Implementation of Enhanced Energy Buffer Aware Reliable Routing Protocol in MANETS
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.261-264, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.261264
Abstract
Mobile ad hoc networks (MANET) are one of the most significant emerging research areas in wireless communication. Nodes in MANET undergo continuous self-configuration where power awareness is an essential issue to improve the communication for all the nodes. MANET nodes are miniature devices with limited energy, transmission range, memory and computational power. The energy efficient routing is one of the most important design criteria for MANETS, since mobile nodes will be powered by batteries with limited capacities. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and thus affects the overall network life-time. Due to this, we propose a novel protocol called ENHANCED ENERGY BUFFER AWARE RELIABLE ROUTING (EEBARR) in WSN with more number of nodes to transmit the packets from source to destination. It improves the packet transmission, balances the energy and uses buffer management policy to mitigate packet losses and analyze the performance using the parameters like Energy consumption, Throughput, Packet delivery ratio, End to End delay and Reliability.
Key-Words / Index Term
MANET, WANET
References
[1] “Energy Consumption in Wireless Ad-hoc Network”, Praveen Gupta and Preeti Saxena.
[2] “Energy Efficient Reliable Route Selection (RRS) Algorithm for improving MANET lifetime”, Mr.Deshkar Rao Adkane, Mr. Umesh Lilhore, Mr. Ankur Taneja.
[3] “Enhanced AODV- An Energy Efficient routing protocol for MANET”, Uma Rathore Bhatt, Priyanka Jain, Raksha Upadhyay.
[4] “Minimizing Energy Consumption using Modified-Mecor Protocol in MANET”, Mr. Kuldeep Sonawane, Mrs. Ashwini Naik.
[5] “Network Connectivity based Energy Efficient Topology Control Scheme for MANET”, T.S.Asha,Dr.N.J.R.Muniraj.
[6] “Novel Approach for Reliable Communication Using Energy Aware Routing Protocol in MANET”, Akanksha Meshramt, M.A. Rizvi.
[7] "Performance Evaluation of Energy Consumption for AODV and DSR Routing Protocols in MANET", Mehdi Barati, Kayvan Atefi, Farshad Khosravi and Yashar Azab Dafia.
[8] "Performance Evaluation of MANET Routing Protocols with Scalability using QoS Metrics of VoIP Applications", Sumit Mahajan, Vinay Chopra.
[9] "A survey on energy efficient routing protocol for MANET", Mr.Siddhant Dodke,Dr. P. B. Mane,Mrs. M.S. Vanjale -2016.
[10] "An Energy Multi-path AODV Routing Protocol in Ad Hoc Mobile Networks", Said Khelifa,Zoulikha Mekkakia Maaza -2010.
[11] "A Low Energy Consumed Routing Multipath Protocol In MANETS", Sumant Kumar Mohapatra, Sushil Kumar Mohapatra, Lalit Kanoje, Sukant Behera.
[12] "A Novel method for Self -Management of the energy consumption of nodes dying out of low battery capacity in a NTP based routing environment of MANETs",Vaithiyananthan S, Edna Elizabeth N, 2010.
[13] "A QoS routing for Maximum Bandwidth in Ad Hoc Networks", Keming DU, Yahui YANG, 2010.
[14] "An Energy-based QoS Routing Protocol in mobile Ad-Hoc Network", Jin LIAN, 2009.
[15] “Applications, Advantages and Challenges of Ad-Hoc Networks", D.Helen and D.Arivazhagan, 2014.
[16] "Challenges and Issues in Ad-Hoc Network", Iqbaldeep Kaur, Navneet Kaur, Tanisha, Gurmeen, Deepi, 2016.
[17] "Current Research Work on Routing Protocols for MANET: A Literature Survey", G.Vijaya Kumar, Y.Vasudeva Reddyr, Dr.M.Nagendra, 2010.
[18] "Design and Implementation of Energy Sharing System for MANETs", Xiuzhi Zhao, 2012.
Citation
Murali G, Apoorva M Swami, Kruthika Kadam G, Kusuma G, Mandakini A Katwey, "Implementation of Enhanced Energy Buffer Aware Reliable Routing Protocol in MANETS", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.261-264, 2019.
