Comparison of Controller Tuning Techniques for A Temperature Control of STHX Process
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.316-320, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.316320
Abstract
This paper presents the comparison of three controller tuning techniques for a Temperature Control process. The controller tuning techniques include Zeigler-Nichols (Z-N), Wang-Juang-Chan (W-J-C) and Internal Model Control based Proportional-Integral-Derivative (IMC-PID) controller. The FOPDT model for the Shell and Tube Heat Exchanger (STHX) is first obtained by first principles. The first principles model is developed using the energy balance equation of the STHX system. Then the above said tuning techniques are applied to the STHX system. The purpose of these tuning techniques is to regulate the hot water outlet temperature to a desired value by manipulating the cold water flow rate. Finally, the performances of the tuning techniques are validated with the help of performance error indices such as ISE, IAE, ITAE, and ITSE.
Key-Words / Index Term
STHX, FOPDT, Z-N, W-J-C, IMC-PID, ISE, IAE, ITAE, ITSE
References
[1] S. N. Pawar_, K. Majumder_, B. M. Patrey and R. H. Chile, ‘Comparison of PID Controller Tuning Methods for Shell and Tube Type Heat-Exchanger System’, Indian Control Conference, Indian Institute of Technology, Madras, pp.237-242, 2015.
[2] P. V. Gopi Krishna Rao, M. V. Subramanyam, K. Satyaprasad, ‘Model based Tuning of PID Controller’, Journal of Control & Instrumentation, Vol.4, No.1, pp.16-22, 2014.
[3] A.Thamemul Ansari, H.Kala, S.Abirami, K.Thivakaran R.Allwyn Rajendran Zepherin, ‘Model Identification and Comparison of Different Controller for the Air-Temperature Process’, International Conference on Circuit, Power and Computing Technologies [ICCPCT]- IEEE, 2015.
[4] S. Anusha, G. Karpagam & E. Bhuvaneswarri, ‘Comparison of Tuning Methods of PID Controller’, BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE), Vol.2, No.8, pp.1-8, 2014.
[5] R. Kumar, S.K. Singla and V. Chopra, ‘Comparison among some well known control schemes with different tuning methods’, Journal of Applied Research and Technology-Sciencedirect, Vol.13, pp. 409-415, 2015.
[6] B.Dinesh and E.Sivaraman, ‘Fuzzy C-means Modeling for Shell and Tube Heat Exchanger’, International Journal of Computer Applications, pp.30-35, 2014.
[7] R. Manikandan and R. Vinodha, ‘Multiple Model Based Adaptive Control for Shell and Tube Heat Exchanger Process’, International Journal of Applied Engineering Research, Vol.11, No.5, pp. 3175-3180, 2016.
[8] Amit Kumar, K.K Garg, ‘Comparison of various PID Controllers Tuning Methodologies for Heat Exchanger Model’, International Journal for Scientific Research & Development, Vol. 3, No.04, pp. 1800-1802, 2015.
[9] Finn Haugen, ‘Comparing PI Tuning Methods in a Real Benchmark Temperature Control System’, Modeling, Identification and Control, Vol. 31, No. 3, 2010, pp. 79-91, 2010.
[10] A. Sahoo, T.K. Radhakrishnan and C. Sankar Rao, ‘Modeling and control of a real time shell and tube heat exchanger’, Resource-Efficient Technologies- Elsevier, pp. 124-132, 2017.
[11] Sumit, Kajal, ‘Review Paper on Comparison of various PID Controllers Tuning Methodologies for Heat Exchanger Model’, International Journal of All Research Education and Scientific Methods (IJARESM), Vol.5, No.6, pp. 77-83, 2017.
[12] Mohammad Shahrokhi and Alireza Zomorrodi, ‘Comparison of PID Controller Tuning Methods’.
[13] Satya Sheel and Omhari Gupta, ‘New Techniques of PID Controller Tuning of a DC Motor—Development of a Toolbox’, International Journal of Electrical and Instrumentation Engineering – MIT Publications, Vol.2, No.2 pp. 65-69, 2012.
[14] Dingyü Xue, Yang Quan Chen and Derek P. Atherton, ‘Linear Feedback Control Analysis and Design with MATLAB’, Society for Industrial and Applied Mathematics (SIAM), Philadelphia, p. 205.
[15] Wayne Bequette, ‘Process Control - Modeling, Design, and Simulation’, Prentice – Hall of India Private Limited, New Delhi, pp. 294-296, 2008.
Citation
S. Abirami, S. Sivagamasundari, "Comparison of Controller Tuning Techniques for A Temperature Control of STHX Process," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.316-320, 2018.
Information Security Using Steganography: A Review
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.321-324, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.321324
Abstract
In modern era of communication there is lot of information exchange and every one need more and more secure communication. In order to provide secure communication stenography is widely used. The present paper provides conceptual framework on stenography that became basis for secure communication. Stenography is process of hiding secret information in any other message and provide secures communications. It consists of cover, hiding process, and un-hiding process along with channel on sender and receiver side. Stenography is implemented with the use of secret data in files. In first phase concept of stenography has been discussed & represents definition of stenography, working of stenography respectively. Existing research and benefits of stenography have been discussed in second phase respectively. Discussion has been made on designing techniques of stenography in order to enhance security. Next phase is considering challenges to existing researches have been explored in this paper. Such analysis would be beneficial to consider better enhancement in existing security mechanism. As there would be more probability of advance research if limitations of existing work is considered. At end of research in Last phase scope of research has been discussed.
Key-Words / Index Term
Steganography, Encryption, Decryption, Encoder, Decoder
References
[1] George Abboud (2010) Steganography & Visual Cryptography in Computer Forensics 2010 Fifth International Workshop.
[2] Sana Shiva et al (2015) Secure E-marketing Using Steganography & Emergence of Cryptography Journal of Computer Science & Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015, pg.532 – 538
[3] S. R. Navale1 (2015) Approach in case of Secure Online transaction using Visual Cryptography & Text Steganography, IJERT Vol. 4 Issue 03, March-2015
[4] Pradnya S. Nagdive (2015) Visual Cryptography & Steganography: A Review IJARCS & Management Studies Vol 3, Issue 1, January 2015
[5] Priyanka More, et al. (2016) Online Payment System using Steganography & Visual Cryptography, International Journal of Computer Engineering In Research Trends, Volume 3, Issue 4, April-2016, pp. 157-161
[6] Souvik Roy et al., Online System to make Payment with the help of Steganography & Visual Cryptography, IEEE Conference on Electrical, Electronics & Computer Science, Jadavpur University, Kolkata, India. 2014.
