Dynamic Resource Allocation in Cognitive Radio Networks – Priority Scheduling approach: Literature Survey
Survey Paper | Journal Paper
Vol.4 , Issue.8 , pp.1-11, Aug-2016
Abstract
In this paper we presents a comprehensive literature survey of cognitive radio technology, focusing on its application to dynamic resource allocation, based on priority scheduling approach. Dynamic spectrum access provides resource sharing between primary users called licensed users (PUs) and Secondary Users called unlicensed users (SUs). An essential examination test is that in what capacity ought to be apportioned or relegated accessible unused range to unlicensed clients. The fitting bit of unmoving repeat range existing together learned radios while enhancing hard and fast transmission limit usage furthermore minimizing impedance is required for the profitable extent use in CRN. The system for settled extent segment came to fruition to less range utilization over the entire reach. In this paper we presented the different approaches used for dynamic resource allocation and scheduling in heterogeneous Cognitive radio networks.
Key-Words / Index Term
Cognitive Radio; Energy; OFDM; Resource Allocation; Spectrum sensing; Heterogenitive services
References
[1]. Anita Garhwal, Partha Pratim Bhattacharya, “A Survey on Dynamic Spectrum Access Techniques for Cognitive Radio†International Journal of Next-Generation Networks (IJNGN) Vol.3, No.4, Dec 2011, DOI: 10.5121/ijngn.2011.3402, PP: 15-32.
[2]. S.Tamilarasan, Dr. P.Kumar, “A Study and Analysis of Dynamic Spectrum Networks Using Cognitive Radio in Wireless Ad-Hoc Networksâ€, IJCST Vo. l. 6, Issue 2, April - June 2015, ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print), PP: 217-221.
[3]. Kang g. Shin, hyoil kim, alexander w. Min, ashwini kumar, U Niversity of Michigan, “Cognitive Radios For Dynamic Spectrum Access: From Concept To Realityâ€, 1536-1284/10/$25.00 © 2010 IEEE, IEEE Wireless Communications • December 2010, PP: 64-74.
[4]. Pinki Yadav, Subhajit Chatterjee, Partha Pratim Bhattacharya, “A Survey on Dynamic Spectrum Access Techniques in Cognitive Radioâ€, International Journal of Next-Generation Networks (IJNGN) Vol.4, No.4, December 2012, DOI: 10.5121/ijngn.2012.4403, PP: 27-46.
[5]. Badr Benmammar, Asma Amraoui, Francine Krief, “A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networksâ€, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 5, No. 2, August 2013, PP: 68-79.
[6]. Goutam Ghosh, Prasun Das, Subhajit Chatterjee, “Cognitive Radio And Dynamic Spectrum Access – A Studyâ€, International Journal of Next-Generation Networks, DOI: 10.5121/ijngn.2014.6104, PP: 43-60.
[7]. Elesa Ntuli, Fisseha Mekuria, Seleman Ngwira, Tranos Zuva, “A Review of Dynamic Spectrum Networks Using Cognitive Radioâ€, Proceedings of the World Congress on Engineering and Computer Science 2014 Vol II, WCECS 2014, 22-24 October, 2014, San Francisco, USA
[8]. Stefan Geirhofer, Lang Tong and Brian M. sadler “Measurement-Based Model for Dynamic Spectrum Access in WLAN Channel†communication and network consortium 19 July 2011.
[9]. Prabhjot Kaur, Arun Khosla (2011), “Markovian Queuing Model for Dynamic Spectrum Allocation in Centralized Architecture for Cognitive Radiosâ€, IACSIT, Vol. 3, no. 1, pp 1-4.
[10]. Partha Pratim Bhattacharya, Ronak Khandelwal, Rishita Gera, Anjali Agarwal, (2011), “Smart Radio Spectrum Management for Cognitive Radioâ€, International Journal of Computer Networks and Communications, Vol. 3, no. 4.
[11]. Partha Pratim Bhattacharya, Ronak Khandelwal, Rishita Gera, Anjali Agarwal, “Smart Radio Spectrum Management for Cognitive Radioâ€, International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.4, July 2011, PP: 12-24, DOI : 10.5121/ijdps.2011.2402
[12]. Peng Cheng, Anjin Guo, Youyun Xu, Xuyu Wang, Xinbo Gao, “A Game Approach for Dynamic Resource Allocation in Cognitive Radio Networks†IEEE - 2010.
[13]. Yahia Tachwali, Brandon F. Lo, Ian F. Akyildiz, “Multiuser Resource Allocation Optimization Using Bandwidth-Power Product in Cognitive Radio Networksâ€, IEEE journal on selected areas in communications, vol. 31, no. 3, march 2013, PP: 451-463
[14]. S.Tamilarasan, P.Kumar, “A Survey on Dynamic Resource Allocation in Cognitive Radio Networksâ€, International Journal of Computer Sciences and Engineering, Vol.-4(7), PP(86-93) Jul 2016, E-ISSN: 2347-2693
[15]. Renchao Xie, F.Richard Yu, Hong Ji, “Spectrum Sharing and Resource Allocation for Energy-Efficient Heterogeneous Cognitive Radio Networks with Femtocellsâ€, IEEE ICC 2012 - Cognitive Radio and Networks Symposium, PP: 1661-1665
[16]. Yinglei Teng Yuanyuan Liu Yong Zhang, “An Energy Efficient Resource Allocation in Cognitive Radio Networks with Pairwise NBS Optimization for Multi-Secondary Usersâ€, 2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC, PP: 744-749
[17]. Mehdi Ghamari Adian, Hassan Aghaeinia, “Optimal resource allocation for opportunistic spectrum access in multiple-input multiple-output –orthogonal frequency division multiplexing based cooperative cognitive radio networksâ€, IET Signal Process., 2013, Vol. 7, Issue. 7, pp. 549–557.
[18]. Jin-Ling Xu, Ming Chen, Nan Wang, “Optimal Cooperative Sensing and Resource Allocation in Cognitive Radio Networksâ€, 978-1-4799-0308-5/13/$31.00 © 2013 IEEE.
[19]. Jeison Marin Alfonso, Leonardo Betancur Agudelo, “Centralized Spectrum Broker and Spectrum Sensing with Compressive Sensing Techniques for Resource Allocation in Cognitive Radio Networksâ€, IEEE-2013
[20]. Cunhao Gao, Shan Chu, and Xin Wang, “Distributed Scheduling in MIMO Empowered Cognitive Radio Ad Hoc Networksâ€, IEEE Transactions On Mobile Computing, VOL. 13, NO. 7, JULY 2014, PP: 1456-1468
[21]. Didem G¨oz¨upek, Fatih Alag¨oz, “A Fair Scheduling Model for Centralized Cognitive Radio Networksâ€, IEEE-2013.
[22]. Yang Li, Aria Nosratinia, “Hybrid Opportunistic Scheduling in Cognitive Radio Networksâ€, IEEE Transactions On Wireless Communications, VOL. 11, NO. 1, JANUARY 2012, PP: 328-337
[23]. Hongjuan Li Xiuzhen Cheng, Keqiu Li , Xiaoshuang Xing, Tao Jing, “Utility-Based Cooperative Spectrum Sensing Scheduling in Cognitive Radio Networksâ€, 2013 Proceedings IEEE INFOCOM, PP: 165-169
[24]. Renchao Xie, F. Richard Yu, Hong Ji, “Dynamic Resource Allocation for Heterogeneous Services in Cognitive Radio Networks With Imperfect Channel Sensingâ€, IEEE Transactions On Vehicular Technology, VOL. 61, NO. 2, FEBRUARY 2012, PP: 770-780.
