Professional Education in Higher Educational Institutions: A study on Knowledge Management through E-Governance Model
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.670-675, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.670675
Abstract
In recent times, higher education is not favourable time period. Various challenges and pressures are associated with it. Professional Education requires collaborative use of workers, employees in an organization or company. The key professionals involved in knowledge management programs are information technologists and human resource manager including information professionals. So, there is great need to maintain indulgence and adoption of latest standards in field of professional education so as to gain global leadership positions. In simple words, Knowledge Management (KM) is task of developing, sharing and analyzing knowledge obtained through individual’s experience within organization. The following paper revolves around the conceptual framework in lieu of Knowledge Management (KM) practices in various B-Schools and universities in Delhi like Jamia Milia, GGSIPU, Delhi University, JNU etc. In this paper, e-governance model and its application on professional education has also been presented. E-governance is best approach for bringing transformation to employees’ lives. It may lead to interaction of organization in process of education plan and management of institutions.
Key-Words / Index Term
Knowledge, Knowledge Management (KM), Information and Communication Technologies (ICT), E-Learning, E-Governance
References
[1]. Liao S.-h. (2003), “Knowledge management technologies and applications—literature review from 1995 to 2002”, Expert Systems with Applications 25 (2003) 155–164.
[2]. Boynton, A. "Exploring Challenges in Knowledge Management" How to Get Started. in Knowledge Management Symposium,. IBM Consulting Group, Sydney, 1996
[3]. Kumar A. and Kumar A. ―IT based knowledge management for institutions of higher education: A need, University News, Vol. 43, No. 30, pp.4-5, 2005.
[4]. Satyanarayana J., ―E-Government: the science of the possible, PHI, New Delhi, P-6, 2004.
[5]. Gronlund, A. and Horan, T., ―Introducing e-Gov: History, Definitions, and Issues‖, Communications of the AIS, Vol. 15(39), pp. 713-729, 2005
[6]. Neilson, R., "Knowledge Management and the Role of the CKO", NDU, 2001.
[7]. Subrata Kumar Dey et al., ―Conceptual framework for Introducing e-Governance in University Administration‖, ICEGOV2008, Cairo Egypt., December 1-4, 2008.
[8]. Earl, M. (2001) ‘Knowledge management strategies’, Journal of Management Information Systems, Vol. 18, pp.215–233
[9]. Wiig, K., "Knowledge Management: An Emerging Discipline Rooted in Long History", in Knowledge Horizons: The Present and the promise of Knowledge Management, C. Despres and D. Chauvel, Editors, Butterworth-Heinemann, 2000
[10]. Milam, John H., Jr., 2001, “Knowledge Management for Higher Education”, ERIC Digest ED464520
[11]. Nakkiran, N.S., Sewry, D.A., 2002, “A Theoretical Framework for Knowledge Management Implementation”, Proceedings of SAICSIT, pp. 235-245
[12]. Yeh, C.M.Y., 2005, “The Implementation of Knowledge Management System i.9, pp. 35-41.
[13]. Rajeev S., e-governance in higher education‖, published at http://egov- coe.ncc.gov.ph/index.php? option= com_content& task=view&id=55&Itemid=1
[14]. Battey, J., "Governing with e-speed" ,InfoWorld 2001.
[15]. Sargenti Patrice, Lightfoot William and Kehal Mounir. (2006) ‘Diffusion of Knowledge in and through Higher Education Organizations’, Issues in Information Systems, Vol.3, No.2, pp.3-8.
Citation
Gaurav Jindal, Chandikaditya Kumawat, Jaikishore Tyagi, "Professional Education in Higher Educational Institutions: A study on Knowledge Management through E-Governance Model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.670-675, 2019.
DOA Estimation in Dynamic Environment using DMUSIC & DPM Algorithms
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.676-679, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.676679
Abstract
Smart antenna can be reducing multipath and co-channel interference. These benefits include the enhancement of coverage and the channel capacity, lower transmitted power, better signal quality, higher data rate and providing value-added services such as users position location (PL) for dynamic condition. This paper deals with the performance evaluation of Dynamic-MUSIC & Dynamic-PM algorithm for Direction of Arrival (DOA) estimation for smart antenna system using eigenvalue decomposition and without eigen decomposition based algorithms respectively. We focus on the dynamic environment of user i.e. user moves from his initial position to particular location. And by using DMUSIC & DPM estimate their correct position location (PL) to provide the services to the desired user using extended version of MUSIC & PM.
Key-Words / Index Term
direction-of-arrival (DOA), Dynamic MUltiple SIgnal Classification (DMUSIC), Dynamic Propagator Method (DPM), Position Location (PL), Smart Antenna, Array Antenna
References
[1]. P.A. Bello and B.D. Nelin, “The Effect of Frequency Selective Fading on the Binary Error Probabilities of Incoherent and Diffrentially Coherent Matched Filter Receivers,” IEEE Trans. Commun. Sys., Vol CS – II June 1963, pp. 170-86.
[2]. Chen Sun and Nemai Chandra Karmakar, “ Direction of Arrival Estimation Based on a Single Port Smart Antenna Using MUSIC Algorithm with Periodic Signals”, International Journal of Signal Processing, summer 2005.
[3]. Nizar Tayem and Hyuck M. Kwon , “L-Shape 2-Dimensional Arrival Angle Estimation With Propagator Method” IEEE Trans. On Antennas and Propagation., Vol. 53, No. 5, May 2005
[4]. Dr. A.N. Jadhav et.al. “Evaluation of PM and MUSIC: Direction of Arrival Estimation for Smart Antenna System”, International Journal of Engineering, Economics and Management” Vo. I, Iss. I, Sept 2012.
[5]. Godara, L.C., “Application of Antenna Arrays to Mobile Communications, Part II: Beamforming and Direction-of Arrival Considerations,” Proceedings of the IEEE, Vol. 85, No. 8 pp 1195- 1245, August 1997.
[6]. H.K. Hwang et.al. “Direction of Arrival Estimation using a Root-MUSIC Algorithm”, Proceedings of the International Multiconference of Engineers and Computer Scientists 2008 Vol II, IMECS 2008. 19-21 March, 2008, Hong Kong.
[7]. Rudra Pratap, “Getting Started with MATLAB 7”, OXFORD University Press,New Delhi,2006.
[8]. Brian R. Hunt Ronald L. Lipsman, “ A Guide to MATLAB –for Beginners and Experienced Users” Cambridge University Press,2001
[9]. Timothy A. Davis and Kermit Sigmon,“ MATLAB Primer” , A CRC Press Company,7th Edition 2005
Citation
D. D. Khumane, S.M. Jagade, "DOA Estimation in Dynamic Environment using DMUSIC & DPM Algorithms," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.676-679, 2019.
