Energy Level Estimated Reactive Clustering Routing Protocol in Wireless Sensor Network
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1015-1022, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10151022
Abstract
The challenging task of wireless sensor network is to increase the lifetime of the network as they are equipped with critical battery power. Many protocols were proposed to efficiently use the battery power to extend the lifetime of the wireless sensor network. For optimizing the battery power of the sensor network, various energy efficient routing strategies are applied. In this paper, we studied and reviewed popular routing protocols LEACH, DEEC, DDEEC, EDEEC and EDDEEC as they use their own algorithm for energy efficiency. They use probability based cluster head selection, as a result, the nodes having low battery power may be selected as cluster head and the nodes having high battery power may not be selected as cluster head. This creates unbalancing condition in wireless sensor network for network lifetime enhancement point of view. Also, there are no observation on current energy level of the sensor nodes. To address this limitation, we proposed energy level estimated reactive clustering routing (ELERCR) algorithm in wireless sensor network which uses the concepts of energy level observation of nodes of cluster head selection. ELERCR uses ratio of current energy to initial energy for selection of cluster head in wireless sensor network. Simulation result shows that performance of our protocol gives significant energy efficiency and more network lifetime compared to other protocols.
Key-Words / Index Term
Wireless Sensor Networks, Clustering, Energy Efficiency, Stable Election, Network Lifetime
References
[1] H. Saboonchi, D. Ozevin, and M. Kabir, “Mems sensor fusion: Acoustic emission and strain,” Sensors and Actuators A: Phys- icalVolume, vol. 247, no. 15, pp. 566–578, August 2016.
[2] B. A. Warneke and K. S. J. Pister, “Mems for distributed wireless sensor networks,” in Electronics, Circuits and Systems, 2002. 9th International Conference on, vol. 1. IEEE, 2002, pp. 291–294
[3] T. Fujii, S. Takegi, T. Nakayama, M. Ohta, and O. Takyu, “Highly efficient environment aware wireless sensor network,” in 2016 13th IEEE Annual Consumer Communications Net- working Conference (CCNC), Jan 2016, pp. 256–257.
[4] A. A. Ahmed, H. Shi, and Y. Shang, “A survey on network protocols for wireless sensor networks,” in Information Tech- nology: Research and Education, 2003. Proceedings. ITRE2003. International Conference on, Aug 2003, pp. 301–305.
[5] N. M. Boers, P. Gburzyn´ski, I. Nikolaidis, and W. Olesin´ski, “Developing wireless sensor network applications in a virtual environment,” Telecommunication Systems, vol. 45, no. 2, pp. 165–176, 2010.
[6] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “En- ergy efficient communication protocol for wireless micro sensor networks,” in Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS-33). New York, USA: IEEE, 2010, pp. 1–10.
[7] L. Qing, Q. Zhu, and M. Wang, “Design of a distributed energy- efficient clustering algorithm for heterogeneous wireless sensor networks,” Computer Communications, vol. 29, no. 12, pp. 2230–2237, August 2006.
[8] B. Elbhiri, R. Saadane, S. E. fldhi, and D. Aboutajdine, “Devel- oped distributed energy-efficient clustering (ddeec) for hetero- geneous wireless sensor networks,” in I/V Communications and Mobile Network (ISVC), 2010 5th International Symposium on. IEEE, Sept 2010, pp. 1–4.
[9] P. Saini and A. K. Sharma, “E-deec- enhanced distributed energy efficient clustering scheme for heterogeneous wsn,” in Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. IEEE, Oct 2010, pp. 205–210.
[10] N. Javaid, M. B. Rasheed, M. Imran, M. Guizani, Z. A. Khan, T. A. Alghamdi, and M. Ilahi, “An energy-efficient distributed clustering algorithm for heterogeneous wsns,” EURASIP Jour- nal on Wireless Communications and Networking, vol. 2015, no. 1, pp. 1 – 11, June 2015.
[11] A. S. K. Mammu, U. Hernandez-Jayo, N. Sainz, and I. de la Iglesia, “Cross-layer cluster-based energy-efficient protocol for wireless sensor networks,” Sensors, vol. 15, no. 4, p. 8314, 2015.
[12] A. A. Aziz, Y. A. Sekercioglu, P. Fitzpatrick, and M. Ivanovich, “A survey on distributed topology control techniques for extend- ing the lifetime of battery powered wireless sensor networks,” IEEE Communications Surveys Tutorials, vol. 15, no. 1, pp. 121–144, First 2013
Citation
Saraswati Bhargava, Manoj Lipton, Himanshu Yadav, "Energy Level Estimated Reactive Clustering Routing Protocol in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1015-1022, 2019.
Performance Analysis and Evaluation of Face Recognition using Deep Convolutional Neural Network
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1023-1031, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10231031
Abstract
Face Recognition system identifies a person by comparing numerous face images accumulated in database records. Face Recognition is simply matching human beings by their faces. This technology has augmented in the field of security and law enforcement to track down criminals and terrorists. In our method, we use deep convolution neural network (deep CNN) and Euclidean distance for extracting the feature from face images. Euclidean Distance used for counting distance between images. We have used FEI dataset for face recognition. This paper gives brief information about face recognition techniques like OpenFace, EigenFace, LBPH, Fisher-Face, and Deep CNN. This paper contains basic information about CNN architecture like AlexNet, GoogleNet, VGGNet, ResNet, SENet, etc. that are used to recognize any type of pose variation in the image. CNN architecture plays an important role to achieve the best accuracy. This paper also focuses on some publicly available datasets: CelebFace (2014), Facebook (2014), Google (2015), MegaFace (2016), MS-Celeb-1M (2018).