[25]. Paulo M. R. dos Santos, Mohamed A. Kalil, Oleksandr Artemenko, Anastasia Lavrenko, Andreas Mitschele-Thiel, “Self-Organized Common Control Channel Design for Cognitive Radio Ad Hoc Networksâ€, 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Mobile and Wireless Networks, PP: 2419-2423.
[26]. Sang-Seon Byun, “TCP over scarce transmission opportunity in cognitive radio networksâ€, Computer Networks 2016 Elsevier B.V. PP: 101-114.
[27]. Ayman AbdelHamid, Prashant Krishnamurthy, and David Tipper, “Resource Scheduling For Heterogeneous Trafï¬c in LTE Virtual Networks†2015 16th IEEE International Conference on Mobile Data Management, PP: 173-178.
[28]. Shaowei Wang, Zhi-Hua Zhou, Mengyao Ge and Chonggang Wang, “Resource Allocation for Heterogeneous Cognitive Radio Networks with Imperfect Spectrum Sensingâ€, IEEE INFOCOM 2012, PP:1-12
[29]. M. Shamim Kaiser and Kazi M. Ahmed, “Radio Resource Allocation for Heterogeneous Services in Relay Enhanced OFDMA Systemsâ€, Journal of Communications, VOL. 5, NO. 6, JUNE 2010, PP: 447-454.
[30]. Alia Asheralieva, Jamil Y. Khan, Kaushik Mahata, “Dynamic Resource Allocation in a LTE/WLAN Heterogeneous Networkâ€, IV International Congress on Ultra-Modern Telecommunications and Control Systems 2012, IEEE, PP: 96-102.
[31]. Afaz Uddin Ahmed, Mohammad Tariqul Islam, Mahamod Ismail, Mohammad Ghanbarisabagh, “Dynamic Resource Allocation in Hybrid Access Femtocell Networkâ€, The Scientiï¬c World Journal Volume 2014, Article ID 539720, PP: 1-7
[32]. Vahid Asghari, Sonia Aissa, “Resource Management in Spectrum-Sharing Cognitive Radio Broadcast Channels: Adaptive Time and Power Allocationâ€, IEEE Transactions on Communications, VOL. 59, NO. 5, MAY 2011
[33]. Renchao Xie, Hong Ji, Pengbo Si, YiL, “Dynamic Channel and Power Allocation in Cognitive Radio Networks Supporting Heterogeneous Servicesâ€, IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings.
[34]. Patrick Mitran, Long Bao Le, Catherine Rosenberg, “Queue-Aware Resource Allocation for Downlink OFDMA Cognitive Radio Networksâ€, IEEE Transactions On Wireless Communications, VOL. 9, NO. 10, OCTOBER 2010, PP: 3100-3111.
[35]. Changqing Luo, F. Richard Yu Hong Ji, “Cross-Layer Design for TCP Performance Improvement in Cognitive Radio Networksâ€, IEEE Transactions On Vehicular Technology, VOL. 59, NO. 5, JUNE 2010
[36]. Keqin Liu, Qing Zhao, Bhaskar Krishnamachari, “Dynamic Multichannel Access With Imperfect Channel State Detectionâ€, IEEE Transactions On Signal Processing, VOL. 58, NO. 5, MAY 2010, PP: 2795-2808
[37]. Zhiqiang Li, F. Richard Yu, Minyi Huang, “A Distributed Consensus-Based Cooperative Spectrum-Sensing Scheme in Cognitive Radiosâ€, IEEE Transactions on Vehicular Technology, VOL. 59, NO. 1, JANUARY 2010 PP: 383-393.
[38]. Yonghong Zhang, Cyril Leung, “Cross-Layer Resource Allocation for Mixed Services in Multiuser OFDM-Based Cognitive Radio Systemsâ€, IEEE Transactions on Vehicular Technology, VOL. 58, NO. 8, OCTOBER 2009, PP: 4605-4619.
[39]. Rahul Urgaonkar, Michael J. Neely, “Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networksâ€, IEEE Transactions On Mobile Computing, VOL. 8, NO. 6, JUNE 2009, PP:766-777
[40]. Long Bao Le, Ekram Hossain, “Resource Allocation for Spectrum Underlay in Cognitive Radio Networksâ€, IEEE Transactions On Wireless Communications, VOL. 7, NO. 12, December 2008
[41]. Fan Wang, Marwan Krunz, and Shuguang Cui, “Price-Based Spectrum Management in Cognitive Radio Networksâ€, IEEE Journal Of Selected Topics In Signal Processing, VOL. 2, NO. 1, February 2008, PP: 74-87.
[42]. Lan Zhang, Ying-Chang Liang, YanXin, “Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networksâ€, IEEE Journal On Selected Areas In Communications, VOL. 26, NO. 1, January 2008, PP: 38-51.
[43]. Hui Chen, Fei Yu, Henry C. B. Chan, Victor C. M. Leung, “A Novel Multiple Access Scheme over Multi-Packet Reception Channels for Wireless Multimedia Networksâ€, IEEE Transactions On Wireless Communications, VOL. 6, NO. 4, APRIL 2007, PP:1501-1511
[44]. C.K.Tan, T.C. Chuah, S.W.Tan, “Resource allocation for OFDMA-based multicast cognitive radio networks using a Stackelberg pricing gameâ€, Computer Communications, Volume 88, August 2016, PP: 57-72.
[45]. Songlin Sun, Na Chen, Tiantian Ran, Junsi Xiao, Tao Tian, “A Stackelberg game spectrum sharing scheme in cognitive radio-based heterogeneous wireless sensor networksâ€, Signal Processing, Volume 126, Sept 2016, PP: 8-16.
[46]. Sumit J.Darak, Sumedh Dhabu, Christophe Moy, Honggang Zhang Jacques, Palicot, A.P.Vinod, “Low complexity and efficient dynamic spectrum learning and tunable bandwidth access for heterogeneous decentralized cognitive radio networksâ€, Digital Signal Processing, Volume 37, Feb 2015, PP: 13-23.
[47]. Muhammad aisal Amjad, Mainak Chatterjee, Cliff C.Zou, “Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networksâ€, Computer Networks, Volume 98, April 2016. PP: 109-122.
[48]. Chenn Jung Huang, Chih Tai Guan, Heng Ming Chen, Yu Wu Wang, Sheng Yuan Chien Jui Jiun, Jia Jian Liao, “A self-adaptive joint bandwidth allocation scheme for heterogeneous wireless networksâ€, Applied Soft Computing volume 37, Dec 2015, PP: 156-165.
[49]. C. Salgado, C. Hernandez, V. Molina, Ferney A. Beltran-Molina, “Intelligent algorithm for spectrum mobility in cognitive wirelessâ€, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Procedia Computer Science 83 ( 2016 ) PP: 278 – 283
[50]. M. G. Gonz´alez-P´erez, M. Luna-Rivera and D. U. Campos-Delgado, “Pre-equalization for MIMO Wireless Systems Using Spatial Modulationâ€, The 2012 Iberoamerican Conference on Electronics Engineering and Computer Science Procedia Technology 3 ( 2012 ) PP: 1 – 8.
