Cyber Defence: A Hybrid Approach for Information Gathering and Vulnerability Assessment of Web Application (Cyberdrone)
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.65-72, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.6572
Abstract
web application information gathering (IG) and vulnerability assessment (VA) is an important step to protect the cyber defense of systems or networks and live web applications. Day by day growing internet connection everywhere remains connected to each other in the world. Web application security major captative of all cyberspace in information gathering. So there is various kind of tool available in the world for website information gathering and vulnerability assessment. Vulnerability assessment and web application information gathering tools have own format and functionality. Mostly information gathering and vulnerability assessment tools are too much costly and also some tool is open source. In market various information gathering and vulnerability assessment tools are available but they are not able to give 100 % accuracy and solution to find out particular vulnerability as per CWE. Our approach to combine multiple information gathering and vulnerability assessment tools (open source). The (Cyberdrone) tool will approach to provide good timing accuracy and efficiency also more security open source effective solutions for information gathering and vulnerability assessment on a web application. Easy to download proper reports and time will decrease using automated tools compare to manual testing.
Key-Words / Index Term
web application, information gathering, vulnerability assessment, open source intelligence (osint) tool, and scheduler
References
[1] The size of the World Wide Web (The Internet) http://www.worldwidewebsize.com/ access on 27 October-2018.
[2] Khushal Singh, Vikas, “Analysis of Security Issues in Web Applications through Penetration Testing”, International Journal of Emerging Research in Management &Technology, Volume 3, March 2014.
[3] Creative common attribution. ” Top 10-2017 Top 10” access on 10 august, 2018. Https://www.owasp.org/index.php/Top_10-2017_Top_10.
[4] CWE view: weaknesses in owasp top ten(2017) https://cwe.mitre.org/data/definitions/1026.html access on 23 october,2018
[5] Sugandh Shah, B.M. Mehtre, “A Reliable Strategy for Proactive Self-Defence in Cyber Space using vapt tools and Techniques” IEEE International Conference on Computational Intelligence and Computing Research- 2013
[6] Sugandh Shah, B.M. Mehtre, “An Automated Approach to Vulnerability Assessment and Penetration Testing using Net-Nirikshak 1.0” IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT) -2014
[7] Jai Narayan Goel, Mohsen Hallaj Asghar, Vivek Kumar, Sudhir Kumar Pandey “Ensemble Based Approach to Increase Vulnerability Assessment and Penetration Testing Accuracy” 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016)
[8] Jai Narayan Goela, BM Mehtreb “Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology” Peer-review under responsibility of organizing committee of the 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) doi: 10.1016/j.procs.2015.07.458
[9] Muiruri Chris Karumba, Samuel Ruhiu, Christopher A. Moturi “A Hybrid Algorithm for Detecting Web Based Applications Vulnerabilities” American Journal of Computing Research Repository, 2016, Vol. 4, No. 1, 15-20
[10] Robert Vibhandik ; Arijit Kumar Bose “Vulnerability assessment of web applications - a testing approach” 2015 Forth International Conference on e-Technologies and Networks for Development (ICEND)
[11] Insha Altaf, Firdous ul Rashid. Jawed Ahmad Dar, Mohd. Rafiq “Vulnerability Assessment and Patching Management” 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI)
[12] Nor Izyani Daud, Khairul Azmi Abu Bakar, Mohd Shafeq Md Hasan (Malaysia) “A Case Study On Web Application Vulnerability Scanning Tools ” IEEE - Science and Information Conference 2014 London, UK
[13] Xia wang, ke zhang, qingtian wu (china) “A Design of Security Assessment System for E-commerce Website” IEEE 2015 8th international symposium on computational intelligence and design
[14] Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted (Charleston) “Automation of Cyber-reconnaissance: A Java-based Open Source Tool For Information Gathering” IEEE The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017)
[15] Sonja Glumich, Juanita Riley, Paul Ratazzi, and Amanda Ozanam (USA) “BP: Integrating Cyber Vulnerability Assessments Earlier Into the Systems Development Lifecycle” 2018 IEEE Secure Development Conference
[16] Arni ariani, john lewis, pradeep K. Ray (china) “The Vulnerability Assessment For Emergency Response Plans” 2016 IEEE international symposium on technology and society (ISTAS).
[17] Dzone Web Dev Zone https://dzone.com/articles/types-of-web-applications-from-a-static-web-page-t access on 29 October 2018
[18] Hybrid approach https://searchsoftwarequality.techtarget.com/definition/hybrid-application-hybrid-app access on 3 march - 19
[19] Scheduler concept https://www.tutorialspoint.com/operating_system/os_process_scheduling.htm access on 27 Jan - 19
[20] Scheduler information https://www.tutorialspoint.com/operating_system/os_process_scheduling_algorithms.htm access on 4 jan-19
[21] Information gathering open source tool list https://securitytrails.com/blog/top-20-intel-tools access on 30 march - 19
[22] Vulnerability assessment tool list https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools access on 2 Feb. – 19
[23] Ethical hacking information gathering https://www.macfro.com/ethical_hacking_information_gathering/ access on 23 October, 2018
[24] Tool information https://www.kali.org/ access on 24 March - 19
[25] Scheduler concept https://www.tutorialspoint.com/operating_system/os_process_scheduling.htm access on Jan - 19
[26] R. Saliha Bathool, K.Vijayalakshmi “Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency” International Journal of Science Research In Network Security And Communication, volume -5, issue-4, august 2017.
[27] Nidhi Vora, Chandresh Parekh “ Vulnerability Assessment and Penetration Testing in Web Application and Its Prevention” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, volume2, issue 6, 2017.
Citation
Dixitkumar .V. Prajapati, Deepak Upadhyay, "Cyber Defence: A Hybrid Approach for Information Gathering and Vulnerability Assessment of Web Application (Cyberdrone)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.65-72, 2019.
