Design of A Novel Inductor less Low Noise Amplifier
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.1-7, Dec-2016
Abstract
A novel low noise amplifier is proposed using low cost 0.18 �m CMOS technology. A resistive-capacitive feedback is used to extend the bandwidth of the amplifier. As the structure is inductor less, it is suitable for low cost integrated optical interconnects. In this paper Improved Particle Swarm Optimization have applied to determine optimal trans-resistance and noise of proposed structure of amplifier. Simulation results showed a -3 dB bandwidth of 5 GHZ with a trans-impedance gain of ≈ 62 dB ohms. The total voltage source power dissipation is less than 5 mW that is much less than that of conventional trans-impedances. The output noise voltage spectral density is 9.5 nV/sqrt(Hz) with a peak of 15nV/sqrt(Hz), while, the input referred noise current spectral density is below 10pA/sqrt(Hz) within the amplifier frequency band.
Key-Words / Index Term
TIA, CMOS, Noise, Amplifier
References
[1] Z.Nosal, �Integrated circuits for high speed optoelectronics� International Conference on Microwaves, Radar and Wireless Communications, 2, 445�455, (2004).
[2] J. Pekarik, et. al., �RFCMOS technology from 0.25 �m to 65 nm: The state of the art� In Proceedings of IEEE Custom Integrated Circuits Conference, pp. 217�224, (2004).
[3] B. Razavi, �Design of integrated circuits for optical communications� McGraw Hill, (2003).
[4] Naderbeigi, Mohamadreza Soltani , Iman Chaharmahali, "Optimization of a Resistive Capacitive Feedback Trans-impedance Amplifier Using IPSO Algorithm", International Journal of Computer Sciences and Engineering, Volume-04, Issue-07, Page No (1-7), Jul -2016
[5] Hamid Niyazi, Fakhralsadat Rastegari, Majid Pourahmadi , "Design of A Novel Resistive Capacitive Feedback Trans-impedance Amplifier", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (1-7), Jun -2016
[6]T.Takemoto,H.Yamashita,T.Yazaki,N.Chujo,Y.Lee,andY.Matsuoka, �A 4� 25-to-28 Gb/s 4.9 mW/Gb/s -9.7 dBm high-sensitivity optical receiver based on 65 nm CMOS for board-to-board interconnects,� in IEEE ISSCC Dig. Tech. Papers, 2013, pp. 118�119.
[7] Dan Li, Gabriele Minoia, Matteo Repossi, Daniele Baldi, and Enrico Temporiti, �A Low-Noise Design Technique for High-Speed CMOS Optical Receivers,� IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 49, NO. 6, JUNE 2014.
[8] Parnika De and Shailendra Singh, "Enhancing Properties of Fiber Amplifier using Quantum Dots", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (123-131), Jun -2016
[9] C. Toumazou, and S. M. Park, �Wideband low noise CMOS transimpedance amplifier for gigahertz operation�, Electronics Letters, Vol. 32, No.13, pp. 1194-1196, (1996).
[10] Z. Chang, and W. M. C. Sansen, �Low-noise, low distortion CMOS AM wide-band amplifiers matching a capacitive source,� IEEE Journal of Solid-State Circuits, Vol.25, No. 3, pp. 833-840 (1990).
[11] B. Razavi, RF Microelectronics,Prentice Hall, (1998).
[12] Mohammad Emadi and Mohammad Bagher Tavakoli, "High Gain, Wide Bandwidth and Optimal Swing op-amp in CMOS Technology", International Journal of Computer Sciences and Engineering, Volume-02, Issue-12, Page No (1-5), Dec -2014
[13] J. M. Garcia del Pozo, S. Celma, M. T. Sanz, and J. P Alegre, �CMOS tunable TIA for 1.25 Gbit/s optical Gigabit Ethernet,� Electronics Letters, Vol. 43(23), pp. 1303�1305, (2007).
[14] C. Verhoeven, A. V. Staveren, G. Monna, M. Kouwenhoven, and E. Yildiz, �Structured electronic design Negative feedback amplifiers�, Dordrecht: Kluwer Academic Publishers, (2003).
[15] D. A. Johns, and K. Martin, �Analog Integrated Circuit Design,� John Wiley and Sons, Inc., (1997).
[16] X. Chen, G. Wei, and L. Peh, �Design of low-power short distance opto-electronic transceiver front-ends with scalable supply voltages and frequencies,� In International Symposium on Low Power Electronics and Design, pp. 277�282, (2008).
[17] F. Aznar, W. Gaberl, and H. Zimmermann, �A highly sensitive 2.5 Gb/s transimpedance amplifier in CMOS technology,� In IEEE International Symposium on Circuits and Systems, pp. 189�192, (2009).
Citation
P. Taghizadeh , A. Kamaly , "Design of A Novel Inductor less Low Noise Amplifier," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.1-7, 2016.
Design of a Novel Ring VCO with low Phase Noise and High frequency range
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.8-12, Dec-2016
Abstract
In this paper a ring VCO with high frequency range and low phase noise in 0.18 um CMOS technology is presented. In the proposed VCO, two techniques including current control and forward bias of body is implemented to increase the range of frequency. It is shown that forward bias of the body of control transistor cause to increase the frequency range noticeably. Moreover, by adding an inductor in the body of control transistor, the phase noise is decreased as well. The phase noise in 1 MHz offset frequency is -90 dBc/Hz and the frequency range is 2-14 GHz.
Key-Words / Index Term
VCO, Ring, Phase noise, Frequency range
References
[1] M.-L. Sheu, Y.-S. Tiao, L.-J. Taso, "A 1-V 4-GHz wide tuning range voltage-controlled ring oscillator in 0.18�m CMOS," Microelectronics Journal, vol. 42, pp. 897-902, 2011.
[2] J. Zhao and Y.-B. Kim, "A low-power digitally controlled oscillator for all digital phase-locked loops," VLSI Design, vol. 2010, p. 2, 2010.
[3] W.-H. Lee, B.-J. Gu, Y. Nishida, H. Takao, K. Sawada, M. Ishida, "Oscillation-controlled CMOS ring oscillator for wireless sensor systems," Microelectronics Journal, vol. 41, pp. 815-819, 2010.
[4] M. Frankiewicz and A. Kos, "Wide-frequency-range low-power variable-length ring oscillator in
UMC CMOS 0.18 �m," in Mixed Design of Integrated Circuits and Systems (MIXDES), 2013 Proceedings of the 20th International Conference, 2013, pp. 291-293.
