Simulation Study of Strains Obtained by Two Different Scattering Processes in Optical Fiber Sensors
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.1-9, Oct-2016
Abstract
Distributed Sensing plays a keyrole in the realm of modern sensing technology and fiber optic sensors are the ultimate choice for that. Fiber optic distributed sensors are extremely popular because it can able to measure strain and temperature difference with very high resolution of about 2 cm. In this paper we have tried to simulate the process of measuring the strains using Stimulated Brillouin and Rayleigh scattering by FDTD method and tried to investigate how well it will match with the strains obtained from the experimental process.These distributed sensors are used to monitor mainly the structural health of the civil or mechanical engineering systems and are facilitate to develop advanced sensing devices like Distributed Acoustic Sensors.
Key-Words / Index Term
Stimulated Brillouin Scattering, Rayleigh scattering, FDTD, Optical Fiber Sensor, Cross-correlation, Tunable Wavelength Coherence Time Domain Reflectometer (TW-COTDR)
References
[1]. G.P.Agrawal, Nonlinear Fiber Optics, Academic Press, San Diego, 3rd ed., 2001.
[2]. R. W. Boyd, Nonlinear Optics (Academic, NY, 2003), 2nd ed., Chap. 9.
[3]. Y. Koyamada, M. Imahama, K. Kubota and K.Hogari, "Fiber-optic distributed strain and temperature sensing with very high measurand resolution over long range using coherent OTDR" J. of Lightwave Technology, vol. 27, pp.1142-1146, May 2009.
[4]. M. Froggatt et al., �Correlation and keying of Rayleigh scatter for loss and temperature sensing in parallel optical networks� 2004 OFC Postdeadline Papers, Volume 2, Los Angeles, CA (2004).
[5]. Bao. X. and Chen. L. �Recent Progress in Distributed Fiber Optic Sensors�. Sensors 2012, 12, pp.8601�8639.
[6]. J. B. Cole, N. Okada and S. Banerjee "Advances in Finite Difference Time Domain Methods� Chapter 4: in Light Scattering Reviews, Volume 6, Springer, Berlin, pp. 115-175.
[7]. M. Froggatt, D. Gifford, S. Kreger, M. Wolfe and B. Soller, "Distributed strain and temperature discrimination in unaltered polarization maintaining fiber" in Optical Fiber Sensors, OSA Technical Digest (CD) (Optical Society of America, 2006).
[8]. M. Alahbabi, Y. T. Cho and T. P. Newson, �Comparison of the methods for discriminating temperature and strain in spontaneous Brillouin-based distributed sensors� Optics Letters, vol. 29, no. 1, pp. 26�28, 2004.
[9]. K. Kishida, Y. Yamauchi and A. Guzik, "Study of optical fibers strain-temperature sensitivities using hybrid Brillouin-Rayleigh System" Phot. Sens., vol. 4, no. 1, pp. 1-11, 2014.
[10]. Yu. W. and R. Mittra, "A conformal finite difference time domain technique for modeling curved dielectric surfaces" IEEE Microwave Components Lett., Vol. 11, 2001, pp. 25-27.
Citation
Mitsuharu Shiwa, Kisalaya Chakrabarti, "Simulation Study of Strains Obtained by Two Different Scattering Processes in Optical Fiber Sensors," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.1-9, 2016.
Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.10-18, Oct-2016
Abstract
By increasing the advantages of network based systems and dependency of daily life with them, the efficient operation of network based systems is an essential issue. Since the number of attacks has significantly increased, intrusion detection systems of anomaly network behavior have increasingly attracted attention among research community. Intrusion detection systems have some capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. So, construction of efficient intrusion detection model is highly required for increasing the detection rate as well as decreasing the false detection. . This paper investigates applying the following methods to detect the attacks intrusion detection system and understand the effective of GA on the ANN result: artificial Neural Network (ANN) for recognition and used Genetic Algorithm (GA) for optimization of ANN result. We use KDD CPU 99 dataset to obtain the results; witch shows the ANN result before the efficiency of GA and compare the result of ANN with GA optimization.
Key-Words / Index Term
Artificial Neural Network (ANN); Intrusion detection; Genetic algorithm (GA); Machine learning; Network Security
References
[1] O. A. Soluade and E. U. Opara, "Security Breaches, Network Exploits and Vulnerabilities: A Conundrum and an Analysis."
[2] H.-H. Gao, H.-H. Yang, and X.-Y. Wang, "Ant colony optimization based network intrusion feature selection and detection," in Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, 2005, pp. 3871-3875.
[3] Z. Y. M. Liu, "Intrusion Detection Systems," in Applied Mechanics and Materials, 2014, pp. 852-855.
[4] A. Simmonds, P. Sandilands, and L. van Ekert, "An ontology for network security attacks," in Applied Computing, ed: Springer, 2004, pp. 317-323.
[5] K. M. Shazzad and J. S. Park, "Optimization of intrusion detection through fast hybrid feature selection," in Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on, 2005, pp. 264-267.
[6] C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, "Intrusion detection by machine learning: A review," Expert Systems with Applications, vol. 36, pp. 11994-12000, 2009.
[7] A. Tamilarasan, S. Mukkamala, A. H. Sung, and K. Yendrapalli, "Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods," in Neural Networks, 2006. IJCNN`06. International Joint Conference on, 2006, pp. 4754-4761.
[8] V. T. Goh, J. Zimmermann, and M. Looi, "Towards intrusion detection for encrypted networks," in Availability, Reliability and Security, 2009. ARES`09. International Conference on, 2009, pp. 540-545.
[9] R. Ma, "Neural Networks for Intrusion Detection," 2009.
[10] A. Dastanpour, S. Ibrahim, R. Mashinchi, and A. Selamat, "Comparison of genetic algorithm optimization on artificial neural network and support vector machine in intrusion detection system," in Open Systems (ICOS), 2014 IEEE Conference on, 2014, pp. 72-77.
[11] O. Linda, T. Vollmer, and M. Manic, "Neural network based intrusion detection system for critical infrastructures," in Neural Networks, 2009. IJCNN 2009. International Joint Conference on, 2009, pp. 1827-1834.
