An Efficient Approach on Big Data for Stock Prediction with the Aid of Optimal Machine Learning Approach
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.482-486, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.482486
Abstract
The research on stock market is considered as an important issue from recent years. The investment in stock market is performed based on prediction and analysis. The current market economy has numerous variables which need to be considered before doing a transaction in stock market. So, the analysis of the variables manually is a tough task. In order to predict the variables in the stock market and analyse the affecting factors machine learning approach is best suited. The machine learning can provide prediction of different aspects such as index value, higher stock price, exchange rate etc. Different machine learning approaches like naive Bayes classifier, support vector machine, Artificial neural networks are reviewed which helps in stock price prediction and the market prediction. stock market prediction helps the investors and traders make better and quick decisions and ensure profits. Furthermore, advantages and limitations are discussed based on the prediction accuracy and performance.
Key-Words / Index Term
Stock market, Prediction, Big data, Machine learning
References
[1] G. V. Attigeri, M. M. Manohara Pai, M. Radhika Pai, N. Aparna, “Stock market prediction: A big data approach”. In: TENCON 2015-2015 IEEE Region 10 Conference Macao, pp. 1-4 November 2015.
[2] M. Birasnav, R. Mittal, S. Loughlin, “Linking leadership behaviours and information exchange to improve supply chain performance: A conceptual model”, Global Journal of Flexible Systems Management, Vol. 16, issue, 2, pp. 205-217, 2015.
[3] Birgul Egeli, O. Meltem, B. Bertan, “Stock market prediction using artificial neural networks”, Decision Support Systems, Vol. 22, pp.171-185, 2003.
[4] J. Bollen, H. Mao, X. Zeng, “Twitter mood predicts the stock market”, Journal of Computational Science, Vol. 2, issue, 1, pp.1–8, 2011.
[5] S. Chauhan, N. Agarwal, A.K. Kar, “Addressing big data challenges in smart cities: A systematic literature review”.
Info, Vol. 18, issue, 4, pp. 73–90, 2016.
[6] P. Grover, A.K. Kar, “Big data analytics: a review on theoretical contributions and tools used in literature” Global Journal of Flexible Systems Management, Vol. 18 issue, 3, pp. 203-229, 2017.
[7] Hell Strom, T.A. Random, “Walk through the Stock Market, Licentiate Thesis” Department of Computer Science, Umea University, Sweden, 1998.
[8] Z. Hu, J. Zhu, K. Tse, “Stocks market prediction using support vector machine”. In: 6th International Conference on Information Management, Innovation Management and Industrial Engineering, 23-24 November, 2013.
[9] Leung, C. K. S., MacKinnon, R. K., & Wang, Y. (2014). A machine learning approach for stock price prediction. In: IDEAS’14 Proceedings of the 18th International Database Engineering & Applications Symposium, ACM, July 7-9 2014, Porto, Portugal.
[10] Li, X., Xie, H., Wang, R., Cai, Y., Cao, J., Wang, F. ... & Deng, X. (2014). Empirical analysis: stock market prediction via extreme learning machine. Neural Computing and Applications, 27(1), 67-78.
[11 ]Mahajan, S. D., Deshmukh, K. V., Thite, P. R., Samel ,B. Y., & Chate, P. J.(2016). Stock Market Prediction and Analysis Using Naïve Bayes.International Journal on Recent and Innovation Trends in Computing and Communication, 4(11), 121-124.
[12] O’Connor, A. J. (2013). The power of popularity: An empirical study of the relationship between social media fan counts and brand company stock prices. Social Science Computer Review, 31(2), 229-235.
[13] Patel, J., Shah, S., Thakkar, P., & Kotecha, K. (2014). Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques. Expert Systems with Applications, 42(1), 259-268.
[14] Sharma, A., Bhuriya, D., & Singh, U. (2017). Survey of stock market prediction using machine learning approach. In: International Conference on Electronics, Communication and Aerospace Technology, 20-22 April 2017, Indore, Madhya Pradesh.
[15] Wang, F., Zhang, Y., Xiao, H., Kaung, L., & Lai, Y. (2015). Enhancing Stock Price Prediction with a Hybrid Approach Based Extreme Learning Machine. In: International Conference on Data Mining Workshops, Atlantic City, New jersey, 14-17 November 2015.
[16] Feng wang.,Zhujong Zhao.,Xiaodong Li.,Fei yu.,Hao Zhang(2014).Stock Volatility prediction using multi-kernal learning machine. In: International Joint Conference on Neural Networks (IJCNN), july 6-11, Beijing, China, IEEE, 2014.
Citation
T. P Sameerapallavi, B. Manjula, "An Efficient Approach on Big Data for Stock Prediction with the Aid of Optimal Machine Learning Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.482-486, 2019.
Emerging Data Transportation Scheme for V-CARS Architecture by Formulating the Data Delivery Process
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.487-491, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.487491
Abstract
Communication innovations supply the blood for shrewd city applications. In perspective of the consistently expanding remote traffic produced in brilliant urban communities and our effectively clogged Radio Access Systems (RANs), we have as of late planned an information transportation arrange, the Vehicular Cerebral Ability ReapingSystem (V-CARS), which misuses the collected range opportunity and the versatility opportunity offered by the gigantic number of vehicles venturing out in the city to not just offload delay-tolerant information from blocked RANs yet additionally bolster delay-tolerant information transportation for different savvy city applications. To make information transportation productive, in this paper, we build up a range aware(SA) information transportation conspire dependent on Markov choice procedures. Through broad reproductions, we show that, with the created information transportation conspire; the V-CARS is compelling in offering information transportation administrations notwithstanding its reliance on powerful assets, for example, vehicles and reaped range assets. The reenactment results additionally show the prevalence of the SA plot over existing plans. We expect the V-CARS to well supplement existing media transmission arranges in dealing with the exponentially expanding remote information traffic.
Key-Words / Index Term
Smart cities, data transportation, data offloading, vehicular networks, cerebral radios.
References
[1] S. Djahel, R. Doolan, G.-M. Muntean, and J. Murphy,“A communications-oriented perspective on traffic management systemsfor smart cities: Challenges and innovative approaches,” IEEE Commun.Surveys Tuts., vol. 17, no. 1, pp. 125–151, 1st Quart., 2015.
