Pragmatic Analysis of Energy Conservation in MANETs
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.227-230, May-2015
Abstract
Mobile ad hoc network (MANETs) is a collection of mobile nodes in which all the nodes are connected via wireless link. These are self configured networks. MANETs contains several characteristics. Because of these intrinsic properties, MANETs becomes special amongst the users. Nodes in MANETs perform in open media that permits the network to work without preinstalled infrastructure. These give tremendous flexibilities to MANETs. Since the nodes in MANETs are wireless and mobile at the same time, so these are dependent on battery or any exhaustible power device. All activities including computation, packet forwarding etc. are always associated with energy conservation. Due to lack of sufficient battery backup, nodes may show vulnerabilities. In this paper, it is approached to discuss the different factors concerning the energy consumption. Also simulation results are shown using NS 2 simulator.
Key-Words / Index Term
Manets, Wireless Link, Open Media, Dynamic Topology, Energy Conservation
References
[1] P.S.Hiremath and Shrihari M.Joshi, “Energy Efficient Routing Protocol with Adaptive Fuzzy Threshold Energy for MANETs,” IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.2, No.3, June 2012
[2] Tong Wang and ChuanHe Huang, “Energy Consumption analysis under Random Mobility Model,” DOI: 10.7763/IPEDR. 2012. V49. 24
[3] Said EL KAFHALI and Abdelkrim HAQIQ “Effect of Mobility and Traffic Models on the Energy Consumption in MANET Routing Protocols,” International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-1, March 2013
[4] Sohail Abid, Imran Shafi and Shahid Abid “IMPROVING ENERGY EFFICIENCY IN MANET’S FOR HEALTHCARE ENVIRONMENTS,” International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 4, No.3, June 2014
[5] Z. Abu-Almaalie, Z. Ghassemlooy, H. Le-Minh and N. Aslam “Investigating the Impact of Mobility and Traffic Loads on Energy Consumption of MANETs,” ISBN: 978-1-902560-27-4 © 2013 PGNet
[6] LAURA MARIE FEENEY, “An Energy Consumption Model for Performance Analysis of
Routing Protocols for Mobile Ad Hoc Networks,“ Mobile Networks and Applications 6, 239–249, 20012001 Kluwer Academic Publishers. Manufactured in The Netherlands.
[7] Jailani Kadir, Osman Ghazali, Mohamed Firdhous and Suhaidi Hassan, “Node Selection Based on Energy Consumption in MANET,”
[8] Rohit Sangwan1, Dr. Manoj Duhan2 and Sachin Dahiya, “Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy Models in MANET,” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 4(May. - Jun. 2013), PP 48-55
[9] Yu Wang , “Study on Energy Conservation in MANET,” JOURNAL OF NETWORKS, VOL. 5, NO. 6, JUNE 2010
[10] Shailendra Singh and Raghuwanshi,Brajesh Patel, “Identification of Energy Consumption Packets in MANET Routing Protocols under CBR and Exponential Traffic Models,” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4171-4175
[11] Aarti and Dr. S. S. Tyagi “Study of MANET: Characteristics, Challenges, Application and Security Attacks,” International Journal of Advanced Research in Computer Science and Software Engineering 2013, Vol. 3, Issue 5, ISSN: 2277 128X
[12] Shivendu Dubey and Prof. Rajesh Shrivastava, “Energy Consumption using Traffic Models for MANET Routing Protocols,” International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) , Volume-1, Issue-1, 2011
[13] G¶eraud Allard, Pascale Minet, Dang-Quan Nguyen, and Nirisha Shrestha, “Evaluation of the Energy Consumption in MANET,”
[14] Ashish Kumar, M. Q. Rafiq and Kamal Bansal, “ Performance Evaluation of Energy Consumption in MANET,” International Journal of Computer Applications (0975 – 8887) Volume 42– No.2, March 2012
[15] Anu Kumari, Arvind Kumar and Akhil Sharma “Survey Paper on Energy Efficient Routing Protocol in MANET , “ International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013 ISSN: 2277 128X
[16] Marco Fotino, Antonio Gozzi, Juan Carlos Cano, Carlos C., Floriano De Rango, P. Manzoni, and S. Marano, “Evaluating Energy Consumption of Proactive and Reactive Protocols in MANETs,”
Citation
Bobby Sharma, "Pragmatic Analysis of Energy Conservation in MANETs," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.227-230, 2015.