[51]. Jingfang Huang, Honggang Wang, Yi Qian, and Chonggang Wang, “Priority-Based Trafï¬c Scheduling and Utility Optimization for Cognitive Radio Communication Infrastructure-Based Smart Gridâ€, IEEE TRANSACTIONS ON SMART GRID, VOL.4, NO.1, MARCH 2013.
[52]. Indika A. M. Balapuwaduge, Lei Jiao, Frank Y. Li, “Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluationâ€, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 2, FEBRUARY 2014. PP: 630-645.
[53]. Tao Li Wan Bin Tang Shao Qian Li, “A Packet Scheduling Algorithm with Interruption Factor for Cognitive Radioâ€, 978-1-4244-6585-9/10/$26.00 ©2010 IEEE, PP: 189-193.
[54]. Li-Chun Wang, Chung-Wei Wang, and Kai-Ten Feng, “QoS-Enhanced Spectrum Management in Cognitive Radio Networksâ€, IEEE Wireless Communications, 2011, PP: 18-26.
[55]. Mahboubeh Kahvand, Mohammad Taqi Soleimani, Miranda Dabiranzohouri, “Channel Selection in Cognitive Radio Networks: A New Dynamic Approachâ€, 2013 IEEE 11th Malaysia International Conference on Communications 26th - 28th November 2013, Kuala Lumpur, Malaysia, PP: 407-411.
Citation
S. Tamilarasan and P. Kumar, "Dynamic Resource Allocation in Cognitive Radio Networks – Priority Scheduling approach: Literature Survey," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.1-11, 2016.
Improvement of SLA Parameters in Virtual Machine Migration by using Genetic Algorithm
Research Paper | Journal Paper
Vol.4 , Issue.8 , pp.12-22, Aug-2016
Abstract
Virtualization plays a main role in the cloud computing technology, usually in the cloud computing, users share the data there in the clouds like application etc., but with virtualization users shares the communications. A general technique to enhance the energy proficiency of a datacentre is VM placement by coordinating the quantity of dynamic servers to the present needs of the VMs and setting the remaining servers in low-control standby modes using SLA violations .In cloud computing environments, cloud service users consume cloud resources as a service and pay for service use. Before a cloud provider provisions a service to a consumer, the cloud provider and consumer (or broker) need to establish a service level agreement. So this work explored the utilization of VM migration with GA algorithm in MATLAB environment. We found the performance parameters like Number of VMs, Response time, Throughput and Execution Time.
Key-Words / Index Term
Virtual Machine Security, Genetic Algorithm, Deployment Models, Service Level Agreement
References
[1] A. A. Patel, J. N. Rathod, “Reducing Power Consumption & Delay Aware Resource Allocation in Cloud Data centersâ€, Journal of Information, Knowledge and Research in Computer Engineering, V.02, 2010, pp.337-339.
[2] B.Wei, C.Lin, X.Kong, “Energy Optimized Modeling for Live Migration in Virtual Data Centerâ€, International Conference on Computer Science and Network Technology, 2011, pp. 2311-2315.
[3] A.Beloglazov, R.Buyya, “Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computingâ€, 2012, pp.755-768.
[4] A.Huth, J.Cebula, “The Basics of Cloud Computingâ€, US-CERT, 2011.
[5] Wu, Chih-Hung, Wei-Lun Chen, and Chang Hong Lin. "Depth-based hand gesture recognition." Multimedia Tools and Applications (2015): 1-22.
[6] Justina, J. P., and SangeethaSenthilkumar. "A Survey Analysis on: Vision-Based Hand Gesture Recognition." International Journal 4.1 (2014)
[7] C.Lin, P.Liu, J. Wu, “Energy-Aware Virtual Machine Dynamic Provision and Scheduling for Cloud Computingâ€, IEEE 4th International Conference onCloud Computing, 2011, pp.736-737.
[8] Goldberg, David E., and John H. Holland. "Genetic algorithms and machine learning." Machine learning 3.2 (1988): 95-99.
[9] D.Jayasinghe, C.Pu, T. Eilam, M.Steinder, I.Whalley, E.Snible, “Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-aware Virtual Machine Placementâ€, IEEE InternationalConference on Services Computing, 2011, pp.72-79.
[10] Frank Schulz , “Towards Measuring the Degree of Fulfillment of Service Level Agreementsâ€,Third International Conference on Information andComputing,2010,pp.273-276.
[11] Grace Lewis, “Basics about Cloud Computingâ€, Software Engineering Institute, September 2010.
[12] Ian Foster, “Developing Modelsâ€, http://www.mcs.anl.gov/~itf /dbpp/text/ node29. html, last accessed on 31 july,2013.
[13] K.Ye, D.Huang, X.Jiang, H.Chen, S.Wu, “Virtual Machine Based Energy-Efficient Data Center Architecture for Cloud Computing: A Performance Perspectiveâ€, IEEE/ACM International Conference on Green Computing and Communications, 2010, pp.171-178.
[14] M.Maurer, V.C.Emeakaroha, I.Brandic, J.Altmann, “Cost–benefit analysis of an SLA mapping approach for defining standardized Cloud computing goodsâ€,2012,pp.39-47.
[15] N. Sadashiv, S. M. Dilip Kumar, “Cluster, Grid and Cloud Computing: A Detailed Comparisonâ€, The 6th International Conference, August 2011, v 3.33, pp.477-482.
Citation
Anu Thind, Mandeep Devgan, "Improvement of SLA Parameters in Virtual Machine Migration by using Genetic Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.12-22, 2016.
Point Sweep Coverage in Wireless Sensor Networks Using Convex Hull Algorithm
Research Paper | Journal Paper
Vol.4 , Issue.8 , pp.23-27, Aug-2016
Abstract
There are lots of applications where only periodic monitoring (sweep coverage) is sufficient instead of continuous monitoring. The main goal of sweep coverage problem is to minimize the number of mobile sensor nodes moving with uniform velocity required to guarantee coverage as per given sweep time. Sweep coverage problems are broadly categorized in three types depending on applications viz point sweep coverage, area sweep coverage and boundary sweep coverage. In this paper we have solved the problem of point sweep coverage, where a set of densely spaced points in the given region are periodically monitored using convex hull algorithm.
Key-Words / Index Term
Sweep coverage problem; Area sweep coverage; Point sweep coverage; convex hull algorithm; Tessellation
References
[1] Gurbax Kaur, Ritesh Sharma, “A Review on Sweep Coverage in Wireless Sensor Networksâ€, International Journal of Computer Sciences and Engineering, Volume-4, Issue-6, Page No (113-117), June 2016, E-ISSN:2347-2693.
[2] Barun Gorian , Partha Sarthi Mandal,“Approximation algorithm for sweep coverage in wireless sensor networks †,Journal of Parallel and Distributed Computing , Volume-74, Issue-8, Page No(2699-2707), Aug 2014.
[3] Mo Li, Wei-Fang Cheng, Kebin Liu, Yunhao Liu,Xiang-Yang Li, Xiangke Liao, “Sweep coverage with mobile sensorsâ€, Transaction on Mobile Computing , Volume-01, Issue-11, Page No (1534–1545), Nov 2011.
