ATmega8 Microcontroller
Research Paper | Journal Paper
Vol.7 , Issue.9 , pp.210-213, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.210213
Abstract
A Microcontroller is a tiny computer on a single chip and it is also termed as a control device. Likely to a computer, the Microcontroller is made with a variety of peripherals like i/o units, memory, Timers, serial data communications, programmable. In this article, we will be studying in detail about the Atmega8 microcontroller. It is a low power 8 bit CMOS microcontroller that can execute powerful instructions per clock cycle. It’s small size, low cost and easy availability have helped to become substitutes for PLC controllers, analog circuits, etc. It can be used in embedded applications & automatically controlled devices like remote control devices, control systems, power tools, electronic devices, etc.
Key-Words / Index Term
AVR; microcontroller; architecture
References
[1] “An Overview of ATmega AVR Microcontrollers Used in Scientific Research and Industrial Applications” Wojciech Kunikowski, Ernest Czerwiński, Paweł Olejnik, Jan Awrejcewicz Department of Automation, Biomechanics and Mechatronics, Lodz University of Technology, 90–924 Łódź, 1/15 Stefanowski str
[2] "UNSW School of Computer Science and Engineering - General AVR Info". Cse.unsw.edu.au. Archived from the original on 2012-06-23. Retrieved 2012-09-19.
[3]AVR Programming: Learning to Write Software for Hardware; Elliot Williams; Maker Media; 474 pages; 2014.
[4] “CPU lecture". OpenCores. Retrieved 2015-02-16.
[5]"AVRHardware Design Considerations" (PDF) (application note). Atmel Corporation. Jun 2015. p. 5. Retrieved 14 Jun 2015. The reset line has an internal pull-up resistor, but if the environment is noisy it can be insufficient and reset can, therefore, occur sporadically.
[6]" LGT8F88A FLASH Microcontroller". LogicGreen Technologies. Archived from the original on 2017-08-29. Retrieved 2019-01-18, a clone of the ATmega88.
[7] "pAVR:: Overview".OpenCores.Retrieved 2012-09-19
[8] Principles of Thermodynamics (Jan 1979 29) J A Beattie I Oppenheim Beattie, J.A., Oppenheim, I. (1979). Principles of Thermodynamics, Elsevier Scientific Publishing Company, Amsterdam, ISBN 0-444-41806-7, page 29.
[9] Rashmi Deshmukh, Anagha Zade, Rasika Bhusari, “Temperature Monitoring and Regulating System for Power Saving”, International Journal of Computer Engineering, Vol.1, Issue.2, pp.36-37, 2013.
[10] Tiwari, R. Sam, and S. Shaikh, "Analysis and prediction of churn customers for the telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. DOI: 10.1109/I-SMAC.2017.8058343
[12]S. Nevada, P. Yadav, J. Thomas, and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417. DOI: 10.1109/I-SMAC.2017.8058382
[13]S. Shaikh, S. Rathi, and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308. DOI: 10.1109/CICN.2016.66
[14]S. Shaikh, S. Rathi, and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph-Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. DOI: 10.1109/IACC.2017.0189
[15]A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[16]M. Sora, J. Talukdar, S. Majumder, P.H Talukdhar, U.Sharmah, "Word-level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[17]Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of Routing for Low power and lossy Networks(RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
Citation
Tuba Javed Khanji, Mohd Ayaz Qureshi, Shakila Shaikh, "ATmega8 Microcontroller," International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.210-213, 2019.
Cloud Assisted Event Data Recorder for Four Wheelers
Research Paper | Journal Paper
Vol.7 , Issue.9 , pp.214-218, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.214218
Abstract
Over speeding is one of the major causes of road accidents all over the world. Road accidents account for more deaths than those related to different diseases put together. It has now become a necessity that we take preventive measures towards this problem. Cloud Assisted Event Data Recorder for Four Wheelers keeps check on all registered vehicles for their speed and if the vehicle is found to be over speeding an e-challan is sent to the defaulter via an email. This will considerably bring down the over speeding cases, eventually leading to lesser road accidents hence leading to safer roads. This work consists of an Event Data Recorder which is an inherent part of a vehicle sending real time data to the cloud wherein it is processed. It is a 24X7 regulating process and therefore the vehicle is monitored even in the absence of human intervention.