Comprehensive Study on Big Data Analytics
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.265-269, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.265269
Abstract
Big Data is termed has any type of datasets which are so vast and compound which becomes difficult to process them using traditional data processing applications. While handling vast dataset different challenges may be faced by the user. In recent times, the internet application and communication have observed a lot of growth and reputation in the field of Information Technology. These internet applications and communication are frequently generating the large size, different variety and with some authentic difficult multifaceted structure data called big data. As a result, we are now in the era of enormous automatic data collection. For example, E-commerce transactions include activities such as online buying, selling or investing. Thus they generate the data which are high in dimensional and complex in structure. The traditional data storage techniques are not adequate to store and analyses those huge volume of data. Many researchers are doing their research in dimensionality reduction of the big data for effective and better analytics report and data visualization. The technologies used by big data application to handle the massive data are Hadoop, Map Reduce, and Apache Hive. Hence, the aim of the survey paper is to provide the overview of the big data analytics, issues, challenges and various technologies related with Big Data.
Key-Words / Index Term
Big Data, Big Data Analytics, Hadoop, Map Reduce
References
[1] Yuri Demchenko, “The Big Data Architecture Framework (BDAF)”, Outcome of the Brainstorming Session at the University of Amsterdam 17 July 2013.
[2] Amogh Pramod Kulkarni, Mahesh Khandewal, “Survey on Hadoop and Introduction to YARN”, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 5, May
2014).
[3] M. R. Berthold, N. Cebron, F. Dill, T. R. Gabriel, T. Kötter, T. Meinl, et al., “KNIME: The Konstanz Information Miner”, in Data Analysis, Machine Learning and Applications (Studies in Classification, Data Analysis, and Knowledge Organization), Springer Berlin Heidelberg, pp. 319–326, 2008.
[4] Sagiroglu, S.Sinanc, D.,”Big Data: A Review”,2013, 2024.
[5] Ms. Vibhavari Chavan, Prof. Rajesh and N. Phursule, “Survey Paper On Big Data”, International Journal of Computer Science and Information Technologies, Vol. 5 (6), 2014.
Citation
Sarala N R, Gagana R P, Manisha R, Monisha P V, Roja L, "Comprehensive Study on Big Data Analytics", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.265-269, 2019.
A Novel Data AggregationTechnique for Removing Redundant Data in Hadoop
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.270-271, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.270271
Abstract
Hadoop is the software framework which was developed by Apache Software Foundation.Hadoop framework is written in java with purpose to handle large amount of data. Hadoop manages huge volume of data.Hadoop runs the task under the MapReduce algorithm. MapReduce is a programming model suitable for processing of huge data. MapRe¬duc¬e framework has two phase, map phase and reduce phase.a mapredce job is usually splits the input data set into independent chunks,which is done by map phase.the framework sorts the output of the map which are input to reduce framework. To running frequent itemset require more resource and time consuming. To overcome this problem here we implementing the nobel data aggregation technique.
Key-Words / Index Term
herewe are grouping the frequent itemsetand remove the redundant data
References
[1]. Y. Xun, J. Zhang, and X. Qin, “Fidoop: Parallel mining of frequent itemsets using mapreduce,” IEEE Transactions on Systems,Man ,and Cybernetics: Systems, doi: 10.1109/TSMC.2015.2437327, 2015.
[2]. J. Leskovec, A. Rajaraman, and J. D. Ullman, Mining of massive datasets. Cambridge University Press, 2014.
[3]. M. Liroz-Gistau, R. Akbarinia, D. Agrawal, E. Pacitti, and P. Valduriez,“Data partitioning for minimizing transferred data in mapreduce,” in Data Management in Cloud, Grid and P2P Systems. Springer,2013.
[4]. T. Kirsten, L. Kolb, M. Hartung, A. Groß, H. K¨opcke, and E. Rahm,“Data partitioning for parallel entity matching,” Proceedings of theVLDB Endowment, vol. 3, no. 2, 2010.
Citation
Uday Shankar S V, AnveshNaik, Manoj C K, Praveen B, Yadush B R, "A Novel Data AggregationTechnique for Removing Redundant Data in Hadoop", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.270-271, 2019.
E-Institute Adminstrative System
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.272-274, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.272274
Abstract
Although a lot of complaint registering website are already available for the students but still a more sophisticated website is required to provide secure two way communications. Thus this portal is proposed for registering valid student complaint about the inconvenience faced in the institution by creating a website and also provides the status of the complaint to the student and the parent. Here the web application is designed using php which uses xampp and wamp server.
Key-Words / Index Term
php, xampp,wampp
References
[1] TruptiBomble, RitikaRaut, RuchiKanekar (April 2015) “Android Based Complaint Management System For Municipal Corporation”, Int. Journal of Engineering Research and Applications, www.ijera.com ISSN :2248- 9622, Vol. 5, Issue 4, ( Part -3).