[4] Barun Gorian ,Partha Sarthi Mandal, “Point and area sweep coverage in wireless sensor networksâ€,11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), Tsukuba Science City, pp (140-145) ,May 13th-17th ,2013,ISBN : 978-1-61284-824-2.
[5] Nasimkhazan,Ali Braumandinia and Nima Ghazanfari Motlagh,“Node Placement and coverage in Asymmetric areaâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Volume-2, Issue-11, Page No (278-282), Nov 2012.
[6] R.A. Jarvis, “on the identification of the convex hull of a finite set of points in the planeâ€, Information Processing Letters, Volume-2, Issue-1, Page No (18-21), Dec 1973.
[7] Novella Bartolini, Tiziana Calamoneri, Emanuele G. Fusco, Annalisa Massini, Simone Silvestri , “ Push & pull: autonomous deployment of mobile sensors for a complete coverageâ€, Wireless Netw. , Volume-16, Issue-3, Page No (607–625), Jan 2009.
[8] Adrian Dumitrescu, MinghuiJiang, “Sweeping an oval to a vanishing pointâ€, Elsevier: Discrete applied mathematics, Volume-159, Issue-14, Page No (1436-1442), Aug 2011.
[9] Edoardo S. Biagioni, Galen Sasaki,“Wireless sensor placement for Reliable and Efiicient data collectionâ€,IEEE 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the - Big Island, HI, USA, January 6th-9th, 2003, ISBN: 0-7695-1874-5.
[10] Santosh kumar, Ten H .Lai, Anish Arora,“Barrrier coverage with wireless sensorsâ€,Mobicom’05 Proceedings of the 11th annual international conference on Mobile computing and networking,Org by-ACM, NY, USA, pp(284-298) , August 28 , 2006 ,ISBN: 1-59593-020-5.
[11] Xiaojiang Du,Fengjing Lin, “Improving sensor network performance by deploying mobile sensorsâ€,IEEE international performance, computing, and communications conference , Phoenix, AZ, USA ,pp(67-71),April 7th – 9th ,2005, ISBN: 0-7803-8991-3.
[12] Hung-Chi Chu, Wei-Kai Wang, Yong-Hsun Lai, “Sweep coverage mechanism for wireless sensor networks with approximate patrol timesâ€, Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), Xian, Shaanxi, pp( 82–87) ,October 26th-29th,2010,ISBN: 978-0-7695-4272-0.
[13] Yi Ning Chen, Ko-Jui Lin ; Chang Wu Yu,â€Dynamis coverage techniques in mobile wireless sensor networks†,Fifth International Conference on Ubiquitous and Future Networks (ICUFN), Da Nang, pp(12-17), July 2nd -5th ,2013, ISSN:2165-8528.
[14] Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu, Mo Li, “Run to potential:sweep coverage in wireless sensor networks†,IEEE: International Conference on Parallel Processing (ICPP-2009),Sponsored by-IACC, Vienna , Austria , pp ( 50–57) ,September 22nd-25th , 2009 ,ISBN: 978-0-7695-3802-0.
[15] Gautam K. Das, Sandip Das, Subhas C. Nandy, Bhabani P. Sinha, “Efficient algorithm for placing a given number of base stations to cover a convex regionâ€, Journal of. Parallel Distributed Computing,Volume- 66,Issue-11,Page No (1353 – 1358),July 2006.
[16] Junzhao Du,Yawei Li,Hui Liu and Kewai Sha, “ On sweep coverage with minimum mobile sensorsâ€, 16th international conference on Parallel and Distributed System, Shanghai, pp(283-290). December 8th-10th, 2010, ISBN: 978-1-4244-9727-0.
[17] Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed A. Ibnkahla, “Connectivity optimization for wireless sensor networks applied to forest monitoringâ€, In: Proceedings of the IEEE International Conference on Communications, (ICC-09), IEEE Press, Piscataway, NJ, USA, pp( 285–290),June 14th-18th,2009, ISBN: 978-1-4244-3435-0.
[18] William F. Eddy, “A New Convex Hull Algorithm for Planar Setsâ€, ACM Transactions on Mathematical Software, Volume-3, Issue- 4, Page No (398-403), Dec 1977.
[19] Selim G. AKL,Godfried T.Toussaint, “A fast convex hull algorithmâ€, Information Processing Letter, Volume-7 , Issue-5,Page No(219-222),Aug 1978.
[20] A. Bykat, “Convex Hull Of A Finite Set Of Points In Two Dimensionsâ€, Information Processing Letter, Volume-7, Issue-6, Page No (296-298), Oct 1978.
[21] Jack Sklansky “Finding the Convex Hull of Simple Polygon†Pattern Recognition Letters, Volume-1, Issue-2, Page No (79-83), Dec 1982.
[22] David Avis a, David Bremner, Raimund Seidel, “How good are convex hull algorithms?â€, Computational Geometry ,Volume-7 ,Page No (265-301),1997.
[23] D.G.Anand,Dr.H.G.Chandrakanth,Dr.M.N.Giriprasad, “ Energy efficient coverage problems in wireless adhoc sensor networksâ€, Advanced Computing: An International Journal ( ACIJ ),Volume-2,Issue-2,Page No(42-50),March 2011.
[24] Ming Ma, Yuanyuan Yang, “Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networksâ€, Transactions on Computers, Volume-56, Issue-07, Page No (946-958), July 2007.
Citation
Gurbax Kaur, Ritesh Sharma, "Point Sweep Coverage in Wireless Sensor Networks Using Convex Hull Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.23-27, 2016.
A Literature Review in Wireless Sensor Hole Detection Along with Node Scheduling Algorithm
Survey Paper | Journal Paper
Vol.4 , Issue.8 , pp.28-32, Aug-2016
Abstract
A sensor network consist of low battery power, low cost, limited storage, tiny sensing devices. The one of the significant challenge in wireless sensor network is how well the network is monitored while maximizing network’s lifetime. Since sensing and transmitting data consume sensors’ energy, so to preserve energy an optimal sensor node scheduling scheme is required where only an optimal number of sensors are activate and other node are eligible to shut down to save their energy which can be used to prolong lifetime of sensor network. In this paper we introduced a node scheduling scheme which is based on optimal Coverage Preserving Scheme (OCoPS) that first check the redundant sensor and then decide to turn itself off. Further, in wireless sensor network there may exist some regions where sensors are not able to sense data or communicate which are called hole regions. Since hole region may jeopardize sensing, communicating or connectivity of sensor network, therefore identification of hole regions is also prime concern. In this paper, we first detect the hole regions in sensor network and then deploying sensors at appropriate location for covering that region. Our hole detection approach is based on Boundary Critical Points. The simulation results demonstrate that the proposed algorithm can lead to a high coverage ratio while keeping long network’s life.
Key-Words / Index Term
WirelessSensor, Scheduling Sensor, Hole Detection, Wireless Network
References
[1] B. Kun, T. Kun, G. Naijie, L.D. Wan, and L. Xiaohu, 2006, “Topological Hole Detection in Sensor Networks with Cooperative Neighbors,†Proc. Int‟l Conf. Systems and Networks Comm. (ICSN ‟06), p. 31, 20.