Key-Words / Index Term
Face Recognition, Face detection, Tensorflow, CNN architectures, Datasets, deep CNN
References
[1]. Anil, J., and L. Padma Suresh. "Literature survey on face and face expression recognition." Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on. IEEE, 2016.
[2]. Omkar M. Parkhi, Andrea Vedaldi and Andrew Zisserman, "Deep Face Recognition," in British Machine Vision Conference (BMVC), 2015.
[3]. Tadas Baltruˇsaitis, Peter Robinson and Louis-Philippe Morency, "OpenFace: an open source facial behavior analysis toolkit," in 2016 IEEE Winter Conference on Applications of Computer Vision (WACV), Lake Placid, NY, USA, 2016
[4]. Sawant, Mr. Namdev M., Mr. Rirandra A. Dhotre, and Mr. Pravin P. Botre. "REVIEW ON PARALLEL IMPLEMENTATION OF PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION USING MPIAND OpenMP." GSJ 6.8 (2018): 95
[5]. Ahmed, Aftab, et al. "LBPH based improved face recognition at low resolution." 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD). IEEE, 2018
[6]. Ivars Namatēvs, "Deep Convolutional Neural Networks: Structure, Feature Extraction, and Training," 2017
[7]. Belhumeur, V., Hespanda, J., Kiregeman, D.,1997, Eigenfaces vs. FisherFaces: recognition using class specific linear projection, IEEE Trans. on PAMI, V. 19, pp. 711-720.
[8]. Turk, M. A., Pentland, A. P., Eigenfaces for recognition, 1991, Cognitive Neurosci., V. 3, no.1, pp.71-86
[9]. Simonyan, Karen, and Andrew Zisserman. "Very deep convolutional networks for large-scale image recognition." arXiv preprint arXiv:1409.1556 (2014).
[10]. Hu, Jie, Li Shen, and Gang Sun. "Squeeze-and-excitation networks." arXiv preprint arXiv:1709.01507 7 (2017).
[11]. H. Shin et al., "Deep Convolutional Neural Networks for Computer-Aided Detection: CNN Architectures, Dataset Characteristics and Transfer Learning," in IEEE Transactions on Medical Imaging, vol. 35, no. 5, pp. 1285-1298, May 2016.
[12]. Wang, Mei, and Weihong Deng. "Deep Face Recognition: A Survey." arXiv preprint arXiv:1804.06655 (2018).
[13]. Guo, Yandong, et al. "Ms-celeb-1m: A dataset and benchmark for large-scale face recognition." European Conference on Computer Vision. Springer, Cham, 2016.
[14]. Masi, Iacopo, et al. "Learning pose-aware models for pose-invariant face recognition in the wild." IEEE Transactions on Pattern Analysis and Machine Intelligence (2018).
[15]. Hmani, Mohamed Amine, and Dijana Petrovska-Delacrétaz. "State-of-the-art face recognition performance using publicly available software and datasets." Advanced Technologies for Signal and Image Processing (ATSIP), 2018 4th International Conference on. IEEE, 2018.
[16]. Cao, Qiong, et al. "Vggface2: A dataset for recognizing faces across pose and age." Automatic Face & Gesture Recognition (FG 2018), 2018 13th IEEE International Conference on. IEEE, 2018.
[17]. Bagherian, Elham, and Rahmita Wirza OK Rahmat. "Facial feature extraction for face recognition: a review." Information Technology, 2008. ITSim 2008. International Symposium on. Vol. 2.IEEE, 2008.
Citation
Kashyap Patel, Miren Karamta, M. B. Potdar, "Performance Analysis and Evaluation of Face Recognition using Deep Convolutional Neural Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1023-1031, 2019.
Mitigating the Effect of Distributed Denial of Service Attack
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1032-1035, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10321035
Abstract
As the WORLD WIDE WEB (WWW) has been drawing in more business and transaction to be actualized over the Internet, it also has attracted web server attackers having malicious intends. Among different attacks possible against the web server, Distributed Denial of Service (DDoS) attack is the most harmful kind of thread, as it is hard to detect and dispose of completely. The use of spoofed IP addresses to launch DDoS makes it even much harder to identify the source of an attack. In DDoS, attack traffic resembles to legitimate traffic and difficult to differentiate. Still, there are some features which can be used to differentiate normal request from the malicious ones. The source IP distribution is one of the features. In the proposed mechanism a data structure is maintained at victim server which is used to decide priority among different requests during DDoS based on previous visit history and source IP distribution of that server. In the descending order of priority, the server serves the request of users at the time of DDoS.
Key-Words / Index Term
DDoS; IP spoofing; Source distribution; Priority; Defence
References
[1] Peng, Tao, Christopher Leckie, and Kotagiri Ramamohanarao. "Survey of network-based defense mechanisms countering the DoS and DDoS problems." ACM Computing Surveys (CSUR) 39.1 (2007): 3.
