Various Techniques for Controlling Transmit Power in Cognitive Radio: Survey
Survey Paper | Journal Paper
Vol.5 , Issue.9 , pp.175-180, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.175180
Abstract
Cognitive radio has been recently proposed as a promising technology to improve the spectrum utilization efficiency by intelligently sensing and accessing some vacant bands of primary users (PU). After reviewing fundamental papers it is found that much work has been done in the field of spectrum sensing for cognitive radio and different types of spectrum sensing methods. Transmitted power of CUs causes interference to PU when it is beyond tolerance limit. Most of this area has been remained untouched. This paper focuses on the work done in controlling the transmit power. In this situation, an effective and appropriate power control method is necessary for cognitive users for achieving quality of service (QoS).
Key-Words / Index Term
Cognitive Radio Networks, Underlay Spectrum Sharing, Interference, Power Control, Game Theory, ANFIS
References
[1]. H. Takagi and B. H. Walke, “Spectrum Requirement Planning in Wireless Communications: Model and Methodology for IMT-Advanced”, John Wiley & Sons, Chichester, England, 2008.
[2]. M. Matinmikko, J. Huschke, T. Irnich, J. Ojala and P. Ojanen, “ITUR Spectrum Demand Calculation for IMT-Advanced”, Radio Technologies and Concepts for IMT-Advanced, John Wiley & Sons, Chichester, England, pp.459–480, 2009.
[3]. Gregory Staple and Kevin Werbach, “The End of Spectrum Scarcity”, IEEE Spectrum Online, March 2004.
[4]. “Radio Spectrum Policy Group Report on Cognitive technologies”, RSPG10-306, February 2010.
[5]. B. Wang and K. J. R. Liu, “Advances in Cognitive Radio Networks: A Survey”, IEEE Journals on Selective Topics Signal Process, Vol. 5, No. 1, pp.5–23, 2011.
[6]. J. Mitola and G. Q. Maguire, “Cognitive radios: Making Software Radios More Personal”, IEEE Pers. Communication., Vol. 6, No. 4, pp.13-18, August 1999.
[7]. S. Haykin, “Cognitive Radio: Brain-empowered Wireless Communications”, IEEE Journal on Selected Areas in Communication, Vol. 23, No. 2, pp.201-220, February 2005.
[8]. Bruce A. Fette, “Cognitive Radio Technology”, 1st Edition, ELSEVIER, USA, 2006.
[9]. Beibei Wang, Yongle Wu, K.J. Ray Liu “Game Theory for Cognitive Radio Networks: An Overview”, Elsevier, Computer Networks, pp.2537–2561, 2010.
[10]. Wang Xia, Zhu Qi, “Power Control for Cognitive Radio Base on Game Theory”, Wireless Communications, Networking and Mobile Computing, WiCom International Conference, pp.1256-1259, 2007.
[11]. Karama Hamdi, Wei Zhang, and Khaled Ben Letaief, “Power Control in Cognitive Radio Systems Based on Spectrum Sensing Side Information”, IEEE ICC proceedings, pp.5161-5165, 2007.
[12]. Luyong Zhang, Sen Zhang, Lin Wu, Yujun Liu and Chengshi Zhao, “A Nash Game Algorithm for Distributive Power Control with Faster Convergence in Cognitive Radio”, pp.93-96, IEEE, ISCIT 2009.
[13]. Zeljko Tabakovic and Sonja Grgic, Mislav Grgic, “Fuzzy Logic Power Control in Cognitive Radio”, 16th IEEE International Conference on Systems, Signals and Image Processing (ICSSIP), pp.1-5, 2009.
[14]. Ping Li, Shixiang Shao, Longxiang Yang, Hongbo Zhu, “A Novel Power Control Game Algorithm for Cognitive Radio”, International Conference on Communications and Mobile Computing, pp.149-153, 2010.
[15]. Chen Sun, Yohannes D. Alemseged, Ha Nguyen Tran and Hiroshi Harada, “Transmit Power Control for Cognitive Radio over a Rayleigh Fading Channel”, IEEE Transactions on Vehicular Technology, Vol. 59, No. 4, pp.1847-1857, May 2010.
[16]. Ai Wei Sun, Hang Zhang, “An Improved Power Control Algorithm in Cognitive Radio System”, IEEE 14th International Conference on Communication and Technology, pp.1193-1197, 2012.
[17]. Siamak Sorooshyari, Chee Wei Tan and Mung Chiang, “Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis”, IEEE/ACM Transactions on Networking, Vol. 20, No.3, pp.878-891, June 2012.
[18]. Chen Sun, Gabriel Porto Villardi, Zhou Lan, Yohannes D. Alemseged, Ha Nguyen Tran and Hiroshi Harada, “Optimizing the Coexistence Performance of Secondary-User Networks Under Primary-User Constraints for Dynamic Spectrum Access”, IEEE Transactions on Vehicular Technology, Vol. 61, No. 8, pp.3665- 3678, October 2012.
