An Analysis of the Internet of Things Security From Data Perception
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.427-433, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.427433
Abstract
As the usage of the Internet of Things (IoT) is increasing, the challenges of providing security for IoT are becoming severe. Every IoT device generates and shares the data, which plays a key role in IoT applications. To understand the IoT security, one should observe many approaches like data, communications, and applications. Among these, a view from the data side may be of much help. This paper analyses various issues in IoT security from the data approach. Authors propose a Three Perspective Model consists of Exclusive, Inclusive and End-Users Perspectives to provide IoT Security by integrating IoT architecture and Data Transmission. The Exclusive Perspective focuses on individual IoT devices, the Inclusive Perspective focus on collective IoT devices and the end-users perspective focus on IoT applications. The three perspectives focus on the secure transmission of data, authentication, privacy and the challenges against IoT applications. This paper analyses the data perspective of IoT security discusses the challenges and suggests some possible solutions for IoT security.
Key-Words / Index Term
Internet of Things, Safety, Security, Privacy
References
[1] Trustwave and Singtel, “Internet of Things Cybersecurity Readiness,” 2017.
[2] J. Guo, I. Chen, and J. J. P. Tsai, “A Survey of Trust Computation Models for Service,” Comput. Commun., 2016.
[3] J. Zhou, Z. Cao, X. Dong, and A. V Vasilakos, “Security and Privacy for Cloud-Based IoT : Challenges , Countermeasures , and Future Directions,” no. January, pp. 26–33, 2017.
[4] J. Lopez, R. Rios, F. Bao, and G. Wang, “Evolving privacy : From sensors to the Internet of Things,” Futur. Gener. Comput. Syst., vol. 75, pp. 46–57, 2017.
[5] M. Wolf and D. Serpanos, “Safety and Security of Cyber-Physical and Internet of Things Systems [Point of View],” Proceedings of the IEEE, vol. 105, no. 6. pp. 983–984, 2017.
[6] B. Mukherjee et al., “Flexible IoT security middleware for end-to-end cloud–fog communication,” Futur. Gener. Comput. Syst., vol. 87, pp. 688–703, 2018.
[7] F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of Things security: A survey,” Journal of Network and Computer Applications, vol. 88. pp. 10–28, 2017.
[8] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-porisini, “Security , privacy and trust in Internet of Things : The road ahead,” Comput. NETWORKS, vol. 76, pp. 146–164, 2015.
[9] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, 2017.
[10] S. Siboni, V. Sachidananda, Y. Meidan, M. Bohadana, Y. Mathov, and S. Bhairav, “Security Testbed for Internet-of-Things Devices,” IEEE Trans. Reliab., vol. PP, pp. 1–22, 2018.
[11] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things,” IEEE Internet Things J., vol. 4, no. 5, pp. 1250–1258, 2017.
[12] I. Internet, T. Policy, and C. White, “INDEX TO VOLUME THE FOURTH.,” Lancet, vol. 2, no. 53, p. nil, 1824.
[13] S. R. Moosavi, T. N. Gia, A. Rahmani, and S. Virtanen, “SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways,” Procedia - Procedia Comput. Sci., vol. 52, no. Ant, pp. 452–459, 2015.
[14] T. H. Szymanski, “Security and Privacy for a Green Internet of Things,” IT Prof., vol. 19, no. 5, pp. 34–41, 2017.
[15] B. Thaker, N. Shah, and P. Bhatt, “A Survey on Developing Secure IoT Products,” Int. J. Sci. Res. Comput. Sci. Eng., vol. 6, no. 5, pp. 41–44, 2019.
[16] Gurpreet Kaur and Manreet Sohal, “IOT Survey: The Phase Changer in Healthcare Industry,” Int. J. Sci. Res. Netw. Secur. Commun., vol. 6, no. 2, pp. 34–39, 2018.
[17] C. H. Lim and T. Korkishko, “mCrypton – A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors,” 2006, pp. 243–258.
[18] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: Mirai and other botnets,” Computer (Long. Beach. Calif)., vol. 50, no. 7, pp. 80–84, 2017.
[19] B. L. J. Lee, “Blockchain-based secure firmware update for embedded devices in an Internet of Things environment,” J. Supercomput., 2016.
[20] P. Ruckebusch, E. De Poorter, C. Fortuna, and I. Moerman, “GITAR: Generic extension for Internet-of-Things ARchitectures enabling dynamic updates of network and application modules,” Ad Hoc Networks, vol. 36, pp. 127–151, 2016.
[21] B. J. Mohd, T. Hayajneh, and A. V Vasilakos, “Journal of Network and Computer Applications A survey on lightweight block ciphers for low-resource devices : Comparative study and open issues,” J. Netw. Comput. Appl., vol. 58, pp. 73–93, 2015.
[22] G. Hatzivasilis, K. Fysarakis, I. Papaefstathiou, and C. Manifavas, “A review of lightweight block ciphers,” J. Cryptogr. Eng., 2017.
[23] A. Perrig and C. M. U. Cylab, “SWATT : SoftWare-based ATTestation for Embedded Devices £,” 2004.
[24] A. Seshadri, M. Luk, A. Perrig, L. Van Doorn, and P. Khosla, “SCUBA: Secure Code Update By Attestation in sensor networks,” in Proceedings of the 5th ACM workshop on Wireless security, 2006, vol. 2006, pp. 85–94.
[25] K. Eldefrawy et al., “SMART: Secure and Minimal Architecture for (Establishing a Dynamic Root of Trust,” in NDSS, 2012, vol. 12, pp. 1–15.
[26] F. Brasser, B. El Mahjoub, A. Sadeghi, C. Wachsmann, and P. Koeberl, “TyTAN,” in Proceedings of the 52nd Annual Design Automation Conference on - DAC ’15, 2015, pp. 1–6.
[27] N. Asokan, F. Brasser, A. Ibrahim, … A. S.-P. of the, and U. 2015, “Seda: Scalable embedded device attestation,” dl.acm.org, pp. 964–975, 2015.
[28] M. Ambrosin, M. Conti, A. Ibrahim, G. Neven, A. Sadeghi, and M. Schunter, “SANA,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS’16, 2016, pp. 731–742.
[29] A. Alcaide, E. Palomar, J. Montero-Castillo, and A. Ribagorda, “Anonymous authentication for privacy-preserving IoT target-driven applications,” Comput. Secur., vol. 7, 2013.
[30] C. Su, B. Santoso, Y. Li, R. H. Deng, and X. Huang, “Universally Composable RFID Mutual Authentication,” IEEE Trans. Dependable Secur. Comput., vol. 14, no. 1, pp. 83–94, 2017.
