Mobile Learning in the Cloud: New Stage for Knowledge Management
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1454-1458, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14541458
Abstract
In the era of globalization with increased mobility, the learning process is becoming more and more ubiquitous. To satisfy the growing industry requirements and also to enhance the educational growth, it becomes necessary to incorporate new and innovative technologies in to the educational system. Hence to improve the learning system, Mobile learning has been implemented by many colleges and universities. In addition Cloud computing technology has become popular that can reduce the storage cost incurred in Mobile learning. This model of Mobile learning in the Cloud has a number of advantages and has now become a new stage for Knowledge Management in the educational institutions. This paper presents a discussion on how a Knowledge Management system is implemented using Mobile learning in the Cloud with the associated merits and demerits.
Key-Words / Index Term
Cloud Computing, Mobile Cloud Computing, Mobile Learning, Knowledge Management
References
[1] W. Hou, D. M. Zhu, “Research on the practice of developing technologies on mobile learning,” Modern Educational Technology, vol. 20, pp. 115-126, 2010.
[2] Kukulska-Hulme, Sharples, Milrad, Arnedillo-S´anchez, Inmaculada, Vavoula, “Innovation in mobile learning: European perspective,” International Journal of Mobile and Blended Learning, vol 1, pp. 13–35, 2009.
[3] Shu Sheng Liaw, Marek Hatala, Hsiu Mei Huang, “Investigating acceptance towadrs mobile learning to assist individual knowledge management: based on activity theory approach,” Computers & Education, vol. 54, pp. 446-454, 2010.
[4] Niroshinie Fernando, Seng W. Loke, Wenny Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, pp 84-106, 2013.
[5] Yogita G. Patil, Pooja S. Deshmukh, “A Review: Mobile Cloud Computing: Its Challenges and Security,” International Journal of Scientific Research in Network Security and Communication, vol 6, Issue.01, pp.6-10, 2018.
[6] Hoang T. Dinh, Chonho Lee, Dusit Niyato, Ping Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,” Wireless Communications and Mobile Computing, Wiley, 2011.
[7] Ramananda Mallya K, A Kannammal, “Medical imaging in the mobile cloud,” International Journal of Computer Information Systems, vol. 6, no. 4, pp. 18-22, April 2013.
[8] Shilpa Srivastava, Ved Prakash Gulati, “M-learning – On path to Integration with Organiztion Systems”, in Proceedings of 10th International Conference on Mobile Learning, Madrid , Spain, pp. 26-33, 2014.
[9] M. Gaved, A. Kukulska-Hulme, A. Jones, E. Scanlon, I. Dunwell, P. Lameras, O. Akiki, “Creating coherent incidental learning journeys on mobile devices through feedback and progress indicators,” in Proceedings of International Conference on Mobile and Contextual Learning, 2013.
[10] D. Frohberg, C. Goth, G. Schwabe, “Mobile learning projects – a critical analysis of the state of the art,” Journal of Computer Assisted Learning, vol. 25, pp. 307-311, 2009.
[11] ADL Mobile Learning Team, ADL Mobile Learning Handbook, 2010.
[12] L. F. Motiwalla., “Mobile Learning: a framework and evaluation,” Computers & Education, vol. 49, Issue 3, pp. 581–596, November 2007.
[13] J. R. Corbeil and M. E. Valdes-Corbeil, “Are you ready for mobile learning,” Educause Quarterly, pp. 51-58, No. 2, 2007.
[14] N. Sultan, “Cloud computing for education: a new dawn?” International Journal of Information Management, vol. 30(2), pp. 109-116, 2010.
[15] S. Ouf, M. Nasr, and Y. Helmy, “An enhanced e-learning ecosystem based on an integration between cloud computing and web2.0,” in Proc. IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 48-55, 2011.
[16] D. Madan, A. Pant, S. Kumar, A. Arora. “E-learning based on cloud computing,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, 2012.
[17] A. Masud, X. Huang, “An e-learning system architecture based on cloud computing,” World Academy of Science, Engineering and Technology, 2012.
[18] Hong-qing Gao, Yan-jie Zhai, “System design of cloud computing based on mobile learning, knowledge acquisition and modeling (KAM),” in Proc. IEEE International Symposium on Cloud, pp. 239- 242, 2010.
[19] A. Masud, X. Huang, “A cloud based m-learning architecture for higher education,” Archives Des Sciences, vol. 66, No. 1, Jan 2013.
[20] N. Mallikharjuna Rao, C. Sasidhar, V. Satyendra Kumar, ”Cloud computing through mobile learning,” International Journal of Advanced Computer Science and Applications, vol.1, No. 6, December 2010.
[21] K. Verma, S. Dubey, M. Rizvi,”Mobile cloud a new vehicle for learning: m-learning its issues and challenges,” International Journal of Science and Applied Information Technology, vol. 1.No.3, 2012.
[22] Georgios Kambourakis, “Security and privacy in m-learning and beyond: challenges and state-of-the-art,” International Journal of u- and e- Service, Science and Technology, vol. 6, No. 3, pp 67-84, June, 2013.
[23] Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan, Sajjad A. Madani, “Towards secure mobile cloud computing: a survey,” Future Generation Computer Systems, vol. 29, Issue 5, pp 1278-1299, July 2013.
[24] Sharmila, Nisha Jebaseeli, "Enhancing M-Learning System Using Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.51-55, 2016.
[25] Sangeeta Namdev Dhamdhere, “Importance of Knowlegde Management in Higher Education Institutes,” Turkhish Online Journal of Diastance Education, vol. 16, no. 1, pp. 162-183, 2015.
Citation
Ramananda Mallya K, B. Srinivasan, "Mobile Learning in the Cloud: New Stage for Knowledge Management," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1454-1458, 2018.
Differential Evolution for Mobile Ad-hoc Networks: A Review
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1459-1467, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14591467
Abstract
Differential evolution is potentially one of the most promising real parameter optimization algorithms. In last few years, time has witnessed the growth and applications of Differential Evolution in the field of science and engineering. This paper focuses on the application of Differential Evolution (DE) in mobile ad-hoc network to solve optimization problems. According to the conducted studies the applications are classified on the basis of four categories of optimization problems: clustering, routing, security and topology control mechanism. In this article, we review the main work and discuss the future scope of differential evolution with mobile ad-hoc networks. The results of conducted literature survey shows that maximum amount of articles were published in the years 2012 and 2015. About 62.5% of articles were related to topology control mechanism whereas rest of categories shared the similar contribution of about 12.5% each. From the review, it was found that research has been conducted on the application of DE in solving issues such as handling networks (up to 500 nodes) with minimum overhead and strengthening of cryptographic algorithms (up to 9 key size). In future these works can be extended to solve similar problems in large networks. Moreover, it was found that no work has been carried out to find secure route for dissemination using DE.