[2] http://tools.ietf.org/html/rfc4987
[3] Quyen Le; Zhanikeev, M.; Tanaka, Y., "Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks," Next Generation Internet Networks, 3rd EuroNGI Conference on , vol., no., pp.167,173, 21-23 May 2007.
[4] Ferguson, Paul. "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing." (2000).
[5] K. Park, and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in Proc. IEEE INFOCOM 2001, pp. 338347.
[6] T. Peng, C. Leckie, and K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, ICC ’03. May , Vol.1, pp: 482- 486, 2002.
[7] Jin, Cheng, Haining Wang, and Kang G. Shin. "Hop-count filtering: an effective defense against spoofed DDoS traffic." Proceedings of the 10th ACM conference on Computer and communications security. ACM, 2003.
[8] WorldCup 98 and NASA Web server logs are available on the Internet Traffic Archive: http://ita.ee.lbl.gov/html/traces.html
Citation
Lavlish Goyal, Nitika, "Mitigating the Effect of Distributed Denial of Service Attack," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1032-1035, 2019.
Analysis of Energy Based Cluster Head Selection Using CAODV Algorithm in MANET
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1036-1039, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10361039
Abstract
Clustering is the most broadly used performance resolution for Mobile Ad Hoc Networks enabling their scalability for a high quantity of mobile nodes. The intend of clustering schemes is pretty complex, appropriate to the very lively topology of such networks. The Proposed system is when the new node is entered the cluster in sometimes the fresh node will be the cluster head (CH). Because the head node can communicate to gateway in every transmission at the time cluster head energy level is decrease. When the clustering head reached in small energy level doesn’t to broadcasting the packets the new node will become a CH. Because the fresh node have a maximum level of energy. So the proposed algorithm CAODV is increased packet delivery ratio better performance than the existing Distributed Weighted Clustering Algorithm (DWCA) using MATLAB simulink.
Key-Words / Index Term
MANET, CAODV Clustering, DWCA, Packet Delivery Ratio, Energy Consumption
References
[1] H.J.Cha, J.M. Kim and H.B. Ryou, “A study on the clustering scheme for node mobility in mobile Ad-hoc network”, In Advanced in Computer Science and its Applications, Springer Berlin Heidelberg, Vol(279), Iss(1), Pages:1365-1369, 2014.
[2] Mohd. Junedud Haque, Mohd Muntjir and Hussain Abu Sorrah, “A Comparative Survey of computation of cluster head in manet”, International Journal of computer applications, Vol(118), Iss(3), Pages: 6-9, 2015.
[3] Faraz Ahsan and Akhtab Hussain Khalid Hussain, Abdul Hanan Abdullah, Khalid M. Awan, “Cluster Head Selection Schemes for WSN and MANET: A Survey”, World Applied Sciences Journal, Vol(23),Iss(5), Pages: 611-620, 2013.
[4] Mrs.J.Vijayalakshmi and Dr.K.Prabu, “Performance Analysis of Clustering Schemes in MANETs”,ICICI 2018 International Conference on Intelligent Data Communication Technologies and Internet of Things(ICICI), pp.808-813, 2018.
[5] K. Ramesh and D. K. Somasundaram, “A comparative study of cluster head selection algorithms in wireless 11,sensor networks”, International Journal of Computer Science& Engineering Survey, Vol (2), Iss (4), 2011.
[6] Vijayakumar G et. Al, “Current Research Work on Routing Protocols for MANET : A Literature Survey”, International Journal of Computer Science and Engineering (IJCSE), Vol(02), Iss(03), pages:706-713, 2010.
[7] Mrs.J.Vijayalakshmi and Dr.K.Prabu, “A Survey of Various Weighted based Clustering Algorithm for MANET”, International Journal of Data Mining Techniques and Applications, Vol.07, Iss.01, pp.146-153, june 2018.
[8] Ishita Chakraborty and Prodipto Das, “Data Fusion in Wireless Sensor Network- A Survey”, IJSRNSC, Vol(5), Iss(6), pages:9-15, 2017.
[9] Mrunal Gavhale, Pranav D. Sarat, “Survey on Algorithms for Efficient Cluster Formation and Cluster head selection in Manet”, International conference on information Security and Privacy, Vol(78), Pages: 477-482, 2015.
[10] Mandeep Singh and Mr.Gagangeet Singh, “A Secure and Efficient Cluster Head Selection Algorithm for Manet”, JNCET, Vol(2), Iss(2), Pages: 49-52, June 2015.
[11] Dr. M. Balamurugan and C. Kavi priya, “Energy Based Cluster Head Selection Algorithm in Manet”, IJCSET, Vol(5), Iss(8), Pages: 312-315, Aug 2015.
[12] Ghaidaa Muttasher Abdulsaheb, Osamah Ibrahem Khalaf, Norrozila Sulaiman, Hamzah F.Zmezm and Harith Zmezm, “Improving Ad hoc Network Performance by Usinf an Efficinet Cluster Based Routing Algorithm”, Indian Journal of Science and Technology, Vol(8), Iss(30), Pages: 1-8, Nov 2015.
