A study on Various Techniques handled for Data Aggregation Process in Wireless Sensor Network
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.235-241, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.235241
Abstract
Wireless Sensor Network (WSN) consists of many sensor nodes that are all connected to a network. In WSN we have used huge no. of applications such as Area monitoring, Smart office monitoring, Health monitoring, Forest fire detection and eic.,. The data aggregation is the main challenge in the WSN. In this paper, the survey is made on hierarchical based data transmission, Cluster based, Tree structure based, Structure Free data aggregation, layered and Grid based data aggregation and related concepts. This type of structure based data aggregation process uses various algorithms and protocols. When the data transmission speed is high, then the energy utilization is reduced, increasing the high throughput and packet delivery ratio. So, this paper it concentrates on different data aggregation process and also different algorithms are explained and compared.
Key-Words / Index Term
WSN, Structure Free, Hierarchical structure, Cluster based, Tree structure, Data aggregation
References
[1] Yuanzhu Peter Chen, Arthur L. Liestman and Jiangchuan Liu “A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Vol.55(3), pp.789-796, IEEE-2006.
[2] Ramesh Patil1, Dr.Vinayadatt and V. Kohir “ Energy Efficient Flat and Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ,Vol.11(6), PP 48-56, 2016.
[3] Prabhudutta Mohanty and Manas Ranjan Kabat “ A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks” Ain Shams Engineering Journal, pp.1141–1155, 2014.
[4] Srika Yadav and Rama Shnkar Yadav “ Energy Efficient Data Aggregation by Mobile Agents for Structure- free Wireless Sensor Networks” Advances in Computing , Control and Communication Techonology, pp.147-155,2016.
[5] Nandhini.S.Patil and P.R.Patil “Data Aggregation in Wireless Sensor Network” International Conference on Computational Intelligence and Computing Research, IEEE-2010.
[6] Manal AL-Bzoor, Laiali Almazaydeh and Syed Rizvi “Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks” International Journal of Computer Science and Security (IJCSS), Volume 5 (5) ,pp.443-455, 2011.
[7] Shangwei Duan and Xiaobu Yuan “Exploring Hierarchy Architecture for Wireless Sensor Networks Management” IEEE-2006.
[8] Kun-Hsien Lu, Shiow-Fen Hwang, Yi-Yu Su , Hsiao-Nung Chang and Chyi-Ren Dow “Hierarchical Ring-Based Data Gathering for Dense Wireless Sensor Networks” Wireless Pers Commun, pp.347-36, Springer-2010.
[9] Mikel Larrea, Cristian Mart´ın and Jos´e Javier Astrain “Hierarchical and fault-tolerant data aggregation in wireless sensor networks” pp.531-536, IEEE -2007.
[10] Ammar Hawbani, Xingfu Wang, Saleem Karmoshi, LinWang, and Naji Husaini “Sensors Grouping Hierarchy Structure for Wireless Sensor Network” International Journal of Distributed Sensor Networks, pp.1-18, 2015.
[11] Hu Yanhua and Zhang Xincai “Aggregation Tree Based Data Aggregation Algorithm in Wireless Sensor Networks” iJOE ‒ Vol.12( 6), pp.10-15, 2016.
[12] Duc Tai Le1, Taewoo Lee2 and Hyunseung Choo “Delay-aware tree construction and scheduling for data aggregation in duty-cycled wireless sensor networks” EURASIP Journal on Wireless Communications and Networking, Springer,pp1-15,(2018) .
[13] Cheng Feng, Zhijun Li, Shouxu Jiang and Weipeng Jing “Delay-constrained data aggregation Scheduling in wireless sensor networks” International Journal of Distributed Sensor Networks, Vol.13(6), pp.1-9, 2017.
[14] Elham Mohsenifard “Data Aggregation Tree Structure in Wireless Sensor Networks Using Cuckoo Optimization Algorithm” Journal of Information Systems and Telecommunication, Vol. 4, No. 3, pp.182-189, 2016.
[15] Mohammad Abdus Salam and Tanjima Ferdous “ Tree-based Data Aggregation Algorithms in Wireless Sensor Networks: A Survey” Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 – 6, pp.1995-2002,2012.
[16] Prabhudutta Mohanty and Manas Ranjan Kabat “Energy efficient structure-free data aggregation and delivery in WSN” Egyptian Informatics Journal, pp.273–284, (2016) 17.
[17] Avneet Kaur and Neeraj Sharma “IESDAD: improved energy efficient structure free data aggregation and delivery protocol in WSN” International journal of Engineering & Technology Vol.7(2.27), pp.132-137, 2018.
[17] Chih-Min Chao and Tzu-Ying Hsiao “Design of Structure-Free and Energy-Balanced Data Aggregation in Wireless Sensor Networks” 11th IEEE International Conference on High Performance Computing and Communications, pp.222-229, IEEE-2009.
