Novel Approach for Detecting Stock Price Movements
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.191-196, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.191196
Abstract
Grounded on communication theories, we propose to use a data-mining algorithm to detect communication patterns within a company to determine if such patterns may reveal the performance of the company. Specifically, we would like to find out whether or not there exist any association relationships between the frequency of e-mail exchange of the key employees in a company and the performance of the company as reected in its stock prices. If such relationships do exist, we would also like to know whether or not the companys stock price could be accurately predicted based on the detected relationships. To detect the association relationships, a data-mining algorithm is proposed here to mine e-mail communication records and historical stock prices so that based on the detected relationship, rules that can predict changes in stock prices can be constructed. Using the data-mining algorithm and a set of publicly available Enron e-mail corpus and Enrons stock prices recorded during the same period, we discovered the existence of interesting, statistically signi_cant, association relationships in the data. In addition, we also discovered that these relationships can predict stock price movements with an average accuracy of around 80 percent. Given the increasing popularity of social networks, the mining of interesting communication patterns could provide insights into the development of many useful applications in many areas.
Key-Words / Index Term
Corporate communication, data mining, organizational, performance, stock prediction
References
[1] W. Duan, B. Gu, and A. B. Whinston, Do online reviews matter An empirical investigation of panel data, Decision Support Syst., vol. 45, no. 4, pp. 10071016, 2008.
[2] E. Vamsidhar, K. V. S. R. P. Varma, P. S. Rao, and R. Satapati, Prediction of rainfall using backpropagation neural network model, Int. J. Comput. Sci. Eng., vol. 2, no. 4, pp. 11191121, 2010.
[3] G. Miller, Social scientists wade into the tweet stream, Science, vol. 333, no. 6051, pp. 18141815, 2011.
[4] C. Hargreaves and Y. Hao, Prediction of stock performance using analytical techniques, J. Emerg. Technol. Web Intell., vol. 5, no. 2, pp. 136142, 2013.
[5] Sawant and P. M. Chawan, Study of Data Mining Techniques Used for Financial Data Analysis, Int. J. Eng. Sci. Innov. Technol., vol. 2, no. 3, pp. 503509, 2013.
[6] S. C. Nicholis and D. J. T. Sumpter, A dynamical approach to stock market uctuations, Int. J. Bifurcation Chaos, vol. 21, no. 12, pp. 35573564, 2011.
[7] M. Gahirwal and M. Vijayalakshmi, Inter time series sales forecasting, Int. J. Adv. Stud. Comput., Sci. Eng., vol. 2, no. 1, pp. 5566, 2013.
[8] [8] M. De Choudhury, H. Sundaram, A. John, and D. D. Seligmann, Can blog communication dynamics be correlated with stock market activity? in Proc. 19th ACM Conf. Hypertext Hypermedia, 2008, pp. 5560.
[9] R. Dash, R. L. Paramguru, and R. Dash, Comparative nalysis of supervised and unsupervised discretization techniques, Int. J. Adv. Sci. Technol., vol. 2, no. 3, pp.2937, 2011.
[10] J. Diesner, T. L. Frantz, and K. M. Carley, Communication networks from the Enron email corpus Its always about the people. Enron is no di_erent, School Comput. Sci., Inst. Softw. Res., Carnegie MellonUniv., Pittsburgh, PA, USA, Tech. Rep., vol. 11, no. 3, 2006. [Online]. Available: http://repository.cmu.edu/isr/46.
Citation
Asif G Sayyad, Nilesh R Wankhade, "Novel Approach for Detecting Stock Price Movements," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.191-196, 2019.
Multitask sparse Learning based Facial Expression Classification
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.197-202, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.197202
Abstract
In today’s era, Facial Expression and recognition is a very challenging and fascinating subject with regards to field of AI and pattern recognition because of developmental psychology and human machine interface. For outward appearance designing classifiers with high reliability is a significant advance in this research. This paper represents a framework for person dependent expressions by combining all types of facial recognition types of facial by means of various multiple kernel learning in Support vector machines(SVM). We contemplated the impact of MKL for learning the piece loads and observationally assess the aftereffects of six fundamental expressions with impartial expression. included. In our investigations we have joined two mainstream facial element portrayals, dlib library and Multikernel SVM with polynomial kernel. Our experimental results on the cohn-Kanade face database as well as manually included database demonstrate that this framework out performs the state-of-arts, conventional techniques and straightforward MKL based multiclass SVM for facial expression recognition.
Key-Words / Index Term
Facial Expression Recognition, Multikernel, Support Vector Machines
References
[1] Asullah Khalid Alham, Maozhen Li1, Suhel Hammoud and Hao Qi, “Evaluating Machine Learning Techniques for Automatic Image annotation,vol. 11, no. 1, january/february (2009),p.21-235.
[2] O. Marques, N. Barman, "Semi-Automatic Semantic Annotation of Images Using Machine Learning Techniques" Proc. of ISWC(2003), p. 550-565.
[3] J. Liu, B. Wang, M. Li, Z. Li, W. Y. Ma, H. Lu and S. Ma, “Dual Cross-Media Relevance Model for Image Annotation,” in Proceedings of the 15th International Conference on Multimedia(2007), p. 605 – 614.
[4] C. F. Tsai and C. Hung, “Automatically Annotating Images with Keywords: A Review of Image Annotation Systems,” Recent Patents on Computer Science (2008), vol 1, pp 55-68.
[5] Learning Multiscale Active Facial Patches for Expression Analysis Lin Zhong, Qingshan Liu, Peng Yang, Junzhou Huang, and Dimitris N. Metaxas, Senior Member, IEEE
[6] R. Datta, D. Joshi, J. Li and J. Z. Wang, “Image Retrieval: Ideas, Influences, and Trends of the New Age” ACM Computing Surveys (CSUR)(2008), vol. 40, ), p. 605 – 614.
[7] L. Cao, J. Luo, H. Kautz and T. S. Huang. “Image Annotation within the Context of Personal Photo Collections Using Hierarchical Event and Scene Models”, In (2009) IEEE Multimedia 11(2), p. 208- 219.
[8] W. Viana, J. B. Filho, J. Gensel, M. Villanova-Oliver and H. Martin, "PhotoMap: From location and time to context-aware photo Annotations", In (2008) Journal of Location Based Services 2(3), p. 211-235.
[9] M. Ames and M. Naaman, “Why We Tag: Motivations for Annotation”. In proc. CHI, ACM Press (2007), p. 971-980
[10] U. WESTERMANN and R. JAIN, "Toward a Common Event Model for Multimedia Applications", In (2007) IEEE Multimedia 14(1), p. 19-29.
[11] M. Davis, N. V. House, J. Towle, S. King, S. Ahern, C. Burgener, Perkel, M. Finn, V.Viswanathan and M. Rothenberg, “MMM2: Mobile Media Metadata for Media Sharing”, Ext. Abstracts CHI (2005), ACM Press, p. 1335-1338.
[12]Tianxia Gong, Shimiao Li and Chew Lim Tan, ”A Semantic Similarity Language Model to Improve Automatic image annotation”, In (2010) 22nd International Conference on Tools with Artificial Intelligence.