[2] DevikaRadhakrishnan, prof. NisargaGandhewar, prof. RuchihaNarnaware, prof. PrayasPagade, Arpan Tiwari and pooja,prof. “Smart Complaint Management System.”, International journal of trend in research and development, Vol3, Iss. 6, ISSN: 23949333
Citation
Sampritha T S, Bhavya V, Poornima S, Durga Shree A M, Aditya Pai H, "E-Institute Adminstrative System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.272-274, 2019.
Design of the IoT Based Operation Management System
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.275-283, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.275283
Abstract
This period would be tended to as the Internet of things (IoT) time where a great many gadgets, sensors, vehicles and people are associated and responded together. Utilizing IoT in inventory network the executives and coordination could be considered as one of the promising IoT applications as it can upgrade both expense and working time. This work proposed a casing work for following holders utilizing physical gadgets as GPS tracker, GSM modem and Internet as association media to improve its voyage cost and time. The first considered demonstrates that manual arrangement of following holders caused numerous issues, for example, nonappearance of honesty and proficiency. If there should be an occurrence of utilizing the manual information documenting framework numerous issues emerge, for example, incomplete requesting demand, false demands, unclear areas, trouble in picking proficient appropriation procedure and doling out assignments to drivers. Likewise, the sat idle due to checking accessibility of holders, lost driver searching for the conveyance area, deferred refreshes about compartment status (accessible, must purge), obscure holder area. This paper proposes an answer that dependent on IoT to associate and control remotely every one of the items includes in compartment following, for example, GPS tracker, GSM modem with a guide of versatile base application to issues arranges in a streamlined way, sparing both time and cost. The present work utilizes a bunching method to improve dispersing and overseeing development dumping holders. Mechanizing the way toward disseminating and checking the compartments utilizing IoT based arrangement have numerous experts, for example, sparing organizations` money related assets, sparing workers time, serving clients better.
Key-Words / Index Term
IoT, calculated administration, Clustering Techniques; Mobile Platform; PAM; Google Map; GPS tracker. GPS modem
References
[1] C. Perera, A. Zaslavsky, P. Christen and D. Georgakopoulos, "Context Aware Computing for The Internet of Things: A Survey," IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414 - 454, 2014.
[2] K. Ashton, "That `Internet of Things` Thing," RFID Journal, [Online]. Available: http://www.rfidjournal.com/articles/view?4986, 22 June 2009.
[3] "Internet of Things Global Standards Initiative," ITU Telecom World, [Online]. Available: http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx, 14 July 2015.
[4] P. Guillemin and P. Friess, "Internet of things strategic research roadmap," Europian Research Cluster on the Internet of Things, [Online]. Available: http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf, 15 September 2009.
[5] J.-S. Kim, H.-J. Lee and R.-D. Oh, "Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service," International Journal of Smart Home, vol. 9, no. 5, pp. 195-204, 2015.
[6] S. Jianli, "Design and Implementation of lOT -Based Logistics Management System," in IEEE Symposium on Electrical & Electronics Engineering, Kuala Lumpur, Malaysia, 2012.
[7] "An Intelligent Context-aware System for Logistics Asset Supervision Service," in Federated Conference on Computer Science and Information Systems, 2016.
[8] A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi, "Internet of Things for Smart Cities," IEEE Internet Of Things Journal, vol. 1, no. 1, pp. 22-32, 2014.
[9] M. Ganzha, L. Maciaszek and M. Paprzycki, "An Intelligent Context-aware System for Logistics Asset Supervision Service," in Proceedings of The 2016 Federated Conference on Computer Science and Information Systems (FEDCSIS), IEEE, Poland, 2016.
[10] "Logistics," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Logistics.2017.
[11] "What is a GSM modem?(or GPRS Modem? or 3G Modem?)," [Online]. Available: http://www.nowsms.com/faq/what-is-a-gsm-modem, 2016.
[12] D.Rangan, "How to send and receive SMS using GSM Modem," [Online]. Available: http://www.codeproject.com/Articles/20420/How-To-Send-and-Receive-SMS-using-GSM-Modem, 10 Sep. 2007.
[13] "GPS TRACKING & THE LAW – UK ONLY," [Online]. Available: http://www.salgadoinvestigations.com/blog/gps-trackers/gps-tracking-the-law-uk-only/, 30 August 2013.
[14] "GPS vehicle tracker GPS104," Shenzhen Coban Electronics, 2015. [Online]. Available: http://www.coban.net/html/2013/12/26/2013122605122357009624.html.
[15] L. Fattouh, M. Abulkhair, A. Alnaji, F. Duaiji, A. Nouf, N. Al-Amer, A. Nuha and S. Battar,"Using Cluster technique to Distribute and Track Containers," in 9th International Conference on Computer Engineering and Applications (Cea `15), Dubai, United Emirate, 2015.
[16] O. Maimon and L. