Investigating Various Possible Attacks and Vulnerabilties in LTE
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.389-395, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.389395
Abstract
This paper provides a comprehensive study of vulnerabilities and various possible attacks associated with LTE. According to reports released by GSMA, association of mobile operators, the number of cell phone users globally will surpass five billion by the middle of this year. With this rapid increase in the number of users, security of cellular network is of utmost importance. In order to ruggedize the security mechanism of cellular networks it is first essential to deeply analyse the vulnerabilities and threats. This paper surveys the attacks and vulnerabilities and provide classification and categorization of attacks in LTE.
Key-Words / Index Term
UMTS (Universal Mobile Terrestrial System), LTE (Long Term Evolution), DoS (Denial of Service), MITM (Man In The Middle), IP address (Internet Protocol), MAC address (Medium Access Control), AKA (Authentication and Key Agreement), ICMP (Internet Control Message Protocol), EPS (Evolved Packet System), 3GPP (3rd Generation Partnership Projects), WLA
References
[1] A. Ahlawat and S. Kumar “Analysis of Different Security and Vulnerability in Cellular Networks”, Journal of Engineering and Applied Sciences, vol 12, no.22, pp. 6252-6259, 2017.
[2] A. Perrig, J. Stankovic, and D. Wagner “Security in wireless sensor networks”, Commun. ACM, vol. 47, no. 6, pp. 53–57, 2004.
[3] A. Mpitziopoulos “A survey on jamming attacks and countermeasures in WSNs”, IEEE Commun. Surv. Tut., vol. 11, no. 4, pp. 42–56, 2009.
[4] V. Nagarajan and D. Huang “Using power hopping to counter MAC spoof attacks in WLAN”, in Proc. IEEE Consumer Communication Network Conf., Las Vegas, NV, USA, pp. 1–5, 2010.
[5] W. Zhou, A. Marshall , and Q. Gu “A novel classification scheme for 802.11 WLAN active attacking traffic patterns”, in Proc. IEEE Wireless Commun. Netw. Conf., Las Vegas, NV, pp. 623–628, 2006.
[6] J. Park and S. Kasera “Securing Ad Hoc wireless networks against data injection attacks using firewalls”, in Proc. IEEE Wireless Communication Network Conf., Hongkong, China, pp. 2843–2848, 2007.
[7] Computer Emergency Response Team (CERT) CERT Advisory “IP Spoofing Attacks and Hijacked Terminal Connections”, 1995.
[8] N. Hastings and P. McLean , “TCP/IP spoofing fundamentals,” in Proc. IEEE 15th Annu. Int. Conf. Comput. Communication, Phoenix, AZ, USA, pp. 218–224, 1996.
[9] B. Harrisa and R. Hunt “TCP/IP security threats and attack methods”, Computational Communication, vol. 22, no. 10, pp. 885–897, 1999.
[10] C. Schuba et al. “Analysis of a denial of service attack on TCP”, in Proc. IEEE Symp. Security Privacy, Oakland, USA, pp. 208–223, 1997.
[11] A. Kuzmanovic and EW. Knightly” Low-rate TCP-targeted denial of service attacks and counter strategies”, IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683–696, 2006.
[12] B. Haibo, L. Sohraby, and C. Wan “Future internet services and applications”, IEEE Network, vol. 24, no. 4, pp. 4–5, 2010.
[13] RFC 2577 FTP security considerations. [Online]. Available: http://tools. ietf.org/html/rfc2577, 1997.
[14] T. Bass, A. Freyre, D. Gruber, and G. Watt “E-mail bombs and countermeasures. Cyber-attacks on availability and brand integrity”, IEEE Network, vol. 12, no. 2, pp. 10–17, 1998.
[15] M. Humaigani, D. Dunn, and D. Brown “Security Transition Roadmap to 4G and Future Generations Wireless Networks”, Proc. 41st Southeastern Symposium on System Theory (SSST 2009), pp.94-97, 2009.
[16] M. Aiash, G. Mapp, A. Lasebae, and R. Phan “Providing Security in 4G Systems Unveiling the Challenges”, Proc. Sixth Advanced International Conference on Telecommunications (AICT), pp.439-444, 2010
[17] Y. Park and T. Park “A Survey of Security Threats on 4G Networks”, Proc. IEEE Globecom Workshops, pp.1-6, 2007.
[18] 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE), (Rel 9), 3GPP TR 33.821 V9.0.0, 2009.
[19] D. Forsberg, L. Huang, K. Tsuyoshi, and S. Alanara “Enhancing Security and Privacy in 3GPP E-UTRAN Radio Interface”, Proc. Personal, Indoor and Mobile Radio Communications (PIMRC), pp.1-5,2007.
[20] D. Yu and W. Wen “ Non-access-stratum Request Attack in E-UTRAN”, Proc. Computing, Communications and Applications Conference,pp.48-53, 2012.
[21] T Ahmed., D. Barankanira, S. Antoine, X. Huang, and H. Duvocelle “Inter-system Mobility in Evolved Packet System (EPS) Connecting Non-3GPP Accesses”, Proc. Intelligence in Next Generation Networks (ICIN), pp.1-6, 2010.
[22] M. Purkhiabani and A. Salahi “Enhanced Authentication and Key Agreement Procedure of Next Generation Evolved Mobile Networks”, Proc. IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp.557-563, 2011.
[23] H. Mun, K. Han, and K. Kim “3G-WLAN Interworking Security Analysis and New Authentication and Key Agreement Based on EAPAKA”, Proc. Wireless Telecommunications Symposium (WTS), pp.1-8,2009.
[24] J. Cao, H. Li, M. Ma, Y. Zhang, and C. Lai “ A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks”, Computer Networks, Vol. 56, No. 8, pp. 2119-2131, 2012.