[2] N. Cheng et al. “Vehicle-assisted device-to-device data delivery forsmart grid,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2325–2340,Apr. 2016.
[3] J. M. Batalla et al., “Efficient media streaming with collaborativeterminals for the smart city environment,” IEEE Commun. Mag., vol. 55,no. 1, pp. 98–104, Jan. 2017.
[4] C.-X. Wang et al., “Cellular architecture and key technologies for 5GWireless Comm.Networks,” IEEE Commun. Mag., vol. 52, no. 2,pp. 122–130, Feb. 2014.
[5] I. Yaqoob et al., “Enabling communication technologies for smart cities,”IEEE Commun. Mag., vol. 55, no. 1, pp. 112–120, Jan. 2017.
[6] D. Mazza, D. Tarchi, and G. E. Corazza, “A unified urban mobilecloud computing offloading mechanism for smart cities,” IEEE WirelessCommun., vol. 55, no. 3, pp. 30–37, Mar. 2017.
[7] H. Ding, C. Zhang, Y. Cai, and Y. Fang, “Smart cities on wheels:A newly emerging vehicular cognitive capability harvesting networkfor data transportation,” IEEE Wireless Commun., vol. 25, no. 2,pp. 160–169, Apr. 2018.
[8] F. Malandrino, C. Casetti, C.-F. Chiasserini, and M. Fiore, “Optimal contentdownloading in vehicular networks,” IEEE Trans. Mobile Comput.,vol. 12, no. 7, pp. 1377–1391, Jul. 2013.
[9] T. Han et al., “5G converged cell-less Communications in smart cities,”IEEE Commun. Mag., vol. 55, no. 3, pp. 44–50, Mar. 2017.
[10] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internetof Things for smart cities,” IEEE Internet Things J., vol. 1, no. 1,pp. 22–32, 2014.
[11] H. Yao et al., “Opportunistic offloading of deadline-constrained bulkcellular traffic in vehicular DTNs,” IEEE Trans. Comput., vol. 64, no. 12,pp. 3515–3527, Dec. 2015.
[12] F. Xu et al., “Utilizing shared vehicle trajectories for data forwarding invehicular networks,” in Proc. IEEE INFOCOM, Apr. 2011, pp. 441–445.
[13] K. Abboud, H. A. Omar, and W. Zhuang, “Interworking of DSRCand cellular network technologies for V2X communications: A survey,”IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9457–9470, Dec. 2016.
[14] S. M. Tornell, C. T. Calafate, J.-C. Cano, and P. Manzoni, “DTN protocolsfor vehicular networks: An application oriented overview,” IEEECommun. Surveys Tuts., vol. 17, no. 2, pp. 868–887, 2015.
[15] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Efficient routingin intermittently connected mobile networks: The multiple-copy case,”IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 77–90, Feb. 2008.
[16] H. Zhu, S. Chang, M. Li, K. Naik, and S. Shen, “Exploiting temporaldependency for opportunistic forwarding in urban vehicular networks,”in Proc. IEEE INFOCOM, Apr. 2011, pp. 2192–2200.
[17] H. Zhu et al., “ZOOM: Scaling the mobility for fast opportunisticforwarding in vehicular networks,” in Proc. IEEE INFOCOM, Apr. 2013,pp. 2832–2840.
[18] Maddali M.V.M. Kumar, Dr. Aparna Chaparala, "SEER - An Intelligent Double Tier Fuzzy Framework for the Selection of Cluster Heads Based on Spiritual Energies of Sensor Nodes", Springer International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT - 2018), ISSN: 2367-4512., Vol: 15, ISBN: 978-981-10-8681-6
[19] Y. Wu, Y. Zhu, and B. Li, “Infrastructure-assisted routing in vehicularnetworks,” in Proc. IEEE INFOCOM, Mar. 2012, pp. 1485–1493.
[20] Y. Zhu, Y. Wu, and B. Li, “Trajectory improves data delivery in urbanvehicular networks,” IEEE Trans. Parallel Distributed System, vol. 25, no. 4,pp. 1089–1100, Apr. 2014.
[21] Maddali M. V. M. Kumar,Y. Lakshmi Kamakshi, "A Novel Approach to Secure Route Discovery for Dynamic Source Routing in MANETs", International Journal of Scientific Research in Computer Science, Engineering and Information Technology, ISSN: 2456-3307, Vol 3, Issue 1, pp.885-891, SJIF – 4.032, UGC Approved Journal No. 64718, Jan-Feb2018.
[22] Y. Wu, Y. Zhu, H. Zhu, and B. Li, “CCR: Capacity-constrained replicationfor data delivery in vehicular networks,” in Proc. IEEE INFOCOM,Apr. 2013, pp. 2580–2588.
Citation
Maddali M. V. M. Kumar, Shaik Farjana, "Emerging Data Transportation Scheme for V-CARS Architecture by Formulating the Data Delivery Process," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.487-491, 2019.
A Vision of Internet of Things
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.492-497, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.492497
Abstract
The Internet of Things (IoT’s) fast growth is affected by resource use and fears regarding privacy and security. An answer put together addressing security, efficiency, privacy, and measurability is required to support continued growth. We have a tendency to propose an answer shapely on human use of context and data, lever-aging cloud resources to facilitate IoT on affected devices. We have a tendency to applying method information to provide security through abstraction and privacy through remote data fusion. We have a tendency to define the components and contemplate the key ideas of the “data proxy” and the “cognitive layer.” The information proxy uses system models to digitally mirror objects with lowest input information, whereas the cognitive layer applies these models to monitor the system’s evolution and to simulate the impact of commands before execution. The data proxy permits a system’s sensors to be sampled to fulfill a such quality of information target with lowest resource use.
Key-Words / Index Term
Emerging technologies, Internet of Things (IoT), networking architecture
References
[1] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the Internet of Things: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.
[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet
of Things (IoT): A vision, architectural elements, and future direc- tions,” Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660,
2013. [Online]. Available: http://www.sciencedirect.com/science/article/
pii/S0167739X13000241
[3] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,”
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
[4] C. C. Aggarwal, N. Ashish, and A. Sheth, The Internet of Things: A Survey From the Data-Centric Perspective. Boston, MA, USA: Springer,
2013, pp. 383–428, doi: 10.1007/978-1-4614-6309-2_12.
