Performance Analysis of Channel Allocation Scheme for A System Model Based On Urban Structure
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.1-5, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.15
Abstract
Frequency channels are scarce resource and available in a limit. Due to this limitation user may experience call termination and call blocking as the traffic increases. We can limit call termination and call blocking by allocating permanent channel to home (apartment) and office user due to very limited movement. They are almost fixed if they communicate with each other frequently and this is the normal scenario in urban areas. By using this strategy these users will not feel any disconnection due to inaccessibility of frequency channel in cell. To achieve this we have proposed a scheme based on fixed channel and analyze the performance for both normal channel allocation and preserved channel allocation for home and office users. We have performed and compared the results of call blocking probability, handover failure probability, call termination due to successful handover probability and probability for not completed calls.
Key-Words / Index Term
Channel allocation, handover, call blocking, call termination
References
[1] Theodore S. Rappaport, “Wireless Communications Principles and Practice” Second Edition, Chapter 3, Eastern Economy Edition.
[2] Katzela, M. Naghshineh, “Channel assignment schemes for cellular mobile telecommunication systems: a comprehensive survey,” IEEE Personal Communications, Volume 3, Issue 3, June 1996, pp. 10 – 31.
[3] M. Zhang and T. S. P. Yum, “Comparison of channel-assignment strategies in cellular mobile telephone systems,” IEEE Trans. on Vehicular Technology, vol. 38, no. 4, pp.211-215, 1989.
[4] Yong Zhang, Anfeng Mao, Guo Ping, Ning Hong, Xu Guang, “Quality of Service Guarantee Mechanism in WiMAX Mesh Networks,” Third International Conference on Pervasive Computing and Applications, Volume 2, 6-8 Oct. 2008, pp. 882 – 886.
[5] R. Prakash and M. Singhal, “Distributed dynamic channel allocation for mobile computing: lessons from load sharing in distributed systems,” Mobile Computing, 2009
[6] G. K. Audhya, K. Sinha, S. C. Ghosh and B. P. Sinha, “A survey on the channel assignment problem in wireless networks,” Wireless Communications and Mobile Computing, vol. 11, no. 5, pp.583-609, 2011.
[7] M.P. Mishra, P. C. Saxena, “Survey of Channel Allocation Algorithms Research for Cellular System”, International Journal of Networks and Communications 2012, 2(5): 75-104
[8] D. Sarddar, T. Jana, and U. Biswas, “Reducing handoff call blocking probability by hybrid channel allocation,” in ACM Proc. International Conference on Communication, Computing and Security, pp 7-10, 2011.
[9] S.H. Oh et. al., “Prioritized channel assignment in a cellular radio network,” IEEE Trans. on Communication, vol. 40, pp. 1259–1269, 1992.
[10] Aggelikisgora and Dimitrios D. Vergados, “Handoff prioritization and decision schemes in wireless cellular networks: a Survey,” IEEE Communications Surveys and Tutorials, vol. 11, pp. 57-77, 2009.
[11] Suyash Kumar, P.V. Suresh, “GeneralizedReduction Approach from 3-SAT to K-Colorability” in International Journal of Emerging Technology & Advanced Engineering (ISSN 2250-2459, ISO 9001:2008 Certified Journal), Volume 7, Issue 10, October, 2017.
[12]Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015.
[13] Samya Bhattacharya, Hari Mohan Gupta, Subrat Kar, “ Traffic model and performance analysis of cellular mobile systems for general distributed handoff traffic and dynamic channel allocation”, IEEE Transactions on Vehicular Technology, Volume 57, Issue 6,3629-3640, 2008.
[14] L. O. Guerrero, A. H. Aghvami, “A Prioritized Handoff Dynamic Channel Allocation Strategy for PCS,” IEEE Transactions on Vehicular Technology, Volume 48, No. 4, JULY 1999.
Citation
Suyash Kumar, P.V. Suresh, "Performance Analysis of Channel Allocation Scheme for A System Model Based On Urban Structure," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.1-5, 2018.
Voice and Data Packets Optimization using AI Algorithms in User Datagram Protocol
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.6-14, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.614
Abstract
Video and data is becoming the dominant traffic over the Internet. To be able to detect, fix and replace lost data and voice packets along User Datagram Protocol (UDP), we apply artificial intelligent optimization The two artificial intelligence (AI) algorithms applied in this work are Modified Artificial Bee Colony (MABC) and Modified Particle Swarm Optimization (MPSO). These algorithms show great improvement in preventing packet loss and making transmission reliable. Further test of the MABC and MPSO reveals that there is improved optimization of data and voice packet delivery. Another comparison demonstrates that MPSO is significantly better than MABC in overall performance.