Key-Words / Index Term
Differential Evolution, Mutation, Crossover, Fitness Function, Topology control mechanism, Routing, Clustering
References
[1] International Fund for Agricultural Development (IFAD), The United Nations Environment Programme (UNEP), ”Smallholders, food security, and the environment”, Report, United Nation, 2013.
[2] Zhaohui Wang, Houbing Song, David W. Watkins, Keat Ghee Ong, Pengfei Xue, Qing Yang, Xianming Shi. 2015, “Cyber-physical systems for water sustainability: challenges and opportunities”, IEEE Communications Magazine, Vol. 53, Issue. 5, pp. 216 – 222, 2015.
[3] Bruno S. Faical, Gustavo Pessin, Geraldo P. R. Filho, Andre C. P. L F.Carvalho, Pedro H Gomes and Jo Ueyama, “Fine-tuning of UAV control rules for spraying pesticides on crop fields dynamic environments”, International Journal of Artificial Intelligence Tools, Vol. 25, Issue. 01, 2016.
[4] H.Pucha, M. Gunes and Y. C. Hu,”Performance impact of traffic patterns on routing protocols in mobile ad-hoc network”, Computer Networks, Vol.51, Issue. 12 pp. 3595-3616, 2007.
[5] J. M. Garcia-Campos, D.G. Reina, S.L. Toral, N. Bessis, F. Barrero, E. Asimakopoulou, R. Hill, “ Performance evaluation of reactive routing protocols for VANETs in urban scenario following good simulation practices” , In Proceeding of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’ 15), Brazil, pp. 1-8, July 2015.
[6] R. Storn, K. Price, “Differential evolution – a simple and efficient adaptive scheme for global optimization over continuous spaces”, Technical Report TR-95-012, ICSI, 1995.
[7] D. G. Reina, P. Ruiz, R. Ciobanu, S.L. Toral, B. Dorronsoro and C. Dobre, “Review article: A Survey on the application of evolutionary algorithms for mobile multi-hop ad-hoc network optimization problems”, International Journal of Distributed sensor networks, Vol. 12, Issues. 02, Article ID 2082496, pp 13, 2016
[8] R. Storm, K. Price,” Differential evolution – a simple and efficient heuristic for global optimization over continuous spaces”, J Global Optim 1997, Vol. 11, Issue. 4, pp. 341–59, 1997.
[9] K. Price, R. Storn, J. Lampinen, “Differential evolution – a practical approach to global optimization”, Springer, Berlin, 2005.
[10] S. Das, P.N. Suganthan, “Differential Evolution: A Survey of the State-of-Art” , In Evolutionary Computation, IEEE Transaction on, Vol. 15, Issue. 1, pp. 4-31, 2011.
[11] Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, “ Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, 2018.
[12] K. Kotecha, S. Popat,”Multi objective genetic algorithm base adaptive QoS routing in MANET”, In IEEE Congress on Evolutionary Computation (CEC’07), India, pp. 1423-1428, 2007.
[13] H. Yetgin, K.T. K. Cheung, L. Hanzo, “Multi-objective routing optimization using evolutionary algorithms”, in Proceeding of the IEEE Wireless Communication and Networking Conference (WCNC’ 12), China, pp. 3030-3034, 2012.
[14] K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, “Fast and Elitist multi-objective genetic algorithm: NSGA-II”, IEEE Transactions on Evolutionary Computation, Vol. 6, pp. 182-197, 2002.
[15] M. Camelo, C. Omana, and H. Castro,”QoS routing algorithm based on multi-objective optimization for wireless mesh networks” , In IEEE Latin American Conference on Communications (LATINCOM’ 10), (Bogota)Colombia, pp. 1-6, 2010.
[16] F. Xue, A. Sanderson R. Graves, “Multi-objective routing in wireless sensor networks with differential evolution algorithm”, In IEEE International Conference on Networking, Sensing and Control (ICNSC’ 06), USA, pp. 880-885, 2006.
[17] F. Xue, “Multi-objective differential: Theory and Application”, PhD. thesis, Rensselaer Polytechnic Institute, New York, 2004.
[18] S. Gundry, J. Kusyk, J. Zou, C. S. Sahin, M. U. Uyar, “Performance Evaluation of differential evolution based topology control method for autonomous MANET nodes”, 2012 IEEE Symposium Computers and Communications (ISCC) , Turkey, 2012.
[19] S. Luke, C. Cioffi-Revilla, L. Panait, K. Sullivan, G. Balan, “MASON: A Multiagent Simulation Environment”, Vol. 81, Issue 7, pp. 517-527, 2005.
[20] A. Okabe, B. Boots, K. Sugihara, “Spatial tessellations: concepts and applications of Voronoi diagrams”, Wiley Series in Probability and Mathematical Statistics, 1992.
[21] S. Gundry, J. Zou, J. Kusyk, C. S. Sahin, M. U. Uyar, “Markov chain model for differential based topology control in MANETs”, 2012 35th IEEE Sarnoff Symposium (SARNOFF), USA, 2012.
[22] S. Gundry, J. Kusyk, J. Zou, C. S. Sahin, M. U. Uyar, “Differential Evolution based fault tolerant topology control in MANETs”, MILCOM 2013 - 2013 IEEE Military Communications Conference, USA, 2013.
[23] A. Yao, “On constructing minimum spanning tree in k-dimensional spaces and relates problems”, SIAM Journal on Computing, Vol. 11, Issue 4, pp. 721-736, 1982.
[24] S. Poduri, G. Sukhatme, “Constrained coverage for mobile sensor networks”, In Proceeding of the 2004 IEEE International Conference on Robotics and Automation, Vol.1, pp.165-171, 2004.
[25] S. Gundry, J. Zou, C.S. Sahin, J. Kusyk, M.U. Uyar, “Autonomous and fault tolerant vehicular self deployment mechanisms in MANETs”, IEEE International Conference on Technology for Homeland Security (HST), USA, 2013.
[26] S. Gundry, J. Zou, J. Kusyk, M. U. Uyar, C. S. Sahin, “Fault tolerance bio-inspired topology control mechanism for autonomous mobile node distribution in MANETS”, MILCOM 2012 - 2012 IEEE Military Communications Conference, USA, 2012.
