Facile Algebraic Representation of a Novel Quaternary Logic
Research Paper | Journal Paper
Vol.4 , Issue.5 , pp.1-15, May-2016
Abstract
In this work, a novel quaternary algebra has been proposed that can be used to implement an arbitrary quaternary logic function in more than one systematic ways. The proposed logic has evolved from and is closely related to the Boolean algebra for binary domain; yet it does not lack the benefits of a higher-radix system. It offers seamless integration of the binary logic functions and expressions through a set of transforms and allows any binary logic simplification technique to be applied in quaternary domain. Since physical realization of the operators defined in this logic has recently been reported, it has become very important to have a well-defined algebra that will facilitate the algebraic manipulation of the novel quaternary logic and aid in designing various complex logic circuits. Therefore, based on our earlier works, here we describe the complete algebraic representation of this logic for the first time. The efficacy of the logic has been shown by designing and comparing several common logic circuits with existing designs in both binary and quaternary domain.
Key-Words / Index Term
Propositional Logic, Quaternary algebra, Quaternary Transformation, Sum-of-products
References
[1] Hurst, S.L; “Multiple-Valued Logic; its Status and its Future”, Computers, IEEE Transactions on, 33 (12), 1160-1179, (1984)
[2] Miller, D.M.; Thornton, M.A.; “Multiple Valued Logic: Concepts and Representations”, Synthesis Lectures on Digital Circuits and Systems, Morgan & Claypool Publishers, (2007)
[3] Smith, K.C.; “The Prospects for Multivalued Logic- A Technology and Applications View”, Computers, IEEE Transactions on, 30, 619-634, (1981)
[4] Fijany, A.; Vatan, F.; Mojarradi, M.; Toomarian, B.; Blalock, B.; Akarvardar, K.; Cristoloveanu, S.; Gentil, P.; “The G4-FET- a universal and programmable logic gate”, Proceedings of the 15th ACM Great Lakes symposium on VLSI (GLSVLSI 2005), 349-352, (2005)
[5] Keshavarzian, A.P.; Navi, K.; “Optimum Quaternary Galois Field Circuit Design through Carbon Nano Tube Technology”, Proceedings, International Conference on Advanced Computing and Communications (ADCOM 2007), 214-219, (2007)
[6] Balaji, B.; Malik, S. S.; “Design of Dual Dynamic Flip-Flop with Featuring Efficient Embedded Logic for Low Power CMOS VLSI Circuits”, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, 2 (9), 75-77, (2014)
[7] Kahrari, Z.; Karimi, G.; “A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology”, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, 4 (1), 14-16, (2016)
[8] Chattopadhyay, T.; Taraphdar, C.; Roy, J.N.; “Quaternary Galois field adder based all-optical multivalued logic circuits”, Applied Optics, 48 (22), E35-E44, (2009)
[9] Khan, M.H.A.; “Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits”, Engineering Letters, 15 (2), 203-207 (2007)
[10] Falkowski, B.J.; Rahardja, S.; “Generalised hybrid arithmetic canonical expansions for completely specified quaternary functions”, Electronics Letters, 37 (16), 1006-1007, (2001)
[11] Khan, M.H.A.; Siddika, N.K.; Perkowski, M.A.; “Minimization of Quaternary Galois Field Sum of Products Expression for Multi-Output Quaternary Logic Function Using Quaternary Galois Field Decision Diagram”, Proceedings, 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008), 125-130, (2008)
[12] Khan, M.M.M.; Biswas, A.K.; Chowdhury, S.; Tanzid, M.; Mohsin, K.M.; Hasan, M.; Khan, A.I.; “Quantum realization of some quaternary circuits”, Proceedings, TENCON 2008, IEEE Region 10 Conference, (2008)
[13] Yasuda, Y.; Tokuda, Y.; Zaima, S.; Pak, K.; Nakamura, T.; Yoshida, A.; “Realization of quaternary logic circuits by n-channel MOS devices”, Solid-State Circuits, IEEE Journal of, 21 (1), 162-168, (1986)
[14] Park, S.J.; Yoon, B.H.; Yoon, K.S.; Kim, H.S.; “Design of quaternary logic gate using double pass-transistor logic with neuron MOS down literal circuit”, Proceedings, 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 198-203, (2004)
[15] da Silva, R.C.G.; Boudinov, H.; Carro, L.; “A novel Voltage-mode CMOS quaternary logic design”, Electron Devices, IEEE Transactions on, 53 (6), 1480, (2006)
[16] Inaba, M.; Tanno, K.; Ishizuka, O.; “Realization of NMAX and NMIN functions with multi-valued voltage comparators”, Proceedings, 31st IEEE International Symposium on Multiple-Valued Logic (ISMVL 2001), 27-32, (2001)
[17] Datla, S.R.; Thornton, M.A.; “Quaternary Voltage-Mode Logic Cells and Fixed-Point Multiplication Circuits”, Proceedings, 40th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2010), 128-133, (2010)
[18] Chattopadhyay, T.; Roy, J.N.; “Polarization-encoded all-optical quaternary multiplexer and demultiplexer - A proposal”, Optik - International Journal for Light and Electron Optics, 120 (17), 941-946, (2009)
[19] Vranesic, Z. G.; Waliuzzaman, K. M.; “Functional transformation in simplification of multivalued switching functions”, IEEE Transactions on Computers, 21(1), 102-105 (1972)
[20] Jahangir, I.; Hasan, D.M.N.; Siddique, N.A.; Islam, S.; Hasan, M.M.; “Design of quaternary sequential circuits using a newly proposed quaternary algebra”, Proceedings, 12th International Conference on Computers and Information Technology (ICCIT 2009), 203, (2009)