Machine Learning Approach for Signature Recognition by HARRIS and SURF Features Detector
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.73-80, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.7380
Abstract
In today’s’ world forgery of signature is very widely increased. There are many sophisticated scientific techniques to identify a correct signature. As signatures are widely accepted bio-metric for authentication and identification of a person because every person has a distinct signature with its specific behavioural property, so it is very much necessary to prove the authenticity of signature itself.A huge increase in forgery cases relative to signatures induced a need of Signature recognition system.However human signatures can be handled as an image and recognized using computer vision and neural network techniques. In this paper we have taken a set of trained images and stored their features in a database and to test an unknown image we compare the features and calculating the matching factors. We have considered 70 % as threshold for human signature recognition. Regarding creation of recognizer we gave considered HARRIS and SUFR Features. efficient “Signature Verification System”.
Key-Words / Index Term
Image Processing, Pattern Recxognition,Feature Selection,HARRIS,SURF
References
[1] A Bansal, B Gupta, G Khandelwal,S Chakraverty “Offline Signature Verification Using Critical Region Matching” International Journal of Signal Processing, Image Processing and Pattern Vol. 2, No. 1, 2009
[2] A. Masood and M. Sarfraz. “Corner detection by sliding rectangles along planar curves” ,Computers & Graphics, Vol. 31, pp.440-448, 2007. [3] A K Das, A Massand ,S Patil “A novel proxy signature scheme based on user hierarchical access control policy” Journal of king Saud University- Computer and Information Sciences, 2013
[4] A Pansare and S Bhatia “Handwritten Signature Verification Using Neural Network” International Journal of Applied Information Systems (IJAIS), Vol. 1, No. 2, 2012
[5] S. Harpreet, “Robust Video Watermarking Algorithm Using K_Harries Feature Point Detection”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-5 Issue-4, September 2015..
[6]S Garhawal and N Shukla “SURF Based Design and Implementation for Handwritten Signature Verification” International Journal of Advanced esearch in Computer Science and Software ngineering (IJARCSSE), Vol. 3, Issue 8, 2013
[7].D.Mitra,R.Barik,S.Roy,S.Bhattacharyya“A Survey on Image Segmentation and Image Registration” ,ACEEE-CPS, International Conference on Computing,Communication & Manufacturing, ISBN: 978-0-9940194-0-0,Pages 61-69
[8]D.Mitra,R.Barik,S.Roy,S.Bhattacharyya“Cumulative Measurement of Image Entropy on Different Mathematical Morphological Operation”,ACEEE-CPS, International Conference on Computing,Communication & Manufacturing, ISBN: 978-0-9940194-0-0,Pages 35-39
[9] D Mitra, K G Verma “Information Processing using Multilevel Masking to Image Segmentation “ , International Journal of Computer Applications , pp 1-6.
[10] S Gupta , K G Verma, D Mitra “Identification Of Mass Of Tissue Growth In Brain Region Under The Framework Of Image Segmentation(http://dx.doi.org/10.21172/1.84.28 )” , International Journal of Latest Trends in Engineering and Technology .pp 179-186, Volume 8 Issue 4 - July 2017
[11] P Metri, AKaur “Handwritten Signature Verification using Instance Based Learning” ,International Journal of Computer Trends and Technology- March to April Issue 2011 ,Pune,India
[12] D Bhattacharyya, and T Kim “Design of Artificial Neural Network for Handwritten Signature Recognition” International Journal Of Computers And Communications Issue 3, Volume 4, 2010
[13] Gonzalez, Woods “Digital Image Processing”
[14] Sanjay Sharma “Fundamental Of Digital Image Processing”
[15] Stuart Russel & Peter Norvig “Artificial Intelligence: A Modern Approach”, Pearson, 2009
[16] kevin P. Murphy “Machine Learning: A probabilistic perspective”
Citation
Debasree Mitra, Aurjyama Baksi, Alivia Modak, Arunima Das, Ankita Das, "Machine Learning Approach for Signature Recognition by HARRIS and SURF Features Detector," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.73-80, 2019.
Prediction of the Stock Price Using Fuzzy Cascade Correlation Neural Networks
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.81-85, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.8185
Abstract
Prediction of the stock market data is a challenging task to make more profit for investor and customers. The artificial neural network has been applied to predict the stock market data in order to obtain more profit on the right time with efficient manner. The conventional neural network learning algorithm has been producing low prediction performance due to the high level of uncertainty in the stock market data. Hence, the fuzzy cascade correlation neural network has been applied to predict future behavior of the stock market index. The simulation result demonstrates that the proposed method shows high generalization performance and produced higher prediction accuracy
Key-Words / Index Term
Fuzzy Neural Network, Cascade Correlation Neural Networks, Back Propagation Neural Networks, Stock Index Prediction.
References
[1] C.-H. Cheng and J.-H. Yang, "Fuzzy time-series model based on rough set rule induction for forecasting stock price," Neurocomputing, vol. 302, pp. 33-45, 2018.
[2] H. Guan, Z. Dai, A. Zhao, and J. He, "A novel stock forecasting model based on High-order-fuzzy-fluctuation Trends and Back Propagation Neural Network," PloS one, vol. 13, p. e0192366, 2018.
[3] M. Madhiarasan and S. Deepa, "A novel criterion to select hidden neuron numbers in improved back propagation networks for wind speed forecasting," Applied intelligence, vol. 44, pp. 878-893, 2016.
[4] S. E. Fahlman and C. Lebiere, "The cascade-correlation learning architecture," in Advances in neural information processing systems, 1990, pp. 524-532.
[5] E. Hadavandi, H. Shavandi, and A. Ghanbari, "Integration of genetic fuzzy systems and artificial neural networks for stock price forecasting," Knowledge-Based Systems, vol. 23, pp. 800-808, 2010.
[6] L. A. Zadeh, "On fuzzy algorithms," in Fuzzy Sets, Fuzzy Logic, And Fuzzy Systems: Selected Papers by Lotfi A Zadeh, ed: World Scientific, 1996, pp. 127-147.