[13] Lei Ye, Philip Ogunbona and Jianqiang Wang, "Image Content Annotation Based on Visual Features” Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM`06).
[14] Yunhee Shin, Youngrae Kim and Eun Yi Kim, "Automatic textile image annotation by predicting emotional conceptsfrom visual features”. In (2010) Image and Vision Computing, p. 28.
[15] Ran Li, YaFei Zhang, Zining Lu, Jianjiang Lu and Yulong Tian, “Technique of Image Retrieval based on Multi-label Image Annotation”, In (2010) Second International Conference on MultiMedia and Information Technology.
[16] T. Jiayu, “Automatic Image Annotation and Object Detection” (2008) PhD thesis, University of Southampton, United Kingdom
[17] P. Ekman, W. V. Friesen, and J. C. Hager, Facial Action Coding System: A Technique for the Measurement of Facial Movement. Palo Alto, CA, USA: Consulting Psychologists Press, 2002.
[18] M. Bartlett, J. Hager, P. Ekman, and T. Sejnowski, “Measuring facial expressions by computer image analysis,” Psychophysiology, vol. 36, no. 2, pp. 253–263, Mar. 1999.
[19] Y. Tian, T. Kanade, and J. F. Cohn, “Recognizing action unites for facial expression analysis,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 2, pp. 97–115, Feb. 2001.
[20] M. S. Bartlett et al., “Recognizing facial expression: Machine learning and application to spontaneous behavior,” in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2. Jun. 2005, pp. 568–573.
[21] M. S. Bartlett et al., “Fully automatic facial action recognition in sponta- neous behavior,” in Proc. 7th Int. Conf. Autom. Face Gesture Recognit., Southampton, U.K., 2006, pp. 223–230.
[22] J. F. Cohn, “Foundations of human computing: Facial expression and emotion,” in Proc. Int. Conf. Multimodal Interfaces, 2006, pp. 223–238.
[23] J. F. Cohn, L. Reed, Z. Ambadar, J. Xiao, and T. Moriyama, “Automatic analysis and recognition of brow actions and head motion in spontaneous facial behavior,” in Proc. IEEE Int. Conf. Syst., Man, Cybern., 2004, pp. 610–616.
[24] B. Jiang, M. F. Valstar, and M. Pantic, “Action unit detection using sparse appearance descriptors in space-time,” in Proc. IEEE Int. Conf. Autom. Face Gesture Recognit. Workshops, Santa Barbara, CA, USA, 2011, pp. 314–321.
[25] M. F. Valstar, M. Pantic, Z. Ambadar, and J. F. Cohn, “Foundations of human computing: Facial expression and emotion,” in Proc. Int. Conf. Multimodal Interfaces, 2006, pp. 162–170.
[26] G. Guo and C. R. Dyer, “Learning from examples in the small sample case—Face expression recognition,” IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 35, no. 3, pp. 477–488, Jun. 2005.
[27] M. Lyons, J. Budynek, and S. Akamatsu, “Automatic classification of single facial images,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 21, no. 12, pp. 1357–1362, Dec. 1999.
[28] T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 971–987, Jul. 2002.
[29] C. Shan, “Smile detection by boosting pixel differences,” IEEE Trans. Image Process., vol. 21, no. 1, pp. 431–436, Jan. 2012.
[30] C. Shan, S. Gong, and P. W. McOwan, “Facial expression recognition based on local binary patterns: A comprehensive study,” Image Vis. Comput., vol. 27, no. 6, pp. 803–816, May 2009.
[31] P. Yang, Q. Liu, and D. N. Metaxas, “Exploring facial expressions with compositional features,” in Proc. Int. Conf. Comput. Vis. Pattern Recognit., San Francisco, CA, USA, 2010, pp. 2638–2644.
[32] Z. Zeng, M. Pantic, G. I. Roisman, and T. S. Huang, “A survey of affect recognition methods: Audio, visual and spontaneous expressions,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 1, pp. 39–58, Jan. 2009.
[33] Y. Chang, C. Hu, R. Feris, and M. Turk, “Manifold based analysis of facial expression,” Image Vis. Comput., vol. 24, no. 6, pp. 605–614, Jun. 2006.
[34] N. Sebe et al., “Authentic facial expression analysis,” in Proc. 6th IEEE Int. Conf. Autom. Face Gesture Recognit., 2004, pp. 517–522.
[35] L. Yin, X. Wei, Y. Sun, J. Wang, and M. J. Rosato, “A 3D facial expres- sion database for facial behavior research,” in Proc. Int. Conf. Autom. Face Gesture Recognit., Southampton, U.K., 2006, pp. 211–216.
[36] Komal D. Khawale* , D. R. Dhotre “ To Recognize Human Emotions Based on Facial Expression Recognition : A Literature Survey “ International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT | Volume 2 | Issue 1
[37] Muchiri , Ismail Ateya , Gregory Wanyembi “Human Gait Indicators of Carrying a Concealed Firearm : A Skeletal Tracking and Data Mining Approach Henry “ International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018
Citation
Pratik Nimbal, Gopal Krishna Shyam, "Multitask sparse Learning based Facial Expression Classification," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.197-202, 2019.
Energy Aware Offloading in Cloud Assisted Mobile Environment
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.203-208, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.203208
Abstract
In the last one decade, the utilization of mobile technology has increased tremendously. The development in the mobile technology is leading to the innovations in the smart phones. Now, smart phones are not only used for communication but also capable to support number of complex applications, mostly requires high computational power. Although these smart phones have several resource issues related to power capacity, data transfer, storage capacity, security and limited processing power etc. Power capacity is one of the most crucial issue of the current smart phones. However, mostly mobile devices emphasize on many power management functions to save the power but the overall saving is much less than actual requirement. In this situation, Mobile Cloud Computing provides good option of task offloading where any intensive computations are migrated to the remote servers or cloud. Mobile Cloud Computing is a new network paradigm which merged the features of mobile computing and cloud computing to overcome the issues of mobile devices. It can also be a power saving paradigm which needs serious attention. Thus, this paper proposed a novel approach for energy aware task offloading for mobile cloud environment.
Key-Words / Index Term
Mobile Technology, Power Capacity, Mobile Cloud Computing, Task Offloading, Cloud Computing, Energy Aware Task Offloading
References
[1] A. Gani, H. Qi, “Research on Mobile Cloud Computing: Review, Trend and Perspectives”, Digital Information and Communication Technology and it`s Applications (DICTAP), Second International Conference, pp. 195-202, 2012.
[2] A. Gani, E. Ahmed, R. Buyya, Saeid Abolfazli, Z. Sanaei, "Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges", IEEE Communications Surveys & Tutorials, Vol. 16, Issue. 1, 2013.
[3] A.P. Miettinen, J.K. Nurminen, "Energy Efficiency of Mobile Clients in Cloud Computing", In the Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, USA, 2010.
[4] B.S. Lee, E. Leonardi, G. Goh, M. Kirchberg, V. March, Y. Gu, “μcloud: Towards a New Paradigm of Rich Mobile Applications”, Procedia Computer Science, Vol. 5, 2011, pp. 618–624.