[18] Hamed Yousefi a, Mohammad Hossein Yeganeh b, Naser Alinaghipour b and Ali Movaghar “Structure-free real-time data aggregation in wireless sensor networks” Computer Communications, Vol.35, pp.1132–1140, ELSEvier-2012.
[19] Kai-Wei Fan, Sha Liu, and Prasun Sinha “Structure-Free Data Aggregation in Sensor Networks” IEEE TRANSACTIONS ON MOBILE COMPUTING, Vol.6(8),pp.929-942, 2007.
[20] Chih-Min Chaoy and Tzu-Ying Hsiao “Design of Structure-Free and Energy-Balanced Data Aggregation in Wireless Sensor Networks” pp.1-26.
[21] Priti K. Hirani “ Energy-Efficiency based Clustering and Data Aggregation for Wireless Sensor Networks” International Journal of Computer Applications Volume 119(21),pp.1-4,2015.
[22] Jun Yuea, Weiming Zhang, Weidong Xiao, Daquan Tang and Jiuyang Tang “Energy Efficient and Balanced Cluster-Based Data Aggregation Algorithm for Wireless Sensor Network” International Workshop on Information and Electronics Engineering (IWIEE),pp.2009-2015, ELSEVIRE-2011.
[23] Siva Ranjani, Radha Krishnan and Thangaraj “Energy-Efficient Cluster Based Data Aggregation for Wireless Sensor Networks” 2012 International Conference on Recent Advances in Computing and Software Systems, pp.174-179, IEEE-2012.
[24] XiaoHua Xu, ShiGuang Wang, XuFei Mao, ShaoJie Tang, XiangYang Li. “A Delay Efficient Algorithm for Data Aggregation in Multi-hop Wireless Sensor Networks” Illinois Institute of Technology, pp.1-13, 2010.
[25] Mohammed Saeed and Jason Roberts “ Data Aggregation in Wireless Sensor Networks with Minimum Delay and Minimum Use of Energy: A comparative Study” Proceedings of the 2nd BCS International IT Conference, pp-1-4,2014.
[26] A.Sivagami1, K. Pavai2 and D. Sridharan “Latency Optimized Data Aggregation Timing Model for Wireless Sensor Networks” IJCSI International Journal of Computer Science Issues, Vol. 7( 3), pp.42-48, 2010.
[27] Jyoti Rajput, Naveen Garg. “Data Aggregation in Wireless Sensor Network” IEEE International Conference on Computational Intelligence and Computing Research Vol. 4(5), pp407-412, (2014).
[28] Youssef Emhemmad Mohammad Youssef and Raghav Yadav “ Survey on Several Secure Data Aggregation Schemes in WSN” International Journal of Current Engineering and Technology, Vol.6.(4), pp.1154-1159, 2016.
[29] Shahinaz M. Al-Tabbakh “Novel Technique for Data Aggregation in Wireless Sensor Networks” IEEE-2017.
[30] Prakashgoud Patill, Umakant Kulkarni “ Analysis of DataAggregation Techniques in Wireless Sensor Networks” IJCEM International Journal of Computational Engineering & Management, Vol. 16 (1),pp.22-27,2013.
[31] Sumit Chaudhary, Neha Singh, Avinav Pathak and A.K Vatsa “Energy Efficient Techniques for Data aggregation and collection in WSN” International Journal of Computer Science, Engineering and Applications (IJCSEA), Vol.2(4), pp.37-47, 2012.
[32] Yao Lu , Taihua Zhang, Erbao He and Ioan-Sorin Comşa “Self-Learning-Based Data Aggregation Scheduling Policy in Wireless Sensor Networks” Hindawi Journal of Sensors pp.1-15, 2018.
Citation
A. Indrapandi, S .Rizwana, "A study on Various Techniques handled for Data Aggregation Process in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.235-241, 2019.
Multi Channeled Peer to Peer Communication
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.242-245, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.242245
Abstract
Audio and video conferencing system have been increasing gradually due to enhancement of work productivity and deduction of expenditure. We are implementing a web-RTC based audio and video conferencing system on virtual cloud. Using this system user can experience audio and video conferencing only through web browser. Web-RTC based applications are assumed to be based mostly on peer-to-peer communication, where an instance of the application is talking to another instance. This system will also provide us with point-to-point to multipoint-to-multipoint communication, from normal image quality to high-definition image quality, from still image transmission to moving image transmission, and from one-way transmission to two-way transmission.
Key-Words / Index Term
web-RTC,cloud
References
[1] Xu Zhiqun, Chen Duan, Hu Zhiyuan, Sun Qunying, "Emerging of Telco Cloud," Communications, China, vol.10, no.6, Jun. 2013, pp.79 – 85
[2] Moreno-Vozmediano, R., Montero, R.S., Llorente, I.M., "IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures," IEEE Computer, vol.45, no.12, Dec. 2012, pp.65 – 72
[3] di Costanzo, A., de Assuncao, M.D., Buyya, R., "Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure," IEEE Computer, vol.45, no.12, Dec. 2012, pp.65 – 72
[4] N. Pandey, "Real Time Peer to Peer Communication based Social
Networking Web Application," Department of Computer Science,
California State University, Fullerton, Fullerton, 2017.
[5] J.K. Nurminen, A. J. R. Meyn, E. Jalonen, Y. Raivio, and R.G. Marrero, “P2P Media Streaming with HTML5 and WebRTC”, Proc.IEEE Conference on Computer Communications Workshops, April 14-19, Turin, pp.63-64, 2013.
[6] N. Pandey and D. Bein, "Web application for social networking using RTC," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2018, pp. 336-340.
[7] D. Prakash Rao, Dr. G. S.Bapi Raju, "Web Real-Time Communication by Controlling Congestion", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.31-38, January-February-2018.
[8] Shailja Sharma, Sheeba Khan, "Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.1, pp.13-15, 2019
Citation
M. A. Zope, Kundan Pitroda, Prashant Yadav, Pratik Patil, Suchit Kumar, "Multi Channeled Peer to Peer Communication," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.242-245, 2019.
A Primer on Blockchain Technology
Technical Paper | Journal Paper
Vol.7 , Issue.5 , pp.246-250, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.246250
Abstract
Blockchain, the foundation technology behind Bitcoin, has gotten wide attention starting late. Blockchain fills in as an immutable record where trades happen in a decentralized manner Basically, a blockchain is a database incorporating a physical chain of blocks each of which is of fixed size that incorporate many transactions, where every transaction is added to another block is approved and after that embedded into the block.. Applications of blockchain are hopping up, covering different fields including financial organizations, reputation structure and Internet of Things (IoT), food industry, cyber security and many more. This paper is an introduction on blockchain innovation covering able issue for a tyro on blockchain advancement. The paper presents a layout of blockchain building directly off the bat alongside its different applications.
Key-Words / Index Term
Blockchain, block, bitcoin, consensus, decentralized,miner
References
[1] Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, 2017, pp. 557-564.
doi: 10.1109/BigDataCongress.2017.85
[2] “State of blockchain q1 2016: Blockchain funding overtakes bitcoin,” 2016. [Online]. Available: http://www.coindesk.com/state-of-blockchain-q1-2016/
[3] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
[4] G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective,” 2015. [Online]. Available: http://dx.doi.org/10.2139/ssrn. 2646618
[5] https://mlsdev.com/blog/156-how-to-build-your-own-blockchain-architecture, accessed on 9th April 2019
[6] G. Foroglou and A.-L. Tsilidou, “Further applications of the blockchain,” 2015.
[7] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858.
[8]“Blockchain A Practical Guide to Developing Business, Law, and Technology Solutions”, Joseph J. Bambara et al. Ist edition, TataMcgraHill,2018
[9] B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy,” 2013. [Online]. Available: https://ssrn.com/abstract=2394738 [10] Y. Zhang and J. Wen, “An iot electric business model based on the protocol of bitcoin,” in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015, pp. 184–191.
[11] M. Sharples and J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward,” in Proceedings of 11th European Conference on Technology Enhanced Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490–496.
[12] C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning,” arXiv preprint arXiv:1601.01405, 2016.
[13] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 436– 454.
[14]A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin p2p network,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2014, pp. 15–29.
[15] F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
[16] NRI, “Survey on blockchain technologies and related services,” Tech. Rep., 2015. [Online]. Available: http://www.meti.go.jp/english/press/ 2016/pdf/0531 01f.pdf
Citation
Vikas Thada, Utpal Shrivastava, "A Primer on Blockchain Technology," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.246-250, 2019.
Modelling of Knowledge Based Transport Vehicle System using Reliable Software System
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.251-256, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.251256
Abstract
The technological knowledge and experiences are the key elements in designing the transportation vehicles, thereby enhancing it’s safe operations. This research paper introduces a model which can be used for developing a safe and reliable transportation system with smart vehicle design. Requirements in terms of both software implementations and vehicle design have been proposed in this research paper. Knowledge Base technique is the foundation of technical design reuse. Implementation of this technique can be relied on the software. Two distinct algorithms are used in this paper to improve upon the safety, reliability and quality of a system. The difference between the results of the algorithms would help us in concluding the best technique.
Key-Words / Index Term
Knowledge Engineering, Reliable Software, Ontology, Sensor System, Computer-aided-technology
References
[1] J. Vijaya Sagar Reddy & G. Ramesh “Failure Detection Algorithm for Testing Dynamic Web Applications Department of CSE”, International Journal of Computer & Communication Technology, Volume-5,Issue-4,pp 42-46, 2016.
[2] Gilb, Tom, "Distinct Software" ACM SIGSOFT, Software Engineering Notes, Vol. 6, No. 2, p. 17 1981
[3] Fischler, M. A., 0. Firschein, D. L. Drew “Distinct Software: An Approach to Reliable Computing” in proceeding Second USA-JAPAN Comnference, pp 573-579, 1975
[4] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998.
[5] Wang, Guoxin & Yan, Yan & Hu, Lichen & Zhang, Xiang & Wang, Lu. (2009). Construction of knowledge based engineering platform for armored vehicle. IEEM 2009 - IEEE International Conference on Industrial Engineering and Engineering Management. 10.1109/IEEM.2009.5372938. IEEM 2009
[6] Y. J. Chen, Y. M. Chen, H. C. Chu and H. Y. Kao, “On technology for functional requirement-based reference design retrieval in engineering knowledge management,” Decision Support Systems, vol. 44, no. 4, pp. 798-816, 2007.
[7] Y. J. Chen, Y. M. Chen and H. C. Chu, “Enabling collaborative product design through distributed engineering knowledge management,” Computer in Industry, vol. 59, no.4, pp. 395-409, 2008.
[8] C. K. Mok, K. S. Chin and H. Lan, “An Intirnate-based intelligent design system for injection moulds” Robotics and Computer-Integrated Manufacturing, vol. 24, no. 24, pp. 1-15, 2008.
[9] L. F. Lai, “A knowledge engineering approach to knowledge management,” Information Sciences, vol. 177. no.177, pp. 4072-4094, 2007.
[10] S. C. Brandt, J. Morbach, M. Miatidis, M. Theiben, M. Jarke and W. Marquardt, “An ontology-based approach to knowledge management in design processes,” Computers and Chemical Engineering, vol. 32, no. 32, pp. 320-342, 2008
[11] R. I. M. Young, A. G. Gunendran, A. F. Cutting-Decelle and M. Gruninger, “Manufacturing Knowledge Sharing In Plm: A Progression Towards The Use Of Heavy Weight Ontologies” International Journal of Production Research, vol. 45, no. 7, pp. 1505-1519, 2007
[12] F. Gailly, W. Laurier, G. Poels, “Positioning and formalizing the REA enterprise ontology” Journal of information systems, vol. 22, no. 2, pp. 219-248, 2008.
[13] D. Baxter, J. Gao and K. Case. “A framework to integrate design knowledge reuse and Requirements management in engineering design” Robotics and Computer-Integrated Manufacturing, vol. 24, no. 4, pp. 585-593, 2008
[14] K. C. Ku, A. Wensley, H. P. Kao, “Ontology-based knowledge management for joint venture Projects” Expert Systems with Applications, vol. 35, no. 1-2, pp. 187-197, 2008.
[15] K. Mohan, R. Jain, B. Ramesh, “Knowledge networking to support medical new product development” Decision Support Systems, vol. 43, no. 4, pp. 1255-1273, 2007
Citation
Mohd Ashraf, Z. Hussain, V. Singh, "Modelling of Knowledge Based Transport Vehicle System using Reliable Software System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.251-256, 2019.
A Preface to Big Data
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.257-262, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.257262
Abstract
A collection of facts, such as values or measurements is known to be the data. Whatever the data is present it is to be stored for future reference. To store data we need the use of databases like Oracle etc.; these come under traditional databases where the structured data i.e., data that resides in a fixed field within a record or file. The problem comes in storing other form of data i.e., unstructured data e.g., photos and graphic images, videos, streaming instrument data, web pages, pdf files, PowerPoint presentations, emails, blog entries, wikis and word processing documents. This paper presents a survey on the technology “Big Data” that is used to store unstructured data.
Key-Words / Index Term
big data characteristics, technologies, challenges, cloud computing
References
[1] A Survey of Clustering Algorithms for Big Data: Taxonomy & Empirical Analysis A. Fahd, N. Alcatraz, Z. Tari, Member, IEEE , A. Alamri, I. Khalil A. Zomaya, Fellow, IEEE, S. Foufou, and A. Bouras
[2] A PDF file on Big Data: Uses and Limitations by Nathaniel Schenker Associate Director for Research and Methodology National Center for Health Statistics Centers for Disease Control and Prevention Presentation for discussion at the meeting of the NCHS Board of Scientific Counselors September 19, 2013
[3] Global investment themes: telecoms, media and technology Issue No. 52 The beginner’s guide to Big Data.pdf
[4] A PDF file on a very short history on big data at www.forbes.com [5]http://wikibon.org/wiki/v/Big_Data:_Hadoop,_Business_Analytics_and_Beyond#A_Big_Data_Manifesto_from_the_Wikibon_Community
[6] A PDF file on 10-emerging-technologies-for-big-data/
[7]http://www.qubole.com/big-data-cloud-database-computing/
[8] A PDF file on essential characteristics of cloud computing
http://the cloudtutorial.com/cloudtypes.html
[9] http://the cloudtutorial.com/cloudtypes.html
[10] http://en.wikipedia.org/wiki/Cloud_computing
[11] Challenges and Opportunities with Big Data -A community white paper developed by leading researchers across the United States
Citation
P. Sunanda, "A Preface to Big Data," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.257-262, 2019.
Exploring the concept of Blockchain in Cryptocurrency and its uses in decentralizing banking system
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.263-271, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.263271
Abstract
The term blockchain emerged in trend with the popularity of the cryptocurrency called the Bitcoin, which also got the name tag “Digital Gold’. The idea of the cryptocurrency was to decentralize the currency system by establishing transactions over distributed peer to peer network. The technology of Blockchain was adopted to achieve this motive. The term blockchain comes from the idea of list of blocks, growing continuously over time wherein every block carries the data relating to the transactions and data regarding the cryptographical linkage using secure hash algorithms and the protocols. The idea was adopted from the paper that described about timestamping of digital document published by two people named S. Haber and W. S. Stornetta. The blockchain concept helped to revolutionize the system so as to prevent accidental leak and updation of confidential data, as there is no central authority or central server in this system that can be bribed to achieve the falsely motive. Through this paper, there is a lot to learn about the blockchain technology, its working and its applications
Key-Words / Index Term
Blockchain, Bitcoin, Distributed P2P network, Blocks, Transactions, Timestamping, Digital Document, Cryptographical linkage, Secure hash algorithms, Protocols
References
[1] S. Haber, W.S. Stornetta “How to timestamp a digital document”, Journal of cryptology, Vol.3, no. 2, pp.99-111, 1991.
[2] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.[Online]. Available: https://bitcoin.org/bitcoin.pdf
[3] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals prob-lem,” ACM Transactions on Programming Languages and Systems(TOPLAS), vol. 4, no. 3, pp. 382–401, 1982.
[4] C. Miguel and L. Barbara, “Practical byzantine fault tolerance,” inProceedings of the Third Symposium on Operating Systems Design andImplementation, vol. 99, New Orleans, USA, 1999, pp. 173–186.
[5] Z. Zheng, S. Xie, H. Die, X. Chen, H. Wang, “An Overview of Blockchain Technology:Architecture, Consensus, and Future Trends”, In the Proceedings of the 2017 IEEE 6th International Conference on Big Data, Honolulu, HI, USA.
Citation
Salil Abrol, Ajay Dureja, "Exploring the concept of Blockchain in Cryptocurrency and its uses in decentralizing banking system," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.263-271, 2019.
A Survey on Image Watermarking Using Spread Spectrum Method
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.272-276, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.272276
Abstract
Digital pictures have a crucial role now days in everyday life applications like resonance imaging, satellite TV, pictorial representation, optical character recognition, Universal Product Code reader. Watermarking still as in areas of analysis and technology like geographical info systems and natural philosophy. Watermarking is basically the tactic of passing information, referred to as a watermark, in which during very existence of the message is unknown. The aim of watermarking is to avoid drawing suspicion to the transmission of the watermark, whereas providing some a lot of price to the covering media. Watermarking encompasses ways that of transmitting secret messages through innocuous cowl carriers in such the simplest way that the very existence of the embedded messages is undetectable. In Inventive ways that are devised among the activity technique to cut back the visible detection of the embedded messages. Spectrum technique is below of separate wave remodels on DWT Domain. Watermarking theme quality is determined victimization hardiness, transparency and capability.
Key-Words / Index Term
Watermarking, Spectrum Method
References
[1]A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673
[2]Hartung ; Jonathan K. Su ; Bernd Girod; Spread spectrum
[3]Frank Y. Shih: Digital watermarking and steganography: fundamentals and techniques. Taylor & Francis, Boca Raton, FL, USA, 2008.
[4]Ruby Shukla, Manish, Prof. A.K. Aror “Analysis of Image Watermarking: LSB Modification and Spread-Spectrum Technique ” Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 1, Issue 5 (May-June 2012), PP 11-15
[5]Luis Pérez-Freire and Fernando Pérez-González, Member, “Spread-Spectrum Watermarking Security ”IEEE Transactions On Information Forensics And Security, Vol. 4, No. 1, March 2009
[6]Peter H. W. Wong, Oscar C. Au, Justy W. C. Wong “Image Watermarking Using Spread Spectrum Technique in Log-2-Spatio Domain “Department of Electrical and Electronic Engineering The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong.