[7] R. J. Kuo, C. Chen, and Y. Hwang, "An intelligent stock trading decision support system through integration of genetic algorithm based fuzzy neural network and artificial neural network," Fuzzy sets and systems, vol. 118, pp. 21-45, 2001.
[8] H. Ishibuchi, K. Kwon, and H. Tanaka, "A learning algorithm of fuzzy neural networks with triangular fuzzy weights," Fuzzy sets and systems, vol. 71, pp. 277-293, 1995.
[9] S. Wu, M. J. J. I. T. o. S. Er, Man,, and P. B. Cybernetics, "Dynamic fuzzy neural networks-a novel approach to function approximation," vol. 30, pp. 358-364, 2000.
[10] G. Huang, S. Song, and C. Wu, "Orthogonal least squares algorithm for training cascade neural networks," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 59, pp. 2629-2637, 2012.
[11] T. R. Shultz and S. E. Fahlman, "Cascade-correlation," in Encyclopedia of machine learning, ed: Springer, 2011, pp. 139-147.
[12] Y. V. Bodyanskiy, O. K. Tyshchenko, and D. S. Kopaliani, "Adaptive learning of an evolving cascade neo-fuzzy system in data stream mining tasks," Evolving Systems, vol. 7, pp. 107-116, 2016.
[13] G. E. Box, G. M. Jenkins, G. C. Reinsel, and G. M. Ljung, Time series analysis: forecasting and control: John Wiley & Sons, 2015.
[14] Rohit Kumar, Rohit Gajbhiye, Isha Nikhar, and Dyotak Thengdi, Sofia Pillai, “Stock Market Prediction using Deep Neural Networks”, International Journal of Computer Sciences and Engineering, Vol.-7, Issue-4, April 2019
Citation
K. Velusamy, R. Amalraj, "Prediction of the Stock Price Using Fuzzy Cascade Correlation Neural Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.81-85, 2019.
A New Approach in Grid Computing using Procedure distribution for high performance computing
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.86-91, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.8691
Abstract
With the current advances of today’s technology in many sectors like manufacturing, business and web application such as Variety of data to be processed continues to witness an exponential rise. To utilize the numerous benefits of grid computing, Hadoop, HPC techniques should be integrated in the current grid environment. In this paper, the definition features and requirements of distribute process should be distributed to techniques use Hadoop is suggested as it the most commonly used technique in handling process distributed as it offers reliability, ease to use and ease to maintenance and scalability. High Performance Computing (HPC) uses to distribute computational cycles of searching or Time and process jobs and decrease the amount of time in a single job would take. A HPC processing jobs typically consist of searching a time and process the jobs. The process is divided in the form of Grid using Grid Computing. This new approach analyzes the process, distributed among grid and decrease job run time, so to produce the optimized result.
Key-Words / Index Term
Grid computing; Hadoop; High Performance Computing; Distributed computing; Hadoop Distributed File System (HDFS)
References
[1]. Ahmed Abdulhakim Al-Absi, Dae-Ki Kang and Myong-Jong Kim, “Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications” Springer, 2016.
[2]. Wei Dai, Ibrahim Ibrahim, Mostafa Bassiouni, “A New Replica Placement Policy for Hadoop Distributed File System” IEEE , 2016.
[3]. Ankita Saldhi, Abhinav Goel, Dipesh Yadav, Ankur Saldhi, Dhruv Saksena, S. Indu, “Big Data Analysis Using Hadoop Cluster” IEEE, 2014.
[4]. Md. Wasi-ur-Rahman, Nusrat Sharmin Islam, Xiaoyi Lu, Jithin Jose, Hari Subramoni, Hao Wang and Dhabaleswar K. (DK) Panda, “High-Performance RDMA-based Design of Hadoop MapReduce over InfiniBand” IEEE, 2013.
[5]. Zujie Ren, Xianghua Xu, Jian Wan, “Workload Characterization on a Production Hadoop Cluster: A Case Study on Taobao” IEEE,2012.
[6]. Xiao Yang, Jianling Sun, “AN ANALYTICAL PERFORMANCE MODEL OF MAPREDUCE” IEEE, 2011.
[7]. Mukesh Singla, “A Brief Preview of Efficient Hadoop Job Schedulers” Research India Publications, 2016.
[8]. Mukesh Singla, “A survey on Static and Dynamic Hadoop Schedulers” Research India Publications, 2017.
[9]. Yadav Pratik A., Sase Yuvraj S, “Big Data Implementation Using hadoop and grid Computing” IJIRSET-2014.
[10]. Lawal M. A., “Implementing big data management on Grid-Computing environment.”, IJECS-2014.
[11]. Garlasu Dan;Sandulescu Virginia; Mariana.M., “A Big Data implementation based on Grid Computing.”, IJECS-2014.
[12]. Savant Ila;Muke Richa; Narlawar Nilay, “A Study on hadoop_MapReduce_Techniques and Applications on Grid”, IJERT-2013.
[13]. Dr.B.venkata R.Reddy;G.Narendra; R.Navateja R, “Big data accomplishment using apache hadoop & grid computing environment”, IJIRCCE-2016.
[14]. “https://hortonworks.com/blog/hadoop-in-perspective-systems-for-scientific-computing/”
[15]. “https://www.slideshare.net/allenwittenauer/deploying-grid-services-using-apache-hadoop-15342927”
[16]. https://www.sas.com/en_in/insights/big-data/hadoop.html
[17]. http://bigdatank.blogspot.com/2015/05/hadoop-introduction-and-motivation.html
[18]. https://www.ebayinc.com/stories/blogs/tech/secure-communication-in-hadoop-without-hurting-performance/
[19]. https://www.edureka.co/blog/setting-up-a-multi-node-cluster-in-hadoop-2.X
[20]. https://www.tutorialspoint.com/hadoop/hadoop_multi_node_cluster.htm
[21]. https://www.3pillarglobal.com/insights/a-quick-set-up-guide-for-single-node-hadoop-clusters
[22]. https://acadgild.com/blog/hadoop-multinode-cluster-configuration
[23]. https://clusteringformeremortals.com/2009/09/15/step-by-step-configuring-a-2-node-multi-site-cluster-on-windows-server-2008-r2-%E2%80%93-part-1/
[24]. https://data-flair.training/blogs/data-locality-in-hadoop-mapreduce/
[25]. https://intellipaat.com/tutorial/hadoop-tutorial/introduction-hadoop/
Citation
Maitry Joshi, Ankit Shah, "A New Approach in Grid Computing using Procedure distribution for high performance computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.86-91, 2019.