[19]. Zhengqiang Wang, Lingge Jiang and Chen He, “A Novel Price-Based Power Control Algorithm in Cognitive Radio Networks”, IEEE Communications Letters, Vol. 17, No.1, pp.43-46, January 2013.
[20]. Zhao Junhui, Yang Tao, Gong Yi, Wang Jiao, Fu Lei, “Power Control Algorithm of Cognitive Radio Based on Non-Cooperative Game Theory”, China Communications, pp.143-154, November 2013.
[21]. Lu Lu, Geoffrey Ye Li, Gang Wu, “Optimal Power Allocation for CR Networks with Direct and Relay-Aided Transmissions”, IEEE Transaction on Wireless Communication, Vol. 12, No. 4, pp.1832- 1842, April 2013.
[22]. Mardeni. R, K. Anuar, Hafidzoh.M, M.Y.Alias, H.Mohamad, N.Ramli, “Efficient Handover Algorithm Using Fuzzy Logic Underlay Power Sharing for Cognitive Radio Wireless Network”, IEEE Symposium on Wireless Technology and Application (ISWTA), pp.53-56, September, 2013.
[23]. Joyraj chakraborty, J. V. K. C Varma and Maria Erman, “ANFIS based Opportunistic Power Control for Cognitive Radio in Spectrum Sharing”, IEEE International Conference on Electrical Information and Communication Technology (EICT), 2013.
[24]. Yousef Ali Al-Gumaei, Kamarul Ariffin Noordin, Ahmed Wasif Reza, Kaharudin Dimyati, “A New SIR-Based Sigmoid Power Control Game in Cognitive Radio Networks”, PLOS ONE, Vol. 9 Issue.10, October 2014.
[25]. Jadhav Priyanka D., Dr. Kanse Y.K, “Power Control in Cognitive Radio: Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue. 3, pp.891-893, March 2015.
[26]. Nandkishor Joshi, Bhavana Jharia, “Optimized fuzzy power control over fading channels in spectrum sharing cognitive radio using ANFIS”, IEEE 2nd International Conference on Signal Processing and Integrated Networks (SPIN) pp.329-333, 2015.
Citation
Sarika Devi, A.K. Goel, Nikita Sehgal, "Various Techniques for Controlling Transmit Power in Cognitive Radio: Survey," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.175-180, 2017.
Improving Confidentiality, Integrity, Authenticity in Mobile Wallet
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.181-184, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.181184
Abstract
Mobile Transactions have seen an emerging trends after Demonetization and emergence of Digital–wallets. However, Transaction through mobile wallets or payment applications is not secure due to breaching of sensitive information by the attacker. When confidential data is breached all the sensitive information is lost. Hence, it is required to secure transaction by encryption. This paper shows the comparision in time performance of payment application using two Cryptographic Processes to enhance Confidentiality, integrity & Authenticity of private or confidential data. One Cryptographic Process includes combination of AES & ECC and Other Cryptographic process include RSA. In this paper, we have implemented using AES & ECC and compared the results with RSA.
Key-Words / Index Term
Android, Authenticity, Confidentiality, Demonetization, Integrity, Mobile Wallet
References
[1] Z. Chuanrong, Z. Lianqing, X. Mingwen, Z. Yuqing, “ Secure Signcryption Scheme Based on a Hybrid Encryption”, vol. 978-0-7695-4297-3/10, IEEE Computer society in International Conference on Computational Intelligence and Security,2010
[2] Z. Chuanrong, C. Long, Z. Yuqing, “Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA”, vol. 978-0-7695-4222-5/10 , IEEE in Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2010
[3]N. Saxena, N.S. Chaudhari “Secure Encryption with Digital Signature .Approach for Short Message Service”, vol. 978-1-4673-4805-8/12, IEEE in World Congress on Information and Communication Technologies , 2012
[4] N. Saxena, N. S. Chaudhari, G.L. Prajapati, “An Extended Approach for SMS Security using Authentication Functions”, vol. 978-1-4577-2119-9/12, IEEE in 7th IEEE Conference on Industrial Electronics and Applications (ICIEA),2012
[5] S.Ariffin, R. Mahmod, R. Rahmat, N.A. Idris, “SMS Encryption using 3D-AES Block Cipher on Android Message Application”, vol. 978-1-4799-2758-6/13, IEEE in International Conference on Advanced Computer Science Applications and Technologies ,2013
[6] H.A.B.A.Ulayee, Md.Mesbah-Ul-Awal, S.Newaj, “Simplified Approach towards Securing Privacy and Confidentiality of Mobile Short Messages”, vol. 978-1-4799-4910-6/14, IEEE in Fourth International Conference on Advanced Computing & Communication Technologies, 2014
[7] R. Ullah, Nizamuddin, A.I. Umar, N. ul Amin, “Blind Signcryption Scheme Based on Elliptic Curves”, vol. 978-1-4799-5852-8/14, IEEE in Conference on Information Assurance and Cyber Security (CIACS),2014
[8] T. Mantoro, Laurentinus, N. Agani, M. A. Ayu, “ Improving the Security Guarantees, Authenticity and Confidentiality in Short Message Service of Mobile Applications”, vol. 10.1109/CITSM.2016.7577592, IEEE in 4th International Conference on Cyber and IT Service Management, 2016
[9] William Stallings , “ECC Diffie-Hellman Key Exchange” , Figure 7 , pp. 295 ,Cryptography and Network Security: principles and practice, Sixth Edition published by Pearson Education, 2014.