[5] K. Bhaduri and M. Stolpe, Distributed Data Mining in Sensor Networks. Boston, MA, USA: Springer, 2013, pp. 211–236, doi: 10.1007/978-1-4614-6309-2_8.
[6] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An outlook,” Int. J. Distrib. Sensor Netw., vol. 12, no. 1, p. 7, 2016, doi: 10.1155/2016/3159805.
[7] J. E. Siegel, “Data proxies, the cognitive layer, and application locality: Enablers of cloud-connected vehicles and next-generation Internet of Things,” Ph.D. dissertation, Dept. Mech. Eng., Massachusetts Inst. Technol., Cambridge, MA, USA, Jun. 2016. [Online]. Available: http://hdl.handle.net/1721.1/104456
[8] V. Chang and M. Ramachandran, “Towards achieving data security with the cloud computing adoption framework,” IEEE Trans. Services Comput., vol. 9, no. 1, pp. 138–151, Jan./Feb. 2016.
[9] L. Li, M. Rong, and G. Zhang, “An Internet of Things QoE evalua- tion method based on multiple linear regression analysis,” in Proc. 10th Int. Conf. Comput. Sci. Educ. (ICCSE), Cambridge, U.K., Jul. 2015, pp. 925–928.
[10] E. Wilhelm et al., “Cloudthink: A scalable secure platform for mir- roring transportation systems in the cloud,” Transport, vol. 30, no. 3, pp. 320–329, 2015.
[11] S. Mayer and J. Siegel, “Conversations with connected vehicles,” in Proc. 5th Int. Conf. Internet Things (IoT), Seoul, South Korea, Oct. 2015, pp. 38–44.
[12] O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and security in
Internet of Things and wearable devices,” IEEE Trans. Multi Scale
Comput. Syst., vol. 1, no. 2, pp. 99–109, Apr./Jun. 2015.
[13] M.-H. Maras, “Internet of Things: Security and privacy implications,”
Int. Data Privacy Law, vol. 5, no. 2, pp. 99–104, 2015.
[14] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An experimental study of security and privacy risks with emerging household appliances,” in Proc. IEEE Conf. Commun. Netw. Security, San Francisco, CA, USA, Oct. 2014, pp. 79–84.
Citation
S. Sabeena, M. Jaganathan, "A Vision of Internet of Things," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.492-497, 2019.
Anonymous and Fast Roaming Authentication Process in Space Information Networks
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.498-502, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.498502
Abstract
These days, Space info Network (SIN) has been broadly speaking used, in fact, on account of its favorable circumstances of conveyancing anywhere whenever. This part is prompting another pattern that customary remote purchasers can wander to SIN to induce a superior administration. Be that because it could, the highlights of uncovered connections and better flag dormancy in SIN build it arduous to structure a protected and fast wandering verification plot for this new pattern. Albeit some current investigates are focused around designing secure validation conventions for SIN or giving rambling confirmation conventions to customary remote systems, these plans cannot offer adequate stipulations to the wandering correspondence in SIN and find basic problems, for instance, protection spillage or deplorable verification delay. looking at these problems haven`t been all around attended, we have a tendency to structure a mysterious and fast wandering confirmation conspire for SIN. In our arrange, we have a tendency to use the gathering mark to offer the secrecy to wandering purchasers, and expect that the satellites have restricted process limit and influence them to possess the characterised validation capability to keep up a strategic distance from the constant contribution of the house system management focus (HNCC) whereas confirming the rambling purchasers. the results of security and execution examination demonstrate that the projected arrange will offer the specified security highlights, whereas giving a touch validation delay.
Key-Words / Index Term
Access validation, secrecy, meandering, and space data organize
References
[24] I. Memon, M. R. Mohammed, R. Akhtar, H. Memon, M. H. Memon, and R. A. Shaikh, “Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC),” Wireless personal communications, vol. 79, no. 1, pp. 661–686, 2014.
Citation
R. Murugadoss, Sanka Mounika, "Anonymous and Fast Roaming Authentication Process in Space Information Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.498-502, 2019.
A Systemic Review of Various Multifactor Authentication Schemes
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.503-510, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.503510
Abstract
With the advancement in information technology, use of cloud has gained rapid acceptance. The usage of such public infrastructures not only increase the risk of data theft but also raise concerns for providing better security to data and resources. One aspect of security deals with authentication method that is used to gain access to the resources over these shared platforms. Strong authentication technique lays foundation for data protection. Simple username-password schemes (single factor) have been proved to be insecure and insufficient in providing secured access thereby urging the need for multifactor authentication (MFA) schemes. Multifactor authentication schemes not only provide an extra layer of security but are also robust against various types of network attacks. The objective of this paper is to review the various multifactor authentication schemes and models that are used to verify the identity of users. This paper highlights the technique, multi-layer cybersecurity strategy, strengths and weaknesses of various schemes with the view to enhance security.
Key-Words / Index Term
Authentication, Multifactor, Security, Passwords, Attack
References
[1] S. M.Sujatha. ,Y. U. Devi, “Design and implementation of IoT testbed with three factor Authentication”, In the Proceedings of the 2016 International Conference on Communication and Electronics Systems (ICCES),IEEE,2016.
[2] M. Sunita, R. Syal, “ Authentication Scheme in Cloud Computing : A Review”, In the Proceedings of the 2017 Second International Conference on Electrical, Computer and Communication Technologies(ICECCT),2017
[3] H. Fujii, Y. Tsuruoka , “SV-2FA: Two-Factor User Authentication with SMS and Voiceprint Challenge Response”, In the Proceedings of the 8th International Conference for Internet Technology and Secured Transactions (ICITST -2013),IEEE pp-283-287, 2013.
[4] A. P. Sabzeva, A. Stavrou, “Universal Multi-Factor Authentication Using Graphical Passwords”, In the Proceedings of the IEEE International Conference on Signal Image Technology and Internet Based Systems, SITIS`08, pp. 625-632 ,2008.
[5] A.Joshi, S. Kumar, R.H. Goudar, “A More Multifactor Secure Authentication Scheme Based On Graphical Authentication”, In the Proceedings of the International Conference on Advances in Computing and Communications (ICACC),IEEE, pp.186-189,2012.