[5] T. Li, B. Ye, J. Jiang, "0.5 V 1.3 GHz voltage controlled ring oscillator," in ASIC, 2009. ASICON`09. IEEE 8th International Conference on, 2009, pp. 1181-1184.
[6] U. Guler and G. Dundar, "Modeling CMOS Ring Oscillator Performance as a Randomness Source," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 61, pp. 712- 724, 2014.
[7] T. V. Cao, D.T. Wisland, T.S. Lande, F. Moradi, "A bulk-controlled ring-VCO with 1/f-noise reduction for frequency ∆Σ modulator," in Mixed Design of Integrated Circuits & Systems, 2009. MIXDES`09. MIXDES-16th International Conference, 2009, pp. 187-192.
[8] A. Ramazani, S. Biabani, GH. Hadidi, "CMOS Ring Oscillator with Combined Delay Stages," AEU-International Journal of Electronics and Communications, 2014.
[9] P. Nugroho, R.K. Pokharel, H. Kanaya, K. Yoshida, "A 5.9 GHz Low Power and Wide Tuning Range CMOS Current-controlled Ring Oscillator," International Journal of Electrical and Computer Engineering (IJECE), vol. 2, pp. 293-300, 2012.
[10] J. Radic, A. Djugova, L. Nagy, M. Videnovic-Misic, "Body effect influence on 0.18 � m CMOS ring oscillator performance for IR-UWB pulse generator applications," in Embedded Computing (MECO), 2012 Mediterranean Conference on, 2012, pp. 170-173.
[11] J. Garg and S. Verma, "Design of low power Voltage Controlled Oscillator," in Emerging Technology Trends in Electronics, Communication and Networking (ET2ECN), 2012 1st International Conference on, 2012, pp. 1-4.
[12] R. Ashish, J.N. Vashishtha, R K sarin, "A RF Low Power 0.18-� m based CMOS Differential ring oscillator," Proceedings of the World Congress on Engineering, vol. 2, 2012.
[13] S.-M. Kang and Y. Leblebici, CMOS digital integrated circuits: Tata McGraw-Hill Education, 2003.
[14] A. Daghighi and A. Neshat-Niko, "VCO Design and Simulation Using TSMC 0.18 um Process to Meet IEEE802.11a Requirements," Majlesi Journal of Electrical Engineering, vol. 2, pp. 29-37, 2008.
[15] S. Shieh Ali Saleh and N. Masoumi, "Wide-tuning-range, low-phase-noise quadrature ring oscillator exploiting a novel noise canceling technique," AEU - International Journal of Electronics and Communications, vol. 66, pp. 372-379, 2012.
[9] Jian ZhangI;Guoch Huang,� SiGe V Band Wide Tuning-Range vco and Frequency Divider for Phase Locked Loop�, Integrated Nonlinear Microwave and Millimetre-Wave Circuits (INMMIC), Sept. 2012,pp(1 � 3), E-ISBN :978-1-4673-2948-4
Citation
M. Taghizadeh, P. Taghizadeh, Sghizadeh, A. Kamaly, S.A. Emamghorashi, "Design of a Novel Ring VCO with low Phase Noise and High frequency range," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.8-12, 2016.
Oxide-Confined VCSEL with Enhanced Single-Mode Output Power Via two Oxide Layers with multiple apertures
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.13-18, Dec-2016
Abstract
A novel vertical-cavity surface emitting laser (VCSEL) based on two oxide layers with multiple apertures for the purpose of enlarging window aperture and maintaining single transverse mode operation is suggested and numerically investigated. The oxide layers with multiple aperture sizes structure has a number of advantages including easier fabrication in compare with multi-oxide layer structures, better mechanical stability, and very strong and high single-mode optical output power. The simulation results also show that this structure has a low threshold current. A comprehensive optical-electrical thermal-gain self-consistent VCSEL model is used to simulate and investigate the proposed structure. It has been shown that by using two oxide layers with multiple apertures in VCSEL, high single mode optical output power and a possibility of single-mode VCSEL with a large active area could be achieved.
Key-Words / Index Term
VCSEL, Oxide layer, multiple apertures, Transversally single mode laser, Comprehensive VCSEL model
References
[1] D. F. Siriani and K. D. Choquette, �Implant defined anti-guided vertical-cavity surface-emitting laser arrays,� IEEE Journal of Quantum Electronic, 47, 160-164, (2011).
[2] Y. Zhang, Y. Ning, L. Zhang, J. Zhang, J. Zhang, Z. Wang, J. Zhang, Y. Zeng and L. Wang, �Design and comparison of GaAs, GaAsP, and InGaAlAs Quantum-Well active regions for 808-nm VCSELs,� Optics Express. 19, 12569�12581, (2011).
[3] C. J. Chang-Hasnain, J. P. Harbison, G. Hasnain, A. Von Lehmen, L. T. Florez, and N. G. Stoffel, �Multiple wavelength tunable surface-emitting laser arrays,� IEEE J. Quantum Electron. 27, 1402 (1991).
[4] Mohamad Yazdanypoor, Asghar Gholami, �Optical Power Optimization of the Single Mode Vertical Cavity Surface Emitting Lasers by Two Oxide Layers,� Advanced Material Research vol. 24, 6283-6288,(2011).
[5] M. Yazdanypoor, A. Gholami, �Optimizing Optical Output Power of Single Mode VCSELs Using Multiple Oxide Layers� Selec Topic in Quanum Electronic. 19, 1701708 (2013).
[6] Mohammad Yazdanypoor, and Farzin Emami, �High Power Single Mode Multi-Oxide Layer VCSEL with Optimized Thicknesses and Aperture Sizes of Oxide Layers,� Journal of the Optical Society of Korea, Vol. 18, No. 2, pp. 167-173, April 2014.
[7] H. J. Unold, S.W.Z. Mahmoud, R. Jager, M. Grabherr, R. Michalzik, K.J.Ebeling, �Large-Area Single-Mode VCSELs and the Self-Aligned Surface Relief�, IEEE Journal on Selected Topics in Quantum Electronics. 7, 386 � 392, (2001).
[8] A. Haglund, J. S. Gustavsson, J. Vuku�ić, P. Modh, and A. Larsson, �Single fundamental-mode output power exceeding 6 mW from VCSELs with a shallow surface relief,� IEEE Photon. Technol. Lett. 16, 368�370, (2004).
[9] Y. A. Wu, G. S. Li, W. Yuen, C. Caneau, and C. J. Chang-Hasnain, �High-yield processing and single-mode operation of passive antiguide region vertical-cavity lasers,� IEEE J. Select. Topics Quantum Electron. 3, 429�434, (1997).