[31] Y. Gao et al., “Obfuscated Challenge-Response : A Secure Lightweight Authentication Mechanism for PUF-Based Pervasive Devices,” 2016.
[32] D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” J. Netw. Comput. Appl., vol. 66, pp. 198–213, 2016.
[33] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things ( IoT ): A vision , architectural elements , and future directions,” Futur. Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
[34] C. H. Tseng, S. H. Wang, C. Ko, and K. Levitt, “DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET,” Lecture Notes in Computer Science including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, vol. 4219 LNCS. pp. 249–271, 2006.
[35] D. Airehrour and J. Gutierrez, “An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing,” in CONF-IRM 2015 Proceedings, 2015, vol. 17, no. May.
[36] N. Ye, Y. Zhu, R. Wang, R. Malekian, and L. Qiao-min, “An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things,” vol. 1624, no. 4, pp. 1617–1624, 2014.
[37] Z. Guoping and G. Wentao, “The research of access control based on UCON in the internet of things,” J. Softw., vol. 6, no. 4, pp. 724–731, 2011.
[38] R. H. Weber, “Internet of things : Privacy issues revisited,” Comput. Law Secur. Rev. Int. J. Technol. Law Pract., vol. 31, no. 5, pp. 618–627, 2015.
[39] R. Mendes and J. P. Vilela, “Privacy-Preserving Data Mining: Methods, Metrics, and Applications,” IEEE Access, vol. 5, pp. 10562–10582, 2017.
[40] E. Fernandes, A. Rahmati, J. Jung, and A. Prakash, “Security Implications of Permission Models in Smart-Home Application Frameworks,” in IEEE Security and Privacy, 2017, vol. 15, no. 2, pp. 24–30.
[41] K. Seol, Y. G. Kim, E. Lee, Y. D. Seo, and D. K. Baik, “Privacy-preserving attribute-based access control model for XML-based electronic health record system,” IEEE Access, vol. 6, no. XML, pp. 9114–9128, 2018.
[42] V. R. Kebande and I. Ray, “A generic digital forensic investigation framework for Internet of Things (IoT),” in Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, 2016, pp. 356–362.
[43] S. Zawoad and R. Hasan, “FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things,” in Proceedings - 2015 IEEE International Conference on Services Computing, SCC 2015, 2015, pp. 279–284.
[44] A. Nieto, R. Rios, and J. Lopez, “Iot-forensics meets privacy: Towards cooperative digital investigations,” Sensors (Switzerland), vol. 18, no. 2, 2018.
[45] National Transport Commission, “Changing driving laws to support automated vehicles,” 2018.
Citation
Raviteja Gaddam, M. Nandhini, "An Analysis of the Internet of Things Security From Data Perception," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.427-433, 2019.
A Location specific and Trends based Video Streaming Platform with integrated Web Speech API through Angular 6
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.434-438, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.434438
Abstract
Online video search and play is an aspect of that is used for innumerable purposes which comprise infotainment, video-logs, advertisement, endorsement, etc. It is one of the most resource intensive processes. Using up-to-date technologies to create an application to improve both user experience and application performance is important so as to adapt with the changes like hardware capability, bandwidth speeds and software platforms. To attract users from conventionally used platforms to newer ones we utilize the latest Angular v6 framework for creating a cross platform single page application (load once and refresh dynamically mechanism) which can be developed on a component and service driven model using any popular programming language along with the features like voice enabled search through integration of open source web speech API for real time voice recognition and content filtering based on trend, geographic location and other statistics. To create such application the primary need is to avail it with vast amount of organised data that can be easily accessed; a suitable data API like YouTube API can seamlessly be used with the application. This web application is highly responsive with support for mobile devices like tablets and smartphones. It can be easily morphed as the technologies advances, newer versions Angular provides facility to extend older versions with features introduced with them. The proposed application has the potential to be extended by adding other APIs to suit user’s need and expand our application’s database by adding more than one source for videos through integration of multiple data API.
Key-Words / Index Term
Angular v6, Single page application, video player, web speech API, voice recognition, location based search, YouTube API
References
[1] Mr Juned A. Khan, Prof. V.S. Gulhane, ”Improving Features of Media Player”, International Journal of Computational Engineering Research, Vol 03, Issue 4, April 2013.
[2] Ms Sneha Ambulkar, Asst.Prof. Pushpanjali M.Chaouragade, “AngularJS”, International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016.
[3] M. Kaluza, K. Troskot, B. Vukelic, “Comparison of Front-End Frameworks for Web Applications”, Journal of the Polytechnic of Rijeka, Vol. 6 (2018), No. 1, pp. 261-282.
[4] Shang-Pin Ma, Wen-Tin Lee and Chia-Hsu Kuo, “Location Explorer with Information Services: A Mobile Application to Deliver Location-Based Web Services”, IEEE 2nd International Symposium on Next-Generation Electronics (ISNE), February 25-26, 2013, Kaohsiung, Taiwan.
[5] Mr Dilip Kumar, Mr Abhishek Sachan, “Bridging the Gap between Disabled People and New Technology in Interactive Web Application with the Help of Voice”, IEEE International Conference on Advances in Engineering & Technology Research (ICAETR - 2014).
[6] Mr Patrick Nguyen, “TechWare: Speech Recognition Software and Resources on the Web”, IEEE Signal Processing Magazine [pg 102] May 2009.
[7] Mr Abdur Rahman.A, Mrs Chitra Devi.S, “A Framework For Ultra-responsive Light Weight Web Application Using Angularjs”, 2015 Online International Conference on Green Engineering and Technologies (IC-GET 2015).
[8] Miguel Ramos, Marco Tulio Valente, Ricardo Terra,” AngularJS Performance: A Survey Study”, Published by the IEEE Computer Society, March/April 2018.
[9] Farag Sallabi, George Ditsa, Hazem El-Khatib, Shayma Al Kobaisi,”On-demand Dynamic Location-based Services Using Web Services”, 2010 Fifth International Conference on Internet and Web Applications and Services.
[10] Klaus Schoeffmann, Claudiu Cobarzan, “An Evaluation Of Interactive Search With Modern Video Players”, 2013 IEEE International Conference on Multimedia Expo Workshops (ICMEW 15-19 July).
[11] Mr. Neli Blagus and Mr. Slavko Zitniky, “Social media comparison and analysis: The best data source for research”, 12th Conference on Research Challenges in Information Sciences 2018.
Citation
Amol K. Kadam, T.B. Patil, Yash Kesharwani, Harsh Garg, Akash Gupta, "A Location specific and Trends based Video Streaming Platform with integrated Web Speech API through Angular 6," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.434-438, 2019.