[21] Das, A.; Jahangir, I.; Hasan, M.; Hossain, S.; “On the design and analysis of quaternary serial and parallel adders”, Proceedings, TENCON 2010, IEEE Region 10 Conference, 1691, (2010)
[22] Jahangir, I.; Das, A.; “On the design of quaternary comparators”, Proceedings, 13th International Conference on Computers and Information Technology (ICCIT 2010), 241, (2010)
[23] Jahangir, I.; Hasan, D.M.N.; Islam, S.; Siddique, N.A.; Hasan, M.M.; “Development of a novel quaternary algebra with the design of some useful logic blocks”, Proceedings, 12th International Conference on Computers and Information Technology (ICCIT 2009), 197, (2009)
[24] Jahangir, I.; Hasan, D.M.N.; Reza, M.S.; “Design of some quaternary combinational logic blocks using a new logic system”, Proceedings, TENCON 2009, IEEE Region 10 Conference, (2009)
[25] Das, A.; Jahangir, I.; Hasan, M.; “Optimization of sum of product expressions in a novel quaternary algebra”, Proceedings, International Conference on Informatics, Electronics & Vision (ICIEV), (2014)
[26] Jahangir, I.; Das, A.; Hasan, M.; “Design of novel quaternary encoders and decoders”, Proceedings, International Conference on Informatics, Electronics & Vision (ICIEV), (2012)
[27] Gogna, P.; Lingalugari, M.; Chandy, J.; Heller, E.; Hasaneen, E.S.; Jain, F.; “Quaternary logic and applications using multiple quantum well based SWSFETs”, International Journal of VLSI design & Communication Systems (VLSICS), 3(5), 27-42 (2012)
[28] Jain, F.C.; Chandy, J.; Miller, B.; Hasaneen, E.S.; Heller, E.; “Spatial wavefunction-switched (SWS)-FET: A novel device to process multiple bits simultaneously with sub-picosecond delays”, International Journal of High Speed Electronics and Systems, 20(03), 641-652 (2011)
[29] Gogna, P.; Suarez, E.; Lingalugari, M.; Chandy, J.; Heller, E.; Hasaneen, E.S.; Jain, F.C.; “Ge-ZnSSe Spatial Wavefunction Switched (SWS) FETs to Implement Multibit SRAMs and Novel Quaternary Logic”, Journal of electronic materials, 42(11), 3337-3343 (2013)
[30] Chattopadhyay, T.; Roy, J. N.; “All-optical quaternary computing and information processing: a promising path”, Journal of Optics, 42(3), 228-238 (2013)
[31] Huntington, E.V.; “Sets of Independent Postulates for the Algebra of Logic”, Transactions of the American Mathematical Society, 5 (3), 288-309, (1904)
[32] Khan, M.H.A.; “Quantum Realization of Quaternary Feynman and Toffoli Gates”, Proceedings, 4th International Conference on Electrical and Computer Engineering (ICECE 2006), 157–160, (2006)
[33] Khan, M.H.A.; Perkowski, M.A.; “GF(4) Based Synthesis of Quaternary Reversible-Quantum Logic Circuits”, Journal of Multiple-Valued Logic and Soft Computing, 13, 583-603, (2007)
Citation
Ifat Jahangir, Anindya Das, Masud Hasan, "Facile Algebraic Representation of a Novel Quaternary Logic," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.1-15, 2016.
A Survey: Network Regeneration by Software Defined Network (SDN and SDWN)
Survey Paper | Journal Paper
Vol.4 , Issue.5 , pp.16-20, May-2016
Abstract
n the world of information and communication technologies (ICT) ,the up-and-coming trends like (mobile, cloud and big data )are imposing new challenges for coming internet technologies where the high bandwidth ,ever-present accessibility and dynamic management exist .however the dependency of traditional networks on the manual configuration for network devices made it very error prone and hard task to accomplish. Recently one of the most hopeful solutions for future is software defined networks (SDN) which considered important technology for the management of complex and large scale networks which requires re-policing and reconfiguration between whiles. SDN achieves the reconfiguration easily by decoupling the data plane from control plane which enables the network devices (switches/ routers) to easily forward the packets depending on the flow table rules set by control plane .but the implementation of SDN in the wired domain doesn’t mean it will carry the same facility in the wireless domain as a wireless software defined (SDWN) which raises the radio –specific problems in relate to channel estimation and link isolation .
Key-Words / Index Term
Software defined networks(SDN), software defined wireless network (SDWN), OpenFlow, Computer networks, Network provisioning
References
[1] P.Rajput and P.Kulkarni “Survey on Wireless Malevolent Access Point Detection Methods”, Int. Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Apr 2106
[2] W. Xia, Y. Wen, Seni, C. HengFoh, H Xie “ A Survey on Software-Defined Networking”, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL.17, NO.1, FIRST QUARTER 2015
[3] P. Calhoun, IETF tool reference,”Control and provisioning of wireless access points (capwap)protocol specification”. RFC 5415, Mar. 2009.
[4] A. Bianco, R. Birke, L. Giraudo, and M. Palacin. “Openflow switching: Data plane performance”. Int IEEE Conference on Communications (ICC),ISBN: 978-1-4244-6402-9, Page No (1-5), may 23-27, 2010.
[5] P. Dely, A. Kassler, and N. Bayer,” Openflow for wireless mesh networks”. In 20th International Conference on Computer Communications and Networks (ICCCN),ISBN: 978-1-4577-0637-0, page(1-6),July 31/2011 – Aug4. 2011.