[13] Supreet Kaur, Varsha Kumari, “Efficient Clustering with proposed Load balancing Technique for Manet”, International Journal of computer Applications, Vol(111), Iss(13), Pages: 21-26, Feb 2015.
Citation
J. Vijayalakshmi, K. Prabu, "Analysis of Energy Based Cluster Head Selection Using CAODV Algorithm in MANET," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1036-1039, 2019.
An Effective Approach for Tree Based Data Collection in Wireless Sensor Network
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1040-1045, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10401045
Abstract
In this paper authors describe about time and frequency division multiple access protocol (TFDMA). It is a new combinational MAC layer protocol for wireless sensor networks in which, the first effort to consider the working of both TDMA and FDMA schedules in the network full of constraints. Also, at the same time by allowing it to operate in an energy-efficient collision-free manner. However, TFDMA considers the multiple frequencies provided in the radio’s of recent sensor node hardware platforms. Authors also show how TFDMA performs protocols providing high throughput and small bounded end delay suitable for new introducing types of sensor network applications such as real-time voice streaming etc.
Key-Words / Index Term
Scheduling, Tree based network, TFDMA, Wireless Sensor Network, Data Collection
References
[1] R. Szewczyk, A. Mainwaring, J. Polastre, J. Anderson, and D. Culler, “An analysis of a large scale habitat monitoring application,” in ACM SenSys 2004, November 2004.
[2] N. Xu et. al. “A wireless sensor network for structural monitoring” in ACMSenSys, November 2004.
[3] D. Malan, T. Jones, M. Welsh, and S. Moulton,“Codeblue: An ad hoc sen-sor network infrastructure for emergency medical care,” in ACM MobiSys, June 2004.
[4] R. Mangharam, A. Rowe and R. Rajkumar, “Voice over Sensor Networks,” in IEEE RTSS, 2006.
[5] S. Gandham, Y. Zhang, and Q. Huang,“Distributed Time-Optimal Scheduling for Convergecast in Wireless Sensor Networks,” Computer Networks, vol. 52, no. 3, pp. 610-629, 2008.
[6] Gurpreet Singh Chhabra, Dipesh Sharma, ”Cluster-Tree
based Data Gathering in Wireless Sensor
Network”, International Journal of Soft Computing and
Engineering, Volume-1, Issue-1, March 2011.
[7] E.Shih et at., “Physical Layer Driven Protocol and
Algorithm Design for Energy-Efficient Wireless Sensor
Networks,” Proc.Acm MobiCom ’01, 2001,pp.2/2-86.
[8] L. van Hoesel, et al. A lightweight medium access
protocol(LMAC) for wireless sensor networks. In 1st Int.
Workshop on Networked Sensing Systems( INSS 2004),
Tokyo, Japan, June 2004.
[9] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and
K.Pister. System architecture directions for network
sensors. In Proceedings of the International
Conference on Architectural Support for Programming
Languages and Operating Systems (ASPLOS), November
2000.
[10] Haigang Gong, and Ming Liu,”A Two Level TDMA Scheduling Protocol with Intra-cluster Coverage for Large Scale Wireless Sensor Network”,IEEE proceding 2006.
[11] An Energy efficient pre-schedule scheme for Hybrid
CSMA/TDMA MAC in WSN By Wei Wang, Honggang
Wang, IEEE, 2006.
[12] Kazem Sohraby, Daniel, Minoli,Taieb Znati.,“Wireless
Sensor Networks- Technology, Protocols and
Application”, Wilay Interscience, 2007, [Online].
Available:
http://www.tfb.edu.mk/amarkoski/WSN/Kniga-w02
[13] Karthikeyan Vaidyanathan, Sayantan Sur, Sundeep Narravula, Prasun Sinha, “Data Aggregation Techniques in Sensor networks” a technical report published on OSU-CISRC-11/04-TR60.
[14] Mastooreh Salajegheh, Hamed Soroush, and Antonis Kalis,” HYMAC: Hybrid TDMA/FDMA Medium Access Control Protocol For Wireless Sensor Networks”, IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007
[15]F. Fitzek, D. Angelini, G. Mazzini, , and M. Zorzi, “Design and Performanceof an Enhanced IEEE 802.11MAC Protocol for Multihop Coverage Extension,” in IEEE Wireless Communications, 2003.
[16] J. Li, Z. J. Haas, M. Sheng, , and Y. Chen, “Performance Evaluation ofModified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network,”in IEEE AINA 2003, 2003.
[17] J. So and N. Vaidya, “Multi-Channel MAC for Ad-Hoc Networks: HandlingMulti-Channel Hidden Terminal Using A Single Transceiver,” in ACM MobiHoc 2004, May 2004.
[18] N. Jain and S. R. Das, “A Multichannel CSMA MAC Protocol withReceiver-Based Channel Selection for Multihop Wireless Networks,” inIEEE IC3N, October 2001.
[19] A. Tzamaloukas and J.J. Garcia-Luna-Aceves, “A Receiver-InitiatedCollision-Avoidance Protocol for Multi-Channel Networks,” in IEEE INFOCOM 2001, April 2001.
[20] S. Ganeriwal, R. Kumar, and M. B. Srivastava, “Timing-sync Protocolfor Sensor Networks,” in ACM Sensys, 2003
[21] J. Elson, L. Girod, and D. Estrin, “Fine-grained Networked Time SynchronizationUsing Reference Broadcast,” in USENIX OSDI, 2002
[22] M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, “The Flooding TimeSynchronization Protocol,” in ACM SenSys, 2004
[23] J. Zhao, and R. Govindan, “Understanding packet Delivery Performancein Dense Wireless Sensor Networks,” in ACM SenSys, 2003
[24] G. Zhou, C. Huang, T. Yan, T. He, J.A. Stankovic and T.F. Abdelzaher, “MMSN: Multi-Frequency Media Access Control forWireless SensorNetworks,” in IEEE INFOCOM2006, 2006.
[25] Hari Balakrishnan et al, “The distance-2 matching problem and its relationshipto the mac-layer capacity of ad hoc wireless networks,” in IEEE Journal on Selected Areas in Comm., 22(6):10691079, August 2004.
[26] A. Nasipuri and S. R. Das, “Multichannel CSMA with Signal Power based Channel Selection for Multi-hop Wireless Networks,” in IEEE Vehicular Technology Conference, September 2000.
[27] A. Naureen, N. Zhang and S. Furber, "Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks," in IEEE Access, vol. 5, pp. 21395-21418, 2017.
[28] D. Ebrahimi, S. Sharafeddine, P. Ho and C. Assi, "UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks," in IEEE Internet of Things Journal, 2018.
[29] J. Flathagen, E. Larsen, P. E. Engelstad and Ø. Kure, "O-CTP: Hybrid opportunistic collection tree protocol for Wireless Sensor Networks," 37th Annual IEEE Conference on Local Computer Networks - Workshops, Clearwater, FL, 2012, pp. 943-951.
[30] Vishal Bhatt , Kapil Kumar Gupta , Nitin Goel,” A Model Driven Approach for Risk Reduction in Insulin Pump”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-6, June 2018.
[31] Annlin JebaS.V., Gnana KingD.R, “Combining Trust with Authentication Information for Routing in Wireless Sensor Networks”, IJSRNSC, Volume-6, Issue-5, October 2018.
[32] Rucha Pawar, Vailshali Munguwadi, Pranav Lapsiwala,” Wireless Mesh Network Link Failure Issues and Challenges: A Survey”, Int. J. Sc. Res. in Network Security and Communication, Volume-6, Issue-3, June 2018.
Citation
Vishal Bhatt, Namrata Dhanda, Kapil Kumar Gupta, "An Effective Approach for Tree Based Data Collection in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1040-1045, 2019.
Performance Enhancement in VANET using Balance Vector Protocol and Nature Swarm Algorithm
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.1046-1052, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10461052
Abstract
VANET is a rapid development of wireless communication technologies; give now the design of this technology in vehicles, in order to enhance intelligent transport systems by great advantages that could be derived from this technology with the objective of enhance the variability of traffic and improve RS (Road Safety), this kind of network gives communication between vehicles or between vehicles and roadside access points. In existing work, problem formulation defined security in VANET plays a vital role. VANET normally refers to a wireless network of mixed sensors or other computing devices that are deployed in vehicles. This type of network enables constant observing and sharing of road conditions and status of the transportation systems. AODV is the most normally used topology based routing procedure for VANET. Using of broadcast packets in the AODV route discovery phase caused it is tremendously susceptible against DoS and DDoS flooding attacks. In proposed work, a method using ontologies and vehicle data traffic management or information to ensure the data transmission of packets as soon as possible and in the most reliable way. Simulation tool used MATLAB 2016a to evaluate the performance metrics like as a packet delivery rate, throughput, End to End Delay and Overhead. In research work, proposed in B-AODV and PSOA algorithm, to improve the communication range, minimum overhead and packet delivery rate.
Key-Words / Index Term
VANET (Vehicular Ad-Hoc Networks), B-AODV (Balanced Ad-Hoc On Demand Distance Vector), DDoS (Distributed Denial of Service) and PSOA (Particle Swarm Optimization Algorithm).
References
[1] B. Ramakrishnan, R.S. Rajesh, & R.S. Shaji, “CBVANET: A cluster based vehicular adhoc network model for simple highway communication”, International Journal of Advanced Networking and Applications, Vol. 2, Issue 4, pp. 755-761, 2011.
[2] H. Maowad & E. Shaaban, “Efficient routing protocol for Vehicular Ad hoc networks”, In the proceedings of the 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)”, pp. 209-215, IEEE, 2012.
[3] A.S.K. Pathan, “Security of self-organizing networks: MANET, WSN, WMN, VANET”, CRC press, 2016.
[4] V. Kumar, & S. Mishra, N. Chand “Applications of VANETs: Present & Future”, Communications and Networks, Vol. 5, pp. 12-13, 2013.
[5] Z.Y. Rawashdeh, & S.M. Mahmud, “Communications in Vehicular Networks”, Mobile Ad-Hoc Networks: Applications, Cap, Vol. 2, pp. 20-40, 2011.