An Empirical Study on Software Engineering in Mobile Applications and Future Research Directions
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.680-683, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.680683
Abstract
Nowadays, mobile devices have reached its popularity in greater heights, specifically the usage of smart phones has extended its features in communication technology with rapid evolution. With regards to this, the developers are always passionate about providing the smart ways and approaches through the Mobile App for the common users so that they have smart lifestyle. To provide the smart apps which works on smart devices, the diversity is there in the usages of tools and technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most the needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today with different platforms and different market shares. Like all information systems, mobile systems are vulnerable to several issues. In this paper survey on software engineering paradigm in mobile applications are discussed by analyzing various existing approaches in the field of mobile software testing, mobile software quality assurance and mobile application security threats.
Key-Words / Index Term
Mobile Application Software, Malware detection, Code Metric, Maintenance, Quality assurance
References
[1] D. Amalfitano, A. R. Fasolino, P. Tramontana, B. D. Ta and A. M. Memon, "MobiGUITAR: Automated Model-Based Testing of Mobile Apps," in IEEE Software, vol. 32, no. 5, pp. 53-59, Sept.-Oct. 2015.
[2] L. Uskov, "Mobile software engineering in mobile computing curriculum," 2013 3rd Interdisciplinary Engineering Design Education Conference, Santa Clara, CA, 2013, pp. 93-99.
[3] Kai Qian ; Yong Shi ; Lixin Tao ; Ying Qian, Hands-On Learning for Computer Network Security with Mobile Devices, 2017 26th International Conference on Computer Communication and Networks (ICCCN)
[4] X. Li, J. Liu, Y. Huo, R. Zhang, Y. Yao, `An Android malware detection method based on Android Manifest file`, International Conference on Cloud Computing and Intelligence Systems (CCIS), 2016, pp. 239-243.
[5] H. Fereidooni, M. Conti, D. Yao, A. Sperduti, `ANASTASIA: ANdroidmAlware detection using STaticanalySIs of Applications`, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016, pp. 1-5.
[6] N. B. Akhuseyinoglu, K. Akhuseyinoglu, `AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadata`, IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016, pp. 1-7
[7] Domenico Amalfitano, Anna Rita Fasolino, Portfirio Tramontana, “A GUI Crawling-based technique for Android mobile application Testing” – IEEE (2011)
[8] Pallavi Raut, Satyaveer Tomar, “Android Mobile Automation Framework” – IJECS (2014).
[9] Anuja Jain, Swarnalatha P, M R. Ghalib, S. Prabhu, “Web-Based Automation Testing Framework” – IJCA (2012)
[10] Asmau Usman, Noraini Ibrahim, Ibrahim Anka Salihu, Test Case Generation from Android Mobile Applications Focusing on Context Events, ICSCA 2018, 7th International Conference on Software and Computer Applications, pages 25-30, 2018
[11] Lianfa Li , Hareton Leung , Mining Static Code Metrics for a Robust Prediction of Software Defect-Proneness, International Symposium on Empirical Software Engineering and Measurement, Sept. 2011
[12] Claire Le Goues and Westley Weimer, Measuring Code Quality to Improve Specification Mining, IEEE Transactions on Software Engineering, Vol. 38, No. 1,2012.
[13] H.-S.Hamand M.-J.Choi, “Analysis of Android malware detection performance using machine learning classifiers,” in Proceedings of the 2013 International Conference on Information and Communication Technology Convergence, ICTC 2013, pp. 490– 495, October 2013.
[14] M. Z. Mas’ud, S. Sahib, M. F. Abdollah, S. R. Selamat, and R. Yusof, “Analysis of features selection andmachine learning classifier in android malware detection,” in Proceedings of the 5th International Conference on Information Science and Applications, ICISA ’14, pp. 1–5, IEEE, May 2014.
[15] K. O. Elish, X. Shu, D. D. Yao, B. G. Ryder, and X. Jiang, “Profiling user-trigger dependence for android malware detection,” Computers & Security, vol. 49, pp. 255–273, 2015.
[16] Z. Wang, C. Li, Z. Yuan, Y. Guan, and Y. Xue, “DroidChain: A novel Android malware detection method based on behavior chains,” Pervasive and Mobile Computing, vol. 32, pp. 3–14, 2016.
[17] Rahman, A., Pradhan, P., Partho, A., Williams, L.: Predicting Android application security and privacy risk with static code metrics. In: Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, pp. 149–153. IEEE Press (2017).
[18] Syer, M.D., Nagappan, M., Adams, B., Hassan, A.E.: Studying the relationship between source code quality and mobile platform dependence. Software Quality Journal, 23(3), 485–508 (2015)
[19] Belal Amro, Malware Detection Techniques for Mobile Devices, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.7, No.4/5/6, December 2017.
[20] Ana Rosario Espada, Marıa del Mar Gallardo, Alberto Salmeron, Pedro Merin, Using Model Checking to Generate Test Cases for Android Applications, Tenth Workshop on Model-Based Testing (MBT 2015, EPTCS 180, 2015, pp. 7–21, 2017 8th International Conference on Information Technology (ICIT), IEEE, 2017
[21] Ahmad A. Saifan, Areej Al-Rabadi, Evaluating Maintainability of Android Applications, 8th International Conference on Information Technology (ICIT), 2017
[22] Pardeep Kumar, Arora Rajesh Bhatia, Agent-Based Regression Test Case Generation using Class Diagram, Use cases and Activity Diagram, Procedia Computer Science, Volume 125, Pages 747-753, 2018.
[23] Tingting Yu , Wei Wen, Xue Han, Jane Huffman Hayes Member, ConPredictor: Concurrency Defect Prediction in Real-World Applications , IEEE Transactions on Software Engineering , 2018.
Citation
R. Balamurugan, M. Ravichandran, "An Empirical Study on Software Engineering in Mobile Applications and Future Research Directions," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.680-683, 2019.
Potential of Li-Fi (Light Fidelity) Technology for Internet Penetration in Rural India
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.684-689, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.684689
Abstract
Li-Fi stands for Light-Fidelity. Li-Fi is a data transfer technology that uses visible light as the medium of transfer rather than the radio waves that are used currently in the Wi-Fi technology [1]. This technology is cheaper, cleaner, greener, faster and secure than the Wi-Fi technology. Digital India is a much celebrated and much discussed programme of Indian Government that focuses on internet penetration in the remotest corners of India. This paper presents a survey of the applications, advantages, disadvantages and standardization of Li-Fi. It also focuses on the research challenges in VLC. In this paper, a study on how Li-Fi Technology can be used in rural areas for the transformation of India into a Digital India by using Li-Fi enabled Solar Panels has been carried out. In this paper we cover every aspect of implementation of Li-Fi Technology in rural India. During this paper we explain how this emerging technology will empower the rural areas in a broad way.
Key-Words / Index Term
Li-Fi, Radio Waves, Wi-Fi, Digital India, Internet, Rural Areas, VLC, Solar panels
References
[1] E. Sarbazi, M. Uysal, M. Abdallah, K. Qaraqe, "Ray tracing based channel modeling for visible light communications", Proc. 22nd Signal Process. Commun. Appl. Conf., pp. 702-705, Apr. 2014.