[6] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker.” Nox: towards an operating system for networks”. SIGCOMM Computer Communication Review, July 2008.
[7] M. Jarschel, S. Oechsner, D. Schlosser, R. Pries, S. Goll, and P. Tran-Gia.” Modeling and performance evaluation of an openflow architecture”. In 23rd International Teletraffic Congress (ITC), sept. 2011.
[8] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. “Openflow: enabling innovation in campus networks”. SIGCOMM Comput. Commun .Rev., 38(2), Mar. 2008.
[9] K.-K. Yap, S. Katti, G. Parulkar, and N. McKeown. “Delivering capacity for the mobile internet by stitching together networks”. In ACM workshop on Wireless of the students, by the students, for the students, 2010.
[10] K.-K. Yap, M. Kobayashi, D. Underhill, S. Seetharaman,P. Kazemian, and N. McKeown.” The stanford openroads deployment”. In 4th ACM international workshop on Experimental evaluation and characterization (WINTECH ’09), Beijing, China,Sept. 2009.
[11] A. Dixit et al. “Towards an elastic distributed SDN controller,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13). ACM, New York, NY,USA, 7-12.
[12] Open Network Foundation, “Conformance Test Specification for OpenFlow Switch Specification”, v1.0.1, June 13, 2013.
[13] R. Marks, A. de la Oliva and J.C. Zuñiga, “Proposed OmniRAN SDN Use Case for External Communication”, August 2013.
[14] IEEE P802.16r, “View of Connection-Oriented Software-Defined Networking for Wireless Backhaul of Small Cells”, July 2013.
[15] 3GPP, TS 32.500, Telecommunication Management; “Self-Organizing Networks (SON); Concepts and requirements”, December 2011.
Citation
Ruya j. Hussein, Murat Iskefiyeli , "A Survey: Network Regeneration by Software Defined Network (SDN and SDWN)," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.16-20, 2016.
Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks
Research Paper | Journal Paper
Vol.4 , Issue.5 , pp.21-24, May-2016
Abstract
Wireless sensor systems rearrange the gathering and investigation of information from numerous areas. Target tracking and edge interruption recognition applications are advantage from the specially appointed adhoc and self-association abilities of wireless sensor systems. Be that as it may, sensor systems conveyed in antagonistic situations must be strengthened against assaults by foes. This proposal inspects the limitations that make wireless sensor system observation testing and assesses calculations that give starting point respectability and information trustworthiness for wireless sensor systems. We propose another confirmation system. This performs superior to anything exiting strategies in terms of vitality utilization and deferral.
Key-Words / Index Term
Authentication, Secret Key, Cryptography, Private Key, Public Key
References
[1] Ismail Butun and Ravi Sankar.” Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks”. 2nd IEEE CCNC Research Student Workshop , 2011.
[2] Sharma S., Kumar D. (2013) “Wireless Sensor Networks- A Review on Topologies and Node Architecture”. International Journal of Computer Sciences and Engineering. Vol.-1(2), pp 19-25.
[3] Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues,2009.” Robust Dynamic User Authentication Scheme for Wireless Sensor Networks”proceeding of the 5th ACM symposium on QOS and security for wireless and mobile networks.
[4] Omar Cheikhrouhou1,2, Anis Koubaa3,4, Manel Boujelbenl, Mohamed Abid.” A Lightweight User Authentication Scheme forWireless Sensor Networks” International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010.
[5] X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. ”Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.” IEEE Transactions on Wireless Communications, Vol.6 (9), pp. 3395-3401, September 2007,
[6] Panoat chuchaisri, Richard Newman,”Fast Response PKCBased Broadcast Authenticationin Wireless Sensor Networks”, COLLABORATECOM 2010. DOI 10.4108/icst.collaboratecom.2010.
[7] Rasmita Rautray, Itun Sarangi(2011),” A Survey On Authentication Protocols For Wireless Sensor Network ” International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462.
[8] Huei-ru Tseng, Rong-Hong Jan, Wuu Yang,”An Improved Dynamic User Authentication Scheme for WSN” NSC 94- 2219-E-009-005.
[9] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693
[10] Jibi Abraham and K S Ramanatha ,“An Efficient Protocol for Authentication and Initial Shared key Establishment in clustered WSN”, Proceeding of third International conference on Wireless and optical Communication networks 2006.
[11] Omar Cheikhrouhou, Anis Koubaa, Manel Boujelbenl, Mohamed Abid 2010,” A lightweight user Authentication Scheme for WSN” international Conference on Sensor Networks,Ubiquitious, and Trustworthy Computing.
[12] Shamneesh Kumar, Dinesh Kumar and Keshav Kumar, “ Wireless Sensor Networks – A Review on Topologies and Node Architecture”, pp 19-25, Vol 1, issue 2, October, 2013.
Citation
Madhavi Karanam, "Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.21-24, 2016.
A Survey: Analytics of Web Log File Using Map Reduce and Hadoop
Survey Paper | Journal Paper
Vol.4 , Issue.5 , pp.25-30, May-2016
Abstract
The web is vast, diverse and dynamic and increases scalability, temporal data and multimedia issues respectively. The expansion of the Internet has given rise to a wealth of data as big data that is now available for user access. Different types of data must be managed and organized so that can be accessed by different users effectively and efficiently. The log analysis is an important issue for the web application. Log file is not to be over emphasized as a source of information in systems and network management. Whereas conduct efficient investigation and gathering of use full information need to correlate different log file. Task of analyzing event log files with the ever-increasing size and complexity of today’s event logs has become cumbrous to carry out manually. Nowadays latest spotlighted is automatic analysis of these logs files. This paper is a review of the basics of log analysis as big data in the web environment.
