Applications of Semantic Similarity Metrics
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.413-416, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.413416
Abstract
The objective of this work is to access the applicability of the semantic similarity in concepts of a single ontology. The measurement of semantic similarity may help not only in information retrieval, but in other applications such as semantic search and semantic clustering. The traditional key-word search technique matches the keyword with the content of the document. These techniques do not reflect the meaning or relatedness. Hence the relevance and accuracy of the retrieved documents are less. Another important application of semantic similarity measurement is in cluster analysis. The semantic clusters may be treated with same function to accomplish the perfect analysis and decision making.
Key-Words / Index Term
Semantic Similarity, Ontology, Semantic Retrieval, Clustering
References
[1]. Tim B.L and Fischetti M., ―Weaving the Web: The Original Design andUltimate Destiny of the World Wide Web by its inventor‖, Britain: Orion Business. ISBN 0-7528-2090-7, 1999
[2]. Wang, J.Z., Ali, F.: An Efficient Ontology Comparison Tool for Semantic Web Applications. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI 2005), pp. 372–378 (2005)
[3]. Hu, W., Jian, N., Qu, Y., Wang, Y.: GMO: A Graph Matching for Ontologies. In: Proceedings of Integrating Ontologies 2005, pp. 41-48. CEUR-WS.org, Aachen (2005)
[4]. Giunchiglia, F., Shvaiko, P., Yatskevich, M.: S-Match: an Algorithm and an Implementation of Semantic Matching. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 61–75. Springer, Heidelberg (2004)
[5]. Rada, R., Mili, H., Bicknell, E., Blettner, M.: Development and application of a metric on semantic nets. IEEE Transactions on Systems, Man and Cybernetics, 17–30 (1989)
[6]. Aggarwal N. (2012) Cross Lingual Semantic Search by Improving Semantic Similarity and Relatedness Measures. In: Cudré-Mauroux P. et al. (eds) The Semantic Web – ISWC 2012.. Lecture Notes in Computer Science, vol 7650. Springer, Berlin, Heidelberg
[7]. Moldovan, D.I., Mihalcea, R.: Using WordNet and lexical operators to improve Internet searches. IEEE Internet Computing 4(1), 34–43 (2000)
[8]. Finkelstein L., Gabrilovich E., Matias Y., Rivlin E., Solan Z., Wolfman G. and Ruppin E., ―Placing search in context: The concept revisited,ACM Transactions on Information Systems, Vol. 20, No.1, pp. 116–131, January 2002.
[9]. Schenkel, R., Theobald, A. & Weikum, G. Inf Retrieval (2005) 8: 521. https://doi.org/10.1007/s10791-005-0746-3
[10]. Liu, S., Liu, F., Yu, C., Meng, W.: An effective approach to document retrieval via utilizing WordNet and recognizing phrases. In: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, Sheffield, United Kingdom, pp. 266–272 (2004)
[11]. Sapkota, K., Thapa, L., Pandey, S.: Efficient Information Retrieval using measures of Semantic Similarity (2006)
Citation
Suraiya Parveen, Ranjit Bisswas, "Applications of Semantic Similarity Metrics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.413-416, 2018.
RFID Based Surveillance System for Preventing Tree Smuggling in Forest
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.417-421, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.417421
Abstract
From past few years we have been reading in the newspaper about cutting and smuggling of precious trees, these trees are very costly as well as important in the world, trees are used in medical science as well as cosmetic because of huge amount of money is involved in selling of such tree woods, lots of incidents are happening of cutting of trees and their smuggling.. To protect such type of smuggling protecting system need to be developed. In proposed system, In order to detect cutting down of valuable trees immediately we use vibration sensor and continuity sensor, here vibration sensor is used to sense the vibration created during cutting down the trees and continuity sensor check the connectivity between neighbouring trees, buzzer along with RFID and bluetooth is used. When smuggler start cutting the tree, the vibration level of the tree is increased is sensed by vibration sensor then it immediately send alert buzzer to control unit. If the smuggler remove the tag then cut the tree the continuity between the neighbouring trees will be break then also it send alert buzzer to control unit and immediate action can be taken.
Key-Words / Index Term
Vibration sensor, continuity sensor, RFID, ATmega328 Microcontroller, Bluetooth and buzzer
References
[1] Atah,, A. If the Inventory manager knew: Value of RFID under Imperfect Inventory Information. Working Papers Stanford University, Stanford, California. [Online] Available at: http://www.kellogg.northwestern.edu/Departments/meds.aspx [Accessed 15 July 2012]
[2] Banks, J., Pachano, M., Thompson, L. & Hanny, David., 2007. RFID Applied. Hoboken New Jersey: John Wiley & Sons.
[3] Çakıcı, E,. 2011. Using RFID for the management of pharmaceutical inventory system optimization and shrinkage control. Decision Support Systems.
[4] Bustillo, M,. 2010. Wal-Mart radio ta gs to track clothing. The Wall Street Journal, 03 June 2010
[5] Çakıcı, E,. 2011. Using RFID for the management of pharmaceutical inventory system optimization and shrinkage control. Decision Support Systems.
[6] Cisco Website. 2011. [Online] Available at: http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/wifich6.html [Accessed 01 July 2012]
[7] Creswell, J., 2002. Research Design: Qualitative, Quantitative and Mixed Systems Approaches. SAGE Publications, Edition. 2.