[2] J. M. Kahn, J. R. Barry, "Wireless infrared communications", Proc. IEEE, vol. 85, no. 2, pp. 265-298, Feb. 1997.
[3] R.R.Sharma, Sanganal, A., Pati, S. (2014). Implementation of a Simple Li-Fi Based System, International Journal of
Computing and Technology (IJCAT), Vol. 1 Issue 9, October 2014
[4] S. Chatterjee, Shalabh Agarwal, Asoke Nath, “scope and Challenges in Light Fidelity(Li-Fi)Technology in Wireless Data Communication”, International Journal of Innovative Research in Advanced Engineering(IJIRAE), Issue 6, Vol 2, Page 1-9,(June 2015).
[5] S. Dimitrov, H. Haas, "Information rate of OFDM-based optical wireless communication systems with nonlinear distortion", IEEE J. Lightw. Technol., vol. 31, no. 6, pp. 918-929, Mar. 2013
[6] S. Dimitrov, H. Haas, Principles of LED Light Communications: Towards Networked Li-Fi, Cambridge, U.K.:Cambridge Univ. Press, Mar. 2015
[7] S. Rajagopal, R. Roberts, S.-K. Lim, "IEEE 802.15.7 visible light communication: Modulation schemes and dimming support", IEEE Commun. Mag., vol. 50, no. 3, pp. 72-82, Mar. 2012.
[8] S. Vinay Kumar, K. Sudhakar, L. Sudha Rani . Emerging Technology Li-Fi over Wi-Fi ,International Journal of Inventive Engineering and Sciences (IJIES), Vol. 2 Issue 3, February 2014
[9] Annlin Jeba S.V., Gnana King D.R, Combining Trust with Authentication Information for routing in wireless Sensor Networks, International journal of Scientific research in Network security and Communication, Vol.6, Issue.5, pp.38-46, Oct-2018
[10] Akram Waseem, A Study on Positive and Negative Effects of Social Media on Society, International Journal of Computer Science and Engineering, Vol.5(10), pp: 347-354, Oct 2017
Citation
W.Akram, "Potential of Li-Fi (Light Fidelity) Technology for Internet Penetration in Rural India," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.684-689, 2019.
Wireless Data Acquisition System
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.690-693, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.690693
Abstract
In steel and metal industries the temperature factor is very important, as it defines the quality of the product used. Minute change in temperature can affect the product thus causing faulty or defective product. So we must design a wireless facts acquisition system to measure correct temperature up to at least one degree Celsius and for you to preserve in around seven-hundred degree Celsius. So all sensors and components need to be chosen as a considerably. Here the product details are saved in a computer at the server end. The wireless statistics acquired on the receiving quit, may be displayed on 7 segment display same facts need to be logged in to laptop software program with time to devise the graph on the equal time. Also buzzer will sound if any severe condition takes place. The product layout of the machine must be carried out to face up to circuit in seven hundred degree Celsius environment
Key-Words / Index Term
Data acquisition, data logging, high temperature, accuracy
References
[1] Dr. J K Bhutto “Real time based data acquisition system” International journal on Recent and Innovation Trends in Computing and communication Volume: 4 Issue :5 P.No. 1-2 May 2015. For journal.
[2] J. Zhao, X. Mao, B.Qin and F.Liu, “ Design of Remote Data Acquisition system based on Intelligent system design and Engineering Application” Second international conference on intelligent system design and engineering application (ISDEA),Sanya, Hainan China,pp.1315-1318.2012 ISBN:978-0-7695-4608-7. For conference.
[3] Min Wu, Jin-Hua She, Member, IEEE, Gui-Xiu Zeng, and Yasuhiro Ohyama, Member, IEEE Internet-Based Teaching and Experiment System for Control Engineering Course IEEE transactions on industrial electronics, vol. 55, no. 6, june 2008. For journal.
[4] Wang Fei, Wu Zhijie, Chen Hong and Xi Yi, "High-speed data acquisition system based on FPGA/SoPC," IEEE 2011 10th International Conference on Electronic Measurement & Instruments, Chengdu, 2011, pp. 24-27.
doi: 10.1109/ICEMI.2011.6037670. For journal and conference.
[5] A. Yazidi, H. Henao, G. Capolino, F. Betin and F. Filippetti, "A Web-Based Remote Laboratory for Monitoring and Diagnosis of AC Electrical Machines," in IEEE Transactions on Industrial Electronics, vol. 58, no. 10, pp. 4950-4959, Oct. 2011. For journal.
[6] Z. Zhang, T. Lu, X. Chu and Y. Zhang, "Design and Implementation Of Embedded Data Acquisition System Based on USB and Flash Multimediacard Memory," Second International Conference on the Digital Society, Sainte Luce, 2008, pp. 31-34. For conference.
Citation
Shubhangi R Biradar, Devendra L Bhuyar, "Wireless Data Acquisition System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.690-693, 2019.
CsSyllabusLOR: Computer Science Syllabus Learning Object Repository
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.694-696, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.694696
Abstract
Adaptable Educational Learning Object Repository (AELOR) for the subject of computer science has been proposed for the educational institutions and the educators to enable the access to different Learning Objects (LO). AELOR shall enhance the reusability and interoperability of LOs, while taking benefit of the granularity and aggregation features. This Learning Object Repository (LOR) will also give educators the chance to design a new syllabus from the existing courses which includes one or many Los. CsSyllabusLOR provides a platform for creating, collecting, retrieving learning objects and also suggesting Computer Science syllabi to the educator. The Educators and Learners from the Computer Science Educational community will be benefited by the syllabus learning object repository. In this paper, we have tried to propose an architecture of Syllabus Learning Object Repository for the subject of Computer Science.
Key-Words / Index Term
Learning Object Repository, Reusable LO, Syllabus, Computer Science
References
[1] AbdelbassetRouabah, Samir Akhrouf, LarbiSelmani, YahiaBelayadi; Dihya: an Intelligent Learning Object Repository, In the proceedings of International Conference on Interactive Mobile Communication Technologies and Learnings, 2015.
[2] Ali H. Alharbi; Health Informatics e-Learning Object Repository HiLOR, In the proceedings of International Conference on Informatics, Health & Technology, 2017.
[3] AndriRiid, J¨urgo-S¨orenPreden; Design of Fuzzy Rule-Based Classifiers Through Granulation and Consolidation, JAISCR, Vol. 7, No. 2, pp. 137-147, 2017.
[4] Daniela Leal Musa, José Palazzo Moreira de Oliveira; Sharing Learner Information through a Web Services-based Learning Architecture, In the proceedings of Conference on Advanced Information Systems Engineering, Riga, Vol. 1, pp. 122, 2004.