Key-Words / Index Term
Web Application, Log File, Data Mining, Big Data
References
[1]. Xiuqin Lin; Peng Wang; Bin Wu, "Log analysis in cloud computing environment with Hadoop and Spark," in Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on , vol., no., pp.273-276, 17-19 Nov. 2013
[2]. Chaofei Wang; Jing Chen; Xiaopeng Liu; Jinwei Zhao, "An improved deep log analysis method based on data reconstruction," in Cloud Computing and Intelligence Systems (CCIS), 2014 IEEE 3rd International Conference on , vol., no., pp.86-90, 27-29 Nov. 2014
[3]. da Silva Machado, Roger; Borges Almeida, Ricardo; Correa Yamin, Adenauer; Marilza Pernas, Ana, "LogA-DM: An Approach of Dynamic Log Analysis," in Latin America Transactions, IEEE (Revista IEEE America Latina) , vol.13, no.9, pp.3096-3102, Sept. 2015
[4]. Xiaokui Shu; Smiy, J.; Danfeng Yao; Heshan Lin, "Massive distributed and parallel log analysis for organizational security," in Globecom Workshops (GC Wkshps), 2013 IEEE , vol., no., pp.194-199, 9-13 Dec. 2013
[5]. Hingave, H.; Ingle, R., "An approach for MapReduce based log analysis using Hadoop," in Electronics and Communication Systems (ICECS), 2015 2nd International Conference on , vol., no., pp.1264-1268, 26-27 Feb. 2015
[6]. K Savitha and MS Vijaya , "Mining of Web Server Logs in a Distributed Cluster using Big Data Technologies" , International Journal of Advanced Computer Science and Applications (IJACSA), vol. 5 , 2014
[7]. T. K. Das , "BIG Data Analytics: A Framework for Unstructured Data Analysis" , International Journal of Engineering and Technology (IJET) , vol. 5 , no. 1 , 2013
[8]. Jiang Dawei, K.H. Antony and Gang Chen , "MAP-JOINREDUCE: Toward Scalable and Efficient Data Analysis on Large Clusters" , IEEE Transactions on Knowledge and Data Engineering, pp.1299 -1311 , 2011
[9]. Pavlo Andrew, Paulson Erik, Rasin Alexander, J. Daniel, J. David, De Witt, Samuel Madden and Michael Stonebraker , "A Comparison of Approaches to Large-Scale Data Analysis" , ACM SIGMOD International Conference on Management of data , pp.165 -178 , 2009
[10]. W. Xu, L. Huang, A. Fox, D. Patterson, M. Jordan. "Online System Problem Detection by Mining Patterns of Console Logs". In the Proceeding of ICDM '09 Proceedings of the 2009 Ninth IEEE International Conference on Data Mining.
[11]. AiLing Duan et. al. “Research and Practice of Distributed Parallel Search Algorithm on Hadoop_MapReduce”, 2012 International Conference on Control Engineering and Communication Technology, 2012 IEEE DOI 10.1109/ICCECT.2012.131, pp 105108
[12]. D. Agrawal, A. El Abbadi, S. Antony, and S. Das. Data Management Challenges in Cloud Computing Infrastructures. In DNIS, pages 1–10, 2010.
[13]. White paper on “Solution Brief Big Data in the Cloud: Converging Technologies , How to Create Competitive Advantage Using Cloud- Based Big Data Analytics.
[14]. Tharam Dillon et. al. “Cloud Computing: Issues and Challenges”, 2010 24th IEEE International Conference on Advanced Information Networking and Applications,
[15]. D. Agrawal, S. Das, and A. E. Abbadi. Big data and cloud computing: New wine or just new bottles? PVLDB, 3(2):1647– 1648.
[16]. Nacim Fateh Chikhi, Bernard Rothenburger, Nathalie Aussenac-Gilles “A Comparison of Dimensionality Reduction Techniques for Web Structure Mining”, Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence 2007, pp 116-119.
[17]. Lefteris Moussiades, Athena Vakali, "Mining the Community Structure of a Web Site," bci Fourth Balkan Conference in Informatics 2009, pp.239-244.
[18]. Toufiq Hossain Kazi, Wenying Feng and Gongzhu Hu, “Web Object Prefetching: Approaches and a New Algorithm”, IEEE 2010, pp 115-120.
[19]. Brijendra Singh and Hemant Kumar Singh, “Web Data Mining Research: A Survey”, IEEE 2010.
[20]. Kavita Sharma, Gulshan Shrivastava and Vikas Kumar, “Web Mining: Today and Tomorrow”, IEEE 2011, pp 399-403.
[21]. WANG Yong-gui and JIA Zhen, “Research on Semantic Web Mining” IEEE 2010, pp 67-70.
[22]. P. Sampath, C. Ramesh, T. Kalaiyarasi, S. Sumaiya Banu and G. Arul Selvan, “An Efficient Weighted Rule Mining for Web Logs Using Systolic Tree”, IEEE 2012, pp 432-436.
[23]. Nizar R. Mabroukeh and C. I. Ezeife, “Semantic-rich Markov Models for Web Prefetching”, IEEE 2009, pp 465-470.
[24]. A.B.M.Rezbaul Islam and Tae-Sun Chung, “An Improved Frequent Pattern Tree Based Association Rule Mining Technique”, IEEE 2011.