[25] H. Han Security “Analysis and Enhancements in LTE-Advanced Networks”, Ph.D. Dissertation, Department of Mobile Systems Engineering, The Graduate School, Sungkyunkwan University, 2011.
[26] 3rd Generation Partnership Project Technical Specification Group Services and System Aspects Security of Home Node B (HNB) / Home evolved Node B (HeNB) (Rel 11), 3GPP TS 33.320 V11.6.0, 2012.
[27] CK. Han, HK. Choi and IH. Kim “Building Femtocell More Secure with Improved Proxy Signature”, Proc. IEEE GLOBECOM 2009, USA, pp. 1-6, 2009.
[28] I. Bilogrevic, M. Jadliwala and JP. Hubaux “Security and Privacy in Next Generation Mobile Networks LTE and Femtocells”, Femtocell Workshop, 2010.
[29] B. Matt and C. Li “A survey of the security and threats of the IMT advanced requirements for 4G standards”, in Proc. IEEE Conf. Anthol., pp. 1–5, 2013.
[30] M. Habib and M. Ahmad “A review of some security aspects of WiMAX and converged network” In Proc.2ndInt.Conf.Commun.Softw. Netw. (ICCSN), pp. 372–376, 2010.
[31] N. Qachri and JM. Dricot “On the security of WLAN access points integrated /LTE architectures”, in Proc.19thIEEE Workshop Local Metropolitan Area Netw. (LANMAN), pp. 1–6, 2013.
[32] TQ. Thanh, Y. Rebahi, and TA. Magedanz “DIAMETER based security framework for mobile networks”, in Proc. Int. Conf. Telecommun. Multimedia (TEMU), pp. 7–12, 2014.
[33] X. Li and Y. Wang “Security enhanced authentication and key agreement protocol for LTE/SAE network”, in Proc. 7th Int. Conf. Wireless Commun., Netw. Mobile Comput. (WiCOM), pp. 1–4, 2011.
[34] M. Purkhiabani and A. Salahi “Enhanced authentication and key agreement procedure of next generation evolved mobile networks”, in Proc. IEEE 3rd Int. Conf. Commun. Softw. Netw. (ICCSN), pp. 557–563, 2011.
[35] H. Choudhury, B. Roychoudhury, and DK. Saikia “Enhancing user identity privacy in LTE”, in Proc. IEEE 11th Int. Conf. Trust, Secur. Privacy Comput. Commun., pp. 949–957, 2012.
Citation
A. Ahlawat, S. Kumar, "Investigating Various Possible Attacks and Vulnerabilties in LTE," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.389-395, 2018.
A Review on Quantum Computers and Machine Learning
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.396-399, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.396399
Abstract
Pattern can be learned from existing data to provide sense to the previously unknown data, this is possible only with the help of Machine learning. As part of both artificial intelligence and statistics, machine learning algorithms process large amounts of information. Machine learning refers to usage of computers to infer data based on knowledge. In the big data analysis huge amount of update data should be deal with the highly sophisticated machine learning algorithms . Quantum computing may improve classical machine learning algorithms if we deal with big data. The quantum computer works on the principle of translating stochastic methods into the language of quantum theory. This paper is focusing on the brief review on quantum computers and machine learning.
Key-Words / Index Term
Machine learning ,page ranking artificial intelligence
References
[1]. Foot, C. J Atomic Physics. Oxford UniversityOxford Master Series in Physics) 1st Edition
[2]. Kurzweil, Ray ,"The Age of Spiritual Machines: When Computers Exceed Human Intelligence". Penguin Books,2000 .
[3]. Maria Schuld, Ilya Sinayskiy & Francesco Petruccione (2015)" An introduction to quantum machine learning", Contemporary Physics, 56:2, 172-185, DOI:10.1080/00107514.2014.964942.
[4]. A.K. Jain and R.C. Dubes. Algorithms for clustering data. Prentice Hall, Englewood Cliffs, NJ, 1988.
[5]. A. Ben-Hur, D. Horn, H.T. Siegelmann, and V. Vapnik. A Support VectorMethod for Clustering. in Advances in Neural Information Processing Systems 13: Proceedings of the 2000 Conference Todd K. Leen, Thomas G. Dietterich and Volker Tresp eds.,MIT Press 2001, pp. 367–373.
[6]. Maria Schulda , Ilya Sinayskiya,b and Francesco Petruccionea,b aQuantum Research Group, “An introduction to quantum machine learning”.School of Chemistry and Physics, University of KwaZulu-Natal, Durban, KwaZulu-Natal, 4001, South Africa bNational Institute for Theoretical Physics (NITheP), KwaZulu-Natal, 4001, South Africa,
[7]. Masahide Sasaki and Alberto Carlini. "Quantum learning and universal quantum matching machine". Physical Review A, 66(2):022303, 2002.
[8]. Satya Nadella Discusses Quantum Computer At MSIgnite" https://www.youtube.com/watch?v=KJWMca0Hk6w"
[9]. M Schuld, I Sinayskiy, F Petruccione "An Introduction to Quantum Machine Learning" Contemporary Physics 56 (2), 172-185
[10]. Michael A. Nielsen and Isaac L. Chuang.p. cm." Quantum Computation and Quantum Information" ISBN 0-521-63503-91. Physics. I. Title.QA401.G47 2000511.8,dc21 98-22029 CIP.
Citation
E. Padmalatha, S. Sailekya, "A Review on Quantum Computers and Machine Learning," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.396-399, 2018.