[10] A. J. Danner, J. J. Raftery, Jr., N. Yokouchi, and K. D. Choquette, "Transverse modes of photonic crystal vertical-cavity lasers," Applied Physics Letters. 7,1031-1033, (2004).
[11] J.M. Ostermann, P. Debernardi, C. Jalics, M. Feneberg, A. Kroner, M.C. Riedl, M. Golling, and R. Michalzik, "High single-mode power, monolithic polarization-controlled oxide-confined grating relief VCSELs", in Proc. 19th IEEE Int.`l Semicond. Laser Conf., pp. 109−110. Kunibiki Messe, Matsue-shi, Simane Pref., Japan, Sept. 2004.
[12] C.-A. Berseth, B. Dwir, I. Utke, H. Pier, A. Rudra, V.P. Iakovlev, E. Kapon, and M. Moser, �Vertical cavity surface emitting lasers incorporating structured mirrors patterned by electron-beam lithography�, J. Vac. Sci. Technol. B 17, pp. 3222-3224, 1999.
[13] P. Debernardi and G.P. Bava, �Coupled mode theory: a powerful tool for analyzing complex VCSELs and designing advanced device features�, IEEE J. Selected Topics Quantum Electron. 9, 905-917, (2003).
[14] P. Beinstman, R. Baets, J. Vukusic, A. Larsson, M.J. Noble, M. Brunner, K. Gulden, P. Debernardi, L. Fratta, G. P. Bava, H. Wenzel, B. Klein, O. Conradi, R. Pregla, S.A. Riyopoulos, J.-F.P. Seurin, L. C. Shun, �Comparison of Optical VCSEL Models on the Simulation at Oxide-Confined Devices,� IEEE J. of Quantum Electron. 37, 1618-1631, (2001).
Citation
M. Nazeri, A. Dinarvand, "Oxide-Confined VCSEL with Enhanced Single-Mode Output Power Via two Oxide Layers with multiple apertures," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.13-18, 2016.
A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.19-26, Dec-2016
Abstract
A wormhole attack is particularly harmful against routing in sensor networks where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. A wormhole attack can be easily launched by an attacker without compromising any sensor nodes. Since most of the routing protocols do not have mechanisms to defend the network against wormhole attacks, the route request can be tunneled to the target area by the attacker through wormholes. We use one of the basic routing protocols called GRPW-Mus used for Supporting Mobile Sinks in Wireless Sensor Networks . GRPW-MuS, a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. As introduced in Reference [9, 17], the wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW-MuS is provided called GRPW-MuS-s . Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW-MuS). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.
Key-Words / Index Term
Wireless Sensor Network (WSN), Routing, Security, Wormhole attack
References
[1] Tarik Arici, Toygar Akgun, and Yucel Altunbasak. A prediction error-based hypothesis testing method for sensordata acquisition. ACM Trans. Sen. Netw., 2(4):529�556,November 2006.
[2] Marcello Cinque, Antonio Coronato, Alessandro Testa, andCatello Di Martino. A survey on resiliency assessmenttechniques for wireless sensor networks. In Proceedings ofthe 11th ACM International Symposium on Mobility Management and Wireless Access, MobiWac �13, pages 73�80,New York, NY, USA, 2013. ACM.
[3] Gabriel Martins Dias, Boris Bellalta, and Simon Oechsner.A survey about prediction-based data reduction in wirelesssensor networks. ACM Comput. Surv., 49(3):58:1�58:35,November 2016.
[4] Tassos Dimitriou and Athanassios Giannetsos. Wormholesno more? localized wormhole detection and prevention inwireless networks. In Proceedings of the 6th IEEE International Conference on Distributed Computing in SensorSystems, DCOSS�10, pages 334�347, Berlin, Heidelberg,2010. Springer-Verlag.
[5] Tassos Dimitriou and Athanassios Giannetsos. Wormholesno more? localized wormhole detection and prevention inwireless networks. In Proceedings of the 6th IEEE International Conference on Distributed Computing in SensorSystems, DCOSS�10, pages 334�347, Berlin, Heidelberg,2010. Springer-Verlag.
[6] Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, and Xiangke Liao. Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Trans. Netw.,19(6):1787�1796, December 2011.
[7] Mohammad Hammoudeh. Applying wireless sensor networks to solve real-world problems. In Proceedings of theInternational Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC �15,pages 1:1�1:1, New York, NY, USA, 2015. ACM.
[8] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014
[9] Sunil Kumar Jangir and Naveen Hemrajani. Evaluation ofblack hole, wormhole and sybil attacks in mobile ad-hocnetworks. In Proceedings of the Second International Conference on Information and Communication Technology forCompetitive Strategies, ICTCS �16, pages 74:1�74:6, NewYork, NY, USA, 2016. ACM.
[10] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
[11] A. Kopke, M. Swigulski, K. Wessel, D. Willkomm,�P. T. Klein Haneveld, T. E. V. Parker, O. W. Visser, H. S.Lichte, and S. Valentin. Simulating wireless and mobilenetworks in omnet++ the mixim vision. In Proceedings ofthe 1st International Conference on Simulation Tools andTechniques for Communications, Networks and Systems &Workshops, Simutools �08, pages 71:1�71:8, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
[12] Konrad-Felix Krentz and Gerhard Wunder. 6lowpan security: Avoiding hidden wormholes using channel reciprocity.In Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED �14, pages 13�22,New York, NY, USA, 2014. ACM.
[13] Abdelkader Laouid, Mohamed-Lamine Messai, Ahcene`Bounceur, Reinhardt Euler, Abdelnasser Dahmani, and Abdelkamel Tari. A dynamic and distributed key management scheme for wireless sensor networks. In Proceedingsof the International Conference on Internet of Things andCloud Computing, ICC �16, pages 70:1�70:6, New York,NY, USA, 2016. ACM.
[14] Stephen Paul Marsh. Formalising trust as a computationalconcept. Technical report, 1994.
[15] Takashi Minohara and Kyosuke Nishiyama. Poster: Detection of wormhole attack on wireless sensor networks induty-cycling operation. In Proceedings of the 2016 International Conference on Embedded Wireless Systems andNetworks, EWSN �16, pages 281�282, USA, 2016. Junction Publishing.