[7] Thiyagarajan, et al. "Anti-Phishing Technique using Automated Challenge Response Method", in Proceedings of IEEE- International Conference on Communications & Computational Intelligence, 2010.
[8] N. Chou, et al. ‚Client-side defense against web-based identity theft,‛ in Proc. 11th Annu. Netw. Distribut. Syst. Secure. Symp, San Diego, CA, Feb. 2005.
[9] Anthony Y. Fu, Liu Wenyin, "Detection of Phishing Web Pages with Visual Similarity Assessment Based on EMD",IEEE Transactions on Dependable & Secure Computing, v 3,n 4, October/December 2006.
[10] S. Roy, P. Venkateswaran, “Online System to make Payment with the help of Steganography & Visual Cryptography”, IEEE Conference on Electrical, Electronics & Computer Science, vol. 6, no. 2, pp. 88-93, 2014
[11] M. Suresh, B. Domathoti, N. Putta, “Online Secure E-Pay Fraud Detection in E-Commerce System Using Visual Cryptographic Methods”, International Journal of Innovative Research in Computer & Communication Engineering ,vol. 3, no. 8, pp. 7519-7525, August 2015.
[12] Rahna E, V. Govindan, “A Novel approach to protech, Lossless Steganography using Unlimited Payload & Without Exchange Of Stegoimage”, International Journal of Advances in Engineering & Technology, vol. 6, no. 3, pp. 1263-1270, July 2013.
[13] R. C. Gonzalez & R. E. Woods," Digital Image Processing” Upper Saddle River, NJ: Prentice-Hall, 2006.
[14] [14] C. Chan, L, et al., “Data hinding in images with the help of LSB substitution Recognition of Pattern”, pp. 469– 474, August 2004.
[15] N. Shrivastava1 et al., “Survey on various mechanisms to make Image Steganography with enhanced Efficiency”, IJARC Engineering & Technology , vol. 4, no. 3, pp. 1005-1009, March 2015
[16] M. Kutter, S. Winkler, “A Vision-Based Masking Model for Spread-Spectrum Image Watermarking”, In proceedings International Conference on Computing, Electronics & Electrical Technologies, pp. 313-336, 2004.
[17] X. Li, et al., “A Generalization of Matching in case of LSB”, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, February 2009.
[18] P. Vaman, C. Manjunath, Sandeep , “Integration of Steganography & Visual Cryptography for Authenticity”, International Journal of Emerging Technology & Advanced Engineering, vol. 3, no. 6, pp. 80-84, June 2013
[19] C. Hegde , et al. , “Secure Authentication using Image/graphical Processing along with Visual Cryptography for Banking Applications”, in Conference of Advanced Computing & Communications, pp. 65-72,2013
[20] A. Suklabaidy a, et al., “Visual Cryptographic Applications”, International Journal on Computer Science & Engineering, vol. 5, no. 06, pp 455-464, June 2013.
Citation
Monika, "Information Security Using Steganography: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.321-324, 2018.
Predicting Heart-Diseases from Medical Dataset Through Frequent Itemsets Using Improved Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.325-331, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.325331
Abstract
In health concern business, data mining plays a significant task for predicting diseases. Mining association rule is one of the interesting topics in data mining which is used to generate frequent itemsets. It was first proposed for market basket analysis. Apriori algorithm is a classical algorithm of association rule mining and widely used for generating frequent item sets. This classical algorithm is inefficient due to so many scans of database. When the database is large, it will take too much time to scan the database and may produce a larger number of candidate item sets. To overcome these limitations, researchers have made a lot of improvements to the Apriori. In this paper, the authors proposed a method to predict the heart disease through frequent itemsets. Frequent itemsets are generated based on the chosen symptoms and minimum support value. The extracted frequent itemsets help the medical practitioner to make diagnostic decisions. The aim of our proposed technique is to obtain the frequent symptoms and evaluate the performance of new technique and compare with the existing classical Apriori with support count.
Key-Words / Index Term
Apriori, Frequent Diseases, Medical Data, Fuzzy Set, Fuzzy Intersection
References
[1] R.Agrawal and Srikant. R “Fast Algorithms for Mining Association Rules”. In: Proceedings of 20th International Conference of Very Large Data Bases. pp. 487-499, 1994.
[2] J. Ayres and Flannick.J, Gehrke.J, and Yiu.T “ Sequential pattern mining using a bitmap representation” .In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 429-435 , 2002.
[3] Changsheng Zhang and Jing Ruan “A Modified Apriori Algorithm with its application in Instituting Cross-Selling strategies of the Retail Industry”. In: Proc. of International Conference on Electronic Commerce and Business Intelligence. pp. 515-518, 2009.
[4] J. Chen and Xiao.K “ BISC: A bitmap itemset support counting approach for efficient frequent itemset mining”. In: ACM Transactions on Knowledge Discovery from Data (TKDD). vol. 4, p. 12, 2010.
[5] Chen Chu-xiang, Shen Jian-jing, Chen Bing, Shang Chang-xing, Wang Yun-cheng “An Improvement Apriori Arithmetic based on Rough set Theory” .In: Third Pacific-Asia Conference on Circuits, Communications and System (PACCS). pp.1 - 3 , 2011.
[6] Dongme Sun and Sheohue Teng “An algorithm to improve the effectiveness of Apriori Algorithm”. In: Proc.of 6th ICE Int. Conf. on Cognitive Informatics. pp. 385-390, 2007.
[7] Feldman, Aumann.R, Amir.Y, Zilberstain.A, Kloesgen.A, Ben-Yehuda (W), Maximal association.Y “Association rules: a new tool for mining for keyword co-occurrences in document collection”. In: Proceedings of the 3rd International Conference on Knowledge Discovery. pp. 167-170, 1997.
[8] J.W.Guan, Bell, D.A, Liu, D.Y “The Rough Set Approach to Association Rule Mining”. In: Proceedings of the Third IEEE International Conference on Data Mining (ICDM’03). pp.529 – 532,2003.
[9] Hanbing Liu and Baisheng Wang “An Association Rule Mining Algorithm Based on a Boolean Matrix” In: Data Science Journal. Vol.6, supplement 9,2010.
[10] Jaisree singh, Hari Ram, Dr.J.S. “Improving efficiency of Apriori Algorithm using Transaction Reduction”. In: IJSRP. Vol. 3. ISSN 2250-3153, 2013.
[11] K.Kavitha.and Dr.E.Ramaraj) “Efficient Transaction Reduction in Actionable Pattern Mining for High Voluminous Datasets based on Bitmap and Class Labels”. In: IJCSE. Vol.5 No.07 Jul 2013. ISSN: 0975- 3397,2013.