Key-Words / Index Term
Artificial Intelligence, Algorithms, Optimization, Artificial Bee Colony, Particle Swarm Optimization, UDP
References
[1] Douglas E. Comer 2006, Internetworking with Transport Control Protocol /IP, Protocols, Principles and Architectures’, Vol.1, 5th Edition.
[2] Yashpaul ER., Singh and Swarup A. 2009, “Analysing Adaptive Routing Algorithms using Connectionless Protocols”, World Academy of, Engineering Sciences & Technology No.28.
[3] Behrouz A. 2003, ‘Data Networks and Communications’, TATA MCGRAW-HILL 3rd Edition
[4] Dorigo M, Bonabeau E, G. Theraulaz 1999, “Artificial Swarm Intelligence from Natural to Artificial System”, Oxford University Press
[5] Wong, K. C. P.; Ryan, H. M. and Tindle, J 1996. Early warning fault detection using artificial intelligent methods. 31st Universities Power Engineering Conference18th -20th September 2006, Crete, Greece.
[6] Li-Yeh Chuang, Yu-Da Lin, and C.-H. Yang 2012, "An Improved Particle Swarm Optimization for Data Clustering," in Lecture Notes in Engineering and Computer Science: Proceedings of The International MultiConference of Engineers and Computer Scientists 2012, IMECS 2012 Hong Kong, 2012, pp.440-445.
[7] D. Karaboga, "An idea based on honey bee swarm for numerical optimization," Erciyes University, Engineering Faculty, Computer Engineering Department, Turkey, Technical Report-TR06, 2005.
[8] Stallings, W 2007, ‘Handbook of computer-communication standards’, Volume 2: Local Network. Macmillan Publishers, New York.
[9] Dorigo M, Mauro B, and Thomas S., 2006 IEEE Computational Magazine on Intelligence e Librederuxeles, Belgium November.
[10] Yao X., Liu, Y. & Lin, G. 1999. Evolutionary Programming Made Faster.IEEE Transactions On Evolutionary Computation, VOL. 3, NO. 2.
[11] Hadley, G.1964: Nonlinear and Dynamics Programming. Addison Wesley, Reading, MA.
[12] Shraddha Pandit et.al, 2008. Enhance the Performance of Video Compression Based on Fractal H-V Partition Technique with Particle Swarm Optimizatio International Journal of Computer Sciences and Engineering Vol.6(1), Jan 2018, E-ISSN: 2347-2693
[13] Wolpert D.H and Macready W.G. 1997. “Theorem for optimization and Evolutionary Applied Computation”, volume1, page 45.
Citation
Ondiek J. Otieno, Sibiyia L. Ongachi, "Voice and Data Packets Optimization using AI Algorithms in User Datagram Protocol," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.6-14, 2018.
Further Results on Sum *Number and Mod Sum* Number of Graphs
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.15-19, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.1519
Abstract
In this paper we establish that the graphs K_n-E(K_r ), K_(n ,n) for n ≥2, K_(n ,n)-E(〖nK〗_2 ) for n ≥2, P_n⨀K_1 for n ≥2 and C_n⨀K_1 for n ≥4 possesses sum* and modsum* labelings and find their sum * and mod sum* numbers.
Key-Words / Index Term
Sum* graphs, Sum* number, Mod sum* graphs and Mod sum* number
References
M. Sutton, “Sumable Graphs Labellings and Their Applications”, Ph. D. Thesis, Department of Computer Science, The University of Newcastle, 2001.
F.Harary, “Graph Theory”, Addison-Wesley, Reading, MA, 1969.
F. Harary, “Sum Graphs and Difference Graphs”, Congressus Numerantium , Vol. 72 , pp. 101 - 108, 1990.
J. Bolland, R. Laskar, C. Turner, G. Domke, “ On Mod Sum Graphs” , Congressus Numerantium, Vol. 70, pp.131-135, 1990.
W. Dou, J. Gao, “The (Mod, Integral) Sum Numbers of Fans and K_(n,n)-E(〖nK〗_2 )”, Discrete Mathematics, Vol. 306, pp.2655-2669, 2006.
H.Wang, P. Li, “Some Results on Exclusive Sum Graphs”,
J. Appl. Math Comput, Vol. 34, pp. 343-351, 2010.
Citation
R. K. Samal, D. Mishra, "Further Results on Sum *Number and Mod Sum* Number of Graphs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.15-19, 2018.