[8] Eckfeldt, B., 2005. What does RFID do for the consumer? Communication of the ACM Vol.4,Issue: 8.
[9] Edwards, S. & Fortune, M,. 2008. A Guide to RFID in Libraries. Book Industry Communication.
[10] Finkenzeller,K., 2003. RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identifi cation (Second Edition). The Atrium, Southern Gate, Chichester: John Wiley & Sons.
[11] Gangar, K,. 2009. Indian Government to develop „India Micoprocessor‟. [Online] Available at: http://techtickerblog.com/2009/07/17/indian-government-to-develop-india-microprocessor/ [Accessed
[12] Gel, Esma. S,. 2010. Analysis of simple inventory control systems with execution errors: Economic impact under correction opportunities. International Journal of Production Economics, Vol.125, Issue.1, pages 153-166.
[13] Givens, B,. 2004. Radio Frequency Identification: Applications and Implications for Consumers. Testimony of Beth Givens, Director to the Federal Trade Commission‟s RFID Workshop, 21 June 2004. [Online] Available at: https://www.privacyrights.org/ar/FTC-RFIDTestimony.htm [Accessed 05 July 2012]
[14] Hillier, F.S., Lieberman, G.J. 2001. Introduction to Operation Research. McGraw-Hill higher education, Edition. 7, pages 834-838.
[15] Ketzenberg, M,. 2006. Inventory policy for dense retail outlets. Journal of Operations Management, Vol.18, Issue.3, pages 303-316.
Citation
Seema Rai, Wilson Jeberson, "RFID Based Surveillance System for Preventing Tree Smuggling in Forest," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.417-421, 2018.
Development of Privacy Preserving Clustering Process with Cost Minimization for Big Data Processing
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.422-428, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.422428
Abstract
Unfathomable quantum of comprehensive private data is habitually gathered as the mutual exchange of the corresponding information has come as a shot in arm for a multitude of data mining applications. The related data extensively encompass the shopping trends, criminal records, medical history, credit records and so forth. It is true that the corresponding information has proved its mettle as a vital asset to the business entities and governmental organization for the purpose of taking prompt and perfect decisions by means of assessing the pertinent records. However, it has to be borne in mind that harsh privacy. With an eye on effectively addressing the corresponding thorny issues, in this document, an earnest endeavor is made to kick-start a novel clustering Probabilistic Possibility Fuzzy C Means Clustering (PFCM) approach viz. The Big data processing, in fact, involves the explosive expansion of demands on evaluation, storage, and transmission in data centers, thus leading to incredible working expenses to be borne by the data center providers. To achieve this, we introduce VSSFA and Map Reduce Framework in Cloud environment. In this thesis we deeply develop a privacy preserving clustering process with cost minimization for big data processing.
Key-Words / Index Term
Probabilistic Possibilistic Fuzzy C Means Clustering Algorithm, Neural Network, Privacy Preserving Data Mining, Fuzzy C-Means
References
[1] YogitaChawla and MansiBhonsle, (2012). A Study on Scheduling Methods in Cloud Computing‖, International Journal of Emerging Trends and Technology in Computer Science, vol. 1(3).
[2] Xun Xu, (2012). Cloud Computing to Cloud Manufacturing‖, Robotics and Computer-Integrated Manufacturing, vol. 28(1), pp. 75-86.
[3] Jadeja and Kirit Modi, (2012). Cloud Computing Concepts, Architecture and Challenges‖, International Conference on Computing, Electronics and Electrical Technologies.
[4] P. Garbacki and V. K. Naik,( 2007). Efficient Resource virtualization and sharing strategies for heterogeneous Grid environments‖,/IEEE, pp. 40–49.
[5] Asmaa H.Rashid and Abd-Fatth Hegazy, (2010). Protect Privacy of Medical Informatics using K-Anonymization Model‖, IEEE Explore,
[6] Pekka Paakkonen and Daniel Pakkala, (2015). Reference Architecture and Classification of Technologies, Products and Services for Big Data Systems‖, Big Data Research,
[7]Isaac Triguero, Daniel Peralta, Jaume Bacardit, Salvador Garcia and Francisco Herrera, (2015). MRPR: A Map Reduce Solution for Prototype Reduction in Big Data Classification‖, Neuro computing, vol. 150, pp. 331-345.
[8] Xindong Wu, Xingquan Zhu, Gong-Qing Wu and Wei Ding, (2014). Data Mining with Big Data‖, IEEE Transactions on Knowledge and Data Engineering vol. 26(1).
[9] Xingjian Li,(2015). An Algorithm for Mining Frequent Itemsets from Library Big Data", journal of software, vol. 9, no. 9.
[10] Bingwei Liu, Erik Blasch, Yu Chen, Dan Shen and Genshe Chen,(2014). Scalable sentiment classification for Big Data analysis using Naïve Bayes Classifier. IEEE International Conference on. IEEE.
[11] Shan Suthaharan, (2014). Big data classification: Problems and challenges in network intrusion prediction with machine learning, ACM SIGMETRICS Performance Evaluation Review, vol. 41(4), pp. 70-73.