SSL Based Cryptography Data Management in Private Cloud Computing
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.439-442, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.439442
Abstract
As a personal or business cloud computing user can processing their accumulated information on the `cloud`, via an Internet connection. The main attitude following this form is for providing, processing, storing “as a service.” Technologies such as cluster have all aimed at providing permission to accessing huge amount of information on entirely implicit way by combine the resources and recommending distinct sight of the structure. Network security is goings-on which were modelled for preventing our data while used on the network. It was included on both the technologies of hardware as well as software. Network security technology achieved variety of its targets such as coercions and prevents them from stabbing or extending on the network in this paper SSL handled the data in private cloud computing.
Key-Words / Index Term
SSL, Cryptography, Privatecloud computing
References
[1]. O. Freier P. Karlton and P. C. Kocher. The SSL Protocol,Version 3.0. NetscapeCommunications, 1996, http://wp.netscape.com/eng/ssl3/draft302.txt (2003).
[2]. National Institute of Standards and Technologies. DataEncryption Standard. U.S.Dpt. of Commerce, December 1993.
[3]. ANSI. American National Standard for Financial InstitutionKey Management (wholesale). ANSI, 1985
[4]. R. Rivest. A Description of the RC2(r) EncryptionAlgorithm, RFC 2268. Network
[5]. Working Group, 1998, ftp://ftp.rfc-editor.org/innotes/rfc2268.txt (2003).
[6]. Schneier. Applied Cryptography, 2ed. John Wiley andSons, 1996.
[7]. R. Rivest. TheMD-5 Message-Digest Algorithm, RFC1321. John Wiley andSons,1996, ftp://ftp.rfc-editor.org/innotes/rfc1321.txt (2003)
[8]. Chetan M Bulla , Satish S Bhojannavar and Vishal M Danawade, “Cloud Computing: Research Activities and Challenges”, International Journal of Emerging Trends & Technology in Computer Science, Vol 2, No. 5, 2013, pp.206-214
[9]. Palvinder Singh, Er. Anurag Jain, “Survey Paper on Cloud Computing”, International Journal of Innovations in Engineering and Technology, Vol 3 No. 4, 2014, pp.84-89
[10]. .D2RQ. http://sites.wiwiss.fu-berlin.de/suhl/bizer/D2RQ/
[11]. Virtuoso.http://virtuoso.openlinksw.com/wiki/main/Main/VOSSQL
[12]. P. Mell and T. Grance, The NIST definition of cloud computing
[13]. S. Jha et al., Programming Abstractions for Large-scale Distributed Applications, submitted to ACM Computing Surveys;draftathttp://www.cct.lsu.edu/Bsjha/publications/dpa_surveypaper.pdf.
[14]. Semantic web technologies in SSLbased cryptography data management D.Meenakshi,T.Malathi,V.Karthika Devi ijesird , Vol. II Issue IX March 2016/596-599
Citation
D. Meenakshi, V. Karthika Devi, "SSL Based Cryptography Data Management in Private Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.439-442, 2019.
Stock Market Prediction Using Text Mining Approaches: A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.443-450, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.443450
Abstract
Stock market prediction is an attractive research problem to be investigated in the field of computational finance. News contents are one of the most important factors that have influence on market. Considering the news impact in analyzing the stock market behaviour, leads to more precise predictions and as a result more profitable trades. Text mining , or the pragmatic research perspective of computational linguistics, has become increasingly powerful due to data availability and various techniques developed in the past decade. However, no detailed comparison of the systems and their performances is available thus far. This paper tries to describe the main systems developed and presents a survey work for comparing the approaches.
Key-Words / Index Term
Text mining, Natural language processing (NLP), sentimental analysis, stock market prediction
References
[1]. Aditya Bhardwaja,Yogendra Narayanb, Vanrajc, Pawana, Maitreyee Dutta, Sentiment Analysis for Indian Stock Market prediction using Sensex and Nifty, Procedia Computer Science 70 ( 2015) pp 85-91 ,2015.
[2]. Felix Ming Fai Wong, Zhenming Liu, Mung Chiang , Stock Market Prediction from WSJ: Princeton University.
[3]. Heeyoung Lee, Mihai Surdeanu Bill MacCartney, Dan Jurafsky ,On the Importance of Text Analysis for Stock Price Prediction, http://www.sec.gov/edgar.shtml. pp 1-4,2008.
[4]. Jageshwer Shriwas1 , Shagufta Farzana ,Using Text Mining and Rule Based Technique for Prediction of Stock Market Price, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459,pp 245-250,2014.
[5]. Robert P. Schumaker and Hsinchun Chen . Textual Analysis of Stock Market Prediction Using Breaking: Artificial Intelligence Lab, The University of Arizona, Arizona 85721, USA, pp 1-29,2007.
[6]. Vaishali Ingle; Sachin Deshmukh , Predictive mining for stock market based on live news TF-IDF features, International Journal of Autonomic Computing, Vol.2 No.4, 10.1504/IJAC.2017.089703,pp 341-345,2017.
[7]. Yancong Xie1, 2, Hongxun Jiang , Stock Market Forecasting Based on Text Mining Technology:A-Support Vector Machine Method. Journal of Computers,doi:10.17706 /jcp.12.6.500-510,2016.
[8]. Arti Buchek , Dr. M. B. Chandak (2016) Stock Market Prediction using Text Opinion Mining: A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128x,pp 566-569,2016.
[9]. Azadeh Nikfarjam ; Ehsan Emadzadeh ; Saravanan Muthaiyah .Text mining approaches for stock market prediction,IEEE Xpolre, DOI: 10.1109/ICCAE.2010.5451705,2010.
[10]. Cambria E, Livingstone A, Hussain A ,The hourglass of emotions. In: Lecture notes in computer science, vol 7403. Springer, pp 144–157,2012.
[11]. Chan SW,Chong MW, Sentiment Analysis for stock market prediction, Journal of Computers ,pp197-119,2017.
[12]. Chan SW, Chong MW , Sentiment analysis in financial texts. Decis Support Syst. 94:53–64,2017.
[13]. Chanwit Onsumran, Sotarat Thammaboosadee, and Supaporn Kiattisin , Gold Price Volatility Prediction by Text Mining in Economic Indicators News. Journal of Advances in Information Technology Vol. 6, No. 4,243-47,2015.
[14]. Enric Junqué de Fortuny , Tom De Smedt , David Martens , Walter Daelemans Evaluating and understanding text-based stock price prediction models, Information Processing & Management ,Volume 50, Issue 2, pp 426-441,2014.