An Enhanced Approach for Medical Image Fusion Using Hybrid of GWO and State Transition
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.20-24, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.2024
Abstract
Medical image fusion defines the process of fusing two similar medical images to create a single image which is rich in information. The medical image fusion is done to enhance the quality of diagnosis and treatments. This paper introduces a novel image fusion approach HSWGWO (Hybridization of State Transition with Grey Wolf Optimization) for medical images such as MRI, SPECT, PET, and CT images etc. The objective of this work is to overcome the issues of traditional GWO based image fusion technique. In this work, the SWT mechanism is used to extract the features from the input images and then the hybrid mechanism i.e. GWO and ST are applied for fusing the images. The proposed work is compared with the traditional techniques. The comparison is done by considering the sets of various images such as MRI-SPECT, MRI-PET, and MRI- CT images. After analyzing the proposed work is found to be effective and efficient than the traditional image fusion techniques.
Key-Words / Index Term
Medical Image Fusion, Magnetic Resonance, Transform Domain, Spatial Domain, Frequency Domain
References
[1]. S.Li, “Multifocus image fusion using artificial neural networks “, Elsevier, pp 85-97, 2002.
[2]. R.Maruthi(2007), “Multi Focus Image Fusion Based On The Information Level In The Regions Of The Images “Journal of Theoretical and Applied Information Technology, pp 80-85.
[3]. J. Kong(2008), “Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm “, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, pp 220-224 .
[4]. A. Malviya (2009), “Image Fusion of Digital Images”, International Journal of Recent Trends in Engineering, Vol 2, No. 3, pp 146-148.
[5]. Q. Fu (2009) “Multi-focus Image Fusion Algorithms Research Based on Curvelet Transform” Genetic and Evolutionary Computing, 2009. WGEC `09. 3rd International Conference on, pp 442 – 446.
[6]. W. Yiqi (2009), “Multilevel and Multifocus Image Fusion Based on Multi-Wavelet Transformation” Computer Network and Multimedia Technology,. CNMT 2009. International Symposium on, pp 1-4.
[7]. A. Umaamaheshvari (2010) , “image fusion techniques”, International Journal of Recent Research and Applied Studies , vol 4, No. 1, pp 69-74.
[8]. M. PremKumar(2011), “Performance Evaluation of Image Fusion for Impulse Noise Reduction in Digital Images Using an Image Quality Assessment “,IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1,pp407-411.
[9]. D. K. Sahu, (Oct 2012), “Different Image Fusion Techniques –A Critical Review”, IJMER, Vol. 2, No. 5, pp. 4298-4301.
[10]. J.Sapkal(2012), “Image Fusion based on Wavelet Transform for Medical Application “International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 5, pp.624-627 624.
[11]. S.K. Panjeta (2012), “A Survey on Image fusion Techniques used to Improve Image Quality” International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11.
[12]. S. Zebhi (2012), “Image Fusion Using PCA In Cs Domain” Signal & Image Processing : An International Journal (SIPIJ) Vol.3, No.4, pp 153-166.
[13]. VPS Naidu (2012) , “Discrete Cosine Transform based Image Fusion Techniques” Journal of Communication, Navigation and Signal Processing , Vol. 1, No. 1, pp. 35-45.
[14]. Dr.S.S.Bedi (2013), “Image Fusion Techniques and Quality Assessment Parameters for Clinical Diagnosis: A Review “International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 2,pp 1153-1157.
[15]. K. Rani, (2013)’’Study of Image Fusion using discrete wavelet and Multi wavelet transform”. International Journal of Innovative Research in Computer and communication Engineering, Vol. 1, Issue 4,pp 1-4.
[16]. T.SenthilSelvi1, R.Parimala, (2018), “Improving Clustering Accuracy using Feature Extraction Method”, IJSRCSE, Vol 6, Issue 2, pp 15-19.
[17]. P. Singh and A. Sharma, (2015), “Face Recognition Using Principal Component Analysis in MATLAB”, IJSRCSE, Vol 3, Issue 1, pp 1-5.
Citation
R. Singh, G. Dhaliwal, "An Enhanced Approach for Medical Image Fusion Using Hybrid of GWO and State Transition," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.20-24, 2018.
A Semi-supervised Approach for Abnormal User Behaviour Detection in Network
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.25-29, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.2529
Abstract
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are generic. Detecting abnormal user behavior is of great significance for a secured network. The traditional detection method, which is based on machine learning, usually needs to accumulate a large amount of abnormal behaviour data from different times or even different network environments for training, so the data gathered is not in line with practical data and thus affects. There are many systems being developed which analyzes big data logs and recognizes patterns in it with already predefined classes using machine learning algorithm. The current research in this area implements algorithm like SVM (support vector machines), PCA (principal component analysis) mostly to classify data. Apart from this many are working to find different classes to classify anomalous activities. In this project, analysis of various machine learning algorithms will be carried out irrespective of user behaviour.