[16] Fihri Mohammed, El Fatimi Youssef, Hnini Abedehalim,and Ezzati Abdellah. Investigating the impact of black-holeattack on hierarchical protocols and direct transmission inwsn. In Proceedings of the International Conference onInternet of Things and Cloud Computing, ICC �16, pages78:1�78:4, New York, NY, USA, 2016. ACM
.[17] Richa Mudgal and Rohit Gupta. An efficient approach forwormhole detection in manet. In Proceedings of the SecondInternational Conference on Information and Communication Technology for Competitive Strategies, ICTCS �16,pages 29:1�29:6, New York, NY, USA, 2016. ACM
[18] Ibrihich Ouafaa, Laassiri Jalal, Krit Salah-ddine, andEl Hajji Said. The comparison study of hierarchical routingprotocols for ad-hoc and wireless sensor networks: A literature survey. In Proceedings of the The International Conference on Engineering & MIS 2015, ICEMIS �15, pages32:1�32:8, New York, NY, USA, 2015. ACM.
[19] Yassine Sabri and Najib El Kamoun. Geographic routingin wireless sensor networks based on a partitioned architecture. International Journal of Computer Applications,153(5):1�8, Nov 2016.
[20] H. Sarbazi-Azad and M. Ould-Khaoua. A simple mathematical model of adaptive routing in wormhole k-ary ncubes. In Proceedings of the 2002 ACM Symposium on Applied Computing, SAC �02, pages 835�839, New York, NY,USA, 2002. ACM.
[21] Marcelo P. Sousa, Ajey Kumar, Marcelo S. Alencar, andWaslon T.A. Lopes. Performance evaluation of a selective cooperative scheme for wireless sensor networks. InProceedings of the 6th ACM Symposium on PerformanceEvaluation of Wireless Ad Hoc, Sensor, and UbiquitousNetworks, PE-WASUN �09, pages 85�92, New York, NY,USA, 2009. ACM.
[22] Yanqiang Sun, Xiaodong Wang, and Xingming Zhou. Jamming attack in wsn: A spatial perspective. In Proceedings ofthe 13th International Conference on Ubiquitous Computing, UbiComp �11, pages 563�564, New York, NY, USA,2011. ACM.
[23] Kun-Lin Tsai, MengYuan Ye, and Fang-Yie Leu. Securepower management scheme for wsn. In Proceedings of the7th ACM CCS International Workshop on Managing Insider Security Threats, MIST �15, pages 63�66, New York,NY, USA, 2015. ACM.
[24] R. Annie Uthra and S. V. Kasmir Raja. Qos routing inwireless sensor networks�a survey. ACM Comput.Surv., 45(1):9:1�9:12, December 2012.
[25] Andras Varga and Rudolf Hornig. An overview of the om-�net++ simulation environment. In Proceedings of the 1stInternational Conference on Simulation Tools and Techniques for Communications, Networks and Systems &Workshops, Simutools �08, pages 60:1�60:10, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
[26] Weichao Wang and Bharat Bhargava. Visualization ofwormholes in sensor networks. In Proceedings of the 3rdACM Workshop on Wireless Security, WiSe �04, pages 51�60, New York, NY, USA, 2004. ACM.
[27] Yurong Xu, Yi Ouyang, Zhengyi Le, James Ford, and FilliaMakedon. Analysis of range-free anchor-free localizationin a wsn under wormhole attack. In Proceedings of the 10thACM Symposium on Modeling, Analysis, and Simulationof Wireless and Mobile Systems, MSWiM �07, pages 344�351, New York, NY, USA, 2007. ACM.
[28] Lin Yao, Lin Kang, Pengfei Shang, and Guowei Wu. Protecting the sink location privacy in wireless sensor networks. Personal Ubiquitous Comput., 17(5):883�893, June2013.
Citation
Y. SABRI, N.E. Kamoun, "A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.19-26, 2016.
Design of a New LC VCO using Active Inductor
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.27-30, Dec-2016
Abstract
In this paper, a novel differential LC voltage-controlled oscillator (VCO) is presented. The VCO is based on the gm-boosted structure to relax the oscillation start-up current requirement and reduce the DC power consumption in comparison to conventional Colpitts structures. In the proposed VCO, a tunable active inductor is utilized as a part of LC tank instead of passive inductor with constant inductance. The proposed VCO is designed and simulated in ADS in a 0.18μm CMOS process. Simulation results indicate that the proposed VCO has a wide tuning range in comparison to other reported designs while consumes less DC power.
Key-Words / Index Term
VCO, Ring, Phase noise, Frequency range
References
[1] M. D. Tsai, Y. H. Cho, and H. Wang, �A 5-GHZ Low Phase Noise Differential Colpitts CMOS VCO,� IEEE Microw. Wireless Compon. Lett., vol. 13, no. 7, pp. 327-329, May 2005.
[2] J. A. Hou and Y. H. Wang, �A 5-GHZ Differential Colpitts CMOS VCO Using the Bottom PMOS Cross-Coupled Current Source,� IEEE Microw. Wireless Compon. Lett., vol. 19, no. 6, pp. 401-403, Jun. 2009.
[3] F. Mahmoudi and C. Salama, �8 GHz Tunable CMOS Quadrature Generator Using Differential Active Inductors,� in Proc. IEEE Int. Symp. Circuits Syst.(ISCAS�05), vol 3, May 2005, pp. 2112-2115.
[4] R. Weng and R. Kuo, �An ωo-Q Tunable CMOS Active Inductor for RF Bandpass Filters,� in Proc. Int. Symp. Signals, Systems, and Electronics, Aug. 2007, pp. 571�574.
[5] S. L. Jang and C. C. Liu, �Active-Inductor-Capacitor
Tank Colpitts Injection-Locked Frequency Divider,� IEEE Microw. Optical Tech. Lett., vol. 50, no. 9, pp. 2376-2379, Sept. 2008.
[6] S. L. Jang, C. W. Lin, C. C. Liu, and M. H. Juang, �An Active Inductor Injection Locked Frequency Divider With Variable Division Ratio,� IEEE Microw. Wireless Compon. Lett., vol. 19, no. 1, pp. 39-41, Jan. 2009.
[7] S. L. Jang, C. W. Chang, Y. J. Song, C. C. Liu, and C. W. Hsu, �On the Injetion Methods in a Top-series-Injection-Locked Frequency Divider,� Microelectronics Reliability (50), pp. 589-593, Feb. 2010.
[8] A. Thanachyanont and A. Payne, �VHF CMOS Integrated Active Inductor,� Electron. Lett., vol. 33, pp. 999-1000, May 1996.
[9] C. C. Wei, H. C. Chiu, and W. S. Feng, �An Ultra-Wideband CMOS VCO With 3-5 GHz Tuning Range,� IEEE RFIT, pp.87-90, 2005.