[6] H. Parmar, N. Nainan, S.Thaseen ,”Generation Of Secure One-Time Password Based On Image Authentication”. Journal of Computer Science and Information Technology, No.7, pp.195-206,2012.
[7] L. Varghese, N. Mathew, S. Saju, V. K. Prasad, “3-Level Password Authentication System”, International Journal of Recent Development in Engineering and Technology, ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014.
[8] V. K. Vemuri, S. D. V. Prasad, “A Secure Authentication System by Using Three Level security”, International Journal of Engineering Science and Computing, ISSN-2321-3361, pp.344-348, 2014.
[9] A. A. Yassin, A. A.Hussain, K. A.-A. Mutlaq, “Cloud Authentication Based on Encryption of Digital Image Using Edge Detection”, International Symposium on Artificial Intelligence and signal Processing (AISP), 2015
[10] A. Abdellaoui, Y. I. Khamlichi, H. Chaoui, “Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment”, International Journal of Security and Its Applications Vol.9, No.12 , pp.35-46 ,2015.
[11] A. Abdellaoui, Y. I. Khamlichi, H.Chaoui, “ A Novel Strong Password Generator for Improving Cloud Authentication”, In the Proceedings of the International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85 ) pp.293 – 300 ,2016
[12] M. Aldwairi ,R. Masri, H. Hassan, M. E. Barachi , “A Novel Multi-Stage Authentication System for Mobile Applications”, International Journal of Computer Science and Information Security, Vol 14, Issue 7, 2016.
[13] M. Meena, H. S. Lamba , D. Taterwal , M. Shaikh , “System For 3 Level Security Verification Using Image Based Authentication & OTP”, IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN 2278-8719,Volume 13, pp. 46-52, 2018.
[14] F. Aloul, S. Zahidi, W. EI-Hajj, "Two factor authentication using mobile phones", In the proceedings of the International Conference on Computer Systems and Applications 2009. AICCSA 2009. IEEE/ACS, pp. 641-644, 10-13 May 2009.
[15] J. C. Liou and S. Bhashyam, “A Feasible and Cost Effective Two-Factor Authentication for Online Transactions”, In the Proceedings of the 2nd International Conference on Software Engineering and Data Mining, IEEE, pp.47-51, June 2010.
[16] S. K. Nayak, S. Mohapatra, B. Majhi, “An Improved Mutual Authentication Framework for Cloud Computing” International Journal of Computer Applications, Volume 52, issue. 5, August 2012.
[17] A. M. Abdul, S. Jena, M. Balraju, “Dual Factor Authentication To Procure Cloud Services”, In the Proceedings of the 2016 Fourth International Conference on Parallel,Distributed and Grid Computing(PDGC),IEEE,2016
[18] R. K. Banyal , P.Jain, V. K. Jain , “Multifactor Authentication Framework for Cloud Computing”, In the Proceedings of the Fifth International Conference on Computational Intelligence, Modeling and Simulation, IEEE, 2013.
[19] I. A. Althamary, E. M. El-Alfy, “A More Secure Scheme For CAPTCHA-Based Authentication In Cloud Environment”, In the Proceedings of the 8th International Conference on Information Technology (ICIT), Jordan, May 2017.
[20] J.- J. Kim, S.-P. Hong , “A Method of Risk Assessment for Multi-Factor Authentication.” Journal of Information Processing Systems, pp. 187-198,2011.
[21] M. M. Mohammed, M. Elsadig, “A multi-layer of multi factors authentication model for online banking services”, In the Proceedings of the 2013 International Conference on Computing Electrical and Electronics Engineering (ICCEEE), pp. 220-224, 26–28 August, 2013.
[22] S. H. Khan, M. A. Akbar, “Multi-Factor Authentication on Cloud”, In the Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, pp. 1-7, 2015.
[23] Z. Han, L. Yang, Q. Liu, “A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing”, In the Proceedings of the 2017 International Conference Networking and Network Applications (NaNA), pp. 341-346, 2017.
[24] R. D. Pietro, M. Gianluigi, M. A. Strangio, “ A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions”, In the Proceedings of the International Conference on Mobile Business (ICMB’05), 2005.
[25] S. Lee, I. Ong, H. T. Lim, H. J. Lee, “Two factor authentication for cloud computing”, International Journal of KIMICS, vol 8, pp. 427-432,2010
[26] M .H. Eldefrawy, M. K. Khan, K. Alghathbar, “OTP-Based Two-Factor Authentication Using Mobile Phones”, In the Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 327-331,2011.
[27] M. Singh, S. Singh, “Design and Implementation of Multi-tier Authentication Scheme in Cloud”, International Journal of Computer Science Issues(IJCSI), ISSN (Online):1694-0814, Vol. 9, Issue 5, No 2, pp. 181-187,September 2012.
[28] A. H. M. Emam, “Additional Authentication and Authorisation using Registered Email-ID for Cloud Computing”, International Journal of Soft Computing and Engineering (IJSCE), ISSN : 2231-2307, Vol 3, Issue 2, May 2013.
[29] K. W. Hussein, Dr. N. F. M. Sani, Dr. R. Mahmod, Dr. M. T. Abdullah, “ Design and Implementation of Multi Factor Mechanism for Secure Authentication System”, International Journal of Computer Science and Information Security,Vol. 11, No. 7,pp.31-37, July 2013.
[30] N. Kaur, M. Devgan, S. Bhushan, “Robust Login Authentication Using Time-Based OTP Through Secure Tunnel”, In the Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3222-3226, 2016.
[31] A. J. Choudhury ,M. Sain, H. Jae-Lee, , H. Lim, P. Kumar, "A Strong User Authentication Framework for Cloud Computing" , In the Proceedings of the 2011 IEEE Asia -Pacific Services Computing Conference(APSCC), Jeju, Jeju Island Korea (South), pp. 110-115,2011.
[32] O. M. Candan, A. Levi, “Robust Two-factor Smart Card Authentication”, In the Proceedings of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),IEEE,2017.
Citation
Charanjeet Singh, Tripat Deep Singh, "A Systemic Review of Various Multifactor Authentication Schemes," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.503-510, 2019.