Key-Words / Index Term
Anomaly Detection, Learning process, Machine Learning, Security
References
[1] You Lu, Xuefeng Xi, Ze Hua, Hongjie Wu, Ni Zhang “An abnormal user behavior detection method based on partially labelled data” Computer Modelling New Technologies, pp.132-141,March 2014.
[2] Bi M, Xu J, Wang M, Zhou F. "Anomaly detection model of user behavior based on principal component analysis". Journal of Ambient Intelligence and Humanized Computing, pp.547-554, August 2016.
[3] Khurum Nazir Junejo, Jonathan Goh, “Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine Learning”, CPSS,ACM, 2016.
[4] Hanumantha Rao, G. Srinivas, Ankam Damodhar and M. Vikas Krishna “Implementation of Anomaly Detection Technique Using Machine Learning Algorithms”, International Journal of Computer Science and Telecommunications, Volume 2, Issue 3, June 2011.
[5] Pajouh HH, Dastghaibyfard G, Hashemi S. "Two-tier network anomaly detection model: a machine learning approach". Journal of Intelligent Information Systems, pp.61-74, Feb 2017.
[6] Pandeeswari N, Kumar G. "Anomaly detection system in cloud environment using fuzzy clustering based ANN". Mobile Networks and Applications, pp.494-505, Jun 2016 .
[7] Deepaa A J, Kavitha V "A Comprehensive Survey on Approaches to Intrusion Detection System", Procedia Engineering, pp.2063-9, 2012.
[8] Kloft M, Brefeld U, Duessel P, Gehl C, Laskov P. “Automatic feature selection for anomaly detection”, Proceedings of the 1st ACM workshop on Workshop on AISec. ACM, 2008.
[9] Tsang IW, Kwok JT, Cheung PM. "Core vector machines: Fast SVM training on very large data sets". Journal of Machine Learning Research, pp.363-9, 2005.
[10] Khan L, Award M, Thuraisingham B "A new intrusion detection system using support vector machines and hierarchical clustering". VLDB Journal, pp.507-21 2007.
[11] Mitchell, R. and Chen, R., "Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems", IEEE Transactions on Dependable and Secure Computing, pp.16-30, 2015.
[12] Jaime Devesa, Igor Santos, Xabier Cantero, Yoseba K. Penya and Pablo G. Bringas "Automatic behaviour-based Analysis and Classification System for Malware Detection”,Deusto Technological Foundation, Bilbao, Spain 2010.
[13] Teng, Shaohua, Naiqi Wu, Haibin Zhu, Luyao Teng, and Wei Zhang. "SVM-DT-based adaptive and collaborative intrusion detection", IEEE/CAA Journal of Automatica Sinica, pp.108-118, 2018.
[14] Yao, H., Y. Liu, and C. Fang, “An Abnormal Network Traffic Detection Algorithm Based on Big Data Analysis”.International Journal of Computers,Communications Control, 2016.
[15] Hsieh, C.-J. and T. Y. Chan. "Detection DDoS attacks based on neural network using Apache Spark,International Conference in Applied System Innovation, 2016.
[16] Ambusaidi MA, He X, Nanda P, Tan Z., “Building an intrusion detection system using a filter-based feature selection algorithm”. IEEE transactions on computers, pp.2986-98, 2016.
[17] Meng Jiang and Peng Cui, Christos Faloutsos, "Suspicious Behavior Detection: Current Trends and Future Directions”, IEEE Computer Society, January/February 2016.
[18] Thomas Dietterich, Christopher Bishop, David Heckerman, Michael Jordan, and Michael Kearns, "Adaptive Computation and Machine Learning" MIT press, 2011.
[19] Stephen D. Bay and Dennis F. Kibler and Michael J. Pazzani and Padhraic Smyth, "The UCI KDD Archive of Large Data Sets for Data Mining Research and Experimentation", SIGKDD Explorations, 2000.
Citation
Nandit Malviya, Mukta S. Takalikar, "A Semi-supervised Approach for Abnormal User Behaviour Detection in Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.25-29, 2018.
An Algorithm for Load Balancing in Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.30-35, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.3035
Abstract
In today’s scenario, cloud computing is considered as the most extensively spreading platform to execute tasks. These tasks are executed with the help of virtual machines as processing elements. The scheduling of tasks in a cloud computing environment is an important issue as several tasks run on cloud and users sends continuous request to the cloud. The multiple jobs running in parallel slow down the cloud system. The choice of proper scheduling algorithm decreases the cost of executing independent application on cloud resources and improves the performance. Several scheduling techniques are proposed to maintain performance of cloud environment. This paper presents a new algorithm called Suffrage algorithm for scheduling tasks in a cloud computing environment. The proposed algorithm is compared with the existing FCFS and Min-Min algorithms. The comparative analysis of FCFS, Min-Min and Suffrage shows that the Suffrage algorithm performs better than the existing algorithms in terms of makespan time, deadline and finishing time.