A Review: Speech Emotion Recognition
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.400-402, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.400402
Abstract
In Human Computer Interaction (HCI) area speech emotion recognition is one of the popular topic in the world. Many researchers are engaged in developing systems to recognize different emotions from human speech. This is done to make HCI and human interface more effective and develop systems like humans. In this paper we have stated the basics of speech emotion recognition system and reviewed different feature extraction and classification technique for the system. Features are classified as Elicited features, Prosodic features and Spectral features. Different classifying techniques are used to classify different emotions from human speech like Hidden Markov Model (HMM), Gaussian Mixtures Model (GMM), Support Vector Machine (SVM), Artificial Neural Network (ANN), K-nearest neighbor (KNN). Performance of classifiers are also discussed shortly. Different applications where speech emotion recognition systems are used are also discussed in last section of the paper.
Key-Words / Index Term
Emotion, Speech, Emotional Speech database, Elicited featues, HMM, GMM, SVM, ANN, KNN, Application
References
[1] V. B. Waghmare, R. R. Deshmukh, P. P. Shrishrimal, G. B. Janvale,"Emotion Recognition System from Artificial Marathi Speech using MFCC and LDA Techniques ," Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC, Elsevier, 2014.
[2] R. A. S. Nilofer, R. P. Gadhe, R. Deshmukh, V. B. Wasghmare, P. P. Shrishrimal, "Automatic emotion recognition from speech signals: A review", International Journal of Scientific and Engineering Research, vol. 6, no. 4, April 2015.
[3] S. Emerich, E. Lupu, A. Apatean, “Emotions Recognitions by Speech and Facial Expressions Analysis”, 17th European Signal Processing Conference, 2009.
[4] A. Mohanta and U. Sharma, "Bengali speech emotion recognition," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 2812-2814 (IEEE).
[5] D. D. Joshi, M. B. Zalte, "Speech Emotion Recognition: A Review", IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), pp. 34-37, January-February 2013.
[6] A Mohanta, U Sharma, "Human Emotion Recognition through Speech", Advances in Computer Scienceand Information Technology (ACSIT), vol. 2, no. 10, pp. 29-32, April-June 2015.
[7] A. S. Utane, S. L. Nalbalwar, "Emotion Recognition through Speech", International Journal of Applied Information Syatems (IJAIS), pp. 5-8, 2013.
[8] Ayadi, M. E., Kamel, M. S., & Karray, F. “Survey on speech emotion recognition: features, classification schemes, and databases”. Pattern Recognition, 44, 572–587 2011..
[9] Idris I., Salam M.S. “Improved Speech Emotion Classification from Spectral Coefficient Optimization”.Lecture Notes in Electrical Engineering, vol 387. Springer, 2016.
[10] Pao TL., Chen YT., Yeh JH., Cheng YM., Chien C.S. “Feature Combination for Better Differentiating Anger from Neutral in Mandarin Emotional Speech”, LNCS: Vol. 4738 Berlin:Springer 2007.
[11] Yashpalsing Chavhan, M. L. Dhore, Pallavi Yesaware, "Speech Emotion Recognition Using Support Vector Machine", International Journal of Computer Applications, vol. 1, pp.6-9,February 2010.
[12] A.P. Wanare, S.N. Dandare, "Human Emotion Recognition From Speech", Int. Journal of Engineering Research and Applications, vol. 4, no. 7, pp. 74-78, July 2014.
[13] A. Joshi, "Speech Emotion Recognition Using Combined Features of HMM & SVM Algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, pp. 387-392, 2013.
[14] A. B Ingale and D. S. Chaudhari, “Speech Emotion Recognition”, International Journal of Soft Computing and Engineering (IJSCE), March 2012, pp. 235-238.
[15] A. S. Utane and S.L. Nalbalwar, “Emotion Recognition through Speech”, International Journal of Applied Information Systems (IJAIS), 2013, pp. 5-8.
Citation
G.N. Peerzade, R.R. Deshmukh, S.D. Waghmare, "A Review: Speech Emotion Recognition," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.400-402, 2018.
Image Fusion through Deep Convolutional Neural Network and Laplacian Pyramid
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.403-407, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.403407
Abstract
In the technically advanced world image fusion attracts as a considerable assistant for image processing experts. The role of image fusion in processing of images is robust by extracting the best and complementary features from two or more images and integrating that information by using appropriate algorithm in order to provide better recognition characteristics. Image fusion experts have been using images for a long time with machine learning algorithms. It requires very intensive pre-processing steps. Recently experts are very much interested in using long existing deep learning algorithms in processing the image data. This paper presents the deep convolutional neural network based image fusion using Laplacian pyramid method. Firstly the paper concentrates on the existing image fusion techniques and related work. Secondly on convolutional neural networks, deep learning and their features. Thirdly it presented the similarities among Convolutional Neural Network, Gaussian pyramid, Laplacian pyramid models. Lastly our proposed method and discussion on experimental results. It was observed that Deep Convolutional Neural Network and Laplacian pyramid based image fusion method gave better PSNR Values than the existing Laplacian Pyramid fusion methods for various images.
Key-Words / Index Term
Image Fusion, Deep Learning, Convolutional Neural Network, Laplacian Pyramid
References
[1]. A Goshtasby, S. Nikolov, Image Fusion: advances in the state of the art, Inf.Fusion 8(2) (2007) 114-118.
[2]. S. Li, X.Kang, L. Fang,J.Hu,H.Yin, pixel-level image fusion: a survey of the state of the art, Inf. Fusion 33(2017)100-112.
[3].A review: Image Fusion Techniques and Applications by Mamta Sharma.
[4]. Deep Learning for pixel-level image fusion: Recent advances and future prospects by Yu Liu, Xun Chen, Zengfu Wang, Z. Jane Wang, Rabab K. Ward, Xuesong Wang.
[5]. Y. Liu, X.Chen, H. Peng, Z.Wang, Multi-focus image fusion with deep convolutional neural network, Inf. Fusion 36(2017) 191-207.