[25]. R.Agrawal, and R.Srikant, “Fast algorithms for mining association rules”, In VLDB’94, pp. 487-499, 1994 Borges and M. Levene,”A dynamic clustering-based markov model for web usage Mining”, cs.IR/0406032, 2004.
[26]. Zhu, J., Hong, J. and Hughes, J. G. (2002a) Using Markov Chains for Link Prediction in Adaptive Web Sites. In Proc. of Soft-Ware 2002: the First International Conference on Computing in an Imperfect World, pp. 60-73, Lecture Notes in Computer Science, Springer, Belfast, April.
[27]. K.Ramu Dr.R.Sugumar and B.Shanmugasundaram “A Study on Web Prefetching Techniques” Journal of Advances in Computational Research: An International Journal Vol. 1 No. 1-2 (January-December, 2012)
Citation
Rahul Pateriya, Nishchol Mishra, Sanjeev Sharma, "A Survey: Analytics of Web Log File Using Map Reduce and Hadoop," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.25-30, 2016.
An Analysis of 16 Channel 64 User Hybrid WDM/TDM Topology in the Optiwave Simulation Environment
Research Paper | Journal Paper
Vol.4 , Issue.5 , pp.31-35, May-2016
Abstract
The aim of the present work is to demonstrate the concept of a packet- interleaved WDM system i.e; hybrid optical access network, which serve as the important candidate of next generation access networks. The entire network topology design was simulated in the OPTIWAVE development environment, consisting of transmitter, channel and receiver section. Each section is elaborated, while the analysis of measured values from topology is presented in the last part of the article.
Key-Words / Index Term
Hybrid PON, WDM, TDM, APD
References
[1] KIMURA, S. WDM/TDM-PON Technologies for Future Flexible Optical Access Networks, In: OptoeElectronics and Communications Conference (OECC), IEEE, 2010. pp. 14 – 15, ISBN 978-1-4244-6785-3
[2] AHSAN, Shamim; LEE, Seop, Man. Migration to the Next Generation Optical Access Networks Using Hybrid WDM/TDMPON, Vol. 6, No. 1, pp. 18-25, , Journal of Networks, 2011.
[3] LEE, S.; KIM, E.; LEE, Y.; LEE, S.; JUNG, D.; HWANG, S.; OH, Y.; PARK, J. A design of WDM/TDM-PON provisioning for future optical access network upgrade. IEICE TRANSACTIONS on Communications, Vol. E90-B, No. 9, pp. 2456-2463,2007.
[4] Mozhgan Mahloo, Jiajia Chen, and Lena Wosinska, Abhishek Dixit, Bart Lannoo, and Didier Colle, “Toward Reliable Hybrid WDM/TDM Passive Optical Networks”, IEEE Communications Magazine, February 2014.
[5] Optiwave . Available at WWW:
Citation
Aasif Bashir Dar, Furqan Zahoor, Rakesh Kumar Jha, Neeraj Tripathi and Manish Sabraj, "An Analysis of 16 Channel 64 User Hybrid WDM/TDM Topology in the Optiwave Simulation Environment," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.31-35, 2016.
Clustering Incomplete Mixed Numerical and Categorical Datasets using Modified Squeezer Algorithm
Research Paper | Journal Paper
Vol.4 , Issue.5 , pp.36-41, May-2016
Abstract
Clustering incomplete mixed numerical and categorical datasets is one of the challenging task. Traditional algorithms like k-prototype algorithm is used for mixed dataset, but is limited to only complete datasets. To handle such incomplete datasets we use modified squeezer algorithm, which includes the new dissimilarity measure for incomplete dataset with mixed numerical and categorical attribute values. In this modified squeezer algorithm it not only cluster the incomplete dataset, it also need not to input the missing values and need not to initialize any clusters at the beginning. This algorithm is compared with traditional k-prototype algorithm on benchmark datasets. The experimental results shows that the modified squeezer algorithm gives better accuracy than the traditional algorithm and also it overcomes the limitation of initial clusters.
Key-Words / Index Term
mixed dataset, k-prototype, modified squeezer algorithm, dissimilarity measure
References
[1] M.V.Jagannatha Reddy and Dr. B. Kavitha, “clustering mixed numerical and categorical dataset using similarity weight and filter method”, International journal of Database Theory and Applications, vol-5, no-1 March- (2012), pp-121-134
[2] H. Zhexue, “Extension to the K-means algorithm for clustering large data sets with categorical values”, Data Mining and Knowledge Discovery, (1998), pp. 283-304.
[3] T. Covões and E. Hruschka, “A study of K-Means-based algorithms for constrained clustering”, Intelligent Data Analysis, vol. 17, no. 3, (2013), pp. 485-505.
[4] H. Zhexue, “Clustering large data sets with mixed numeric and categorical values”, Proceedings of the 1th pacific-Asia Conference on Knowledge Discovery & Data Mining. Singapore: World Scientific, (1997), pp. 21-34.
[5] W. Qian, W. Cheng and F. Zhenyuan, “Summary of k-means clustering algorithm”, Electronic Design Engineering, vol. 20, no. 7, (2012), pp. 21-24.
[6] C. Dan and W. Zhenhua, “A K-prototypes Algorithm Based on Improved Initial Center Points”, Computer Knowledge and Technology, (2010) November.
[7] C. Sotirios, “A fuzzy c-means-type algorithm for clustering of deal with mixed numeric and categorical attributes employing a probabilistic dissimilarity functional”, Expert Systems with Applications, vol. 38, no. 7, (2011), pp. 8684-8689.