[12] G. P. a. N. Mishra, "Optimal Feature Selection in Stream Data Classification Using Improved Ensemble Classifier for High Dimension Data," International Journal of Computer Sciences and Engineering, vol. 04, pp. 12-18, Sep -2016.
[13] M. S. Hoque, M. Mukit, M. Bikas, and A. Naser, "An implementation of intrusion detection system using genetic algorithm," arXiv preprint arXiv:1204.1336, 2012.
[14] M. H. Mashinchi, M. R. Mashinchi, and S. M. H. Shamsuddin, "A Genetic Algorithm Approach for Solving Fuzzy Linear and Quadratic Equations," World Academy of Science, Engineering and Technology, vol. 28, 2007.
[15] P. Gupta and S. K. Shinde, "Genetic Algorithm Technique Used to Detect Intrusion Detection," in Advances in Computing and Information Technology, ed: Springer, 2011, pp. 122-131.
[16] V. K. Kshirsagar, S. M. Tidke, and S. Vishnu, "Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview," International Journal of Computer Science and Informatics ISSN (PRINT), pp. 2231-5292, 2012.
[17] C.-H. Tsang, S. Kwong, and H. Wang, "Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection," Pattern Recognition, vol. 40, pp. 2373-2391, 2007.
[18] Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai, "An efficient intrusion detection system based on support vector machines and gradually feature removal method," Expert Systems with Applications, vol. 39, pp. 424-430, 2012.
[19] F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N. Yazdani, "Mutual information-based feature selection for intrusion detection systems," Journal of Network and Computer Applications, vol. 34, pp. 1184-1199, 2011.
[20] A. Abraham, R. Jain, J. Thomas, and S. Y. Han, "D-SCIDS: Distributed soft computing intrusion detection system," Journal of Network and Computer Applications, vol. 30, pp. 81-98, 2007.
[21] A. Dastanpour and R. A. R. Mahmood, "Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system," in The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013, pp. 169-181.
[22] X. Sun, Y. Liu, J. Li, J. Zhu, H. Chen, and X. Liu, "Feature evaluation and selection with cooperative game theory," Pattern recognition, vol. 45, pp. 2992-3002, 2012.
[23] B. Luo and J. Xia, "A novel intrusion detection system based on feature generation with visualization strategy," Expert Systems with Applications, vol. 41, pp. 4139-4147, 2014.
[24] Y. Chen, B. Yang, and A. Abraham, "Flexible neural trees ensemble for stock index modeling," Neurocomputing, vol. 70, pp. 697-703, 2007.
[25] M. K. Siddiqui and S. Naahid, "Analysis of KDD CUP 99 Dataset using Clustering based Data Mining," International Journal of Database Theory & Application, vol. 6, 2013.
[26] G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, pp. 82-89, 2006.
[27] M. Sabhnani and G. Serpen, "KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection," in Security and Management, 2003, pp. 310-316.
[28] M. Sabhnani and G. Serpen, "Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment," in Security and Management, 2003, pp. 390-396.
[29] G. Zargar and P. Kabiri, "Identification of effective network features for probing attack detection," in Networked Digital Technologies, 2009. NDT`09. First International Conference on, 2009, pp. 392-397.
[30] A. L. Nelson, G. J. Barlow, and L. Doitsidis, "Fitness functions in evolutionary robotics: A survey and analysis," Robotics and Autonomous Systems, vol. 57, pp. 345-370, 2009.
[31] M. Pillai, J. H. Eloff, and H. Venter, "An approach to implement a network intrusion detection system using genetic algorithms," in Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, 2004, pp. 221-221.
[32] T. P. Fries, "A fuzzy-genetic approach to network intrusion detection," in Proceedings of the 2008 GECCO conference companion on Genetic and evolutionary computation, 2008, pp. 2141-2146.
[33] P. Jongsuebsuk, N. Wattanapongsakorn, and C. Charnsripinyo, "Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks," in Information Networking (ICOIN), 2013 International Conference on, 2013, pp. 1-5.
[34] S. Dhopte and M. Chaudhari, "Genetic Algorithm for Intrusion Detection System."
Author Profile
Citation
A. Dastanpour, S. Ibrahim, R. Mashinchi, "Effect of Genetic Algorithm on Artificial Neural Network for Intrusion Detection System," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.10-18, 2016.
Re-contextualization of Discretized Fuzzy Cyber-Risk Functional Arguments with Fuzzy Polynomials
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.19-26, Oct-2016
Abstract
Re-contextualization is basically a transformative process of reframing a system structure to assume that of another system. It extracts texts, symbols, signs, artefacts, or meanings from its original structure to assume another structure in context. The concept is applied in abstract and quantitative fuzziness to resolve and re-interpret discrete fuzzy function by assuming fuzzy polynomial structure. This study is premised upon the fuzziness in relationships exhibited by cyber-security vulnerabilities and threat constructs as fuzzy functions. The evaluation of discrete fuzzy functions based on arbitrary equidistant computations render the solution indeterminate. However, re-contextualizing the cyber-risk function into a fuzzy polynomial simplifies the solution and depicts its functional nature for real world applications. Numerical examples are used to illustrate the concept by the Ranking method.
Key-Words / Index Term
Cyber-Risk; Re-contextualization; Fuzzy Polynomial; Discrete Fuzzy Functions; Ranking Method
References
[1] M. Stoner, "Reframing, Recontextualizing and the Social Reconstruction of Higher Education in California, USA.," in ECER 2012 Symposium (Cadiz) Network 23 Policy Studies and Politics fo Education, 2012.
[2] A. Clemons and A. Smith, "Recontextualizing Bloom`s Taxonomy: Quantitative Measures in Formative Curriculum Assessments and Program Evaluation," 2016. [Online]. Available: https://www.academia.edu/22270014/Recontextualizing_Bloom_s_Taxonomy_Quantitative_Measures_in_Formative_Curriculum_Assessments_and_Program_Evaluations . [Accessed 5 August 2016].
[3] B. M. Ayyub, Elicitation of Expert Opinions for Uncertainty & Risks, CRC Press LLC, 2001.