[5] Cuervo, Eduardo, “MAUI: Making Smartphones Last Longer with Code Offload", In the Proceedings of the 8th international conference on Mobile systems, applications, and services, ACM, 2010.
[6] D. Tayade, “Mobile Cloud Computing: Issues, Security, Advantages, Trends”, International Journal of Computer Science and Information Technology, Vol. 5, pp. 6635-6639, 2014.
[7] Elgendy, A. Ibrahim, M.E. kawkagy, A. Keshk, "Improving the Performance of Mobile Applications using Cloud Computing", 9th International Conference on Informatics and Systems, IEEE, 2014.
[8] G. Badshah, J.M. Zain, M.F. Zolkipli, M. Ali, "Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey", IEEE, 2014.
[9] G.H. Forman, J. Zahorjan, “The Challenges of Mobile Computing”, IEEE Xplore Digital Library, 1994, pp. 38-47.
[10] Kumar, Karthik, Y.H. Lu, “Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?”, Computer 43.4, 2010, pp. 51-56.
[11] Liu, Leslie, R. Moulic, D. Shea, “Cloud Service Portal for Mobile Device Management”, e-Business Engineering (ICEBE), IEEE 7th International Conference on, IEEE, 2010.
[12] Liu, Xing, S. Guo, Y. Yang, “Task Offloading with Execution Cost Minimization in Heterogeneous Mobile Cloud Computing”, International Conference on Mobile Ad-Hoc and Sensor Networks, Springer, Singapore, 2017.
[13] Lordan, Francesc, R.M. Badia, “Compss-mobile: Parallel Programming for Mobile Cloud Computing”, Journal of Grid Computing 15.3, 2017, pp. 357-378.
[14] M. Ali, G. Badshah, “Mobile Cloud Computing & Mobile`s Battery Efficiency Approaches: A Review”, Journal of Theoretical and Applied Information Technology 79.1, 2015, pp. 153-175.
[15] M. Shiraz, A. Gani, S. Khan, “Energy Efficient Computational Offloading Framework for Mobile Cloud Computing”, Journal of Grid Computing 13.1, 2015, pp. 1-18.
[16] N. Arya, S. Choudhary, T. Sunil, “An Energy Efficient Task Offloading for Mobile Cloud Environment”, International Journal of Computer Science and Network, Vol. 8, Issue. 3, 2019, pp. 306-310.
[17] Paulson, L. Dailey, “Low-power chips for high-powered handhelds”, Computer 1, 2003, pp. 21-23.
[18] Rahimi, M. Reza, N. Venkatasubramanian, A.V. Vasilakos, “MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing”, IEEE Sixth International Conference on Cloud Computing, 2013.
[19] Rudenko, Alexey, “Saving Portable Computer Battery Power through Remote Process Execution”, ACM SIGMOBILE Mobile Computing and Communications Review 2.1, 1998, pp. 19-26.
[20] S. Kathuria, “A Survey on Security Provided by Multi-Clouds in Cloud Computing”, International Journal of Scientific Research in Network Security and Communication, Vol. 6, Issue. 1, pp. 23-27, 2018.
[21] S.M. Saad, S.C. Nandedkar, “Energy Efficient Mobile Cloud Computing”, International Journal of Computer Science and Information Technologies, Vol. 5(6), pp. 7837-7840, 2014.
[22] Saraf, D.H. Gawali, “IoT Based Smart Irrigation Monitoring and Controlling System”, Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2nd IEEE International Conference, 2017.
[23] Smailagic, Asim, M. Ettus, “System Design and Power Optimization for Mobile Computers”, VLSI, Proceedings of IEEE, Computer Society Annual Symposium on IEEE, 2002.
[24] V.S. Varnika, “Cloud Computing Advantages and Challenges for Developing Nations”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol. 6, Issue. 3, pp. 51-55, 2018.
[25] Wu, Huijun, D. Huang, “Modeling Multi-Factor Multi-Site Risk-based Offloading for Mobile Cloud Computing”, 10th International Conference on Network and Service Management and Workshop, IEEE, 2014.
[26] Y.G. Patil, P.S. Deshmukh, “A Review: Mobile Cloud Computing: Its Challenges and Security”, International Journal of Scientific Research in Network Security and Communication, Vol. 6, Issue. 1, pp. 11-13, 2018.
Citation
Nancy Arya, Sunita Choudhary, S. Taruna, "Energy Aware Offloading in Cloud Assisted Mobile Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.203-208, 2019.
Review and comparison of Mobile Agent Itinerary Planning Algorithms in WSN
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.209-219, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.209219
Abstract
Wireless sensor networks used the idea of mobile agent to reduce load on network and less energy consumption in comparison to client server based models and obtain effective data gathering. To alleviate the problem of significantly increased latency, data crowding and increased energy consumption in wireless sensor networks, mobile agents (MA) have been proved as the credible substitute to the basic client- server data gathering model. Particularly, in data gathering based on mobile agents, it is very essential to discover the optimal itinerary for the mobile agent dispatched by the sink. In this paper, the existing Mobile Agent based algorithms have been reviewed to address the issues related to data gathering. More significantly, the review showed the advantages and disadvantages of different algorithms and eventually it has also been noted that most of the planning approaches has not considered the security of the collected data by the mobile agent and authentication of the sensor nodes.
Key-Words / Index Term
Data Gathering, Mobile Agent, Mobile Agent Itinerary, Wireless Sensor Networks, Sensor nodes
References
[1] I.F. Akyidiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless Sensor Network: A survey,” computer networks, Vol 3.38, March 2002.
[2] Hande Alemdar, Cem Ersoy, “Wireless sensor networks for healthcare: A survey,” Elsevier Computer Networks Journal, 2010.
[3] Cheng CT, Chi Kong Tse and Lau F. “A delay-aware data collection network structure for wireless sensor networks”. IEEE Sens J 2011.
[4] Dhawan H and Waraich S. “A comparative study on leach routing protocol and its variants in wireless sensor networks: a survey”, Int J Comput Appl 2014; 95(8).
[5] K. Akkaya, M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks”, Elsevier Ad Hoc Network Journal, 2005.
[6] Venetis IE, Pantziou G, Gavalas D, et al. “Benchmarking mobile agent itinerary planning algorithms for data aggregation on WSNs”, (ICUFN), China, 8–11 July 2014.
[7] Imene Aloui, Okba Kazar, Laid Kahloul, Sylvie Servigne, “A new Itinerary Planning Approach Among Multiple Mobile Agents in Wireless Sensor Networks (WSN) to Reduce Energy Consumption”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7, August 2015
[8] Konstantopoulos C, Mpitziopoulos A, Gavalas D, Pantziou G. “Effective determination of mobile agent itineraries for data aggregation on sensor networks. IEEE Transaction Knowledge Data Eng 2010; 1679–93.
[9] H. Qi and F. Wang, ``Optimal itinerary analysis for mobile agents in ad hoc wireless sensor networks,`` Proc. IEEE, vol. 18, pp. 147_153, Jul. 2001.