[5] Hazem M. El-Bakry, Nikos Mastorakis; Advanced Technology for E-Learning Development, Recent Advances In Applied Mathematics And Computational And Information Sciences, Vol. II, pp. 501, 2009.
[6] Ignacio Gutiérrez, Víctor Álvarez , M. Puerto Paule, Juan Ramón Pérez-Pérez and Sara de Freitas; Adaptation in E-Learning Content Specifications with Dynamic Sharable Objects, Systems, Vol. 4, Issue 2, pp. 24, 2016.
[7] Kristy de Salas, Leonie Ellis; The Development and Implementation of Learning Objects in a Higher Education Setting, Interdisciplinary Journal of Knowledge and Learning Objects, Vol. 2, 2006.
[8] M’HAMMED ABDOUS, WU HE; A Design Framework for Syllabus Generator, Journal of Interactive Learning Research, Vol. 19, Issue 4, 541-550, 2008.
[9] ManasTungare, Xiaoyan Yu, William Cameron, GuoFangTeng, Manuel A. P´erezQui˜nones, Lillian Cassel, Weiguo Fan, Edward A. Fox; Towards a Syllabus Repository for Computer Science Courses, In the Proceedings of the 38th SIGCSE technical symposium on Computer science education, USA, pp. 608, 2007.
[10] Mohammad I. Santally, MahenGovinda, and Alain Senteni; Reusable Learning Objects Aggregation for e-Learning Courseware Development at the University of Mauritius, In the Proceedings of International Journal of Instructional Technology & Distance Learning, Vol. 1, No. 7, 2004.
[11] Mona G Dave, P V Virparia; A Review on Learning Repositories and Fuzzy XML in Education Field, National Journal of Systems and Information Technology, Vol. 10, No. 2, 2017.
[12] Naresh Kumar. K, Satyanand Reddy. ch, V.E.S. Murthy. N; Storing, Querying and Validating Fuzzy XML Data in Relational Database, International Journal of Computer Science and Information Technologies, Vol. 5 (4), 5233-5240, 2014.
[13] Pollyana Notargiacomo Mustaro and Ismar Frango Silveira; Learning Objects: Adaptive Retrieval through Learning Styles, In the proceedings of Interdisciplinary Journal of Knowledge and Learning Objects, Vol. 2, 2015.
[14] Reusable Learning Object Strategy: Designing and Developing Learning Objects for Multiple Learning Approaches, Cisco Systems, White Paper, https://pdfs.semanticscholar.org/275f/e64659161314b1d796c5ffa67b2b809ba9bc.pdf, 2003.
[15] Satyam Akunuri , Subbarao Perugu , Rajendra Prasad B, A Survey on Security Issues in Web Services, International Journal of Computer Sciences and Engineering, Volume-6, Issue-4, pp 468, 2018.
[16] Xavier Ochoa, Gladys Carrillo, Cristian Cechinel; Use of a Semantic Learning Repository to Facilitate the Creation of Modern e-Learning Systems, In the Proceedings of the XV International Conference on Human Computer Interaction, Spain, 2014.
Citation
Mona G Dave, P V Virparia, "CsSyllabusLOR: Computer Science Syllabus Learning Object Repository," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.694-696, 2019.
Data Compression Techniques in Wireless Sensor Network: A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.697-706, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.697706
Abstract
Wireless sensor networks (WSNs) are highly resource guarded in terms of power supply, memory capacity, communication bandwidth, and processor performance. Compression of sampling, sensor data, and communications can considerably improve the effectiveness of utilization of power supply, memory and bandwidth. Recently, there have been a large number of research proposals describing compression algorithms for WSNs. These research proposals are diverse and involve various compression approaches.. In this paper, we take a step in that direction by presenting a survey of the literature in the area of compression and compression frameworks in WSNs. In addition, open research issues, challenges and future research directions are proposed.
Key-Words / Index Term
WSN, Compression, Data Compression
References
[1]. Giuseppe Anastasi, Marco Conti, Mario Di Francesco, Andrea Passarella, “Energy Conservation issues in WSN: A Survey “, IIT, National Research Council (NRC).
[2]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A survey on sensor networks”, IEEE Communications Magazine 40 (8), pp. 104-112,2002.
[3] Rekha Rani, Rajan Manro, “Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN, international journal of computer science and engineering, Vol-6, Issue-11 Nov-2018 E-ISSN 2347-2693.
[4] Jennifer Yick, Biswanath Mukheerjee, and Dipak Ghosal,”Wireless Sensor Network Survey”, Elsevier,Computer Networks 52,pp. 2292-2330, 2008.
[5]. Rumpa Mukherjee,Arindom Mukherjee ,” A Survey on Different Approaches for Energy Conservation in Wireless Sensor Networks” ,International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970), Volume-3 Number-1 Issue-8 March-2013.
[6]. Emad M. Abdelmoghith, and Hussein T. Mouftah,” A Data Mining Approach to Energy Efficiency in Wireless Sensor Networks”, IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Mobile and Wireless Networks, 2013.
[7] LI, X.-Y., WANG, Y., AND WANG, Y. 2010. Complexity of data collection, aggregation, and selection for wireless sensor networks. IEEE Trans. Comput.
[8] CARDEI, M., THAI, M. T., LI, Y., AND WU, W. 2005. Energy-efficient target coverage in wireless sensor networks. In Proceedings of the IEEE INFOCOM pp.1976–1984.
[9] SUBRAMANIAN, R. AND FEKRI, F. 2006. Sleep scheduling and lifetime maximization in sensor networks: Fundamental limits and optimal solutions. In Proceedings of the 5th International Conference on Information Processing in Sensor Networks. ACM, 218–225.
[10]. CAND`ES, E. AND WAKIN, M. 2008. An introduction to compressive sampling. IEEE Signal Process. Mag. 25, 3.
[11]. HAUPT, J., BAJWA, W., RABBAT, M., AND NOWAK, R. 2008. Compressed sensing for networked data. IEEE Signal Process. Mag. 25, 2.
[12]. SALOMON, D. 2007. Data Compression: The Complete Reference 3rd Ed. Springer-Verlag.
[13].SAYOOD, K. 2006. Introduction to Data Compression 2nd Ed. Morgan Kaufmann Publishers Inc.
[14] KIMURA, N. AND LATIFI, S. 2005. A survey on data compression in wireless sensor networks. In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05). IEEE Computer Society, 8–13.
[15]. BARR, K. C. AND ASANOVI´C, K. 2006. Energy-aware lossless data compression. ACM Trans. Comput. Syst. 24, 3, 250–291.
[16] Akyildiz IF, Melodia T, Chowdhury KR., “A survey on wireless multimedia sensor networks”, Comput Netw 2007;51(4):921–60.
[17] C.E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J., vol. 27, pp. 398-403, July 1948.
[18] Yang M, Bourbakis N., “An overview of lossless digital image compression techniques”, IEEE Circ Syst 2005;2:1099–102.
