyal, Springer International Publishing Switzerland 2015, Part-1, 1-53 (2015).
[11]Ranjit Biswas, r-Train (Train) : A New Flexible Dynamic Data Structure, INFORMATION : An International Journal (Japan), Vol.14(4) April’2011, page 1231-1246.
[12] Ranjit Biswas, Heterogeneous Data Structure R-Atrain, INFORMATION : An International Journal (Japan), Vol.15(2) February’2012, pp 879-902(2012) International Information Institute of Japan & USA).
[13]Jin, X., Wah, B.W., Cheng, X.,Wang, Y., Significance and Challenges of Big Data Research, Journal Of Big Data Research(Elsevier),2017.
[14] K. Thyagarajan, N. Vaishnavi, "Performance Study on Malicious Program Prediction Using Classification Techniques", International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.59-64, 2018.
[15]H. Kousar, B.R.P. Babu, "Efficient Map/Reduce secure data using Multiagent System", International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.144-149, 2018.
Citation
M. T. Nafis, R. Biswas, "A Technique for Classifying Unstructured Big Data Files," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.198-200, 2018.