[4] I. Perfilieva, "Fuzzy Function: Theoretical and Practical Point of View," in EUSFLAT, Aix-les-Bains, France, 2011.
[5] L. Zadeh, "The Concept of a Liinguistic Variable and Its Application to Approximate Reasoning," Information Sciences, vol. 8, pp. 199-257, 1975.
[6] B. Moller and U. Reuter, Uncertainty Forecasting in Engineering, Berlin: Springer, 2007.
[7] E. O. Yeboah-Boateng, "Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availablity (CIA)," center for Communications, Media & Information technologies (CMI), Aalborg University, Copengahen, 2013a.
[8] J. L. Darby, "Estimating Terrorist Risk with Possibility Theory," Los Alamos National Laboratory, USA, 2004.
[9] N. Ye, Secure Computer & Network Systems: Modeling, Analysis & Design, John Wiley & Sons, 2008.
[10] S. K. Katsikas, "Risk Management," in Computer & Information Security Handbook, Morgan-Kaufmann, Inc., 2009, pp. 605-625.
[11] M. Hanss, Applied Fuzzy Arithmetic: An Introduction with Engineering Applications, Springer, 2005.
[12] C. W. Cook, A. J. Hickle and E. M. Ruchensky, "Fuzzy One-Dimensional Models," in Applying Fuzzy Mathematics to Formal Models in Comparative Politics, Berlin Heidelberg, Springer-Verlag, 2008, pp. 81-108.
[13] L. Zadeh, "Fuzzy Sets," Information & Control, vol. 8, pp. 338-353, 1965.
[14] H. Kwakemaak, "Fuzzy Random Variables: Definitions and Theorems," Information Science, vol. 15, pp. 1-29, 1978.
[15] M. Yang and M. Liu, "On Possibility Analysis of Fuzzy Data," Fuzzy Sets & Systems, vol. 94, pp. 174-183, 1998.
[16] R. Kruse and K. Meyer, Statistics with Vague Data, Reidel: Dordrecht, 1987.
[17] S.-Y. Wang and C.-C. Hwang, "An Application of Fuzzy Set Theory to the Weighted Average Cost of Capital and Capital Structure Decision," Technology & Investment, vol. 1, no. 4, pp. 248-256, November 2010.
[18] E. Cox, The Fuzzy Systems Handbook: A Practioner`s Guide to Building, Using & Maintaining Fuzzy Systems, Academic Press, Inc., 1994.
[19] P. Dadone, Introduction to Fuzzy Sets, 1995 ed., vol. 83, J. Mendel, Ed., Proceedings of IEEE, 2000.
[20] K. H. Lee, First Course on Fuzzy Theory & Applications, Verlag-Berlin Heidelberg: Springer, 2006.
[21] D. A. Maces and M. A. Stadtherr, "Computing Fuzzy Trajectories for Nonlinear Dynamic Systems," Department of Chemical and Biomedical Engineering, University of Notre Dame, 2013.
[22] J. Buckley and E. Eslami, "Neural Net Solution of Fuzzy Problems: The Quadratic Equation," Fuzzy Sets and Systems, vol. 86, pp. 289-298, 1997.
[23] M. Otadi and M. Mosleh, "Solution of Fuzzy Polynomial Equations by Modified Adomain Decomposition Method," Soft Computing, vol. 15, pp. 187-192, 2011.
[24] S. Abbasbandy and B. Asady, "Newton`s Method for Solving Fuzzy Nonlinear Equations," Applied Mathematics and Computaion, vol. 159, pp. 356-379, 2004.
[25] A. Sala and C. Arino, "Polynomial Fuzzy Models for Nonlinear Control: A Taylor-series Approach," IEEE Transactions on Fuzzy Systems, vol. 17, no. 6, 2010.
[26] S. Abbasbandy and M. Otadi, "Numerical Solution of Fuzzy Polynomials by Fuzzy Neural Network," Applied Mathematics and Computation, vol. 181, pp. 1084-1089, 2006.
[27] N. A. Rahman and L. Abdullah, "Multi-Solutions of Fuzzy Polynomials: A Review," International Journal of Engineering and Applied Sciences, vol. 3, no. 3, pp. 8-16, 2013.
[28] H. Kharrati, S. Khanmohammadi, W. Pedrycz and G. Alizadeh, "Imporved Polynomial Fuzzy Modeling and Controller with Stability Analysis for Nonlinear Dynamical Systems," Mathematical Problems in Engineering, vol. 2012, no. 273631, 2012.
[29] H. Rouhparvar, "Solving Fuzzy Polynomial Equation by Ranking Method," in First Joint Congress on Fuzzy and Intelligent Systems, Mashhad, Iran, 2007.
[30] Learning Research and Development Center;, "A Performance-Based Assessment: A Means to High-Level Thinking and Reasoning," University of Pittsburgh, 2012.
[31] C. R. Haugen, "Contextualizations and Recontextualizations of Discourse on Equity in Education," NTNU, 2009.
[32] P. Dowling, The Sociology of Mathematics Education: Mathematical Myths/Pedagogic Texts, Routledge, 2002.
[33] B. Bernstein, Class, Codes, and Control, vol. 4, Routledge, New York: London Routledge & Kegan Paul, 2003.
[34] J. Wu, S. Huang and R. Zheng, "Recontextualization and Transformation in Media Discourse: An Analysis of the First Instance Judgment of the Peng Yu Case," Discourse & Society, 2016.
[35] D. Armstrong, D. Espling, J. Tordsson, K. Djemame and E. Elmroth, "Runtime Virtual Machine Recontextualization for Clouds," in Euro-Par`12 Proceedings of the 18th International Conference on Parallel Processing Workshops, 2012.
[36] H. M. Nehi, "A New Ranking Method for Intuitionistic Fuzzy Numbers," International Journal of Fuzzy Systems, vol. 12, no. 1, 2010.
[37] M. Dondo, A Fuzzy Risk Calculations Approach for a Network Vulnerability Ranking System, 2007.
[38] D. Denning, "Cyber-Security as an Emergent Infrastructure," in Bombs & Bandwidth: The Emerging Relationship between IT & Security, The New Press, 2003.