Key-Words / Index Term
Cloud Computing, Load Balancing, FCFS, Min-Min
References
[1] Mohsin Nazir, “Cloud Computing: Overview & Current Research Challenges” ISOR journal of computer engineering, ISSN: 2278-0661, ISBN: 2278-8727, Vol.8, Issue1, Nov.-Dec 2012, PP 14-22
[2] K. Vijesh, P. Santhadevi, “Cloud Computing: A Beginners Primer”, International Journal for Research in Applied Science and Engineering Technology (IJRASET), Volume 2 Issue vii, July 2014, Page No: 42-52
[3] Jing Wang, Gongqing Wu, Bin Zhang and Xuegang Hu, “A heuristic algorithm for scheduling on grid computing environment”, In Seventh China Grid Annual Conference, IEEE,2012,13.
[4] Yoshiaki Inoue, Hiroyuki Masuyama, Tetsuya Takine, Toshiyuki Tanaka, “The stationary distribution of the age of information in FCFS single-server queues” 2017 IEEE International Symposium on Information Theory (ISIT)
[5] Kobra Etminani, “A Min-Min Max-Min Selective Algorithm for Grid Task Scheduling” ieee 1-4442-1007-x/07/2007(2007)
[6] Shyam Singh Rajput, Virendra Singh Kushwah, “A Genetic Based Improved Load Balanced Min-Min Task Scheduling Algorithm for Load Balancing in Cloud Computing” 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)
[7] A Jain, R. Kumar, “A comparative analysis of task scheduling approaches for cloud environment”, In Computing for Sustainable Global Development (INDIA Com), 2016 3rd International Conference on 2016 Mar 16 (pp. 1787-1792). IEEE
[8] O.M Elzeki, M. Z Reshad, M.A Elsoud, “Improved Max-Min Algorithm in Cloud Computing”, International Journal of Computer Applications 50(12):22-27, July 2012.
[9] Rajveer Kaur, Supriya Kinger, “Analysis of Job Scheduling Algorithms in Cloud Computing”, International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 7 – Mar 2014
[10] Pinal Salot, “A survey of various scheduling algorithm in cloud computing environment,” IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
[11] Sanjay Kumar, Atul Mishra, “Application of Min-Min and Max-Min Algorithm for Task Scheduling in Cloud Environment Under Time Shared and Space Shared VM Model”, International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 4, Number 6 (December 2015), pp.182-190
[12] Rajwinder Kaur, “Resource Allocation with improved Min-Min Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 76– No.15, August 2013
[13] Selcuk Karabati, Panagiotis Kouvelis, “A Min-Max-Sum Resource Allocation Problem and Its Applications”, The Institute for Operations Research and the Management Sciences, 1 Dec 2001, Vol. 49, No. 6
[14] Yadav, Preeti, Yogesh Rathore, "Detection of copy-move forgery of images using discrete wavelet transform." International Journal on Computer Science and Engineering4.4 (2012): 565.
[15] Jaberi, Maryam, et al., "Improving the detection and localization of duplicated regions in copy-move image forgery." Digital Signal Processing (DSP), 2013 18th International Conference on. IEEE, 2013.
[16] Shah Mihir , Asst. Prof. Yask Patel, “A Survey of Task Scheduling Algorithm in Cloud Computing”, In International Journal of Application or Innovation in Engineering & Management (IJAIEM) January 2015.
[17] Manish Kumar Mishra, “An Improved FCFS (IFCFS) Disk Scheduling Algorithm” International Journal of Computer Applications (0975 – 888) Volume 47– No.13, June 2012
[18] Davinder Kaur, “An Efficient Job Scheduling Algorithm using Min-Min and Ant Colony Concept for Grid Computing”, International Journal of Engineering and Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 6943-6949
[19] Khiyaita A, El Bakkali H, Zbakh M, El Kettanid, “Load balancing in cloud computing: state of art”, In Network Security and Systems (JNS2), 2012 National Days of 2012 Apr 20 (pp. 106-109). IEEE.
[20] Tarun Kumar Ghosh, Rajmohan Goswami, Sumit Bera, Subhabrata Barman, “Load Balanced Static Grid Scheduling Using Max-Min Heuristic”, In 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012.
[21] Kathiravelu, Pradeeban, Veiga, Luís,“Concurrent and Distributed CloudSim Simulations (PDF)” IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems Paris. pp. 490–493. Archived from the original (pdf) on 9 September 2014. Retrieved 2 January 2016.
Citation
Afsana, Suman Deswal, "An Algorithm for Load Balancing in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.30-35, 2018.
Designing Energy Aware Routing Protocol Distributed Ad - hoc Network.