[10] M. Bendjima and M. Feham, ``Multi mobile agent itinerary for wireless sensor networks,`` Int. J. Emerg. Trends Technol. Comput. Sci., vol. 1, pp. 6_11, 2012.
[11] Govind P. Gupta, Manoj Misra, Kumkum Garg, “Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks”, Journal of Network and Computer Applications (2014)300–311.
[12] Chen M, Yang L, Kwon T, Zhou L, Jo M. “Itinerary planning for energy-efficient agent communication in wireless sensor networks”. IEEE Trans Veh Techno l 2011:1–11.
[13] Min Chen, Taekyoung Kwon, Yong Yuan, and Victor C.M. Leung. Mobile agent based wireless sensor networks. Journal of computers, 14–21, April 2006.
[14] Qi H, Wang F. “Optimal itinerary analysis for mobile agents in adhoc wireless sensor networks.” Proceedings of 13th international conference on wireless communications, Canada; 2001. p.147–53.
[15] M. Chen, T. Kwon, Y. Yuan, Y. Choi and V. C. M. Leung, “Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks”. EURASIP Journal on Advances in Signal Processing, 2006.
[16] Wu Q, Rao NSV, Barhen J, Iyenger S, Vaishnavi VK, Qi H, “On computing mobile agent routes for data fusion in distributed sensor networks”. IEEE Trans Knowledge Data Eng 2004.
[17] Ioannis E. Venetis, Damianos Gavalas, Grammati Pantziou and Charalampos Konstantopoulos, “Mobile Agents‐Based Data Aggregation in WSNs: Benchmarking Itinerary Planning Approaches”, Article in Wireless Networks, February 2017
[18] X. Wang, M. Chen, T. Kwon, & H.C. Chao, "Multiple mobile agents` itinerary planning in wireless sensor networks: survey and evaluation", IET Commun, Vol. 5, 2011, pp. 1769 -1776.
[19] Chen M., Gonzlez S., Zhang Y., Leung V.C.: ‘Multi-agent itinerary planning for sensor networks’. Proc. IEEE 2009 Int. Conf. Heterogeneous Networking for Quality, Reliability, Security and Robustness, Spain,
[20] Chen M., Cai W., Gonzalez S., Leung V.C.: ‘Balanced itinerary planning for multiple mobile agents in wireless sensor networks’. Proc. Second Int. Conf. Ad Hoc Networks, Canada, 2010
[21] Cai W., Chen M., Hara T., Shu L.: ‘GA-MIP: genetic algorithm based multiple mobile agents itinerary planning in wireless sensor network’. Proc. Fifth Int. Wireless Internet Conf. (WICON), Singapore, 2010.
[22] Huthiafa Q Qadori, Zuriati A Zulkarnain, Zurina Mohd Hanapi and Shamala Subramaniam, “Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper”, International Journal of Distributed Sensor Networks 2017.
[23] Vukasinovic I, Babovic Z and Rakocevic O, “A survey on the use of mobile agents in wireless sensor networks.” In: 2012 IEEE international conference on industrial technology (ICIT), Athens, 19–21 March 2012.
[24] Lingaraj.K, Aradhana.D, “A survey on mobile agent itinerary planning in Wireless sensor networks”, International Journal of Computer & Communication Technology ISSN (PRINT): 0975 - 7449, 2012.
[25] Mpitziopoulos A, Gavalas D, Konstantopoulos C, “Deriving efficient mobile agent routes in wireless sensor networks with NOID algorithm” In: IEEE 18th international symposium on personal, indoor and mobile radio communications, Athens, 3–7 September 2007.
[26] Gavalas D, Pantziou G, Konstantopoulos C, “New techniques for incremental data fusion in distributed sensor networks”, In: Proceedings of the 11th Panhellenic conference on informatics, Patras, 18–20 May 2007.
[27] Chen M, Gonzalez S, Zhang Y, “Multi-agent itinerary planning for wireless sensor networks”, In. (eds) Quality of service in heterogeneous networks, 2009.
[28] Cai W, Chen M, Wang X, “Angle gap (AG) based grouping algorithm for multi-mobile agents itinerary planning in wireless sensor networks.” In: Proceedings of Symposium of the Korean Institute of communications and Information Sciences, Seoul, Republic of Korea, 2009.
[29] Wang J, Zhang Y, Cheng Z, “EMIP: energy efficient itinerary planning for multiple mobile agents in wireless sensor network”. Telecomm System 2015.
Citation
Shivani Chaudhary, Umesh Kumar, Mohit Gambhir, "Review and comparison of Mobile Agent Itinerary Planning Algorithms in WSN," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.209-219, 2019.
Performance Analysis of Massive MIMO System over FDD based Channel Estimation Technique
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.220-224, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.220224
Abstract
The most recent ten years have seen an enormous development in the quantity of associated remote gadgets. In the meantime, every gadget needs a high throughput to help applications, for example, voice, constant video, motion pictures, and diversions. What`s more, there is a developing worry about vitality utilization of remote correspondence frameworks. In this manner, future remote frameworks need to fulfill three principle prerequisites: I) having a high throughput; ii) at the same time serving numerous clients; and iii) having less vitality utilization. Enormous different info various yield (MIMO) innovation, where a base station (BS) outfitted with huge number of reception apparatuses (gathered or disseminated) serves numerous clients in a similar time-recurrence asset, can meet the above prerequisites, and subsequently, it is a promising applicant innovation for next ages of remote frameworks. This paper is concentrated of Spread range framework used to defeat multipath engendering issues, to know its impact against blurring condition the presentation of spread range correspondence framework is tried under blurring channel condition.
Key-Words / Index Term
Massive MIMO, TDD, FDD
References
[1] Xianyu Zhang, Daoxing Guo, and Kefeng Guo, “Secure Performance Analysis for Multi-pair AF Relaying Massive MIMO Systems in Ricean Channels”, IEEE Truncation 2018.
[2] D. Kudathanthirige and G. A. A. Baduge, “Massive MIMO configurations for multi-cell multi-user relay networks,” IEEE Transaction Wireless Communication, vol. 17, no. 3, pp. 1849-1868, Mar. 2018.
[3] E. Björnson, E. G. Larsson and T. L. Marzetta, “Massive MIMO: ten myths and one critical question,” IEEE Communication Mag., vol. 54, no. 2, pp. 114- 123, Feb. 2016.
[4] D. Wang, B. Bai, W. Chen, and Z. Han, “Achieving high energy efficiency and physical-layer security in AF relaying,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 740-752, Jan. 2016.
[5] Mawlawi, B., Dore, J.B., Berg, V. “Optimizing contention based access methods for FBMC waveforms, Int. Conf. on Military Commun. and Information Systems,” Cracow, Poland, May 2015, pp.1-6.
[6] P. Siohan, C. Siclet, and N. Lacaille, “Analysis and design of OFDM/OQAM systems based on filter bank theory,” IEEE Trans. Signal Process., vol. 50, no. 5, pp. 1170–1183, May 2002.
[7] B. Farhang-Boroujeny, ”OFDM Versus Filter Bank Multicarrier”, IEEE Signal Processing Magazine, vol. 28, pp. 92-112, May 2011.