[2] F. Stefan, 2005, “Topological Hole Detection in Wireless Sensor Networks and its Applications,†Proc. Joint Workshop on Foundations of Mobile Computing, p. 44-53.
[3] F. Stefan and K. Christian, 2006, “Hole Detection or: How Much Geometry Hides In Connectivity?†Proc. 22nd Ann. Symp. Computational Geometry (SCG ‟06), pp. 377-385.
[4] S.P. Fekete, A. Kr€oller, D. Pfisterer, S. Fischer, and C. Buschmann,2004,“Neighborhood-BasedTopology Recognition in Sensor Networks,†Proc. Int‟l Workshop on Algorithmic Aspects of Wireless Sensor Networks, pp. 123-136.
[5] Q. Fang, J. Gao, and L.J. Guibas, 2006, “Locating and Bypassing Holes in Sensor Networks,†Mobile Networks and Applications, vol. 11, no. 2, pp. 187-200.International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 2015 ISSN 2091-2730 1094 www.ijergs.org
[6] A. Shirsat and B. Bhargava, 2011, “Local Geometric Algorithm for Hole Boundary Detection in Sensor Networks,†Security and Comm. Networks, vol. 4, no. 9, pp. 1003-1012.
[7] G. Wang, G. Cao, and T.F.L. La Porta, June 2006, “Movement-Assisted Sensor Deployment,†IEEE Trans. Mobile Computing, vol. 5, no. 6, pp. 640-652.
[8] C.Y. Chang, L.L. Hung, S.W. Chang, and Y.C. Chen, 2012, “Decentralized and Energy-Balanced Algorithms for Maintaining Temporal Full-Coverage in Mobile WSNs,†J. Wireless Comm. and Mobile Computing, vol. 12, no. 5, pp. 445-462.
[9] C.Y. Chang, C.Y. Lin, G.J. Yu, and C.H. Kuo, 2013, “An energy-Efficient Hole-Healing Mechanism for Wireless Sensor Networks with Obstacles,†Wireless Comm. and Mobile Computing, vol. 13, no. 4, pp. 377-392.
[10] A. Nadeem, S.K. Salil, and J. Sanjay, 2011, “A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks,†Wireless Comm. and Mobile Computing, vol. 11, no. 1, pp. 23-45.
[11] X. Li, G. Fletcher, A. Nayak, and I. Stojmenovic, 2012, “Randomized Carrier-Based Sensor Relocation in Wireless Sensor and Robot Networks,†Proc. Ad Hoc Networks, DOI:10.1016/j.adhoc .06.007.
[12] Y. Wang, J. Gao, and S.B. Mitchell, 2006, “Boundary Recognition in Sensor Networks by Topological Methods,†Mobi Com „06, pp. 122-133.
[13] A. Kroller, P. Fekete, D. Pfisterer, and S. Fischer, 2006, “Deterministic Boundary Recognition and Topology Extraction for Large Sensor Networks,†Proc. 17th Ann. ACM-SIAM Symp. Discrete Algorithm (SODA „06), pp. 1000-1009.
[14] Z. Yong and W. Li, June 2009, “A Sensor Deployment Algorithm for Mobile Wireless Sensor Networks,†Proc. 21st Ann. Int‟l Conf. Chinese Control and Decision Conf. (CCDC ‟09), pp. 4642-4647, 17-19.
[15] S. Yangy, M. Liz, and J. Wu, Aug 2007, “Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks,†IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 8, pp. 1108-1121.
[16] X. Li, H. Frey, N. Santoro, and I. Stojmenovic, Nov 2011, “Strictly Localized Sensor Self-Deployment for Optimal Focused Coverage,†IEEE Trans. Mobile Computing, vol. 10, no. 11, pp. 1520-1533.
[17] G. Wang, G. Cao, P. Berman, and T. La Porta, May 2007, “Bidding Protocols for Deploying Mobile Sensors,†IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 563-576.
Citation
Somil Tyagi and Jaspreet Kaur, "A Literature Review in Wireless Sensor Hole Detection Along with Node Scheduling Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.28-32, 2016.
Static Indoor Object Detection Using MATLAB For Visually Impaired
Research Paper | Journal Paper
Vol.4 , Issue.8 , pp.33-37, Aug-2016
Abstract
Detection of indoor static objects by visually impaired without help of third person is a crucial task. The indoor object detection enables a visually impaired to settle on suitable and convenient choices of route to follow in an indoor area. Literature presents that methods such as Electronic Travel Aids (ETA), Augmented Reality (AR) and Navigation Assistance for Visually Impaired (NAVI) are used to assist visually impaired. These methods are expensive and involves overhead for every decision. This paper presents an algorithmic based model which uses machine learning technique. In the proposed methodology firstly, the database is prepared which consist of various images of objects to train the system. During the use, the image which is captured by the visually impaired is compared with entries of the database to detect the object. The experiments were conducted using MATLAB for image recognition and analysis.
Key-Words / Index Term
Image processing; Machine learning; Indoor object detection; Visually Impaired; Blind people; Navigation; Object recognition applications; MATLAB
References
[1] V. I. Pradeep, at. al, “ Robot Vision for the Visually Impaired†, In Proceedings of 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, San Francisco, CA, USA, pp. 15-22, 2010.
[2] P. Alcantarilla, J. Yebes, J. Almaz´an and L. Bergasa, “On Combining Visual SLAM and Dense Scene Flow to Increase the Robustness of Localization and Mapping in Dynamic Environmentsâ€, IEEE International Conference on Robotics and Automation, Saint Paul, MN, USA, pp. 1290-1297, 2012.
[3] D. Dakopoulos and N. Bourbakis, “Wearable obstacle avoidance electronic travel aids for blindâ€, IEEE Trans. Syst. Man Cybern, pp. 25-35, 2010.
[4] J. Sa´ez, F. Escolano and A. Penalver, “First Steps towards Stereo-Based 6DOF SLAM for the Visually Impairedâ€, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, p. 23, 2005.
[5] J. Sa´ez and F. Escolano, “Stereo-Based Aerial Obstacle Detection for the Visually Impairedâ€, Computer Vision Applications for the Visually Impaired, Marselle, France, 2008.
[6] A. Geiger, M. Lauer and R. Urtasun, “A Generative Model for 3D Urban Scene Understanding from Movable Platformsâ€, IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, no. 20-25, pp. 1995-1992, 2011.
[7] J. Hesch and S. RoumeliotiS, “Design and analysis of a portable indoor localization aid for the visually impairedâ€, vol. 29, pp. 1400-1415, 2010.
[8] J. Loomis, R. Golledge and R. Klatzky, “PS-Based Navigation Systems for the Visually Impairedâ€, In Fundamentals of Wearable Computers and Augmented Reality; Barfield, W.,Caudell, T. Eds.; Lawrence Erlbaum Associates Publishers, 2001.
[9] S. Oh, S. Tariq, B. Walker and F. Dellaert, “Map-Based Priors for Localizationâ€, IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, pp. 2179-2184, 2004.
[10] B. Walker and J. Lindsay, “Navigation performance with a virtual auditory display: Effects of beacon sound, capture radius, and practiceâ€, vol. 48, pp. 265-278, 2006.