Citation
Garima Agrawal, Abhilash Sonker, "Improving Confidentiality, Integrity, Authenticity in Mobile Wallet," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.181-184, 2017.
Design and Development of Treadmill Controller with Wireless Mobile Health Monitoring System
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.185-189, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.185189
Abstract
Humans used to workouts to burn calories to stay physically fit. For this purpose, Treadmills are extensively used inside gym as well as at home. The mechanical work done on the treadmill can be utilized to generate electrical power with minor machine modifications. This paper present a methodology to generate energy from various exercise equipment e.g. treadmill, bicycle. A microcontroller based automated electronic power controller has been developed. It controls and monitor generated power up to the storage device. MPPT algorithm along with CUK converter is implemented for better power efficiency. An independent health monitoring system has also been developed. It is a microcontroller based device which measures various health characteristics of the user. It also maintain database of health status reports for future use. For instant health status routine GSM based mobile SMS service used along with UART based PC communication. The designed system stores power generated while workouts and it also measures user health status continuously during workouts.
Key-Words / Index Term
Treadmill Power Controller, Wireless Health monitoring, Power generation
References
[1] Joachim von Zitzewitz, Michael Bernhardt, and Robert Riener, “A Novel Method for Automatic Treadmill Speed Adaptation, ” in IEEE Transactions on Neural Systems And Rehabilitation Engineering, Vol. 15, No. 3, September 2007
[2] Yang Shu, Hui Li, Limei Xu, Qian Wu, “A Rapid Development Method on Brushless DC motor Controller,” 1-4244-0755-9/07/C IEEE Transactions On Instrumentation And Measurement, July 2007
[3] Kaili Weng, Basil Turk, Louis Dolores, Tuan N. Nguyen, Branko Celler, Steven Su, and Hung T. Nguyen, “Fast tracking of a given heart rate profile in treadmill exercise,”32nd Annual International Conference of the IEEE EMBS Buenos Aires, Argentina, August 31 - September 4, 2010
[4] Steven W. Su, Lu Wang, Branko G. Celler, Andrey V. Savkin, and Ying Guo, “Modelling and Control for Heart Rate Regulation during Treadmill Exercise,” Proceedings of the 28th IEEE EMBS Annual International Conference New York City, USA, Aug 30-Sept 3, 2006
[5] Fr´ed´eric Mazenc, Michael Malisoff, Marcio de Queiroz, “Model-Based Nonlinear Control of the Human Heart Rate During Treadmill Exercising,” 49th IEEE Conference on Decision and Control December 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA
[6] Kuan-Hung Chen, Jiunn Fang, and Shih-Wei Yeh, “Design of an Unobtrusive Reaction Force Measurement and Its Application on Treadmills,” IEEE Transactions On Instrumentation And Measurement, Vol. 61, No. 7, July 2012
[7] Lambert M.I., Mbambo Z.H. and Gibson A.C “Heart rate during training and competition for long-distance running”, Sports Sciences, vol 16, pp 85-90, 1998.
[8] Steven W. Su, Lu.Wang and Branko G.Celler “Heart Rate Control During Treadmill Exercise” in 27th Annual International IEEE EMBS Conference Shanghai, China, September 1-4, 2005.
[9] P. Padmavathy, C. Balakrishnan, "Smart Tracking of Human Location and Events Based on WPS using Android Technology", International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.30-34, 2014.
Citation
Gaurav Sharma, Amit Pandey, "Design and Development of Treadmill Controller with Wireless Mobile Health Monitoring System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.185-189, 2017.
Barrier Removal from an Image Sequence using Edge Flow Technique
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.190-193, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.190193
Abstract
Photography as a line of work requires that the shooting of convinced scenes take place in outside location as well as inside location. The being thereof a glass window grill and light source creates complications during indoor scenes whereas the presence of fence mostly obstructs the outdoor scenes. Such visual barriers are often impossible to avoid just by changing the camera position. Outdated computational methods are still not robust enough to remove such barrier from images without difficulty. The Proposed approach computationally removes the obstruction and occluding contents from images.
Key-Words / Index Term
Flash, Reflection Removal, Obstruction, SPBSM, SID, GPSR
References
[1] LI, Y., AND BROWN, M. S, “Exploiting Reflection Change for Automatic Reflection Removal”. IEEE International Conference on Computer Vision (ICCV), 2013.
[2] GUO, X., CAO, X., AND MA, Y., “Robust Separation of Reflection from Multiple Images” IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2014.