[12] Chhaya S Dule,H.A. Girijamma and K.M Rajasekharaiah,(2014). Privacy Preservation Enriched MapReduce for Hadoop Based BigData Applications, American International Journal of Research in Science, Technology, Engineering & Mathematics,.
[13] Rongxing Lu, Hui Zhu; Ximeng Liu; Liu and J.K.Jun Shao, (2014). Toward efficient and privacy-preserving computing in big data era‖, IEEE Communication socity, vol.28 (4).
[14] Mehdi Sookhak, Abdullah Gani, Muhammad Khurram Khan and Rajkumar Buyya, (2015). Dynamic remote data auditing for securing big data storage in cloud computing‖, Information Sciences,
[15] Cem lyigun. Probabilistic Distance Clustering‖, Proquest, pages. 137.
[16] Nikhil R. Pal, Kuhu Pal, James M. Keller and James C. Bezdek, (2005). A Possibilistic Fuzzy c-Means Clustering Algorithm‖, IEEE transactions on fuzzy systems, vol. 13, (4), pp. 517-530,
Citation
S. Chitra, R. Bharanidharan, "Development of Privacy Preserving Clustering Process with Cost Minimization for Big Data Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.422-428, 2018.
Data Aggregation Approach to Improve the Network Lifetime in wireless sensor networks
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.429-433, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.429433
Abstract
The core part of Wireless Sensor Networks [WSNs] is typically sensor nodes which have the ability to carefully collect sensory information, sense, consistently process the sensitive information and communicate efficiently with other connected nodes in the established network. The network lifetime will generally depend upon these sensor nodes, which normally consist of non-rechargeable batteries. Sometimes it processes unnecessary information with high energy consumption. If more energy consumption occurs, the network lifetime is decreased. So, how to efficiently implement the wireless sensor networks to progressively improve the network lifetime is the main aim of this proposed method. In this, a mobile element based data gathering technique is used. In this method, a tinybee is typically sent from a mobile element and comes back to the mobile element with aggregated information. Hence, the tour length of the mobile element is reduced and energy can be efficiently used than the present system. Subsequently, it decreases the delay and improves the network lifetime.
Key-Words / Index Term
Wireless sensor networks, Energy, Data collection, Sensor, Network Lifetime (key words)
References
[1] Mario Di Francesco, Sajal K. Das, Giuseppe Anastasi, “Data Collection in wireless sensor Networks with Mobile Elements: A servey”, ACM Journal, Vol. V, No. N, Month 20YY, pages 0-77.
[2] Feng Wang and Jiangchuan Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, And Approaches”, IEEE Communication Survey and Tutorials for Possible Publication.
[3] Kaoru Ota and Mianxiong Dong, “Mobile-Agent Based Data gathering System in Wireless Sensor Networks”, International conference on Networking Architecture, NAS 2009, 9-11 July 2009.
[4] Diwakar, “An Energy Efficient Level Based Clustering Routing Protocol For Wireless Sensor Networks”, International Journal of Advanced smart Sensor Network System (IJASSN), vol.2, No.2, April 2012.
[5] Velmani, “An Efficient Cluster Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks”, IEEE Sensor Journal, DO.I 10/1109.
[6] Alia Sabri and Khalil Al- Shqeerat, “Hierarchical cluster-based routing protocols for wireless sensor networks- A Survey”, International Journal of Computer Science Issue, Vol.11, No.2, January 2014.
[7] Ramesh Rajagopalan and Pramod K.Varshney, “Data aggregation techniques in sensor networks: A survey”, Communications Surveys & Tutorials, IEEE, 2006 vol.8, pp.48-66.
[8] Santar pal Singh, S.C.Sharma, “Survey on Clustering Based Routing Protocols in Wireless Sensor Networks”, in Proc.Of International conference on advanced computer technologies and Applications(ICACTA), Pp.687-695.
[9] J.Daniel Mano, Dr.S.Sathappan, “Comparison of Wireless Routing Protocols in Sensor Network Using NS2 Tool”, IJARBEST, ISSN-2395-695X, Vol.2, Special Issue 19, October 2016.
[10] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[11] Wang Liu, Kejie Lu, Jianping Wang, Guoliang Xing, and Liusheng Huang, “Performance Analysis of Wireless Sensor Networks with Sinks”. IEEE transactions on vehicular technology, vol.61, No.6, July 2012.
[12] J Soro, Heinzelman, W.B., ‘‘Prolonging the Lifetime of Wireless Sensor Networks via Unequal Clustering’’, 19th IEEE International Parallel and Distributed Processing Symposium, 2005.
[13] Javad Rezazadeh, Marjan Moradi, Abdul Samad Ismail, “Mobile Wireless Sensor Networks Overview”,IJCCN International Journal of Computer Communications and Networks , Volume 2, Issue 1, February 2012.
[14] Ming Liu, Jiannong Cao, Guihai Chen and Xiaomin Wang, “An Energy-Aware Routing Protocol in Wireless Sensor Networks,” Sensors, ISSN 1424-8220, 2009.
[15] Shi, L.Zhang, B.X.Mouftah, H.T.& Ma, J.(2013). DDRP: “An efficient data-driven routing protocol for wireless sensor networks with mobile sinks”.
[16] Chaurasiya, S.K., Pal, T., Bit, S.D., “An Enhanced Energy-Efficient Protocol with Static Clustering for WSN”. International Conference on Information Networking (ICOIN), 2011. Kuala Lumpur, Malaysia, pages: 58 – 63.