Image Processing Technology Application for Early Detection and Classification of Plant Diseases
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.92-97, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.9297
Abstract
Various diseases are caused by fungi, bacteria, viruses, insects and nematodes on agricultural and horticultural crop plants. These diseases reduce the crop yield by 20 to 40 percent annually worldwide. Therefore, these pathogenic microorganisms and insect pests are major threat to sustainable agriculture. For detection recognition and classification of plant diseases, agriculture experts carry out the inspection of field crops visually or microscopically, which is time consuming and laborious. Recently, rapid detection of plant diseases is being done by image processing of disease affected leaves, roots and fruits of agriculture and horticultural crops using machine vision technology. Expert systems involving computer vision image processing (CVIP), colour co-occurrence matrix (CCM), neural network classifier, fuzzy clustering and image segmentation algorithms etc. have been developed for diagnosis of diseases and disorders in various crops. In addition, artificial intelligence, artificial neural network, Bayer’s classifier, fuzzy logic and hybrid algorithms have been found to reduce large work of disease monitoring in big farms at very early stage. Using these expert systems involving artificial intelligence and image processing, disease recognition rate and accuracy rate has been achieved upto 96.2 and 92.3 per cent, respectively. Furthermore, the development of novel computational and bioinformatics tools could help in the analysis of large biological databases related to plant diseases and their control using pesticides. The image processing system can be used as agricultural robot to inspect the field using artificial intelligence for detection, diagnosis and classification of crop disease. Thus, the use of computational and bioinformatics tools will help in minimizing the disease occurrence and severity on crop plants, which will prevent environmental pollution by reducing the quantities of pesticides applied for disease control.
Key-Words / Index Term
Plant disease, Image processing, Artificial intelligence, Expert systems, Disease detection, Agriculture crops
References
[1] E.C. Oerke, “Crop losses to pests”, Journal of Agricultural Sciences Vol.44, Issue.1, pp.31-43, 2006.
[2] M.B. Riley, M.R. Williamson, O. Maloy, “Plant disease diagnosis”, The Plant Health Instructor, 10.1094/PHI-I-2002-1021-01, 2002.
[3] H. Al-Hilary, S., Bani-Ahmad, M. Reyalai, M. Braik, A.L. Rahamneh, “Fast and accurate detection and classification of plant diseases”, International Journal of Computer Applications, Vol.17, Issue.1, pp.31-38, 2011.
[4] S. Sindhu, D. Sindhu, “Information dissemination using computer and communication technologies for improving agricultural productivity”, International Journal of Emerging Trends and Technologies in Computer Science. Vol.6, Issue, 6, pp.143-152, 2017.
[5] S. Sindhu, D. Sindhu, “E-Agriculture: Role of information and computer technologies in improving food production”, International Journal of Computer and Mathematical Sciences, Vol.7, Issue, 1, pp. 190-199, 2018.
[6] L. Shu-Hsien, “Expert system methodologies and applications. A decade review from 1995 to 2004”, Expert Systems Applied, Vol.28, pp.93-103, 2005.
[7] J. Durkin, “Expert systems: Design and development”, 1st Edn., Prentice Hall, Englewood Cliffs, NJ., ISBN 0-02-330970-9, 1994.
[8] B. Blackmore, “Using information technology to improve crop management”, Proceedings of AgMet Millennium Conference, Institut for Jordbrugsvidenskab, Dublin, pp. 30-38, 2000.
[9] S.S. Abunaser, K.A. Kashkash, A. Fayyad, “Developing an expert system for plant disease diagnosis”, Journal of Artificial Intelligence, Vol. 3, Issue, 4, pp. 269-276, 2010.
[10] A. EI-Dessoki, S. Edrees, S. EI-Azahry, “CUPTEX: An integrated expert system for crop management of cucumber”, ESADW-93, Molar, Cairo-Egypt, 1993.
[11] P. Rajkishore, K. Ranjan, A.K. Sinha, “MRAPALIKA: An expert system for the diagnosis of pests, diseases and disorders in Indian mango”, Knowledge-Based Systems, Vol.19, pp. 9-21, 2005.
[12] V. Lopez-Morales, O. Lopez-Ortega, J. Ramos-Fernandez, L.B. Munoz, “JAPIEST: An integral intelligent system for the diagnosis and control of tomatoes disease and pests in hydroponis greenhouses”, Expert Systems Applied, Vol.35, pp. 1506-1512, 2008.
[13] Y. Yang, S. Huang, “Image segmentation by Fuzzy C-Means clustering algorithm with a novel penalty term”, Computing and Informatics, Vol.26, pp.17-37, 2007.
[14] C.C. Tuker, K. Chakraborty, “Quantitative assessment of lesion characteristics and disease severity using digital image processing”, Journal of Phytopathology, Vol.145, Issue, 7, pp. 273-278, 2008.
[15] S. Sankaran, A. Mishra, R. Ehsani, C. Davis, “A review of advanced techniques for detecting plant diseases”, Computers and Electronics in Agriculture, Vol.72, pp. 1-13, 2010.
[16] D. Al Bashidh, M. Braik, S.B. Ahmad, “Detection and classification of leaf disease using K-Means based segmentation and neural network classification”, Information Technology Journal, Vol.10, Issue, 2, pp. 267-275, 2011.