[19] samra HS. ‘‘Image compression techniques’’. Int J ComputTechnol 2012;2(2).
[20] J.Ziv and A.Lempel, “A Universal Algorithm for Data Compression,” IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 337–343, 1977.
[21] J.Ziv and A.Lempel, “lz78.pdf.” IEEE, pp. 530–536, 1978.
[22] J Ziv. A Lempel., “A Universal Algorithm for DC”.IEEE Trans. Inf. Theory, 23(3): 337–343,1977.
[23]Ziv J, Lempel A. lz78.pdf. IEEE. 530–536,1978.
[24]Welch TA, “A technique for high-Performance DC”, IEEE. 8–19,1984.
[25] D. A. Huffman, “A method for the construction of minimum redundancy codes,” Proc.IRE, vol. 40, pp. 1098-1101, 1952.
[26] J. Tian and R.O. Wells, Jr. “A lossy image codec based on index coding” IEEE Data Compression Conference, DCC ’96, page 456, 1996.
[27] J. M. Shapiro, “Embedded image coding using zero trees of wavelet coefficients” IEEE Transactions on Signal Processing, vol. 41, No. 12,pp. 3445-3462, 1993.
[28] Beong Jo Kim, Zixiang Xiong,William a. Pearlman," Low bit Rate, Scalable Video coding with 3D Set Partitioning in Hierarchical Trees" IEEE Trans. on Circuits and Systems for Video Technology, Vol. 10, No. 8, pp. 1374–1387, 2000.
[29] Kassim A Lee W S. “Color image coding using SPIHT with partially linked spatial orientation trees “. IEEE Trans on Circuit and System for Video Technology, Vol.2, No 2, 203-206, 2003.
[30] Dutta, T., “Medical data compression and transmission in wireless Ad Hoc networks”, Sens. J., IEEE 15, 778–786,2015.
[31] Amri, H., Khalfallah, A., Gargouri, M., Nebhani, N., Lapayre, J.-C., Bouhlel, M.-S., 2017.Medical image compression approach based on image resizing, digital watermarking and lossless compression. J. Signal Process. Syst. 87, 203–214.
[32] Data Compression Techniques in Wireless Sensor Networks PERVASIVE COMPUTING You-Chiun Wang Y.-C. Wang is with the Department of Computer Science, National Chiao-Tung University, Hsin-Chu, 30010, Taiwan. E-mail: wangyc@cs.nctu.edu.tw
[33] Auristin, F.N., 2016. Advanced audio compression for lossless audio coding using.
[34] Hang, B., Wang, Y., Kang, C., “A scalable variable bit rate audio codec based on audio attention analysis”, Rev. Tec. Fac. Ing. Univ. Zulia 39, 114–120,2016.
[35] Jain, D., Tech, M., Engineering, C., Engineering, C., 2017. A Modified Method for Sound Compression Using Intrinsic Mode Functions 97–102.
[36] Watkinson, J., 2004. The MPEG Handbook: MPEG-1, MPEG-2, MPEG-4. Taylor & Francis.
[37] O. Younis and S. Fahmy, "Distributed Clustering in Adhoc Sensor Netwrok: A Hybrid, Energy -efficient Approach", September 2002.
[38] O. Younis and S. Fahmy, "Heed:A hybrid , Energy efficient, Distributed Clustering Approach for ad-hoc network", IEEE Transactions on mobile computing, vol.3, no.4, Oct-Dec.2004, pp. 366-369.
[39] Lindsey and C.S. Raghavendra, "PEGASIS: Power- efficient Gathering in sensor information System", Proceedings, IEEE Aerospace Conference, vol. 3, Big Sky, MT, Mar.2002, pp. 1125-1130.
[40] Yakubu Ajiji Makeri The role of Cyber Security and Human-Technology Centric for Digital Transformation, International Jounal of scientific research in computer science technology Vol-6, Issue-6, E-ISSN 2320-7639.
[41] A. Jenita Jebamalar, Efficiency of Data Mining Algorithms Used In Agnostic Data Analytics Insight Tools, IJSRNSC, vol. 6, Issue. 6, pp. 14-18, Dec-2018
Citation
N.S. Singh, H.J. Singh, "Data Compression Techniques in Wireless Sensor Network: A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.697-706, 2019.
Hybrid Elliptic Curve Cryptography for Secured Cloud Computing
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.707-719, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.707719
Abstract
This paper presents a secure cloud storage scheme based on hybrid cryptosystem, which consists of Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), and one-way hash function. Here, the data owner exports large volume of encrypted data to a cloud storage provider, the Electronic cryptography is a public key or asymmetric key means that the encryption key and decryption key are different. In many applications like military databases confidential video conferencing, medical imaging system, online personal photograph album security is very essential. Also, in industrial process wide usage of images can turn it into a resource and asset. So, it is important to protect confidential images data from unauthorized access. this paper proposes elliptical curve cryptography-based security mechanism and ant colony optimization based secured key management technique. The proposed system provides better space complexity than existing RSA and CRT, and the ACO improves optimality
Key-Words / Index Term
cloud computing, security, RSA algorithm, elliptic curve cryptography, ant colony optimization
References
[1]. Wang You-Bo, Dong Xiang-Jun, Tian Zhi-Guang. “ FPGA Based Design of Elliptic Curve Cryptography Coprocessor”, Third International Conference on Natural Computation,vol.5, pp. 185-189,2007
[2]. Jarvinen K., Skytta J. “ On Parallelization of High Speed Processors for Elliptic Curve Cryptography”, In Proceedings of IEEE International conference on Very Large Scale Integration Systems, vol.16(9),pp.1162-1175,2008
[3]. L.Y. Li and Y. Xiang. “Research of Multi-Path Touting Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networds”, In Proceedings of International Conference on Information Technology,pp.1006-1010, 2008.
[4]. Han L. and Berry D. “Semantic-Supported and Agent Based Decentralized Grid Resource Discovery”, Computer Journal of Future Generation Computer Systems, vol. 24(8),pp.806-812, 2008
[5]. Z. Zhang, X. Zhang. “Realization of open cloud computing federation based on mobile agent”, In proceedings of IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 3, pp. 642–646,2009
[6]. Athavale A.; Singh K.; Sood S. “Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography”, In proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks, pp. 332-335,2009
[7]. Greenberg, J. Hamilton, D. A. Maltz and P. Patel. “The cost of a cloud: Research problems in data center networks”, Computer Commuication Review, vol. 39(1), pp.68 -73,2009
[8]. M. Armbrust. “A view of cloud computing” Journal of the Association for Computing Machinery, vol. 53, pp. 50- 58, 2010
[9]. Pathak H. and Sanghi M. “Speeding-up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem”, International Journal on Computer Science and Engineering, vol. 2, pp. 1024-1028, 2010.