Encrypted RSA Public Key Sharing By Using Image Pixel Color Value
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.231-235, May-2015
Abstract
RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. One key is used for encryption and the other corresponding key is used for decryption. No other key can decrypt the message. In this paper an approach which is more secure than original RSA algorithm has presented, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer e. because in this approach before transfer e is encrypting with any pixel color value of any image.
Key-Words / Index Term
RSA, Public Key, Pixel color value
References
[1]. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, “A Modified RSA Encryption Technique Based on Multiple public keys”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
[2]. Liang Wang, Yonggui Zhang, 2011, “A New Personal Information Protection Approach Based on RSA Cryptography”, IEEE.
[3]. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, “Quantum Key Distribution by Using Public Key Algorithm(RSA)”, IEEE.
[4]. Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, “Loop-based RSA Key Generation Algorithm using String Identity”, 13th International Conference on Control, Automation and Systems (ICCAS 2013).
[5]. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, IEEE.
[6]Malek Jakob Kakish, “Enhancing The Security Of The Rsa Cryptosystem”, Ijrras August 2011.
[7] KetuFile White Papers “Symmetric vs. Asymmetric Encryption “, a division of Midwest research corporation.
[8] RSA Laboratories : Technical Notes and Papers.
[9] A fast implementation of the RSA algorithm using the GNU MP library. By Rajorshi Biswas,Shibdas Bandyopadhyay,Anirban Banerjee, IIIT – Calcutta.
[10] Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm By Allam Mousa ;Journal of Applied Science 5 (1) :60-63,2005 ISSN 1607 – 8926.Asian Network for Scientific Information.
Citation
Sarika Khatarkar and Rachana Kamble, "Encrypted RSA Public Key Sharing By Using Image Pixel Color Value," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.231-235, 2015.
Latency Equalization as a New Network Service Primitive in an Interactive Network Application
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.236-242, May-2015
Abstract
Multiparty interactive network applications such as teleconferencing, network gaming, and online trading are gaining popularity. In addition to end-to-end latency bounds, these applications require that the delay difference among multiple clients of the service is minimized for a good interactive experience. We propose a Latency Equalization (LEQ) service, which equalizes the perceived latency for all clients participating in an interactive network application. To effectively implement the proposed LEQ service, network support is essential. The LEQ architecture uses a few routers in the network as hubs to redirect packets of interactive applications along paths with similar end-to-end delay. We first formulate the hub selection problem, prove its NP-hardness, and provide a greedy algorithm to solve it. Through extensive simulations, we show that our LEQ architecture significantly reduces delay difference under different optimization criteria that allow or do not allow compromising the per-user end-to-end delay. Our LEQ service is incrementally deployable in today’s networks, requiring just software modifications to edge routers.
Key-Words / Index Term
Latency equalization, Interactive network, Delay difference in networks, NP-Hardness
References
[1] D. Bauer, S. Rooney, and P. Scotton, “Network infrastructure for massivelydistributed games,” in Proc. NetGames, 2002, pp. 36–43.
[2] A. Kapur, G.Wang, P. Davidson, and P. R. Cook, “Interactive network media: A dream worth dreaming?,” Organized Sound, vol. 10, no. 3, pp. 209–219, 2005.
[3] A. R. Greenwald, J. O. Kephart, and G. Tesauro, “Strategic pricebot dynamics,” in Proc. ACM Conf. Electron. Commerce, 1999, pp. 58–67.
[4] “Cisco telepresence solutions,” Cisco, San Jose, CA [Online].
[5] L. Pantel and L. C. Wolf, “On the impact of delay on real-time multiplayer games,” in Proc. NOSSDAV, New York, 2002, pp. 23–29.
[6] S. Zander and G. Armitage, “Empirically measuring the QoS sensitivity of interactive online game players,” in Proc. ATNAC, Dec. 2004, pp. 511–518.
[7] J. Brun, F. Safaei, and P. Boustead, “Managing latency and fairness innetworked games,” Commun. ACM, vol. 49, no. 11, pp. 46–51, Nov.2006.