[8] W. Fengmei and H. Lixia, “A Missing Data Imputation Method Based on Neighbor Rules”, Computer Engineering, vol. 38, no. 21, (2012).
[9] X. Fang and Z. Guizhu, “Clustering algorithm based on Modified Shuffled Frog Leaping Algorithm and K-means”, Computer Engineering and Applications, vol. 49, no. 1, (2013), pp. 176-180.
[10] Takashi Furukawa, Shin-ichi Ohnishi, and Takahiro Yamanoi “On a Fuzzy c-means Algorithm for Mixed Incomplete Data Using Partial Distance and Imputation” Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong.
[11] Vaishali H. Umathe, Prof. Gauri Chaudhary. “A Review on Incomplete Data And Clustering” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015, pp 1225-1227
[12] J. Twisk, M. de Boer, W. de Vente and M. Heymans, “Multiple imputation of missing values was not necessary before performing a longitudinal mixed-model analysis”, Journal of Clinical Epidemiology, vol. 66, no. 9, (2013), pp. 1022-1028.
[13] Wu Sen, Chen Hong and Feng Xiaodong “Clustering algorithm for incomplete data sets with mixed numeric and categorical Attributes” IJDTA, vol. 6 No. 5 2013, pp 95-104.
[14] W. Guoyin, “Expansion in the theory of rough set in incomplete information system”, Journal of computer research and development, vol. 33, no. 10, (2002), pp. 1239-1240.
Citation
M.V.Jagannatha Reddy, B.Kavitha, "Clustering Incomplete Mixed Numerical and Categorical Datasets using Modified Squeezer Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.36-41, 2016.
A Novel Approach for Detection of Fraud Using SOM
Research Paper | Journal Paper
Vol.4 , Issue.5 , pp.42-46, May-2016
Abstract
Fraud refers to abuse of organization’s system illegally. Fraud is the crime or offense of deliberately deceiving in order to damage them to obtain property or services unjustly. Fraud can be accomplished through the aid of forged objects. The scope of this paper is to investigate whether data mining techniques can be used for detecting fraud.
Key-Words / Index Term
Fraud, Data Mining,Neural Computing,Self Organizing Map
References
[1] S. Ghosh and D.L Reilly,”Credit Card fraud detection with a neural network.”in proc. Of 27th Hawaii Int. conf. syst. Sci.,pp.621-630.
[2] K. Fanning ; K. O. Cogger ; R. Srivastava,”Detection of Management Fraud”, Publication Year: 1995, Page(s):220- 223
[3] G. C. Y. B. N. Grozavu, "Unsupervised Learning for Analyzing the Dynamic Behavior of Online Banking Fraud," International Conference on Data Mining Workshops IEEE, 2013.
[4] Using data mining to detect fraud.SPSS technical report.2000.
[5] Fuzail Misarwala, KausarMukadam, and Kiran Bhowmick, "Applications of Data Mining in Fraud Detection", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (45-53), Nov -2015, E-ISSN: 2347-2693.
[6] Philip K. Chan,Wei Fan and J Stolfo,1999,IEEE Distributed Data Mining in credit card fraud detection.
[7] L. A. V. D. A. M. d. C. F. S. M. Emanuel Mineda Carneiro, "Cluster Analysis and Artificial Neural Networks : A Case Study in Credit Card Fraud Detection," International Conference on Information Technology - New Generations IEEE, 2015.
[8] Teuvo Kohonen,”The Self-Organizing Map", Proceedings of the IEEE 78, no.9(sept 1990).
[9] Fanning, K. and K. Cogger (1998). Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management 7, 21-41.
[10] Jiwei Han & Kamber,“Data Mining Concepts and Techniques".
[11] Yufeng Kou,Chang-Tien lu,Sirirat Sinvongwattana Yo-ping Huang,”Survey Of Fraud Detection Techniques "Proceedings Of 2004 IEEE Intern. Conf. On networking,Taipei,March 21-23,2004.
[12] K. Chikin and I. Shlyik, “Countering Illegal Transactions in Internet Purchasing Systems,” World of Cards 7 (2002): 15-21.
[13] Bhatla, Prabhu, and Dua, “Understanding Credit Card Frauds.”
[14] T. Kohonen, "An introduction to neural networks", Neural Networks, vol. 1, pp. 3-16, 1988
Citation
Swati Sucharita Barik, "A Novel Approach for Detection of Fraud Using SOM," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.42-46, 2016.
A Study on Security Threats in Manets
Review Paper | Journal Paper
Vol.4 , Issue.5 , pp.47-53, May-2016
Abstract
MANETs have very unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are sensitive to different types of attacks in different layers of protocol stack. Each node in a MANETs is capable of acting as a router. Routing is one of the aspects having various security concerns. MANETs has no rigid line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of mischievous nodes, one of the main challenges in MANETs is to design the robust security solution that can protect MANETs from various routing attacks. This paper present survey of common attacks on network layer namely Black-hole, Wormhole and Gray-hole attack which are serious threats for MANETs. This paper also discusses some proposed solutions which help to detect and prevent these attacks. MANETs can operate in isolation or in coordination with a wired infrastructure, often via a gateway node participating in both networks for traffic relay. This flexibility, along with their self-organizing powers, is one of MANET's biggest strengths, as well as their biggest security weaknesses.
Key-Words / Index Term
MANETs; Security; Attacks; Wormhole Attack; Black-hole Attack; Gray-hole Attack
References
[1] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[2] Bo-Cang Peng and Chiu-Kuo Liang “Prevention techniques for flooding attack in Ad Hoc Networks”, IEEE, 2006
[3] Douglas S. J. De Couto, Daniel Aguayo, John Bicket, and Robert Morris, “A High-Throughput Path Metric for Multi-Hop Wireless routing”, in ACM Mobicom, 2003.