[7]Ingemar J. Cox, Senior Member, IEEE, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, Member, IEEE” Secure Spread Spectrum Watermarking for Multimedia” IEEE Transactions On Image Processing, Vol. 6, No. 12, December 1997 1673
[8] Anatol.Z.Tirkel* (Senior Member), Charles F Osborne, Ron G. van Schyndel.”. IMAGE WATERMARKING - A SPREAD SPECTRUM APPLICATION” *Scientific Technology, 3/9 Barnato Gve., Armadale 3143 Australia Department of Physics, Monash University, Clayton 3 168 Australia Andrew.
[9]Todor Todorov International Journal Spread Spectrum Watermarking Technique For Information System Securing Information Theories & Applications" Vol.11 405
[10]Sonam Tyagi1 , Harsh Vikram Singh2 , Raghav Agarwal3 and Sandeep Kumar Gangwar” Digital Watermarking Techniques for Security Applications”International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES–16) 978-1-5090-2118-5/16/$31.00 ©2016 IEEE
[11]Martin Broda1 , Gabriel Bugár1 , Dušan Levický “2d - Spread Spectrum Watermark Framework for Multimedia Copyright Protection” 1 1 Dept. of Electronics and Multimedia Communications, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 042 00 Košice, Slovak Republic.
[12]Mohideen Kother,”Image Denoising And Enhancement Using Multiwavelet With Hard Threshold In Digital Mammographic Images”, IAJT, Vol. 2, No. 1, Jan 2011 Page(s): 49-55.
[13]
O. Koval§ , S.Voloshynovskiy “Spread Spectrum Watermarking For Real Images: Is Everything So HopelesS?” University of Geneva - CUI, Signal Theory and Communications Department, University of Vigo, E-36200 Vigo, Spain
[14]Jobenjit Singh Chahal1 Research Scholar: Department of CSE CTIEMT Shahpur (Jalandhar), India Shivani Khurana2 Assistant Professor: Department of CSE CTIEMT Shahpur (Jalandhar), India “Digital Image Watermarking using Spread Spectrum Technique under DWT Domain” International Journal of Engineering Research & Technology ISSN: 2278-0181 (IJERT) Vol. 3 Issue 3, March – 2014.
[15]Khan, A. and Mirza, A. M. 2007. Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding. Inf. Fusion 8, 4 (Oct. 2007), 354-365
[16]Wiley John,” IMAGE PROCESSING”, Wiley Encyclopedia of Electrical and Electronics Engineering, Online Article, December 27, 1999, Page(s): 1-26.
[17]Herrigel et al. "Secure Copyright Protection Techniques for Digital Images." Ibid. pp.169-190.
[18]Fan Zhang, Member, IEEE, Wenyu Liu, Member, IEEE, Weisi Lin, Senior Member, IEEE, and King Ngi Ngan, Fellow, IEEE “Spread Spectrum Image Watermarking Based on Perceptual Quality Metric” IEEE Transactions On Image Processing, Vol. 20, No. 11, November 2011 3207
[19]Security and Watermarking of Multimedia Contents, 147 (April 9, 1999); Hartung
[20]Jessica Fridrich; Combining low-frequency and spread-spectrum watermarking. Proc. SPIE 3456, Mathematics of Data/Image Coding, Compression, and Encryption, 2 (November 6, 1998)
Citation
Pranita Dibe, Satya verma, "A Survey on Image Watermarking Using Spread Spectrum Method," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.272-276, 2019.
Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.277-280, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.277280
Abstract
Big data contains enormous number of semi structured and unstructured data. It is hard to process these data utilizing traditional databases and programming technologies. The association acquire substantial data storage data delivery on big data sharing platform. It expands the use. An organisation and enterprise can acquire huge amount of sensitive data by putting away, breaking down, handling these information. They utilized logging, vulnerability and encryption to keep sensitive data secure in advanced world. It offers some benefit included data administrations. Clients are looking at encryption, tokenization advancements to secure the information. The major objective of the work is to examine security issues comprising the entire sensitive data sharing and clarify a security mode created to guarantee secure sensitive data sharing on a big data platform. It also assures secure capacity on the big data platform. This abstract presents a framework to share the secure sensitive data on a big data platform using Identity based ConditionaI Proxy Re-encryption (IBCPRE) algorithm. It is based on heterogeneous cipher text transformation technique to gives the end-to-end security of big data in the cloud It provides the security when sharing the sensitive data.
Key-Words / Index Term
Secure Data, Sensitive, and Identity Based Conditional Proxy Re-Encryption (IBCPRE), Encryption
References
[1] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. IEEE Symposium on Security and Privacy, Oakland, USA, 2007, pp. 321–334.
[2] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with user accountability in cloud computing, in Proc. 2nd Int. Conf. on Cloud Computing, Indianapolis, USA, 2010, pp. 89–96.