Key-Words / Index Term
road accidents, Event Data Recorder, cloud, speed monitoring
References
[1] Rangan P. R., “Vehicle Speed Sensing and Smoke Detecting
System”, International Journal of Computer Science and Engineering, pp. 27-33, 2017
[2] Aishwarya et al. S. R., “An IoT Based Accident Preven- tion and Tracking System for Night Drivers”, International Journal of Innovative Research in Computer and Communication Engineering, 3 (4), pp. 3493-349, 2015
[3] Malik et al. , “Automated Over Speeding Detection and Reporting System”, IEEE Xplore, pp. 1-7, 2014
[4] Shabibi L. A., Jayaraman N. and Vrindavanam J., “Au- tomobile Speed Violation Detection System using RFID and GSM Technologies”, International Journal, 2014
[5] Mohammad Ahmar Khan, Sarfraz Fayaz Khan “IoT based frame- work for Vehicle Over-speed detection”,IEEE Xplore, 2011
Citation
Nadine A. Dias, Prutha Verenkar, Vineeth Nair, Priyanka Dessai, Sandesh K. Rai, "Cloud Assisted Event Data Recorder for Four Wheelers," International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.214-218, 2019.
Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review
Review Paper | Journal Paper
Vol.7 , Issue.9 , pp.219-225, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.219225
Abstract
Now a days Cloud computing services highly demanded in all over the world due to its large size spaces for data storing. Cloud Computing provides the ability to utilize resources through Internet. As a lot of service providers of the cloud are available in the competitive computer world. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. In this paper we will survey of previous author’s research that how they analyses approaches for secure data from the unauthorized users and provide integrity to the users. It requires a very high degree of privacy and authentication. To protect the data in cloud database server, cryptography is one of the important techniques for the security purposes. Cryptography provides various symmetric and asymmetric algorithms to secure the data.
Key-Words / Index Term
Big data, cloud computing, security, cryptography, AES etc
References
[1] Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian, “Privacy Preserving Public Auditing for Regenerating-Code-Based Cloud Storage”, 2015.
[2] Henry C.H. Chen and Patrick P.C. Lee, “Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation”, 2014.
[3] Henry C.H. Chen, Yuchong Hu, Patrick P.C. Lee, and Yang Tang, “NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds”, 2014.
[4] Kan Yang, Xiaohua Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 2013.
[5] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage”, 2012.
[6] Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, 2010.
[7] J.He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1345–1358, 2012.
[8] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Apr.Jun. 2012.
[9] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacy preserving public auditing scheme for cloud storage”, 2013.
[10] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” Sep. 2010.
[11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012.
[12] A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proc. IEEE, vol. 99, no. 3, pp. 476–489, Mar. 2011 .
[13] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.
[14] Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, “NCCloud: Applying network coding for the storage repair in a cloudof-clouds,” in Proc. USENIX FAST, 2012, p. 21.
[15] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.
[16] Mahesh U. Shankarwar and Ambika V. Pawar “Security and Privacy in Cloud Computing: A Survey”CSE Department, SIT, Symbiosis International University, Pune, India 30 January 2016.
[17]https://www.akamai.com/us/en/resources/data-security-in-cloud computing.jsp?gclid=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB&ef_id=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB:G:s&utm_source=google&utm_medium=cpc
[18] Kishore Kumar"Role of Cryptography & its Related Techniques in Cloud Computing Security" International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 5 Issue VIII, August 2017- Available at www.ijraset.com
[19]https://data-flair.training/blogs/cloud-computing-applications/
Citation
Anjali Kumari, Varsha Namdeo, "Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.219-225, 2019.
A Research on Cloud Computing Challenges in Virtualization and Cloud Environment
Review Paper | Journal Paper
Vol.7 , Issue.9 , pp.226-229, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.226229
Abstract
Virtualization allows for multiple virtual machines or users to be logically segregated and access simultaneously the same physical machine from remote locations. It enables the cloud characteristics of resource pooling and multi-tenancy. Moreover it introduces the rapid elasticity feature and optimal management of resources. Virtualization supports the cloud in implementing its service and deployment models. Virtual machines can be created, copied and migrated which leads to security challenges. This paper elaborates on virtualization vulnerabilities and presents solutions existing in literature to the security threats.