[10]. Dinh HT, Lee C, Niyato D, Wang P. “A survey of mobile cloud computing: architecture, applications, and approaches” In Proceedings of the wireless communications and mobile computing,vol.13(8), pp.1587-1611,2011
[11]. Y. Zhang and J. Grobschadl. “Encient prime field arithmetic for elliptic curve cryptography on wireless sensor nodes.” In Proceedings of the International Conference on Computer Science and Network Technology , vol. 1, pp. 459-466, 2011
[12]. Chia-Feng Juang, Chun-Ming Lu, Chiang Lo and Chi-Yen Wang. “Ant Colony Optimization Algorithm for Fuzzy Controller Design and Its FPGA Implementation”, In proceedings of IEEE international conference on Plasma Science, vol. 39, 2011
[13]. Farah Mourad, Hicham Chehade, Hichem Snoussi, Farouk Yalaoui, Lionel Amodeo, C, Edric Richard. “Controlled Mobility Sensor Networks For Target Tracking Using Ant Colony Optimization”, In Proceedings of IEEE International conference On Mobile Computing, vol. 11, pp. 1261 – 1273, 2011
[14]. Hai Ming Jiang, Kang Xie and YaFei Wang. “Novel Design of Flat Gain Spectrum Raman Fiber Amplifiers Based On Ant Colony Optimization”, In Proceedings of IEEE International conference on Photonics Technology Letters, vol. 23, 2011
[15]. M. Jarschel, D. Schlosser, S. Scheuring and T. Hobfeld. “An evaluation of QoE in cloud gaming based on subjective tests”, In Proceedings of IEEE international conference on innovative mobile and internet services in Ubiquitous Computing, pp. 330-335, 2011
[16]. Mahamat Hassan. and Azween A. “A New Grid Resource Discovery Framework”, The International Arab Journal of Information Technology, vol. 8(1),pp. 99-107, 2011
[17]. X. W. Zhang, A. Kunjithapatham, S. Jeong and S. Gibbs. “Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing”, Mobile Networks & Applications, vol. 16(3), pp.270 -284,2011
[18]. LiLi, Ahmed A. Abd El-Latif and XiamuNiu. “Elliptic Curve ElGamal Based Homomorphic Image Encryption Scheme for Sharing Secret Images in Signal Processing”, Elsevier, vol. 92, pp. 1069–1078, 2012
[19]. S. Maria Celestin Vigila and K. Muneeswaran. “Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications”, International Journal of Network Security , vol. 14(4), pp. 236–242, 2012
[20]. Loai Tawalbeh, Moad Mowafi and Walid Aljoby. “Use of Elliptic Curve Cryptography for Multimedia Encryption”, IET Information Security ,vol. 7(2), pp. 67–74, 2012
[21]. S. Barber, X. Boyen, E. Shi, and E. Uzun. “Bitter to better - how to make bitcoin a better currency” ,Lecture Notes in Computer Science- Springer ,vol. 7397, pp. 399-414, 2012
[22]. Bai Qing-hai; Zhang Wen-bo; Jiang Peng; Lu Xu. “Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation”, International Conference on Computer Science and Service System, pp. 1224-1227,2012.
[23]. Y. Volkan Pehlivanoglu “A new vibrational genetic algorithm enhanced with a Voronoi diagram for path planning of autonomous UAV”, Aerospace Science and Technology, vol. 16, pp. 47-55, 2012.
[24]. Ratan Mishral, and Anant Jaiswal. “Ant colony Optimization: A Solution of Load balancing in Cloud”, International Journal of Web & Semantic Technology,vol. 3(2), 2012.
[25]. S.Dey. “Cloud mobile media: Opportunities, challenges, and directions”,In proceedings of International conference on Computing, networking and communications, pp.929 -933, 2012
[26]. R. Kokku, R. Mahindra, H. Zhang and S. Rangarajan. “NVS: A substrate for virtualizing wireless resources in cellular networks”, In Proceedings of IEEE International conference, vol. 20(5), pp.1333 -1346, 2012
[27]. Gao Y., Guan H., Qi Z., Hou Y., and Liu L, “A Multi-Objective Ant Colony System Algorithm for Virtual Machine Placement in Cloud Computing”, Journal of Computer and System Sciences, vol. 79(8), pp. 1230-1242, 2013.
[28]. S. F. Abbas. “Metric Base Analysis and Modeling Experiments of Routing Protocols in MANETs and VANETs Wireless Network using Real Time Scenarios”, International Journal of Computer Science Issues, vol. 10(5),2013.
[29]. Niroshinie Fernando,Seng W.Loke,Wenny Rahayu. “Mobile cloud computing: A survey”, Future Generation Computer Systems, vol.29 ,pp.84–106,2013
[30]. A. Ahmed, Abd El-Latif and XiamuNiu.“A Hybrid Chaotic System and Cyclic Elliptic Curve for Image Encryption”,International Journal of Electronics and Communications, Elsevier, vol. 67, pp. 136–143, 2013
[31]. H. Seo and H. Kim. “Optimized multi-precision multiplication for public-key cryptography on embedded microprocessors”, International Journal of Computer and Communication Engineering , vol. 2,pp. 255-259, 2013
[32]. Arshad R, Ikram N.“Elliptic curve cryptography based mutual authentication scheme for session initiation protocol”, Multimedia Tools and applications, vol. 66(2), pp. 165–178,2013
[33]. Ali Soleymani, Md Jan Nordin and Zulkarnain Md Ali. “A Novel Public Key Encryption based on Elliptic Curves Over Prime Group Field”, Journal of Image and Graphics , vol. 1, pp. 43–49, 2013
[34]. S. Behnia, A. Akhavan, A. Akhshani and A. Samsudin. “Image Encryption based on the Jacobian Elliptic Maps”, The Journal of System and Software, Elsevier, vol. 86, pp. 2429–2438, 2013
[35]. Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S. “ A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme”, Security and communication Networks, vol. 7(8),pp. 1210–1218,2013
[36]. Sharma G, Bala S, Verma AK. “An identity-based ring signcryption scheme”, IT convergence and security, Springer, pp151–157,2013
[37]. Y., Wang, G., Chen, H., Shi, L., Qin, L. “An ant colony optimization based dimension reduction method for high-dimensional datasets”,Journal of Biological Engineering, vol. 10,pp. 231–241,2013
[38]. Baig, A.R.; Shahzad, W.; Khan, S. “ Correlation as a Heuristic for Accurate and Comprehensible Ant Colony Optimization Based Classifiers” In Proceedings of IEEE International conference on Evolutionary Computation, vol. 17(5),pp. 686 - 704,2013
[39]. Wei-Neng Chen; Jun Zhang , “Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler”, In Proceedings of IEEE International conference on Software Engineering,vol 39(1),pp. 1 – 17,2013
[40]. Zhanchang Yu, Sijia Zhang, Siyong Chen, Bingxing Liu, Shiqi Ye. “Research on Traveling Routes Problems Based on Improved Ant Colony Algorithm”, Communications and Network, vol. 5, pp. 606-610,2013
[41]. Lie Qu,Yan Wang,Mehmet A Orgun. “Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment”, In proceedings of IEEE international conference on services compurting, pp.152-159,2013.