[17] J.C.A. Barbedo, “Digital image processing techniques for detecting, quantifying and classifying plant diseases”, Springer Plus, Vol.2, pp. 1-12, 2013.
[18] H.D. Marathe, P.N. Kothe, “Leaf disease detection using image processing technique”, Vol. 2, ISSN:2278-0181, 2013.
[19] M. Bhange, H.A. Hingoliwala, “Smart farming: Pomegranate disease detection using image processing”, Procedia Computer Science, Vol.58, pp. 280-288, 2015.
[20] J.D. Pujari, R. Yakkundimath, A.S. Byadgi, “Image processing based detection of fungal diseases in plants”, Procedia Computer Science, Vol.46, pp.1802-1808, 2015.
[21] P. Xu, G. Wu, Y. Guo, X. Chen , H. Yanh, R. Zhang, “Automatic wheat leaf rust detection and grading diagnosis via embedded image processing system”, Procedia Computer Science, Vol.107, pp. 836-841, 2017.
[22] M’K. Singh, S. Chetia, “Detection and classification of plant leaf diseases in image processing using MATLAB”, International Journal of Life Sciences Research, Vol.5, Issue, 4, pp.120-124, 2017.
[23] G. Sun, X. Jia, T. Geng, “Plant diseases recognition based on image processing technology”, Hindawi Journal of Electrical and Computer Engineering, 2018, pp. 1-7. Article ID 6070129, 2018. https://doi.org/10.1155/2018/6070129
[24] P. Sanyal, S.C. Patel, “Pattern recognition method to detect two diseases in rice plants”, The Imaging Science Journal. Vol.56, pp.42-47, 2008.
[25] Di Cui, Q. Zhang, M. Li, G.L. Hartman, Y. Zhao, “Image processing methods for quantitatively detecting soybean rust from multispectral images”, Biosystems Engineering, Vol.107, Issue, 3, pp. 186-193, 2010.
[26] R.L. Pugoy, V.Y. Mariano, “Automated rice leaf disease detection using color image analysis", Proc. SPIE 2009, Third International Conference on Digital Image Processing (ICDIP 2011), 2011.
[27] M. Al-Tarawneh, “An empirical investigation of olive leaf spot disease using auto–cropping segmentation and fuzzy C-means classification”, World Applied Science Journal, Vol.23, Issue, 9, pp. 1207-1211, 2013.
[28] A.K. Dey, N. Sharma, M.R. Meshram, “Image processing based leaf rot disease detection of Betel vine (Piper betle L.)”, Procedia Computer Science, Vol.85, pp.748-754, 2016.
[29] V. Singh, A.K. Misra, “Detection of plant leaf diseases using image segmentation and soft computing techniques”, Information processing in Agriculture, Vol.4, pp. 41-49, 2017.
[30] J.K. Patil, R. Kumar, “Advances in image processing for detection of plant diseases”, Journal of Advanced Bioinformatics Applications and Research, Vol.2, Issue, 2, pp.135-141, 2011. http://www.bipublication.com
Citation
D. Sindhu, S. Sindhu, "Image Processing Technology Application for Early Detection and Classification of Plant Diseases," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.92-97, 2019.
System Performance of De-MZM Employed Radio over Fibre System Using PSO Algorithm
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.98-104, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.98104
Abstract
In this paper, Particle Swarm Optimization, a nature-based algorithm is executed on the radio over fibre system. Phase noises which generate on the transmitter side of a communication system are eliminated by optimising the values of linewidths of the laser diode and RF Oscillator. Carrier to Noise ratio is considered as the main parameter and it is optimized with reference to a predefined level of 28dB. The practical ranges of 100 to 624 MHz and 0.1 to 10 Hz are taken into account for linewidths of the Laser Diode and Radio Frequency oscillator respectively. The changes in the optimised values are observed in the fibre of 2 Km, 10 Km and 30 Km. The optimum value of linewidth is calculated to be around 0.1 Hz for RF Oscillator and 500 MHz for the laser diode. The noise keeps on increasing with the increase in the length of fibre and PSO has been used to counter the phase noises by optimising the linewidth values.
Key-Words / Index Term
RoF-Radio over Fiber, SSMF-Single Standard Mode Fiber, MZM-Mach Zehnder Modulator, CNR-Carrier to Noise Ratio, OSSB-Optical Single Sideband Signal, CS-Central Station, BS-Base Station, PSO-particle swarm optimization, pbest- personal best, gbest-global best
References
[1] Marco Michele Sisto, Sophie LaRochelle, and Leslie Ann Rusch, “ Gain Optimization by Modulator-Bias Control in Radio-Over-Fiber Links”, Journal of lightwave technology, Vol.24, Issue. 12, pp. 4974-4982, 2006.
[2] Varghese Antony Thomas, Mohammed El-Hajjar, and Lajos Hanzo. “Performance Improvement and Cost Reduction Techniques for Radio Over Fiber Communications.”, IEEE Communication surveys & tutorials, Vol. 17, Issue.2, pp.627-670. 2015.
[3] Kalfallah naimaa, benzergua fadelab, cherki imenea and Chaker Abdelkader, “Use of genetic algorithm and particle swarm optimisation methods for the optimal control of the reactive power in the western Algerian power system”, In the proceedings of the 2015 International Conference on Technologies and Materials for Renewable Energy, Environment and Sustainability, pp.265 – 272.
[4] J. Kennedy, R. C. Eberhart and Y. Shi, “Swarm intelligence”, Ed. Morgan Kaufmann publisher,2001.
[5]Bouchaib Hraimel and Xiupu Zhang, “Low-Cost Broadband Predistortion-Linearized Single-Drive x-Cut Mach–Zehnder Modulator for Radio-Over-Fiber Systems”, IEEE photonics technology letters, Vol.24, Issue.18, pp. 1571-1573, 2012.