Citation
RAJU V, "Latency Equalization as a New Network Service Primitive in an Interactive Network Application," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.236-242, 2015.
FAQ Retrieval Using Noisy Queries
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.243-251, May-2015
Abstract
In spite of great advances of information retrieval systems and associated natural language processing technologies, domain-specific retrieval systems and retrieval systems used with special types of queries continue to represent a challenge for current technology and to be a topic of active research. The Forum for Information Retrieval Evaluation (FIRE) is a forum for Information Retrieval evaluation that is traditionally mainly focused on Indian languages. India, with its huge population, has a very high rate of using mobile phones, with service costs low enough for even very poor people to use the phones actively. Accordingly, FIRE 2013 included an SMS-based FAQ retrieval task. The goal of this task was to find a question Q* from corpora of FAQs (Frequently Asked Questions) that best answers or matches a given SMS query S.
Key-Words / Index Term
Question matching,Question classification,Core NLP,Support vector machines,Unigram matching,Syntactic tree matching,Syntactic tree matching
References
[1] Danish Contractor ,Govind Kothari, Tanveer A.Faruquie,L.Venkata Subramaninan,Sumit Negi. Handling Noisy Queries in Cross Language FAQ retrieval. EMNLP Proceedings of the Conference on Empirical Methods in Natural Language Processing, Pages 87-96, ACM 2010.
[2] Kai Wang, Zhaoyan Ming, Tat-Seng Chua. A syntactic matching approach to finding similar questions in Community based QA services. SIGIR ‟09 Proceedings of the 32nd ACM SIGIR conference on Research and development in information retrieval, Pages 187-194, ACM 2009.
[3] M. Collins and N. Duffy. Convolution kernels for natural language. In Advances in Neural Information Processing Systems 14. Proceedings of the Neural Information Processing Systems Conference NIPS. Pages 625-632.Dec 2001.
[4] M. Collins and N. Duffy. Convolution kernels for natural language. In Advances in Neural Information Processing Systems 14. Proceedings of the Neural Information Processing Systems Conference NIPS. Pages 625-632.Dec 2001.
[5] Dell Zhang, Wee Sun Lee. Question Classification using Support Vector Machines. SIGIR ‟03 Proceedings of the 26th annual international ACM SIGIR conference on Research and development in information retrieval.Pages 26-32. ACM 2003.
[6] Jiwoon Jeon, Bruce Croft ,Joon Lee. Finding Similar Questions in Large Question and Answer Archives. CIKM ‟05 Proceedings of the 14th ACM international conference on information and knowledge management. Pages 84-90. ACM 2005
Citation
Vaishnavi Barla, SriMounika Achanti and Rohith Uppala, "FAQ Retrieval Using Noisy Queries," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.243-251, 2015.
Implementation of SHA on FPGA
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.252-257, May-2015
Abstract
In this paper, an FPGA based SHA1 core is designed and implemented using the hardware description language VHDL. Hash functions are the most important cryptographic algorithms and used in the several fields of communication integrity and signature authentication. These functions produce a fixed-size fingerprint or hash value for a variable length (very long) message. The hash function SHA-1, Secure Hash Algorithm, is examined in order to find the common constructs that can be used to implement it using hardware blocks of the FPGA. As a result, a hash core supporting SHA-1 and having a standard single bit SPI is proposed. The hardware is described using VHDL and verified on Xilinx FPGA.
Key-Words / Index Term
ASIC, Digital Signature, FPGA, Message Digest, SHA, RTL, VHDL
References
[1] Bowman, M. Debray, S. K., and Peterson L. L, Reasoning about naming systems,1993. .
[2] Ding, W. and Marchionini G. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park, 1997.
[3] Fröhlich, B. and Plate J, The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,2000.
[4] Tavel, P. Modeling and Simulation Design. AK Peters Ltd, 2007.
[5] Sannella, M. J. Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington,1994.
[6] Forman G. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
[7] Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
[8] Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
[9] Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
[10] Bruce Schneier, “Applied Crptography”, John Wiley and Sons, Inc. Press, 1996.
[11] NIST, “Secure Hash Standard”, FIPS PUB 180-1, May 1993.