[10] S. L. Jang, J. C. Han, C. F. Lee, and J. F. Huang, �A Small Die Area And Wide Locking Range CMOS Frequency Divider,� IEEE Microw. Wireless Compon. Lett., vol. 50, no. 2, pp. 541-544, Feb. 2008.
[11] X. Li, S. Shekhar, and D. J. Allstot, �Gm-Boosted Common-Gate LNA and Colpitts VCO/QVCO in 0.18μm CMOS,� IEEE J. Solid-State Circuits, vol. 40, no. 2, pp. 2609-2619, Dec 2005.
[12] L. H. Lu, H. H. Hsieh, and Y. T. Liao, �A Wide Tuning Range CMOS VCO With a Differential Tunable Active Inductor,� IEEE Trans. Microw. Theory Tech., vol. 54, no. 9, pp. 3462-3468, Sept. 2006.
[13] R. Mukhopadhyay et al., �Reconfigurable RFICs in Si-Based Technologies for a Compact Intelligent RF Front-End,� IEEE Trans. Microw. Theory Tech., vol. 53, no. 1, pp. 81-93, Jan. 2005.
[14] Y. H. Chuang, S. L. Jang, J. F. Lee, and S. H. Lee, �A Low Voltage 900MHz Voltage Controlled Ring Oscillator With Wide Tuning Range,� in Proc. IEEE Asia-
Citation
S. Taghizadeh, M. Taghizadeh, P. Taghizadeh , A. Kamaly, S.A. Emamghorashi, "Design of a New LC VCO using Active Inductor," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.27-30, 2016.
Prediction of Bugs in Software Repositories
Review Paper | Journal Paper
Vol.4 , Issue.12 , pp.31-35, Dec-2016
Abstract
Defective software modules can leads to ad hoc software failures, shoots up development & maintenance cost and result in customer dissatisfaction. Defect mapping and awareness of its impact in different business applications paves way to improve its quality. Previous researches show that it has treated all bugs alike. Proper Identification and categorization helps to handle and fix bugs diligently. Evaluation of prediction techniques is mainly based on precision and recall measures. It focuses on the defects in a software system. A prediction of the number of left-out defects in an inspected arte fact can be judiciously used for decision making. An accurate prediction of quantum of defects during testing a software product contributes not only to manage the system testing process but also to estimate its required maintenance. It goes a long way to improve software quality and testing efficiency by building predictive models from code attributes to timely identification of fault-prone modules. In short, this paper provides the prediction of bugs by using data mining techniques such as Association Mining, Classification and Clustering. This complements developers to detect software defects and debug them. Unsupervised techniques come handy for defect prediction in software modules, on a large scale in those cases where defect labels are not present.
Key-Words / Index Term
Software Defect Prediction, Bugs, Software Repositories, Data Mining, Classification, Clustering, Association Mining
References
[1] Erlikh.l, �Leveraging Legacy System Dollars for e-business�, IT Professional, Volume-02, Page No (21 -22), March 2000.
[2] Joel spolsky, �Painless Bug Tracking�, IT Professional, November 2000.
[3] Allen., mitch., �Bug Tracking Basics: A beginner�s guide to reporting and tracking defects�, The Software Testing & Quality Engineering Magazine. Volume- 4, Issue 3, Page No. (20�24), June 2002.
[4] Zaman S., Adams B., Hassan A.E., �Security versus performance bugs: A case study on Firefox�. In Proceedings of the 8th Working Conference on Mining Soft-ware Repositories, May 2011.
[5] Shuji M., Akito M., Tomoko M ., � Defect data analysis based on extended Association Rule Mining�, In Proceedings of International Workshop on Mining Software Repositories (MSR), 2007.
[6] Lamkanfi A., Demeyer S., Soetens Q D., Ver- donck T., �Comparing mining algorithms for predicting the severity of a reported bug�. In Proceedings of the 15th European Conference on Software Maintenance and Reengineering, March 2011.
[7] Ling C., Huang J., Zhang H., �AUC: A better measure than accuracy in comparing learning algorithms�, In Lecture Notes in Computer Science Page No. (26�71), Springer-Verlag, 2003.
[8] Emad S., Akinori I., Walid I., Ahmed H., �Predicting reopened bugs: A case study on the eclipse project�. In Proceedings of the 17th Working Conference on Reverse Engineering (WCRE) 2010.
[9] Kim S., Ernst M D., �Prioritizing warning categories by analyzing software history�. In Proceedings of the 4th Inter-national Work shop on Mining Software Repositories, Minneapolis, USA, May 2007.
[10] Anvik J., Hiew L., Murphy G C., �Who should fix this bug?� In Proceedings of the 28th International Conference on Software Engineering, Shanghai, China, May 2006.
[11] Mozilla Products track system, https://bugzilla.mozilla.org/
[12] Eclipse Bug repository https://bugs.eclipse.org/
[13] Zaman S., Adams B., Hassan A E., �Security versus performance bugs: A case study on Firefox�. In Proceedings of The 8th Working Conference on Mining Software Repositories, May 2011.
[14] Gegick M., Rotella P., Xie T., �Identifying security bug reports via text mining: An industrial case study�. In Proceeding of the 7th Working Conference on Mining Software Repositories, May 2010.
[15] Joel Spolsky, �Bug Tracking System Definition�, Empirical Software Engineering, November 08, 2000.
[16] Partha Sarathi Bishnu., Vandana Bhattacherjee., �Software Fault Prediction Using Quad Tree-Based K-Means Clustering Algorithm�, IEEE: International Conference on Transactions on knowledge and data engineering, Volume- 24, Page No. 6, June 2012.
[17] Qinbao Song., Martin Shepperd., Michelle Cartwright., Carolyn Mair., �Software Defect Association Mining and Defect Correction Effort Prediction�, IEEE: International Conference on Transactions on Software Engineering, Volume- 32, Page No. 2, February 2006.
[18] Baojun Ma., Karel Dejaeger., Jan Vanthienen., Bart Baesens., �Software Defect Prediction Based on Association Rule Classification�, The 2010 International Conference on E-Business Intelligence.
[19] Liu B., Ma Y., Wong C K., �Improving an association rule based classifier,� In Proceedings of the Fourth European Conference on Principles and Practice of Knowledge Discovery in Databases, 2000.
[20] Mostafa M. Ahmed ., Abdel Rahman M., Hedar., Hosny M.Ibrahim., �Predicting Bug Category Based on Analysis of Software Repositories�, 2nd International Conference on Research in Science, Engineering and Technology(ICRSET�2014), Page No. (21-22) March 2014 Dubai.
Citation
S. Gomathi, L. Haldurai, "Prediction of Bugs in Software Repositories," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.31-35, 2016.