[12] T.Logeswari, Valarmathi.N, Sangeetha. A, Masilamani.M “ Analysis of Traditional and Enhanced Apriori Algorithm in Association Rule Mining” . In: International Journal of Computer Applications. Vol.87, 2013.
[13] A. Pethalakshmi and V.Vijayalakshmi “An Efficient Count Based Transaction Reduction Approach For Mining Frequent Patterns”. In: Procedia Computer Science- Elsevier,Vol.47, pp. 52-61,2015.
[14] E.Ramaraj, K.RameshKumar, N.Venkatesan “A Better Performed Transaction Reduction Algorithm for Mining Frequent Itemsets from Large Voluminuous Database”. In: Proceeding of the 2nd National Conference, Computing for Nation Development, February 08, 2008.
[15] Sixue Bai and Xinxi Dai “An efficiency Apriori algorithm: P_matrix algorithm”. In: First International Symposium on Data, Privacy and Ecommerce. pp.101-103, 2007.
[16] WANG Guo-Yin “ Calculation Methods for Core Attributes of Decision Table[J]”. In: CHINESE JOURNAL OF COMPUTERS. Vol. 26(5): 611-615, 2003.
[17] Wanjun Yu and Xiaochun Wang “The Research of Improved Apriori Algorithm for Mining Association Rules”. In: Proc. of 11th IEEE International Conference on Communication Technology Proceedings. pp. 513-516, 2004.
[18] XIA Ying, ZHANG WANG Guo-yin. “Spatio-temporal Association Rule Mining Algorithm and its Application in Intelligent Transportation System[J]”. In: Computer Science. Vol. 38(9): 173-176, 2011.
[19] XIAO Bo, XU Qian-Fang, LIN Zhi-Qing, GUO Jun, LI Chun-Guang “Credible Association Rule and Its Mining Algorithm Based on Maximum Clique[J]”. In: Journal of Software. (10): 2597-2610, 2018.
[20] Vaibhav Jain, “Evaluating and Summarizing Students’s Feed Back Using Opinion Mining”, International Journal of Scientific Research in Computer Science and Engineering. Vol.1.Issue 1. Jan-Feb 2013.
[21] Vaibhav Jain, “Frequent Navigation Pattern Mining from Web usage ”, International Journal of Scientific Research in Computer Science and Engineering. Vol.1.Issue 1. Jan-Feb 2013.
Citation
V. Vijayalakshmi, "Predicting Heart-Diseases from Medical Dataset Through Frequent Itemsets Using Improved Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.325-331, 2018.
DFD Schema: A versatile approach for XML based representation of DFD
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.332-338, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.332338
Abstract
The Requirement Engineering phase begins with inception and elicitation of functional, non functional requirements and concludes iteratively with modeling and specification. Requirement Engineering demands the coarse level of requirement specification by primary objectives, design constraints and appropriate artifacts of a system. In system development life cycle (SDLC), a system model is analysed and developed using Data Flow Diagram (DFD). DFD is graphical diagram for analyzing, specifying, creating and visualizing the model of a system. The formal requirement analysis and specification method like DFD experiences the problem of ambiguity with different notation and complex graphical presentation. This paper introduces DFD Schema; an XML based versatile specification approach for the structural representation of DFD of a system. Its definition was motivated by lack of available structured and open formats that describe data flow of system with its artifacts. This schema can be used in an interoperable way to transfer data flow requirements.
Key-Words / Index Term
Requirement Engineering, System Development Life Cycle (SDLC), Data Flow Diagram, DFDS, Data Flow Diagram Schema, XML
References
[1] I. Sommerville and P. Sawyer, "Requirements engineering: A good practice guide", John Wiley & Sons, 1997.
[2] H. Meth, M. Brhel, and A. Maedche, “The state of the art in automated requirements elicitation,” Information and Software Technology, vol. 55, no. 10, pp. 1695–1709, 2013.
[3] D. Firesmith, “Modern Requirements Specification”, Journal Of Object Technology, vol. 2, no. 1, pp. 53–64, 2003.
[4] P. D. Bruza and T. P. Van Der Weide, “The Semantics of Data Flow Diagram”, 1989.
[5] I. Sommerville and J. Ransom, “An empirical study of industrial requirements engineering process assessment and improvement”, ACM Transactions on Software Engineering and Methodology, vol. 14, no. 1, pp. 85–117, Jan. 2005.
[6] C. Patidar, “A Report on Latest Software Testing Techniques and Tools”, International Journal of Scientific Research in Computer Science and Engineering, vol. 1, no. 4, 2013.
[7] F. Yergeau and J. Cowan, “Extensible Markup Language (XML) 1.1 (Second Edition).”
[8] A. A. A. Jilani, A. Nadeem, T. Kim, and E. Cho, “Formal Representations of the Data Flow Diagram: A Survey”, in 2008 Advanced Software Engineering and Its Applications, pp. 153–158, 2008
[9] S. Salil Kolhatkar, “XML Based Representation of DFD Removal of Diagramming Ambiguity”, IJACSA) International Journal of Advanced Computer Science and Applications, vol. 2, no. 8, 2011.
[10] R. Ibrahim and S. Y. Yen, “Formalization Of The Data Flow Diagram Rules For Consistency Check”, International Journal of Software Engineering & Applications (IJSEA), vol. 1, no. 4, 2010.
[11] F. J. Lucas, F. Molina, and A. Toval, “A systematic review of UML model consistency management ”, 2009.
[12] T. Liu and C. S. Tang, “Semantic specification and verification of data flow diagrams”, Journal of Computer Science and Technology, vol. 6, no. 1, pp. 21–31, Jan. 1991.
[13] Y. Tao and C. Kung, “Formal definition and verification of data flow diagrams” Journal of Systems and Software, vol. 16, no. 1, pp. 29–36, Sep. 1991.
[14] J. B. Dixit and R. Kumar, "Structured system analysis and design", Laxmi Publications Pvt. Ltd, 2007.
[15] A. S. Sidky, J. D. Arthur, O. Balci, and S. Mccrickard, “RGML: A Specification Language that Supports the Characterization of Requirements Generation Processes”, 2003.
[16] K. Meridji, “Documentation and validation of the requirements specifications : an XML approach”, 2003.
[17] T. K. Dranidis D., “Writing Use Cases in XML", 9th Panhellenic Conference in Informatics Thessaloniki, 2003.
[18] S. Chavda and S. Nayak, “Modern Technique To Build Software Requirements Specification”, IJSRD-International Journal for Scientific Research & Development|, vol. 2, pp. 2321-0613, 2014.
[19] S. Adibowo, “Rambutan Requirements Management Tool for Busy System Analysts Technical Report”, 2003.