Key-Words / Index Term
Virtualization, Virtual machine, Challenges, Solutions
References
[1]. M. Gupta, D. Srivastava, D. Chauhan, Security Challenges of Virtualization in Cloud Computing, in: ICTCS`16 proceedings of the Second International Conference on Information & Communication Technology for Competitive strategies, March 04-05, Udaipur, India 2016, dl.acm.org/citation.cfm?id=2905315. http://dx.doi.org/10.1145/2905055.2905315
[2]. M. Ali, S. Khan, A. Vasilakos, Security in cloud computing: Opportunities and challenges, Information Sciences 305 (2015) 357-383.
[3]. Menasce, Daniel A. "Virtualization: Concepts, applications, and performance modeling." In Int. CMG Conference, 2005, pp. 407-414.
[4]. M. Garcia-Valls, T. Cucinotta, C. Lu, Challenges in real-time virtualization and predictable cloud computing, Journal of Systems Architecture 60 (2014) 726-740.
[5]. Gabriel Cephas Obasuyi, Arif Sari "Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment", Int. J. Communications, Network and System sciences, 8, 2015, 260-273.
[6]. Hassan Takabi and James B.D. Joshi, University of Pittsburgh, Gail-Joon and Ahn Arizona State University, "Security and Privacy Challenges in Cloud Computing Environments", IEEE security and privacy, www.computer.org/security, 2010, pp.24-31.
[7]. Mingi Zhou et al., "Security and Privacy in Cloud Computing: A Survey, " Proc. 6th Int`l Conf. Semantics, Knowledge and Grids, IEEE Press, 2010, pp. 105-112.
[8]. Kresimir Popovic and Zeljko Hocenski, "Cloud Computing Security Issues and Challenges, " Proc. 33rd Int`l Convention on Information and Comm. Technology, Electronics and Microelectronics (MIPRO 10), IEEE Press, 2010, pp. 344-349.
[9]. Kui Ren, Cong Wang, and Qian Wang, Ilnois Institute of Technology, "Security Challenges for the Public Cloud", IEEE Press, 2012, pp. 69-73.
[10]. Hsin-Yi Tsai, Melanie Siebenhaar and Andre Miede, Yu-Lun Huang, Ralf Steinmetz, "Threat as a Service?Virtualization`s impact on Cloud Security", IEEE, IT Pro, 2012, pp: 32-37.
[11]. Flavio Lombardi & Roberto Di Pietro, "Transparent Security for Cloud", SAC`10 March 22-26, 2010, Sierre, Switzerland.
[12]. Maneesha Sharma, Himani Bhansal and Amit Kumar Sharma, "Cloud Computing Different Approach & Security Challenge", In International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, 2012, pp. 421-424.
[13]. Yanpei Chen, Vern Paxson and Randy H. Katz, "What`s New About Cloud Computing Security?", Technical Report No. UCB/EECS-2010-5.
[14]. T. Ristenpart et al.., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM conf. Computer and Communications Security (CCS09), ACM Press, 2009, pp. 199-212.
[15]. B. Grobauer, T. Walloscheck, and E. Stocher. "Understanding Cloud-Computing Vulnerabilities," IEEE Security and Privacy, vol. 9, no. 2, 2011, pp. 50-57.
[16]. M. A. Morsy, J. Grundy, and I. Muller, "An Analysis of the Cloud Computing Security Problem," Proc. 17th Asia Pacific Software Eng. Conf. 2010 Cloud Workshop (APSEC 10), IEEE Press, 2010.
[17]. Y. Neng-Hai, Z. Hao, J. Xu, W. Zhang, C. Zhang, Review of cloud computing security, Acta Electron, Sinica 41 (2) (2013) 371-381.
[18]. K. Ren, C. Wang, Q.Wang, Security challenges for the public cloud, IEEE Internet Comput. 16 (1) (2012) 69-73.
[19]. K. Hashizume, D.G. Rosado, E. Fernndez-Medina, E.B. Fernandez, An analysis of security issues for cloud computing, J. Internet Services Appl. 4 (1) (2013) 1-13.
[20]. W.A. Jansen, Cloud hooks: Security and privacy issues in cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), 2011, pp 1-10.
[21]. N. Gonzalez, C. Miers, F. Redgolo, M. Simplcio, T. Carvalho, M. Nslund, M. Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing, J. Cloud Comput. 1 (1) (2012) 1-18.
[22]. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. 34 (1) (2011) 1-11.
[23]. M.H. Song, Analysis of risks for virtualization technology, in: Applied Mechanics and Materials, vol. 539, 2014, pp. 374-377.