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.36-42, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.3642
Abstract
The Cluster in Mobile Ad-hoc Network has paying attention in recent times and clustering defined in Mobile ad hoc network partitioning of mobile nodes into different groups, and each group contains ordinary node, cluster head and getaway .The basic need to create cluster is to save the energy consumption, simplicity of routing, extending capability and to improve the network efficiency .Each node is key element, when the energy of node is drained, the node become fails to sense the data or forward the data, So after we can reconstruct new cluster with remaining nodes, called as Re-clustering, but Re-clustering needs high energy consumption, but nodes have limited resource constraints, In order to overcome clustering problems we need design new energy clustering protocol, in this are proposing Intra-balanced LEACH protocol to achieve life span of WSNas, with Distrubuted Ad-hoc Network.
Key-Words / Index Term
Intra-balanced LEACH, Mobile Nodes different groups, Cluster
References
[1]. Jianmin S. Wireless Sensor Network. Beijing, China: Tsinghua University Press; 2006.
[2]. Ammari HM, Gomes N, Grosky WI, et al. Wireless Sensor Networks: Current Status and Future Trends.CRC Press; 2012. Review of applications of wireless sensor networks.
[3]. Durisic MP, Tafa Z, Dimic G, et al. A survey of military applications of wireless sensor networks. Proceedings of the IEEE Mediterranean Conference on Embedded Computing (MECO `12); 2012; pp. 196–199.
[4]. Shen B, Zhang S-Y, Zhong Y-P. Cluster-based routing protocols for wireless sensor networks. Journal of Software. 2006;17(7):1588–1600.
[5]. Viani F, Salucci M, Rocca P, et al. A multi-sensor wsn backbone for museum monitoring and surveillance. Proceedings of the IEEE 6th European Conference on Antennas and Propagation (EUCAP `12); 2012; pp. 51–52.
[6]. Kumar CKS, Sukumar R, Nageswari M. Sensors lifetime enhancement techniques in wireless sensor networks—a critical review. International Journal of Computer Science and Information Technology & Security. 2013;3(2).
[7]. Milo, E.J.D., Liu, M.: The effect of organization on energy consumption in wireless sensor networks. In: IEEE Globecom 2002. (2002).
[8]. [B. Mabel, M.A.Peer, ―Classification of Current Routing Protocols for Ad Hoc Networks,‖ IJCA, 2010.
[9]. Y.Y. Su, S.F. Hwang, and C.R. Dow, ―An Efficient Cluster-Based Routing Algorithm in Ad Hoc Networks with Unidirectional Links, Journal of Information Science and Engineering 24, 2008, pp.1409-1428.
[10]. R. Agawam and M. Motswana, ―Survey of Clustering Algorithms for MANET,‖ International Journal on Computer Science and Engineering,Vol. 1, No. 2, 2009.
[11]. J. Y. Yu and P. H. J. Chong. ―A Survey of Clustering Schemes for Mobile Ad Hoc Networks,‖ IEEE Communications Surveys and Tutorials, Vol. 7. No.1005pp.32–48. doi:10.1109/COMST.2005.1423333
[12]. A. Abbasid and M. F. Youngish., ―A Survey on Clustering Algorithms for Wireless Sensor Networks,‖ Computer Communications, Vol. 30, No. 14-15, 2007, pp. 2826– 2841. doi:10.1016/j.comcom.2007.05.024
[13]. A. Amis, R. Parkas, D. Huynh and T. Vuong. ―Max-Min D-Cluster Formation in Wireless Ad Hoc Networks,‖ Nifco, Vol. 1, 2000, pp. 32–41.
[14]. S. Chinara, S. Rath, ―A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks, Journal of Network and Systems Management, Vol. 17, No. 1-2, 2009, pp. 183-207. Doi:10.1007/s10922-009-9123-7
[15]. O. Youngish and S. Filmy ―HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks,‖ IEEE Transactions on Mobile Computing, Vol. 3, No. 4, 2004, pp. 366–379 doi:10.1109/TMC.2004.41
[16]. M. Anupama and B. Sathyanarayana ―Survey of Cluster Based Routing Protocols in Mobile Ad hoc Networks,‖ International Journal of Computer Theory and Engineering,Vol. 3, No. 6, 2011.
[17]. N. Gupta, M. Shrivastava, A. Singh, ―Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network,‖ IJERT, Vol. 1, No. 3, 2012.
[18]. N. Gupta, M. Shrivastava, A. Singh, ―Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network,‖ IJERT, Vol. 1, Issue No. 3, 2012.
[19]. A.Ephremides, J. E. Wieselthier and D.J. Baker. ―A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling,‖IEEE, pp. 56-73, 1987.