Citation
Srishti Dwivedi, Anubhuti Khare, "Performance Analysis of Massive MIMO System over FDD based Channel Estimation Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.220-224, 2019.
High Quality Color Image Compression using DWT and Multi-level Block Partition Encoding-Decoding Technique
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.225-229, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.225229
Abstract
Text and image data are important elements for information processing almost in all the computer applications. Uncompressed image or text data require high transmission bandwidth and significant storage capacity. Designing and compression scheme is more critical with the recent growth of computer applications. Among the various spatial domain image compression techniques, multi-level Block partition Coding (ML-BTC) is one of the best methods which has the least computational complexity. The parameters such as Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are measured and it is found that the implemented methods of BTC are superior to the traditional BTC. This paves the way for a nearly error free and compressed transmission of the images through the communication channel.
Key-Words / Index Term
Multi-level Block Truncation Code (ML-BTC), Bit Map, Multi-level Quantization (MLQ), Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE)
References
[1] Shuyuan Zhu, Zhiying He, Xiandong Meng, Jiantao Zhou and Bing Zeng, “Compression-dependent Transform Domain Downward Conversion for Block-based Image Coding”, IEEE Transactions on Image Processing, Volume: 27, Issue: 6, June 2018.
[2] Julio Cesar Stacchini de Souza, Tatiana Mariano Lessa Assis, and Bikash Chandra Pal, “Data Compression in Smart Distribution Systems via Singular Value Decomposition”, IEEE Transactions on Smart Grid, Vol. 8, NO. 1, January 2017.
[3] Sunwoong Kim and Hyuk-Jae Lee, “RGBW Image Compression by Low-Complexity Adaptive Multi-Level Block Truncation Coding”, IEEE Transactions on Consumer Electronics, Vol. 62, No. 4, November 2016.
[4] C. Senthil kumar, “Color and Multispectral Image Compression using Enhanced Block Truncation Coding [E-BTC] Scheme”, accepted to be presented at the IEEE WiSPNET, PP. 01-06, 2016 IEEE.
[5] Jing-Ming Guo, Senior Member, IEEE, and Yun-Fu Liu, Member, IEEE, “Improved Block Truncation Coding Using Optimized Dot Diffusion”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 3, MARCH 2014.
[6] Jayamol Mathews, Madhu S. Nair, “Modified BTC Algorithm for Gray Scale Images using max-min Quantizer”, 978-1-4673-5090-7/13/$31.00 ©2013 IEEE.
[7] Ki-Won Oh and Kang-Sun Choi, “Parallel Implementation of Hybrid Vector Quantizerbased Block Truncation Coding for Mobile Display Stream Compression”, IEEE ISCE 2014 1569954165.
[8] Seddeq E. Ghrare and Ahmed R. Khobaiz, “Digital Image Compression using Block Truncation
Coding and Walsh Hadamard Transform Hybrid Technique”, 2014 IEEE 2014 International Conference on Computer, Communication, and Control Technology (I4CT 2014), September 2 - 4, 2014 - Langkawi, Kedah, Malaysia.
[9] M. Brunig and W. Niehsen. Fast full search block matching. IEEE Transactions on Circuits and Systems for Video Technology, 11:241 – 247, 2001.
[10] K. W. Chan and K. L. Chan. Optimisation of multi-level block truncation coding. Signal Processing: Image Communication, 16:445 – 459, 2001.
[11] C. C. Chang and T. S. Chen. New tree-structured vector quantization with closed-coupled multipath searching method. Optical Engineering, 36:1713 – 1720, 1997.
Citation
Manjusha Gulabrao Kulthe, Priyanka Jaiswal, Bharti Chourasia, "High Quality Color Image Compression using DWT and Multi-level Block Partition Encoding-Decoding Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.225-229, 2019.
Survey of Color Image Compression using Block Partition and DWT Technique
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.230-234, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.230234
Abstract
In the present era of multimedia, the requirement of image/video storage and transmission for video conferencing, image and video retrieval, video playback, etc. are increasing exponentially. As a result, the need for better compression technology is always in demand. Modern applications, in addition to high compression ratio, also demand for efficient encoding and decoding processes, so that computational constraint of many real-time applications is satisfied. Two widely used spatial domain compression techniques are discrete wavelet transform and multi-level block truncation coding (BTC). DWT method is used to stationary and non-stationary images and applied to all average pixel value of image. Muli-level BTC is a type of lossy image compression technique for greyscale images. It divides the original images into blocks and then uses a quantizer to reduce the number of grey levels in each block whilst maintaining the same mean and standard deviation. In this paper is studied of Multi-level BTC and DWT technique for for gray and color image.
Key-Words / Index Term
Discrete Wavelet Transform, Multi-level, Block Truncation Code (BTC), PSNR MSE, Compression Ratio
References
[1] Shuyuan Zhu, Zhiying He, Xiandong Meng, Jiantao Zhou and Bing Zeng, “Compression-dependent Transform Domain Downward Conversion for Block-based Image Coding”, IEEE Transactions on Image Processing, Volume: 27, Issue: 6, June 2018.
[2] Julio Cesar Stacchini de Souza, Tatiana Mariano Lessa Assis, and Bikash Chandra Pal, “Data Compression in Smart Distribution Systems via Singular Value Decomposition”, IEEE Transactions on Smart Grid, Vol. 8, NO. 1, January 2017.
[3] Sunwoong Kim and Hyuk-Jae Lee, “RGBW Image Compression by Low-Complexity Adaptive Multi-Level Block Truncation Coding”, IEEE Transactions on Consumer Electronics, Vol. 62, No. 4, November 2016.
[4] C. Senthil kumar, “Color and Multispectral Image Compression using Enhanced Block Truncation Coding [E-BTC] Scheme”, accepted to be presented at the IEEE WiSPNET, PP. 01-06, 2016 IEEE.
[5] Jing-Ming Guo, Senior Member, IEEE, and Yun-Fu Liu, Member, IEEE, “Improved Block Truncation Coding Using Optimized Dot Diffusion”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 3, MARCH 2014.
[6] Jayamol Mathews, Madhu S. Nair, “Modified BTC Algorithm for Gray Scale Images using max-min Quantizer”, 978-1-4673-5090-7/13/$31.00 ©2013 IEEE.
[7] Ki-Won Oh and Kang-Sun Choi, “Parallel Implementation of Hybrid Vector Quantizerbased Block Truncation Coding for Mobile Display Stream Compression”, IEEE ISCE 2014 1569954165.
[8] Seddeq E. Ghrare and Ahmed R. Khobaiz, “Digital Image Compression using Block Truncation
Coding and Walsh Hadamard Transform Hybrid Technique”, 2014 IEEE 2014 International Conference on Computer, Communication, and Control Technology (I4CT 2014), September 2 - 4, 2014 - Langkawi, Kedah, Malaysia.
[9] M. Brunig and W. Niehsen. Fast full search block matching. IEEE Transactions on Circuits and Systems for Video Technology, 11:241 – 247, 2001.
[10] K. W. Chan and K. L. Chan. Optimisation of multi-level block truncation coding. Signal Processing: Image Communication, 16:445 – 459, 2001.