Citation
T.R. Shah, "DFD Schema: A versatile approach for XML based representation of DFD," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.332-338, 2018.
Survey Paper on IOT and Image Processing Based Crop Disease Identification System
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.339-342, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.339342
Abstract
In this work, we explain a framework for early detection of diseases in wheat crops from visual symptoms. We target wheat crops owing to their extensive use in the Indian subcontinent. Existing literature lists several algorithms that can be used in detection, classification, and quantification of crop diseases by analysis images. However, the evaluation process is tedious, time consuming and more over very much subjective. Infrastructure for image acquisition, communication, and processing is lacking in rural areas owing to lesser technological penetration. In this work, we will develop a user-friendly IoT reference architecture to provide on-field disease detection and prediction using cloud analytics.
Key-Words / Index Term
IOT, Image Processing, Wheat Crops, Disease
References
[1] T. Baranwal, Nitika and P. K. Pateriya, "Development of IoT based smart security and monitoring devices for agriculture," 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), Noida, 2016, pp. 597-602.
[2] A. Kapoor, S. I. Bhat, S. Shidnal and A. Mehra, "Implementation of IoT (Internet of Things) and Image processing in smart agriculture," 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, 2016, pp. 21-26.
[3] C. Cambra, S. Sendra, J. Lloret and L. Garcia, "An IoT service-oriented system for agriculture monitoring," 2017 IEEE International Conference on Communications (ICC), Paris, 2017, pp. 1-6.
[4] S. R. Prathibha, A. Hongal and M. P. Jyothi, "IOT Based Monitoring System in Smart Agriculture," 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), Bangalore, 2017, pp. 81-84.
[5] S. Roy et al., "IoT, big data science & analytics, cloud computing and mobile app based hybrid system for smart agriculture," 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, 2017, pp. 303-304.
[6] M. S. Mekala and P. Viswanathan, "A novel technology for smart agriculture based on IoT with cloud computing," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 75-82.
[7] Sjaak Wolfert, Lan Ge, Cor Verdouw, Marc-Jeroen Bogaardt, Big Data in Smart Farming – A review, In Agricultural Systems, Volume 153, 2017, Pages 69-80, ISSN 0308-521X.
[8] D. Yan-e, "Design of Intelligent Agriculture Management Information System Based on IoT," 2011 Fourth International Conference on Intelligent Computation Technology and Automation, Shenzhen, Guangdong, 2011, pp. 1045-1049.
[9] Nikesh Gondchawar1, Prof. Dr. R. S. Kawitkar2, “IoT based Smart Agriculture” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016.
[10] Sachin D. Khirade, A. B.patil,” Plant disease detection Using image processing,”2015, International conference on computing communication control and automation, IEEE. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
[11] Vijai singh, Varsha, A.K.Mishra”Detection of unhealthy region of plant leaves using image processing and genetic algorithm”, 205, ICACEA, India. K. Elissa, “Title of paper if known,” unpublished.
[12] Monica Jhuria, Ashwani kumar and Rushikesh Borse, ”Image processing for Smart farming, detection of Disease and Fruit Grading,” proceeding of the 2013, IEEE, second international conference on image Information processing.
[13] Patil. J. K, Raj kumar,”Feature Extraction of diseased leaf images 2012, journal of signal and image processing. 5. Hongshe Dang, Jinguo Song, Qin Guo, “A Fruit Size Detecting and Grading System Based on Image Processing,” 2010 Second International Conference on Intelligent Human-Machine Systems and Cybernetics, pp83-86.
Citation
Rashmi Ranjan, Mehajabeen Fatima, "Survey Paper on IOT and Image Processing Based Crop Disease Identification System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.339-342, 2018.
Efficient Mixed Generative Using Semantic Cross Media Hashing Methods
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.243-246, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.243246
Abstract
Hash methods are useful for number of tasks and have attracted large attention in recent times. They proposed different approaches to capture the similarities between text and images. Most of the existing work uses bag-of-words method to represent text information. Since words with different format may have same meaning, the similarities of the semantic text cannot be well worked out in these methods. To overcome these challenges, a new method called Semantic Cross Media Hashing (SCMH) is proposed that uses the continuous representations of words which captures the semantic textual similarity level and uses a Deep Belief Network (DBN) to build the correlation between different modes. In this method we use Skip-gram algorithm for word embedding, Scale Invariant Feature Transform(SIFT) descriptor to extract the key points from the images and MD5 algorithm for hash code generation. To demonstrate the effectiveness of the proposed method, it is necessary to consider data sets that are basic. Experimental results shows that the proposed method achieves significantly better results as well as the effectiveness of the proposed method is similar or superior to other hash methods.
Key-Words / Index Term
Fisher Vector, Ranking, Semantic Hashing Method, Skip Gram, Word Embedding
References
[1] Y. Gong, S. Lazebnik, A. Gordo, and F. Perronnin, “Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 12, pp. 2916–2929, Dec. 2013.
[2] Y. Pan, T. Yao, T. Mei, H. Li, C.-W. Ngo, and Y. Rui, “Clickthrough-based cross-view learning for image search,” in Proc. 37th Int.ACMSIGIR Conf. Res. Develop. Inf. Retrieval, 2014, pp. 717–726.
[3] D. Zhai, H. Chang, Y. Zhen, X. Liu, X. Chen, and W. Gao, “Parametric local multimodal hashing for cross-view similarity search,” in Proc. 23rd Int. Joint Conf. Artif. Intell., 2013, pp. 2754–2760.
[4] G. Ding, Y. Guo, and J. Zhou, “Collective matrix factorization hashing for multimodal data,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog., 2014, pp. 2083–2090.
[5] H. J_egou, F. Perronnin, M. Douze, J. S_anchez, P. P_erez, and C. Schmid, “Aggregating local image descriptors into compact codes,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 9, pp. 1704–1716, Sep. 2011.
[6] J. Zhou, G. Ding, and Y. Guo, “Latent semantic sparse hashing for cross-modal similarity search,” in Proc. 37th Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2014, pp. 415–424.
[7] Z. Yu, F. Wu, Y. Yang, Q. Tian, J. Luo, and Y. Zhuang, “Discriminative coupled dictionary hashing for fast cross-media retrieval,” in Proc. 37th Int. ACM SIGIR Conf. Res. Develop. Inf.
Retrieval, 2014, pp. 395–404.
[8] H. Zhang, J. Yuan, X. Gao, and Z. Chen, “Boosting cross-media retrieval via visual-auditory feature analysis and relevance feedback,” in Proc. ACM Int. Conf. Multimedia, 2014, pp. 953–956.