Blind Image Steganalysis: A Review
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.511-514, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.511514
Abstract
Internet has become a vital source of communication through that data is transmit, receive and share in style of emails, text, speech, images, videos, audios etc. currently a day’s JPEG pictures are wide utilized in our everyday life.. Communication between end user can be secure by using Cryptography. Such kind of communication can be embedded by using Steganography. However Steganography will use in digital carries like text, image, audio or video document for hide secrets documents. Now a day Steganalysis is a new approach to find and analyse the important information which is hiding using the steganography method. The steganalysis for JPEG kind pictures becomes important and important. Steganalysis in pictures supported DCT remodelled region, able to acknowledge the foremost widespread steganography algorithms occurring on the net. However performance of any algorithmic program depending on sensitivity of options and quantity of information hidden in a picture. This paper is provides an overview about steganography techniques and steganalysis techniques for digital images to find cue against to where to look for hidden data in images, discussion about different steganalysis algorithmic programs, steganalysis classification methods, limitation and characteristics of different steganalysis method.
Key-Words / Index Term
Steganography, Universal Steganalysis, Steganalysis, Multimedia documents, Cryptography, Cover Image, Stego Image, Classification, DCT
References
[1] H. j. J. L. a. C. Y. Yiqin Zhang and Fenlin Liu, "Compact Image Steganalysis for LSB-Matching Steganography”, International Conference on Advanced Computational Intelligence (ICACI), pp. 187-192, 2018.
[2] S. V. P., B. P. Madhavi B. Desai, "ANOVA and Fisher Criterion based Feature Selection for Lower Dimensional Universal Image Steganalysis", IJIP, 2016.
[3] V. B. N. M. a. T. C. Punam Bedi, "FS-SDS: Feature Selection for JPEG Steganalysis using Stochastic Diffusion Search", IEEE, pp. 3797-3802, 2014.
[4] Z. X. &. X. W. &. X. S. &. Q. L. &. N. Xiong, "Steganalysis of LSB matching using differences between nonadjacent pixels”, Springer, 2014.
[5] f. l. C. Y. Xiaofeng Song, "Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters, IJRITCC, 2015.
[6] S. V. P. Madhavi B. Desai, "Performance Analysis of Image Steganalysis against Message Size, Message Type and Classification Methods", IEEE, 2016.
[7] F. L, C. Y, X. L. X. S. J. L. Y. Yi Zhang, "Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank",Journal of Electronic Imagin , 2017.
[8] Daniel Majercak, Vladimir Banoci, Martin Broda, Gabriel Bugar, Dusan Levicky”Performance Evaluation of Feature-based Steganalysis in Steganography”, Conference Radioelektronika 2013, April 16-17.
[9] M. C.-H. Oswaldo Juarez-Sandoval, "Compact Image Steganalysis for LSB-Matching Steganography", IEEE, 2015.
[10] J.Anita christaline, R.Ramesh, D.Vaishali “Steganalysis with classifier combinations”,ARPR-2014, pg. no-2858-2863
[11] S.K.Sabnisa,R.N.Awaleb” Statistical Steganalysis of High Capacity Image Steganography with Cryptography”,Elsevier-2016,321-327
[12] Zohaib Khan, Atif Bin Mansoor “An Analysis of Quality Factor on Image Steganalysis” ,IEEE-Conference Paper • April 2010
[13] Sruthi Das N1, Rasmi P S”A Survey on Different Image Steganalysis Techniques”,IJMTER-2015,533-536
[14] S.Geetha, shiva s.shivtha sandhu, N. kamraj”blindimagesteganalysis based on contentindependentstatisticalmeasures maximizing the specificity and sensitivity of system”, Elsevier-2006, pg N0-683-697.
[15] Ismail Avcıbas¸Mehdi Kharrazi,Nasir Memon,B¨ulent Sankur”Image Steganalysis with Binary Similarity Measures”,EURASIP Journal on Applied Signal Processing 2005:17, 2749–2757
[16] Yi Zhang, Fenlin Liu ,Chunfang Yang ,Xiangyang Luo,Xiaofeng Song, Jicang Lu”Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank”,Journal of Electronic Imaging-2017.
[17] Manisha Saini, Rita Chhikara ”performance Evaluation of DCT and DWT Features for Blind Image Steganalysis using Neural Networks” International Journal of Computer Applications- March 2015 (0975 – 8887)
[18] Dr. Monisha Sharma1 and Mrs. Swagota Bera” a review on blind still image steganalysis techniques using features extraction and pattern classification method”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.3. Vol.2, No.3.June 2012,
[19] Rita Chhikara, Latika Singh” A Review on Digital Image Steganalysis Techniques Categorised by Features Extracted” ,International Journal of Engineering and Innovative Technology (IJEIT) - October 2013Volume 3, Issue 4,
[20] K. Nandhini1, B. Gomathi” Implementation of LSB Based Steganography Algorithms in FPGA”, IJSRNSC, Volume-6, Issue-5, June 2017.
[21] Rajesh Shah , Yashwant Singh Chouhan “Encoding of Hindi Text Using Steganography Technique”, ISROSET- Int. J. Sci. Res. in Computer Science & Engineering Vol-2, Issue-1, PP ( 22-28 ), Feb 2014.
Citation
Sindhav Bhumika A, N. M. Patel, U. K. Jaliya , "Blind Image Steganalysis: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.511-514, 2019.
A Bloc of CODED-OFDM and WiMAX overshadowing OFDM: A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.515-518, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.515518
Abstract
The latest favorable technology which delivers to the customer end data facilities at a high speed is the Worldwide Interoperability for Microwaves Access (WiMAX). By observing the foundation of the WiMAX physical layer an understanding has been superlatively attained regarding the system of WiMAX. The foundation of the WiMAX physical layer is discussed in this paper. The studies and research of the students and scholars are based on the meadow of WiMAX can use this model as a helpful reserve. By using some kind of channel coding the performance can be augmented. Coded-OFDM (COFDM) is scheme this form of implementation is termed as. The reimbursements of using COFDM in a WiMAX system have also conversed in this paper
Key-Words / Index Term
WiMAX (Worldwide Interoperability for Microwaves Access), Coded-OFDM (COFDM), Orthogonal Frequency Division Multiplexing (OFDM)
References
[1] M. Patidar, R. Dubey, N. Jain, S. kulpariya, “Performance Analysis of WiMAX 802.16e Physical Layer Model,” 2012 Ninth International Conference on. IEEE, pp. 1-4, 2012.