[17] Heinzelman W. B., Chandrakasan A. P., Balakrishnan H., ”An application specific protocol architecture for wireless microsensor networks,” IEEE Trans on Wireless Communications, Volume 1, No. 4, 2002, pages: 660-670.
[18] WANG Jun, Zhang, Junyuan and Zhengkun “A Distance-based Clustering Routing Protocol in Wireless Sensor Networks”, Communication Technology (ICCT), 2010, 12th IEEE International Conference, Nov. 2010.
[19] Lingyun Yuan, Xingchao Wang, Jianhou Gan, “A Data Gathering Algorithm Based on Mobile Agent and Emergent Event-Driven in Cluster-Based WSN”, Academy Publisher, Journal Of Networks, Vol. 5, No. 10, October 2010.
[20] Min Chen, Taekyoung Kwon, Yong Yuan, and Victor C.M. Leung,, “Mobile Agent Based Wireless Sensor Networks”, Academy Publisherjournal Of Computers, Vol. 1, No. 1, April 2006.
[21] Haroon Malik, Elhadi Shakshuki, “Data Dissemination in Wireless Sensor Networks Using Software Agents”, 21st International Symposium on High Performance Computing Systems and Applications. IEEE 2007.
[22] AS. Mandloi, V. Choudhary, "Study of Various Techniques for Data Gathering in WSN", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.3, pp.12-15,2013.
[23] R. Bandaru, RS. Basavala , "Information Leakage through Social Networking Websites leads to Lack of Privacy and Identity Theft Security Issues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.1-7, 2013.
Citation
D. Dinesh, B. Jogeswara Rao, "Data Aggregation Approach to Improve the Network Lifetime in wireless sensor networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.429-433, 2018.
An Virtual Education System for Rural
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.434-437, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.434437
Abstract
In the modern era, computer has become urgency. The use of computer is expanding with such an extent that the life without the computer is unimaginable. Nevertheless the roots of computer have emerged in each and every age group and sector still there are some areas where the computers cannot be used with such a proficiency. The people of rural areas are unable to get the sound knowledge of various things due to the unavailability of the resources in their areas. Our research work focuses on imparting the knowledge to the rural areas using the concept of the far-flung technology, i.e., cloud computing.
Key-Words / Index Term
Cloud Computing; Virtual Campus; e-Learning
References
[1] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." (2011).
[2] F. Jian, “Cloud computing based distance education outlook”, China electronic education, 2009.10, Totally 273, pp.39-42.
[3] R. Hua, “Teaching Information System Based on Cloud Computing”, Computer and Telecommunications, 2010.02, pp. 42-43.
[4] Y. Juan, S. Yi-xiang, “The Initial Idea of New Learning Society which Based on Cloud Computing”, Modern Educational Technology, Vol.20, No.1, 2010, pp.14-17.
[5] T. Jian, F. Lijian, G. Tao, “Cloud computing-based Design of Network Teaching System”, Journal of TaiYuan Urban Vocational college, Mar. 2010, pp.159-160.
[6] Y. Zhongze, “The basic principles of cloud computing and its impact on education”, Satellite TV and Broadband Multimedia, 2010.6, pp.67-70.
[7] W. Xiaomei, J. Xiaoqiang, “Cloud computing on the Impact of Higher Education”, Science & Technology Information, 2010.10, pp.397-398.
[8] Marinescu, Dan C. "Cloud Computing: Theory and Practice Solutions to Exercises and Problems." (2013).
[9] Chandra, D. G., & Malaya, D. B. (2012, March). Role of Cloud Computing in education. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 832- 836). IEEE.
[10] Onur, E., Sfakianakis, E., Papagianni, C., Karagiannis, G., Kontos, T., Niemegeers, I., Chochliouros, I.P., de Groot, S.H., Sjodin, P., Hidell, M., Cinkler, T., Maliosz, M., Kaklamani, D.I., Carapinha, J., Belesioti, M., Fytros, E., ―Intelligent End-To-End Resource Virtualization Using Service Oriented Architectureǁ, Delft Univ. of Technol., Delft, Netherlands, GLOBECOM Workshops, IEEE, 28 December 2009.
[11] G. Gruman, "What cloud computing really means", InfoWorld, Jan. 2009.
[12] E. Tuncay, "Effective use of Cloud computing in educational institutions," Procedia Social Behavioral Sciences, p. 938–942, 2010.
Citation
Mohit Pandey, Shubhanghi Sankhyadhar, "An Virtual Education System for Rural," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.434-437, 2018.
Analysing the Bit-error Probability of a receiver in Multi-User MIMO SC-FDMA systems
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.438-443, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.438443
Abstract
SC-FDMA signals are currently espoused equally the Long Term Evolution (LTE) standard for the uplink due to its high data rate and low Peak to Average Power Ratio (PAPR). In SC-FDMA, two methods of choosing subcarriers for transmission are used; distributed using Interleaved (IFDMA) and localized (LFDMA).The Interleaved FDMA (IFDMA) is a distributed mode with equidistance between occupied subcarriers. In this paper, the PAPR for LFDMA and IFDMA techniques is simulated and compared. Simulation shows that the reduction of PAPR for IFDMA decreased more than 3 dB compared with LFDMA, which means that the IFDMA has better PAPR Performance than LFDMA. Moreover as shown as in the Figures there is a direct relationship between the Roll-off-factor (Alpha, α) and subcarriers, When the value of Alpha increases and the subcarriers increase, the result is a good performance of PAPR.