[11] C. C. Chang and T. S. Chen. New tree-structured vector quantization with closed-coupled multipath searching method. Optical Engineering, 36:1713 – 1720, 1997.
Citation
Manjusha Gulabrao Kulthe, Priyanka Jaiswal, Bharti Chourasia, "Survey of Color Image Compression using Block Partition and DWT Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.230-234, 2019.
Survey on Handover techniques in VANETs
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.235-248, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.235248
Abstract
The ITS (intelligent transport system) is working on designing intelligent vehicles with the help of Vehicular Adhoc Networks (VANETs). The motivation behind the VANETs is to provide a safe journey to the passenger by avoiding hazardous situations on the road like accidents and to provide communication between the vehicles on the move in order to transfer different types of messages, be it emergency or infotainment messages. VANETs consists of V2V (vehicle-to-vehicle), V2I (vehicle-to-infrastructure) and hybrid communication with unique features like Rapidly Changing Network Topology, Unbounded Network Size, Delay-sensitive Data Exchange, Potential Support from Infrastructure which makes it different from the other adhoc networks like MANETs. Due to these features the routing protocols used for other adhoc networks cannot be directly used for VANETs. Various new modified routing protocols are designed for VANETs. In this paper we will be discussing a little about the routing protocols for VANETs, covering almost all the major protocols being used in VANETs. The major issue which we are dealing in this paper is handover. Handover is a technique for mobility management in fast changing VANET which makes it important topic for research, since mobility management is always been a major issue in adhoc networks. There is a good amount of research information available on the mobility management for adhoc networks and for VANETs but we have not found much information about handover in VANETs. So in this paper, we have discussed about different handover techniques used for VANETs and improvements in those techniques from time to time. We have covered almost all the handover strategies and improvements made in them in the past one decade. We have represented all the handover techniques in a tabular form based on the different characteristics and features. In the end we have also given the scope which will help future researchers in their research. The paper is going to be a help to the researchers new in the field.
Key-Words / Index Term
V2V, V2I, DAD, RA, RSU, proactive, reactive, hybrid, unicast, multicast
References
[1]. K. Zhu, D. Niyato, P. Wang, E. Hossain, D.I. Kim, “Mobility and handoff management in vehicular networks: a survey”, Wireless Communications and Mobile Computing (2009).
[2]. Surmukh Singh, Sunil Agrawal , “VANET Routing Protocols: Issues and Challenges”, IEEE (2014)
[3]. Shivani Rana, Swati Rana, Kamlesh C. Purohit, “A Review of Various Routing Protocols in VANET”, International Journal of Computer Applications (0975 – 8887)
[4]. J. Dias, A. Cardote, F. Neves, S. Sargento, and A. Oliveira. “Seamless horizontal and vertical mobility in vanet”, Vehicular Networking Conference (VNC), 2012 IEEE, pages 226–233, Nov 2012.
[5]. Montavont N, Noel T, “Handover management for mobile nodes in ipv6 networks”, IEEE Communications Magazine 2002; 40(8): 38–43.
[6]. Choi S, Hwang G, Kwon T, Lim AR, Cho DH., “Fast handover scheme for real-time downlink services in ieee 802.16e bwa system”, In Proceedings of IEEE VTC 2005-Spring, 2005; 3: 2028–2032.
[7]. Koodli R. “Fast Handovers for Mobile IPv6”. RFC 4068, Jul 2005.
[8]. Song Jian, Zhang Bao-jie, Sun Wei, Che Rong and Yu Yong, “An Improved Fast Handover algorithm based on HMIPv6”, International multi-conference on computing in global IT, IEEE,2007.
[9]. Koh SJ, Chang MJ, Lee M., “Msctp for soft handover in transport layer”, IEEE Communications Letters 2004; 8(3):189–191.
[10]. Han YH, Jang H, Choi JH, Park BJ, McNair J, “A cross-layering design for ipv6 fast handover support in an ieee802.16e wireless man”, IEEE Network 2007; 21(6): 54–62.
[11]. Petander H, Perera E, Lan KC, Seneviratne A, “Measuring and improving the performance of network mobility management in ipv6 networks”, IEEE Journal on Selected Areas in Communications 2006; 24(9):1671–1681.
[12]. Chiang WK, Chang WY and Liu LY, “Simultaneous Handover support for Mobile Networks on Vehicles”, In Proceedings of IEEE WCNC, 2008, 2771–2776.
[13]. Car-to-Car Communication Consortium, “C2C-CC Manifesto,” Version 1.1, August 2007, available at http://www.car-to-car.org/fileadmin/ dokumente/pdf/C2C-CC manifesto 2007 09 24 v1.1.pdf.
[14]. Arindam Ghosh, Vishnu Vardhan Paranthaman, Glenford Mapp and Orhan Gemikonakli, “ Exploring efficient seamless handover in network dwell time”, EURASIP Journal on Wireless Communications and networking 2014
[15]. Yun-Wei Lin, Yuh-Shyan Chen and Sing-Ling Lee, “Routing protocols in vehicular ad hoc networks: A survey and future perspectives”, Journal of Information and Engineering 26, 913-932 (2010)
[16]. A.Bachir and A.Benslimane, “A multicast protocol in ad-hoc networks inter-vehicle geocast”, in Proceedings of IEEE Semiannual vehicular technology conference, Vol,4,2003, pp.2456-2460
[17]. T. Fukuhara, T. Warabino, T. Ohseki, K. Saito, K. Sugiyama, T. Nishida, and K. Eguchi, “Broadcast methods for inter-vehicle communications system,” in Proceedings of IEEE Wireless Communications and Networking Conference, Vol. 4, 2005, pp. 2252-2257.
[18]. Jang-Ping Sheu, Chi-Yuan Lo, and Wei-Kai Hu, “A Distributed Routing Protocol and Handover Schemes in Hybrid Vehicular Ad Hoc Networks”, in Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems, 2011, pp. 428-435
[19]. Bechler M, Wolf L, Storz O, Franz WJ, “Efficient discovery of internet gateways in future vehicular communication systems”, In Proceedings of IEEE VTC 2003-Spring 2003; 6: 965– 969.
[20]. D. Johnson, C. Perkins, and J. Arkko, Mobility support for IPv6, RFC 6275, June 2004
[21]. Yuh-Shyan Chen, Chih Shun Hsu, Wei-Han Yi, “An IP Passing Protocol for Vehicular Ad Hoc Networks with Network Fragmentations”, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011.IEEE DOI 10.1109/IMIS.2011.67
[22]. Radhwan Mohamed Abdullah and Zuriati Ahmad Zukarnain, “Enhanced Handover Decision Algorithm in Heterogeneous Wireless Network”, www.mdpi.com/journal/sensors, Sensors 2017, 17, 1626.
[23]. Kaveh Shafiee, Alireza Attar, Victor C. M. Leung, “Optimal Distributed Vertical Handoff Strategies in Vehicular Heterogeneous Networks”, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011.