[11] V. Kulyukin, C. Gharpure and J. Nicholson, “RFID in Robot-Assisted Indoor Navigation for the Visually Impairedâ€, IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, pp. 1979-1984, 2004.
[12] S. Vedula, S. Baker, P. Rander, R. Collins and T. Kanade, “Three-Dimensional scene flowâ€, IEEE Trans. Patt. Anal. Mach. Intellect, p. -, 2005.
[13] J. Borenstein, Y. Koren and S. Member, “The vector field histogram-fast obstacle avoidance for mobile robotsâ€, IEEE, vol. 7, pp. 278-288, 1991.
[14] J. Fernandez, R. Sanz, J. Benayas and A. Dieguez, “Improving collision avoidance for mobilerobots in partially known environments: The beam curvature methodâ€, 49, pp. 205-219, 2004.
[15] J. Durham and F. Bullo, “Smooth Nearness-Diagram Navigationâ€, IEEE/RSJ International Conference on Intelligent Robots and Systems, Nice, France, vol. 22-26, pp. 690-695, 2008.
[16] S. Kumar, “Binocular Stereo Vision Based Obstacle Avoidance Algorithm for Autonomous Mobile Robotsâ€, International Advance Computing Conference, pp. 254-259, 2009.
[17] E. Peng, P. Peursum, L. Li and S. Venkatesh, “A smartphone-based obstacle sensor for the visually impairedâ€, pp. 590-604, 2010.
[18] R. Manduchi, “Mobile vision as assistive technology for the blindâ€, vol. 7383, pp. 9-16, 2012.
[19] B. Shin and C. Lim, “Obstacle detection and avoidance system for visually impaired peopleâ€, pp. 9-16, 2007.
[20] L. Chen, B. Guo and W. Sun, “Obstacle Detection System for Visually Impaired People Based on Stereo VisionObstacle Detection System for Visually Impaired People Based on Stereo Visionâ€, International Conference on Genetic and Evolutionary Computing, Shenzhen, China, pp. 723-726, 2010.
[21] A. Broggi, C. Caraffi, R. Fedriga and P. Grisleri, “Obstacle Detection with Stereo Vision for Off-Road Vehicle Navigationâ€, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, p. 65, 2005.
[22] T. Muller, J. Rannacher and C. Rabe, “Feature- and Depth-Supported Modified Total Variation Optical Flow for 3D Motion Field Estimation in Real Scenesâ€, IEEE Conference on Computer Vision and Pattern Recognition, no. 20-25, pp. 1193-1200, 2011.
[23] K. Konolige, “Small Vision Systems: Hardware and Implementationâ€, International Symposium in Robotic Research, pp. 203-212, 1997.
[24] H. Hirschmuller, “Stereo processing by semiglobal matching and mutual informationâ€, IEEE Trans.Patt. Anal. Mach. Intellect, vol. 30, pp. 328-341, 2015.
[25] A. Geiger, M. Roser and R. Urtasun, “Efficient large-scale stereo matchingâ€, pp. 25-38, 2011.
[26] I. Ulrich and J. Borenstein, “The guidecane-applying mobile robot technologies to assist the visually impairedâ€, IEEE Trans. Syst. Man Cybern, vol. 31, pp. 131-136, 2001.
[27] R. Bolles and M. Fischler, “A Ransac-Based Approach to Model Fitting and its Application to Finding Cylinders in Range Dataâ€, International Joint Conference on Artificial Intelligence, vol. 24-28, pp. 637-643, 1981.
[28] N. Chumerin and M. Hulle, “Ground Plane Estimation Based on Dense Stereo Disparityâ€, International Conference on Neural Networks and Artificial Intelligence, vol. 27-30, pp. 209-213, 2010.
[29] N. Strumillo, “Interfaces Aiding the Visually Impaired in Environmental Access, Mobility and Navigationâ€, 3rd Conference on Human System Interactions, vol. 13-15, pp. 17-24, 2010.
Citation
Pritam Shaha, Niranjan Kshatriya and Rahul Borse, "Static Indoor Object Detection Using MATLAB For Visually Impaired," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.33-37, 2016.
A Novel Algorithm for Big Data Clustering
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.38-40, Aug-2016
Abstract
Now a day, large amounts of heterogeneous digital data is available this big data need to be carefully examined for analysis point of view. Big data is nothing but a large volume of heterogeneous and distributed data collection. In real world big data applications has contain huge amount of continuously grow able data but it is very costly to clean up, extract , manage and process data using present software tools. Fast and accurate retrieval of the relevant information from dataset has always been a significant issue. Prominent and accurate data clustering is a main task of exploratory data analysis and data mining applications. Clustering process is one of the data mining techniques for dividing informative dataset into group and it is a kind of unsupervised data mining technique.
Key-Words / Index Term
Big data, Clustering, Data Mining
References
[1] BABU, G.P. and MARTY, M.N. 1994. Clustering with evolution strategies Pattern Recognition, 27, 2, 321-329.
[2] McKinsey Global Institute (2011) Big Data: The next frontier for innovation, competition and productivity.
[3] Shiv Pratap Singh Kushwah, Keshav Rawat, Pradeep Gupta†Analysis and Comparison of Efficient Techniques of Clustering Algorithms in Data Mining†International Journal of Innovative
[4] Chen, H., Chaing, R.H.L. and Storey, V.C. (2012) Business Intelligence and Analytics: From Big Data to Big Impact, MIS Quarterly, 36, 4, pp. 1165-1188.
[5] Neelamadhab Padhy, Dr. Pragnyaban Mishra and Rasmita Panigrahi, “The Survey of Data Mining Applications And Feature Scopeâ€, International Journal of Computer Science and Informatio Processing(CSIP).
[6] Wu Yuntian, Shaanxi University of Science and Technology, “Based on Machine Learning of Data Mining to Further Exploreâ€, 2012 International Conference on Machine Learning Banff, Canada.
[7] Guo, G, Neagu, D. (2005) Similarity-based Classifier Combination for Decision Making . Proc. Of IEEE International Conference on Systems, Man and Cybernetics, pp. 176-181
[8] Varun Kumar and Nisha Rathee, ITM University, “Knowledge discovery from database Using an integration of clustering and classificationâ€, International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011.
[9] Wu, X., Zhu, X., Wu, G., Ding, W. (2014) Data Mining with Big Data, Knowledge and Data Enginnering , IEEE Transactions.
[10] Patel, A.B., Birla, M. and Nair, U. (2012) Addressing Big Data Problem Using Hadoop and Map Reduce, NIRMA University Conference on Engineering, pp. 1-5
[11] Aditya B. Patel, Manashvi Birla, Ushma Nair, (6-8 Dec. 2012),â€Addressing Big Data Problem Using Hadoop and Map Reduceâ€.
[12] Jyothi Bellary, Bhargavi Peyakunta, Sekhar Konetigari “Hybrid Machine Learning Approach In Data Miningâ€, 2010 Second International Conference on Machine Learning and computing. Shiv Pratap Singh Kushwah, Keshav Rawat, Pradeep Gupta†Analysis and Comparison of Efficient Techniques of Clustering Algorithms in Data Mining†International Journal of Innovative.
[13] Fayyad, U. Data Mining and Knowledge Discovery: Making Sense Out of IEEE Expert, v. 11, no. 5, pp. 20-25, October 1996.