[15]. Enric Junqué de Fortuny a,⇑, Tom De Smedt b, David Martens a, Walter Daelemans, Evaluating and understanding text-based stock price prediction models, http://dx.doi.org/10.1016/j.ipm.2013.12.002: pp( 1- 13),2013
[16]. Feldman R , Techniques and applications for sentiment analysis. Common ACM 56(4):82–89,2013.
[17]. Frank Z. Xing1 • Erik Cambria,Roy E. Welsch , Natural language based financial forecasting: asurvey, https://doi.org/10.1007/s10462-017-9588-9, pp 50-73,2017.
[18]. Frederick S.M. Herz, Warrington,Lyle H. Ungar, Philadelphia; Jason M. Eisner, Baltimore,Stock market prediction using NLP US2003/0135445 AI
[19]. Joa˜o Guerreiro, • Paulo Rita,• Duarte Trigueiros2 , A Text Mining-Based Review of Cause-Related Marketing Literature, J Bus Ethics DOI 10.1007/s10551-015-2622-4, pp ( 1-17).2015.
[20]. Kranti M. Jaybhay , Rajesh V. Argiddi , S.S.Apte, Stock Market Prediction Model by Combining Numeric and News Textual Mining, International Journal of Computer Applications (0975 – 8887) Volume 57– No.19, November 2012, pp ( 16-22),2014.
[21]. Maecello Backmann, Stock Market Prediction Model, International Journal of Computer Applications pp 121-143 2017.
[22]. Manisha V. Pinto, Kavita Asnani , Stock Price Prediction Using Quotes and Financial News, Volume-1, Issue-5, IJSCE,pp266-269,2011.
[23]. Massimiliano Caporin 1, and Francesco Poli , Building News Measures from Textual Data and an Application to Volatility Forecasting. Econometrics, doi:10.3390/econometrics5030035, pp 1-47,2017.
[24]. Pavel Netolický1, Jonáš Petrovský1, František Dařena1, Text Mining in Streams of Textual Data Using Time Series Applied to Stock Market. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 66(6): 1573 – 1580. 2018
[25]. Robert P. Schumaker and Hsinchun Chen, Textual Analysis of Stock Market Prediction Using Breaking Financial News: pp ( 1-21),2009
[26]. S.S Abdullah, M. Rahaman and M. Rahman, Analysis of Stock Market using Text Mining and Natural Language Processing.IEEE Xpolre 978-1-4799-0400-6/13,2013.
[27]. S.S.Panigrahi, J.K.Mantri, Spinger pp241-268 ( 2015).
[28]. Sadi evren seker,cihan mert,khaled al-naami,nuri ozalp,ugur ayan time series analysis on stock market for text mining correlation of Economynews, International journal of social sciences and humanity studies, Vol 6, no 1, 2014 ISSN: 1309-8063 (online)pp( 69- 91),2014.
[29]. Sheikh SaugatbAbdullah, Mohammad Saudar Rahman : Text Mining-Based Review , International Journal of Emerging Technology and Advanced Engineering ,pp69-81,(2013).
[30]. Bharathi, Angelina Geetha(2017) Sentiment Analysis for Effective Stock Market Prediction, International Journal of Intelligent Engineering and Systems, Vol.10, No.3,DOI: 10.22266/ijies2017.0630.16,pp 146-154.2017.
[31]. Spandan Ghose Chowdhury , Soham Routh , Satyajit Chakrabarti ,News Analytics and Sentiment Analysis to Predict Stock Price Trends, International Journal of Computer Science and Information Technologies, Vol. 5 (3),ISSN 0975-9646,pp 3596-3604.2014.
[32]. Tseng-Chung Tang, Hsu-Tong Deng, Li-Chiu Chi , Textual Analysis of Stock Market Prediction Using Financial News Articles and Google Search Queries International Journal of Innovative Research in Science, Engineering and Technology(An ISO 3297: 2007 Certified Organization)Vol. 4, Issue 8, August 2015, PP 6992-6994,2015.
[33]. Walter Paul Labys, Stock Market Prediction Using Natural Language Processing, Pub. No.: US 2003/0135445 A1, pp 1-10,2003.
[34]. Y.-C. Phung Text mining for stock movement predictions: a Malaysian perspective, www.witpress.com, ISSN 1743-3517,pp 103-111,2005.
[35]. Yoosin Kim , Seung Ryul Jeong , Imran Ghani , Text Opinion Mining to Analyze News for Stock Market Prediction, Int. J. Advance. Soft Comput. Appl., Vol. 6, No. 1, March 2014 ISSN 2074-8523,pp 1-13,2014.
Citation
A. Sahoo, J.K. Mantri, "Stock Market Prediction Using Text Mining Approaches: A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.443-450, 2019.
A Study on Relationship between Data Mining and Big Data
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.451-452, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.451452
Abstract
Big data is an expression for a data set. Big data sets are those that exceed the straightforward sort of database and data taking care of models that were utilized in before times, when big data was progressively costly and less achievable. Experts also initiate the distinctiveness and function of several popular running platforms. In this paper, we elaborate to identify the challenges and issues of big data and data Ming with closed relationship. We recognized quite a lot of factors from the big data and data Ming perspective and we also decorated the data Ming issue that justify considerable additional research and development. However, database and data taking care of models issues there a crucial difficulty for user to get used to into data Mining.
Key-Words / Index Term
Mining, Architecture, Challenges, Big Data, Research Issues
References
[1]. K. Su, H. Huang, X. Wu, and S. Zhang, “A Logical Framework for Identifying Quality Knowledge from Different Data Sources,” Decision Support Systems, vol. 42, no. 3, pp. 1673-1683, 2006.
[2]. E.Y. Chang, H. Bai, and K. Zhu, “Parallel Algorithms for Mining Large-Scale Rich-Media Data,” Proc. 17th ACM Int’l Conf. Multimedia, (MM ’09,) pp. 917-918, 2009.
[3]. D. Howe et al., “Big Data: The Future of Biocuration,” Nature, vol. 455, pp. 47-50, Sept. 2008.
[4]. A. Labrinidis and H. Jagadish, “Challenges and Opportunities with Big Data,” Proc. VLDB Endowment, vol. 5, no. 12, 2032-2033, 2012.
[5]. Chen et al. 2004, R. Chen, K. Sivakumar, and H. Kargupta, Collective Mining of Bayesian Networks from Distributed Heterogeneous Data, Knowledge and Information Systems, 6(2):164-187, 2004.