[24]. S.H. Na, E.N. Huh, A broker-based cooperative security-SLA evaluation methodology for personal cloud computing, Sec. Commun. Netw. (2014), http://dx.doi.org/10.1002/sec.1086.
[25]. F. Zhang, H. Chen, Security preserving live migration of virtual machines in the cloud, J. Netw. Syst. Manage. 21 (4) (2013) 562-587.
[26]. A. Corradi, M. Fanelli, L. Foschini, VM consolidation: a real case based on openstack cloud, Future Gener. Comput. Syst. 32 (2014) 118-127.
[27]. R. Schwarzkopf, M. Schmidt, C. Strack, S. Martin, B. Freisleben, Increasing virtual machine security in cloud environments, J. Cloud Comput. 1 (1) (2012) 1-12.
[28]. H. Wu, Y. Ding, C. Winer, L. Yao, Network security for virtual machine in cloud computing, in: 5th International Conference on Computer Sciences and Convergence Information Technology, 2010, pp. 18-21.
[29]. J. Szefer, E. Keller, R.B. Lee, J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, pp. 401-412.
[30]. K.S. Rao, P.S. Thilagam, Heuristics based server consolidation with residual resource defragmentation in cloud data centers, Futur Gener. Comput. Syst. (2014), http://dx.doi.org/10.1016/j.future.2014.09.009.
[31]. J. Wei, X. Zhang, G. Ammons, V. Bala, P. Ning, Managing security of virtual machine images in a cloud environment, in: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009, pp. 91-96.
[32]. F. Zhang, J. Chen, H. Chen, B. Zang, Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization, in: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011, pp. 203-216.
[33]. M. Aslam, C. Gehrmann, M. Bjorkman, Security and trust preserving VM migrations in public clouds, in: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 869-876.
[34]. F. Zhang, J. Wang, K. Sun, A. Stavrou, HyperCheck: a hardware-assisted integrity monitor, IEEE Trans. Denpendable Sec. Comput. (2013), http://dx.doi.org/10.1109/TDSC.2013.53.
[35]. Y. Xia, Y. Liu, H. Chen, B. Zang, Defending against VM rollback attack, in: IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, 2012, pp. 1-5.
[36]. Y. Xia, Y. Liu, H. Chen, Architecture support for guest- transparent VM protection from untrusted hypervisor and physical attacks, in: IEEE 19th International Symposium on High Performance Computer Architecture, 2013, pp. 246-257.
[37]. Srivastava, H. Raj, J. Gi_n, P. England, Trusted VM snapshots in untrusted cloud infrastructures, in: Research in Attacks, Intrusion and Defenses, Springer, Berlin, Heidelberg, 2012, pp. 1-21.
[38]. M. I. Gofman, R.Luo, P. Yang, K. Gopalan, Sparc: a security and privacy aware virtual machine check pointing mechanism, in: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 2011, pp. 115-124.
[39]. Y. Hu, T. Li, P. Yang, K. Gopalan, An application-level approach for privacy-preserving virtual machine checkpointing, in: IEEE Sixth International Conference on Cloud Computing, 2013, pp. 59-66.
Citation
Vaibhav Sardana, Nidhi Saxena, "A Research on Cloud Computing Challenges in Virtualization and Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.226-229, 2019.
INTEL i3 3220 Microprocessor for a Complete PC Experience
Survey Paper | Journal Paper
Vol.7 , Issue.9 , pp.230-232, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.230232
Abstract
The advancement of microprocessor architecture depends upon the changing phases of technology. As complexity and speed increases, memory and program performance become progressively important in defining architecture of microprocessors. Architectures and implementations that cover these limits are vibrant to the continued evolution of the microprocessor. This paper illustrates a total in depth review of the Intel manufactured i3 core 3220 microprocessor (Intel core i3). All of the features, limitations, power, application and drawbacks are discussed in his paper. Also, an attempt to cover all the aspects a Microprocessor should possess in order to work in pace with today’s world has been displayed. The Introduction has basic information of Intel core i3 3220. Related work displays basic literature for the reviews we have studied. A block diagram of basic functioning of intel core i3 Microprocessor is given. A table with precise features of Intel core i3 Microprocessor is been provided too.