[9] A. Karpathy and L. Fei-Fei, “Deep visual-semantic alignments for generating image descriptions,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog., Boston, MA, USA, Jun. 2015, pp. 3128–3137.
[10] J. Song, Y. Yang, Y. Yang, Z. Huang, and H. T. Shen, “Inter-media hashing for large-scale retrieval from heterogeneous data sources,” in Proc. Int. Conf. Manage. Data, 2013, pp. 785–79
Citation
P.T. Jadhav, S.B. Sonkamble, "Efficient Mixed Generative Using Semantic Cross Media Hashing Methods," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.243-246, 2018.
Performance Analysis of TCP Tahoe, Reno and New Reno for Scalable IoT Network Clusters in QualNet® Network Simulator
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.347-355, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.347355
Abstract
In the era of Internet of Things, sensors and actuators equipped embedded devices are seamlessly connected over internet using TCP/IP stack to enable various M2M applications and services for users. Transmission Control Protocol (TCP) is a connection oriented protocol in Transport layer of OSI providing guaranteed service for various Internet of things (IoT) applications like HTTP, MQTT and CoAP (over TCP RFC 8323). Further, Congestion Avoidance and Control mechanism implemented in TCP makes it more adaptive to various network conditions. It is imperative to design an IoT network cluster aided with a reliable transport layer TCP for sending sensor data to a cloud server or to control actuators using HTTP Representational state transfer (REST) APIs. In this paper, three network performance matrices namely Throughput, End-to-End delay and Packet deliver ratio (PDR) are considered to evaluate the performance of TCP Tahoe, Reno and New-Reno in multiple network clusters designed for IoT applications. QualNet® 6.1 network simulator is used to simulate scalable wired (IEEE 802.3 Ethernet) and wireless (IEEE 802.11 Wireless LAN) IoT network clusters. From the perspective of this paper, multiple test cases of IoT network clusters are considered to analyze the performance of TCP variants with a scalable approach by varying node density and by varying Maximum Segment Size (MSS).
Key-Words / Index Term
TCP, IoT, Cluster, Congestion Control, Tahoe, Reno, New Reno, QualNet®
References
[1] N. Mishra, L. P. Verma, P. K. Srivastava, A. Gupta, "An Analysis of IoT Congestion Control Policies", in the Procedia Computer Science,Volume 132, pp. 444-450, 2018.
[2] D. Bandyopadhyay, J. Sen, “Internet of things: applications and challenges in technology and standardization”, Wireless Personal Communication, Vol.58, Issue.1, pp. 49-69, 2011.
[3] V. Chauhan, and R. Kumar, “Analysis of TCP Variants Over Variable Traffic”. i-manager’s Journal on Information Technology, Vol.4, Issue.3, pp. 34-42, 2015.
[4] V. Jacobson, “Congestion avoidance and control”. In Symposium proceedings on Communications architectures and protocols” (SIGCOMM `1988), Vinton Cerf (Ed.). ACM, New York, NY, USA, pp. 314-329, 1988.
[5] V.Jacobson “Modified TCP Congestion Control and Avoidance Alogrithms”.Technical Report 30,Apr 1990.
[6] S.Floyd, T.Henderson “The NewReno Modification to TCP’s Fast Recovery Algorithm” RFC 2582, Apr 1999.
[7] T. Kelly, "Scalable TCP: Improving performance in highspeed wide area networks", ACM SIGCOMM-2003 Computer Communication Review, Vol. 33, No. 2, pp. 83-91, 2003.
[8] A.R Britto Pradeep, N. Dhinakaran, and P. Angelin, "Comparison of Drop Rates in Different TCP Variants against Various Routing Protocols", International Journal of Computer Applications, Vol. 20, Issue. 6, pp. 1-7, April 2011.
[9] A. Lal and Dr.S. Dubey, "AODV, DSDV Performance Analysis with TCP Reno, TCP Vegas and TCPNJplus Agents of Wireless Networks on Ns2”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 7,pp.175-183 , 2012.
[10] Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015
[11] Pradeep Chouksey, "Comparative Study of AOMDV and AODV Routing based on Load Analysis in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.5, pp.12-19, 2016
[12] P. Tomar and P. Panse, "A Comprehensive Analysis and Comparison of TCP Tahoe, TCP Reno and TCP Lite" , International Journal of Computer Science and Information Technologies , Vol. 2, No. 5, pp. 2467-2471 , 2011.
[13] J. Ben, LâarifSinda, Mohamed Ali Mani, and RachidMbarek, "Comparison of high speed congestion control protocols”, International Journal of Network Security & Its Applications, Vol.4, No.5, pp. 15-24, September-2012.
[14] Mamatas, Lefteris, Tobias Harks and Vassilis Tsaoussidis. “Approaches to Congestion Control in Packet Networks” Journal of Internet Engineering, Vol.1, Issue.1, pp. 16-28, 2007.
[15] H. Jamal and K. Sultan, “Performance Analysis of TCP Congestion Control Algorithms”, International Journal of Computers and Communications, Volume.2,Issue.1, pp. 30-38 , 2008.
[16] Oluigbo Ikenna V., Nwokonkwo Obi C., Ezeh Gloria N., Ndukwe Ngoziobasi G., "Revolutionizing the Healthcare Industry in Nigeria: The Role of Internet of Things and Big Data Analytics", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.1-12, 2017
[17] Mohit P. Tahiliani, K. C. Shet, and T. G. Basavaraju, "Comparative Study of High-Speed TCP Variants in Multi-Hop Wireless Networks", International Journal of Computer Theory and Engineering, Vol. 5, No. 5, pp. 802- 806, 2013.
[18] Salem W R Jeyaseelan and Dr. S Hariharan, “Study on Congestion Avoidance in MANET”, IJCA Special Issue on Network Security and Cryptography NSC(5), pp. 7-10, December 2011.
[19] MadihaKazmi, AzraShamim, Nasir Wahab, and Fozia Anwar, "Comparison of TCP Tahoe, Reno, New Reno, Sack and Vegas in IP and MPLS Networks under Constant Bit Rate Traffic", in International Conference on Advanced Computational Technologies & Creative Media, Pattaya, pp. 14-15, 2014.
Citation
Ayaskanta Mishra, "Performance Analysis of TCP Tahoe, Reno and New Reno for Scalable IoT Network Clusters in QualNet® Network Simulator," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.347-355, 2018.
Finding Patterns in Crime Against Women Using a Fuzzy Clustering Technique
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.356-363, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.356363
Abstract
In most of the recent works pertaining to crime analysis traditional hard clustering techniques are seen to be applied for obtaining the intensity of crime in a particular region. Such clustering techniques which are based on crisp set theory are unable to deal with partial belongingness and as a result it is not possible to find regions partially belonging to multiple clusters with different crime intensities. Keeping this limitation of hard clustering techniques in view we will apply a fuzzy clustering technique which can deal the situations pertaining to partial belongingness, on a dataset of crime against women to reveal some important patterns in it.