[6]. Chen et al. 2012, Yi-Cheng Chen, Wen-Chih Peng, Suh-Yin Lee, Efficient algorithms for influence maximization in social networks, Knowledge and Information Systems, December 2012, Volume 33, Issue 3, pp 577-601
[7]. Chu et al., 2006, Chu C.T., Kim S.K., Lin Y.A., Yu Y., Bradski G.R., Ng A.Y., Olukotun K., Map- reduce for machine learning on multicore, In: Proceedings of the 20th Annual Conference on Neural Information Processing Systems (NIPS `06), MIT Press, 2006, pp. 281-288.
[8]. Cormode G. and Srivastava D. 2009, Anonymized Data: Generation, Models, Usage, in Proc. of SIGMOD, 2009. pp. 1015-1018.
[9]. Brijesh Kumar Bhardwaj, “Performance Analysis and Evaluation in Data Mining: An Educational Perspective”, International Journal of Scientific Research and Reviews, Vol. 7, Issue 4, July-Sept. 2018.
[10]. Anshul Mishra, Devendra Agarwal and M. H. Khan, “Availability Estimation Model: Fault Perspective”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 6, Issue 6, June 2017.
Citation
Kavita Srivastava, "A Study on Relationship between Data Mining and Big Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.451-452, 2019.
Machine Learning : Survey
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.453-457, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.453457
Abstract
In this era, Machine Learning (ML) is persistently releasing its power in extensive variety of applications. It has been observed in previous years partly owing from advert of massive data. Huge information empowers machine learning calculations to reveal all the designs and make more precise predictions than ever before. In another way, machine learning presents challenges in field of data mining and big data. In this paper, we discussed what machine learning is and how it is related with big data. Here, we have introduced some phases of ML and the tools used to perform accurate prediction and how it is helpful in future tasks. This paper also has been discussed the opportunities and challenges associated with ML.
Key-Words / Index Term
Machine Learning, Big Data, Data Mining, Knowledge Discovery
References
[1] M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, andprospects," Science, vol. 349, pp. 255-260, 2015.
[2] J Gantz, D Reinsel, The digital universe decade—are you ready (EMC,Hopkinton, 2010)
[3] J Manyika, M Chui, B Brown, J Bughin, R Dobbs, C Roxburgh, AH Byers, Bigdata: the next frontier for innovation, competition, and productivity (McKinseyGlobal Institute, USA, 2011)
[4] Q Wu, G Ding, Y Xu, S Feng, Z Du, J Wang, K Long, Cognitive internet ofthings: a new paradigm beyond connection. IEEE Internet Things J1(2), 129–143 (2014)
[5] N. Japkowicz and M. Shah, Evaluating Learning Algorithms: A Classification Perspective:Cambridge University Press, 2011.
[6] Jyoti Arora, Ambica Sood, "A Survey on knowledge extraction Approaches from Big Data and Rectifying Misclassification strategies", International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.187-200, 2017.
[7] O. Okun, G. Valentini, (Eds.), Supervised and Unsupervised Ensemble Methods and their Applications Studies in Computational Intelligence, vol. 126, Springer, Heidelberg, 2008.
[8] ] Nelles, Oliver. "Unsupervised Learning Techniques." In Nonlinear System Identification, pp. 137-155. Springer Berlin Heidelberg, 2001.
[9] Burch, Carl. "A survey of machine learning." Tech. report, Pennsylvania Governor`s School for the Sciences (2001).
[10] Jones, Nicola. "The learning machines." Nature 505, no. 7482 (2014): 146.
[11] Mitchell, Tom M. "Machine learning. WCB." (1997).
[12] Zheng, Jun, Furao Shen, Hongjun Fan, and Jinxi Zhao. "Anonline incremental learning support vector machine for large-scale data." Neural Computing and Applications 22,no. 5 (2013): 1023-1035.
[13] Cortes, Corinna, and Vladimir Vapnik. "Support-vectornetworks." Machine learning 20, no. 3 (1995): 273-297.
[14] Burch, Carl. "A survey of machine learning." Tech. report,Pennsylvania Governor`s School for the Sciences (2001).
[15] Dong, Xu, Ying Li, Chun Wu, and Yueming Cai. "Alearner based on neural network for cognitive radio."In Communication Technology (ICCT), 2010 12th IEEEInternational Conference on, pp. 893-896. IEEE, 2010.
[16] Safatly, Lise, Mario Bkassiny, Mohammed Al-Husseini,and Ali El-Hajj. "Cognitive radio transceivers: RF, spectrum sensing, and learning algorithmsreview." International Journal of Antennas andPropagation 2014 (2014).
[17] Weber, Markus, Max Welling, and Pietro Perona. "Unsupervised learning of models for recognition." In European conference on computer vision, pp. 18-32. Springer, Berlin, Heidelberg, 2000.
[18] Galindo-Serrano, Ana, and Lorenza Giupponi. "Distributed Q-learning for aggregated interference control in cognitive radio networks." IEEE Transactions on Vehicular Technology 59, no. 4 (2010): 1823-1834.
[19] Sutton, Richard S. "Learning to predict by the methods of temporal differences." Machine learning 3, no. 1 (1988): 9-44.
[20] D Yu, L Deng, Deep learning and its applications to signal and information processing. IEEE Signal Proc Mag 28(1), 145–154 (2011)
[21] Y Bengio, Learning deep architectures for AI. Foundations Trends Mach Learn 2(1), 1–127 (2009).
[22] D Peteiro-Barral, B Guijarro-Berdiñas, A survey of methods for distributed machine learning. Progress in Artificial Intelligence 2(1), 1–11 (2012)
[23] H Zheng, SR Kulkarni, HV Poor, Attribute-distributed learning: models, limits, and algorithms. IEEE Trans Signal Process 59(1), 386–398 (2011)
[24] Y.Fu, B Li, X Zhu, C Zhang, Active learning without knowing individual instance labels: a pairwise label homogeneity query approach. IEEE Trans Knowl Data Eng 26(4), 808–822 (2014)
[25] B Settles, Active learning literature survey (University of Wisconsin, Madison, 2010)
Citation
Anamica Tejpal, Kamaljit Kaur, "Machine Learning : Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.453-457, 2019.
Diseases Identification in Plants Using K-Means Algorithm
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.458-462, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.458462
Abstract
The detection of leaf is a very important factor to prevent serious outbreak. Automatic detection of plant disease is essential. Most plant diseases are caused by fungi, bacteria, and viruses. Fungi are identified primarily from their morphology, with emphasis placed on their reproductive structures. Bacteria are considered more primitive than fungi and generally have simpler life cycles. With few exceptions, bacteria exist as single cells and increase in numbers by dividing into two cells during a process called binary fission. Viruses are extremely tiny particles consisting of protein and genetic material with no associated protein. The term disease is usually used only for the destruction of live plants. The developed processing scheme consists of four main steps, first a color transformation structure for the input RGB image is created, and this RGB is converted to HSI because RGB is for color generation and for color descriptor. Then green pixels are masked and removed using specific threshold value, then the image is segmented and the useful segments are extracted. Finally the presence of diseases on the plant leaf is evaluated.