Analysis of Power Complexity in Existing Algorithms Against Ad-Hoc On demand Distance Vector Routing Protocol (AODV)
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.36-45, Dec-2016
Abstract
The rapid evolution in the mobile communication field, the new alternatives is derived in which mobile devices form a self-creating, self-administering and self-organizing wireless networks. Mobile Ad Hoc Network (MANET) is one such arbitrary network in which all the nodes are mobile and consists of limited radio transmission range, battery power and channel bandwidth. These Mobile Ad Hoc networks are often used in emergency situations. The frequent change in topology leads to more consumption of energy, therefore saving power in such situations is of prime importance. In this paper compares some existing power consumption reducing algorithm.
Key-Words / Index Term
AODV, Mobile Ad hoc Networks, Energy Efficiency and Routing
References
[1]. C. Nallusamy, A. Sabari and V. Karthick, �Energy Aware and Bandwidth Optimized AODV Routing for Efficient Traffic Control in Mobile AD HOC Networks�, Middle-East Journal of Scientific Research 24 , ISSN 1990-9233 , 2016, pp.53-58
[2]. Akansha Tomar1 and Prof. Gaurav Bhardwaj, �A Survey on Dynamic Power Management Techniques in Wireless Sensor Network�, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, ISSN : 2320 � 3765, Vol. 5, Issue 6, June 2016,pp 5649-5654.
[3]. Kirandeep Kaur and Sheetal Kalra, �A Review Article on Energy Efficient Routing Algorithm in MANETs�, Journal of Energy Technologies and Policy ,ISSN 2224-3232, Vol.6, No.1, 2016,pp 14-17.
[4]. Reetika Chib and Amandeep Singh Sandhu, � A Design and Analysis of EOM for Energy Saving and Effective Routing Protocol: AODV and AOMDV�, Indian Journal of Science and Technology, ISSN (Print) : 0974-6846 ,Vol 9(19), May 2016, pp 1-9.
[5]. Prachi Dubey and Avinash Sharma, �A Power Aware AODV (PAODV) Routing Protocol for MANETs�, Internationaln Journal of Control Theory and Application, 9(19) 2016, pp. 9303-9310.
[6]. Salonee Mishra and Binod Kumar Pattanayak �POWER AWARE ROUTING IN MOBILE AD HOC NETWORKS: A SURVEY�, ARPN Journal of Engineering and Applied Sciences, ISSN 1819-6608, VOL. 8, NO. 3, MARCH 2013, pp. 173-189.
[7]. Kanika and Dr. Vineet Sharma, �Implementation and Analysis of IPS˗AODV for Emergency scenario in MANET�, International Journal of Computer Science and Information Technologies, ISSN:0975 9646 ,Vol. 7 (4) , 2016, pp.1783-1787.
[8]. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)�, International Journal of Computer Science and Information Security, Vol-9, No.4, pp.(106-111), April 2011.ISSN: 1947-5500, USA DOI: dx.doi.org/10.13140/RG.2.2.24593.63842
[9]. Nand Kishore, Sukhvir Singh and Renu Dhir, "Energy Based Evaluation of Routing Protocol for MANETs", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (14-17), Mar -2014.
[10]. B. Karthikeyan and Dr.S.Hari Ganesh, �Encrypt - Security Improved Ad Hoc On Demand Distance Vector Routing Protocol (En-SIm AODV)�, ARPN Journal of Engineering and Applied Sciences (ISSN: 1819-6608), Vol. 11, No. 2, January 2016, pp. 1092-1096.
[11]. B.Karthikeyan, Dr.S.Hari Ganesh and Dr. J.G.R. Sathiaseelan, � Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (OpTiB-AODV)�,International Journal of Computer Applications (ISSN:0975 � 8887),Vol. 140, No.6, April 2016,pp 7-11.
[12]. B.Karthikeyan, Dr.S.Hari Ganesh and Dr. J.G.R. Sathiaseelan, �High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OpTiB AODV)�,International Journal of Computer Science Engineering(E-ISSN: 2347-2693),Vol. 4, No. 4, April 2016, pp.156-164.
[13]. A. Karmel and Dr. C. Jayakumar, �ASTOUNDING IMPACT OF OVERHEARING ON ENERGY MANAGEMENT IN MANET�, International Journal of Advanced Engineering Technology, E-ISSN 0976-3945, Vol. VII,Issue II,April-June.,2016, pp 163-165.
[14]. Priyanka , Prof. Kavita Mhatre, �Improving Performance of AODV with Energy Efficient Routing in MANET�, International Journal on Recent and Innovation Trends in Computing and Communication, ISSN: 2321-8169,Volume: 4 Issue: 4, pp 102 � 105.
[15]. S.P. Shiva Prakash, T.N. Nagabhushan and Kirill Krinkin, �Energy Aware Power Save Mode based AODV Routing for IEEE 802.11s Wireless Mesh Networks�, International Journal of Computer Applications, ISSN: 0975 � 8887, Volume 137 - No.4, March 2016, pp 1-7.
[16]. Manjinder Kaur and Lalit Mann Singh, �Energy Optimization in Manet Using Enhanced Routing Protocol�, International Journal of Engineering Research, ISSN:2319-6890, Volume No.5, Issue No.7, pp : 578-581.
[17]. B.Nanditha and Dr.V.Ramesh, � Optimized Energy Consumption during Route Discovery for Mobile Ad-Hoc Networks�, Journal of Network Communications and Emerging Technologies (JNCET) www.jncet.org Volume 6, Issue 3, March (2016),pp 20-24.
[18]. Jinesh Kumar singh, Prasun Chakrabarti, Avinash Panwar and Jitendra Kaushal Srivastava, � Randomized Energy Adaptive Routing in MANET to Increase Network Lifetime and Minimize Energy Consumption�, IJARIIE-ISSN(O)-2395-4396, Vol-2 Issue-3 2016, pp 488-495.
[19]. Varalakshmi K V and Muralidharan Asst. Prof, � Energy-Saving Routing Protocol for Battery Improvement in Multipath Wireless Ad Hoc Networks�, International Journal of Computer Science and Mobile Computing, ISSN 2320�088X, Vol. 5, Issue. 1, January 2016, pp.57 � 69.
[20]. Manju Gaur and Shubha Dubey , � Reduces the Link Failure in AODV Protocol sing Leader Election Algorithm�, International Journal of Scientific & Engineering Research, olume 7, Issue 5, May-2016, pp 433-437.