[39] M. Spivak, Calculus, Texas: Publish or Perish, Inc., 2008.
Citation
E.O. Yeboah-Boateng, "Re-contextualization of Discretized Fuzzy Cyber-Risk Functional Arguments with Fuzzy Polynomials," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.19-26, 2016.
A Web-Based General Service Provider
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.27-32, Oct-2016
Abstract
In this paper, we report about the design and implementation of a web-based prototype system for allowing consumers to access general services using their computers or handheld devices. The aim of the work is to use technology to assist people having a daily routine of work in getting needed services that may hinder their regular work. These services include housekeeping, vehicle maintenance, child tutoring, and many others. We proposed and developed a web-based general service provider system where business entities can offer their services and consumers can book and use those services. Such a system can greatly save consumers` time and lower their stress level as they will be relieved to focus on their daily routine work.
Key-Words / Index Term
Keywords� E-commerce; General service provider; Web-based systems; Bootstrap framework
References
[1] Maceda, C. (2012, July 20). UAE employees struggling to cope with stress at work | GulfNews.com. Retrieved August 15, 2016, from http://gulfnews.com/business/sectors/employment/uaeemployees-struggling-to-cope-with-stressat-work-1.1051718
[2] Gulf Business. (2015, June 3). Gulf Business |42% of UAE employees find workplace stressful - report. Retrieved August 15, 2016, from http://gulfbusiness.com/42-uae-employees-find-workplace-stressful-report/
[3] Michael D. Clemes, Christopher Gan, Junli Zhang. An empirical analysis of online shopping adoption in Beijing, China. Journal of Retailing and Consumer Services. Volume 21, Issue 3, May 2014, Pages 364�375
[4] Jill Mostellera, Naveen Donthub, Sevgin Eroglub. The fluent online shopping experience. Journal of Business Research. Volume 67, Issue 11, November 2014, Pages 2486�2493
[5] Aur�lia Michaud Trevinala, Thomas Stenger. Toward a conceptualization of the online shopping experience. Journal of Retailing and Consumer Services. Volume 21, Issue 3, May 2014, Pages 314�326
[6] Don E. Schultz, Martin P. Block. U.S. online shopping: Facts, fiction, hopes and dreams. Journal of Retailing and Consumer Services, Volume 23, March 2015, Pages 99-106
[7] Maid Service in Dubai, (2016). Retrieved August 15, 2016, from http://www.marvelmaid.com/
[8] MyPrivateTutor - Find Tutors and Local Classes in Dubai, Abu Dhabi, Sharjah. (2016). Retrieved August 15, 2016, from http://www.myprivatetutor.ae/
[9] SMS Maid Service Dubai,Professional Legal Maids,Pet Care Services Dubai, UAE. (2016). Retrieved August 15, 2016, from http://www.smsmaids.com
[10] ZDEGREE Tire and Auto Services, Dubai, UAE. (2016). Retrieved August 15, 2016, from https://www.myzdegree.com/
[11] W3Schools Online Web Tutorials. (2016). Retrieved August 15, 2016, from http://www.w3schools.com
[12] Hypetext Preprocessor (2016). Retrieved August 15, 2016, from https://secure.php.net/
[13] Bootstrap. The world most-popular mobile first framework. 2016. Retrieved August 15, 2016, from http://getbootstrap.com/
[14] WampServer. (2016) Retrieved August 15, 2016, from http://www.wampserver.com/en/
[15] Apache Cordova. (2016). Retrieved on August 15, 2016, https://cordova.apache.org
[16] Ionic: Advanced HTML5 Hybrid Mobile App Framework. (2016). Retrieved August 15, 2016, from http://ionicframework.com/
[17] Firebase | App Success Made Simple. (2016). Retrieved on August 15, 2016, https://firebase.google.com/
[18] Narayanan, A. (2013, March 25). The Firebase Blog: Where does Firebase fit in your app? Retrieved August 15, 2016, from https://firebase.googleblog.com/2013/03/where-does-firebase-fit-in-your-app.html
Citation
J. Ali, "A Web-Based General Service Provider," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.27-32, 2016.
Towards Deriving an Optimal Approach for Denoising of RISAT-1 SAR Data Using Wavelet Transform
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.33-46, Oct-2016
Abstract
Synthetic Aperture Radar(SAR) image filtering has been of interest since its inception. A variety of denoising filters for SAR images have been proposed in the recent years, which are targeted at removing the speckle noise to increase the contrast of the image, and make it useful for further image interpretation and applications. Of late, Wavelet based SAR data denoising techniques have been gaining popularity due to its space-frequency localization capability and the capacity to analyse the data at different scales. In this paper, we have attempted to derive an optimal approach for wavelet based SAR image filtering based on the quality criteria which takes into account not only the radiometric quality but also the geometric quality using point target data of actual Corner Reflector. Different orders of Daubechies wavelet coefficients have been used in the DWT(Discrete Wavelet Transform) based approach. In this study all aspects of an image quality have been taken into consideration such as the geometric fidelity and the radiometric quality, and using a simple heuristic soft thresholding criteria, optimal basis has been arrived at.
Key-Words / Index Term
SAR, speckle, denoising, Wavelet based denoising, thresholding, decomposition, mother wavelets, radiometric resolution, geometric resolution, corner reflector.
References
[1] F T Ulaby, R K Moore and A K Fung, �Microwave Remote Sensing Active and Passive�, Artech House, Vol-II, 1986.
[2] J Reeves, �Manual of Remote Sensing, American Society Of Photogrammetry�, First Edition, Vol-1, 1975.
[3] R K Raney, �Radar Fundamentals: Technical Perspective, Principles and Applications of Imaging Radar: Manual of Remote Sensing�, 3rd Edition, New York: Wiley Interscience, Vol- 2, pp (9-130), 1998.
[4] G V E R Harvy, �Speckle Statistics in Four-Look Synthetic Aperture Radar Imagery�, Optical Engineering, Vol-30 Issue-4, pp (375-381), 1991.
[5] J Bruniquel and A Lopes, �Multivariate Optimal Speckle Reduction in SAR Imagery�, International Journal of Remote Sensing, Vol-18, Nos-3, pp(603-627), 1997.