[6].B. Yang, J. Zhong Y.Li, Z.Chen, Multi-focus image fusion and super-resolution with convolutional neural network, Int. J. Wavelets Multiresolut.Inf. Process.15(4)(2017)1750037:1-15.
[7]. C.Du, S.Gao, Image segmentation-based multi-focus image fusion through multi-scale convolutional neural network, IEEE access 5 (2017) 15750-15761.
[8]. N. Kalantari, R. Ramamoorthi, Deep high dynamic range Of dynamic scenes, ACM Trans. Graph, 36 (4) (2017)144:1-12.
[9]. Y.Liu, X.Chen, J. Cheng, H.Peng, A medical Image fusion method based on convolutional neural network, Proceedings of 20th International Conference on Information Fusion,(2017),pp.1-7.
[10]. W. Huang, L. Xiao, Z. Wei, H. Liu, S.Tang, A new pan-sharpening method with deep neural networks, IEEE Geosci. Remote Sens. Lett.12(5)(2015)1037-1041.
[11]. Z.Zhang, R. Blum, A categorization of multiscale-decomposition-based image fusion schemes with a performance study for a digital camera application, Proc. IEEE 87(8)(1999) 1315-1326.
[12]. G. Piella, A general framework for multiresolution image fusion:from pixels to regions, Inf. Fusion 4 (4)(2003) 259-280.
[13]. Implementation of Image Fusion algorithm using MATLAB(LAPLACIAN PYRAMID) by M. Pradeep,Assoc.Professor,ECE Dept,Shri Vishnu Engineering College for Women.
Citation
B. Asha Latha, M.Babu Reddy, "Image Fusion through Deep Convolutional Neural Network and Laplacian Pyramid," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.403-407, 2018.
An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.408-413, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.408413
Abstract
Cloud computing offers services with much flexibility and very less infrastructure because of the distributed structure of cloud computing, this technology is used by an increasing number of end users. On the other hand, cloud computing presents an added level of risk because clouds are distributed in nature, so it becomes an easy targets for the intruders to exploit the vulnerabilities of the network. Therefore in this paper we have discussed the need of security mentioning different types of attacks which affect the availability, confidentiality and integrity of resources and services in cloud computing environment and suggested the cloud providers to protect the user data and information from inside or outside attacks by installing an intrusion detection and prevention system.
Key-Words / Index Term
Cloud Computing, Attacks, Intrusion Detection System, Intrusion Prevention System
References
[1] Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, pp. 347-358.
[2] Zhang S, Zhang S, Chen X, Huo X(2010) Cloud Computing Research and Development Trend in Second International Conference on Future Networks, Sanya, Henan, China, IEEE Computer Society, Washington, DC, USA, pp. 93-97
[3] B R. Kandukuri, R. Paturi V.and A. Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Services Computing, Sep 21-25,2009, Bangalore, India, pp. 517-520.
[4] E. H. Spafford and D. Zamboni, “Intrusion Detection Using Autonomous Agent,” Computer Networks, Vol. 34, Issue 4, 2000, pp. 547-570.
[5] Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande,”Intrusion Detection System for Cloud Computing”, International Journal of Scientific & Technology Research, Vol. 1, Issue 4,May 2012, pp. 67-71.
[6] Chi-Chun Lo, Chun-Chieh Huang, Joy Ku, “A Cooperative Intrusion Detection System Framework for Clouding Computing Networks,” 2010, 39th International Conference on Parallel Processing Workshops, pp. 280-284.
[7] Anna Lenart, “ERP in the Cloud- Benefits and Challenges,”Springer Verlag Berlin Heidelberg, 2011, pp. 39-50.
[8] C. Modi, D. Patel, B. Borisaniya, H. Patel, M. Rajarajan, “A Survey OF Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications 36(2013), pp. 42-57.
Citation
Naveen Chandra, Parag Rastogi, Amit Asthana, "An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.408-413, 2018.
Comparative Study of Various Routing Attacks Detection in VANETS
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.414-419, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.414419
Abstract
Vehicular adhoc networks (VANETs) play a significant role to design an intelligent transportation system. Secured routing in VANETs is still an ill-posed problem. Because, in VANETs communication of packets between vehicles and Road side units (RSUs) is achieved by using public networks. Therefore, VANETs are prone to various routing attacks such as Blackhole, Grayhole, Wormhole etc. The overall objective of this paper is to study various routing attacks, then compare them with each other. The main goal behind this is to determine best secure routing protocol. Also, to evaluate various research gaps in existing research on VANETs. From, extensive review it has been observed that no technique is efficient for every circumstance.
Key-Words / Index Term
VANETS, Classification of Routing Protocols, Attacks in VANETS Component
References
[1] Abdalla, Ghassan MT, Mosa Ali Abu-Rgheff, and Sidi Mohammed Senouci. "Current trends in vehicular ad hoc networks." Proceedings of UBIROADS workshop. 2007
[2] Al-Rabayah, Mohammad, and Robert Malaney. "A new scalable hybrid routing protocol for VANETs." Vehicular Technology, IEEE Transactions on 61, no. 6 (2012): 2625-2635.
[3] Bae, I-H 2014, `An Intelligent Broadcasting Algorithm for Early Warning Message Dissemination in VANETs`, in Computational Science and Its Applications–ICCSA 2014, Springer, pp. 668-681.
[4] Bhakthavathsalam, R., and Starakjeet Nayak. "Operational inferences on VANETs in 802.16 e and 802.11 p with improved performance by Congestion Alert." Consumer Communications and Networking Conference (CCNC), 2011 IEEE. IEEE, 2011.
[5] Buchenscheit, Andreas, et al. "A VANET-based emergency vehicle warning system." 2009 IEEE Vehicular Networking Conference (VNC). IEEE, 2009.