Key-Words / Index Term
fuzzy clustering, crime against women, YFCM, FCM, patterns
References
[1] S. Das and H. K. Baruah., “A New Method to Remove Dependence of Fuzzy C-Means Clustering Technique on Random Initialization”, International Journal of Research in Advent Technology, Vol. 2, Issue.1, pp.322-330, 2014.
[2] J. C. Bezdek, , “Pattern Recognition with Fuzzy Objective Function Algorithms”, Plenum Press, New York, 1981.
[3] M. Chau, J. Xu, and H. Chen,“Extracting meaningful entities from police narrative reports”, Proceedings of the National Conference for Digital Government Research, Los Angeles, California, USA, pp.1-5, 2002.
[4] J.S. De Bruin, T.K Cocx., W.A Kosters., J Laros. and J.N Kok., “Data mining approaches to criminal carrer analysis”, Proceedings of the Sixth International Conference on Data Mining, pp.171-177, 2006.
[5] D. K. Tayal, A Jain. and S. Arora, “Crime detection and criminal identification in India using data mining techniques”, AI & SOCIET, Vol.30, Issue. 1, pp.117–127, 2015.
[6] A. Alkhaibari and P. T. Chung, “Cluster analysis for reducing city crime rates”, Systems, Applications and Technology Conference (LISAT), Long Island, NY, USA, 2017.
[7] C. Chauhan and S Sehgal., “A review: Crime analysis using data mining techniques and algorithms”, International Conference on Computing, Communication and Automation (ICCCA), Uttar Pradesh,India,2017.
[8] L. S Thota., M. Alalyan, A. A Khalid., F. Fathima, S. B. Changalasetty. and M, Shiblee. “Cluster based zoning of crime info”, 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017.
[9] T. Aljrees, D. Shi, D. Windridge and W. Wong, “Criminal pattern identification based on modified K-means clustering”, IEEE International Conference on Machine Learning and Cybernetics (ICMLC),Jeju, South Korea, 2017.
[10] L. A., Zadeh “Fuzzy Sets”, Information and Control, Vol. 8, Issue. 3, pp.338-353, 1965.
[11] G. W. Dewit, “Underwriting and Uncertainty”, Insurance: Mathematics and Economics, Vol. 1, Issue. 4, pp. 277-285, 1982.
[12] J. Lemiare, “Fuzzy Insurance”, Astin Bulletin, Vol. 20, Issue. 1, pp. 33-55, 1990.
[13] K. Ostaszewski, “An Investigation into Possible Applications of Fuzzy Sets Methods in Actuarial Science”, Society of Actuaries, Schaumburg, Illinois, 1993.
[14] P. Pardeshi and U. Patil, “ Fuzzy Association Rule Mining-A Survey”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6,pp.13-18, 2017.
[15] L. Zheng and X. He, “Classification Techniques in Pattern Recognition”, Conference Proceedings of 13th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, ISBN 80-903100-8-7 WSCG, Science Press ,Australia, pp. 77-88, 2005.
[16] T. SenthilSelvi and R. Parimala, “Improving Clustering Accuracy using Feature Extraction Method”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.15-19, 2018.
[17] R. A. Derrig and K. M Ostaszewski., “Fuzzy Techniques of Pattern Recognition in Risk and Claim Classification”, Journal of Risk and Insurance, Vol. 62, Issue. 3, pp.447-482, 1995.
[18] S. Das, “Pattern Recognition using the Fuzzy c-means Technique”, International Journal of Energy, Information and Communications, Vol. 4, Issue 1, pp.1-14,2013.
[19] S. Das and H. K. Baruah, “Application of Fuzzy C-Means Clustering Technique in Vehicular Pollution”, Journal of Process Management – New Technologies, Vol. 1, Issue. 3, pp.96-107, 2013.
[20] D. E Gustafson. and W. C. Kessel, “Fuzzy clustering with a fuzzy covariance matrix”, Proc. IEEE CDC, San Diego, CA, USA, pp.761- 766, 1979.
[21] S. Das and H. K. Baruah, “A Comparison of Two Fuzzy Clustering Techniques”, Journal of Process Management – New Technologies, Vol. 1, Issue. 4, pp.1-15,2013.
[22] R.R. Yager and D.P. Filev “Approximate Clustering Via the Mountain Method”, Tech. Report #MII-1305, Machine Intelligence Institute, Iona College, New Rochelle, NY, 1992.
[23] S.L Chiu., “Fuzzy Model Identification Based on Cluster Estimation”, Journal of Intelligent and Fuzzy Systems, Vol.2, pp.267-278,1994.
[24] F. Yuan, Z.H Meng., H.X. Zhang and C.R Dong., “A New Algorithm to Get the Initial Centroids”, Proc. of the 3rd International Conference on Machine Learning and Cybernetics, pp.26-29, 2004.
[25] S. Das and H. K. Baruah, “An Approach to Remove the Effect of Random Initialization from Fuzzy C-Means Clustering Technique”, Journal of Process Management – New Technologies, Vol. 2, Issue. 1, pp.23-30,2014.
Citation
S. Das, A. Das, A.U. Islam, "Finding Patterns in Crime Against Women Using a Fuzzy Clustering Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.356-363, 2018.
Interim Election Protocol for Selecting Cluster Head to Mitigate Network Partitioning in NDN WSN
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.364-373, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.364373
Abstract
Immediately Advent of new technologies, such as content centric networking, IoT, smart grids, vehicular networks, machine to machine communication and smart application encourages the researchers to build autonomous, intelligent and self-organizing wireless sensor networks to preserve efficiency and maximize network lifetime. Clustering is considered as one of the most effective method for energy preservation and increasing network up time and it also come with challenges i.e.; selecting optimal nodes to be part of a cluster, fault tolerance and selecting cluster head for every cluster. To make self-organizing WSN, it is necessary to dynamically choose cluster head (CH) in case of accidental or natural death of CH also for preserving energy and mitigating network partitioning. This paper presents a short survey on various lifetime maximizing techniques, self-organization models and also proposed an protocol named IE protocol for selecting cluster head node initially also at the time of node failure to maximize network lifespan and palliate the network partitioning issue in WSN. We have evaluated performance of proposed protocol with previously proposed protocol like LEACH for WSN and NDN-WSN.