[3] L. Wang, L. Wang, M. Mambo, and E. Okamoto, New identity-based proxy re-encryption schemes to prevent collusion attacks, in Proc. 4th Int. Conf.Pairing-Based cryptography-Pairing, Ishikawa, Japan, 2010, pp. 327– 346.
[4] C. Gentry, A fully homographic encryption scheme, PhD dissertation ,Stanford University, California, USA, 2009.
[5] S. Ananthi, M.S. Sendil, and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Proc. 1st Advances in Computing and Communications, Kochi, India, 2011, pp. 480–487.
[6] H. Hu, J. Xu, C. Ren, and B. Choi, Processing private queries over untrusted data cloud through privacy homomorphism, in Proc. 27th IEEE Int. Conf. on Data Engineering, Hannover, Germany, 2011, pp. 601–612.
[7] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacypreserving multi-keyword ranked search over encrypted cloud data, in Proc. 30th IEEE INFOCOM, Shanghai, China, 2011, pp. 829–837.
[8] C. Hong, M. Zhang, and D. Feng, AB-ACCS: A cryptographic access control scheme for cloud storage, (in Chinese), Journal of Computer Research and Development, vol. 47, no. 1, pp. 259–265, 2010.
[9] N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres, Securing distributed systems with information flow control, in Proc. 5th USENIX Symposium on Networked Systems Design and Implementation, San Francisco, USA, 2008, pp. 293–308.
[9] Z. Lv, C. Hong, M. Zhang, and D. Feng, A secure and efficient revocation scheme for fine-grained access control in cloud storage, in Proc. 4th IEEE Int. Conf. on Cloud Computing Technology and Science, Taipei, Taiwan, China, 2012, pp. 545–550.
[10] A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang, HIMA: A hypervisor-based integrity measurement agent, in Proc. 25th Annual Computer Security Applications Conf., Hawaii, USA, 2009, pp. 461–470.
[11] A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity, in Proc. 17th ACM Conference on Computer and Communications Security, Chicago, USA, 2010, pp. 38–49. [12] Trusted Computing Group, TNC architecture for interoperability, http://www.trustedcomputinggroup.org/ resources/tnc architecture for interoperability specification, 2014.
[13] H. Zhang, L. Chen, and L. Zhang, Research on trusted network connection, (in Chinese), Chinese Journal of Computers, vol. 33, no. 4, pp. 706–717, 2010.
[14] D. Feng, Y. Qin, D. Wang, and X. Chu, Research on trusted computing technology, (in Chinese), Journal of Computer Research and Development, vol. 48, no. 8, pp. 1332–1349, 2011.
[15] F. Zhang, J. Chen, H. Chen, and B. Zang, Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization, in Proc. 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal, 2011, pp. 203–216.
[16] X. Chen, T. Garfinkel, E. C. Lewis, and B. Spasojevic, Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems, in Proc. 13th Int. Conf. on Architectural Support for Programming Languages and Operating Systems, Seattle, USA, 2008, pp. 2–13. 80 Tsinghua Science and Technology, February 2015, 20(1): 72-80.
Citation
J. Vimala Roselin, G.M Nasira, "Efficient Security Framework for Sensitive Data sharing On Big Data Platform in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.277-280, 2019.
Survey on Vision based Hand Gesture Recognition
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.281-288, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.281288
Abstract
A natural interaction technique in the field of Human Computer Interaction (HCI) has been the core interest of researchers in recent years. Numerous applications of real time hand gesture based recognition in the real world have been deployed where we interact with computers. Hand gestures rely upon camera based detection technique. Use of a Web Camera to develop a virtual HCI device is the primary mode of interaction. This paper investigates recent methods used in vision based Human Computer Interaction using hand gestures. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.
Key-Words / Index Term
Human Computer Interaction, hand gestures, camera vision, computer vision
References
[1] A. Agrawal, R. Raj and S. Porwal, "Vision-based multimodal human-computer interaction using hand and head gestures," 2013 IEEE Conference on Information & Communication Technologies, Thuckalay, Tamil Nadu, India, 2013, pp. 1288-1292,2013.
[2] Haitham Badi, “Recent methods in vision-based hand gesture recognition”, Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013), Thuckalay, Tamil Nadu, India, India Vol.31, Issue.4, pp.123-141, 2013.
[3] S. Veluchamy, L. R. Karlmarx and J. J. Sudha, "Vision based gesturally controllable human computer interaction system," 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, 2015, pp. 8-1, 2015.
[4] S. Koceski and N. Koceska, "Vision-based gesture recognition for human-computer interaction and mobile robot`s freight ramp control," Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces, Cavtat, 2010, pp. 289-294, 2010.
[5] G. Baruah, A. K. Talukdar and K. K. Sarma, "A robust viewing angle independent hand gesture recognition system," 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, 2015, pp. 842-847, 2015.
[6] S. Thakur, R. Mehra and B. Prakash, "Vision based computer mouse control using hand gestures," 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), Faridabad, 2015, pp. 85-89, 2015.
[7] S. Song, D. Yan and Y. Xie, "Design of control system based on hand gesture recognition," 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), Zhuhai,2018,pp.1-4, 2018.
[8] A. Pradhan and B. B. V. L. Deepak, "Obtaining hand gesture parameters using image processing," 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, 2015, pp. 168-170, 2015.
[9] V. Bhame, R. Sreemathy and H. Dhumal, "Vision based hand
gesture recognition using eccentric approach for human computer interaction," 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, 2014, pp. 949-953, 2014.
[10] M. K. Ahuja and A. Singh, "Static vision based Hand Gesture recognition using principal component analysis," 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE), Amritsar, 2015, pp. 402-406, 2015.
[11] Palak Kumar and Vineet Saini, "An Efficient Image Sharpening Filter for Enhancing Edge Detection Techniques for 2D, High Definition and Linearly Blurred Images," 2014 International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), Vol.2, Issue.1, pp. 6-10, 2014.
[12] Mahajan J.R and C. S. Rawat, "Object Detection and Tracking using Cognitive Approach," 2017 International Journal of Scientific Research in Network Security and Communication (IJSRNSC), Vol.5, Issue.3, pp. 136-140, 2017.
Citation
Pranit Shah, Krishna Pandya, Harsh Shah, Jay Gandhi, "Survey on Vision based Hand Gesture Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.281-288, 2019.
Restoration of Digitized Paintings Using Image Processing Techniques
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.289-294, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.289294
Abstract
Several methods have been proposed for detection and removal of cracks in digitized paintings. Cracks not only deteriorate the quality of painting but also question its authenticity. In this paper, a morphological methodology (MAO) is proposed which is a variant of recently published morphological methods to identify cracks. After detecting cracks, a modified adaptive median filter (MAMF) is used to fil1 the cracks. The order of the median filter to be applied on crack pixels is computed on the basis of the number of crack pixels in its neighborhood. This methodology of detection and elimination of cracks in digitized paintings is shown to be very effective in preserving the edges also [1-5].
Key-Words / Index Term
Digital image processing, digitized paintings, crack detection, crack filling, Modified adaptive median filter, virtual restoration of paintings
References
[1]. I. Giakoumis, N. Nikolaidis, L Pitas “Digital lmage Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings”, IEEE Transactions on Image Processing, Vol.15, No.1 pp.l78l 88, 2006.
[2]. F.S. Abas, and K. Martinez, “Classification of Painting Cracks for Content-based Analysis”, in Proc. Of IS&T/SPIE`s l5th Annual Symposium on Electronic Imaging: Machine Vision Applications in Industrial Inspection, Vol. 1 l, pp. 149-160, 2003.
[3]. M. Bami, F. Bartolini, and V. Cappellini, “Image Processing for Virtual Restoration of Artworks”, IEEE. Multimedia, Vol.7, No. 2, pp.34-37, 2000.
[4]. A. Hanbury, P. Kammerer, and E. Zolda, “Painting Crack Elimination using Viscous Morphological Reconstruction”, in Proc. IEEE l2th Int. Conf. Imase Analvsis and Processing, Mantua, l7-19, pp. 226- 231, 2003.
[5]. I. Giakoumis and, I. Pitas, “Digital Restoration of Painting cracks”, in Proc. IEEE Int. Symp. Circuits and Systems, Monterey, Vol. 4, pp.269- 272, 1998.
[6]. L Pitas, and A. N. VenetsanoPoulos, “Nonlinear Digital Filters, Principles and Applications”, Norwel, MA: Kluwer, 1990.
[7]. L. Vincent, “Morphological area Opening and Closings for Grayscale Images”, in Proc. Springer Verlag Shape in Picture NATO Workshop, Driebergen, 1992.
[8]. N. Otsu, “A Threshold Selection Method from Gray-level Histograms”, IEEE Transactions on Systems, Man, Cybernetics, Vol. 9, No. l, pp. 62-66, 1979.
[9]. M. Bami, F. Bartolini, V. Cappellini, “Image Processing for Virtual Restoration of Artworks,” IEEE Multimedia, vol. 7, No. 2, pp. 34-37, 2000
[10].Lin Yin, Ruikang Yang, oncef Gabbouj, and Yrjo Neuvo, “Weighted Median Filters” IEEE Transactions on circuits and systems-11: analog and digital signal processing, vol. 43, No. 3, 1996
Citation
Manjunath V, Devidas Kalaskar, "Restoration of Digitized Paintings Using Image Processing Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.289-294, 2019.