Key-Words / Index Term
Noise removal, Segmentation, clustering, pre-processing
References
[1] P. P. Prajakta Mitkal, "Leaf Disease Detection and Prevention Using Image Processing using Matlab," International Journal of Recent Trends in Engineering & Research, vol. 2, no. 2, p. 26, 2016.
[2] B. T. Arti N. Rathod, "Image Processing Techniques for Detection of Leaf Disease," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 11, p. 397, 2013.
[3] A. F. Sandesh Raut, "Plant Disease Detection in Image Processing Using MATLAB," International Journal of Innovative Research in Science, Engineering and Technology , vol. 6, no. 6, p. 10373, 2017.
[4] M. M. K. Rajneet Kaur, "A Brief Review on Plant Disease Detection using in Image Processing," International Journal of Computer Science and Mobile Computing , vol. 6, no. 2, p. 101, 2017.
[5] M. S. Amar Kumar Deya, "Image Processing Based Leaf Rot Disease, Detection of Betel Vine," International Conference on Computational Modeling and Security, vol. 1, no. 1, p. 1, 2016.
[6] A. M. Vijai Singh, "Detection of plant leaf diseases using image," INFORMATION PROCESSING IN AGRICULTURE, vol. 4, no. 1, p. 41, 2017.
[7] Y. S. K. Sujatha R, "Leaf disease detection using image processing," Journal of Chemical and Pharmaceutical Sciences, vol. 10, no. 1, p. 670, 2017.
[8] J. G. A. Barbedo, "Identifying multiple plant diseases using digital," Elsevier, vol. 1, no. 1, p. 104, 2016.
[9] Shiddalingappa Kadakol, "Intelligence System for Leaf Extraction and Disease Diagnostic," International Journal of Computer Sciences International Journal of Computer Sciences &Engineering, vol. 4, no.3 , p. 2016.
[10] Asha Patil, " Leaf Disease detection using Image Processing Techniques," International Journal of Scientific Research in Computer Science and Engineering, vol. 6, no. 1, p. 33-36.
Citation
M. Krishnamoorthy, A. Noble Mary Juliet, C. Keerthana, R. Usha Nandhini, "Diseases Identification in Plants Using K-Means Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.458-462, 2019.
CFD Based Numerical Analysis of Flow-Field Characteristics on Airfoils Experiencing Transverse Flow
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.463-468, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.463468
Abstract
In the presented work, the flow-field around dropped airfoils was investigated to establish a correlation with transverse flow on a flat plate. This scenario relates to falling maple seeds and developing a fundamental understanding of the how the forces and drag coefficients develop prior to rotation. Understanding the development of these forces will lead to understanding the characteristics of maple seeds (and other auto-rotating seeds) that cause auto-rotation and development of leading-edge vortices. Using CFD, a thin, almost 2D airfoil was placed in a 3D environment and dropped through free space. Flow around the dropped airfoil was accelerated by gravity considerations. The resulting surface forces were evaluated through comparison of coefficient of drag values for transverse flow on a flat plate. The analysis of the forces demonstrated that the drag coefficient values on the lower surface of NACA 0012 and E63 airfoils profile were found to be similar to the flat plate values. The convex NACA 0012 airfoil experienced larger surface forces than flat plate and the concave E63 airfoil experienced smaller surface forces than flat plate. This work also demonstrates that coefficient of drag varies with time.
Key-Words / Index Term
Transverse Flow, Cross-flow, NACA 0012, Dropped Airfoil, Flat Plate, Perpendicular Flow
References
[1] K. Fregene, D. Sharp, C. Bolden, J. King, C. Stoneking, S. Jameson, “Autonomous Guidance and Control of a Biomimetic Single-Wing MAV”, In the Proceedings of the Unmanned Systems Conference; pp. 1-12, 2016.
[2] S. Jameson, B. Satterfield, C. Bolden, N. Allen, H. Youngren, “SAMARAI nano air vehicle a revolution in flight”, In the proceedings of Association for Unmanned Vehicle Systems International Unmanned Systems North America; pp. 1–15, 2007.
[3] J. R. Holden, T. M. Caley, and M. G. Turner, “Maple Seed Performance as a Wind Turbine,” In the Proceedings of 53rd AIAA Aerospace Sciences Meeting, 2015.
[4] R. K. V. Gadamsetty, J. Loganathan, V. K. Balaramudu, and A. Rao, “Alternate Wind Turbine Blade Planform Design Studies for Low Wind Speeds,” Volume 9: Oil and Gas Applications; Supercritical CO2 Power Cycles; Wind Energy, 2015.
[5] D. Lentink, W. B. Dickson, J. L. V. Leeuwen, and M. H. Dickinson, “Leading-Edge Vortices Elevate Lift of Autorotating Plant Seeds,” Science, vol. 324, no. 5933, pp. 1438–1440, 2009.
[6] I.H. Arroyo, D. Rezgui, R. Theunissen, “Analytical Model for Leading-Edge Vortex Lift on Rotating Samara Seeds: Development and Validation,” In Proceedings of Applied Aerodynamics Conference 2016, United Kingdom, 2016.
[7] C.L. Ladera, and P. A. Pineda. "The Physics of the Spectacular Flight of the Triplaris Samaras." Latin-American Journal of Physics Education vol. 3, no. 3, pp. 557-565, 2009.
[8] R. Fang, Y. Zhang, and Y. Liu, “Aerodynamics and Flight Dynamics of Free-Falling Ash Seeds,” World Journal of Engineering and Technology, vol. 5, no. 4, pp. 105–116, 2017.
[9] W. Hu, K. K. Choi, O. Zhupanska, and J. H. Buchholz, “Integrating variable wind load, aerodynamic, and structural analyses towards accurate fatigue life prediction in composite wind turbine blades,” Structural and Multidisciplinary Optimization, vol. 53, no. 3, pp. 375–394, 2015.
[10] N. Sørensen and J. Michelsen, “Drag Prediction for Blades at High Angle of Attack Using CFD,” 42nd AIAA Aerospace Sciences Meeting and Exhibit, 2004.
[11] X. Tian, M. C. Ong, J. Yang, and D. Myrhaug, “Large-eddy simulations of flow normal to a circular disk at Re=1.5×105,” Computers & Fluids, vol. 140, pp. 422–434, 2016.
[12] C. Ostowari and D. Naik, “Post-stall wind tunnel data for NACA 44XX series airfoil sections,” Wind Engineering, vol. 8, no. 3, pp. 176–194, 1985.