Citation
Ankit Anand, Pushkar Praveen and Shruti, "Implementation of SHA on FPGA," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.252-257, 2015.
MCA Based Anonymous DoS Attacks Detection
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.258-260, May-2015
Abstract
All well organized systems, for example, net servers, document servers, distributed computing and so on… are presently under genuine attacks from system assailants. Denial of service attack is the standout amongst the most successive and forceful to processing frameworks. In this plan we propose a methodology called multivariate relationship investigation to distinguish an accurate movement stream characterization by separating the geometrical connection between known and obscure assaults. This framework incorporates abnormality recognition strategy for the identification of known and obscure Dos. Moreover Triangle Area Based method is utilized to accelerate the procedure of Multivariate Correlation Analysis (MCA). Proposed framework can be assessed by utilizing KDD cup dataset.
Key-Words / Index Term
Dos Attack Detection,Multi Variate Correlation Analysis
References
[1] V. Paxson, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks, vol. 31, pp. 2435-2463, 1999.
[2] P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez, “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges,” Computers and Security, vol. 28, pp. 18-28, 2009.
[3] K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, “DDoS Attack Detection Method Using Cluster Analysis,” Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008.
[4] A. Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion Detection Using Fuzzy Association Rules,” Applied Soft Computing, vol. 9, no. 2, pp. 462-469, 2009.
[5] C. Yu, H. Kai, and K. Wei-Shinn, “Collaborative Detection of DDoS Attacks over Multiple Network Domains,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, Dec.2007.
[6] J. Yu, H. Lee, M.-S. Kim, and D. Park, “Traffic Flooding Attack Detection with SNMP MIB Using SVM,” Computer Comm., vol. 31, no. 17, pp. 4212-4219, 2008.
[7] Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, “Triangle- Area-Based Multivariate Correlation Analysis for Effective Denialof-Service Attack Detection,” Proc. IEEE 11th Int’l Conf. Trust, Security and Privacy in Computing and Comm., pp. 33-40, 2012.
[8] G. Thatte, U. Mitra, and J. Heidemann, “Parametric Methods for Anomaly Detection in Aggregate Traffic,” IEEE/ACM Trans. Networking, vol. 19, no. 2, pp. 512-525, Apr. 2011.
Citation
S.Avinash, Y.Ramakrishna and J.Venkata krishna, "MCA Based Anonymous DoS Attacks Detection," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.258-260, 2015.
Survey on Mobile Healthcare
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.261-263, May-2015
Abstract
There are several factors behind the progress of the mHealth field. The first factor concerns the constraints felt by healthcare systems of developing nations. These constraints includes high growth in population, a high burden of disease prevalence, large numbers of rural inhabitants, low health care cost, and limited financial resources to support healthcare infrastructure and health information services. The second factor is the recent rapid rise in mobile phone usage in developing countries to large portion of the healthcare industry, as well as the population of a country as a whole. With increasing access of mobile phones to all segments of a country, including rural areas, the importance of reducing information and transaction costs in order to deliver healthcare improves. Wireless body area networks (WBANs) are emerging as important networks, applicable in various fields. In recent years, clinicians are beginning to utilize Mobile Health Systems (mobile devices with clinical applications) when delivering healthcare services to patients at the point-of-care. There are several applications like Healthcare Smart Hospitality, Monitoring System, and Continuous patient monitoring system are under Body Area Network (BAN) technology. mHealth technology helps physicians to remotely monitor patients’ health and enables each person to manage their own health more easily. The key factors which help mobile healthcare system infusion are time-criticality, availability of the technology, habit of people, technology, etc. Here we have to consider power efficient protocols, monitoring and sensing, system architectures, security and sensing. Body sensor networks provide a unique platform for the development of pervasive healthcare, physically engaged gaming and well being
Key-Words / Index Term
mHealth,BAN,HMS
References
[1] Rongxing, Xiaodong Lin, and Xuemin (Sherman) Shen, -“SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency”, IEEE Transaction.
[2] Benny p.l. lo, SurapaThiemjarus, Rachel King and Guang - Zhong Yang –“Body sensor network – a wireless sensor platform for pervasive healthcare monitoring”.
[3] AleksandarMilenković, Chris Otto, EmilJovanov–“Wireless sensor networks for personal health monitoring: issues and an implementation”.