[6] Chen, Chen, YananJin, Qingqi Pei, and Ning Zhang. "A connectivity-aware intersection-based routing in VANETs." EURASIP Journal on Wireless Communications and Networking 2014, no. 1 (2014): 1-16.
[7] Da Cunha, Felipe Domingos, et al. Data communication in VANETs: a survey, challenges and applications. Diss. INRIA Saclay; INRIA, 2014.
[8] El-atty, Saied M. Abd, and Konstantinos Lizos. "Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network." International Journal of Computer Network and Information Security 6.4 (2014): 1.
[9] Feng, Cheng, Zhijun Li, Shouxu Jiang, and Rui Zhang. "Data Aggregation and Routing Guidance with QoS Guarantee in VANETs." International Journal of Distributed Sensor Networks 2014 (2014).
[10] Geravand, Shahabeddin, and Mahmood Ahmadi. "Bloom filter applications in network security: A state-of-the-art survey." Computer Networks 57.18 (2013): 4047-4064.
[11] Hager, Markus, Jochen Seitz, and Thomas Waas. "Literature Survey on Recent Progress in Inter-Vehicle Communication Simulations." Journal of Transportation Technologies 5.03 (2015): 159.
[12] Jiang, Daniel, and Luca Delgrossi. "IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments." Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE. IEEE, 2008.
[13] Kakkasageri, M. S., and S. S. Manvi. "Information management in vehicular ad hoc networks: A review." Journal of Network and Computer Applications 39 (2014): 334-350.
[14] Kesting, Arne, Martin Treiber, and Dirk Helbing. "Connectivity statistics of store and forward intervehicle communication." IEEE Transactions on Intelligent Transportation Systems 11.1 (2010): 172-181.
[15] Lu, Rongxing, Xiaodong Li, Tom H. Luan, Xiaohui Liang, and Xuemin Shen. "Pseudonym changing at social spots: An effective strategy for location privacy in vanets." Vehicular Technology, IEEE Transactions on 61, no. 1 (2012): 86-96.
[16] Molina-Gil, Jezabel, Pino Caballero-Gil, and Cándido Caballero-Gil. "Aggregation and probabilistic verification for data authentication in VANETs."Information Sciences 262 (2014): 172-189.
[17] Ruikar, Manisha. "National statistics of road traffic accidents in India." Journal of Orthopedics, Traumatology and Rehabilitation 6.1 (2013): 1.
[18] Saleet, Hanan, Rami Langar, Kshirasagar Naik, Raouf Boutaba, Amiya Nayak, and Nishith Goel. "Intersection-based geographical routing protocol for VANETs: a proposal and analysis." Vehicular Technology, IEEE Transactions on 60, no. 9 (2011): 4560-4574.
[19] Toutouh, Jamal, José García-Nieto, and Enrique Alba. "Intelligent OLSR routing protocol optimization for VANETs." Vehicular Technology, IEEE Transactions on 61, no. 4 (2012): 1884-1894.
[20] Wisitpongphan, Nawaporn, et al. "Routing in sparse vehicular ad hoc wireless networks." IEEE journal on Selected Areas in Communications 25.8 (2007): 1538-1556.
[21] Jin, Li, Guoan Zhang, and Xiaojun Zhu. "Formal analysis and evaluation of the back-off procedure in IEEE802. 11P VANET." Modern Physics Letters B 31, no. 19-21 (2017): 1740063.
[22] Byun, Seung-Woo, et al. "Modeling and control of an unmanned underwater vehicle using a mass moving system." Modern Physics Letters B 29.06n07 (2015): 1540014.
[23] Tang, T. Q., Xu, K. W., Yang, S. C., & Shang, H. Y. (2016). Analysis of the traditional vehicle’s running cost and the electric vehicle’s running cost under car-following model. Modern Physics Letters B, 30(07), 1650084.
[24] Shen, Huan, and Yun-Sheng Tan. "Vehicle handling and stability control by the cooperative control of 4WS and DYC." Modern Physics Letters B 31.19-21 (2017): 1740090.
[25] Peng, G., Lu, W., He, H., & Gu, Z. (2017). Prevision of vehicle headway effect on urban traffic with a new car-following model. Modern Physics Letters B, 31(10), 1750103.
[26] Zhang, Yong, and Shi-Gao Li. "Multi-fractal analysis for vehicle distribution based on cellular automation model." Modern Physics Letters B 29.26 (2015): 1550153.
[27] Zhang, Geng, and Hui Liu. "Effect of current vehicle’s interruption on traffic stability in cooperative car-following theory." Modern Physics Letters B 31.34 (2017): 1750317.
[28] Zhao, Han-Tao, Hong-Yan Mao, and Rui-Jin Huang. "Cellular Automaton Models for Mixed Traffic Flow Considering Passage way of Emergency Vehicle." Modern Physics Letters B 27.08 (2013): 1350052.
[29] Lee, I., Kim, J. Y., Kim, K. S., & Lim, I. G. (2009). Aeroelastic Phenomena of Flight Vehicles in Transonic Region. Modern Physics Letters B, 23(03), 421-424.
[30] Wang, C., Yang, B., Tan, G., Guo, X., Zhou, L., & Xiong, S. (2016). Numerical analysis on thermal characteristics and ice melting efficiency for microwave deicing vehicle. Modern Physics Letters B, 30(13), 1650203.
[31] Xiao, Hong, Hai-Jun Huang, and Tie-Qiao Tang. "Impacts of road conditions on the energy consumption of electric vehicular flow." Modern Physics Letters B 31, no. 11 (2017): 1750121.
[32] Sirola, P., Joshi, A. and Purohit, K.C., 2014. An analytical study of routing attacks in vehicular ad-hoc networks (VANETs). International journal of computer science engineering (IJCSE), 3(4), pp.210-218.