[6] Tae-Sik Cho, Changho Yun, Jong-In Song and Kiseon Kim, “Analysis of CNR Penalty of Radio-Over-Fiber Systems Including the Effects of Phase Noise From Laser and RF Oscillator”, Journal Of Lightwave Technology, Vol. 23. Issue.12, pp. 4093-4100, 2005.
[7] Friederike Brendel, Julien Poëtte, Béatrice Cabon, Thomas Zwick, Frédéric van Dijk, François Lelarge and Alain Accard, “Chromatic Dispersion in 60 GHz Radio-over-fiber networks based on mode-locked lasers.”, Journal of Lightwave Technology, Vol. 29, Issue.24, pp.3810–3816, 2011.
[8] Bouchaib Hraimel and Xiupu Zhang, “Low-Cost Broadband Predistortion-Linearized Single Drive x-Cut Mach–Zehnder Modulator for Radio-Over-Fiber Systems”, IEEE photonics technology letters, Vol.24, Issue.18, pp. 1571-1573, 2012.
[9] Minho Park, Kyu-Cheol Kim and Jong-In Song, “Generation and Transmission of a Quasi-Optical Single Sideband Signal for Radio-Over-Fiber Systems”, IEEE photonics technology letters”, Vol.23, Issue.6, pp.383-385, 2011.
[10]Vishal Sharma. Amarpal Singh and Ajay K. Sharma. “Transmission performance of OSSB-RoF system using MZM electro-optical external modulator” Optik, Vol. 124, Issue.13, pp. 1555-1559, 2013.
[11] Hai Zhao, Chunhe Song and Dan Liu, “An optimized particle filter based on PSO Algorithm” In the proceedings of 2009 International Conference on Future BioMedical Information Engineering, 2009.
[12] S.K. Kim, O. Mizuhara, Y.K. Park, L.D. Tzeng, Y.S. Kim and J. Jeong, “Theoretical and experimental study of 10 Gb/s transmission performance using 1.55 m LiNbObased transmitters with adjustable extinction ratio and chirp”, Journal of Lightwave Technology, Vol. 17, Issue. 8, pp. 1320–1325, 1999.
[13] E. I. Ackerman and C. H. Cox. , “RF fibre-optic link performance”, IEEE Microwave Magazine, Vol. 2, Issue.4, pp.50-58, 2001
[14] Pham Tien Dat, Atsushi Kanno, Toshimasa Umezawa, Naokatsu Yamamoto and Tetsuya Kawanishi, “Millimetre- and terahertz-wave radio-over-fibre for 5G and beyond”, IEEE Photonics Society Summer Topical Meeting Series pp. 165-166, 2017.
[15] G. K.M. Hasanuzzaman and Stavros Iezekiel, “Multi-core Fiber Based Mm-wave Generation, Radio-over-Fiber, and Power-over-Fiber”, In the proceedings of 2018 IEEE Conference, 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), pp. 1-3.
[16] Hussam Elbehiery, “Optical Fiber Cables Networks Defects Detection using Thermal Images Enhancement Techniques”, International Journal of Scientific Research in Computer Sciences and Engineering”, Vol.6, Issue.1, pp.22-29, 2018
[17] Simarjeet Kaur, Navdeep Singh, Gagandeep Kaur and Jasbir Singh, “A Review: BER Performance Analysis of OFDM system using Reed-Solomon Codes”, International Journal of Scientific Research in Network Security and Communication”, Vol.6, Issue.5, pp.47-50, 2018.
Citation
Sarpreet Kaur, Narwant Singh, "System Performance of De-MZM Employed Radio over Fibre System Using PSO Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.98-104, 2019.
Eye Blinking Detection Based Emergency Alert and Automated Smart Environment for Patients with Severe Disorder
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.105-109, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.105109
Abstract
According to a new report prepared jointly by the World Health Organization and the World Bank, 15 percent of the world‘s population is being disabled for many reasons. This system makes them simple to use their room environment by their own without others help. Based on eye movement control, is the simplest way to control smart appliances such as on and off when the patient is alone. This method investigates the reliability of EOG signals for activating smart appliances. We proposed a novel EOG-based automated switch design, in which a visual trigger mechanism is introduced to guide the users` blinks and to assist in detecting eye blinks based on the GUI, which includes a switch button that flashes per every time interval. When an eye blink matches to a flash button`s that it detected, the system issues an on/off command to enable the system and also provides emergency alert when the patients are at risk.
Key-Words / Index Term
Eye blink detection, EOG, GSM, Emergency Alert, AT- Assistive Technology, Smart Environment
References
[1] Choi, I., Han, S., & Kim, D. (2011). Eye Detection and Eye Blink Detection Using AdaBoost Learning and Grouping. 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN). doi:10.1109/icccn.2011.6005896.
[2] T. Jamil, I. Mohammed and M. H. Awadalla, "Design and implementation of an eye blinking detector system for automobile accident prevention," SoutheastCon 2016, Norfolk, VA, 2016,pp.1-3.doi: 10.1109/SECON.2016.7506734.
[3] A. Udayashankar, A. R. Kowshik, S. Chandramouli and H. S. Prashanth, "Assistance for the Paralyzed Using Eye Blink Detection," 2012 Fourth International Conference on Digital Home, Guangzhou, 2012, pp. 104-108.
[4] K. Malik and B. Smolka, "Eye blink detection using Local Binary Patterns," 2014 International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, 2014, pp. 385-390. doi: 10.1109/ICMCS.2014.6911268.
[5] Amardeep Singh and Amardeep Singh Virk, “Real Time Drowsy Driver Identification Using Eye Blink Detection”. International Journal ARCSSE, Vol 5, Issue 9, September 2015, pp 335-340.