[4] http://en.wikipedia.org/wiki/MHealth
[5] http://en.wikipedia.org/wiki/Body_area_network
[6] http://www.mobilehealthcaretoday.com/
[7] hamlyn.doc.ic.ac.uk/rob/research/newbsn.htm
[8] Fareedud din, Atta-ur-Rehman Shah, Muhammad Ibrahim - “Mobile-Phone-Based Remote Patient’s Vital Signs Monitoring and Automated Alerts”.
[9] Assessment of the global mobile broadband deployments and forecasts for International Mobile Telecommunications
Citation
Arun N.G Surya S.G and M.Azath3th, "Survey on Mobile Healthcare," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.261-263, 2015.
A Survey On Meteorological Data Analysis Using Data Mining Techniques
Survey Paper | Journal Paper
Vol.3 , Issue.5 , pp.264-267, May-2015
Abstract
Meteorological data analysis in form of data mining is concerned to predict the knowledge of weather condition. To make an accurate prediction is one of the challenging of meteorologist to survey the weather condition efficiently. Rainfall prediction becomes an important issue in agricultural country like India. The atmospheric correlations play a significant role in determining the climate trends which are crucial in understanding the short and long-term trends in climate. The climate changes, so experienced today are mainly due to over ambitious strategies and actions of human being on the eco-system. In this paper, a survey of meteorological data analysis in various data mining techniques is presented. It can be provided for future direction for research.
Key-Words / Index Term
Meteorological analysis; Data mining Process; Clustering Techniques; Classification methods; Association Rule
References
[1] Nikhil Sethi, Dr.Kanwal Garg “Exploiting Data Mining Technique for Rainfall prediction” , International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3982-3984.
[2] Fallah-Ghalhary G.A., Mousavi-Baygi, M. and Habibi-Nokhandan, M. (2009). Seasonal Rainfall Forecasting Using Artificial NeuralNetwork. Journal of Applied Sciences,9:1098-1105.
[3] Olaiya Folorunsho(2012):Application of Data mining Techniques in Weather Prediction and Climate change studies
[4] Paras ,et.al,” A Simple Weather Forecasting Model Using Mathematical Regression” in Indian Research Journal of Extension Education Special Issue (Volume I), January, 2012.
[5] Z.ismail,et.al,” Forecasting Gold Prices Using Multiple Linear Regression Method” in American Journal of Applied Sciences 6 (8):1509-1514, 2009 ISSN 1546-9239.
[6] Kotsiantis and et. al., “Using Data Mining Techniques for Estimating Minimum, Maximum and Average Daily Temperature Values”, World Academy of Science, Engineering and Technology 2007 pp. 450-454
[7] Thair Nu Phyu, “Survey of classification techniques in Data Mining”, IMECS 2009 Volume 1 Hong Kong pp. 1-5
[8] Han J., Kamber M.: Data Mining concepts and Techniques, Elsevier Science and Technology, Amsterdam 2006
[9] Cover T, Hart P (1967) “Nearest neighbor pattern classification”. IEEE Trans Inform Theory Volume 13(1) pp. 21–27
[10] Olaiya, Folorunsho, and Adesesan Barnabas Adeyemo. "Application of data mining techniques in weather prediction and climate change studies."International Journal of Information Engineering and Electronic Business (IJIEEB) 4.1 (2012): 51.
[11] Lawrence, Mark G. "The relationship between relative humidity and the dewpoint temperature in moist air: A simple conversion and applications." Bulletin of the American Meteorological Society 86.2 (2005): 225-233.
[12] Zhang, Guang Jun, and Michael J. Mcphaden. "The relationship between sea surface temperature and latent heat flux in the equatorial Pacific." Journal of climate 8.3 (1995): 589-605.
Citation
M.Mayilvaganan and P.Vanitha, "A Survey On Meteorological Data Analysis Using Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.264-267, 2015.