[2] Pinola, Jarno; Kostas Pentikousis, "Mobile WiMAX", The InternetProtocol Journal (IPJ), Cisco, 2008.
[3] S. Banerji, R. Singha Chowdhury, “On IEEE 802.11: Wireless LAN Technology”, International Journal of Mobile Network Communications & Telematics (IJMNCT), Vol. 3, Issue. 4, 2013
[4] M. Hawawreh, A. Zreikat, “Performance Analysis of a WiMAX Network in Different Propagation Models,” International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, pp. 603-609,2017.
[5] M. Gumaa, A. I. Zrekat, “Performance Evaluation of QoS Parameters in WiMAX Network”, International Journal of Science and Research (IJSR), Vol 3, Issue 9, 2014.
[6] Ahmed, Shabbir, "Performance analysis of Mobile WiMAX Technology" In Computing for Sustainable Global Development (INDIACom),2014 International Conference on IEEE, pp. 959-961, 2014.
[7] Seyedzadegan, Mojtaba, M. Othman. "IEEE 802.16: WiMAX overview, WiMAX architecture." International Journal of Computer Theory and Engineering, Vol. 5,2013
[8] V. Kumar, N. Singh, “Analysis of WiMAX System under Fading Environments using OFDM”, International Conference on Communication, Information and Computing Technology (ICCICT),2015.
[9] Latkoski, P. and Popovski, B, “Analysis of IEEE 802.16 e contention-based handover in erroneous channel” In Wireless Conference (EW), IEEE, Europe, pp. 503-510,2010.
[10] S. Bansal, R. Upadhyay, “Performance Improvement of WiMAX IEEE 802.16e in Presence of Different FEC Codes”, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, IEEE, pp. 226-229, 2009.
[11] S. Huang, Z. Zhang, "Principles of FECs with evaluating different types of FEC used in the Internet and wireless networks." In Electronics, Communications, and Control (ICECC), 2011 International Conference on IEEE, pp. 2181-2184, 2011
[12] Al-Majdi, K., Al-Moussawy, R.S. and Hasan, L.A, “ Reed Solomon Coding in Orthogonal Frequency Division Multiplexing (OFDM) Communication Systems”, Journal of Engineering and Sustainable Development, pp.162-174, 2012.
[13] G. V. Meerbergen, M. Moonen and H. D. Man, “Reed-Solomon Codes Implementing a Coded OFDM Scheme for Rayleigh Fading Channels”, IEEE Global Telecommunications Conference, pp. 1-6, 2006.
[15] I G.Astawa, Y. Moegiharto, A. Zainudin, I. Salim, N. Anggraeni, “Performance Analysis of MIMO-OFDM Using Convolution Codes with QAM Modulation”, International Journal of Electronics and Communication Engineering, pp. 1744-1747, 2013.
[16] A. Joshi, D. S. Saini, “Coded-OFDM in various Multipath Fading Environments”, In Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on IEEE, pp. 127-131, 2010.
[17] J. Stott, “Explaining some of the magic of COFDM,” Proceedings of 20th International Television Symposium, pp. 341-350, 1997.
[18] J. Kataria, P. Kumar, T. Raj, “A Study and Survey of OFDM versus COFDM,” International Journal of Science and Modern Engineering (IJISME), pp. 64-67, 2013.
Citation
Garima Behl, H.P.S. Rishi, Dalveer Kaur, "A Bloc of CODED-OFDM and WiMAX overshadowing OFDM: A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.515-518, 2019.
Private and Secure Healthcare Data Transmission and Analysis for Medical Wireless Sensing System
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.519-527, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.519527
Abstract
The merging of Internet of Things (IoT), Wireless Body Area Network (WBAN), and Cloud Computing (CC) has greatly influenced the Electronic Medical (E/M) Healthcare system. As the use of E/M healthcare increases, the chances of privacy and security violation increases. To address this, a Healthcare system framework is designed which collects medical data from WBAN, transmits them through Wireless Sensor Network (WSN) and publish them through Wireless Personal Area Network (WPANs). WSN allows more number of nodes to transmit the packets from source to destination. It involves three techniques 1) Packet Scheduler where there can be multiple source and destination which prevents collision. 2) Multiple selection method based upon monitor node which provides multiple routes. The monitor node optimizes the selected node. 3) Node to Node compression and Load Balancing Technique which compress the packets sent from source to destination and to decrease the delay. The data collected from WBAN will be aggregated and stored in a file. The file is uploaded to cloud and is accessed by Hospital authorities whenever required. Simulation results shows that the proposed system perform better than existing system with respect to Packet delivery ratio, Transmission time and Energy consumption.
Key-Words / Index Term
Cloud computing, healthcare system, Internet of thing, WBAN, WSN
References
[1] A. Sawand, S. Djahel, Z. Zhang, and F. Naït-Abdesselam, “Toward Energy-Efficient and Trustworthy eHealth Monitoring System,” China Communications for Journal, Vol. 12, No. 1, pp. 46-65, Jan. 2015.
[2] C. Wang, B. Zhang, K. Ren, J. M. Roveda, C. W. Chen, and Z. Xu. “A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive Sensing,” in IEEE INFOCOM Proceedings, pp. 2130-2138, 2014
[3] A. Amirbekyan and V. Estivill-Castro, “A New Efficient Privacy-Preserving Scalar Product Protocol,” in Proceeding of Sixth Australasian Conf. Data Mining and Analytics (AusDM ’07), pp. 209-214, 2007.
[4] J. Reid, I. Cheong, M. Henrickson, and J. Smith, “A novel use of RBAC to Protect Privacy in Distributed Health Care Information Systems,” in Proceeding of 8th Australasian Conference on Information Security and Privacy, pp. 403-415, 2014.
[5] J. A. Akinyele, M. W. Pagano, M. D. Green, C. U. Lehmann, Z. N. Peterson, and A. D. Rubin, “Securing Electronic Medical Records using Attribute-based Encryption on mobile devices,” in Proceeding of 1st ACM Workshop Security Privacy Smart Phones Mobile Devices, pp. 75-86, 2011.