[4] D.M. Shila, and T. Anjali, “Defending selective forwarding attacks in WMNs”, IEEE International Conference on Electro/Information Technology, 2008, 96-101.
[5] X.P. Gao; and W. Chen, “A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[C]”, IFIP International Conference on Network and Parallel Computing Workshops, 2007, 209-214.
[6] Hongmei Deng, Wei Li, and Dharma P.Agrawal,“Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazine, vol. 40,Issue: 10, 2002
[7] Tamilselvan L, and Sankaranarayanan V, “Prevention of Black hole Attack in MANET”, Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007.
[8] Payal N. Raj and Prashant B. Swadas,”DPRAODV: A dynamic learning system against black hole attack in AODV based Manet”, International Journal of Computer Science Issues (IJCSI), Vol. 2, Issue 3, pp.: 54-59,
[9] Nital Mistry, Devesh C Jinwala, Member, IAENG, and Mukesh Zaveri, “Improving AODV Protocol against Black hole Attacks”, IMECS2010
[10] Hakem Beitollahi ⇑, Geert Deconinck (2012), Analysing well-known countermeasures against distributed denial of service attacks, Elsevier journal, vol 35, pages 1312-1332.
[11] Ningrinla Marchang a, Raja Datta (2008), Collaborative techniques for intrusion detection in Mobile ad-hoc networks, Elsevier journal, vol 6, pages 508-523.
[12] Sudip Misra, P. Venkata Krishna,_, Kiran Isaac Abraham, Navin Sasikumar, S. Fredun(2010), An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Elsevier journal,vol. 60,pages 294-306.
[13] Hung-Jen Liao, Chun-HungRichardLin, Ying-ChihLin, Kuang-YuanTung (2013), Intrusion detection system: A comprehensive review, Elsevier journal, vol.36, pages 16-24.
[14] Shelly Xiaonan Wu, Wolfgang Banzhaf (2010), the use of computational intelligence in intrusion detection systems: A review, Elsevier journal, vol.10, pages 1-35
[15] Adrian P. Lauf, Richard A. Peters, William H. Robinson(2010), A distributed intrusion detection system for resource-constrained devices in ad-hoc networks, Elsevier journal,vol.8,pages 253-266
Citation
Vaidya Omkar, Gautam Amiya, N Jaisankar, "A Study on Security Threats in Manets," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.47-53, 2016.
Quality Maintenance Effort Optimization in Software Industry
Case Study | Journal Paper
Vol.4 , Issue.5 , pp.54-65, May-2016
Abstract
This paper conceptualizes a very important Software Process metric Cost of Quality (COQ) in different aspects and provides ways to optimize its value through prior activity planning and implementing the tasks according to the pre-planned effort distribution. The solution is built based on the analogy between effort and real life cost expenditure. While the solution is direct, it deals with multiple pre-requisites like understanding the components of COQ, setting its limits which ensures both quality and budget. There are multiple important sub concepts coming out of it like Systematic Planning, Wastage Elimination, Prioritization of Tasks, and Modulated Effort leading to generation of regulated COQ value as Output. This article showcases the Pilot Results as experienced from few real life projects from one organization and simulated the real life scenario through step by step utilization of the proposed solution. The result shows that proposed solution is able to reduce variance by approx. 99% while achieving the sigma level improvement of approx. 3σ. The solution also ensures many potential benefits in many aspects like identifying gaps / quality vulnerabilities based on previous performances, prioritization of task, maintenance of balance between Cost & Quality, controlled utilization of available resources, waste identification, quantification & elimination.
Key-Words / Index Term
Cost of Quality, Wastage Elimination, MUDA Wastes, Cost-Quality Balance, Cost Optimization, Quality Vulnerability, Quality Maintenance Effort
References
[1] The Cost of Quality | 2012-11-02 | Quality Magazine, September 12 – 17 2016, The Cost of Quality.
http://www.qualitymag.com/articles/90842-the-cost-of-quality
[2] What is planning and why you need to plan, in_cr_ove’s TQM School: Cost Of Quality (COQ) by Sanjeev Dhawan.
http://www.tqmschool.com/articles/TQM%20-%20Cost%20of%20Quality.pdf
[3] Cost of Quality article shows how much it can be and the cost elements.
http://www.halfcostproducts.com/cost_of_quality.htm
[4] QUALITY DIGEST / ARTICLE / GODFREY, Quality Management: Cost of Quality Revisited by A. Blanton Godfrey.
http://www.qualitydigest.com/apr/godfrey.html
[5] Cost of Quality: Not Only Failure Costs, Arne Buthmann.
http://www.isixsigma.com/implementation/financial-analysis/cost-quality-not-only-failure-costs/
[6] Cost of Quality (COQ) – ASQ, Excerpted from The ASQ Quality Improvement Pocket Guide: Basic History, Concepts, Tools, and Relationships, Grace L. Duffy, ASQ Quality Press, 2013, pages 62–65.