[13] K. Cox and A. Echtermeyer, “Structural Design and Analysis of a 10MW Wind Turbine Blade,” Energy Procedia, vol. 24, pp. 194–201, 2012.
[14] J.A. Dahlberg, G. Ronsten,, “A Wind Tunnel Investigation of Tower Blockage Effects and Parking Loads on a E 5.35 M Horizontal Axis Wind Turbine,” In 5th European Wind Energy Association Conference and Exhibition; pp. 414–417, 1994.
[15] R. Shirzadeh, W. Weijtjens, P. Guillaume, and C. Devriendt, “The dynamics of an offshore wind turbine in parked conditions: a comparison between simulations and measurements,” Wind Energy, vol. 18, no. 10, pp. 1685–1702, 2014.
[16] K. Cox and A. Echtermeyer, “Structural Design and Analysis of a 10MW Wind Turbine Blade,” Energy Procedia, vol. 24, pp. 194–201, 2012.
[17] E. Simiu, and R.H. Scanlan, "Wind effects on structures: Fundamentals and application to design." John Willey & Sons Inc Publisher, USA 1996.
[18] S. F. Hoerner, Fluid-dynamic drag. Brick Town, NJ: Hoerner Fluid Dynamics, 1965.
[19] J. Nedić, B. Ganapathisubramani, and J. C. Vassilicos, “Drag and near wake characteristics of flat plates normal to the flow with fractal edge geometries,” Fluid Dynamics Research, vol. 45, no. 6, 2013.
[20] T. J. Mueller, Low Reynolds number aerodynamics: proceedings of the conference, Notre Dame, Indiana, USA, 5-7 June 1989. New York: Springer-Verlag, 1989.
Citation
C. Seidel, R.LeBeau, S. Jayaram, "CFD Based Numerical Analysis of Flow-Field Characteristics on Airfoils Experiencing Transverse Flow," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.463-468, 2019.
A Review: Distributed Auction-Based Framework v/s Cluster-Based Framework for Auto Scalable IaaS Provisioning in Geo-Data Centers
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.469-476, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.469476
Abstract
This research paper proposes a cluster-based framework for Infrastructure-as-a-Service (IAAS) which enables customers effectively hosted intensified performance computing applications and cloud service providers (CSP’s) to use their resources beneficially. The solution incorporates the cluster-based framework which handles the geographical data centers grouped logically in clusters. This cluster-based framework overcomes the challenges of traditional centralized provisioning approaches. A. Efficient on-demand IaaS provisioning. B. Auto-scaling of increasing number of IaaS requests. C. Effectively use of Geographical Data center computing resources. D. Maintain Quality of Service parameter requirements for different IaaS requests. Incorporate Vickrey-Clarke-Groves (VCG) mechanism to solve exaggeration and collusion issues. The solution generated extended to host cloud applications based on mobile and how effectively it will work in a changeable environment. To pace the performance of the distributed IaaS framework vs (RCG-IaaS) regional IaaS provisioning model based on an efficient decomposition technique, Column generation as a large scale optimization tool, I use the additional performance metrics as follows: Basic Performance metric: Speedup (Su): Speed gain of using more processing nodes over a single node, Efficiency (E): Percentage of maximum performance (speedup or utilization) achievable (%), Elasticity (El): Dynamic interval of auto-scaling resources with workload variation & Cloud Productivity: QoS of Cloud (QoS): The satisfaction rate of a cloud service or benchmark testing (%), Service Cost (Cost): The price per cloud service (Compute, Storage etc.) provided ($/hour), Availability (A): Percentage of time the system is up to deliver useful work (%).
Key-Words / Index Term
Cloud Computing, VCG mechanism, IaaS, Data Centers, Cluster, Auction, Distributed, Geo (Geographically)
References
[1] J. Shamsi, M. A. Khojaye, and M. A. Qasmi, “Data-intensive cloud computing: Requirements, expectations, challenges, and solutions,” J. Grid Comput., vol. 11, no. 2, pp. 281–310, Jun. 2013.
[2] C. Vecchiola, S. Pandey, and R. Buyya, “High-performance cloud computing: A view of scientific applications,” in 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), Dec 2009, pp. 4–16.
[3] R. Tudoran, A. Costan, R. Wang, L. Bouge, and G. Antoniu, “Bridging data in the clouds: An environment-aware system for
geographically distributed data transfers,” in 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May 2014, pp. 92–101.
[4] D. Ardagna, S. Casolari, and B. Panicucci, “Flexible distributed capacity allocation and load redirect algorithms for cloud systems,” in Cloud Computing (CLOUD), 2011 IEEE International Conference on, July 2011, pp. 163–170.
[5] C. Papagianni, A. Leivadeas, S. Papavassiliou, V. Maglaris, C. Cervello-Pastor, and A. Monje, “On the optimal allocation of virtual resources in cloud computing networks,” IEEE Transactions on Computers, vol. 62, no. 6, pp. 1060–1071, June 2013.
[6] F. Wuhib, R. Stadler, and H. Lindgren, “Dynamic resource allocation with management objectives: Implementation for an openstack cloud,” in Proceedings of the 8th International Conference on Network and Service Management, ser. CNSM ’12. Laxenburg, Austria, Austria: International Federation for Information Processing, 2013, pp. 309–315.
[7] A. Ahmed, Z. M. Faten, L. Rami, B. Raouf, and P. Guy, “Greenhead: Virtual data center embedding across distributed infrastructures,” IEEE Transactions on Cloud Computing, vol. 1, no. 1, January-June 2013.
[8] S. Zhang, Z. Qian, J. Wu, and S. Lu, “SEA: Stable resource allocation in geographically distributed clouds,” in Communications (ICC), 2014 IEEE International Conference on, June 2014, pp. 2932–2937.
[9] I. Houidi, W. Louati, and D. Zeghlache, “A distributed virtual network mapping algorithm,” in Communications, 2008. ICC ’08. IEEE International Conference on, May 2008, pp. 5634–5640.
[10] F. Samuel, M. Chowdhury, and R. Boutaba, “Polyvine: policybased virtual network embedding across multiple domains,” Journal of Internet Services and Applications, vol. 4, no. 1, 2013.
[11] B. Kantarci and H. Mouftah, “Inter-data center network dimensioning under time-of-use pricing,” IEEE Transactions on Cloud Computing, vol. 4, pp. 402–414, 2017.
[12] Q. Zhang, Q. Zhu, M. Zhani, and R. Boutaba, “Dynamic service placement in geographically distributed clouds,” in 2012 IEEE 32nd International Conference on Distributed Computing Systems
(ICDCS), June 2012, pp. 526–535.