[42]. Ijaz S., Munir E., Anwar W., and Nasir W. “Efficient Scheduling Strategy for Task Graphs in Heterogeneous Computing Environment”, The International Arab Journal of Information Technology, vol. 10(5), pp. 486-492, 2013
[43]. Guoyuan Linabd, Yuyu Biea, Min Leic, Kangfeng Zhengc. “A Behavior Trust Model in Cloud Computing Environment” International Journal of Computational Intelligence Systems, vol. 7(4), pp.785-795, 2014
[44]. Sultan Ullah, Zheng Xuefeng. “TCLOUD: A Trusted Storage Architecture for Cloud Computing” International Journal of Advanced Science and Technology, vol.63, pp.65-72, 2014
[45]. Mohammad Anagreh, AzmanSamsudin and MohdAdib Omar. “ Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF”, The International Arab Journal of Information Technology, vol. 11, pp. 521-525, 2014
[46]. Ting Liu, YangLiu, YashanMao, Yao Sun, XiaohongGuan, Weibo Gong, Sheng Xiao “A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication” In Proceedings of IEEE International conference on Trans Smart Grid, vol. 5(3), 2014
[47]. Hong Liu and Yanbing Liu. “Cryptanalyzing an Image Encryption Scheme based on Hybrid Chaotic System and Cyclic Elliptic Curve,In Optics and Laser Technology” , Elsevier, vol. 56, pp. 15–19, 2014
[48]. Akshay D. Kapse, Piyush K. Ingole“Secure and Efficient Search Technique in Cloud Computing”, In Proceedings of IEEE International conference on Communication systems and network technologies, pp.743-747,2014
[49]. Brohi S.N.. M.A. Bamiah, S. Chuprat and J.L.A. Manan. “Design and implementation of a privacy preserved off-premises cloud storage”, Journal of Computer science, vol.10,pp. 210-223,2014
[50]. R. Forsati, A. Moayedikia, R. Jensen, M. Shamsfard and M. R. Meybodi. “Enriched ant colony optimization and its application in feature selection”, Neurocomputing, vol. 142, pp.354 -371, 2014
[51]. Agnieszka Lazarowska. “Ant Colony Optimization based navigational decision support system”, Procedia Computer Science, vol. 35,pp 1013– 1022,2014
[52]. Tabakhi Sina, Parham Moradi and Fardin Akhlaghian. “An unsupervised feature selection algorithm based on ant colony optimization”, Engineering Applications of Artificial Intelligence, vol. 32, pp.112 -123, 2014
[53]. Huseyin Eldem, Erkan Ulker. “Application of Ant Colony Optimization for the Solution of 3 Dimensional Cuboid Structures”, Journal of Computer and Communications, vol. 2, pp. 99-107,2014
[54]. Smierzchalski R, Kuczkowski L. “Comparison of single and multi-population evolutionary algorithm for path planning in navigation situation”,ultra clean processing of silicon surfaces, vol. 210,pp.166-177,2014
[55]. Hsien-Kai Hsin; En-Jui Chang; Chia-An Lin; Wu, A.-Y.A. “Ant Colony Optimization-Based Fault-Aware Routing in Mesh-Based Network-on-Chip Systems”, Computer-Aided Design of Integrated Circuits and Systems, vol. 33(11), pp.1693-1705,2014
[56]. Sundus Shaukat, Riaz Ahmed Bhatti, Khalid Ibrahim Qureshi and Shafqat Ali Shad, “Ant Colony Optimization: A Review and Comparison” Research Journal of Applied Sciences, Engineering and Technology,vol.8(3),pp. 435-438, 2014
[57]. Luziane Ferreira de Mendonca. “An Approach for Personalized Social Matching Systems by Using Ant Colony” ,Social Networking, vol. 3,pp 102-107,2014
[58]. Bing quan Cheng “Cloud Service System Reliability Modeling, Electronic Product Reliability and Environment Testing”, vol. 32(2), pp.22 -27, 2014
[59]. Guoyuan Lin; Danru Wang; YuyuBie; Min Lei “MTBAC: A mutual trust based access control model in Cloud computing”, In Proceedings of IEEE International conference ,vol. 11(4),pp.154 – 162,2014
[60]. Heilig, L.; Vob, S. “A Scientometric Analysis of Cloud Computing Literature” , In Proceedings of IEEE International conference on Cloud Computing, vol. 2(3),2014
[61]. S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani and R. Buyya. "Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges", In Proceedings of IEEE International conference ,vol. 16(1), pp.337 -368, 2014
[62]. Y. Cai, F. R. Yu and S. Bu. “Cloud computing meets mobile wireless communications in next generation cellular networks”, In Proceedings of IEEE International conference ,vol. 28(6), pp.54 -59, 2014
[63]. Bamiah, Mervat Adib; Brohi, Sarfraz Nawaz; Chuprat, Suriayati& 2Jamalul-lail Ab Manan. “Trusted Cloud Computing Framework For Healthcare Sector”, Journal of Computer Science, vol. 10(2),pp. 240-250,2014
[64]. Atta ur Rehman Khan, Mazliza Othman ,Feng Xia ,Abdul Nasir Khan, “Context-Aware Mobile Cloud Computing and Its Challenges”, In Proceedings of IEEE International conference on Cloud Computing, vol. 2(3),pp. 42-49,2015
[65]. Laiphrakpam Dolendro Singh and KhumanthemManglem Singh. “Image Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, vol 54,pp. 472-481,2015
[66]. Christina Thomas ,Gnana Sheela K , Saranya P Krishnan. “An Efficient Elliptic Curve Scalar Multiplication using Karatsuba Multiplier”, International Journal of Engineering Research and General Science, vol. 3, pp. 1074-1086,2015
[67]. Medhat Tawfeek, Ashraf El-Sisi, ArabiKeshk and FawzyTorkey. “Cloud Task Scheduling Based on Ant Colony Optimization”, The International Arab Journal of Information Technology, vol. 12(2), March 2015
[68]. Mehdi Bahrami. “Cloud Computing for Emerging Mobile Cloud Apps” In proceedings of IEEE international conference, pp. 4-5,2015
[69]. C. Aguero, N. Koenig, I. Chen, H. Boyer, S. Peters, J. Hsu, B. Gerkey, S. Paepcke, J. Rivero, J. Manzo, E. Krotkov, and G. Pratt. “Inside the Virtual Robotics Challenge: Simulating Real-time Robotic Disaster Response”, In Proceedings of IEEE International conference on Automation Science and Engineering ,vol. 12(2), 2015.