[6] J S Lee, �Speckle Suppression and Analysis for Synthetic Aperture Radar Images�, Optical Engineering, 25(5), pp(636-643), 1986.
[7] J S Lee, �Digital image enhancement and noise filtering by use of local statistics�, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol-2, pp(165-168), 1980.
[8] V S Frost, J A Stiles, K S Shanmugan, J C Holtzman, �A model for radar images and its application to adaptive digital filtering of multiplicative noise�, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol-4, pp(157-166), 1982.
[9] D T Kuan, A A Sawchuk, T C Strand, P Chavel, �Adaptive noise smoothing filter for images with signal dependant noise�, IEEE Transaction on PAMI-7, No-2, pp(165-177), 1985.
[10] A Baraldi, F Pannigiann, �A refined Gamma MAP SAR speckle filter with improved geometrical adaptivity�, IEEE Transactions on Geoscience and Remote Sensing, Vol-33, pp(1245-1257), 1995.
[11] S G Mallat, �Theory for Multiresolution Signal Decomposition: The Wavelet Representation�, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol-11, Issue-7, pp(674-693), 1989.
[12] F Argenti, L Alparone, �Speckle Removal from SAR Images in the Undecimated Wavelet Domain�, IEEE Transactions on Geoscience and Remote Sensing, Vol-40, pp( 2363-2374), 2002.
[13] L Gagnon, A Jouan, �Speckle filtering of SAR images - A comparative study between complex-wavelet based and standard filters�, SPIE Proceedings, Vol-3169, pp(80-91), 1997.
[14] Jia-Hua Hou, Xiang-Ming Liu, Cheng-Yi Xiong, He Xiang, �Speckle reduction algorithm for synthetic aperture radar images based on Bayesian Maximum a Posteriori estimation in wavelet domain�, Optical Engineering, 47_5_ 057004, pp(057004-1 � 057004-11), 2008.
[15] P U Fangling, X U Xin, �Wavelet-domain suppression of speckle in single-look SAR images�, Proceedings of SPIE Vol- 4552, doi:10.1117/12.441515, 2001.
[16] S Solbo, T Eltoft, �Homomorphic wavelet based statistical despeckling of SAR images�, IEEE Transactions on Geoscience and Remote Sensing, Vol-42, pp(711-721), 2004.
[17] Dusan Gleich, and Mihai Datchu, �Wavelet based SAR image despeckling and information extraction, using particle filter�, IEEE Transactions on Image Processing, Vol. 18, Issue-10, pp(2167-2184), 2009.
[18] S Parrilli, M Poderico, Vincenzo Angelino, C L Verdoliva, �A nonlocal SAR image denoising algorithm based on LMMSE wavelet shrinkage�, IEEE Transactions on Geoscience and Remote Sensing, Vol-50, Issue-2, pp(606-616), 2012.
[19] K Dabov, A Foi, V Katkovnik, K Egiazarian, �Image Denoising by Sparse 3D Transform-Domain Collaborative Filtering�, IEEE Transactions on Image Processing, Vol-16, (8), pp(2080-2095), 2007.
[20] H L Xie, E Pierce, F T Ulaby, �Statistical properties of logarithmically transformed speckle�, IEEE Transactions on Geoscience and Remote Sensing, Vol-40, pp(721-727), 2002.
[21] L Gagnon, �Wavelet Filtering of Speckle Noise - Some Numerical Results�, Vision Interface, Trois-Rivi�res, Canada,19-21, pp(336-343),1999.
[22] I Daubechies, �The wavelet transform time frequency localization and Signal Analysis�, IEEE Transactions on Information Theory, Vol-36, Issue-5, pp(961-1005),1990.
[23] D L Donoho, �Denoising by soft thresholding�, IEEE Transactions on Information Theory, Vol- 41, pp(613- 627), 1995.
[24] X P Zhang, M Desai, �Adaptive denoising based on SURE Risk�, IEEE Signal Processing Letters, Vol-5, Issue-10, pp. 265-267, 1998.
[25] Thierry Blu, Florian Luisier, �The SURE-LET Approach to Image Denoising�, IEEE Transactions on Image Processing, Vol-1, Issue-11, pp(2778-2786), 2007.
[26] S G Chang, B Yu, M Vetterli, �Adaptive Wavelet Thresholding for Image Denoising and Compression�, IEEE Transactions on Image Processing, Vol- 9, pp(1532-1546), 2000.
[27] H Xie, L E Pierce, F T Ulaby, �SAR Speckle reduction using wavelet denoising and Markov Random Field Modeling�, IEEE Transactions on Geoscience and Remote Sensing, Vol-40, No 10, pp(2196-2212), 2002.
[28] T Misra, S S Rana, N M Desai, D B Dave, RajeevJyoti, R K Arora, C V N Rao, B V Bakori, R Neelakantan, J G Vachchani, �Synthetic Aperture Radar Payload On-Board RISAT-1: Configuration, Technology and Performance�, Current Science (00113891) 104 (4), pp. (447-461), 2013,.
[29] SAC, RISAT-1-SAR Payload Detailed Design Review Document, Internal Document, SAC/RISAT/DDR/01/ 2009.
[30] Arundhati Misra, B Kartikeyan, S Garg, �Denoising Of SAR Imagery In The Wavelet Framework: Performance Analysis�, International Journal of Remote Sensing & Geoscience (IJRSG), Vol-3, Issue-2, ISSN No: 2319-3484, 2014.
[31] Arundhati Misra, B Kartikeyan, S Garg, �Towards Identifying Optimal Quality Indicators For Evaluating Denoising Algorithm Performance In SAR�, International Journal of Computer Science and Communication, Vol-7, No1, pp(1-10), 2016.
[32] Arundhati Ray and B Kartikeyan, �Denoising Techniques For Synthetic Aperture Radar Data � A Review�, International Journal of Computer Engineering and Technology , Vol-6, Issue-9, pp (01-11), 2015.
[33] V S Rathore & V S Kharsan, �Simulation of Hybrid Filter Model to Enhance the Quality of Noisy Images�, International Journal of Computer Sciences and Engineering, Vol-04, Issue-07, pp (18-23), July, 2016.