Citation
Tamanna Gandotra, Gurpadam Singh, "Comparative Study of Various Routing Attacks Detection in VANETS," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.414-419, 2018.
Comprehensive study about different scheduling techniques for parallel applications in cloud computing
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.420-426, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.420426
Abstract
Parallel computing gives us an environment through which we can execute numerous assignments at the same time. It enables us to take care of enormous problem by separating it into multiple small problems. As energy utilization while satisfy deadline constraint by PCs has become a concern in recent years. This paper has exhibited a comprehensive review on the different swarm intelligence based energy efficient scheduling techniques. It has been observed that the scheduling in parallel condition is NP-hard in nature. The research on meta-heuristic based job scheduling methods have demonstrated that the utilization of Quick energy aware processor merging has low convergence rate overall world wide minimum even at high numbers of dimensions. Gravitational Search optimization algorithm has been generally acknowledged as a global optimization algorithm of current enthusiasm for disseminated advancement and control. Particle swarm optimization is constrained to beginning arrangement of particles, wrongly chosen particles tends to poor outcomes. Moreover, comparison among different job scheduling methods have displayed that no strategy is ideal for each case. At last, a few considerations about future challenges have been exhibited.
Key-Words / Index Term
Scheduling,Energy, Deadline, Power
References
[1] Guoqi Xie,“Energy-aware Processor Merging Algorithms for Deadline Constraint Parallel Application in Heterogeneous Cloud Computing.”IEEE Transactions on Sustainable Computing,Vol.2 Issue2,pp.62-75, April 2017.
[2] Aeshah Alsughayyir, “Energy Aware Scheduling of HPC Tasks in Decentralised Cloud Systems”IEEE24th Euromicro International Conference on Parallel,Distributed, and Network-Based Processing,pp.617-621,2016.
[3] M. Zotkiewicz,”Minimum dependencies energy-efficient scheduling in data centers," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 12, pp. 3561-3574, 2016.
[4] Adam Gregory,“A Configurable Energy Aware Resource Management Technique for Optimization of Performance and Energy Consumption on Clouds”IEEE 8th International Conference on Cloud Computing Technology and Science,pp.184-192,2016.
[5] Hao Li,“Energy-aware Scheduling of Workflow in Cloud Center with Deadline Constraint”IEEE 12th International Conference on Computational Intelligence and Security,pp.415-418,2016.
[6] Vahid Arabnejad,“Cost Effective and Deadline Constrained Scientific Workflow Scheduling for Commercial Clouds”IEEE 14th International Symposium on Network Computing and Applications,pp.106-113, 2015.
[7] Zhongjin Li, “Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds” IEEE Transactions on services computing,vol.pp,Issue.99,pp.1-15,2015.
[8] K. Li, “Energy-e_cient stochastic task scheduling on heterogeneous computing systems," IEEE Transactions on Parallel and Distributed Systems,vol. 25, no. 11, pp. 2867-2876, 2014.
[9] Yue Gao,“An Energy and Deadline Aware Resource Provisioning, Scheduling and Optimization Framework for Cloud Systems” IEEE, 2013 .
[10] Hamid Mohammadi Fard,“A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments” 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.300-309,2012.
[11] Qingjia Huang,“Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud” 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing,pp.781-786, 2012.
[12] X. Wang,”An energy-aware bi-level optimization model formulti-job scheduling problems under cloud computing," Springer Soft Computing, vol. 20,no. 1, pp. 303-317, 2016.
[13] Stein Keijzers, “Energy Consumption Analysis of Practical Programming Languages” Master thesis August ,2014.
[14] Saurabh Bilgaiyan,“Workflow Scheduling in Cloud Computing Environment Using Cat Swarm Optimization” IEEE International Advance Computing Conference (IACC), pp.680-685,2014.
[15] Xinghui Zhao,“Energy-aware resource allocation for multicores with per-core frequency scaling” Springer,Journal of Internet Services and Applications, pp.1-15,2014
[16] Santiago Pagani,“Energy Efficiency for Clustered Heterogeneous Multicores” IEEE Transactions on parallel and distributed systems, vol. 28, no. 5, May, 2017
[17] Xin Li,“Slack-time-aware Energy Efficient Scheduling for Multiprocessor SoCs” IEEE International Conference on High Performance Computing and Communications,pp.278-285,2013.
[18] Kenli Li,“Energy-Aware Scheduling Algorithm for Task Execution Cycles with Normal Distribution on Heterogeneous Computing Systems” IEEE 41st International Conference on Parallel Processing, pp.40-47,2012.
[19] Hamid Reza Naji,“A High-Speed, Performance-Optimization Algorithm Basedon a Gravitational Approach” IEEE,pp.56-62, 2012.
[20] Li Shi, “Energy-aware Scheduling of Embarrassingly Parallel Jobs and Resource Allocation in Cloud” IEEE Transactions on Parallel and Distributed Systems,vol.28,Issue 6,pp.1-14,2016.
[21] Anita Choudhary, “Workflow Scheduling algorithms in cloud environment:a Review, Taxonomy, and Challenges”IEEE International Conference on Parallel, Distributied and Grid Computing,pp.617-624,2016
[22] Dhananjay Thriuvady, “Parallel ant colony optimization for resource constrained job scheduling”,Springer,Volume 242, Issue 2, pp 355–372 ,2014.
[23] Piotr Swistalski,“Scheduling parallel batch jobs in grids with evolutionary Metaheuristics”. Springer , Volume 18, Issue 4, pp 345–357,2014.
[24] Khadija Bousselmi “Energy efficient partitioning and scheduling approach for Scientific Workflows in the Cloud” IEEE International Conference on Services Computing,pp.146-154,2016.
[25] A.Jain,“Cloud Scheduling using Meta Heuristic Algorithms”IJCSE,Vol.5,Issue10,pp.132-139,2017.