[6] Moon Sun Shin, Heung Seok Jeon, Yong Wan Ju, Bum Ju Lee and Seon-Phil Jeong, “Constructing RBAC Based Security Model in u-Healthcare Service Platform,” The Scientific World Journal, 2015.
[7] Jelena Mirkovic, Haakon Bryhni, Cornelia M. Ruland, “Secure Solutions for Mobile Access to Patients Health Care Record,” in IEEE International Conference on E-health Networking,Application and Services, pp. 296-303, 2011.
[8] Linke Guo, Chi Zhang, Jinyuan Sun, Yuguang Fang, “A Privacy Preserving Attribute Based Authentication system for Mobile Health Network”, IEEE Transactions on Mobile Computing, Vol 13, No. 9, pp. 1927--1941 , 2014.
[9] Ovunc Kocabas, Tolga Soyata, Jean-Philippe Couderc , “ Asessement of Cloud Based Health Monitoring using Homomorphic Encryption”,in IEEE 31st International Conference on Computer Design (ICCD), pp . 443-446, 2013.
[10] El Hadi Cherkaoui, Nazim Agoulmine, “Context Aware Mobility Management with Wifi/3G Offloading for Ehealth WBANs” in IEEE 16th International Conference on e-Health Networking, Applications and Services, pp 472-476, 2014.
[11] Alex Page, Ovunc Kocabas, Scott Ames, Muthuramakrishnan Venkitasubramaniam and Tolga Soyata, “Cloud Based Secure Health Monitoring: Optimizing Fully Homomorphic Encryption for streaming Algorithm”, in IEEE Globecom Workshop-Cloud Computing System. pp. 48-52, 2014.
[12] Mbarek Marwan, Ali Kartit and Hassan Ouahmane ,“Applying Secure Multi-Party Computation to Improve Collaboration in Health care Cloud “, IEEE International Conference on Systems of Collaboration (SysCo), pp. 1--6, 2016.
[13] Alexandru Soceanu, Alexandru Egner and Traian Muntean, “Managing the Privacy and Security of eHealth Data”, 20th International Conference on Control Systems and Science, pp. 439-446, 2015.
[14] R. Istepanian, E. Jovanov, and Y. Zhang, “Guest Editorial Introduction to the Special Section on m-Health: Beyond Seamless Mobility and Global Wireless Health-care Connectivity,” in IEEE Transactions on Information Technology in Biomedicine , Vol. 8, No. 4, pp. 405--414, 2004.
[15] Marcos A. Simplicio Jr., Leonardo H. Iwaya, Bruno M. Barros, Tereza C. M. B. Carvalho, and Mats Naslund , “ Secour Health : A Delay Tolerant Security Framework for Mobile Health Data Collection”, in IEEE Journal of Biomedical and Health Informatics, Vol. 19, No. 02, pp. 761--772,2015.
[16] Michael Rushanan, Aviel D. Rubin, and Denis Foo Kune , “ SoK: Security and Privacy in Inplantable Medical Devices and Body Area Networks”, in IEEE Symposium on Security and Privacy (SP), pp. 524--539, 2014.
[17] Aldar C-F. Chan, “Symmetric Key Homomorphic Encryption for Encrypted Data Processing” IEEE International Conference on Communications ICC`09, pp. 1--5, 2009.
[18] Todor Ivas¸cu, Marc Frıncu and Viorel Negru , “ Considerations Towards Security and Privacy in IoT based E-health Applications” in IEEE 14th International Symposium on Intelligent Systems and Informatics, pp. 275—280, 2016.
[19] Di Lin, Fabrice Labeau, Yuanzhe Yao, Athanasios V. Vasilakos, and Yu Tang, “Admission Control over Internet of Vehicles Attached with Medical Sensors for Ubiquitous Health Care Applications” in IEEE Journal of Biomedical and Health Informatics, Vol. 20, No. 4, pp 1195-1204, July 2015.
[20] Uttara Gogate and Jagdish W. Bakal ,“ Smart Health Care Monitoring System Based on Wireless Sensor Network”, International Conference on Computing, Analytics and Security Trends (CAST), pp. 594-599 , 2016.
[21] Andreea Pintilie, Elena Apostol and Ciprian Dobre, “Efficient Storage and Replication Solutions for Health Care Applications”, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),2016.
[22] Rosa Sanchez-Guerrero, Florina Almenarez, Daniel Dıaz-Sanchez, Patricia Arias and Andres Marın, “A Model for Dimensioning a Secure Event Driven Health Care System” IEEE Transaction, pp 30-37, 2012.
[23] Muthuraman Thangaraj, Pichaiah Punitha Ponmalar and Subramanian Anuradha, “Internet of Things (IOT) Enabled Smart Autonomous Hospital Management System – A Real World Health Care Use Case with the Technology Drivers” IEEE International Conference on Computational Intelligence and Computing Research,2015.
[24] Abinaya.M and Ganesan. R, “Effective Search Mechanism for Finding Nearest Healthcare Facilities”, Proceedings Global Conference on Communication Technologies (GCCT 2015) , pp 534-538,2015.
[25] Roopali and Raj Kumari, “An Efficient Data Offloading to Cloud Mechanism for Smart Healthcare Sensors”,1st International Conference on Next Generation Computing Technologies (NGCT-2015) , pp 90-96,2015.
Citation
Buddesab, Thriveni J, Venugopal K R, "Private and Secure Healthcare Data Transmission and Analysis for Medical Wireless Sensing System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.519-527, 2019.
Prediction of Human Genetic Disease based on Guanine - Cytosine Count
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.528-531, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.528531
Abstract
Through the proposed method GC content of human DNA sequence have been calculated. The GC content plays a major role in disease prediction. Normally in a human genome the GC content is 35% to 60% , if found less than 35% then it indicates about some deficiency diseases like essential amino acid deficiency disease ( mainly Alanine, proline, glycine); and if this content is found more than 60%, then it can be indication of some chromosomal or genetic diseases. So, based on the report of GC content a human can take some precautions to eradicate the probability of happening these kind of diseases.
Key-Words / Index Term
Alanine, Cytosine, DNA, Guinine, Glycine, Proline
References
[1] Baldi P and Brunak S (1998) Bioinformatics: The Machine Learning Approach, MITPress, Cambridge,MA.