[3] KOPF, J., LANGGUTH, F., SCHARSTEIN, D., SZELISKI, R., GOESELE, M., AND DARMSTADT, T. U., “Image-Based Rendering in the Gradient Domain” ACM SIGGRAPH 2013.
[4] CANNY, J., “A computational approach to edge detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 6, 679–698, 1986.
[5] SAREL, B., AND IRANI, M., “Separating transparent layers through layer information exchange”, European Conference on Computer Vision (ECCV) 2004.
[6] FARID, H., AND ADELSON, E. H, “ Separating reflections and lighting using independent components analysis”, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 1999.
[7] GAI, K., SHI, Z., AND ZHANG, C., “Blind separation of superimposed images with unknown motions”, In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2009.
[8] LIU, S., YUAN, L., TAN, P., AND SUN, J,” Steady flow: Spatially smooth optical flow for video stabilization”. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2014.
[9] J SZELISKI, R., “Fast surface interpolation using hierarchical basis functions”. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) 12, 6, 513–528 1990.
[10] YAMASHITA, A., MATSUI, A., AND KANEKO, T., “Fence removal from multi-focus images”, In International Conference on Pattern Recognition (ICPR)2010.
[11] LEVIN, A., AND WEISS, Y, ” User assisted separation of reflections from a single image using a sparsity prior”, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)29, 9, 1647–1654, 2007.
[12] LI, Y., AND BROWN, M. S., “Single image layer separation using relative smoothness”, In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2014.
[13] KONG, N., TAI, Y.-W., AND SHIN, J. S., “A physically based approach to reflection separation: from physical modeling to constrained optimization” IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) 36, 2, 209–21, 2014.
[14] BARNUM, P. C., NARASIMHAN, S., AND KANADE, T,” Analysis of rain and snow in frequency space”. International Journal of Computer Vision (IJCV) 86, 2-3, 256–274, 2010.
[15] PARK, M., BROCKLEHURST, K., COLLINS, R. T., AND LIU, Y, “Image de-fencing revisited”. In Asian Conference on Computer Vision (ACCV) 2011.
[16] NEWSON, A., ALMANZA, A., FRADET, M., GOUSSEAU, Y., PEREZ, P., ET AL. “Video inpainting of complex scenes”. Journal of Imaging Sciences, Society for Industrial and Applied Mathematics 2014.
[17] Carlos Cuevas, Raquel Martinez, Narciso Garcia, “Detection of Stationary Foreground Objects”. In Elsevier Computer Vision and Image understanding July 2016.
[18] N. Ohnishi, K. Kumaki, T. Yamamura, and T. Tanaka. “Separating real and virtual objects from their overlapping images. In Proc. European Conference on Computer Vision (ECCV), volume 1065, pages 636–646
[19] Crminisi, A., Perez, P., and Toyama, K. 2004. “Region filling and object removal by exemplar-based image in painting”, IEEE Transaction on Image Processing 13, 9, 1200-1212.
[20] Wilhelm Burger, Mark J. Burge, “Digital Image Processing: An Algorithmic Introduction Using Java”, Springer transaction on Digital Image Processing 2016.
[21] Carlos Cuevas, Raquel Martinez, Narciso Garcia, “Detection of Stationary Foreground Objects”, In Elsevier Computer Vision and Image understanding July 2016.
[22] Sergei Azernikov, “Sweeping solids on manifolds”, In Symposium on Solid and Physical Modeling, pages 249–255, 2008.
[23] Ashwini Gat, Mr. Uday Nuli, Mr. Sandip Murchite, “Various Obstruction Removal Techniques from a Sequence of Images”, International Journal of Computer Engineering In Research Trends, Vol.4, Issue.3, pp.86-88, 2017.
[24] Aaditya Sharma, R. K. Pateriya, “A Survey on various Image Filtering Approaches to remove Impulse Noise”, International Journal of Computer Engineering In Research Trends, Vol.2, Issue.5, pp.322-328, 2015.
[25] Aaditya Sharma, R. K .Pateriya, “Removing Salt and Pepper Noise using Modified Decision- Based Approach with Boundary Discrimination”, International Journal of Computer Engineering In Research Trends, Vol.2, Issue.7, pp.411-420, 2015.
[26] Suman Das, Nashra Nazim Siddiqui, Nehal Kriti, Surya Prakash Tamang, “Detection and area calculation of brain tumour from MRI images using MATLAB”, International Journal of Computer Engineering In Research Trends, Vol.4, Issue.1, pp.37-40, 2015.
[27] D.J. Ashpin Pabi, N.Puviarasan, P.Aruna, “Fast Singular value decomposition based image compression using butterfly particle swarm optimization technique (SVD-BPSO)”, International Journal of Computer Engineering In Research Trends, Vol.4, Issue.4, pp.128-135, 2017.
[28] Matthew Hu, “Reflection Removal Algorithms”, Computational Imaging and Display:EE367/CS448I, 2016.