Citation
Vishal Kumar Gujare, Pravin Malviya, "A Novel Algorithm for Big Data Clustering," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.38-40, 2016.
Review of Data Mining with Weka Tool
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.41-44, Aug-2016
Abstract
Data mining is the process of extract unseen and hidden information from a large amount of data. It is a powerful technology that helps researchers to find the meaningful information by providing different tools and technologies. In this paper we focused on different tools, technologies and application area of data mining. Also discussed the weka tool,how we build data set for weka and how this data set is loaded on weka.
Key-Words / Index Term
DataMining,MachineLearning,Clustering,Classification, WekaTool
References
[1] Jiawei Han, Micheline Kamber “ Data Mining: Concepts and Techniquesâ€, Morgan Kaufmann Publishers, Second Edtion- 2006, ISBN: ISBN: 978-1-5090-0669-4
[2] Ravneet Jyot Singh, Williamjeet Singh "Data Mining in Healthcare for Daibetes Mellitus", International Journal of Science and Research, Volume-03, Issue-07, Page No (1993-1998), July 2014.
[3] Mansi Gera, Shivani Goel “Data Mining – Techniques , Methods and Algorithms: A Review on Tools and their Validityâ€, International Journal of Computer Applications, Volume-113, Issue-19,Page No (22-29),March2015.
[4] A. Michael, “IBM developerWorks : IBMs resource for developers and IT,†27 April 2010. [Online]. Available: http://www.ibm.com/developerworks/library/ba-data-mining-techniques/.
[5] Beant Kaur, Williamjeet Singh “Review on heart disease prediction using data mining techniques,†International Journal on recent and innovation trends in computer and communication , Volume- 2, Issue-10,Page No( 3003-3008), October2014.
[6] Vikas Chaurasia, Saurabh Pal “Data Mining Approach to Detect Heart Dieses,†International Jouranal of Advanced Computer Science and Information Technology,Volume-02, Issue-04, Page No (56-66), 2013.
[7] Mohd Fauzi bin Othman, Thomas Moh Shan Yau “Comparision of different classificaton techniques using WEKA for Breast Cancer,†Springer, Volume-15, Issue-04, Page No (520-523), 2007.
Citation
Kulwinder Kaur, Shivani Dhiman, "Review of Data Mining with Weka Tool," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.41-44, 2016.
Expert System for Diagnosis of Heart Disease: A Review
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.45-47, Aug-2016
Abstract
In order to diagnose any disease, the expert system developed by human may be a cheering way out to diminish cost, time, human efforts and medical error. This paper focuses on today’s most severe heart related diseases. It also discusses different expert systems that are presently used in the field of medical sciences. Further, noteworthy contribution is also cited. Additionally, it reveals the well-known database used for heart disease diagnosis i.e. UCI repository.
Key-Words / Index Term
Diagnosis, Expert System, FIS, Fuzzy, Heart Attack
References
[1] P. Patra, D. Sahu and I. Mandal, “An Expert System for Diagnosis of Human Diseases,†International Journal for Computer Applications (IJCA), vol. 1, no. 13, 2010.
[2] C. Yau and A. Sattar, “Developing Expert System with Soft Systems Concept,†Proceedings of International Conference on Expert Systems for Development,†pp. 79-84, 1994.
[3] N. Conigliaro, A. Stefano and O. Mirabella, “An Expert System for Medical Diagnosis,†Proceedings of Symposium on the Engineering of Computer-Based Medical Systems, pp. 75-81, 1988.
[4] Heon Gyu Lee, Ki Yong Noh and Keun Ho Ryu, “Mining Bio-signal Data: Coronary Artery Disease Diagnosis using Linear and Nonlinear Features of HRV,†LNAI 4819: Emerging Technologies in Knowledge Discovery and Data Mining, pp. 56-66, May 2007.
[5] Cristianini, N. and Shawe-Taylor, J. “An introduction to Support Vector Machinesâ€, Cambridge University Press, Cambridge, 2000.
[6] Li, W., Han, J. and Pei, J., “CMAR: Accurate and Efficient Classification Based on Multiple Association Rulesâ€, In: Proc. of 2001 International Conference on Data Mining. 2001.
[7] Chen, J., Greiner, R., “Comparing Bayesian Network Classifiersâ€, In Proc. of UAI-99, pp. 101– 108, 1999.
[8] Quinlan, J., “C4.5: Programs for Machine Learningâ€, Morgan Kaufmann, San Mateo, 1993.
[9] Sellappan Palaniappan, Rafiah Awang, "Intelligent Heart Disease Prediction System Using Data Mining Techniques", IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.8, August 2008.
[10] Niti Guru, Anil Dahiya, Navin Rajpal, "Decision Support System for Heart Disease Diagnosis Using Neural Network", Delhi Business Review, Vol. 8, No. 1, 2007.
[11] Carlos Ordonez, "Improving Heart Disease Prediction Using Constrained Association Rules," Seminar Presentation at University of Tokyo, 2004.
[12] Franck Le Duff, Cristian Munteanb, Marc Cuggiaa, Philippe Mabob, "Predicting Survival Causes After Out of Hospital Cardiac Arrest using Data Mining Method", Studies in health technology and informatics, Vol. 107, No. 2, pp. 1256-9, 2004.
[13] Boleslaw Szymanski, Long Han, Mark Embrechts, Alexander Ross, Karsten Sternickel, Lijuan Zhu, "Using Efficient Supanova Kernel For Heart Disease Diagnosis", proc. ANNIE 06, intelligent engineering systems through artificial neural networks, vol. 16, pp:305-310, 2006.
[14] Kiyong Noh, Heon Gyu Lee, Ho-Sun Shon, Bum Ju Lee, and Keun Ho Ryu, "Associative Classification Approach for Diagnosing Cardiovascular Disease", Springer,Vol:345, pp. 721- 727, 2006.
[15] Tanmay Kasbe, Ravi Singh Pippal, “Dengue Fever: State-of-the-Art Symptoms and Diagnosis,†International Journal of Computer Sciences and Engineering, vol. 04, no. 06, 2016, pp. 26-30.
[16] Manish B. Giri, Ravi Singh Pippal, “Agricultural Environmental Sensing Application Using Wireless Sensor Network for Automated Drip Irrigation,†International Journal of Computer Sciences and Engineering, vol. 04, no. 07, 2016, pp. 133-137.
[17] Md Jahid Akhtar, Rakesh Kumar Sanodiya, Ravi Singh Pippal, “Fuzzy Logic Controlled Resource Allocation for Efficient Load Balancing in Cloud Computing Environment,†International Journal of Engineering Sciences and Research Technology, vol. 5, no. 1, 2016, pp. 135-140.
[18] M. V. Jagannatha Reddy and B. Kavitha, “Expert System to Predict the Type of Fever Using Data Mining Techniques on Medical Databases,†International Journal of Computer Sciences and Engineering, vol. 03, no. 09, 2016, pp. 165-171.
[19] Pima Indians Diabetes Data Set, [Online], Available: http://archive.ics.uci.edu/ml/datasets/Pima+Indians+Diabetes
Citation
Suresh Nagar, Arvind Kumar Jain, "Expert System for Diagnosis of Heart Disease: A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.45-47, 2016.