Key-Words / Index Term
SC-FDMA, PAPR, LTE, IFDMA, LFDMA
References
[1].Zhongxia Pan, Gang Wu, Shu Fang, Dengsheng Lin, Practical Soft-SIC Detection for MIMO SC-FDMA System with Co-Channel Interference, 978-1-4244-7555-1 ©2010 IEEE.
[2].Harsha S. Eshwaraiah and A. Chockalingam, SC-FDMA for Multiuser Communication on the Downlink, 978-1-4673-5494-3, 2013 IEEE.
[3].Alcardo Alex Barakabitze, Tan Xiaoheng, “Performance Analysis of PAPR Reduction Using DFT-Spreading OFDMA Technique”,International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 3, March 2015.
[4].Girish Kumar N G, Draveena R Mote, Manjushree S, Srilakshmi S, Shibani D, Efficient Interleaver Design for MIMO-OFDM based Communication System on FPGA, IJECT Vol. 7, Issue 2, April - June 2016.
[5].Talha Faizur Rahman, Claudio Sacchi, A Low-complexity Linear Receiver for Multi-User MIMO SC-FDMA Systems, 978-1-4799-5380-6/15, 2016 IEEE.
[6].Jeoong Sung Park and Tokunbo Ogunfunmi, FPGA implementation of the MIMO-OFDM Physical Layer using single FFT multiplexing, 978-1-4244-5309-2/10 ©2010 IEEE.
[7].Noura Ali, M.Ibraheem, I.Fathi, A Proposed Method to Reduce the BER in Wavelet based OFDM, International Journal of Computer Applications (0975 – 8887) Volume 140 – No.2, April 2016.
[8].Jiayi Zhang, Lie-Liang Yang and Lajos Hanzo, Energy-Efficient Channel-Dependent Cooperative Relaying for the Multiuser SC-FDMA Uplink, IEEE Transactions On Vehicular Technology, Vol. 60, No. 3, March 2011.
[9].Lei You, Lei Lei and Di Yuan, A Performance Study of Energy Minimization for Interleaved and Localized FDMA, arXiv: 1602.08469v2 [CS.IT] 21 Jun 2017.
[10].XU Quan-Sheng ,LI Xi, JI Hong, YAO Li-Ping, Resource allocation algorithm in LTE uplink SC-FDMA system for time-varying channel with imperfect channel state information, April 2013, 20(2): 7–11.
Citation
Javalkar Dinesh Kumar, Alok agarwal, S.V.A.V. Prasad, "Analysing the Bit-error Probability of a receiver in Multi-User MIMO SC-FDMA systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.438-443, 2018.
Flood Alert System Using IoT
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.444-447, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.444447
Abstract
Majority of Dams are physically observed and are sending information with ordinary modes. Dam professionals need dam parameters information for their examination. In need, citizens are unconscious about dam parameters such as dam water level and entryway status. Due to the entangled and tedious process in a manual framework, a model for Remote Monitoring and Controlling of Dams is recommended that utilizations remote control innovation, connected to the web innovation, to accomplish extraordinary achievement in observing and controlling water levels in overseeing dams. To take care of these issues we are proposing framework which incorporates GUI programming at dam site. This innovation is utilized as a part of the water control and administration frameworks, where numerous specialists utilize manual frameworks for water control and administration. The purpose of our project is to monitor the level and flow of a dam using IoT in which the real time things are interconnected to the web employing Raspberry-pi.
Key-Words / Index Term
Remote monitoring, GUI, IoT
References
[1] M. M. Morsy et al., “A cloud-based flood warning system for forecasting impacts to transportation infrastructure systems,” Environ. Model. Softw., vol. 107, no. July 2017, pp. 231–244, 2018.
[2] G. A. Amagsila and M. E. Cabuhat, “A Framework for Mobile Application of Flood Alert Monitoring System for Vehicle Users using Arduino Device,” pp. 1–6, 2017.
[3] D. De Souza, I. F. Cardoso, and M. R. Momo, “Tool-Based Mobile Application Applied to the Monitoring System and Flood Alert,” Proc. - 2015 9th Int. Conf. Complex, Intelligent, Softw. Intensive Syst. CISIS 2015, pp. 348–351, 2015.
[4] M. N. Napiah, M. Y. I. Idris, I. Ahmedy, and M. Asri Ngadi, “Flood alerts system with android application,” 6th ICT Int. Student Proj. Conf. Elev. Community Through ICT, ICT-ISPC 2017, vol. 2017–Janua, pp. 1–4, 2017.
[5] L. Alfieri et al., “A global network for operational flood risk reduction,” Environ. Sci. Policy, vol. 84, no. December 2017, pp. 149–158, 2018.
[6] S. Jayashree, S. Sarika, A. L. Solai, and S. Prathibha, “A novel approach for early flood warning using android and IoT,” Proc. 2017 2nd Int. Conf. Comput. Commun. Technol. ICCCT 2017, pp. 339–343, 2017.