[6] G. Kaur & P. Sharma, “Technique to Detect and Isolate Jamming Attack in VANET”, International Journal of Applied Engineering Research, Vol. 12, pp.10824-10827, 2017.
[7] X. Feng, C.Y. Li, D.X.Chen, & J. Tang, “A method for defensing against multi-source Sybil attacks in VANET”, Peer-to-Peer Networking and Applications, Vol. 10, Issue 2, pp. 305-314, 2017.
[8] S. Mittal, S. Bisht, K.C. Purohit, & A. Joshi, “Improvising-AODV routing protocol by modifying route discovery mechanism in VANET”, In the proceedings of the 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall) pp. 1-5, IEEE, 2017.
[9] A. Ashtaiwi, & A. Saoud, “Performance comparison of position based routing protocols for VANETs”, In the proceedings of the International Conference on an Internet of Things, Embedded Systems and Communications (IINTEC), pp. 78-84. IEEE, 2017.
[10] A.K. Sharma, S.K. Saroj, S. K. Chauhan, & S.K. Saini, “Sybil attack prevention and detection in vehicular ad hoc network”, In the proceedings of the International Conference on Computing, Communication and Automation (ICCCA), pp. 594-599, IEEE, 2016.
[11] B. Paul, M. Ibrahim, M. Bikas & A. Naser “VANET routing protocols: Pros and cons”, Internation Journal of Computer Applications, Vol. 20, April 2011.
[12] F. Li, & Y. Wang, “Routing in vehicular ad hoc networks: A survey”, IEEE Vehicular technology magazine, Vol. 2 Issue 2, 2007.
[13] C. Perkins, E. Belding-Royer, S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, 2003.
[14] J. Zhao, G. Cao, “VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 57, Issue 3, pp. 1910-1922, 2008.
[15] B. Karp, H.T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks”, In Mobile Computing and Networking, pp. 243-254, 2000.
[16] C. Lochert, M. Mauve, H. Fussler, & H. Hartenstein, “Geographic routing in city scenarios”, SIGMOBILE Mob. Comput. Commun. Rev., Vol. 9, pp. 69–72, 2005.
[17] Y.J. Zhu, Y.Q. Li, Q.G. Fan, & Z. Wang, “Ad hoc on-demand Distance Vector Routing Protocol Based on Load Balance”, In the proceedings of the MATEC Web of Conferences in EDP Sciences, Vol. 44, pp. 02090, 2016.
[18] Y. Shi, & R.C. Eberhart, “Empirical study of particle swarm optimization”, In the proceedings of the 1999 congress on Evolutionary computation, CEC 99., Vol. 3, pp. 1945-1950, IEEE, 1999.
[19] A. Tarique, & H.A. Gabbar, “Particle swarm optimization (PSO) based turbine control”, Intelligent Control and Automation, Vol. 4, pp. 126-137, 2013.
Citation
Paramjeet Kaur, Shelly, "Performance Enhancement in VANET using Balance Vector Protocol and Nature Swarm Algorithm," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1046-1052, 2019.
Image Analysis and Classification of Flower Using Machine Learning Algorithm for Creating Organic Color
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.1053-1058, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10531058
Abstract
This paper presents a mechanism for flower species identification using machine learning’s regression algorithm. The main objective behind this proposed approach is to utilize flowers and garlands contributing towards the waste management of temples in rural as well as urban areas. The proposed approach provides both social and environmental aspect as the waste flowers can be used for vermicomposting to improve the quality of soil as well as the other types of flowers and can be used for creating organic colour and dyes.
Key-Words / Index Term
Flower Species Identification, Machine Learning Algorithm, Regression Algorithm.
References
[1] Rattan S.S. “Thoery of Machines”, 3rd Edition, Mc Graw Hill pp.234-238, 2009.
[2] Goldy Katal, Saahil Gupta, Shitij Kakkar, “Design And Operation Of Synchronized Robotic Arm”, International Journal of Research in Engineering and Technology, Volume: 02 Issue: 08, Aug-2013.
[3] Szabo R.; Lie I. “Automated colored object sorting application for robotic arms” Electronics and Telecommunications (ISETC) 2012 10th International Symposium on vol. no. pp.95 98 15-16 Nov. 2012.
[4] T. P. Tho, N. T. Thinh and N. H. Bich, “Design and Development of the Vision Sorting System”, International Conference on Green Technology and Sustainable Development (GTSD), Kaohsiung. 2016.
[5] Yeow Khang Yung, ‟Color Sorting System with Robot Arm’’ Faculty of Electronic and Computer Engineering University Technical Malaysia Melaka, (2011).
6] P. P. Chavan, S. M. Kale, P. P. Gaikwad and S. M. Ghadge, “Intelligent Object Sorting Insolent System”. International Conference on Pervasive Computing (ICPC), Pune. 2015.
[7] V. Pereira, V. A. Fernandes and J. Sequeira, “Low cost object sorting robotic arm using Raspberry Pi”. IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS), Trivandrum. 2014.
[8] Rafael C. Gonzalez and Richard E. Woos, “Digital Image Processing”, third edition vol.3. 2003
Citation
Rupesh Bante, Dipak Nakhate, Praful Gade, Saurabh Tagde, Swati Dixit, Gopal Sakarkar, Sofia Pillai, "Image Analysis and Classification of Flower Using Machine Learning Algorithm for Creating Organic Color," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1053-1058, 2019.