Citation
B.Pannalal, Ande Srinivasa Reddy, Nadipalli Yadagiri, "Barrier Removal from an Image Sequence using Edge Flow Technique," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.190-193, 2017.
Classification of Vehicles using SURF Technique & SVM Classifier
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.194-197, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.194197
Abstract
There has been an enormous increase in the number and types of vehicles on the roads with the increase in population. Vehicle Classification (VC) has become an important subject of study in the last few years because of its importance in security system, traffic congestion avoidance, traffic management etc. This paper implements vehicle classification on the basis of appearance based technique “Speeded up Robust Features” (SURF) descriptor and Support Vector Machine (SVM) classifier. Keeping this as focal point, SURF Technique is used for the purpose of feature extraction from the images in form of descriptor and then matches these feature points of training images and test images whereas SVM classifier is used to classify images based on the outcome of feature points. Through the experiment and analysis of results, the proposed methodology provides better results in terms of accuracy and matching time.
Key-Words / Index Term
SURF, vehicle classification, Feature extraction, SVM classifier, BOF
References
[1] G. Moussa, “Vehicle Type Classification with Geometric and Appearance Attributes”, International Journal of Civil, Environmental, Structural, Construction and Architectural Engineering, Vol. 8, No. 3, 2014.
[2] Creusen I.M., Wijnhoven R.G.J., and With P.H.N. de (2009). “Applying Feature Selection Techniques for Visual Dictionary Creation in Object Classification”, In Proceedings of the 2009 International Conference on Image Processing, Computer Vision and Pattern Recognition, Las Vegas, Nevada, vol. 2, pp. 722-727, July 2009.
[3] G. Zhang, R.P. Avery, Y. Wang, “A Video-Based Vehicle Detection and Classification System for Real-Time Traffic Data Collection Using Uncalibrated Video Cameras,” Transportation Research Record: Journal of the Transportation Research Board, pp. 138-147, 2007.
[4] X. Ma, W. Eric, and L. Grimson, “Edge-Based Rich Representation for Vehicle Classification”, In the Proceedings of 2005 of International Conference of Computer Vision, vol. 2, pp. 1185- 1192, 2005.
[5] Corinna Cortes, Vladimir Vapnik,” Support-Vector Networks”, Machine Learning, vol. 20, pp. 273- 297, 1995.
[6] H. Bay, T. Tuytelaars, and L. Van Gool. “SURF: Speeded up Robust Features”, In the Proceedings of 2006 of International Conference of ECCV, pp. 404-417, 2006.
[7] Parul Prashar, Harish Kundra, “Hybrid Approach for Image Classification using SVM Classifier and SURF Descriptor”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1), pp. 249-251, 2015.
[8] S. Rahati and R. Moravejian, “Vehicle recognition using contourlet transform and svm, In the Proceedings of International Conference of IEEE on Information Technology: New Generations, 2008.
[9] R.S Vaddi, L.N.P Boggavarapu,” Computer Vision based Vehicle Recognition on Indian Roads” International Journal of Computer Vision and Signal Processing, vol. 5(1), pp. 8-13, 2015.
[10] E. Dallalzadeh, D.S. Guru, S. Manjunath and M. G.Suraj, “Classification of Moving Vehicles in Traffic Videos, Advances in Computer Science and Information Technology,” Computer Science and Engineering, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. 85, Issue. 2012, pp. 211-221, 2012.
[11] Kafai, M. and Bhanu, B., “ Dynamic Bayesian Networks for Vehicle Classification in Video”, In the Proceedings of 2012 of IEEE conference on Transactions On Industrial Informatics, vol. 8, no. 1, February 2012 .
[12] Csurka, G. Dance, C. R. Fan, L. Willamowski, J. and Bray C., “Visual Categorization with Bags of Key points”, In the Proceedings of 2004 European Conference on Computer Vision (ECCV), May 2004.
[13] Sivic, J. Russell, B. C Efros, A. A. Zisserman, A. and Freeman, W. T. “Discovering Objects and Their Location in Images”, In the Proceedings of the 2005 IEEE International Conference on Computer Vision (ICCV), vol. 1, pp. 370–377, October 2005.
[14] Z. Chen and T. Ellis, “Multi-shape Descriptor Vehicle Classification for Urban Traffic”, In the Proceedings of International Conference on Digital Image Computing Techniques and Applications, pp.456–461, Dec. 2011.
[15] L. Zhang, S.Z. Li, X. Yuan, S. Xiang, “Real-Time Object Classification in Video Surveillance Based On Appearance Learning”, In the Proceedings of 2007 IEEE Conference on Computer Vision and Pattern Recognition, India, pp. 1-8, 2007.
Citation
Preeti Saini, "Classification of Vehicles using SURF Technique & SVM Classifier," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.194-197, 2017.