Citation
S. Rana, A. Kumar, "Comprehensive study about different scheduling techniques for parallel applications in cloud computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.420-426, 2018.
The Impact of Social Media on Students Academic Performance (With Special Reference to Arts and Science College Students in Coimbatore District - Tamil Nadu)
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.427-430, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.427430
Abstract
Modern world communication is a web-based service which gives individual opportunity to create a public or semi-public profile within a boundary, in that they can add others in their own profile to share, view or create their own contents. The primary aim of the study is to examine the influence of social media on student’s academic performance, for that an Arts & Science College in Coimbatore Territory was selected and questionnaire was prepared based on past literatures and social media. The Independent variables includes: time appropriateness and the research adopted descriptive and explanatory research design. The collected data was analyzed using description means and regression via SPSS 17. The Pearson’s correlation coefficients of four independent are correlated with student’s academic performance.
Key-Words / Index Term
Social media, Education service, Blog, Whats App, Academic performance
References
[1]. B.Debatin, J.P.Lovejoy, A. K.Horn, & B. N. Hughes, (2009). “Facebook and online privacy: Attitudes, behaviors, and unintended consequences” Journal of Computer Mediated Communication, 15(1), 83-108.
[2]. N. B.Ellison, C. Steinfield, & C. Lampe, (2007). The benefits of Facebook"Friends:" social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168.
[3]. O.A.(Enikuomehin 2011), ICT, CGPA: “Consequences of Social Networks In An Internet Driven Learning Society”. International Journal of Computer Trends and Technology- volume2, Issue2
[4]. E.Gemmill, & M. Peterson, (2006). “Technology use among college students: Implications for student affairs professionals”. NASPA Journal, 43(2), 280-300.
[5]. Jwaifell, Al-Shalabi, Andraws, Awajan&Alrabea (2013), “The Intensity of Social Networks Group Use among the Students of Jordanian Universities”. Global Journal of Computer Science and Technology Network, Web & Security Volume 13, Issue 2, Version 1.0, Year 2013
[6]. D. Kacie (2009). “Use of “Social Networks” Strength in Impact of Pro-Life Youth, National Rights to a Life” (NRL) News Page 9, January 2009, Volume 36, Issue 1
[7]. J. T Kadala (2011) “Effects of Internet usage on the Academic Performance of Students in Tertiary Institutions in Mubi Educational Zone”. Journal of Applied science and Management, Vol. 13, No. 1.
[8]. Nishtha Anand1* and Renuka Mahajan2 1*,2 “A Statistical Analysis of Social Media as a New Investigative Tool in Marketing”. Amity Institute of Information Technology, Amity University, Noida (Uttar Pradesh), India. Research Paper Volume-2, Issue-4 E-ISSN: 2347-2693
Citation
P. Panbuselvan, V. Veerakumaran, "The Impact of Social Media on Students Academic Performance (With Special Reference to Arts and Science College Students in Coimbatore District - Tamil Nadu)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.427-430, 2018.
An Approach to Design and Development Recommender System
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.431-433, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.431433
Abstract
Each day we are surrounded by any number of decisions to make. Which book should I read next? Which movie to watch? Which book to read? Which blog to follow? Or which item to buy? Finding the appropriate choice is like finding a needle in a haystack. Increasingly, we use the web and online resources to help us make a decision. As our decision making is transported and conducted in the online sphere, the use of recommendation systems has become essential in daily life. Recommendation systems have been studied and developed for more than two and a half decades. Within this period, a variety of algorithms has been developed for various application domains. The major breakthrough in development of recommender system was in 2006 when Netflix announced the $1 million to whoever improved the accuracy of his existing system called Cinematch by 10%in a machine learning and data mining competition for movie rating prediction.
Key-Words / Index Term
Recommender System, content-based, collaborative filtering, knowledge based filtering, IoT
References
[1] Belén Barragáns-Martínez, Enrique Costa-Montenegro, Jonathan Juncal-Martínez, Developing a recommender system in a consumer electronic device. Expert Systems with Applications journal 42 (2015) 4216–4228.
[2]Bobadilla, J., Ortega, F., Hernando, A., & Gutiérrez, A. (2013). Recommender systems survey. Knowledge-Based Systems Journal, 46, 109–132.
[3]Joseph, T. R., & Jacob, S. (2014). A commerce recommender system for improving customer relationship management in shopping centers.International Journal of Engineering Trends and Technology.
[4]Ripley, B., Liu, D., Chang, M., & Kinshuk (2013). Next stop recommender. In 2013 international joint conference on awareness science and technology and ubi-media computing (iCAST-UMEDIA).
[5] M. Balabanovic and Y. Shoham, “Fab: Content-based, collaborative recommendation” Commun. ACM, vol. 40, no. 3, pp. 66–72,1997.
[6]Zhuang, X., Sun, Y., & Wei, K. (2014). Smocor: A smart mobile contact recommender based on smart phone data. In computer software and applications conference (COMPSAC), 2014 IEEE 38th annual.
[7] G. Adomavicius, A. Tuzhilin, Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions, IEEE Transactions on Knowledge and Data Engineering 17 (6) (2005) 734–749.
[8]A. Ansari, S. Essegaier, R. Kohli, Internet recommendation systems, Journal of Marketing Research 37 (3) (2000) 363–375.
[9] Y. Koren, R. Bell, and C. Volinsky, “Matrix factorization techniquesfor recommender systems,” IEEE Comput., vol. 42, no. 8,pp. 30–37, Aug. 2009.
[10]N. Antonopoulus, J. Salter, Cinema screen recommender agent: combining collaborative and content-based filtering, IEEE Intelligent Systems (2006) .