Prevention of Alzheimer’s Disease using Decision tree and Association rule mining Algorithms
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1059-1064, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10591064
Abstract
Early diagnosis of Alzheimer’s Disease is important for the progress of more predominant treatments. Machine learning (ML), a branch of artificial intelligence, provides a variety of probabilistic and upsurge techniques that permits PCs to gain from vast and complex datasets. As a result, researchers concentrate on using machine learning often for diagnosis of early stages of Alzheimer’s Disease. This paper represents a review, analysis and critical evaluation of the recent work done for the early detection of Alzheimer’s Disease using Machine Learning techniques. Several methods achieved promising prediction accuracies, however they were calculated on different pathologically unproven data sets from different imaging modalities making it difficult to compare among them. Moreover, many other factors such as pre-processing, the number of important attributes for feature selection, class imbalance distinctively affect the computation of the prediction accuracy. To overcome these flaws, a model is proposed which comprise of initial pre-processing step followed by imperative attributes selection and classification is achieved using association rule mining. Furthermore, this proposed model-based approach gives the right path for research in early diagnosis of AD and has the potential to distinguish AD from healthy controls.
Key-Words / Index Term
Alzheimer’s, Mental Disorder, Association Rule Mining
References
[1]https://searchbusinessanalytics.techtarget.com/definition/asso ciation-rules-in-data-mining, Accessed on 15/11/2018 at 2:28 P.M
[2]https://medium.com/@enjalot/machine-learning-for-visualization-927a9dff1cabaccessed on 14/01/2019 at 04:59 PM.
[3]https://en.wikipedia.org/wiki/Machine_learning, accessed on 12/09/2018 at 5:20 P.M.
[4]Early diagnosis of Alzheimer`s disease using machine learning techniques: A review paper”, IEEE, August 2016.
[5]Chenhui Hu , Ronghui Ju , Yusong Shen , Pan Zhou , Quanzheng Li, Chenhui Hu , Ronghui Ju Yusong Shen , Pan Zhou. & Quanzheng Li “Clinical decision support for Alzheimer`s disease based on deep learning and brain network”, IEEE explore, July 2016.
[6] Authors-Ranjan Duara; Malek Adjouadi, Chen Fang ; Chunfei Li ; Mercedes Cabrerizo ; Armando Barreto ; Jean Andrian ; David Loewenstein A Novel Gaussian Discriminant Analysis-based Computer Aided Diagnosis System for Screening Different Stages of Alzheimer`s Disease, Published in: 2018 2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE); Conference Location: Washington DC, USA.
[7] https://en.wikipedia.org/wiki/Association_rule_learningaccess ed on 16/01/2019 at 01:12 PM.
[8] https://en.wikipedia.org/wiki/Visualization, accessed on 17/01/2019 at 05:01 PM
[9] https://skymind.ai/wiki/machine-learning-algorithmsaccessed on 18/01/2019 at 03:55PM
[10] https://www.medgadget.com/2017/12/future-scope-of-alzheimers-disease-diagnostic-market-which-is-expected-to-grow-at-a-cagr-of-10-top-key-players-profile-forecast-to-2022.html, accessed on 09/01/2019 at 04:30 PM.
[11] https://alzheimerscareresourcecenter.com/2018-alzheimers-disease-facts-figures-report, accessed on 09/01/2019 at 04:43 PM.
Citation
Yash Shetty, Linda John, Vikrant Patil, "Prevention of Alzheimer’s Disease using Decision tree and Association rule mining Algorithms," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1059-1064, 2019.
A Survey on Author Profiling Techniques
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.1065-1069, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10651069
Abstract
In this information age, Internet is growing exponentially with large amount of information through social media networks like Facebook, Blogs, Twitter, LinkedIn, etc. Most of the text we have seen in Internet are anonymous in nature. Analysis of such kind of text became crucial nowadays. Author Profiling is a technique which is used to analyse the anonymous text in Internet for finding out the characteristics of author like age, gender, country, native language, educational background etc. Style of writing of each author is utilized for the analysis of different characteristics of author’s profile. Researchers experimented with different types of features to improve the accuracy of prediction. The final accuracy of prediction depends on the feature which is extracted and on the machine learning algorithm used for prediction. The various application domains of author profiling are forensics, security, marketing and education. In this paper the various author profiling approaches and techniques are explained and their performances are analysed.
Key-Words / Index Term
Author Profiling, Stylometric Features, Machine Learning Algorithms, Features, Accuracy
References
[1] Braja Gopal Patra, Kumar Gourav Das, and Dipankar Das, “Multimodal Author Profiling for Twitter,” Notebook for PAN at CLEF, 2018.
[2] Raju.Nadimpalli.V. G, Gopala Krishna. P, Yelleni Mounica, V Sahithi,” Authorship Profiling in Gender Identification on English editorial documents using Machine Learning Algorithms” International Journal of Engineering Trends and Technology (IJETT), April 2017.
[3] Dang Duc Pham, Giang Binh Tran, Son Bao Pham, “Author Profiling for Vietnamese Blogs”, International Conference on Asian Languages Processing, 2009.