Efficient Parking Management Using the IoT Technology
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.198-203, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.198203
Abstract
Parking management in the populous country like India is very arduous. Most of the time, finding a parking lot with vacant spaces is a critical task which requires a lot of time and efforts to be made. Thus, after analysing the problem closely, we came up with a system that can effectively solve the problem of parking in metro/big cities using the IoT technology. The IoT architecture, in turn, will efficiently handle the parking space & overcome the problem of traffic caused by irregular parking on the roadsides, thus, managing time of the people. The architecture uses small-sized ultrasonic sensor which sizes about a bottle cap slotted with a wireless sensor node to send data to the Raspberry Pi, which further process the collected data and send it to the cloud. A Web App/Android App will measure the distance between user’s current location & nearby parking lots within the specified distance range using Haversian algorithm that works along the earth’s radius. The system also allows the user to reserve a parking space for a duration of time in advance.
Key-Words / Index Term
IoT, Parking Management, Sensor Technology, Wireless, Raspberry Pi
References
[1] Thanh Nam Pham1, Ming-Fong Tsai1, Duc Binh Nguyen1, Chyi-Ren Dow1, And Der-Jiunn Deng2, “A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies”, IEEE Access, pp. 1581-1591, 2015.
[2] Yanfeng Geng and Christos G. Cassandras. “A New Smart Parking System Based on Optimal Resource Allocation and Reservations”, IEEE Transaction on Intelligent Transportation Systems, Volume 14, pp. 1129 -1139, 2013.
[3] Callum Rhodes, William Blewitt, Craig Sharp, Gary Ushaw and Graham Morgan, “Smart Routing: A Novel Application of Collaborative Path-finding to Smart Parking Systems”, In the proceedings of 2014 IEEE Conference on Business Informatics (CBI), Switzerland, Volume 1, pp. 119-126, 2014.
[4] Prof. D. J. Bonde, Rohit S. Shende, Ketan S. Gaikwad, Akshay S. Kedari,Amol U. Bhokre, “Automated Car Parking System Commanded by Android Application”, International Journal of Computer Science and Information Technologies, Volume 5 – No. 3, pp. 1-4, 2014.
[5] Cui Shiyao, Wu Ming, Liu Chen, Rong Na, “The Research and Implement of the Intelligent Parking Reservation Management System Based on ZigBee Technology”, In the proceedings of 2014 International Conference on Measuring Technology and Mechatronics Automation, China, pp. 741-744, 2014.
[6] Faiz Ibrahim Shaikh, Pratik Nirnay Jadhav, Saideep Pradeep Bandarkar, Omkar Pradip Kulkarni, Nikhilkumar B. Shardoor, “Smart Parking System Based on Embedded System and Sensor Network”, International Journal of Computer Applications, Volume 140 – No.12, pp. 45-51, 2016.
[7] Shrungashri Chaudhary, Mudit Kapoor, “Design and Implementation of Reservation of Parking Spaces Using RFID and GSM Technology”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp. 188-191, 2015.
[8] Nitin R.Chopde1, Mangesh K. Nichat, “Landmark Based Shortest Path Detection by Using A* and Haversine Formula”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 2, pp.298-302 , 2013.
Citation
Ayushi Rathore, Anjali, Mohammed Abdul Qadeer, "Efficient Parking Management Using the IoT Technology," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.198-203, 2017.
Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.204-209, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.204209
Abstract
Wireless network is one of the significant aspects for the roaming users while they travel across the networks transfer of data may done. It provide issues like data attackers were catch the files and they used by their way. Hence user of the network faces the security problems. For this issues watchdog mechanism were provide to monitor the attackers. The watchdog technique is a trust based attacker detection technique which identifies the malicious nodes and its activity in the network is to monitor the nodes within its communication range. The nodes selected as the watchdog nodes are the most trustworthy nodes due to its inherent features like highly stable. For this aspect static and dynamic watchdog techniques were followed, this article provides the comparison between static and dynamic watchdog mechanism to shows which technique provide the best.
Key-Words / Index Term
MANET, Security, Watchdog, Comparison, Static and Dynamic
References
[1] Singh UK, Mewada S, Iaddhani L, Bunkar K. “An overview and study of security issues & challenges in mobile ad-hoc networks (manet)”,International Journal of Computer Science and Information Security, Vol.9, Issue.4, pp.106-111, 2011.
[2] Amit Gupta and Dhananjay Bisen, "Review of Different Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.105-112, 2015.
[3] Indhu Lekha, S.J., Kathiroli, R. “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCCT 2014, pp. 1185–1189.
[4] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[5] N.Soganile1 , T. Baletlwa , and B. Moyo “Hybrid Watchdog and Pathrater algorithm for improved security in Mobile Ad Hoc Networks”, Int’I Conf.Wireless Networks ICWN’2015.
[6] SJI Lekha, S.J., Kathiroli, R., “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCT ,pp 1185-1189, 2014.
[7] Zuckerman, M., Faliszewski, P., Bachrach, Y., et al. “Manipulating the quota in weighted voting games”. Conf. on Artificial Intelligence, pp. 215–220. 2008.
[8] Liu,W., Nishiyama, H, Ansari, N, Yang J, Kato N, “Cluster-based certificate Revocation with Vindication Capability for Mobile Adhoc Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol.24, No.2 pp 1 to 12, 2013.
[9] Izquierdo, L.R., Izquierdo, S.S. ‘Dynamics of the Bush–Mosteller learning algorithm in 2 × 2 games’ (In Tech Publisher) 2008.
[10]Sungwook Kim “Trust based dynamic bandwidth allocation scheme for Ethernet passive optical networks”, Wireless Personal Communications, Vol.83, No.4,pp. 2869–2882, 2015.
[11] Moretti Annoni M, Fernado Cruz, Goncalves Riso B, Westphall “Wireless Communications : Security Management Against Cloned Cellular Phones”, Wireless Communications and Networking Conference-IEEE, pp 1412-1416, 1999.
[12] Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015.
[13] J. Kaur, G.Singh, "MANET Routing Protocols: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.60-64, 2017.
Citation
Gayathri C., Vadivel R., "Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.204-209, 2017.
On Privacy Preserving Data Mining Techniques: Merits and Demerits
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.210-214, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.210214
Abstract
Data mining is the process that extracts previously not known valid and actionable information from large archived data to make crucial business and strategic decisions. In recent years, privacy preserving data mining techniques has been studied and more research has been done in this area due to proliferation of internet in everyday life along with huge availability of personal data. Huge volume of microdata is produced on every minute due to e-governance and e-commerce which contains private data about individuals and businesses. The data has been modified in some way to preserve the privacy of individuals. The main goal of privacy preserving data mining is hiding an individual’s sensitive identity and at the same time maintains the usability of data. This paper will give an overview about these rapidly changing techniques and their advancements.
Key-Words / Index Term
privacy-preserving data mining, k-anonymity, l-diversity, t-closeness, slicing
References
[1] Malin B., Sweeney L., “Determining the identifiability of DNA database entries”, Journal of the American Medical Informatics Association, pp. 537–541, November 2000.
[2] Fienberg S., McIntyre J., “Data Swapping: Variations on a Theme by Dalenius and Reiss”, Technical Report, National Institute of Statistical Sciences, pp. 14–29, 2003.
[3] Aggarwal C. C., “On Randomization, Public Information and the Curse of Dimensionality”, ICDE Conference, pp. 136-145, 2007.
[4] Atallah, M., Elmagarmid, A., Ibrahim, M., Bertino, E., Verykios, V., “Disclosure limitation of sensitive rules”, Workshop on Knowledge and Data Engineering Exchange, 1999, DOI: 10.1109/KDEX.1999.836532.
[5] S. Rathod, B.J. Doddegowda , "m-Privacy Preserving Data Analysis And Data Publising", International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.54-58, 2014.
[6] Machanavajjhala A., Gehrke J., Kifer D., and Venkitasubramaniam M., “l-Diversity: Privacy Beyond k-Anonymity”, ICDE, 2006, DOI: 10.1109/ICDE.2006.1.
[7] Malin B, Sweeney L., “Re-identification of DNA through an automated linkage process”, Journal of the American Medical Informatics Association, pp. 423–427, 2001.
[8] Aggarwal C. C., Yu P. S., “On Variable Constraints in Privacy-Preserving Data Mining”, SIAM Conference, pp. 115-125, 2005.
[9] Aggarwal C. C., “On k-anonymity and the curse of dimensionality”, VLDB Conference, pp. 901–909, 2005.
[10] Li N., Li T., Venkatasubramanian S, “t-Closeness: Privacy beyond k-anonymity and l-diversity”, ICDE Conference, 2007, DOI: 10.1109/ICDE.2007.367856.
[11] Malin B., “Why methods for genomic data privacy fail and what we can do to fix it”, AAAS Annual Meeting, Seattle, WA, 2004.
Citation
Mohana Chelvan P., Perumal K., "On Privacy Preserving Data Mining Techniques: Merits and Demerits," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.210-214, 2017.
Analysis of Web Application Security
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.215-220, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.215220
Abstract
Web applications are a standout amongst the most predominant stages for data and administrations conveyance over Internet today. As they are progressively utilized for basic administrations, web applications turn into a prominent and significant focus for security assaults. Despite the fact that a huge group of methods have been developed to invigorate web applications and alleviate the assaults toward web applications, there is little exertion gave to drawing associations among these strategies and building a major picture of web application security look into. This paper reviews the range of web application security, with the point of systematizing the current strategies into a enormous picture that advances future research. We initially present the one of kind viewpoints in the web application advancement which brings inalienable difficulties for building secure web applications. At that point we distinguish three fundamental security properties that a web application should protect: Input Validity, State Integrity what`s more, Logic Correctness, and depict the relating vulnerabilities that abuse these properties alongside the assault vectors that adventure these vulnerabilities. We compose the current research works on securing web applications into three classifications in view of their outline theory: security by Construction, security by Verification and security by Protection. At long last, we compress the lessons learnt and examine future research openings around there.
Key-Words / Index Term
Web Security, Web Application, AJAX, Jquery, XML, JavaScript, HTTP, PHP, session
References
[1] S. Chong, K. Vikram, and A. C. Myers, “Sif: Enforcing confidentiality and integrity in web applications,” in USENIX’07: Proceedings of the 16th conference on USENIX security symposium , 2007.
[2] S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng, “Secure web applications via automatic partitioning,” in SOSP ’07: Proceedings of the 21st ACM SIGOPS symposium on Operating systems principles, 2007, pp. 31–44.
[3] M. Samuel, P. Saxena, and D. Song, “Context-sensitive auto- sanitization in web templating languages using type qualifiers,” in CCS’11: Proceedings of the 18th ACM conference on Computer and communications security , 2011, pp. 587–600.
[4] G. Wassermann and Z. Su, “Sound and precise analysis of web applications for injection vulnerabilities,” in PLDI’07: Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation , 2007, pp. 32–41.
[5] A. Nguyen-tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans, “Automatically hardening web applications using precise tainting,” in Proc. of the 20th IFIP International Information Security Conference, 2005, pp. 372–382.
[6] W. Robertson and G. Vigna, “Static enforcement of web application integrity through strong typing,” in USENIX’09: Proceedings of the 18th conference on USENIX security symposium, 2009, pp. 283–298.
[7] Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo, “Securing web application code by static analysis and runtime protection,” in WWW’04: Proceedings of the 13th international conference on World Wide Web , 2004, pp. 40–52.
[8] M. Johns, “Sessionsafe: Implementing xss immune session handling,” in ESORICS’06: Proceedings of the 11th European Symposium On Research In Computer Security , 2006.
[9] A. Barth, C. Jackson, and J. C. Mitchell, “Robust defenses for cross-site request forgery,” in CCS’08: Proceedings of the 15th ACM conference on Computer and communications security , 2008, pp. 75–88.
[10] N. Jovanovic, E. Kirda, and C. Kruegel, “Preventing cross site request forgery attacks,” in SecureComm’06: 2nd International Conference on Security and Privacy in Communication Networks , 2006, pp. 1 –10.
[11] M. Johons and J. Winter, “Requestrodeo: Client-side protection against session riding,” in OWASP AppSec Europe , 2006.
[12] Z. Mao, N. Li, and I. Molloy, “Defeating cross-site request forgery attacks with browser-enforced authenticity protection,” in FC’09: 13 th International Conference on Financial Cryptography and Data Security , 2009, pp. 238–255.
Citation
Shreekishan Jewliya, "Analysis of Web Application Security," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.215-220, 2017.
Illustration of IOT with Big Data Analytics
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.221-223, Sep-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i9.221223
Abstract
Internet Of Things(IOT) is the way of connecting devices using sensors and monitored by internet.But the data produced by the IOT is growing rapidly because of the large scale development of various applications.As the data is turned and crossed over terabytes and leading to petabytes,there should be a solution to manage the overwhelming increase in data.Big data is the solution for the data problem and it is considered as the future’s data dream.As by using bigdata,we are able to store unlimited amount of data in a secured manner,the demand for Big Data is increasing more.As IOT and Big Data are two trends in the present era,combining those will really create a technical revolution for the future generations.In this paper,we are going to present various scenarios of using big data with IOT.
Key-Words / Index Term
IOT, Big Data, Hadoop, technical revolution, security, Distributed file system, sensors, data bases, clusters
References
[1]. Yinchuan Sun,Houbing Song,Antonio j.jara, Rongfang Bie, “IOT and Big Data Analytics for Smart and Connected Communities”, IEEE journals and magazines,2016,volume :4.
[2]. R. Gorli , "Interlinking OF IoT, Big data, Smart Mobile app with Smart Garbage Monitoring", International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.70-74, 2017.
[3]. Pranay Kujur and Kiran Gautam, "Smart Interaction of Object on Internet of Things", International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.15-19, 2015.
[4]. Venakat N.Gudivada,Ricardo BaeZa-Yates,Vijay V.Raghavan, “Big Data:Promises and Problems”, IEEE Computer Magazine,Issue No.03-march 2015 volume :48.
[5]. [5]Erik R.Altman, “Big Data and Democratization”, IEEE micro Issue No.04-July-Aug,2014 volume :34.
[6]. Naresh Kumar, Ishu Devi, "Various Chunking and Deduduplication Techniques in Big Data", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.129-131, 2017.
[7]. Talal H. Noor, Quan Z. Sheng, Anne H.H. Ngu, Schahram Dustdar, “Analysis OF Web-Scale Cloud Services”, IEEE Internet Computing, Vol.18, Issue.4, July-Aug. 2014
[8]. Laurence T.Yang “A Data as a Service Framework for IOT Big Data” 2013 International Conference on Security and Cryptography (SECRYPT), Iceland, 29-31 July 2013
Citation
Palaghat Yaswanth Sai, Pabolu Harika, "Illustration of IOT with Big Data Analytics," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.221-223, 2017.