Key-Words / Index Term
Clustering, Energy consumption, Sensor nodes, LEACH, IE protocol, Wireless sensor networks, Name data Networking
References
[1] Wendi B. Heinzelman, Member, IEEE, Anantha P. Chandrakasan, Senior Member,IEEE, and Hari Balakrishnan, Member, IEEE, “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks” IEEE transactions on Wireless communications, vol. 1, No. 4, October 2002.
[2] Tian Jing, Yi Shengwei, Yu Bing, Ma Shilong “Study On Wireless Sensor Networks” In the Proceedings of the 20010 International Conference on Intelligent System Design and Engineering Application IEEE 978-0-7695-4212-6/10 / DOI 10.1109/ISDEA39//2/2010.
[3] Liu, Jiangchuan, Jiannong Cao, Xiang-Yang Li, Limin Sun, Dan Wang, and Edith C-H. Ngai. "design, implementation, and evaluation of wireless sensor network systems." (2010): 439890.
[4] C.C. Hsu, H.H. Liu, J.L.G. Gomez, C.F. ChouDelay-sensitive opportunistic routing for underwater sensor networks, IEEE Sens. J., 15 (11) (2015), pp. 6584-6591
[5] Heinzelman, Wendi Rabiner, Anantha Chandrakasan, and Hari Balakrishnan. "Energy-efficient communication protocol for wireless microsensor networks." In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, pp. 10-pp. IEEE, 2000.
[6] Wang, Wei, Qianping Wang, Wei Luo, Mengmeng Sheng, Wanrong Wu, and Li Hao. "Leach-H: An improved routing protocol for collaborative sensing networks." In Wireless Communications & Signal Processing, 2009. WCSP 2009. International Conference on, pp. 1-5. IEEE, 2009.
[7] [15] Han, Lei, Lin Qiao, Can Lv, and Xue-Lu Yu. "A competition-based clustering hierarchy routing for wireless sensor networks." In Design, Manufacturing and Mechatronics: Proceedings of the 2015 International Conference on Design, Manufacturing and Mechatronics (ICDMM2015), pp. 580-588. 2016.
[8] Muruganathan, Siva D., Daniel CF Ma, Rolly I. Bhasin, and Abraham O. Fapojuwo. "A centralized energy-efficient routing protocol for wireless sensor networks." IEEE Communications Magazine 43, no. 3 (2005): S8-13.
[9] Natalizio, Enrico, and Valeria Loscrí. "Controlled mobility in mobile sensor networks: advantages, issues and challenges." Telecommunication Systems 52, no. 4 (2013): 2411-2418.
[10] Magno, Michele, David Boyle, Davide Brunelli, Brendan O`Flynn, Emanuel Popovici, and Luca Benini. "Extended wireless monitoring through intelligent hybrid energy supply." IEEE Transactions on Industrial Electronics 61, no. 4 (2014): 1871-1881.
[11] Mini, S., Siba K. Udgata, and Samrat L. Sabat. "Sensor deployment and scheduling for target coverage problem in wireless sensor networks." IEEE sensors journal 14, no. 3 (2014): 636-644.
[12] F. Liu, C.-Y. Tsui, and Y. Zhang, “Joint routing and sleep scheduling for lifetime maximization of wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 7, pp. 2258–2267, July 2010.
[13] J. Matamoros and C. Antòn-Haro, “Opportunistic power allocation and sensor selection schemes for wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 2, pp. 534–539, February 2010
[14] Y. Chen and Q. Zhao, “On the lifetime of wireless sensor networks,” IEEE Communications Letters, vol. 9, no. 11, pp. 976–978, November 2005.
[15] C. V. Phan, Y. Park, H. Choi, J. Cho, and J. G. Kim, “An energyefficient transmission strategy for wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 597–605, May 2010.
[16] J. Kim, X. Lin, N. B. Shroff, and P. Sinha, “Minimizing delay and maximizing lifetime for wireless sensor networks with anycast,” IEEE/ACM Transactions on Networking, vol. 18, no. 2, pp. 515–528, April 2010
[17] Y. Wu, K. Yang, J. Huang, X. Wang, and M. Chiang, “Distributed robust optimization (DRO) part II: Wireless power control,” Optimization and Engineering, 2010.
[18] A. Kansal, J. Hsu, M. B. Srivastava, and V. Raqhunathan, “Harvesting aware power management for sensor networks,” in 43rd ACM/IEEE Design Automation Conference, San Francisco, CA, July 2006, pp. 651–656
[19] M. Sichitiu, “Cross-layer scheduling for power efficiency in wireless sensor networks,” in IEEE International Conference on Computer Communications (INFOCOM’04), vol. 3, Hong Kong, March 2004, pp. 1740–1750
[20] B. Bejar Haro, S. Zazo, and D. Palomar, “Energy efficient collaborative beamforming in wireless sensor networks,” IEEE Transactions on Signal Processing, vol. 62, no. 2, pp. 496–510, January 2014
[21] Z. Han and H. Poor, “Lifetime improvement of wireless sensor networks by collaborative beamforming and cooperative transmission,” in IEEE International Conference on Communications (ICC’07), Glasgow, June 2007, pp. 3954–3958.
[22] L. Van Hoesel, T. Nieberg, J. Wu, and P. J. M. Havinga, “Prolonging the lifetime of wireless sensor networks by cross-layer interaction,” IEEE Wireless Communications, vol. 11, no. 6, pp. 78–86, December 2004.
[23] Kohonen T. Self-Organization and Associative Memory (3rd
edn). Springer-Verlag: Berlin, Germany, 1989.
[24] W. Xu, Q. Shi, X. Wei, Z. Ma, X. Zhu, and Y. Wang, “Distributed optimal rate-reliability-lifetime tradeoff in time-varying wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 9, pp. 4836–4847, September 2014.
[25] J.-H. Jeon, H.-J. Byun, and J.-T. Lim, “Joint contention and sleep control for lifetime maximization in wireless sensor networks,” IEEE Communications Letters, vol. 17, no. 2, pp. 269–272, February 2013.
[26] T. Heo, H. Kim, J.-G. Ko, Y. Doh, J.-J. Park, J. Jun, and H. Choi, “Adaptive dual prediction scheme based on sensing context similarity for wireless sensor networks,” IET Electronics Letters, vol. 50, no. 6, pp. 467–469, March 2014.
[27] W. Liang and Y. Liu, “Online data gathering for maximizing network lifetime in sensor networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 1, pp. 2–11, January 2007.
[28] Kohonen T. Self-Organization and Associative Memory (3rd
edn). Springer-Verlag: Berlin, Germany, 1989.