Citation
A. Ray, B. Kartikeyan, S. Garg, "Towards Deriving an Optimal Approach for Denoising of RISAT-1 SAR Data Using Wavelet Transform," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.33-46, 2016.
Review on Recent Applications of High Accuracy Approach for High Level Image Denoising Techniques
Review Paper | Journal Paper
Vol.4 , Issue.10 , pp.47-51, Oct-2016
Abstract
Visual information transmitted in the form of digital images is becoming a major method of communication in the modern age, but the image obtained after transmission is often corrupted with noise. The received image needs processing before it can be used in applications. Image denoising involves the manipulation of the image data to produce a visually high quality image. This thesis reviews the existing denoising algorithms, such as filtering approach, wavelet based approach, and multifractal approach, and performs their comparative study. Different noise models including additive and multiplicative types are used. They include Gaussian noise, salt and pepper noise, speckle noise and Brownian noise. Selection of the denoising algorithm is application dependent. Hence, it is necessary to have knowledge about the noise present in the image so as to select the appropriate denoising algorithm. The filtering approach has been proved to be the best when the image is corrupted with salt and pepper noise. The wavelet based approach finds applications in denoising images corrupted with Gaussian noise.
Key-Words / Index Term
Image Processing, Denoising, Pattern Recognition and Image Enhancement
References
[1] D. L. Donoho and I. M. Johnstone, �Adapting to unknown smoothness via wavelet shrinkage,� J. Amer. Statist. Assoc., vol. 90, pp. 1200-1224, 1995.
[2] M. K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin, �Low-complexity image denoising based on statistical modeling of wavelet coefficients,� IEEE Signal Process. Lett., vol. 6, pp. 300-303, 1999.
[3] S. G. Chang, B. Yu, and M. Vetterli, �Spatially adaptive wavelet thresholding with context modeling for image denoising,� IEEE Trans. Image Process., vol. 9, pp. 1522-1531, 2000.
[4] I. Prudyus, S. Voloshynovskiy, and A. Synyavskyy, �Wavelet-based MAP image denoising using probably better class of stochastic i.i.d. image models,� Proc. Int. Conf. Telecommun., Modern Satellite, Cable and Broadcasting Service, pp. 583-586, 2001.
[5] L. Kaur, S. Gupta, and R. C. Chauhan, �Image denoising using wavelet thresholding,� Proc. Int. Conf. Computer Vision, Graphics and Image Process., pp. 1-4, 2002.
[6] L. Sendur and I. W. Selesnick, �Bivariate shrinkage with local variance estimation,� IEEE Signal Process. Lett., vol. 9, pp. 438-441, 2002.
[7] A. Achim and E. E. Kuruoglu, �Image denoising using bivariate α-stable distributions in the complex wavelet domain,� IEEE Signal Process. Lett., vol. 12, pp. 17-20, 2005.
[8] A. Pizurica and W. Philips, �Estimating the probability of the presence of a signal of interest in multiresolution single- and multiband image denoising,� IEEE Trans. Image Process., vol. 15, pp. 654-665, 2006.
[9] F. Luisier, T. Blu, and M. Unser, �A new SURE approach to image denoising: Interscale orthonormal wavelet thresholding,� IEEE Trans. Image Process., vol. 16, pp. 593-606, 2007.
[10] H. Rabbani, �Image denoising in steerable pyramid domain based on a local Laplace prior,� Pattern Recognition, vol. 42, pp. 2181-2193, 2009.
[11] Q. Guo and S. Yu, �Image denoising using a multivariate shrinkage function in the curvelet domain,� IEICE Electron. Express, vol. 7, pp. 126-131, 2010
Citation
D. Tripathi, V.K. Shukla, "Review on Recent Applications of High Accuracy Approach for High Level Image Denoising Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.47-51, 2016.
A Concise Analysis of Various Recommendation Methods and Techniques for Efficient Recommender Systems
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.52-58, Oct-2016
Abstract
Recommender Systems are eminently in demand to manage the problem of highly overloading data and to avoid the retrieval of irrelevant information from Web, which is a major part of Information Filtering. Recommender Systems helps user to make precise and explicit decisions and study the user�s knowledge to enhance the Business growth. Different Recommendation methods are implemented for achieving varied recommendations in numerous vital applications based on the expected behavior of the system and relevant data mining strategies are used to perform efficient information retrieval. This paper analyses the various Recommendation methods available for building effective Recommender Systems and exploits the participation and usage of Recommendation methods in different domains. This paper also focuses to discuss Data Mining techniques and their scope towards implementing such effective Recommender Systems.
Key-Words / Index Term
Recommendation Algorithm; Content Based Filtering; Collaborative Filtering; Hybrid Recommendation; Knowledge Based Recommendation; Group Recommendation; Data Mining Methods
References
[1] R.Akil Sindhu and Dr.R.Manicka Chezian, �The Movement of Web from Web 0.0 to Web 5.0: A Comparative Study�, International journal of Multidisciplinary Research and Development, Vol-03, Issue-01, Pp. (176-179), Mar 2016.
[2] Jie Lu, Dianshuang Wu, Mingsong Mao, Wei Wang, Guangquan Zhang, �Recommender System Application Developments: A Survey�, Decision Support Systems, Vol-74, Issue -C, Pp. (12-32), June 2015.
[3] R.Akil Sindhu and Dr.R.Manicka Chezian, �Semantic Web and Ontology: Effective Approaches to Build Intelligent Web�, International Journal of Innovative Research in Computer and Communication Engineering, Vol-04, Issue-03, Pp. (4241-4248), Mar 2016.
[4] RVVSV Prasad and V Valli Kumari, �A CATEGORICAL REVIEW OF RECOMMENDER SYSTEMS�, International Journal of Distributed and Parallel Systems (IJDPS) Vol-03, No-05, Pp. (73-83), Sep 2012.
[5] Daniar Asanov, �Algorithms and Methods in Recommender Systems�, Berlin Institute of Technology Berlin, Germany, 2011.