[27] S. Gundry, J. Zou, M. U. Uyar, C. S. Sahin, J. Kusyk, “ Differential evolution-based autonomous and disruption tolerant vehicular self-organized in MANETs”, Ad Hoc Networks, Vol. 25, Part B, pp. 454-471, 2015.
[28] R. Bollobas, “Random graph”, Academic Press, 1985.
[29] H. Cheng, J. Cao, X. Wang, S. K. Das, S.Yang, “Stability-aware multi-metric clustering in mobile ad-hoc networks with groip mobility”, Wireless Communication and Mobile Computing,Vol. 9, Issues 6, pp.759-771, 2009.
[30] D. Turgut, S. K. Das, R. Elmasri, B. Turgut, “Optimizing clustering algorithm in mobile ad-hoc network using genetic algorithmic approach”, Global Telecommunications Conference, 2002. GLOBECOM `02. IEEE, Taiwan, 2002.
[31] U.K. Chakraborty, S. K. Das, T. E. Abbott, “Clustering in mobile ad hoc networks with differential evolution”, 2011 IEEE Congress on Evolutionary Computation (CEC), USA, 2011.
[32] Umesh Kumar Singh, Jalaj Patidar, Kailash Chandra Phuleriya,”On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science and Engineering ,Vol.3, Issue.1, pp.11-15, 2015.
[33] A.Vani, “ Detection and Elimination of Wormhole Attacks in a MANET”, International Journal of Scientific Research in Computer Science and Engineering ,Vol.5, Issue.5, pp.35-40, October (2017).
[34] R. Dorai, M. Rajaram, “ Trust and Reputation Mechanism with Path Optimization in Multipath Routing”, World Academy of Science Engineering and Technology International Journal of Electronics and Communication Engineering, Vol. 9, Issue 3, 2015.
[35] GiaS. Wulandari, W. Rismawan, S. Saadah, “Differential evolution for the cryptanalysis of Transposition Cipher”, 3rd International conference on Information and Communication Technology (ICoICT), Bali, 2015.
[36] C. Erbao, L. Mingyong, “The open vehicle routing problem with fuzzy demands”, in Expert Systems with Applications Vol. 37, Issue 3, pp. 2405-2411, 2010.
[37] S. N. Sinha, S. Palit, M. A. Molla, A. Khanra, M. Kule, “A cryptanalytic attack on knapsack cipher using differential evolution algorithm”, Recent Advances in Intelligent Computational Systems, Trivandrum, pp. 317-320, 2011.
Citation
S. Prabha, R. Yadav, "Differential Evolution for Mobile Ad-hoc Networks: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1459-1467, 2018.
A Location Dependent Key Management Method for WSN With Reduced Path Length And Considering Cell Head
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1468-1474, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14681474
Abstract
Wireless Sensor Networks (WSNs) consists of sensor nodes (SNs) which are deployed in hostile areas to monitor the environmental* or physical conditions such as temperature, sound, pressure etc. WSNs are used in military operations, civilian operations, forest fire detection and healthcare monitoring etc. These SNs forwards their sensor data via multi-hop wireless paths to the Base Station (BS) and are assembled with limited energy, resource, and memory and communication range. We consider base station to be highly secure, unlike sensor nodes which are threat prone. We assume that the attacker can extract security credentials from the compromised nodes. As these sensor nodes are resource constraint, so the number of hops required sending data from event region to base station needs to be reduced. Moreover, as the sensor nodes have limited memory so the number of keys to be stored on these sensor nodes needs to be reduced. This paper basically focuses on reducing the path length of an event region to the base station as well as reducing the number of keys. We also calculate the number of suspicious nodes and cells in the network.
Key-Words / Index Term
Sensor nodes, security, key management, data gathering, wireless sensor networks
References
[1]. Redondo-López, L., Prayati, A., López-Navarro, J. M., Martínez-Ortega, J. F., & García-Hernando,”Problem Solving for Wireless Sensor Networks”:, Computer Communications and Networks. ISBN 978-1-84800-203-6. Springer-Verlag London, 2008.
[2]. Chan, H., Perrig, A., & Song, D. “Random key predistribution schemes for sensor networks,”. In proceedings of IEEE Security and Privacy, Symposium, May 2003, pp 197-213.
[3]. Sahoo, S. K., & Sahoo, M. N. “An elliptic-curve-based hierarchical cluster key management in wireless sensor network,” In Proceedings of Springer In Intelligent Computing, Networking, and Informatics, 2014,pp. 397-408.
[4]. X. He, M. Niedermeier, and H. de Meer, “Dynamic key management in wireless sensor networks: A survey,” J. Netw. Comput. Appl., vol. 36, no. 2, pp. 611–622, 2013.
[5]. S. H. Seo, J. Won, S. Sultana, and E. Bertino, “Effective key management in dynamic wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 371–383, Feb. 2015.
[6]. K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing location-aware end-to-end data security in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585–598, May 2008.
[7]. Eschenauer, L., & Gligor, V. D. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, November 2012, pp. 41-47.
[8]. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” in Proc. IEEE Symp. Secur. Privacy, May 2004, pp. 259–271.
[9]. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route filtering of injected false data in sensor networks,” IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 839–850, Apr. 2005.
[10]. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward resilient security in wireless sensor networks,” in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), 2005, pp. 34–45.
[11]. K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing location-aware end-to-end data security in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585–598, May 2008.
[12]. H.-W. Ferng, J. Nurhakim, and S.-J. Horng, “Key management protocol with end-to-end data security and key revocation for a multi-bs wireless sensor network,” Wireless Netw., vol. 20, no. 4, pp. 625–637, 2014.
[13]. Fakhrey, H., Tiwari, R., Johnston, M., & Al-Mathehaji, Y. A,”The Optimum Design of Location-Dependent Key Management Protocol for a WSN With a Random Selected Cell Reporter”,IEEE Sensors Journal, 16(19),2016,pp.7217-7226
[14]. Bahi, Jacques M., Christophe Guyeux, and Abdallah Makhoul, "Two security layers for hierarchical data aggregation in sensor networks, "International Journal of Autonomous and Adaptive Communications Systems”pp. 239-270,2014.
[15]. B. Przydatek, D. Song, and A. Perrig. Sia: Se-cure information aggregation in sensor networks,”In Proceedings of ACM SenSys conference”, pages 255–265, 2003.
[16]. H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashinap-pan, and H. O. Sanli, ”Espda: Energy-efficient secure pattern based data aggregation for wireless sensor networks”, Computer Communication journal (29), pages 446–455, 2006.
[17]. S. Sharma, D. Kumar, K. Kishore, “Wireless Sensor Networks-A Review on Topologies and Node Architecture”, International Journal of Computer Engineering, Vol-1(2), pp(19-25) Oct-2013.
[18]. F. Ye, H. Lou, S. Lu, L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks", Proc. IEEE INFOCOM, 2004-Mar.
[19]. S. Zhu, S. Setia, S. Jajodia, P. Ning, "An Interleaved Hop-By-Hop Authentication Scheme for Filtering False Data in Sensor Networks", Proc. IEEE Symp. Security and Privacy, 2004
[20]. A. Perrig, R. Canetti, J. Tygar, D. Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels", Proc. IEEE Symp. Security and Privacy, 2000-May.
[21]. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U.Vaccaro, M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences", Proc. Advances in Cryptology (Crypto `92), pp. 471-486, 1992-Apr.
[22]. W. Zhang, N. Subramanian, G. Wang, "Lightweight and Compromise-Resilient Message Authentication in Sensor Networks", April 2008 Proc. IEEE INFOCOM, 2008-Apr.
[23]. D. Chaum, "Untraceable Electronic Mail Return Addresses and Digital Pseudonyms", Comm. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
[24]. D. Chaum, "The Dinning Cryptographer Problem: Unconditional Sender and Recipient Untraceability", J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
[25]. R. Rivest, A. Shamir, Y. Tauman, "How to Leak a Secret", Proc. Advances in Cryptology (ASIACRYPT), 2001.
[26]. M. Wei, R. Aragues, C. Sagues, and G. C. Calafiore, “Noisy range network localization based on distributed multidimensional scaling,” IEEE Sensors J., vol. 15, no. 3, pp. 1872–1883, Mar. 2015.
[27]. S. Tomic, M. Beko, and R. Dinis, “RSS-based localization in wireless sensor networks using convex relaxation: Noncooperative and cooperative schemes,” IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2037–2050, May 2015.
[28]. O. Gungor, F. Chen, and C. E. Koksal, “Secret key generation via localization and mobility,” IEEE Trans. Veh. Technol., vol. 64, no. 6, pp. 2214–2230, Jun. 2015.
[29]. V. Prasad, V.S. Sunsan, “Multi path dynamic routing for data integrity and delay Minimization differentiated services in wireless sensor network”, International Journal of Scientific Research inResearch Paper” Vol.4, Issue.4, pp.20-23, August 2016.
Citation
Nidhi Tawra, Prerna, Bhawna Gupta, "A Location Dependent Key Management Method for WSN With Reduced Path Length And Considering Cell Head," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1468-1474, 2018.
The impact of high-k gate dielectric on Junctionless Vertical Double Gate MOSFET
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1475-1478, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14751478
Abstract
In this paper, The Juctionless Double Gate Vertical MOSFET with metal gate electrode and high-k gate dielectric material (HfO2) has been analyzed using simulation tool. The simulated results show significant improvement in its performance. In this device structure, the metal gate electrode and high-k gate dielectric material (HfO2) are used at the place of polysilicon gate electrode and SiO2 layer. We observed that use of metal gate electrode with SiO2 in JLVMOS exhibits drain current (Idmax) of 0.98 mA, average sub-threshold swing 67mV/dec and DIBL 61mV/V at gate voltage of 1V. When high-k gate dielectric material (HfO2) is used with metal gate electrode in JLVMOS shows drain current (Idmax) of 1.7mA, average subthreshold swing 61mV/dec and DIBL 40mV/V at gate voltage of 1V. This improvements in the performance of JLVMOS using high-k material can be utilized for high performance circuit applications.
Key-Words / Index Term
Junctionless Double Gate Vertical MOSFET (JLVMOS), Subthreshold swing (S.Swing), Drain Induced Barrier Lowering (DIBL), HfO2, Workfuntion (WF)
References
[1] Y. Taur, “CMOS design near the limit of scaling,” IBM J. Res. Develop., pp. 213– 222, 2002.
[2] Ismail, razak M. A et al., “Design and simulation analysis of Nanoscale vertical MOSFET Technology” SCOReD, pp. 215-218, 2009.
[3] C.-W. Lee,et al., "Performance estimation of junctionless multigate transistors," Solid-State Electronics, vol. 54, pp. 97-103, , 2010.
[4] Xin Qian, Yinglin Yang, et al., “Evaluation of DC and AC performance of junctionless MOSFETs in the presence of variability” IEEE conference on ICICDT, 31 May 2011.
[5] Jagdeep Rahul, Shekhar Yadav, Anurag Srivastava, et al., “Performance Evaluation of Junctionless Vertical Double Gate MOSFET,” IEEE conference on ICDCS, pp. 440 – 442, 15-16 March 2012.
[6] Shekhar Yadav, Jagdeep Rahul, Anurag Srivastava , et al., “TCAD Assessment of Nonconventional Dual Insulator Double Gate MOSFET ,” IEEE conference on ICDCS, pp. 462 – 465, 15-16 March 2012.
[7] B. Cheng, et al., “The impact of high-k gate dielectrics and metal gate electrodes on sub-100 nm MOSFETs,” IEEE Trans. Electron Devices, vol. 46, pp.1537-1544, July 1999.
[8] G. Ribes et al., “Review on High-k Dielectrics Reliability Issues, IEEE Transactions on Device and Materials Reliability, Vol. 5, no. 1, pp. 5–19, 2005.
[9] Duarte, J.P. Sung-Jin Choi, et al., “Simple Analytical Bulk Current Model for Long-Channel Double-Gate Junctionless Transistors,” IEEE Electron Device Lett. vol. 32, no. 6, pp.704-704, 2011.
[10] S. M. Nawaz, A. Mallik, "Effects of device scaling on the performance of junctionless finfets due to gate-metal work function variability and random dopant fluctuations", IEEE Electron Device Lett, vol. 37, no. 8, pp. 958-961, Aug. 2016.
[11] Y. Li, C. H. Hwang, T. Y. Li, M. H. Han, "Process-variation effect metal-gate work-function fluctuation and random-dopant fluctuation in emerging CMOS technologies", IEEE Trans. Electron Devices, vol. 57, no. 2, pp. 437-447, Feb. 2010.
[12] V. Narendar, R. A. Mishra, " Analytical modeling and simulation of multigate FinFET devices and the impact of high- k dielectrics on short channel effects (SCEs) ", Superlattices Microstruct., vol. 85, pp. 357-369, Sep. 2015.
[13] Basab Das “GaN channel Nanoscale MOSFET with Silicon Source and Drain and Silicon Germanium Bulk” International Journal of Computer Sciences and Engineering, Vol.-4(7),pp-140-143, Dec 2016.
[14] Karishma Bajaj et al"CMOS Technology Vs Carbon Nano Scale FET’s " International Journal of Computer Science Engineering, Vol. 5 No.05, pp-277-280, Sep 2016.
Citation
Jagdeep Rahul, "The impact of high-k gate dielectric on Junctionless Vertical Double Gate MOSFET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1475-1478, 2018.
Different Query Optimization Techniques (QOT) using Data Mining Technology
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1479-1487, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14791487
Abstract
Data mining is one of the main research areas to find particular data from the large set of data. The main aim of this paper is to give more knowledge about the agriculture sector. Agriculture is one of the main economic parts of growing country. Agricultural statistical data from India as been taken here the state of Kerala. To cover Kerala state 14 districts cropped data analysis, in the 12 years pattern of statistical dataset, start from 2005 to 2017. Utilization of Query Optimization Techniques (QOT), K-Means clustering and Filter Techniques (FT). The QOT analysation is to provide variety of query generation and reports. The K-Means clustering, is usage of spatio-temporal cluster data mining techniques. It also provides changes report of the dataset. Using clustering analysis is the process of discovering groups. The FT is used to filter the data season wise and found maximum production of rice occurrence district report.
Key-Words / Index Term
Cropped area-Grouping-Query optimization-Maximum Production
References
[1]Anusha A. Shettar , Shanmukhappa A. Angadi “Efficient Data Mining Algorithms For Agriculture Data”,International Journal of Recent Trends in Engineering & Reseach(IJRTER), Volume 02, Issue 09; September - 2016 [ISSN: 2455-1457] PP 141-149.
[2] Nirav Desai, GeetikaKalra, Amit Khandelwal, Shashank Mishra, TejaswiniApte “ A Design Of A Data Warehouse And Use Of Data Mining Techniques For Analysis Of Risk Factors Affecting Agriculture In India” IOSR Journal of Agriculture and Veterinary Science (IOSR-JAVS) e-ISSN: 2319-2380, p-ISSN: 2319-2372. Volume 8, Issue 10 Ver. II (Oct. 2015), PP 81-88.
[3] M. Kannan et. al. “Rainfall Forecasting Using Data Mining Technique”, International Journal of Engineering and Technology Vol.2 (6), 2010, 397-401.
[4] Sarisa Pinkham, Kanyarat Bussaban, “An Approximation of Daily Rainfall by Using a Pixel Value Data Approach”,World Academy of Science, Engineering and Technology International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering Vol:8, No:5, 2014.
[5] Narayanan Balakrishnan1 and Dr.Govindarajan Muthukumarasamy , “ Crop Production-Ensemble Machine Learning Model for Prediction”, International Journal of Computer Science and Software Engineering (IJCSSE), Volume 5, Issue 7, July 2016. ISSN (Online): 2409-4285, Page: 148-153.
[6] R. Lakshmi Priya and G. Manimannan, “ Rainfall Fluctuation and Region wise Classification in Tamilnadu: Using Geographical Information System”, IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 10, Issue 5 Ver. IV (Sep-Oct. 2014), PP 05-12.
N. Appala Raju et al., “study on spatial distribution of groundwater quality in vizianagaram district of andhra pradesh, india”, International Journal of Science, Environment and Technology, ISSN 2278-3687 (O) , Vol. 3, No 1, 2014, 148 – 160.
[7]Durga Karthik and K.Vijayarekha “multivariate data mining techniques for assessing water potability”, Vol. 7 | No.3 |256 – 259 | July – September | 2014 ISSN: 0974-1496 | e-ISSN: 0976-0083 | CODEN: RJCABP .
[8]Faisal Aburub, Wael Hadi, “Predicting Groundwater Areas Using Data Mining Techniques: Groundwater in Jordan as Case Study”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:9, 2016.
[9]Faridi et al., “ Ground Water Quality Assessment using Data Mining Techniques”, Volume 5, Issue 6, June 2015 ISSN: 2277 128X.
[10]Himanshu Trivedi, Dr. Amit Dutta, “Parametric Analysis of Water Resource Data (E-Governance Projects) Using Data Mining Techniques”, International Journal of Advanced Trends in Computer Science and Engineering, Vol. 3 , No.2, Pages : 04 - 07 (2014) Special Issue of ICACE 2014 - Held on March 10, 2014 in Hotel Sandesh The Prince, Mysore, India.
[11]Jalna (Maharashtra-India)”, Int. Journal Of Engineering Research And Applications www.ijera.com Issn : 2248-9622, Vol. 5, Issue 2, ( Part -5) February 2015, Pp.20-29.
[12]Kamakshaiah.Kolli and R. Seshadri, “ Ground Water Quality Assessment using Data Mining Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 76– No.15, August 2013.
[13]K.Yoo et al., “Decision tree-based data mining and rule induction for identifying hydrogeological parameters that influence groundwater pollution sensitivity”, Journal of Cleaner Production 122 (2016) 277-286.
[14]L.Yeshodha et al., “ Comparative Analysis for Estimation of Groundwater Potential A-Case Study for Hosur Block, Krishnagiri District , Tamil Nadu”, international journal of innovative research in technology&science | volume 1, number5.
[15]Nallan, S. , & Armstrong, L. “ Assessment of Climate Change Effect on Water Harvesting Structures in Rainfed Regions: Geospatial Data Mining Approach” Proceedings of The Third National Conference on Agro-Informatics and Precision Agriculture 2012. (pp. 201-204). Hyderabad, India. Allied Publishers PVT LTD.
[16]M Waseem Ashfaque et al., “ Robust Strategies of GIS and Geospatial Data mining techniques for drinking ground water quality management, challenges and issues of Drought Case study
[17]Oliver López-Corona et al., “Data Mining of Historic Hydrogeological and Socioeconomic Data Bases of the Toluca Valley, Mexico”, Journal of Water Resource and Protection, 2016, 8, 522-533 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jwarp,http://dx.doi.org/10.4236/jwarp.2016.84044.
[18]Pratap Singh Solanki and R. S. Thakur , “ A Review of Literature on Water Resource Management Using Data Mining Techniques”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391.
[19] Rosaida Rosly et al., “ The Study on the Accuracy of Classifiers for Water Quality Application”, International Journal of u- and e- Service, Science and Technology Vol.8, No.3 (2015), pp.145-154 http://dx.doi.org/10.14257/ijunesst.2015.8.3.13
[21]http://www.ecostat.kerala.gov.in/index.php/agricultures.
[22] Ramprasad Kundu et al., “Spatial Growth Pattern of Potato in West Bengal using Multi-temporal MODIS NDVI Data”,IJCSE., Vol.6 , Issue.6 , pp.55-61, Jun-2018.
[23] Kone Chaka et al., “performance comparison of the knn and svm classification algorithms in the emotion detection system emotica”, Int J Sens Netw Data Commun, an open access journal Volume 7 • Issue 1 • 1000153 ISSN: 2090-4886.
Citation
I. Shahina Begam, K. Tajudin, "Different Query Optimization Techniques (QOT) using Data Mining Technology," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1479-1487, 2018.
Provenance Based Mechanism to identify Packet Drop attack in WSN
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1488-1492, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14881492
Abstract
Wireless sensor networks (WSN) is a wireless connection of the sensor nodes and they spontaneously build the networks so that the sensor data can be communicate wirelessly. Data collected from sensor network are used in decision making. A malicious adversary can introduce additional nodes in the network easily and tamper the information. Provenance is used for assessing the trustworthiness of the data, diagnosing network failures, detecting early signs of attacks, etc. But management of the provenance for sensor networks may lead to several challenging requirements, such as low energy and bandwidth consumption, efficient storage and secure transmission. We propose an efficient mechanism to securely transmit the data through the nodes using AODV Routing algorithm and secure provenance scheme to detect packet drop attacks in the network using Bloom Filter.
Key-Words / Index Term
Provenance, Ad-hoc On Demand Distance Vector(AODV)
References
[1] Y. Simmhan, B. Plale, and D. Gannon, “A Survey of Data Provenance in E-Science,” ACMSIGMODRecord, vol. 34, pp. 31-36, 2005.
[2] R. Hasan, R. Sion, and M. Winslett, “The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance,” Proc. Seventh Conf. File and Storage Technologies (FAST), pp. 1-14, 2009.
[3] C. Rothenberg, C.Macapuna,M.Magalhaes, F. Verdi, and A. Wiesmaier,“In-Packet Bloom Filters: Design and Networking Applications,” Computer Networks, vol. 55, no. 6, pp. 1364-1378, 2011.
[4] H. Lim, Y. Moon, and E. Bertino, “Provenance-Based Trustworthiness Assessment in Sensor Networks,” Proc. Seventh Int’l WorkshopData Management for Sensor Networks, pp. 2-7, 2010.
[5] Salmin Sultana, Gabriel Ghinita, Member, IEEE ,Elisa Bertino, Fellow, IEEE , and Mohamed Shehab,Member, IEEE Computer Society, “A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks”, ieee transactions on dependable and secure computing, vol. 12, no. 3,may/june 2015.
[6] Salmin Sultana, "A Provenance based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor," in 31st International Conference on Distributed Computing Systems Workshops, 2011.
[7] A. Kirsch and M. Mitzenmacher, “Distance-Sensitive Bloom Filters,” Proc. Workshop Algorithm Eng. and Experiments, pp. 41-50, 2006.
[8] S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure Data Aggregation in Wireless Sensor Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, June 2012.
[9] W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. Loo, and M. Sherr, Secure Network Provenance, Proc. ACMSOSP, pp. 295-310, 2011.
[10] S. Chong, C. Skalka, and J.A. Vaughan, Self-Identifying Sensor Data, Proc. Ninth ACM/IEEE Intl Conf. Information Processing in Sensor Networks (IPSN), pp. 82-93, 2010.
[11] S. Sultana, M. Shehab, and E. Bertino, Secure Provenance Transmission for Streaming Data, IEEE Trans. Knowledge and Data Eng., vol. 25, no. 8, pp. 1890-1903, Aug. 2013.
[12] R. Laufer, P. Velloso, D. Cunha, I. Moraes, M. Bicudo, M. Moreira, and O.Duarte, Towards Stateless Single-Packet IP Traceback, Proc.32nd IEEE Conf. LocalComputer Networks (LCN), pp. 548-555,2007.
Citation
Anudeepa, Amutha S, "Provenance Based Mechanism to identify Packet Drop attack in WSN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1488-1492, 2018.
Identification of Cucumber Leaf Disease using Image Processing Techniques
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1493-1499, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14931499
Abstract
Agriculture is the backbone of Indian economy. Plant disease which mainly affects the leaves is the major constraining factor, which decreases the productivity of cucumber. Farmers are experiencing heavy loss in the yield due to disease attack on leaves. Hence detection and diagnosis of cumber leaf disease at the right time are very essential. Diagnosis of cucumber leaf disease at the early stage helps in preventing heavy loss in the yield. Automatic detection of cucumber disease using image processing techniques helps in monitoring large fields by identifying the diseases as soon as they appear on the leaf. The main purpose of this work is disease identification and classification using image processing techniques. The proposed method mainly comprises of image pre-processing, segmentation using K means clustering to segment the diseased leaf then feature extraction and followed by classification of disease using SRC. The experimental results show that the cumber leaf diseases can be identified more accurately for the proposed work.
Key-Words / Index Term
Cucumber leaf disease, K-means Clustering, Sparse representation Classification (SRC)
References
[1] X. W. Z. Y. L. Z. Shanwen Zhang, “Leaf image based cucumber disease recognition using sparse representation classification,” computers and Electronics in Agriculture 134 (2017) 135–141, p. 7, 2017.
[2] J. S. A. Camargo, “An image-processing based algorithm to automatically identify plant disease visual symptoms,” Published by Elsevier Ltd. All rights reserved., p. 9, 2009.
[3] R. K. Jayamala K. Patil, “Color Feature Extraction of Tomato Leaf,” International Journal of Engineering Trends and Technology- Volume2Issue2- 2011, p. 3, 2011.
[4] W. X. Dong Pixia, “Recognition of Greenhouse Cucumber Disease Based on Image Processing Technology,” Open Journal of Applied Sciences, 2013, 3, 27-31, p. 5, 2013.
[5] a. G. S. J. Pooja, “Adaptive histogram equalization technique for enhancement of coloured image quality,” International Journal of Latest Trends in Engineering and Technology, 2017.
[6] Y. K. Shefali Gupta, “Review of Different Local and Global Contrast Enhancement Techniques for a Digital Image,” International Journal of Computer Applications , 2014.
[7] M. S. Al-Tarawneh, “An Empirical Investigation of Olive Leave Spot Disease Using Auto-Cropping Segmentation and Fuzzy C-Means Classification,” World Applied Sciences Journal 23 (9): 1207-1211, 2013, p. 5, 2013.
[8] D. S. S. D. M. S. Shabari Shedthi B, “Implementation and Comparison of K-Means and Fuzzy C-Means Algorithms for Agricultural Data,” in International Conference on Inventive Communication and Computational Technologies, 2017.
[9] Z. G. D. M. Fengxi Song, “Feature selection using principal component analysis,” in International Conference on System Science, Engineering Design and Manufacturing Informatization, 2010.
[10] S.C.Ng, “Principal component analysis to reduce dimension on digital image,” in 8th International Conference on Advances in Information Technology, IAIT2016, 19-22, 2017.
[11] Y. M. J. M. G. S. S. H. S. Y. John Wright, “Sparse Representation for Computer Vision and Pattern Recognition,” in 2010 IEEE, 2010.
[12] X. H. P. L. F. Z. Taisong Jin, “A Novel Method of Automatic Plant Species Identification Using Sparse Representation of Leaf Tooth Features,” PLOS ONE, p. 20, 2015.
[13] Y. H. a. H. H. Hyunsup Yoon, “Image Contrast Enhancement based Sub-histogram Equalization Technique without Over-equalization Noise,” International Journal of Electrical and Computer Engineering, p. 7, 2009.
[14] G. Z. Libo Liu, “Extraction of the Rice Leaf Disease Image Based on BP Neural Network,” in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, 2009.
[15] T. L. a. N. L. Peng Guo, “Design of Automatic Recognition of Cucumber Disease Image,” Information Technology Journal, p. 9, 2014.
[16] M. C. Saurabh Prasad, “Sparse Representations for Classification of High Dimensional Multi-Sensor Geospatial Data,” in ieee, 2013.
[17] “www.ipmimages.org”.
Citation
Shrutika.C.Rampure, Dr. Vindhya .P. Malagi, Dr. Ramesh Babu D.R, "Identification of Cucumber Leaf Disease using Image Processing Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1493-1499, 2018.
ST Segment Analysis for Early Detection of Myocardial Infarction
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1500-1504, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.15001504
Abstract
Myocardial infarction is one of the most serious and prevailing heart disease faced in today’s world, occurs when blood supply stops to a certain artery. Early and accurate detection of myocardial infarction reduces the mortality rate of heart attack. In this paper, we proposed an algorithm for early detection of myocardial infarction based on analysis of ST segment in electrocardiogram (ECG). This algorithm consists of following steps: loading of a database from physionet, preprocessing of a signal, detection of QRS complex, P, T wave, ST segment and other related parameters. European ST-T database was used for evaluation of an algorithm for detection of ST segment.
Key-Words / Index Term
Electrocardiogram (ECG), myocardial infarction (MI), ST segment, QRS complex, European ST-T database
References
[1] Reddy, K.S., Yusuf, S.: Emerging epidemic of cardiovascular diseases in developing countries. Circulation 97(6), pp. 596-601, 1998.
[2] W.H.O.: World health statistics 2015: part ii: global health indicators. Technical report, World Health Organization (2015).
[3] Kumari Nirmala, R.M.Singh, Silpi Gupta,”Analysis of Heart related Issues using Comprehensive Approaches: A Review”, International Journal of Computer Science & Engineering,Vol3(3), pp.184-187,March 2015
[4] Duck Hee Lee, Jun Woo Park, Jeasoon Choi, Ahmed Rabbi and Reza Fazel-Rezai, “Automatic Detection of Electrocardiogram ST Segment: application in Ischemic Disease Diagnosis”, International Journal of Advanced Computer Science and Applications, Vol.4, No.2, 2014.
[5] Jayachandran, E.S., et al.: Analysis of myocardial infarction using discrete wavelet transform. J. Med. Syst. 34(6), pp. 985–992, 2010
[6] Banerjee, S., Mitra, M.: Application of cross wavelet transform for ECG pattern analysis and classification. IEEE Trans. Instrum. Meas. 63(2), pp. 326–333,2014
[7] Acharya, U.R., Fujita, H., Sudarshan, V.K., Oh, S.L., Adam, M., Koh, J.E., Tan, J.H., Ghista, D.N., Martis, R.J., Chua, C.K., et al.: Automated detection and localization of myocardial infarction using electrocardiogram: A comparative study of different leads. Knowl. Based Syst. 99, pp. 146–156, 2016
[8] Arif, M., Malagore, I.A., Afsar, F.A.: Detection and localization of myocardial infarction using k-nearest neighbor classifier. J. Med. Syst. 36(1), pp.279–289 2012
[9] Mitra, S., Mitra, M., Chaudhuri, B.B.: A rough-set-based inference engine for ECG classification. IEEE Trans. Instrum. Meas. 55(6), pp. 2198–2206, 2006
[10] Papaloukas, C., Fotiadis, D.I., Likas, A., Michalis, L.K.: An ischemia detection method based on artificial neural networks. Artif. Intell. Med. 24(2), pp. 167–178 2002.
[11] Safdarian, N., Dabanloo, N.J., Attarodi, G.: A new pattern recognition method for detection and localization of myocardial infarction using t-wave integral and total integral as extracted features from one cycle of ECG signal. J. Biomed. Sci. Eng. 7(10), pp.818–824,2014
[12] Zheng, H., Wang, H., Nugent, C., Finlay, D.: Supervised classification models to detect the presence of old myocardial infarction in body surface potential maps. In: Computers in Cardiology, pp. 265–268. IEEE, Valencia, Spain 2006
[13] “The European ST-T Database”, online at http://www.physionet.org/physiobank/database/edb/.
[14] J. Tompkins, A real-time QRS detection algorithm, IEEE Trans. Biomed. Eng. BME-32 (3), pp.230–236,1985
[15] Rangayyan R M. Biomedical Signal Analysis, 2nd edition.NewYork Wiley-IEEE Press;2015
[16] Rachid Haddadi, Elhassane Abdelmounim, Mustapha Elhanine, Abdelaziz Belaguid, “ST Segment Analysis Using Wavelet Transform”, International Journal of Computer Science and Network Security, Vol.17 No.9,2017
Citation
Nang Anija Manlong, Jagdeep Rahul, Marpe Sora, "ST Segment Analysis for Early Detection of Myocardial Infarction," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1500-1504, 2018.
The Selection of Software Reliability Growth Models in Software Development Life Cycle
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.1505-1512, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.15051512
Abstract
The definition of software engineering might blast something like, “An organized, analytical approach to the analysis, design, development, use, reliability and maintenance of software.”Software reliability is the probability that a software system will function without failure under a given environment and during a specified period of time. To be cost and time effective, reliability engineering has to be coordinated with quality assurance activities, in agreement with Total Quality Management (TQM) and concurrent engineering efforts. To build in reliability and maintainability into complex equipment or systems, failure rate and failure mode analyses have to be performed early in the software development life cycle (SDLC) and be supported by design guidelines for reliability, maintainability and software quality as well as extensive design reviews. There are different types of software reliability models (SRMs) used for different phases of the software development life-cycle. With the growing demand to deliver quality software, software development organizations need to manage quality achievement and assessment. In this paper, we present the utility of a software reliability growth model is related to its stability and predictive ability. Stability means that the model parameters should not significantly change as new data is added. Predictive ability means that the number of remaining defects predicted by the model should be close to the number found in field use.
Key-Words / Index Term
Software reliability models, model classification, software reliability growth model, Time Between Failure, Fault Count Model
References
[1] Yamada, S. and Osaki, S., “Software Reliability Growth Modeling: Models and Applications, IEEE Trans. On Software Engineering, vol. SE-11, no. 12, pp. 1431-1437, December1985.
[2] Hoang Pham, “Software Reliability", Springer-Verlag Singapore,Pte. Ltd 2000.
[3] A. Birolini, “Reliability Engineering Theory and Practice”, @ Springer-Verlag Berline, 1999.
[4] http://www.reliabilityeducation.com/ReliabilityPredictionBasics.p df.
[5] Linda M. Laird and M. Carol Brennan, "Software Measurement and Estimation", Copyright John Wiley & Sons, Inc., 2006.
[6] A. Loganathan, R. Jeromia Muthuraj, "Importance Of Environmental Factors Affecting Software Reliability”, Global And Stochastic Analysis, Vol. 4 No. 1, 119-125, January 2017.
[7] Alan Wood,"Software Reliability Growth Models",© Tandem Computers, 1996.
[8] A. L. Goel, "Software Reliability Models: Assumptions, Limitations, and Applicability", IEEE Transactions on Software Engineering, Volume SE-11. Number 12, pages 1411–1423, December 1985.
[9] Ch. Ali Asad, Muhammad Irfan Ullah, Muhammad Jaffar-Ur Rehman, "An Approach for Software Reliability Model Selection”, Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC’04), IEEE, 2004.
Citation
J.K. Mantri, R.S Bala, "The Selection of Software Reliability Growth Models in Software Development Life Cycle," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1505-1512, 2018.
A Survey on Identification and Detection of Fruits based on Deep Neural Networks
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.1513-1517, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.15131517
Abstract
In Computer vision, object detection has become one of the most popular research fields. Human eyes can distinguish a various number of objects in images with less exertion, despite the fact that the objects in the images differ at various perspectives. This task is as yet a challenge for Computer vision frameworks. The goal is to present an efficient approach for fruit detection which can be used for yield estimation. In this paper, an efficient survey presented for Fruit detection in order to estimate the yield using Convolutional Neural Networks. This approach mainly benefits farmers and also applying automation in the field of agriculture, this helped to create several advancements to the industry. Various methods are surveyed in this paper in order to solve the existing problems of Fruit detection.
Key-Words / Index Term
Convolutional Neural networks, fruit detection, learning methods
References
[1] C. Bac, E. van Henten, J. Hemming and Y. Edan, "Harvesting Robots for High-Value Crops: State-of-the-Art," 2014.
[2] S. Nuske, S. Achar, T. Bates, S. Narasimhan and S. Singh, "Yield Estimation in Vineyards by Visual," September 2011..
[3] S. Nuske, K. Wilshusen, S. Achar and L. Yoder, "Narasimhan, S.; Singh, S. Automated visual yield estimation," 2014.
[4] K. Yamamoto, W. Guo, Y. Yoshioka and S. Ninomiya, "On plant detection of intact tomato fruits using image," vol. 2191–12206., 2014.
[5] Q. Wang, S. Nuske, M. Bergerman and S. Singh, "Automated Crop Yield Estimation for Apple Orchards.," 17–22 June 2012..
[6] C. Bac, J. Hemming and E. van Henten, "Robust pixel-based classification of obstacles for robotic harvesting," Vols. 96, 148–162., 2013.
[7] C. Hung, J. Nieto, Z. Taylor and J. S. Underwood, "Orchard fruit segmentation using multi-spectral," 3–7 November 2013.
[8] K. Kapach, E. Barnea, R. Mairon, Y. Edan and O. Ben-Shahar, "Computer vision for fruit harvesting robots-state," 2012.
[9] Y. Song, C. Glasbey, G. Horgan, G. Polder, J. Dieleman and G. van der Heijden, "Automatic fruit recognition," 2014.
[10] A. Krizhevsky, I. Sutskever and G. Hinton, "Imagenet classification with deep convolutional neural networks.," 8–13 December 2014.
[11] J. Uijlings, K. van de Sande, T. Gevers and A. Smeulders, "Selective search for object recognition," Int. J..
[12] C. Zitnick and P. Dollár, "Edge boxes: Locating object proposals from edges.," 2014.
[13] S. Ren, K. He, R. Girshick and J. Sun, "Faster R-CNN: Towards real-time object detection with region," 7–12 December 2015.
[14] K. He, X. Zhang, S. Ren and J. Sun, "Spatial pyramid pooling in deep convolutional networks for," 2015.
[15] R. Girshick, "Fast r-cnn," 13–16 December 2015.
[16] A. Eitel, J. Springenberg, L. Spinello, M. Riedmiller and W. Burgard, "Multimodal deep learning for robust," 28 September–2 October 2015.
[17] I. Lenz, H. Lee and Saxena, "Deep learning for detecting robotic grasps," 2015.
[18] T. Ojala, M. Pietikainen and Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification," 2002.
[19] J. Donahue, Y. Jia, O. Vinyals, J. Hoffman, N. Zhang, E. Tzeng and T. Darrell, "DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition," 2013.
[20] J. E. P. e. a. Orlando, "Convolutional Neural Network Transfer for Automated," 20117.
Citation
Moksha Lakshmi B N, Vindhya P Malagi, "A Survey on Identification and Detection of Fruits based on Deep Neural Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1513-1517, 2018.