Empirical Study of Object Oriented Software Metrics for Evaluating Software Defects: CKMOOD Suits
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.268-275, May-2015
Abstract
Today, Object Oriented Design metrics plays a vital role in software development. Object Oriented Metrics are used for evaluating and predicting the quality and productivity of software. To produce high quality object oriented software, we need a strong design especially during earlier phases of software development. Many object oriented software metrics were proposed for increasing the quality of software design such as fault proneness and the maintainability of classes and methods. In this paper, we provide an empirical evidence for object oriented design complexity metrics with the help of CK suite and MOOD metric suite for determining software defects. In this paper, we find that the effect of these metrics on defects vary across object oriented programming languages like C++, ASP and Java. We apply these metrics on java and C++ programs and find the defects and design high quality software products.
Key-Words / Index Term
Object Oriented Software Metrics, Software Defects, CK Suite, MOOD Suite
References
[1] Abreu, F.B. and Carapuca, R. 1994. Candidate metric for OOS within taxonomy framework. J. Syst. Software. 26:
[2] Chandra, E. and Linda, P.E. 2010. Assessment of software quality through object oriented metrics. CIIT Int. J. Software Engg. 2: 2.
[3] Dubey, S.K. and Rana, A.2010. A comprehensive assessment of object-oriented software systems using metrics approach. IJCSE. 2: 2726-2730.
[4] J. Capers, Software Quality: Analysis and Guidelines for success, International Thomson Computer Press, USA, 2000.
[5] Khalsa, S.K. 2009. A Fuzzified approach for the prediction of fault proneness and defect density. Proc. of the World Congress on Engineering. Vol. I. WCE 2009. July 1-3, London, U.K.
[6] Pressman, R.S. 2001. Software engineering-A practitioner’s approach. McGraw-Hill international edition. 5th edition.
[7] Shyam R. Chidamber, Chris F. Kemerer, ―A metrics suite for object oriented design‖, IEEE transactions on software engineering, Vol. 20, No. 6, pp. 476-493, June 1984.
[8] Subramanyam, R., Krishnan, M.S., ―Empirical analysis of CK metrics for object -oriented design complexity: Implications for software defects‖, IEEE Transactions on Software Engineering, Vol. 29, No. 4, pp. 297-310, April 2003.
[9] Subramanyam, R. and Krishnan, M.S. 2003. Empirical analysis of CK metrics for object-oriented design complexity: Implications for software defects. IEEE Trans. Software Engg. 29(4): 297-310.
[10] Wahyudin D., Ramler R. and Biffle S., A framework for Defect Prediction in Specific Software Project Contexts. Proc. of the 3rd IFIP CEE-SET, 2008, 295-308.
[11] Zhou Y. and Leung H., Empirical Analysis of Object-Oriented Design Metrics for Predicting High and Low Severity Faults. IEEE Trans. on Software Engineering, 32(10), 2006, 771-789
Citation
Aarti Sharma and Manoj Wadhwa, "Empirical Study of Object Oriented Software Metrics for Evaluating Software Defects: CKMOOD Suits," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.268-275, 2015.
Evaluation and Improvement of Pegasis Using Ant Colony Optimization
Research Paper | Journal Paper
Vol.3 , Issue.5 , pp.276-282, May-2015
Abstract
In the last few years many research work have been conducted by the researchers in the field of routing protocols in wireless sensor networks. Nowadays their main area of concern is based on routing protocols utilizing the concept of Swarm Intelligence. This dissertation deals with reducing the usage of energy in wireless sensor networks by ants traversing different paths. Ant colony algorithm is generally an optimization technique which is used to optimize the performance of ants by providing them easy way to find the shortest path as we can say nodes in real environment. The main attention of this research work is to understand the working of ant colony algorithm by using Stigmery operation in such a way that it increases the efficiency of the Pegasis protocol. The proposed work has been simulated based on the simulator MATLAB in which simulation will be performed and various parameters are used in regard of wireless sensor networks.
Key-Words / Index Term
Sensor Network, Swarm intelligence, LEACH, PEGASIS, ACO, Stigmery, Greedy Algorithm
References
[1] M. Dorigo, V. Maniezzo and A. Colorni, "Ant System: Optimization by a colony of cooperating agents", IEEE Trans Syst Man Cybernet Part B vol. 1, pp. 29–41, 1996.