[6] Zuping Liu, �Collaborative Filtering Recommendation Algorithm Based on User Interests�, International Journal of
u- and e- Service, Science and Technology, Vol-08, No-04, Pp. (311-320), 2015.
[7] Sihem AmerYahia, Senjuti Basu Roy, Ashish Chawla, Gautam Das, Cong Yu, �Group Recommendation: Semantics and Efficiency �, Proceedings of the VLDB Endowment, Vol-02, Issue-01, Pp. (754-765), Aug 2009.
[8] Francesco Ricci, Lior Rokach, Bracha Shapira, Paul B. Kantor �Recommender Systems Handbook�, Springer Science + Business Media, LLC-2011, Second (2nd) Edition, ISBN: 978-0-387-85819-7.
[9] Poonam B.Thorat, R.M Goudar, Sunita Barve, �Survey on Collaborative Filtering, Content-based Filtering and Hybrid Recommendation System�, International Journal of Computer Applications (0975 � 8887) Vol-110, No-04, Pp. (31-36), Jan 2015.
[10] Neethu Raj, Suja Rani M S, �An Overview of Content Recommendation Methods�, International Journal of Innovative Research in Compute and Communication Engineering Vol-03, Issue-01, Pp. (334-339), Jan 2015.
[11] Lalita Sharma, Anju Gera, �A Survey of Recommendation System: Research Challenges�, International Journal of Engineering Trends and Technology (IJETT) � Vol-04, Issue-05, Pp. (1989-1992), May 2013.
[12] Ruchita V. Tatiya , Prof. Archana S. Vaidya, �A Survey of Recommendation Algorithms�, IOSR Journal of Computer Engineering Vol-16, Issue-06, Pp.(16-19), Nov � Dec. 2014.
[13] Majid Hatami and Saeid Pashazadeh, �Enhanciing Prediction in Collaborative Filtering-Based Recommender Systems�, International Journal of Computer Sciences and Engineering, Vol-02, Issue-01, Pp. (48-51), Jan 2014.
Citation
R.A. Sindhu, R.M. Chezian, "A Concise Analysis of Various Recommendation Methods and Techniques for Efficient Recommender Systems," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.52-58, 2016.
VANET and its Security Issues- A Review
Review Paper | Journal Paper
Vol.4 , Issue.10 , pp.59-64, Oct-2016
Abstract
Vehicular Adhoc Networks (VANETs) are gaining growing interest and research efforts over recent years for it offers enhanced safety and enriched travel comfort. However, security concerns that are either general seen in adhoc networks or unique to VANET present great challenges. This review paper presents the basics of VANET which includes architecture of VANET, its applications and its characteristics. The major consideration of this paper is on security, so security requirements and issues related to security are also presented in this paper. This paper also provides information about types of attackers and types of attacks in VANET.
Key-Words / Index Term
MANET, VANET, Key management
References
[1] Diyar Khairi M S, Amine Berqia, �Survey on QoS and Security in Vehicular Ad hoc Networks�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 5, 2015, pp. 42-52.
[2] Praveen G Salagar, Shrikant S Tangade,� A SURVEY ON SECURITY IN VANET‟, International Journal For Technological Research In Engineering, Volume 2, Issue 7,2015, pp. 1397- 1402
[3] Jaydeep P. Kateshiya, Anup Prakash Singh, �Review To Detect and Isolate Malicious Vehicle in VANET�, International Journal of Innovative Research in Science, Engineering and Technology Vol. 4, Issue 2, 2015, pp.127-132
[4] Arif Sari, Onder Onursal, Murat Akkaya, �Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)�, Int. J. Communications, Network and System Sciences, Vol. 8, 2015,pp.552-566
[5] Komal B. Sahare, DR. L.G.Malik, � Review - Technique for Detection of Attack in VANET�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, 2014, pp.580-584.
[6] Rashmi Raiya, Shubham Gandhi, � Survey of Various Security Techniques in VANET�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 6, 2014, pp. 431-433.
[7] Divya Chadha, Reena, �Vehicular Ad hoc Network (VANETs): A Review�, International Journal of Innovative Research in Computer and Communication Engineering, 2015.
Citation
V. Singh, K. Mahajan, "VANET and its Security Issues- A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.59-64, 2016.
Providing Confidentiality, Integrity and Atomicity for data stored in the cloud storage
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.65-70, Oct-2016
Abstract
Cloud computing is a kinds of computing that depend on distribution computing resources before having local servers or own devices to knob applications. Cloud computing is equivalent to grid computing, In the cloud is a kind of computing where vacant handing out rounds of the entire computers in a network are harnesses to solved the concerns also focused for some stand-alone mechanism. Cloud computing security mentions to the group of processes, procedures and standards designed to deliver information security guarantee in a cloud environment. Cloud computing security comprises both logical and physical security concerns across all the diverse various models of software platform, infrastructure and software. It also defines how these services are delivered (public, private or hybrid delivery model).
Key-Words / Index Term
Encryption, Decryption, ECC, RSA, SLA cloud storage
References
[1] Ranjit Kaur and Raminder Pal Singh �Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques� International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE-2014
[2] Dr. L. Arockiam and S. Monikandan �Efficient Cloud Storage Confidentiality to Ensure Data Security� International Conference on Computer Communication and Informatics (ICCCI), IEEE-2014, DOI-Jan. 03 � 05, 2014, Coimbatore, INDIA
[3] R.K. Banyan, V.K. Jain and Pragya Jain �Data Management System to Improve Security and Availability in Cloud Storage� International Conference on Computational Intelligence & Networks, IEEE-2015, DOI 10.1109/CINE.2015.32.
[4] Mohammed faez AL-Jaberi, AnazidaZainal �data integrity and privacy model in cloud computing� International Symposium on Biometrics and Security Technologies (ISBAST), IEEE, 2014.
[5] Cindhamani.J, Naguboynia Punya, Rasha Ealaruvi and L.D. Dhinesh babu �An enhanced data security and trust management enabled framework for cloud computing systems� 5th ICCCNT, IEEE-2014, DOI- July 11-13, 2014.