[2] lazier AM, Nadeau JH & Aitman TJ (2002) Finding genes that underlie complex traits. Science 298 , 2345– 2349.
[3] Botstein D & Risch N (2003) Discovering genotypes underlying human phenotypes: past successes for Men- delian disease, future approaches for complex disease. Nat Genet 33 , 228–237.
[4] Spencer G. International Consortium Completes Human Genome Project. Bethesda, MD: National Institutes of Health, 2003.
[5] Collins FS, Green ED, Guttmacher AE, Guyer MS, U.S. National Human Genome Research Institute. A vision for the future of genomics research. Nature 2003;422:835– 47.
[6] Bell J. Predicting disease using genomics. Nature 2004;429:453– 6.
[7] 7. Roses AD. Pharmacogenetics and the practice of medicine. Nature 2000;405:857.
[8] Williams RSaG.-C PJ. The genetics of cardiovascular disease: from genotype to phenotype. Dialogues in Cardiovascular Medicine 2004; 9:3–19.
[9] Guttmacher AE, Collins FS. Genomic medicine—a primer. N Engl J Med 2002;347:1512–20.
[10] Cook SA, Rosenzweig A. DNA microarrays: implications for cardiovascular medicine. Circ Res 2002;91:559 – 64.
[11] Goldsmith ZG, Dhanasekaran N. The microrevolution: applications and impacts of microarray technology on molecular biology and medicine (review). Int J Mol Med 2004;13:483–95.
[12] Napoli C, Lerman LO, Sica V, Lerman A, Tajana G, de Nigris F. Microarray analysis: a novel research tool for cardiovascular scientists and physicians. Heart 2003;89:597– 604
[13] van de Vijver MJ, He YD, van’t Veer LJ, et al. A gene-expression signature as a predictor of survival in breast cancer. N Engl J Med 2002;347:1999 –2009.
[14] Bild AH, Yao G, Chang JT, et al. Oncogenic pathway signatures in human cancers as a guide to targeted therapies. Nature 2006;439: 353–7.
[15]. Berchuck A, Iversen ES, Lancaster JM, et al. Patterns of gene expression that characterize long-term survival in advanced stage serous ovarian cancers. Clin Cancer Res 2005;11:3686 –96.
[16] Patino WD, Mian OY, Kang JG, et al. Circulating transcriptome reveals markers of atherosclerosis. Proc Natl Acad SciUSA 2005;102: 3423– 8.
[17] Saunders, M., Lewis, P. and Thornhill, A. (2012) Research Methods for Business Students. Pearson Education Ltd., Harlow.
Citation
Annwesha Banerjee, Anindya Sundar De, Rashbihari Halder, Gopal Basak, Agnish Majumder, "Prediction of Human Genetic Disease based on Guanine - Cytosine Count," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.528-531, 2019.
Novel Path Inference in Large Scale Wireless Networks Using Sensors
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.532-539, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.532539
Abstract
Recent wireless sensor networks (WSNs) are getting progressively advanced with developing network scale and therefore dynamic nature of wireless communications. Several diagnostic approaches depend upon per-packet routing ways for correct and fine-grained analysis of the advanced network behaviors. Here we analyzed various path inference approaches to reconstruct routing paths. Based on the earlier contribution and recent studies, iPath provides an efficient and optimal routing path and iPath achieves much higher reconstruction ratios under different network settings compared to other state of the art approaches. The main theme of ipath is to construct a long path from the known short paths. This Process starts with primary paths and then conducts path inference repeatedly.
Key-Words / Index Term
Estimation, way recreation, Wireless sensor systems
References
[1] M. Ceriotti et al., “Monitoring heritage buildings with Wireless sensor networks: The Torre Aquila deployment” in Proc. IPSN, 2009, pp. 277–288.
[2] Roberto Di Petro, Gabriele Logier, Claudio Oriented, and Gene Tsudik, “United We Stand: Intrusion Resilience in Mobile Unattended WSNs”, IEEE Transactions on Mobile Computing, Vol. 12, NO. 7, July 2013
[3] M. Kavitha “A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks” International Journal of Computer Networks and Applications(IJCNA), DOI:10.22247/ijcna/2016/v3/i4/48569 Volume 3, Issue 4, July – August (2016).
[4] Merlyn, A. Anuba, and A. Anuja Merlyn. "Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network." International Journal of Computer Networks and Applications 1.1 (2014): 110.
[5] Labrador, Miguel A., and Pedro M. Wightman. "Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research". Springer Science and Business Media, 2009.
[6] Acs, Gergely, and LeventeButtyán. "A taxonomy of routing protocols for Wireless sensor networks" BUTE Telecommunication department (2007)
[7] Li, Xiangfang. "Multilayer Optimization in Wireless Ad Hoc Networks".ProQuest, 2007.
[8] G. WernerAllen, J. Johnson, M. Ruiz, J. Lees and M. Welsh, "Monitoring Volcanic Eruptions with a Wireless Sensor Network", in Second European Workshop on Wireless Sensor Networks (EWSN05), Istanbul, Turkey, 2005.
[9] D. Culler, D. Estrin and M.Srivastava, "Overview of Sensor Networks", IEEE Computer Journal, vol. 37, pp. 41 49, 2004
[10] Y. Liu, K. Liu, and M. Li. Passive diagnosis for Wireless sensor networks.IEEE/ACM Transactions on Networking, Vol. 18, No. 4, 2010.
[11] M. Keller, J. Beutel, and L. Thiele. How was your journey?: "uncovering routing dynamics in deployed sensor networks withmultihop network tomography". Proceedings of SenSys, 2012.
[12] X. Lu, D. Dong, Y. Liu, X. Liao, and L. Shanshan.Pathzip: "Packet path tracing in Wireless sensor networks" Proceedings of MASS, 2012.
[13] Y. Gao, W. Dong, C. Chen, J. Bu, G. Guan, X. Zhang, and X. Liu. "Pathfinder: robust path reconstruction in large scale sensor networks with lossy links". The 21st IEEE International Conference on Network Protocols (ICNP), 2013.
Citation
Katta Sindhu Chowdary, Sarika Nyaramneni, "Novel Path Inference in Large Scale Wireless Networks Using Sensors," International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.532-539, 2019.