[7] G. Merkuryeva, Y. Merkuryev, B. V. Sokolov, S. Potryasaev, V. A. Zelentsov, and A. Lektauers, “Advanced river flood monitoring, modelling and forecasting,” J. Comput. Sci., vol. 10, pp. 77–85, 2015.
[8] S. Kouadio and J. Douvinet, “A smartphone application to help alert in case of flash floods,” Proc. 2015 2nd Int. Conf. Inf. Commun. Technol. Disaster Manag. ICT-DM 2015, pp. 252–257, 2016.
[9] T. M. Thekkil and N. Prabakaran, “Real-time WSN based early flood detection and control monitoring system,” 2017 Int. Conf. Intell. Comput. Instrum. Control Technol. ICICICT 2017, vol. 2018–Janua, pp. 1709–1713, 2018.
[10] W. A. H. W. M. Asmara and N. H. A. Aziz, “SMS flood alert system,” Proc. - 2011 IEEE Control Syst. Grad. Res. Colloquium, ICSGRC 2011, pp. 18–22, 2011.
[11] A. Fateen et al., “Pre-Flood Warning System Based on User Mobility,” vol. 10, no. 23, pp. 132–137, 2015.
[12] R. Rq, Q. Lq, J. Dqg, H. Ri, and H. Ri, “Wireless Sensor Network for early Flood Monitoring and Warning system,” pp. 5–9.
[13] P. M. K, “Detection and Mobile App for Flood Alert,” no. Iccmc, 2017.
[14] M. Ancona et al., “On the design of an intelligent sensor network for flash flood monitoring, diagnosis and management in urban areas position paper,” Procedia Comput. Sci., vol. 32, pp. 941–946, 2014.
[15] A. Silva Souza, A. M. De Lima Curvello, F. L. D. S. De Souza, and H. J. Da Silva, “A flood warning system to critical region,” Procedia Comput. Sci., vol. 109, no. 2016, pp. 1104–1109, 2017.
[16] Idhate, S., Bilapatre, A. Rathod, A. & Kalbande, H(2017).. "Dam Monitoring System Using Wireless Sensor Networks." Volume: 04 Issue: 04, pp 1767-1769
[17] Dhandre, N.M., Kamalasekaran, P.D. and Pandey, P., 2016, November. Dam parameters monitoring system. In Power Electronics (IICPE), 2016 7th India International Conference on (pp. 1-5). IEEE.
[18] Dhandre, N. Jadhav, M. (2015). "Dam Data Collection and Monitoring System." International Journal of Science and Research (IJSR) 5(6).
[19] Sorte, R., Sonwane, R., Thakur, N., Akhade, S., Kawale, S., Dusawar, R. & Lalwani, K. (2015). "PLC based Dam Automation System." International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 2 - Issue 3.
[20] Ten millionth Raspberry Pi, and a new kit – Raspberry Pi". 8 September 2016. Retrieved 9 September 2016.
[21] Getting Started with Raspberry Pi; Matt Richardson and Shawn Wallace; 2013.
Citation
S. Vandana, D. Deepak Raj, B. Rushika, V. Mano Venkatesh, "Flood Alert System Using IoT," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.444-447, 2018.
A Nobel Approach of Hybrid Routing Protocol In Mobile Ad-hoc Network
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.448-451, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.448451
Abstract
The goal of MANET is formation of a self-organized and self- configurable network of mobile nodes with wireless connectivity, where the nodes move arbitrarily. Routing is a critical issue in Mobile Adhoc Network. Therefore, Routing protocols for this network have to face the challenge of frequently changing topology. Both proactive and reactive routing protocols prove to be inefficient under these circumstances. Third category, Hybrid routing protocols combines the advantage of Proactive as well as the reactive protocols. This research work is equipped with some goals of analyzing the behaviour of existing MAC protocol over the hybrid type of routing for ad hoc networks, analyzing the impact of delay while receiving the data over the zone based communication (inside/outside of the zones), developing a solution by enhancing the existing MAC protocol and also analyzing the behaviour of the zone routing protocol with proposed algorithm. Hence in this research work calculation of the performance routing protocol using different parameters such as receiving time, bandwidth, packet loss etc obtained.
Key-Words / Index Term
Ad-hoc, Bandwidth, Centralized, MANET, Network, Packet-loss, Performance, Proactive, Reactive, Receiveing-Time,etc.