[20]. M. Gerla and J.T. Tsai. ―Multicluster, Mobile, Multimedia Radio Network.‖, Wireless Networks, Vol 1,pp.255-265,1995.
Citation
Venkateswarulu Naik. B, Syed Umar, "Designing Energy Aware Routing Protocol Distributed Ad - hoc Network.," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.36-42, 2018.
GIS based Land Information System for Medchal Mandal of R.R. District
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.43-49, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.4349
Abstract
Modern technologies of remote sensing and GIS like geo-data processing, earth observation data processing and analysis are needs for researchers. This work dedicates to create a land information system over agricultural, rural and urban development areas of Medchal Mandal of Rangareddy Dist. The main task of the work is to set up a land information database in GIS database. The main function of the work is starting with acquisition of existing geodata and information, maintenance, utilization and transferring of data. In this paper, applications of Remote Sensing and GIS for various advance classification techniques together with their accuracy based on performance evaluation, on land use studies are given emphasis. The research conducted on Medchal Mandal, Rangareddy District, Telangana, India. The goal of the research is to develop a land valuation method based on a land information system for selected areas. The establishment of a land information system for mandal will contribute to the National Land Information System. It is very important to analysis and uses the outcomes on a national level and to give knowledge on Geographic Information System to researchers and land managers in the land management sector. The results will promote good governance and offer fact based information to decision makers.
Key-Words / Index Term
Remote Sensing, Geographic Information System, Land Use / Land Cover
References
[1] Tuul, B., “GIS based Land Information System for mandal Soum, Selenge Aimag of Mongolia”, ISPRS Mid-Term Symposium Commission VI, Volume XXXVIII Part 6, 2011, pp. 132-136, 2011.
[2] Anderson, James R., “Land use classification schemes used in selected recent geographic applications of remote sensing”, Photogrammetry .Eng., v. 37, no. 4, p. 379-387, 1971.
[3] Hezam Al-Mashreki, M. et,al. “Remote Sensing and GIS Application for Assessment of Land Suitability Potential for Agriculture in the IBB Governorate, the Republic of Yemen”, Pakistan Journal of Biological Sciences, 13: 1116-1128, 2010.
[4] Verma, S., Rathi, SK, Rathore, VS. “Earth Observation Satellites Series and its Potentialities”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.49-55, 2017.
[5] Sunandana Reddy, M., Lakshmikanta Reddy, K., “Image Processing and DEM of Spatial Information Technology in Landslide Vulnerable Mapping”, Int J Electron Commun Comput Eng 4 (6), 2013.
[6] Suraj Kumar Singh, Vikash Kumar, Shruti Kanga, “Land Use/Land Cover Change Dynamics and River Water Quality Assessment Using Geospatial Technique: a case study of Harmu River, Ranchi (India)”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.17-24, 2017.
[7] Sudhakar, S., et,al. “Techniques of Classification for Landuse/Landcover with special reference for Forest type mapping in Jaldapara Wild life Sanctuary”, Journal of the Indian society of Remote Sensing, Vol. 27.No.4, 1999.
[8] Sunandana Reddy, M., “Optimal Land Use Planning by using GIS”, International Journal of Advanced Research Foundation, Volume 2, Issue 1, pp. 40-44, 2015.
[9] Graciela Metternicht, “Land Use Planning”, Global Land Outlook working paper, UNCCD, PP. 1-66, 2017.
[10] Inzamul Haque, Md, RonyBasak, “Land cover change detection using GIS and remote sensing techniques: A spatio-temporal study on Tanguar Haor, Sunamganj, Bangladesh”, The Egyptian Journal of Remote Sensing and Space Science, Volume 20, Issue 2, pp.251-263, 2017.
[11] Manual of “Nationwide Land use / Land cover mapping using satellite imagery’, Part – I, National Remote Sensing Agency; Dept. of Space; Govt. of India ; 1989.
[12] Gong P and P Howarth, “Frequency base classification and grey level vector reduction for land use identification”, PE&RS, Vol.58, No.4, PP.423- 437, 1992.
Citation
M. Sunandana Reddy, L. Harish Kumar, "GIS based Land Information System for Medchal Mandal of R.R. District," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.43-49, 2018.
A Review on Texture Feature Analysis Based Watermarking Scheme for Image Processing
Review Paper | Journal Paper
Vol.6 , Issue.8 , pp.50-56, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.5056
Abstract
The digital watermarking is the technique which is used to provide security to sensitive data which is stored in the form of image. The watermarking is the process in which features of the original and sensitive image is calculated and in the second step, the original image is embedded into the watermark image. In this research paper, the neural network based watermarking technique is improved using GLCM and PCA algorithm. The GLCM and PCA algorithm extracts the features of the original image. The output of PCA algorithm defines the scaling factor which is used for the embedding. The proposed algorithm is implemented in MATLAB and simulation results demonstrated that proposed algorithm performs well in terms of PSRN and MSE.
Key-Words / Index Term
GLCM, PCA, SVD, DWT
References
[1] Ms.Dipa Dixit and Ms. M. Kiruthika, "Preprocessing of Web Logs," International Journal on Computer Science and Engineering,vol. 02, 2010.
[2] D. S. Rajput*, R.S. Thakur, G. S. Thakur Clustering approach based on Efficient Coverage with Minimum Weight for Document Data ," International Journal on Computer Science and Engineering
[3] Martin, Alberto, and Sabri Tosunoglu. "Picture preparing systems for machine vision." Miami, Florida (2000).
[4] Chaturvedi, Navnidhi, and S. J. Basha. "Examination of Digital Image watermarking Methods DWT and DWT-DCT on the Basis of PSNR." picture 2 (2012): 1.
[5] Al-Haj, Ali. "Joined DWT-DCT computerized picture watermarking." Journal of software engineering 3, no. 9 (2007): 740.
[6] Singh, Surya Pratap, Paresh Rawat, and Sudhir Agrawal. "A vigorous watermarking approach utilizing DCT-DWT." International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 8 (2012).
[7] Mansouri, An., A. Mahmoudi Aznaveh, and F. Torkamani Azar. "SVD-based computerized picture watermarking utilizing complex wavelet change." Sadhana 34, no. 3 (2009): 393-406.
[8] Anthony T.S.Ho et.al, "A Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform", Springer, 2011
[9] Alexander Sverdlov, "Secure DCT-SVD Domain Image Watermarking: Embedding Data in All Frequencies", Proceedings of IEEE Region 10 Technical Conference on Convergent Technologies for the Asia-Pacific, Bangalore, India, October 14-17, 2003
[10] T. Serre, L. Wolf, S. Bileschi, M. Riesenhuber, and T. Poggio, "Protest acknowledgment with cortex-like instruments," IEEE Trans. on PAMI vol. 29, no. 3, 2007.
[11] J.- K. Kamarainen, V. Kyrki, and H. K ¨ alvi¨ ainen, "Invariance properties of Gabor channel based highlights - outline and applications," IEEE Trans. on Image Processing, vol. 15, no. 5, pp. 1088– 1099, 2006.
Citation
Pardeep Kaur, Shalini, "A Review on Texture Feature Analysis Based Watermarking Scheme for Image Processing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.50-56, 2018.
Coloring of Polyhedral Regular and Irregular Fuzzy Graphs
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.57-61, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.5761
Abstract
In this article we propose coloring of polyhedral regular and irregular fuzzy graphs.Also we have investigate some new concepts of polyhedral fuzzy graphs,Planar fuzzy graphs and coloring of polyhedral regular and irregular fuzzy graphs.We anayze some basic theorems related to these concepts.
Key-Words / Index Term
Fuzzy graphs, Coloring of fuzzy graphs,Polyhedral fuzzy graphs,Planar fuzzy graphs, Polyhedral regular fuzzy graphs,Polyhedral irregular fuzzy graphs
References
[1]Akram.M,Dudek.W,”Regular fuzzy graphs”,Neural computing and applications.
[2]Bhattacharya.P,”Some remarks on fuzzy graphs”,pattern recongnition letters,6(1987)297-302.
[3]Kalaiarasi.K,Mahalakshmi.L”An Introduction to fuzzy strong graphs,fuzzy soft graphs,complement of fuzzy strong and soft graphs”,Global journal of pure and applied mathematics,Number 6(2017),pp:2235-2254.
[4] Kalaiarasi.K,Mahalakshmi.L,”Regular and irregular m-polar fuzzy graphs”,Global Journal of mathematical science:Theory and practical.volume 9,Number 2(2017)pp:139-152.
[5] Kalaiarasi.K,Mahalakshmi.L,”Coloring of regular and strong arcs fuzzy graphs”International Journal of fuzzy Mathematical Archive,Vol 14,No.1(2017),pp:59-69.
[6]Santhi maheswari.N.R and Sekar.C,”On pseudo regular fuzzy graphs”,Annals of pure and applied mathematics,Vol 11,No.1(2016),pp:105-113.
[7]Sinisa T.Vrecica”On polygons and Polyhedra”Teaching of mathematics,Vol-3(2005),pp:1-14.
[8]Samanta.S,Pramanik.T,Pal.M,”Fuzzy coloring of fuzzy graphs”,Afrike matematika 27(1)(2016),37-50.
Citation
K. Kalaiarasi, L. Mahalakshmi, "Coloring of Polyhedral Regular and Irregular Fuzzy Graphs," International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.57-61, 2018.