[24]. Kuan-Lin Chiu, Ren-Hung Hwang, Yun- Shyan Chen, “A Cross Layer Fast Handover Scheme in VANET”, IEEE ICC 2009 proceedings, 978-1-4244-3435-0/09,2009
[25]. P. Boone, M. Barbeau, and E. Kranakis, “Strategies for fast scanning and handovers in WiMAX/802.16”, In Proc. Second International Conference on Access Networks & Workshops AccessNets ’07, pages 1–7, 22–24 Aug. 2007
[26]. J. Chen, C.-C. Wang, and J.-D. Lee, “Pre-Coordination Mechanism for Fast Handover in WiMAX Networks”, In Proc. 2nd International Conference on Wireless Broadband and Ultra Wide band Communications AusWireless 2007, pages 15–15, 27–30 Aug. 2007.
[27]. L. Chen, X. Cai, R. Sofia, and Z. Huang, “ A Cross-Layer Fast Handover Scheme For Mobile WiMAX”, In Proc. VTC-2007 Fall Vehicular Technology Conference 2007 IEEE 66th, pages 1578–1582, Sept. 30 2007–Oct. 3 2007.
[28]. J. H. Park, K.-Y. Han, and D.-H. Cho, “ Reducing Inter-Cell Handover Events based on Cell ID Information in Multi-hop Relay Systems”, In Proc. VTC2007-Spring Vehicular Technology Conference IEEE 65th, pages 743–747, 22–25 April 2007.
[29]. R. Rouil and N. Golmie, “Adaptive Channel Scanning For IEEE 802.16e”, In Proc. Military Communications MILCOM 2006, pages 1–6, 23-25 October 2006
[30]. Esposito, Flavio, “ On Modeling Speed-based Vertical Handovers in Vehicular Networks "Dad, slow down, I am watching the movie"” , Technical Report BUCS-TR-2010-032, Computer Science Department, Boston University, September 7, 2010
[31]. Siti SAbariah Salihin, Rafidah Md Noor, Liyth Ahmed Nissirat, Ismail Ahmedy,“VANET handover based on LTE-A using decision technique”, FCSIT, 2017, pp 9-17
[32]. Ftaem Shaikh, Glenford Mapp, Aboubaker Lasebae, “Proactive policy management using time before vertical handover mechanism in heterogeneous networks”, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), IEEE
[33]. Dias J, Cardote A, Neves F, Sargento S, Oliveira, “A: Seamless Horizontal and Vertical Mobility in VANET”, Vehicular Networking Conference (VNC), 2012, IEEE 2012, 226-233
[34]. Tseng C-C, Chi K-H, Hsieh M-D, Chang H, “H: Location-Based Fast Handoff for 802.11 Networks”, Commun. Lett. IEEE 2005, 9(4):304-306
[35]. Bohm A, Jonsson M, “ Handover in IEEE 802.11p-based Delay-Sensitive Vehicle-to-Infrastructure Communication”, Technical Report IDE - 0924, Halmstad University, Embedded Systems (CERES); 2009
[36]. Montavont J, Noel T, “IEEE 802.11 Handovers assisted by GPS Information”, Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob’2006). IEEE International Conference On 2006, 166-172.
[37]. Lee H, Chung Y-U, Choi Y-H, “ A seamless Handover Scheme for IEEE WAVE Networks based on multi-way Proactive Caching”, Ubiquitous and Future Networks (ICUFN) 2013 Fifth International Conference On 2013, 356-361.
[38]. Paik EK, Choi Y, “Prediction-based fast handoff for Mobile WLANs”, Telecommunications, 2003. ICT 2003. 10th International Conference On 2003, 748-7531. doi:10.1109/ICTEL.2003.
[39]. Salam T, Ali M, Fida M-R, “Seamless Proactive Vertical Handover Algorithm”, Information Technology: New Generations (ITNG) 2011 Eighth International Conference On 2011, 94-99
[40]. Pravin Wararkar, S.S. Dorle, “Vehicular adhoc networks handovers with metaheuristic algorithms”, International conference on electronic systems, signal processing and computing technologies, 2014, IEEE . pp.160-166.
[41]. Wang Xiaonan, Le Deguang, Yao Yufeng, “A cross-layer mobility handover scheme for IPv6 based vehicular networks”, International journal of electronics and communications, 2015,pp- 1514-1524
[42]. Chiang WK, Chang WY, Liu LY, “Simultaneous handover support for mobile networks on vehicles”, In Proceedings of IEEE WCNC, 2008
[43]. Kim ms, Lee SK, Golmie N, “Enhanced fast handover for proxy mobile IPv6 in VANETs”, Wireless Networks 2012,pp-401-411
[44]. Gundavelli, S., “Proxy Mobile IPv6”, RFC 5213, 2007
[45]. Yokota, H., Chowdhury, K., Koodli, R., Patil, B., & Xia, F, “Fast Handovers for PMIPv6”,December 2009 draft-ietf-mipshop-pfmipv6
[46]. Dimopoulou L, Leoleis G, Venieris IO, “Fast handover support in a wlan environment: challenges and perspectives” IEEE Network 2005; pp-14–20
[47]. Mussabbir QB, Yao WB, Niu ZY, Fu XM, “Optimized fmipv6 using IEEE 802.21 mih services in vehicular networks”, IEEE Transactions on Vehicular Technology 2007; 56(6): 3397–3407.
[48]. Kim H, Kim Y., “ An early binding fast handover for high speed mobile nodes on mipv6 over connectionless packet radio link”, In Proceedings of Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006; 237–242
[49]. Kafle VP, Kamioka E, Yamada S, “CoMoRoHo: cooperative mobile router-based handover scheme for long-vehicular multihomed networks”, IEICE Transactions on Communications 2006; pp- 2774–2784
[50]. Han YH, Choi J, Hwang SH, “Reactive handover optimization in ipv6-based mobile networks”, IEEE Journal on Selected Areas in Communications 2006; pp-1758–1772
[51]. H. Soliman, C. Castellucia, K. Elmalki, L. Bellier, "Hierarchical MIPv6 Mobility Management (HMIPV6)”. Internet draft, July 2001, drafl-ietfmobilcip-hmipv6-OS.
[52]. Indra Vivaldi, Mohd Hadi Hahaebi, Bcirhanuddin Mohd Ali, V. Prakash, “Fast Handover Algorithm for Hierarchical Mobile IPv6 macro-mobility Management”, IEEE 2003
[53]. Hyunwoo Hwang, Ju-Hyun Kim, June Sup Lee, Kyung-Geun Lee, “Fast handoff scheme using multicast group for intra-domain in PMIPv6 networks”, IEEE CCNC 2010 proceedings.