[6] Wu, J. & Trivedi, M.M. “Simultaneous Eye Tracking and Blink Detection with Interactive Particle Filters”, EURASIP J. Adv. Signal Process.(2007) 2008: 823695. https://doi.org/10.1155/2008/823695
[7] M. Lalonde, D. Byrns, L. Gagnon, N. Teasdale and D. Laurendeau, "Real-time eye blink detection with GPU-based SIFT tracking," Computer and Robot Vision, 2007. CRV `07. Fourth Canadian Conference on, Montreal, Que., 2007, pp. 481-487. doi: 10.1109/CRV.2007.54
[8] Anderer P, Roberts S, Schlögl A, Gruber G, Klösch G, Herrmann W, Rappelsberger P, Filz O, Barbanoj M, Dorffner G, Saletu B. Artifact processing in computerized analysis of sleep EEG - a review. Neuropsychobiology. 1999;40:150–157. doi: 10.1159/000026613. [PubMed] [CrossRef] [Google Scholar]
[9] Hari Singh, and Jaswinder Singh “A REVIEW ON ELECTROOCULOGRAPHY” Singh et al., International Journal of Advanced Engineering Technology E-ISSN 0976-3945 IJAET/Vol.III/ Issue IV/Oct.-Dec., 2012/115-122 IJAET/Vol.III/ Issue IV/Oct.-Dec., 2012/115-122
[10] Ayush Bhandari, Vijay Khare, Mrinal Trikha and Sneh Anand, “Wavelet based Novel Technique for Signal Conditioning of Electro-oculogram Signals”, Annual IEEE India Conference, September 2006, pp 1-6.
[11] A B Usakli, S Gurkan, E Aloise, G Vecchiato and E Babliloni, “On the Use of Electrooculogram for Efficient Human Computer Interfaces”, Hindawi Publishing corporation, Computational Intelligence and Neuroscience, pp 1-5, Volume 2010.
[12] Masafumi Hashimoto, Kazuhiko Takahashi, and Masanari Shimada, “Wheelchair Control using an EOG and EMG based Gesture Interface” , 2009 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, Suntwc Convention and Exhibition Centre, Singapore, July 14-17, 2009, pp 1212-1217.
[13] A Survey on Developing Secure IoT Products Priyang Bhatt1*, Bhasker Thaker2 , Neel Shah 3 1Gujarat Technological University, V. V Nagar, Anand , India Isroset-Journal (IJSRCSE) Vol.6, Issue.5, pp.41-44, October (2018) E-ISSN: 2320-7639
[14] IOT Survey: The Phase Changer in Healthcare Industry Gurpreet Kaur* , Manreet Sohal Department of computer engineering and technology, Guru Nanak Dev University, Amritsar, India IJSRNSC Volume-6, Issue-2, April 2018 ISSN: 2321-3256
[15] Mohammed Ghazal ; Samr Ali ; Marah Al Halabi ; Nada Ali ; Yasmina Al Khalil “Smart Mobile-Based Emergency Management and Notification System” 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
Citation
V. Kovendan, "Eye Blinking Detection Based Emergency Alert and Automated Smart Environment for Patients with Severe Disorder," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.105-109, 2019.
E-Complaint Registration Through Andriod Application
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.110-113, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.110113
Abstract
In day-to-day life, human life is propagating in the direction of a digital and smart lifestyle. So as to live retain a Comfortable life we encounter numerous problems. “E-complaint registration” is a android application is introduced to provide user a platform to lodge a complaint easily. So it will reduces people`s efforts and problems they face while registering complaint. User can lodge Complaint and share location using GPS. This app deals with the live processing of complaints. The reason of this application is to facilitate the public in knowing their place details and getting their problems solved online without going to the office regularly until the problem is solved. There are number of complaint sites already available for citizens to lodge a complaint online. As mobile application is mostly used by people, this app will help people to lodge a complaint through it and can attach a picture of things which are causing problem and location will be tracked using GPS (Global Positioning System) .The app also provides facility to user to view status of lodge complaint until is resolved
Key-Words / Index Term
GPS, longitude, E-complaint, smart-city
References
[1] Aditi Mhapsekar "Voice enabled Android application for vehicular complaint system using GPS and GSMSMS technology," in World Congress on Information and Communication Technologies,Vol-17,Issue 08 pp. 520-524,2015.
[2] Aaditeshwar Seth, Abhishek Katyal, Rohit Bhatia, Dinesh Kapoor, Balachandran C, Vidya Venkat, Aparna Moitra, Sayonee Chatterjee, Mayank Shivam, Z. Koradia, Praveen Naidu, “Application of Mobile Phones and Social Media to Improve Grievance Redressal in Public Services”, m4dposition.
[3] Complaint”, International Journal for Research in Engineering Application & Management (IJREAM), Vol-01, Issue 03, June 2012.
[4] Patrícia Abreu, Sérgio Sousa, Member, IAENG, and Isabel Lopes, “Using Six Sigma to Improve Complaints Handling”, Proceedings of the World Congress on Engineering 2012 Vol IIIWCE 2012, July 4 - 6, 2012, London,
[5] R. Johnston, "Linking complaint management to profit," International Journal of Service Industry Management, vol. 12, pp. 60-69,2010
[6] V. Bosch and F. Enriquez, "TQM and QFD: exploiting a customer complaint management system," International Journal of Quality and Reliability Management, vol. 22, pp. 30-37,2009.
[7] Dilip B. Gupta, Dr. Sujit G. Metre, “Decentralization and Delegation of Authority at Nagpur Municipal Corporation (NMC) Nagpur”, International Journal of Management (IJM) Volume 6, Issue 3, March (2005), pp. 38-49.
[8] Devika Radhakrishnan, Smart Complaint Management System
International Journal of Trend in Research and Development, Volume 3(6), ISSN: 2394-9333 www.ijtrd.com
[9] Electronic Complaint Management System for Municipal Corporation
Communications on Applied Electronics (CAE) – ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA Volume 2 – No.8, September 2015
Citation
Jagdish R. Yadav, Rajkumar Yadav, "E-Complaint Registration Through Andriod Application," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.110-113, 2019.