[4] Roy Bayot, Teresa Goncalves, “Multilingual Author Profiling using Word Embedding Averages and SVMs”, 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA),2016.
[5] Satya Sri Yatam, T. Raghunatha Reddy, “Predicting Gender and Age from Blogs, Reviews & Social media”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181, Vol. 3 Issue 12, December-2014.
[6] K Santosh, Romil Bansal, Mihir Shekhar, and Vasudeva Varma, “Author Profiling: Predicting Age and Gender from Blogs”, Notebook for PAN at CLEF, 2013.
[7] Yaritza Adame-Arcia, Daniel Castro-Castro, Reynier Ortega Bueno, Rafael Muñoz, “Author Profiling, instance-based Similarity Classification”, Notebook for PAN at CLEF ,2017.
[8] Ma. Jos ́e Garciarena Ucelay, Ma. Paula Villegas, Dario G. Funez, Leticia C. Cagnina1, Marcelo L. Errecalde, Gabriela Ram ́ırez-de-la-Rosa, and Esa ́u Villatoro-Tello,” Profile-based Approach for Age and Gender Identification”, Notebook for PAN at CLEF 2016.
[9] T. Raghunadha Reddy, B. Vishnu Vardhan, P. Vijayapal Reddy, “A Survey on Authorship Profiling Techniques”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 5 (2016) pp 3092-3102, 2016
[10] Miguel A. Álvarez-Carmona, A. Pastor López-Monroy, Manuel Montes-y-Gómez, Luis Villaseñor-Pineda, Ivan Meza. "Chapter 13 Evaluating Topic-Based Representations for Author Profiling in Social Media", Springer Nature, 2016.
[11] Mehwish Fatima, Komal Hasan, Saba Anwar, Rao Muhammad Adeel Nawab. "Multilingual author profiling on Facebook", Information Processing & Management, 2017.
[12] T Raghunatha Reddy, B. Vishnu Vardhan, Vijayapal Reddy. "Author profile prediction using pivoted unique term normalization", Indian Journal of Science and Technology, 2016.
[13] F. Rangel, P. Rosso, M. Koppel, and E. Stamatatos, “Overview of the Author Profiling Task at PAN 2013,” in Notebook Papers of CLEF, 2013.
[14] Sumit Goswami, Sudeshna Sarkar, Mayur Rustagi, "Stylometric Analysis of Blogger’s Age and Gender", Proceedings of the Third International ICWSM Conference, 2009
Citation
Vivitha Vijayan, Sharvari Govilkar, "A Survey on Author Profiling Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1065-1069, 2019.
Color Image Segmentation using Region Growth and Merge Improved Technique
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1070-1072, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10701072
Abstract
Image segmentation is a very challenging task in digital image processing field. It is defined as the process of takeout objects from an image by dividing it into different regions where regions that depicts some information are called objects. There are different types of image segmentation algorithms. The segmentation process depends upon the type of description required for an application for which segmentation is to be performed. Hence, there is no universally accepted segmentation algorithm. This method is applied to many color images and experimental results show the effectiveness of the method.
Key-Words / Index Term
image segmentation, edge detection, smoothness, seed selection, region growing, region merging
References
[1] Chaobing Huang, Quan Liu, “Color image retrieval using edge and edge-spatial features”, Chinese Optics Letters 2006, vol.4,no. 8,pp.457-459.
[2] Luis Ugarriza, Eli saber, “Automatic Image Segmentation by Dynamic Region Growth and Multiresolution Merging” IEEE Transactions On Image Processing ,vol .18 no 10,2001
[3] J. Fan, David, K. Y. Yau, A. K. Elmagarmid. “Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing”. IEEE Transactions On Image Processing, vol.10,no.10:oct2001
[4] H.D. Cheng, X.H. Jiang, J. Wang, “Color image segmentation based on homogram thresholding and region merging”, Pattern Recognition 35 [5] (2002) 373–393.
[5] P.K. Saha, J.K. Udupa, Optimum image threshold via class uncertainty and region homogeneity, IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.23, no.7 (2001) 689–706.
[6] R. Haralick and L.Shapiro “Computer and Robot Vision”. New York:Addison-Wesley, 1992, vol. 1, pp. 28–48.
[7] T. Cover and J.Thomas, “Elements of Information Theory”. New York: Wiley, 1991.
[8] C. Chou and T. Wu, “Embedding color watermarks in color images,” EURASIP J. Appl. Signal Process., vol. 2003, no. 1, pp. 32–40, Oct.2003.
[9] Y. J. Zhang, “A survey on evaluation methods for image segmentation,” Pattern Recognit. Soc., vol. 29, no. 8, pp. 1335–1346, 1996.
[10] R. Adams, L.Bischof, “Seeded region growing”, IEEE Transactions on Pattern Analysis and Machine Intelligence 16 (6) (1994) 641–647.
[11] A.Mehnert, P.Jackway, “An improved seeded region growing algorithm”, Pattern Recognition Letters 18 (1997) 1065–1071.8–73.
Citation
A.V. Anjikar, K. Ramteke, S. Chauvan, "Color Image Segmentation using Region Growth and Merge Improved Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1070-1072, 2019.