[70]. Zhiyuan Yin; Yu, F.R.; Shengrong Bu; Zhu Han. “Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments With Telecom Operator Cloud” In Proceedings of IEEE International conference on Wireless Communications,vol.14(7), pp.4020-4033,2015
[71]. Brown, Michael, et al. Software implementation of the NIST elliptic curves over prime fields. Springer Berlin Heidelberg, 2001.
Cohen, Henri, Atsuko Miyaji, and Takatoshi Ono. "Efficient elliptic curve exponentiation using mixed coordinates." Advances in Cryptology—ASIACRYPT’98. Springer Berlin Heidelberg, 1998
Citation
G. Sakthivel, P. Madhubala, "Hybrid Elliptic Curve Cryptography for Secured Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.707-719, 2019.
Implementation of Meta Data Storage using Fragmentation method for more security in the cloud
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.720-723, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.720723
Abstract
Cloud Computing has wide range of opportunities for research and industry purpose. There are many issues to consider in cloud. The one of the main issue in cloud is Security. Protecting more secured data in cloud is a big task. To achieve more security for a sensitive data, a model is proposed .In this paper, providing more security for sensitive data is achieved by fragmenting the data and allocating the preferences to the data and only high secured data is encrypted and stored. The detailed implementation of the work is discussed clearly in the paper
Key-Words / Index Term
sensitive data, fragmentation, Public Data Segment (PDS), Sensitive Data Segment (SDS)
References
[1]. Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.
[2]. Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.
[3]. Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.
[4]. Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.
[5]. Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.
[6]. Dr.V. Kiran Kumar, E. Hari Prasad, "Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.391-394, 2018.
[7]. Dr.V.Kiran Kumar, E. Hari Prasad, ”Analysis of security as a service in cloud computing: a Review”, International Research Journal of Management Sociology & Humanities ,Vol.8,Issue.11 ,pp:119-127, 2017 www.IRJMSH.com
[8]. Fong E, Okun V (2007) Web application scanners: definitions and functions. In: Proceedings of the 40th annual Hawaii International conference on system sciences. IEEE Computer Society, Washington, DC, USA.
[9]. Wu H, Ding Y, Winer C, Yao L (2010) Network Security for virtual machine in Cloud Computing. In: 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, pp 18–21.
[10]. Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security.http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Technical report, Helsinki University of Technology, October 2007
Citation
V. Kiran Kumar, E. Hari Prasad, "Implementation of Meta Data Storage using Fragmentation method for more security in the cloud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.720-723, 2019.
Malayalam Questions Classification in Question Answering Systems using Support Vector Machine
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.724-729, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.724729
Abstract
We consider Question answering systems (QAS) as the next step in information retrieval, allowing users to create questions in natural language and get concise answers. Researches show that exact classification of questions with respect to the expected answer type is imperative to make a successful QAS. The duty of classifying distinctive questions becomes hard and challenging because there are variety of Natural Language Questions. Due to the agglutinative nature researchers find so many difficulties in Malayalam based QAS. So a very limited researches have been done in classifying Malayalam Questions with the help of Machine Learning Techniques. In this paper, we have used Support Vector Machines (SVM) to classify Questions. In Malayalam we can classify the question into following types ????? (what), ??????? (when), ?????? (how), ?????(where), ???????????(why), ???? (how many/how much) and ???(who). For Malayalam Question classification using SVM 1is the average precision, 0.93 is the average recall and the average F1 Score is 0.95. So the outcome that we obtained shows the effectiveness of Support Vector Machines in classifying the question.
Key-Words / Index Term
Malayalam Question Classification, Support Vector Machine, Machine Learning, Question Answering
References
[1] V. Lopez, V. Uren, M. Sabou and E. Motta, “Is question answering fit for the Semantic Web? A survey “ , Semantic Web, Vol. 2, Issue. 2, pp. 125-155, 2011.
[2] S. K. Dwivedia, V. Singhb, “Research and reviews in question answering system”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), India, pp.417-424, 2013
[3] G. Suresh kumar, G. Zayaraz, “Concept relation extraction using Naïve Bayes classifier for ontology-based question answering systems”, Journal of King Saud University - Computer and Information Sciences, Vol. 27, Issue. 1, pp. 13-24, 2015.
[4] D. Mollá, J.L. Vicedo “Question answering in restricted domains: an overview “, Computational Linguistics, Vol. 33, issue. 1, pp. 41-61, 2007.
[5] N. Indurkhya, F.J. Damereau., “Handbook of Natural Language Processing (second ed.)” , Chapman & Hall/CRC, Boca Raton , 2010.
[6] V. Punyakanok, D. Roth, and W.-t. Yih., "Natural language inference via dependency tree mapping: An application to question answering", Computational Linguistics, Vol. 6, Issue. 9 pp. 1-10, 2004 .
[7] H Sundblad, "Question Classification in Question Answering systems", Phd Thesis Submitted to Department of Computer and information Science at Linkoping University, 2007.
[8] O. Kolomiyets , M.F. Moens., “A survey on question answering technology from an information retrieval perspective”, Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications: An International Journal, Vol.181, Issue.24, pp. 5412-5434, 2011
[9] L. Hirschman, R. Gaizauskas, “ Natural language question answering: The view from here”, Natural Language Engineering, Vol.7, Issue.4, pp. 275-300, 2001.
[10] D.Zhang, W.S. Lee, “Question Classification Using Support Vector Machines”, Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Informaion Retrieval, ACM, Toronto, Canada, pp.26-32, 2003.
[11] V. Bhoir, M. A. Potey, "Question answering system: A heuristic approach," The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014), Bangalore, pp. 165-170, 2014.
[12] K. Pragisha, P. C. Reghuraj, “A Natural Language Question Answering System in Malayalam Using Domain Dependent Document Collection as Repository”, International Journal of Computational Linguistics and Natural Language Processing, Vol. 3 Issue. 3, pp.534-539, 2014.
[13] S. A. Raji , B. P. Anto , “ Intelligent Query Processing In Malayalam”, International Journal on Computational Sciences & Applications (IJCSA), Vol.3, Issue.2 pp. 51-59, 2013.
[14] B. Samei, H. Li, F. Keshtkar, V. Rus, A. C. Graesse, “Context-Based Speech Act Classification in Intelligent Tutoring Systems”, Intelligent Tutoring Systems. ITS 2014. Lecture Notes in Computer Science, Vol.8474, pp. 236-241, 2014
[15] C. Unger, C. Forascu, V. Lopez, A.C. Ngonga Ngomo, E. Cabrio, P. Cimiano, S. Walter, “ Question Answering over Linked Data (QALD-4)” , In L. Cappellato, N. Ferro, M. Halvey, & W. Kraaij (Eds.), Working Notes for CLEF 2014 Conference Sheffield, United Kingdom pp. 1172-1180, 2014.
Citation
Bibin P.A, Babu Anto P, "Malayalam Questions Classification in Question Answering Systems using Support Vector Machine," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.724-729, 2019.