Citation
K. Subramanian, R. Gnanakumaran , "Analysis of Power Complexity in Existing Algorithms Against Ad-Hoc On demand Distance Vector Routing Protocol (AODV)," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.36-45, 2016.
Appropriate Dynamic Channel Allocation based on Priority Scheduling in heterogeneous Cognitive Radio Networks
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.46-50, Dec-2016
Abstract
Cognitive Radio (CR) is an emerging wireless communication technology that offers a great solution to scarcity of radio spectrum. Cognitive Radio Network (CRN) is an intellectual wireless communication scheme that conscious of its environment. Here, problem is sensing of spectrum by heterogeneous nodes with different computing power variation, and sensing rang. There are two tasks in this networks are primary channel sensing and selection of appropriate unused channel for communication by secondary users. In this article we present an idea to formulate a contention based channel selection algorithm using priority queue scheduling algorithm. In CRN secondary users play the important role of channel selection. This algorithm will avoid collision during data transmission between heterogeneous nodes and improve the entire network throughput.
Key-Words / Index Term
Cognitive Radio; Dynamic Scheduling; Priority Queue; Heterogenetive Services
References
[1] S.Tamilarasasan, Dr.P.Kumar,�A Servey on Dynamic Resource Allocation in Cognitive Radio Networks�, International Journals of Computer Science and Engineering (IJCSE), volume: 4, Issue:7, E-ISSN: 2347-2693, Jul-2016, PP: 86-93.
[2] S.Tamilarasan, Dr.P.Kumar, �Dynamic Resource Allocation in Cognitive Radio Networks-Priority Secheduling approach: Literature Survey�, International Journals of Computer Science and Engineering (IJCSE), volume: 4, Issue:8, E-ISSN: 2347-2693, Aug-2016, PP:01-11.
[3] Santhamurthy Tamilarasan, Kumar Parasuraman�, Dynamic Resource Allocation and Priority Based Scheduling for Heterogeneous Services in Cognitive Radio Networks�, International Journal of Intelligent Engineering & Systems (IJIES), Vol.9, No.3, 2016, PP: 127-136.
[4] Indika A. M. Balapuwaduge, Lei Jiao, Vicent Pla, �Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluation�, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 2, FEBRUARY 2014, PP: 630-645.
[5] Minal S. Moon, Veena A. Gulhane. �Preferable channel list based channel selection in cognitive radio network�, IRACST � International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501, Vol.6, No 2, Mar-Apr 2016, PP: 115-119.
[6] Dibakar Das, Alhussein A. Abouzeid, �Co-Operative Caching in Dynamic Shared Spectrum Networks�, IEEE Transactions On Wireless Communications, VOL. 15, NO. 7, July 2016, PP: 5060-5075.
[7] Navdeep Kaur Randhawa and Avtar Singh Buttar, "Sensing of Spectrum Holes in Cognitive Radio Networks: A Survey", International Journal of Computer Sciences and Engineering, Volume-02, Issue-08, Page No (28-34), Aug -2014,
[8] Ozgur Ergul, A. Ozan Bicen, Ozgur B. Akan, �Opportunistic reliability for cognitive radio sensor actor networks in smart grid�, Ad Hoc Networks, 2015, PP: 1-10
[9] Paulo M. R. dos Santos, Mohamed A. Kalil, Oleksandr Artemenko, Anastasia Lavrenko, Andreas Mitschele-Thiel, �Self-Organized Common Control Channel Design for Cognitive Radio Ad Hoc Networks�, 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Mobile and Wireless Networks, PP:2419-2423.
[10] Yahia Tachwali, Brandon F. Lo, Ian F. Akyildiz, Ramon Agust�i, �Multiuser Resource Allocation Optimization Using Bandwidth-Power Product in Cognitive Radio Networks�, IEEE Journal On Selected Areas In Communications, Vol. 31, NO. 3, March 2013, PP: 451-463.
[11] Minal S Moon,Veena Gulhane, �Appropriate channel selection for data transmission in Cognitive Radio Networks�, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA, Procedia Computer Science 78 ( 2016 ) PP: 838 � 844.
[12] S. Byun, "TCP over scarce transmission opportunity in cognitive radio networks", Computer Networks, vol. 103, pp. 101-114, 2016.
[13] Rujuta V Pawar and Swati S Mahajan, "Performance Analysis of Wireless Sensor Network Using Cognitive Radio Concept", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (136-137), Apr -2014
[14] G. Zhang, X. Li, M. Cui, G. Li and Y. Tan, "Transceiver design for cognitive multi-user MIMO multi-relay networks using imperfect CSI", AEU - International Journal of Electronics and Communications, vol. 70, no. 5, pp. 544-557, 2016.
[15] Santhamurthy Tamilarasan and Kumar Parasuraman, �Dynamic Resource Allocation and Priority Based Scheduling for Heterogeneous Services in Cognitive Radio Networks�, International Journal of Intelligent Engineering and Systems, Vol.9, No.3, 2016, PP: 127-136
Citation
S. Tamilarasan, P. Kumar, "Appropriate Dynamic Channel Allocation based on Priority Scheduling in heterogeneous Cognitive Radio Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.46-50, 2016.
Lung Cancer Classification
Research Paper | Journal Paper
Vol.4 , Issue.12 , pp.51-55, Dec-2016
Abstract
Detection and diagnosis of lung cancer from chest radiographs is one of the most important and difficult task for the radiologists. In this paper, combination of statistical texture and moment invariant features are used to classify the lung cancer images. These features are extracted from JSRT raw chest X-ray images. The proposed approach is built on two-level architecture. In the first level architecture images are sharpened and segmented to extract the region of interest i.e. lung from the ribs using image processing techniques. In second level architecture, statistical texture and moment invariant based features are extracted depending on the shape characteristics of the region. These features are used as input pattern to the Fuzzy Hypersphere Neural Network (FHSNN) classifier. The experimental result shows that proposed approach is superior in comparison with only statistical texture features in terms of recognition rate, training and testing time.
Key-Words / Index Term
Chest Radiography, Computer Tomography (CT), Fuzzy Hypersphere Neural Network (FHSNN), Lung Nodule, Gray level co-occurrence matrix (GLCM)
References
[1] M.N. Gurcan, B. Sahiner, N. Petrick, H. Chan, E.A. Kazerooni, P.N. Cascade, and L. Hadjiiski, �Lung Nodule Detection on Thoracic Computed Tomography Images: Preliminary Evaluation of a Computer-Aided Diagnosis System�, Medical Physics, Vol. 29, No. 11, pp. 2552- 2558, 2002.