[54]. Laurence Banda, Mjumo Mzyece, Guillaume Noel, “Fast handover management in IP-based Vehicular networks”, IEEE 2013,pp-1279-1284
[55]. Hewei Yu, Meiling Zhou, “Improved handover algorithm to avoid duplication AAA authentication in PMIPv6”, IJCNC, Vol.10, No.3,2018
[56]. Jin In Kim, Seok Joo Koh, “Proxy Mobile IPv6 with partial bicasting for seamless handover in wireless networks”, IEEE 2011 pp-325-356
[57]. Amirhosein Marovejosharieh, Hero Modares, “A Proxy MIPv6 handover scheme for VANET”, Springer 2013.pp
[58]. Chen, Y. S, “Network mobility protocol for vehicular ad hoc networks”, IEEE 2009
[59]. Ruidong Li, Jie Li, Kui Wu, Yang Xiao, Jiang Xie, “ An enhanced fast handover with low latency for IPv6”, IEEE transactions on wireless communications vol.7,no1,2008
[60]. Dong cheol Shin, Sung-gi Min, “Fast handover solution using multi-tunnel in HMIPv6”, IEEE2008
[61]. SangeDae Moon, Mun-Suk Kim, Sukyoung Lee, “ Fast handover with low latency for proxy MIPv6 Vehicular networks”, ICUIMC 2011 ACM
[62]. Jong Min Lee, Myoung Ju Yu, Young Hun Yoo, and Seong Gon Choi, “A new scheme of global mobility management for inter-VANETs handover of vehicles in V2V/V2I network environments”, International conference on networked computing and advanced information management IEEE2008.pp-114- 119
Citation
Poonam Thakur, Anita Ganpati, "Survey on Handover techniques in VANETs," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.235-248, 2019.
Analytical Treatment for Solving a Class of Non Linear Fractional Differential Equations
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.249-254, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.249254
Abstract
In the present paper, generalized differential transform method is used for obtaining the approximate analytic solutions of non-linear partial differential equations of fractional order. The fractional derivatives are described in the Caputo sense.
Key-Words / Index Term
Fractional differential equations; Caputo fractional derivative; Generalized Differential transform method; Analytic solution
References
[1] J.K.Zhou,”Differential Transformation and Its Applications for Electrical Circuits”. Huazhong University Press,Wuhan, China,1986.
[2] S.Momani,Z.Odibat,V.S.Erturk,”Generalized differential Transform method for solving a space- and time-fractional diffusion-wave equation”, Physics Letters. A,Vol.370,Issue.5-6,pp.379–387,2007 .
[3] Z.Odibat,S.Momani,”A generalized differential transform method for linear partial Differential equations of fractional order”, Applied Mathematics Letters, Vol.21,Issue.2,pp.194–199,2008.
[4] Z.Odibat,S.Momani,V.S.Erturk,”Generalized differential Transform method: application to differentia equations of fractionalorder”,Applied Mathematics and Computation, Vol.197,Issue.2,pp.467–477,2008.
[5] S.Das,”Functional Fractional Calculus”, Springer,2008.
[6] K.S.Miller,B.Ross,”An Introduction to the Fractional Calculus and Fractional Diff. Equations”, John Wiley and Son,1993.
[7] M.Caputo,”Linear models of dissipation whose q is almost frequency independent-ii”, Geophys J. R. Astron. Soc,Vol.13,pp.529-539,1967.
[8] I,Podlubny,”Fractional differential equations: An introduction to fractional derivatives, fractional differential equations, to methods of their solution and some of their applications”,Academic Press,1999.
[9] R.Almeida,D.F.Torres,”Necessary and sufficient conditions for the fractional calculus of variations with caputo derivatives”, Communications in Nonlinear Science and Numerical Simulation,Vol.16,pp.1490-1500,2011.
[10] A.M.WazWaz,”Partial differential equations methods and applications”,Saint Xavier University,Chicago, Illinois, USA,2002.
Citation
Deepanjan Das, "Analytical Treatment for Solving a Class of Non Linear Fractional Differential Equations," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.249-254, 2019.
Finding the best network for laying renewable energy based solar panel roads: A GPU parallel algorithm implemented on CUDA
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.255-260, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.255260
Abstract
The objective of this paper is implementation of ACO algorithm on GPU to combat real life problems of road network identification along with an application focusing on renewable energy. GPUs are specialized microprocessors that accelerates graphics operation. Parallel processing is required when we consider a heavy code with so much of similar iterations. CUDA is NVIDIA’s architecture for parallel computing that is used for extensive parallel computing and increases the performance by employing the GPU (Graphical Processing Unit). We have Ant colony optimisation algorithm implementation that is a bit different than others. Also, we compare it with the sequential code and the results are that it is very fast as compared to sequential code. To deal with the execution of optimisation we will propose two different approaches, one will be the serial approach of the ACO algorithm to generate the network and other will be GPU / CUDA based approach. We will compare the execution time in both the cases and then find out the speed up. An applicability of this approach is for generating the best possible road network for city coordinates where we try to get the network with least cost. This is of immense applicability for developing countries where road networks are upcoming.
Key-Words / Index Term
CUDA, GPU, Parallel Processing, travelling salesman problem, Road network identification
References
[1] Akihiro Uchida, Yasuaki Ito, Koji Nakano, “An Efficient GPU Implementation of Ant Colony Optimization for the Traveling Salesman Problem”, IEEE
[2] Zhou Y, He F Z, Qiu Y M. June 2017, Vol. 60 068102:1–068102:3. SCIENCE CHINA Information Sciences
[3] Dawson, Stewart. 2013. IEEE
[4] Zhoua, Hea, Houa, Qiub . 14 october 2017. ELSEVIER , future generation computer systems
[5] Akihiro, Ito, Nakano. 2012. IEEE
[6] Ceciliaa , Llanesa, Abellána, Gómez-Lunab, Changc, Hwud .15December2017. ELSEVIER, Journal of parallel Distributed computing
[7] Dawson, Stewart. 2014. IEEE
[8] Johny and John. 25 May 2018. ELSEVIER Computer Languages,Systems & Structures
[9] Ermiş , Çatay. May 2017. Transportation Research Procedia
[10] Souza, Pozo. 2014. IEEE
[11] Patil, Pandel. March 2016. International Journal of Innovative Research in Computer and Communication Engineering
[12] Skinderowicz. 2016. ACM
[13] Papenhausen, Mueller. 25 May 2018. ELSEVIER Computer Languages,Systems & Structures
[14] Khatri, Gupta. 2014. IEEE
[15] Johny, John. March– 2017. International Journal of Recent Innovation in Engineering and Research
[16] Alimi, Bali, Elloumi, Abraham. 2017. Springer
[17] Kulkarni. May-Jun 2013. International Journal of Engineering Research and Applications
[18] Michaël Krajeck, Gravel, Delévacqa.2012.IEEE
[19] Shingate. 16 November 2017
[20] SHI, Zhi. 2012. Springer
[21] Rocki, Suda. 2013. IEEE 27th International Symposium on Parallel & Distributed Processing
[22] Zhao, Cai, Lan. 2012. International Conference
[23] Youness, Ibraheim, Moness, Osama. 2012. IEEE
[24] Diaz, caro. 2012. IEEE
[25] Jain, Vanita & Jain, Aarushi & Jain, Achin & Kumar Dubey, Arun. (2018) Comparative Study between FA, ACO, and PSO, ijsrcse
Citation
Aayush Kapur, Nirut Gupta, "Finding the best network for laying renewable energy based solar panel roads: A GPU parallel algorithm implemented on CUDA," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.255-260, 2019.