An Information Theoretic Approach for the Development of a Framework for Improving Communication Reliability in a Mobile Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.114-118, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.114118
Abstract
Low connectivity in mobile networks is a perennial problem. Too many challenges are faced by network designers and service providers including development and deployment of network infrastructure that must meet QoS (Quality of Service) guarantee. Many a times there are geographical hindrances, such as due to mountains and trees, and many a times in cities obstruction, fading and signal attenuation occur because of buildings and other mobile and fixed infrastructure. We present our findings and ideas regarding an on-going research on development of a framework that can be used in a low-connectivity mobile network for enabling communication among nodes. To enable communication in low connectivity sites, our proposed framework uses a cooperative approach described in later sections.in this paper. Moreover, the framework makes the network inherently secure as well. In this paper we present these ideas along with assumptions and an example scenario where this framework is has shown promising results. Simulation results have shown strong correlation with our proposed theoretical ideas.
Key-Words / Index Term
Wireless, Communication, mobile, reliability, information theory
References
[1] Yin, X., Ma, X., & Trivedi, K. S. (2013). Channel fading impact on multi-hop DSRC safety communication. Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems - MSWiM 13.
[2] Sudip Misra & Sumit Goswami, Routing in Wireless Ad Hoc Networks., Wiley pp 245-283, 2017
[3] Mike Ebbers, Frank Byrne, Pilar Gonzalez Adrados, Rodney Martin, Jon Veilleux , Introduction to the new mainframe: Large scale commercial computing IBM Redbooks, Chapter 5 Availability IBM, 2006
[4] Shannon, Claude E.. "A Mathematical Theory of Communication". Bell System Technical Journal. 27 (3): 379–423. July 1948
[5] Stuart Jay Golin, Charles Martin Wine, Partial decoding of compressed video sequences, Patent application number EP19980964199, Apr 7,2004
[6] Weber, J. . Collecting Data from Mobile Apps. Practical Google Analytics and Google Tag Manager for Developers, 221-230. , 2015
[7] Shailja Sharm, A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network, IJSRNSC, Published: Volume-6, Issue-2, April 2018
[8] Gurpreet Kaur1, Manreet Sohal, IOT Survey: The Phase Changer in Healthcare Industry IJSRNSC, Volume-6, Issue-2, April 2018
[9] Cherny, S. S. Cholesky Decomposition. Encyclopedia of Statistics in Behavioral Science. 2005
Citation
Shabbir Ahmad, Neeta Awasthy, "An Information Theoretic Approach for the Development of a Framework for Improving Communication Reliability in a Mobile Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.114-118, 2019.
Generation`s in Wireless Network
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.119-123, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.119123
Abstract
Sixth generation (6G) mobile networks face a new rival: so-called 7G. The point to point wireless communication networks that transmit super- fast broadband signals through the air will be assisted by high speed data transfer with much secured information from transmitters to destinations. Alvin Toffler, an eminent futurologist, once said, “THE FUTURE ALWAYS COMES TOO FAST, BUT IN THE WRONG ORDER”. The state of wireless telecoms is a classic example. It is considered to be a cheap and Fast Internet Technology to provide unbelievably high data rates or very fast Internet speed access on air through wireless and mobile devices possibly up to 11 Gbps, while travelling or in a remote location. The satellite communication network may consist of telecommunication satellite networks, earth imaging satellite networks and navigation satellite networks. The goal of 6G is to integrate these kinds of satellite networks to provide network position identifier, multimedia and internet connectivity, and weather information services to the mobile users. Even as 6G mobile networks are being switched on around the world, a couple of years later than planned, attention is shifting to what comes next: a group of newer technologies that are, inevitably, being called seventh Generation Mobile Networks (7G). 7G is all about an integrated, global network that`s based on an open systems approach. The goal of 7G is to replace the current proliferation of core cellular networks with a single worldwide cellular core network standard based on IP for control, video, packet data, and VoIP. This integrated 7Gmobile system provides wireless users an affordable broadband mobile access solution for the applications of secured wireless mobile Internet services with value-added QoS. The 7G of mobile wireless networks which aims to acquire space roaming. The world is trying to become completely wireless, demanding uninterrupted access to information anytime and anywhere with better quality, high speed, increased bandwidth and reduction in cost
Key-Words / Index Term
PDA, Bandwidth, 5G, 6G, 7G, Mobile system, Space Roaming, Satellite
References
[1] International Journal of Electronics and Computer Science Engineering 1265 Available Online at www.ijecse.org ISSN-2277-1956 ISSN 2277-1956/V2N4-1265-1275 “5G Technology of Mobile Communication”.
[2] “System Multimedia Wireless Sensor Networks: Perspectives” S j l K D and Future Directions Sajal K. Das National Science Foundation Center for Research in Wireless Mobility and Networking.
[3] Purnendu S. M. Tripathi and Ramjee Prasad Spectrum “Trading in India and 5G “
[4] Prasad, Ramjee “Global ICT Standardization Forum for India (GISFI) and 5G Standardization”.
[5] Generations of Mobile Wireless Technology: A Survey Future broadband mobile communication technology.
[6] Muhammad Farooq, Engr. Muhammad Ishtiaq Ahmed, Engr. Usman M Al. “5G WIRELESS TECHNOLOGIES-Still 4G auctions not over, but time to start talking 5G Future Generations of Mobile Communication Networks Engr.”
[7] Kumar N Sivarajan Chief Technology Officer “What India wants from 5G”
[8] The FP7 RAS cluster in the ignition phase of 5G research © 2014, IJCSMC All Rights Reserved 1080 Available Online at www.ijcsmc.com
[9] Meenal G. Kachhavay, Ajay P.Thakare “5G Technology-Evolution and Revolution “
[10] Aleksandra Tudzarov “5G Ultra-High Capacity Network Design With Rates 10x LTE-A Protocols and Algorithms for the Next Generation 5G Mobile Systems “
Citation
A.Sathiya Priya, "Generation`s in Wireless Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.119-123, 2019.