[2] K. Kanazawa, Y. Kawata, N. Niki, H. Satoh, H. Ohmatsu, R. Kakinuma, M. Kaneko, N. Moriyama, and K. Eguchi, �Computer-Aided Diagnosis for Pulmonary Nodules Based on Helical CT Images�, Compute. Med. Image Graph, Vol. 22, No. 2, pp. 157-167, 1998.
[3] K. Kanazawa, M. Kubo, and N. Niki, �Computer Aided Diagnosis System for Lung Cancer Based on Helical CT Images,� International Conference on Pattern Recognition, pp. 381- 385, 1996.
[4] YSP Chiou, YMF Lure, PA Ligomenides, Neural networks image analysis and classification in hybrid lung nodule detection (HLND) system, in the Proceedings of the IEEE-SP workshop on Neural Networks for Signal Processing, 1993.
[5] Yamomoto, H. Jiang, M. Matsumoto, Y. Tateno, T. Iinuma, and T. Matsumoto, �Image Processing for Computer-Aided Diagnosis of Lung Cancer by CT (LSCT)�, IEEE Workshop on Applications of Computer Vision, pp. 236 � 241, 1996.
[6] Z.H. Zhou, Y. Jiang, Y.B. Yang and S.F. Chen, �Lung cancer cell identification based on artificial neural network ensembles,� Artificial Intelligence in Medicine, pp. 25 � 36, 2002.
[7] Y. Yeny, H. Helen and G.S. Yeong, �Hybrid Lung Segmentation in Chest CT Images for Computer-Aided Diagnosis�, International Workshop on Enterprise networking and Computing in Healthcare Industry, pp. 378 � 383, 2005.
[8] M.G. Penedo, M.J. Carreira, A. Mosquera, and D. Cabello, �Computer-Aided Diagnosis: A Neural-Network-Based Approach to Lung Nodule Detection�, IEEE Transactions on Medical Imaging, pp. 872 � 880, 1998.
[9] D. Lin and C. Yan, �Lung Nodules Identification Rules Extraction with Neural Fuzzy Network�, IEEE Processing on Neural Information, Vol. 4, pp. 2049- 2053, 2002.
[10] P.K. Simpson, �Fuzzy min-max neural networks-Part 1:Classification�, IEEE Trans. neural networks, Vol. 3, No. 5, pp. 776 � 786, 1992.
[11] P.K. Simpson, �Fuzzy min-max neural networks-Part 2:Clustering�, IEEE Trans. fuzzy systems, Vol. 1, No. 1, pp. 32 � 45, 1993.
[12] U.V. Kulkarni and T.R. Sontakke, �Fuzzy Hypersphere Neural Network Classifier�, In 10th Int. IEEE Conference on fuzzy systems, University of Melbourne, Australia, 2001.
[13] U.V. Kulkarni, D.D. Doye and T.R. Sontakke, �General fuzzy hypersphere neural network�, IEEE, IJCNN, pp. 2369 � 2374, 2002.
[14] D. Mundada,A. Murade, O. Vaidya and Swathi J.N., �Software fault prediction using artificial neural network and resilient back Propagation,� International Journal on Computer Science and Engineering (IJCSE), Vol. 5, No.03, pp. 2319-7323, 2016.
[15] R.C. Gonzalez, R.E. Woods and S.L. Eddins. �Digital Image Processing�, Addison-Wesley, M. Young, The Technical Writer�s Handbook. Mill Valley, CA: University Science, 2002.
[16] Japanese Society of Radiological Technology, (JSRT), http://www.jsrt.or.jp
Citation
D.N. Sonar, U.V. Kulkarni, "Lung Cancer Classification," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.51-55, 2016.
A Review: Comparative Analysis of various Data Mining Techniques
Review Paper | Journal Paper
Vol.4 , Issue.12 , pp.56-60, Dec-2016
Abstract
Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information � making it more accurate, reliable, efficient and beneficial. In data mining various techniques are used- classification, clustering, regression, association mining. These techniques can be used on various types of data; it may be stream data, one dimensional, two dimensional or multi dimensional data. In this paper we analyze the data mining techniques based on various parameters. All data mining techniques used for prediction, extraction of useful data from a large data base. Each of the techniques have different performance and result .
Key-Words / Index Term
Data mining, Classifications,Prediction,Clustering,Associatio
References
[1] L. Breiman, J.H. Friedman, R.A. Olshen, and C.T. Stone. Classification and Regression Trees. Wadsworth, Belmont, California, 1984.
[2] C.L. Blake D.J. Newman, S. Hettich and C.J. Merz. UCI reposito ry of machine learning databases, 1998.
[3] T. Elomaa and M. K ̈a ̈ari ̈ainen. An analysis of reduced error pruning.Journal of Articial ntelligence Research , 15:163�187, 2001.
[4] Usama M. Fayyad. Data mining and knowledge discovery: Makin g sense
out of data. IEEE Expert: Intelligent Systems and Their Applications 11(5):20�25, 1996.
[5] A. Feelders. classification trees. ttp://www.cs.uu.nl/docs/ vakken/adm/trees.pdf.
[6] R. Kruse G. Della Riccia and H. Lenz.Computational Intelligence in Data Mining. Springer, New York, NY, USA, 2000.
[8] J. Ross Quinlan. C4.5: programs for machine learning. Morgan Kauf-mann Publishers Inc., San Francisco, CA, USA, 1993.
[9] Ian H. Witten and Eibe Frank.Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann Publishers Inc., San francisco,CA, USA, 2nd edition, 2005.
[10] D.F. Andrews, :A robust method for multiple linear ression,Technometrics , vol 16, 1974, pp 125 � 127
[11]Chai, Eun Hee Kim and Long Jin:prediction of Frequent Items to OneDimensional Stream Data; Fifth International Conference on Computational Science and Applications ; page 353-360, 2001
[12]Y. Chen, G.Dong, J.Han, B.W.Wah, and J.Wang :.Multi-Dimensional Regression Analysis of Time- Series Data Streams; Proc. Int. Conf. Very Large Data Bases;Hong Kong, China, Aug. 2002.
[13] �Regression Based Data Mining Techniques for Frequent Data Stream (One Dimensional and two Dimensional Stream Data� Pinki Sagar, International Journal of Computer Sciences and Engineering pp(140-143), Vlume3, Issue 9.,2015
[14] �Improving the Initial Centroids of K-Means Clustering Algorithm to Generalize its Applicability�,M. Goyal, s. Kumar,Journal of TheInstitution of Engineers December 2014, Volume 95, Issue 4, pp 345�350.
Citation
P. Sagar, M. Goyal, "A Review: Comparative Analysis of various Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.56-60, 2016.