[11] R. Burke, “Hybrid recommender systems: Survey andexperiments,” User Model. User-Adapted Interaction, vol. 12, no. 4,pp. 331–370, 2002.
[12]O. Arazy, N. Kumar, B. Shapira, Improving Social Recommender Systems, Journal IT Professional 11 (4) (2009) 31–37.
[13]M. Balabanovic, Y. Shoham, Content-based, collaborative recommendation, Communications of the ACM 40 (3) (1997) 66–72.
[14] Y. Koren. (2009). The bellkor solution to the netflix grand prize[Online]. Available: http://www.netflixprize.com/assets/Grand
Prize2009_BPC_BellKor.pdf
[15]J. Bobadilla, A. Hernando, F. Ortega, A. Gutierrez, Collaborative filtering based on significances, Information Sciences 185 (1) (2012) 1–17.
Citation
Samir N Ajani, Lokesh M Heda, Santosh Kumar Sahu, Manish M Motghare, "An Approach to Design and Development Recommender System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.431-433, 2018.
Analysing the supervised learning methods for prediction of healthcare data in cloud environment: A Survey
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.434-438, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.434438
Abstract
In the present era of massive usage of computers, an enormous set of data is being generated from different organizations each day, each hour and each second. This data would be of prodigious use to a diverse set of people based on their needs. Predictive analysis is a process of analysing data and identifying the different patterns in it, so as to predict the occurrence of these patterns in future. The predicted output can help plan a new strategy and adopt innovative solutions for the decision making. This paper attempts to analyse the various predictive models which are applied in the healthcare domain. These models are analysed in depth and will be proposed to be available on the cloud environment in future and can be accessed by those concerned for potential analysis.
Key-Words / Index Term
Predictive modeling, predictive algorithms, predictive analytics in a cloud environment, supervised learning
References
[1] J. D. Kelleher, B. M. Namee and A. D. Acry, “Fundamentals of machine learning for predictive analytics: algorithms, worked examples and case studies,” MIT Press, 2015.
[2] Siegel, Eric Author. “Predictive Analytics: the Power to Predict Who Will Click, Buy, Lie or Die.” Wiley.
[3] Yoo, I., Alafaireet, P., Marinov, M., Pena-Hernandez, K., Gopidi, R., Chang, J. and Hua, L. (2011). “Data Mining in Healthcare and Biomedicine: A Survey of the Literature. “Journal of Medical Systems, 36(4), pp.2431-2448.
[4] T. Nguyen, A. Khosravi, D. Creighton, and S. Nahavandi, “Classification of healthcare data using genetic fuzzy logic system and wavelets,” Expert Systems with Applications, Elsevier publicaitons, vol. 42, no. 4, pp. 2184–2197, 2015.
[5] T. Nattkemper, B. Arnrich, O. Lichte, W. Timm, A. Degenhard, L. Pointon, C. Hayes and M. Leach, "Evaluation of radiological features for breast tumour classification in clinical screening with machine learning methods", Artificial Intelligence in Medicine, Elsevier publication, vol. 34, no. 2, pp. 129-139, 2005.
[6] S. Yu, F. Farooq, A. van Esbroeck, G. Fung, V. Anand and B. Krishnapuram, "Predicting readmission risk with institution-specific prediction models", Artificial Intelligence in Medicine, Elsevier publications, vol. 65, no. 2, pp. 89-96, 2015.
[7] W. Dai, T. Brisimi, W. Adams, T. Mela, V. Saligrama and I. Paschalidis, "Prediction of hospitalization due to heart diseases by supervised learning methods", International Journal of Medical Informatics, vol. 84, no. 3, pp. 189-197, 2015.
[8] G. Toti, R. Vilalta, P. Lindner, B. Lefer, C. Macias and D. Price, "Analysis of correlation between pediatric asthma exacerbation and exposure to pollutant mixtures with association rule mining", Artificial Intelligence in Medicine, Elsevier publication, vol. 74, pp. 44-52, 2016.
[9] D. Delen, G. Walker and A. Kadam, "Predicting breast cancer survivability: a comparison of three data mining methods", Artificial Intelligence in Medicine, vol. 34, no. 2, pp. 113-127, 2005.
[10] L. de Oliveira Silva, A. Barros and M. Lopes, "Detecting masses in dense breast using independent component analysis", Artificial Intelligence in Medicine, vol. 80, pp. 29-38, 2017.
[11] H. Demirkan and D. Delen, "Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud", Decision Support Systems, Elsevier B.V publications, vol. 55, no. 1, pp. 412-421, 2013.
[12] K. Molka and Byrne, James, "Towards Predictive Cost Models for Cloud Ecosystems", poster paper, IEEE Research challenges in Information Science, Paris, 2013.
[13] B. Jin, Y. Wang, Z. Liu and J. Xue, "A Trust Model Based on Cloud Model and Bayesian Networks", Procedia Environmental Sciences, vol. 11, pp. 452-459, 2011.
[14] Anitha H M, P. Jayarekha , "Security Challenges of Virtualization in Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.37-43, 2018.
[15] Weider D. Yu, Manjula Kollipara, Roopa Penmetsa, Sumalatha Elliadka, "A distributed storage solution for cloud based e-Healthcare Information System", 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013),Lisbon,Portugal 2014.
[16] P Kiran Rao, R Sandeep Kumar, "Machine Learning Methods for Cloud Computing", i-manager’s Journal of Cloud Computing , Vol. 3 No. 4 August - October 2016 .
[17] K.Sree Divya, P.Bhargavi, S.Jyothi “Machine Learning Algorithms in Big data Analytics”, International Journal of Computer Sciences and Engineering, vol.6, issue 1, 2018.
Citation
N.M. Annigeri, S. Shetty, A.P. Patil , "Analysing the supervised learning methods for prediction of healthcare data in cloud environment: A Survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.434-438, 2018.