[2] W. Heinzelman, A. Chandrakasan, and H. Bal Krishnan, "Energy Efficient Communication Protocols for Wireless Sensor Networks" In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), 3005±3014, Big Island, Hawaii, USA, January 2000
[3] Stephanie Lindsey and Cauligi S. Raghavendra, “PEGASIS: Power-Efficient Gathering in Sensor Information Systems”, IEEE, Vol.3, 3-1125 - 3-1130, 2002.
[4] Stephanie Lindsey, Cauligi Raghavendra and Krishna M. Sivalingam, “Data Gathering Algorithms in Sensor Networks Using Energy Metrics”, IEEE Transactions on Parallel and Distributed Systems, Vol. 13, No. 9, 2002.
[5] Huseyin O zgur Tan and Ibrahim Korpeoglu, “Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks”, ACM SIGMOD Record, vol. 32, no. 4, pp. 66 – 71, 2003
[6] Al-Karaki JN, Kamal AE “Routing Techniques in Wireless Sensor Networks: a Survey”. IEEE Wireless Communications, 2004.
[7] Ding N, Liu XP “A Centralized Approach to Energy-Efficient Protocols for Wireless Sensor Networks”, IEEE International Conference on Mechatronics and Automation, Niagara Falls, Canada, 2005
[8] S. Okdem, D. Karaboga, “Routing in wireless sensor networks uses Ant Colony Optimization”, in: Proceedings of the First NASA/ESA Conference on Adaptive Hardware and Systems (AHS), 2006.
[9] A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks", Computer Communications, 30, pp. 2826–2841, 2007.
[10] A. Abbasia and M. Younisb , “A survey on clustering algorithms for wireless sensor networks”, In The International Journal for the Computer and Telecommunications Industry, Vol. 30, No. 14, pp. 2826-2841, 2007.
[11] Dervis Karaboga and Bahriye Basturk, “A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm”, Springer Science and Business Media B.V. 2007.
[12] L. Alazzawi and A. Elkateeb, “Performance Evaluation of the WSN Routing Protocols Scalability” Journal of Computer Systems, Networks, and Communications, vol. 2008, pp. 9, 2008.
[13] Ayan Acharya, Anand Seetharam, Abhishek Bhattacharyya, and Mrinal Kanti Naskar, “Balancing Energy Dissipation in Data Gathering Wireless Sensor Networks Using Ant Colony Optimization” Distributed Computing and Networking Lecture Notes in Computer Science Volume 5408, pp 437-443, 2009.
[14] W. Guo, W. Zang, G. Lu, "PEGASIS Protocol in Wireless Sensor Network based on an Improved Ant Colony Algorithm", IEEE Journal, Education Technology and Computer Science(ECTS) Vol. 3, pp.64-67, 2010.
[15] M.R.Ebenezar Jebarani And T.Jayanthy, “An Analysis Of Various Parameters In Wireless Sensor Networks Using Adaptive Fec Technique”, International Journal Of Ad Hoc, Sensor & Ubiquitous Computing (Ijasuc) Vol.1, No.3, pp. 33-43, 2010.
[16] Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, "Performance Evaluation of routing protocols in wireless sensor networks", International Journal of Computer Science and Information Technology, Volume 2, Number 2, 2010.
[17] Samia A. Ali and Shreen K. Refaay, "Chain-Chain Based Routing Protocol", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue.3, pp. 105-112, 2011.
[18] F. Sen, Q. Bing, and T. Liangrui, “An improved energy-efficient PEGASIS based protocol in wireless sensor networks,” in Fuzzy Systems and Knowledge Discovery (FSKD), IEEE Eighth International Conference on, vol. 4, pp. 2230–2233, 2011.
[19] Najme Zehra Naqvi, Harmeen Kaur Matheru, and Komal Chadha “Review Of Ant Colony Optimization Algorithms OnVehicle Routing Problems And Introduction To Estimation-Based ACO”, International Conference on Environment Science and Engineering, Vol.8, 2011.
[20] Adamu Murtala Zungeru, Li-Minn Ang, Kah Phooi Seng, “Classical and Swarm Intelligence based routing protocols for wireless sensor networks: A survey and comparison” Journal of Network and Computer Applications 35,pp. 1508–1536, 2012.
Citation
Sakshi Verma and Abhilasha, "Evaluation and Improvement of Pegasis Using Ant Colony Optimization," International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.276-282, 2015.