References
[1] Yuri M. Monakhov ; Mikhail Yu. Monakhov ; Andrey V. Telny, Simulation of routing in an ad-hoc network in conditions of limited availability, 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics), 2017
[2] M. Matis, L. Dobos, J. Papaj, "An Enhanced Hybrid Social Based Routing Algorithm for MANET-DTN", Mobile Information Systems, vol. 2016, 2016
[3] Debaditya Choudhury ; Debanjana Kar ; Katha Roy Biswas ; Himadri Nath Saha, Energy efficient routing in mobile ad-hoc networks, 2015 International Conference and Workshop on Computing and Communication (IEMCON), 2015
[4] Vikash ; R K Singh, Hybrid routing protocol for mobile-ad hoc network in rural environments, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
[5] Beijar Nicklas, "Zone Routing Protocol",FIN, 2015
[6] Ze Li, Haiying Shen, “A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks”, IEEE Transactions on mobile computing, Vol. 13,(3),IEEE-2014
[7] Pinyi Ren, Xi`an Jiaotong, Xi`an, China ; Yichen Wang ; Qinghe Du, "CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks", IEEE Journal Vol.32 (2) , FEBRUARY 2014
[8] Nguyen Mui Van , Hee Kyung., Yongin, Seon Hong Choong, "Interference-dependent contention control in multi-hop wireless ad-hoc networks: An optimal cognitive MAC protocol", ICC, IEEE-2013
[9] Farooq, M.O, Kunz, T, "BEAR: Bandwidth estimation-based admission control and routing for IEEE 802.15.4-based networks", WMNC-IEEE, 2013
[10] Jackson, C.A., Clemson, SC. Russell, H.B. Wolf, B.J, Martin J, "Investigation of MAC for a Hierarchical and Heterogeneous Multichannel Ad Hoc Network", MILCOM 2013
[11] Avni Khatkar ; Yudhvir Singh, Performance Evaluation of Hybrid Routing Protocols in Mobile Ad Hoc Networks, 2012 Second International Conference on Advanced Computing & Communication Technologies, 2012
[12] M.J. Booysen, S. Zeadally, G.-J. van Rooyen, “Survey of media access control protocols for vehicular ad hoc networks”, IET Commun., 2011
[13] Yuki Sato, Akio Koyama, Leonard Barolli “A Zone Based Routing Protocol for Ad Hoc Networks and Its Performance Improvement by Reduction of Control Packets”, International Conference on Broadband, Wireless Computing, Communication and Applications, IEEE - 2010
[14] A. Rahman, F. Anwar, "A Simulation Based Performance Comparison of Routing Protocols on Mobile Ad-hoc Network", International Conference on Computer and Communication Engineering (ICCCE 2010), 11-13 May 2010
[15] Jian Liu, Fang-min Li, "An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks", Information Assurance and Security 2009. IAS ‘09. Fifth International Conference, 2009
[16] Yogesh Chaba, Yudhvir Singh, Manish, "Performance Evaluation and Analysis of Cluster Based Routing Protocols in MANETs" Proc. IEEE/ACEEE ACT 2009, India [Online : IEEE Xplore Digital Library, Digital Object Identifier: 10.1109/ACT.2009.26], pp. 64-66, Available: http://ieeexplore.ieee.org/ , 2009
[17] R. Mkhija and R.Saluja, "Performance Comparison of Ad-Hoc Routing Protocol in Different Network Size", Proc. of 2nd National Conf. Mathematical Techniques: Emerging Paradigms in Electronics and IT Industries, 2008
[18] D. Johnson, Y. Hu, D. Maltz, The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4, 2007
[19] A. Boukerche, "Algorithms and protocols for wireless mobile Ad Hoc networks", John Wiley & Sons, vol. 77, 2008
[20] architecture for MANETs supporting real-time peer-to-peer multimedia applications", Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM’05), 2005
[21] S. Jiangy, D. Hez, J. Raoz, "A Prediction-based Link Availability Estimation for Mobile Ad Hoc Networks", IEEE INFOCOM, 2001
[22] Cano Juan-Carlos, Manzoni Pietro, Universidad Politcnica de Valencia, "A Performance Comparison of Energy Consumption for Mobile Ad Hoc Network Routing Protocols", IEEE-2000
Citation
A. Bano, R. K. Yadav, V. Namdeo, "A Nobel Approach of Hybrid Routing Protocol In Mobile Ad-hoc Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.448-451, 2018.
Design and Analysis of Microstrip Patch Antenna Using Different Feeding Techniques
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.452-456, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.452456
Abstract
In this paper a microstrip patch antenna is designed using the different feeding techniques. Selection of feeding technique is very crucial point for an antenna design. If proper technique is not used for feeding the antenna, more power will be reflected back and reduce the power available for radiations and also affect the performance parameters like gain, return, loss and directivity of antenna. For the current paper the microstrip antenna is designed using the microstrip and coaxial feeding line. The results for both the designs are compared and analyzed. The return loss and bandwidth of probe feed antenna is -40.8 dB and 112 MHz which is higher than that transmission line feed antenna which is -27 dB and 88 MHz respectively. The gain is 7 dB and 5.74 dB for probe feed and transmission line feeding antenna respectively. The return loss, gain and bandwidth of antenna with probe feed are higher than that of transmission line feeding. But for a planar structure, probe feed is technique lose the planar characteristics of antenna.
Key-Words / Index Term
Feeding techniques, Microstrip line patch antenna. Return loss, Gain of antenna.
References
[1]. I.J. Bahl and P, Bhartia, Micrestrip Antennas, Artech House, Dedham, MA, 1980.
[2]. K. R. Carver and J. W. Mink, "Microstrip Antenna Technology," IEEE Trans. Antennas Propagat., Vol. AP-29, No. I, pp. 2-24, January 1981.
[3]. P.B. Katehi and N. G. Alexopoulos, "On the Modeling of Electromagnetically Coupled Microstip Antennas-The Printed Strip Dipole," IEEE Trans. Antennas Propagat, Vol. AP-32,No.11,pp.1179-1186, November 1984
[4]. J.R. James and P. S. Hall, Handbook of Microstrip Antennas, Vols. I and 2, Peter Peregrinus, London, UK, 1989.