[6] Mr.Chandrashekhar S. Pawar ,Mr.Pankaj R. Patil �Providing Security and Integrity for Data Stored in Cloud Storage� ICICES2014 - S.A. Engineering College, Chennai, Tamil Nadu, India , IEEE 2014
[7] Rukaiya Sheikh, Disha Deotale Security and Authentication Process using ECC in VANET�. International Journal of Advance Research in Computer Science and Management Studies
[8] F. Yahya, V. Chang, R.J. Walters and G.B. Wills �Security Challenges in Cloud Storage� 6th International Conference on Cloud Computing Technology and Science, IEEE-2014, DOI 10.1109/CloudCom.2014.171.
[9] Y Govinda Ramaiah and G Vijaya Kumari �Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing� 12th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE-20 13,DOI 10.1109/TrustCom.2013.191.
[10] Sravan kumar R and Ashutosh Saxena �Data Integrity Proofs in Cloud Storage� IEEE-2011.
[11] V.Nirmala, R.K.Sivanandhan and Dr..R. Shanmuga Lakshmi �Data Confidentiality and Integrity Verification using User Authenticator� International Conference on Green High Performance Computing ,IEEE-2013, March 14-15, 2013.
[12] S.Mahdi Shariati, Abouzarjomehri and M Hossein Ahmadzadegan �Changes and Security issues in cloud computing from two perspectives: Data Security and Privacy Protection�2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), IEEE-2015.
[13] Siddharth Dutt Choubey and Mohit Kumar Namdeo �Study of Data Security and Privacy Preserving Solutions in Cloud Computing� International Conference on Green Computing and Internet of Things (ICGCloT), IEEE-2015.
Citation
A. Bansal, A. Agrawal, "Providing Confidentiality, Integrity and Atomicity for data stored in the cloud storage," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.65-70, 2016.
Data flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm
Research Paper | Journal Paper
Vol.4 , Issue.10 , pp.71-75, Oct-2016
Abstract
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Key-Words / Index Term
Sensor nodes, Wireless Sensor Network, Bellman-Ford routing algorithm, Qualnet 5.0.2.
References
[1]. I.F. Akyildiz et al., �Wireless sensor networks: a survey�, Computer Networks 38, 393�422, 2002.
[2]. Jagdeep Singh, Manju Bala and Varsha , "REAC-IN Regional Energy Aware Clustering Protocol in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (90-94), May -2016
[3]. A. Hemalatha and D. Sasirekha, "A Survey on Energy Efficient Routing Protocols in WSN", International Journal of Computer Sciences and Engineering, Vol. 4(3), pp.77-81, Mar -2016
[4]. W. R. Heinemann, A. Chandrakasan, and H. Balkrishnan, �Energy-Efficient Communication Protocol for Wireless Micro sensor Networks�, in Proceedings of 33rd Hawaii International Conference on System Science, Vol. 2, pp.1-10, Jan. 2000.
[5]. Nathiya, R., and S. G. Santhi. "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)." International Journal of Computer Sciences and Engineering, Vol. 2 (2), pp36-43, 2014
[6]. S.G. Santhi and R.Nathiya, "Power Consumption Based Efficient Routing With Mobile Collector in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue-4, pp.64-70, Apr -2014
[7]. C-Y. Chong, S.P. Kumar, �Sensor networks: evolution, opportunities, and challenges�, Proceedings of the IEEE 91 (8) ,1247�1256, July 2007.
[8]. Aditya Singh Mandloi and Vinita Choudhary, "An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue-1, pp.6-10, 2013
[9]. Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in wireless sensor networks:a survey." Wireless communications, IEEE 11.6: 6-28, 2004.
[10]. Mardani, Morteza, Seung-Jun Kim, and Georgios B. Giannakis. "Cross-layer design of wireless multihop random access networks." Signal Processing, IEEE Transactions on 60.5 (2012): 2562-2574.
[11]. Heinemann, Wendi Rabiner, Anantha Chandrakasan, and Hari Balakrishnan. "Energy-efficient communication protocol for wireless micro sensor networks." System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on. IEEE, 2000.
[12]. Herman Sahota, Ratnesh Kumar, Ahmed Kamal, Jing Huang, �An Energy-Efficient Wireless Sensor Network for Precision Agriculture�, in Proc.IEEE 2010.
[13]. Yong Ding, Zhou Xu, Lingyun Tao,�An Cross Layer Algorithm Based on Power Control for Wireless Sensor Networks�, Springer-Verlag Berlin Heidelberg, pp.209-216, 2010.
[14]. Qingxu Xiong, Xiang, �Cross-layer design of MAC and application semantics in Wireless Sensor Netowrks�, IEEE 2014 fourth international conference on communication systems and network technologies.
[15]. Atif Sharif, Vidyasagar M. Potdar, A. J. D Rathnayaka, � LCART: A Cross-layered Transport Protocol for Heterogeneous WSN�.IEEE SENSORS 2010 Conference.
[16]. Akyildiz, Ian F., Mehmet C. Vuran, and Ozur B. Akan. "A cross-layer protocol for wireless sensor networks." 2006 40th Annual Conference on Info. Sciences and Systems. Ieee, 2006.
[17]. Chia-Hung Tsai, Tsu-Wen Hsu, Meng-Shiuan Pan, Yu-Chee Tseng, �Cross-Layer, Energy-Efficient design for supporting continuous queries in Wireless Sensor Network: A Quorum-Based Approach�, Springer Science+Business Media,LLC.2009.
[18]. Huaqing Wang,Yue Ouyang,Guixia Kang, �An Energy Efficient Cross-Layer Design for Healthcare Monitoring Wireless Sensor Networks�, in Proc.IEEE 2008.
[19]. Thomas Beluch, Daniela Dragomirescu, Robert Plana, �A Sub-nanosecond Synchronized MAC-PHY cross-layer design for Wireless Sensor Networks�, ELSEVIER, Ad Hoc Networks , 823-845,Nov 2013.
[20]. T. He and et. al. �VigilNet: An Integrated Sensor Network System for Energy-Efficient Surveillance�.ACM Transactions on Sensor Networks, Vol. 2(No.1): Page 1 � 38, February 2006.
Citation
R.K. Saini, Ritika, S. Vijay, "Data flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.71-75, 2016.