Review on OFDM: Concept, scope and its application
Review Paper | Journal Paper
Vol.4 , Issue.8 , pp.48-50, Aug-2016
Abstract
Orthogonal frequency division multiplexing(OFDM) is the case of multicarrier transmission in which a single data stream is transmitted over a number of subcarriers of lower rate. OFDM is a modulation format that is being used in latest wireless and telecommunications standards. OFDM has been adopted in the Wi-Fi arena where the standard like 802.11a, 802.11n, 802.11ac. It has been chosen for the cellular telecommunication standard 4G LTE. OFDM has been adopted for a number of broadcast standards from DAB digital radio to the digital video broadcast standards, DVB. OFDM effectively reduce the inter-symbol interference(ISI) caused by the delay spread of wireless channels. OFDM has been used in both wired and wireless communication medium. One of the major drawback of OFDM is its peak to average power ratio(PAPR). In this paper we are going to discuss basics of OFDM techniques, scopes, losses and its application.
Key-Words / Index Term
Orthogonal Frequency Division Multiplexing (OFDM), Bit Error Rate(BER), Intersymbol Interference(ISI), Peak To Average Power Ratio(PAPR).
References
[1] Ahmed, Bannour, and Mohammad Abdul Matin. “Coding for MIMO-OFDM in Future Wireless Systems.†Springer International Publishing, 2015.
[2] Sukhpalsingh, Harmanjotsingh.“ Review paper on OFDM-concepts and applications.†2015 international journal of engineering development and research |volume 3,issue 3| ISSN: 2321-9939.
[3] Han, SeungHee, and Jae Hong Lee. "An overview of peak-to-average power ratio reduction techniques for multicarrier transmission." Wireless Communications, IEEE 12.2 (2005): 56-65.
[4] Karimi, Bashir Reza, MojtabaBeheshti, and Mohammad JavadOmidi. "PAPR Reduction in MIMO-OFDM Systems: Spatial and Temporal Processing." Wireless Personal Communications 79.3 (2014): 1925-1940.
[5] Vishal Pasi, PrateekNigham andDr. VijayshriChaurasia. “Review on OFDM a brief survey.†International journal of scientifics and research publications, volume 3, issue 11,November 2013.
[6] Shi, Zhenguo, et al. "Improved spectrum sensing for OFDM cognitive radio in the presence of timing offset." EURASIP Journal on Wireless Communications and Networking 2014.1 (2014): 1-9.
[7] Mishra, Amit, Rajiv Saxena, and Manish Patidar. "OFDM link with a better performance using artificial neural network." Wireless personal communications 77.2 (2014): 1477-1487.
[8] Kamruzzaman, M. M. "Performance of turbo coded wireless link for SISO-OFDM, SIMO-OFDM, MISO-OFDM and MIMO-OFDM system." Computer and Information Technology (ICCIT), 2011 14th International Conference on. IEEE, 2011.
[9] ManushreeBhardwaj, ArunGangwar and DevendraSoni. “ Areview on OFDM: Concept, Scope and its applications.â€IOSR journal of mechanical and civil Engineering, Volume 1, issue 1(may-june 2012).
[10] Da Costa Pinto, Fabio, et al. "A low cost OFDM based modulation schemes for data communication in the passband frequency." Power Line Communications and Its Applications (ISPLC), 2011 IEEE International Symposium on. IEEE, 2011.
[11] Nuwanpriya, Asanka, et al. "Position modulating OFDM for optical wireless communications." Globecom Workshops (GC Wkshps), 2012 IEEE. IEEE, 2012.
[12] Sumathi, K., and M. L. Valarmathi. "Resource allocation in multiuser OFDM systems—A survey." Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on. IEEE, 2012.
[13] Dissanayake, SarangiDevasmitha, and Jean Armstrong. "Comparison of ACO-OFDM, DCO-OFDM and ADO-OFDM in IM/DD Systems." Journal of lightwave technology 31.7 (2013):1063-1072.
[14] B. Benarji , Prof G. SasibhusanaRao and S.PallamSetty “BER Performance of OFDM System with various OFDM frames in AWGN, Rayleigh and Rician Fading Channel. “International Journal of Computer Sciences and Engineering†Volume 3, issue 4 (2015).
[15] AnuragPandey and Sandeep Sharma, “BERperformance of OFDM System in AWGN andRayleigh Fading Channel†International Journal of Engineering Trends and Technology, ISSN: 2231-5381, Volume 13, Number 3, July 2014, pp. 126-128.
Citation
Rizwan Ahmed malik, Shahid Shabir, Ruchi Singla, "Review on OFDM: Concept, scope and its application," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.48-50, 2016.
A Survey: Fault Classification Techniques
Survey Paper | Journal Paper
Vol.4 , Issue.8 , pp.51-53, Aug-2016
Abstract
Transmission lines consume a considerable amount of power. The necessity of power and its dependency has grown exponentially over the years. The void between limited production and tremendous demand has increased the focus on minimizing power losses. For a modern power system, high speed fault clearance is very critical and to achieve this objective various techniques have been developed. This paper presents survey of various techniques used for classification of transmission line faults.
Key-Words / Index Term
Transmission Lines, Faults, Classification Techniques, Electric Power System, Fault Detection
References
[1] Anamika Yadav, Aleena Swetapadma, “A novel transmission line relaying scheme for fault detection and classification using wavelet transform and linear discriminant analysisâ€, Elsevier, Page No (199-209), 2015.
[2] B. Jagan Mohan,N. Ramesh Babu, “Fault classification in power system using EMD and SVMâ€, Elsevier, Page No (1-9), August 2015.
[3] M. Sanaye-Pasand, H. Khorashadi-Zadeh,†Transmission Line Fault Detection & Phase Selection using ANNâ€, International Conference on Power Systems Transients – IPST, Page No (1-6), 2003 .
[4] Zhi-kun Hu, Wei-hua Gui, Chun-hua Yang, Peng-cheng Deng, and Steven X. Ding, “Fault Classification Method for Inverter Based on Hybrid Support Vector Machines and Wavelet Analysisâ€, Springer (2011),pp. 1-8.
[5] Anamika Yadav, A.S. Thoke, “Transmission line fault distance and direction estimation using artificial neural networkâ€, International Journal of Engineering, Science and Technology, Vol. 3, No. 8, Page No (110-121), 2011.
[6] Ch. Durga Prasada, N. Srinivasua, “Fault Detection in Transmission Lines using Instantaneous Power with ED based Fault Indexâ€, Elsevier, Page No (132-138), August 2015.
[7] Kola Venkataramana Babu, Manoj Tripathy and Asheesh K Singh, “Recent techniques used in transmission line protection: a reviewâ€, International Journal of Engineering, Science and Technology, Vol. 3, No. 3, Page No (1-8), 2011.
[8] P. Chiradeja and A. Ngaopitakkul, Member, IAENG, “Identification of Fault Types for Single Circuit Transmission Line using Discrete Wavelet transform and Artificial Neural Networksâ€, Proceedings of the International Multi Conference of Engineers and Computer Scientists , IMECS vol. 2, Page No (1-6), March 2009.
Citation
Trisha Chaudhary and Nitima Malsa, "A Survey: Fault Classification Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.51-53, 2016.