[7] Quality Costs – Wikipedia, the free encyclopedia, 9 April 2016, at 20:38
https://en.wikipedia.org/wiki/Quality_costs
[8] Managing Quality: Modeling the Cost of Quality Improvement, Arthur B. Jeffery, University of South Alabama.
http://www.cameron.edu/uploads/images/4496/Article_-47x10.25.pdf
[9] Quality Costs-Four Types of Quality Cost-Prevention-Appraisal Costs|Internal-External Failure Costs-Definition|Examples.
http://www.accountingdetails.com/quality_costs.htm
[10] iSix Sigma: Defect Prevention: Reducing Costs and Enhancing Quality, Mukesh Soni
http://www.isixsigma.com/industries/software-it/defect-prevention-reducing-costs-and-enhancing-quality/
[11] Sakthi Kumaresh et. al., Defect Analysis and Prevention for Software Process Quality Improvement, International Journal of Computer Applications (0975 – 8887) Volume 8– No.7, October 2010.
http://www.ijcaonline.org/volume8/number7/pxc3871759.pdf
[12] The Importance of Daily and Weekly Planning.
http://www.lifehack.org/articles/lifestyle/the-importance-of-daily-and-weekly-planning.html
[13] What is planning and why you need a plan.
http://www.time-management-guide.com/planning.html
[14] 7 Wastes Muda Article on the Seven Wastes of Lean Manufacturing, August 29, 2003, David McBride
http://www.emsstrategies.com/dm090203article2.html
[15] The Seven Wastes | 7 Mudas | Lean Manufacturing Tools.
http://leanmanufacturingtools.org/77/the-seven-wastes-7-mudas/
[16] Transient State and Steady State Response of Control System | Electrical4u.com.
http://www.electrical4u.com/transient-state-and-steady-state-response-of-control-system/
[17] Steady state – Wikipedia, the free encyclopedia, 20 May 2016, at 09:25
https://en.wikipedia.org/wiki/Steady_state
[18] Transient response – Wikipedia, the free encyclopedia, 16 April 2016, at 18:18
https://en.wikipedia.org/wiki/Transient_response
[19] Affect of Six Sigma Methdology on Reliability and Quality of Product, IJCSE Research Paper Volume-3, Issue-8, E-ISSN: 2347-2693, Aug/30/2015,
Kumar Shashvat1*, Arshpreet Kaur2, Raman Chadha, Department of Computer Science and Engineering, Punjab Technical University, India.
http://www.ijcseonline.org/pdf_paper_view.php?paper_id=615&17-IJCSE-01238.pdf
Citation
Suvra Nandi , "Quality Maintenance Effort Optimization in Software Industry," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.54-65, 2016.
Survey on Black Hole and Gray Hole Attacks in MANET
Survey Paper | Journal Paper
Vol.4 , Issue.5 , pp.66-70, May-2016
Abstract
Mobile Ad hoc Network (MANET) is one of the most promising technologies in the recent years. In MANET, a wireless network is quickly formed using mobile nodes. Because of its characteristics such as open and undefined medium, limited resources, offering a secure data transmission in presence of malicious nodes in the network is main issues of the MANET. The black hole and gray hole attacks are major security threats in MANET, in which the packets are dropped in intermediate nodes. The main objective of this paper is to study the techniques used to eliminate the packet drop in intermediate nodes using malicious node detection techniques. In this paper, various malicious node detection methods such as Local anomaly detection and Cooperative anomaly detection , Fuzzy and wavelet transform based IDS system , Modified DSR protocol , Kullback-Leibler divergence approach, FireCol , hash function based method and cooperative bait detection scheme (CBDS) are studied and analyzed. The findings of this work proved that the cooperative bait detection achieves better results than the other approaches in terms of packet delivery ratio and end-to-end delay.
Key-Words / Index Term
MANET, Black Hole Attack, Gray Hole Attack and Bait Detection Mechanism
References
[1] Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamuralidhar, ”A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks”,IEEE, January 2007.
[2] Yu Chen, Kai Hwang, and Wei-Shinn Ku, "Collaborative detection of DDoS attacks over multiple network domains", IEEE Transactions on Parallel and Distributed Systems, Volume 18, Issue 12, pp. (1649-1662), December 2007.
[3] Bharat Bhargava, Ruy De Oliveira, Yu Zhang, and Nwokedi C. Idika, "Addressing collaborative attacks and defense in ad hoc wireless networks" IEEE International Conference on Distributed Computing Systems Workshops (ICDCS), pp. (447-450), June 2009. ISBN : 978-0-7695-3660-6
[4] Weichao Wang, Bharat Bhargava, and Mark Linderman, "Defending against collaborative packet drop attacks on MANETs", International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009), New York, USA, Volume 27, 2009.
[5] Vishnu, K and Amos J. Paul, "Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks", International Journal of Computer Applications, Volume 1, Issue 22 pp. (38-42), February 2010.
[6] Mohanapriya, M, Ilango Krishnamurthi , “ Modified DSR protocol for detection and removal of selective black hole attack in MANET” , Elsevier, pp. (530-538), February 2014.
[7] Yang Xiang, Ke Li, and Wanlei Zhou, "Low-rate DDoS attacks detection and traceback by using new information metrics", IEEE Transactions on Information Forensics and Security, Volume 6, Issue 2, pp. (426-437), January 2011.
[8] Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao, and Jiann-Liang Chen, "CBDS: a cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture", Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology (Wireless VITAE), 2nd International Conference, pp. (1-5). IEEE, February 2011.
[9] Jerome Francois, Issam Aib, and Raouf Boutaba, "FireCol: a collaborative protection network for the detection of flooding DDoS attacks", IEEE/ACM Transactions on Networking (TON) Volume 20, Issue 6 pp. (1828-1841), April 2012.
[10] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai (2015), “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach” IEEE systems journal, Volume 9, Issue 1, pp. (65-75), January 2015.
Citation
M. Nachammai and N. Radha, "Survey on Black Hole and Gray Hole Attacks in MANET," International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.66-70, 2016.