[29] Hofmeyr S, Forrest S. Architecture for an artificial immune
system. Evolutionary Computation 2000; 8(4): 443–473
[30] Amadeo, Marica, Claudia Campo, Antonella Molinaro, and Nathalie Mitton. "Named data networking: A natural design for data collection in wireless sensor networks." In IEEE Wireless Days (WD). 2013.
[31] Gao, Shuai, Hongke Zhang, and Beichuan Zhang. "Energy efficient interest forwarding in NDN-based wireless sensor networks." Mobile Information Systems 2016 (2016).
[32] M. Bani Yassein, A. Al-zou`bi, Y. Khamayseh, W. Mardini, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)” International Journal of Digital Content Technology and its Applications vol. 3, No. 2, June 2009
[33] Akramul Azim and Mohammad Mahfuzul Islam, “Hybrid LEACH: A Relay Node Based Low Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks” IEEE 9th Malaysia International Conference on Communications, 978-1-4244-5532-4, December 2009.
[34] Muhammad Imran, Mohamed Younis, Abas Md Said, Halabi Hasbullah, “Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks ” 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 978-0-7695-4322-2/2010.
[35] Liu, Jenn-Long, and Chinya V. Ravishankar. "LEACH-GA: Genetic algorithm-based energy-efficient adaptive clustering protocol for wireless sensor networks." International Journal of Machine Learning and Computing 1, no. 1 (2011): 79.
[36] Farooq, Muhammad Omer, Abdul Basit Dogar, and Ghalib Asadullah Shah. "MR-LEACH: multi-hop routing with low energy adaptive clustering hierarchy." In 2010 Fourth International Conference on Sensor Technologies and Applications, pp. 262-268. IEEE, 2010.
[37] Titaev, Alexander. "Construction of a maximum lifetime route tree in wireless sensor networks for nodes with a two-level transmission power." In 2018 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), pp. 193-198. IEEE, 2018.
Citation
V. P. Singh, R. L. Ujjwal, "Interim Election Protocol for Selecting Cluster Head to Mitigate Network Partitioning in NDN WSN," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.364-373, 2018.
Impact on BER of Different Detectors for 2*2 MIMO System under Rayleigh Channel
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.374-378, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.374378
Abstract
This paper is motivated by the potential of multi input multi output (MIMO) frameworks to accomplish high speed data rate demand of future generation wireless systems because these are capable of mitigating multipath fading effect without increased spectral bandwidth. This paper is generalized to the case of 2 antennas at both sides For separating spatially multiplexed information ZF and MMSE and ML detectors have been used so that goal of information gathering maximizes at receiver end. ZF and MMSE identifiers are used if system complexity is issue or ML is used if BER performance is to be considered. No feedback is required from receiver to transmitter in this methodology. In this paper BER execution of 2*2 MIMO framework with different detectors at the beneficiary side has been evaluated under Rayleigh blurring channel, which is usually a case of no line of sight. These frameworks are implemented by using MATLAB, which gives us performance comparison between 2*2 MIMO framework with different detectors and classical maximal ratio combining scheme.
Key-Words / Index Term
Multi input multi output (MIMO), Bit error rate (BER), Binary phase shift keying (BPSK), Maximum Likelihood (ML), Zero forcing (ZF), Minimum mean square error (MMSE), Signal to noise ratio (SNR), Rayleigh channel
References
[1] A. Gupta, and R. K. Jha, “A survey of 5G Network: Architecture and E- merging Technologies”, 2169-3536(c) 2015 IEEE.
[2] V. Tarokh, A. Naguib, A. R. Calderbank, and N. Seshadri, “Combined Array Processing and Space-Time Coding”, IEEE Trans. on Info. Theory, vol. 45, no. 4, 1999.
[3] W. Jakes, “Microwave Mobile Communications”, New-York: Wiley, 1974.
[4] V. Tarokh, H. Jafarkhani, and A.R. Calderbank, “Space-Time Block Codes from Orthogonal designs”, IEEE Trans. on Info. Theory, vol. 45, no. 5, July 1999.
[5] S. M. Alamouti, “A Simple Transmit Diversity Technique for Wireless Communications”, IEEE Journal VOL. 16, NO. 8, OCTOBER 1998.
[6] D. Gesbert, M. Shafi, D. Shiu, P.J. Smith, and A. Naguib, “From theory to practice: An Overview of MIMO Space–time coded wireless Systems”, IEEE Journal on Selected Areas in Communications, vol. 21, no. 3: 281- 3 302, 2003.
[7] A.S. Mindaudu, A.M. Miyim, “BER performance of MPSK and MQAM I in 2*2 Alamouti MIMO system’’, IJIST, vol. 2, No.5 September.
[8] A.K. Jaiswal, A. Kumar, and A. Prakash Singh, “Performance Analysis of MIMO-OFDM System in Rayleigh fading channel”, IJSRP, vol. 2, I- ssue 5, May 2012.
[9] Xiang bin Yu, and Guang guo Bi, “Power control scheme for multiple antenna systems with Space-time coding in Rayleigh fading channels”, Journal of systems Engineering and Electronics volume 22, No. 5, pp. 730–738 October 2011.
[10] B. Vasic, and E. M. Kurtas, “Coding and signal processing for maguet- ie recording systems”, CRC Press LLC, 2005.
[11] B. Gupta, G. Gupta, and D. S. Saini, “BER performance improvement in OFDM system with ZFE and MMSE equalizers”, IEEE 2011.
[12] M. Myllyl¨a, J.-M. Hintikka, J. R. Cavallaro, M. Juntti, M. Limingoja, and A. Byman, “Complexity analysis of MMSE detector Architectures for MIMO-OFDM systems”, in Proceedings of 39th asilomar conference on Signal system and computers, pp. 75–81, Pacific Grove, Calif, USA , October- November 2005.
[13] R. B¨ohnke, D. W¨ubben, V. K¨uhn, and K.D. Kammeyer, “Reduced complexity MMSE detection for BLAST architectures”, in Proceedings of IEEE Global Telecomm. conference, vol. 4, pp. 2258–2262, San F- Francisco, Calif, USA, December 2003.
[14] Satvir Singh, Md. Umar, and Shalini, “Channel Analysis in OFDM System,”, WJRR 2016.
[15] Sklar B., “Digital Communications: Fundamentals and Applications”, 2/E, Prentice Hall.
[16] Rappaport, “Wireless Communications: Principles and Practice”, 2/E , Prentice Hall.
[17] S.M.Nimmagadda, “Full Code Rate Complex Non-Orthogonal STBCS for Eleven Transmit Antennas”, IJSRCSE, 2017.
Citation
M. Vashishth, N.S. Beniwal, "Impact on BER of Different Detectors for 2*2 MIMO System under Rayleigh Channel," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.374-378, 2018.