[5]. D. M. Pozar, "Microstrip Antennas." Prc. IEEE, Vol. 80, No. 1, pp. 79-81, January 1992.
[6]. C.A. Balanis, “Modern Antenna Handbook 3rd edition.” A John Wiley and Sons, Inc., Publications, 2005.
[7]. H. A. Bethe, "Theory of Diffractions by Small Holes," Physical Review, Vol. 66. pp. 163-182. 1944.
[8]. H.G. Oltman and D. A. Huebner, "Electromagnetically Coupled Microstrip Dipoles," IEEE Trans. Antennas Propagation. Vol. AP-29, No. I, pp. 151-157, January 1981.
[9]. D. M. Pozar, "A Microstrip Antenna Aperture Coupled to a Microstrip Line," Electronic. Letters, Vol. 21, pp. 49-50, January 1985.
[10]. G. Gronau and I. Wolf, "Aperture-Coupling of a Rectangular Microstrip Resonator," Electronic Letters, Vol. 22, pp. 554-556, May 1986.
[11]. S.Sankaralingam and B.Gupta, “Develop-ment of Textile Antennas for Body Wearable Applications and Investigation of Their Performance under Bent Conditions,” PIER B, Vol. 22, 53-71, 2010.
[12]. U. Ali, S. Ullah, J. Khan et al., “Design and SAR analysis of wearable antenna on various parts of human body, using conventional and artificial ground planes,” Journal of Electrical Engineering and Technology, vol. 12, no. 1, pp. 317–328, 2017.
Citation
Jaget Singh, B.S Sohi, "Design and Analysis of Microstrip Patch Antenna Using Different Feeding Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.452-456, 2018.
Efficient Caching of Data Using Fast Wireless Data Access Scheme
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.457-463, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.457463
Abstract
In Wireless Data Access Applications where objects are frequently updated and fast access to objects is required and it is essential to reduce both access latency and the wireless traffic. So in this project we propose FW-DAS (Fast Wireless Data Access Scheme). This extends Poll-Every-Read and Call Back Scheme in Combination. Fast Wireless Data access Scheme (FWDAS) is used to improve performance by caching the data at user level and server level. Caching of data is done based on data popularity. In FWDAS three data models are defined and used based on data popularity of the data object. FWDAS uses different operations on the data based on data popularity of the data object. Only popular object are proactively pushed to the servers thus reducing the access latency while mitigating the traffic load over the network.
Key-Words / Index Term
Cloud Computing, Caching, Cache Replacement
References
[1] M. Miller, “Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online”, Que, 2008.
[2] Y. Lin, W. Lai, and J. Chen, “Effects of Cache Mechanism on Wireless Data Access,” IEEE Transactions on Wireless Communications, Vol. 2, No. 6, pp. 1247-1258, November 2003.
[3] B. Hayes, “Cloud Computing,” ACM Journal, Vol. 51, No.07, pp.9-11,July 2008.
[4] Debabrata Dash. Carnegie Mellon University, Verena Kantere and Anastasia Ailamaki “An Economic Model for Self-tuned Cloud Caching”, IEEE International Conference on Data Engineering, pp. 1687 - 1693, 2009.
[5] Melazzi, N.B.; Bianchi, G.; Caponi, A. and Detti, A. “A General, Tractable and Accurate Model for a Cascade of LRU Caches” IEEE Communications Letters, Vol. 18, No. 5, pp. 877 - 880, 2014.
[6] Yi-Bing Lin, Wei-Ru Lai and Jen-Jee Chen “Effects of Cache Mechanism on Wireless Data access “,IEEE Transactions in Wireless Communications, Vol. 02, No. 6, pp. 1247 – 1258, 2003.
[7] B. N. Bharath,, K. G. Nagananda and H. Vincent Poor “A Learning- Based Approach to Caching in Heterogeneous Small Cell Networks”, IEEE Transactions, Vol. 05, No. 05, pp. 257-268, 2000.
[8] Mursalin Akon, Mohammad Towhidul Islam, Xuemin (Sherman) Shen and Ajit Singh “A Bandwidth and Effective Hit Optimal Cache Scheme for Wireless Data Access Networks with Client Injected Updates”, Computer Networks, Vol. 56, No.07, pp. 2080–2095, 2012.
[9] H. Che, Y. Tung, and Z. Wang, “Hierarchical Web Caching Systems: Modeling, Design and Experimental Results,” IEEE Journal on Selected Areas in Communications, Vol. 20, No. 7, pp. 1305-1314, September 2002.
[10] Sangheon Pack, Humphrey Rutagemwa,Xuemin Shen,Jon W Mark and Kunwoo,"Proxy-Based Wireless Data Access Algorithms in Mobile Hotspots", IEEE Transactions on Vehicular Technology, Vol. 57, No. 05, pp. 3165--3177, 2008.
[11] Giwon Lee, Insun Jang, Sangheon Pack and Xuemin Shen, “FW- DAS:Fast Wireless Data Access Scheme in Mobile Networks”, IEEE Transactions on Wireless Communications, Vol. 13, No. 08, pp. 4260- 4272, 2014.
Citation
Buddesab, Santhosh S Kashyap, Channabasappa Hugge, "Efficient Caching of Data Using Fast Wireless Data Access Scheme," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.457-463, 2018.