Key-Words / Index Term
Intel core i3 microprocessor, Gigahertz, IMC
References
[1]. Tiwari, R. Sam and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. doi: 10.1109/I-SMAC.2017.8058343
[2]. S. Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417. doi: 10.1109/I-SMAC.2017.8058382
[3]. S. Shaikh, S. Rathi and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308. doi: 10.1109/CICN.2016.66
[4]. S. Shaikh, S. Rathi and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. doi: 10.1109/IACC.2017.0189
[5]. A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[6]. M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U.Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[7]. Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks (RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
[8]. Rohan Yadav, “A BRIEF OVERVIEW OF I3 PROCESSOR” 2014 http://ijirt.org/master/publishedpaper/IJIRT100180_PAPER.pdf
[9]. Arpit, “INTEL I3 PROCESSOR” https://www.slideshare.net/arpit2u1/intel-i3-processor
[10]. “3rd GEN CORE DESKTOP VOL-1 DATASHEET” www.Intel.in/Intel/Devices
Citation
Khan Vaqui, Saqib Shaikh, Shakila Shaikh , "INTEL i3 3220 Microprocessor for a Complete PC Experience," International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.230-232, 2019.
An Algorithm to Find the Directed Minimum Spanning Trees
Research Paper | Journal Paper
Vol.7 , Issue.9 , pp.233-239, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.233239
Abstract
New technologies and the deployment of mobile and nomadic services are driving the emergence of complex communications networks that have highly dynamic behaviour. This naturally engenders new route-discovery problems under changing conditions over these networks. Unfortunately, the temporal variations in the network topology are hard to be effectively captured in a classical graph model. In this paper, we use and extend a recently proposed graph theoretic model, which helps capture the evolving characteristic of such networks, in order to compute multicast trees with minimum overall transmission time for a class of wireless mobile dynamic networks. We first show that computing different types of strongly connected components in this model in NP-Complete, and then propose an algorithm to build all rooted directly minimum spanning trees in already identified strongly connected components.
Key-Words / Index Term
Wireless networks, mobile networks, multicast, evolving graphs, LEO satellites, minimum spanning trees, strongly connected components, graph theoretic models, NP-complete
References
[1]. Y. J Chu amd T H. Liu. On the shortest arborescence of a directed graph. Science Sincia, 14:1396- 1400, 1965
[2]. T. Cormen, C. Leiserson and R. Rivest. Introduction to Algorithms. The MIT Press, 1990
[3]. C.Scheideler. Models and techniques for communication in dunamic networks. In In H. Alt and A. Ferreira, editors, Proceedings of the 19th International Symposium on Theoretical Aspecys of Computer Science, volume 2285, pages 27-19. Springer-Verlag, March 2002.
[4]. E. Ekici, I. F Akyildiz, and M. D. Bender. Datagram routing algorithm for LEO satellite networks. In IEEE infocom, pages 500-508,2000.
[5]. Ferreira, on models and algorithms for dmanic communication networks: The case for evolving graphs. In Proceedings of 4e rencontres francophnes sur les Aspects Algorithmiques des Telecommunications (ALGOTEL ’2002), Meze, France, May 2002.
[6]. Fereira, J. Galtier, and P. Penna. Topological design, routing and handover in satellite networks. In I. Stojmenovic, editor, Handbook of wireless Networks and Mobile Computing, pages 473-493, John Wiley and Sons, 2002.
[7]. P. A Humblet. A distributed algorithm for minimum weight directed spanning trees. IEEE transactions on communications, COM-31(6): 756-762, 1983.
[8]. R. E. Tarjan. Finding optimum branching. Networks, pages 25-35, 1977.
[9]. P.-J. Wan, G, Calinescue, X. Li, and O. Frieder. Minimum-energy broadcast routing in static ad hoc wireless networks. In Proc. IEEE infocom, pages 1162-1171, Anchorage Alaska, 2001.
[10]. M. Werner and G. Maral. Traffic flows and dynamic routing in leo intersatellite link networks. In In Proceedings 5th International Mobile Satellite Conference (IMSC ’97), Pasadena, California, USA, June 1997.
[11]. M. Werner and F. Wauquiez. Capacity dimensioning of ISL networks in broadband LEO satellite systems. In sixth International Mobile Satellite Conference : IMSC ’99, pages 334-341, Ottawa, Canada, June 1999.
[12]. J. Wieselthier, G. Nguyen, and A. Ephremides. On the construction of energy-efficient broadcast and multicast trees in wireless networks. In proc. IEEE infocom, pages585-594, Tel Aviv, 2000
Citation
A. Navis Vigilia, J. Suresh Suseela, "An Algorithm to Find the Directed Minimum Spanning Trees," International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.233-239, 2019.