[13] M. Alicherry and T. Lakshman, “Network aware resource allocation in distributed clouds,” in INFOCOM, 2012 Proceedings IEEE, March 2012, pp. 963–971.
[14] I. Houidi, W. Louati, W. B. Ameur, and D. Zeghlache, “Virtual network provisioning across multiple substrate networks,” Computer Networks, vol. 55, no. 4, pp. 1011 – 1023, 2011, special Issue on Architectures and Protocols for the Future Internet.
[15] Khaled Metwally, Abdallah Jarray, and Ahmed Karmouch, “A Distributed Auction-based Framework for Scalable IaaS Provisioning in Geo-Data Centers” IEEE transactions on cloud computing, Oct 2018, pp. 1-14
[16] J.W. Charles Reiss, “Google cluster-usage traces: format+schema,”Tech. Rep., 2011.
[17] M. Al-Fares, A. Loukissas, and A. Vahdat, “A scalable, commodity data center network architecture,” in Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, ser. SIGCOMM ’08. ACM, 2008, pp. 63–74.
[18] Optimal shill bidding in the VCG mechanism, Itai Sher University of Minnesota, September 3, 2010.
[19] Jackson, M. O. (2000). Mechanism theory. In the Encyclopedia of Life Support Systems. EOLSS Publishers. Jackson, 2000
[20] Krishna, V. (2002). Sealed-bid (Vickrey) auction, Auction Theory. Academic Press.
[21] The Vickrey-Clarke-Groves Mechanism work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License, Jeffrey Ely, July 8, 2009
[22] Vickrey-Clarke-Groves Mechanisms, Economics 285, Market Design, Jonathan Levin, Paul Milgrom’s Winter 2009.
Citation
Shashi Kant Gupta, Mohammadi Akheela Khanum, "A Review: Distributed Auction-Based Framework v/s Cluster-Based Framework for Auto Scalable IaaS Provisioning in Geo-Data Centers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.469-476, 2019.
Survey on Improving Wireless Sensor Network (WSN) with Li-Fi and Wi-Fi for Smart City Applications
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.477-481, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.477481
Abstract
The need of seamless and ceaseless faster internet connection speed is on the rise. Since, most of us have access to Wireless Fidelity (Wi-Fi) to fulfill this need, which can become our only option. That’s why, in 2011, a new revolutionary technology comes into light, which is known as, Light Fidelity (Li-Fi). But, testify existing Li-Fi system, a detailed study of its behavior with other IEEE standards such as, Low power Bluetooth (BLE), Wi-Fi, ZigBee etc. should done, which can fulfill by Wireless Sensor Network (WSN). This survey paper represents numerous work happened in field of Wireless Sensor Networks (WSNs) from various IEEE standard based protocols like, Wi-Fi and Li-Fi. So, here at first, brief introduction of various IEEE standards and Wireless Sensor Network (WSN) carried out. Then, in next section, a literature review of various research paper presented along with comparison between Li-Fi and Wi-Fi technologies and applications of Li-Fi in Wireless Sensor Network.
Key-Words / Index Term
WSN, IoT, Wi-Fi, Li-Fi, Smart City
References
[1] V. G. N. J. Mithileysh Sathiyanarayanan, "Challenges and Opportunities of Integrating Internet Of Things and Li-Fi," in IEEE, Tumkur,India, 2017.
[2] A. Mitrokosta, M. Rieback and A. Tanenbaum, "Classifying RFID Attacks And Defences," Information Systems Frontiers, pp. 491-505, 2009.
[3] A. G. A. M. S.-F. a. A. R. Kun Chen Hu, "Prototyping and Measurements for a LiFi System," 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), pp. 234-239, 2016.
[4] M. S.-F. A. G. A. a. A. R. V´ıctor Monz´on Baeza, "Testbed for a LiFi System integrated in Streetlights," 2015 European Conference on Networks and Communications (EuCNC), pp. 517-521, 2015.
[5] E. L. a. T. Little, "Refining Light-Based Positioning for Indoor Smart Spaces," SMARTOBJECTS’18, pp. 354-362, 2018.
[6] S. M. Shawish A., "Cloud Computing: Paradigm," Studies in Computational Intelligence , p. 495, 2014.
[7] Y.-S. J. J. H. P. Pradip Kumar Sharma, "EH-HL: Effective Communication Model by Integrated EH-WSN and Hybrid LiFi/WiFi for IoT," IEEE Internet of Things Journal ( Volume: 5 , Issue: 3 , June 2018 ), pp. 1719-1726, 2018.
[8] Z. L. a. T. He, "WEBee: Physical-Layer Cross-Technology Communication," MobiCom `17 Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pp. 2-14, 2017.
[9] X. Z. a. K. G. Shin, "A Case for the Coexistence of Heterogeneous," S3 `11 Proceedings of the 3rd ACM workshop on Wireless of the students, by the students, for the students, vol. 3, no. 11, pp. 1-4, 2011.
[10] H. X. C. K. K. Li Li, "The Applications Of WiFi-based Wireless Sensor," in 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, 2011.
[11] M. A. M. Y. a. D. S. C. M. Gerard Rudolph Mendez, "A WiFi based Smart Wireless Sensor Network for an Agricultural Environment," in 2011 Fifth International Conference on Sensing Technology, Palmerston North, New Zealand, 2011.
[12] X. Qian and J. Zhang, "Study of the Structure of "INTERNET OF THINGS" Business Operation Support Platform," IEEE International Conference oN Communication Technology, pp. 1068-1071, 2010.
[13] M. K. a. T. A. Intidhar Bedhief, "SDN-based Architecture Challenging the IoT Heterogeniety," 2016 3rd Smart Cloud Networks & Systems (SCNS), pp. 31-34, 2016.
[14] M. K. A. Z. E. K. M. A. A. S. P. E. R. Gunasagaran, "Internet of Things: Sensor to Sensor Communication," 2015 IEEE SENSORS, pp. 53-57, 2015.
[15] A. S. a. G. S. Tewolde, "Considerations in Low Power Wireless Sensor Networks," 2015 IEEE International Conference on Electro/Information Technology (EIT), pp. 626-631, 2015.
[16] A. Shetty, "A Comparative Study and Analysis on Li-Fi and Wi-Fi," International Journal of Computer Applications (IJCA), vol. 150, no. 6, pp. 43-48, 2016.
Citation
Karan. A. Parmar, D.M. Patel, D.G. Thakore, "Survey on Improving Wireless Sensor Network (WSN) with Li-Fi and Wi-Fi for Smart City Applications," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.477-481, 2019.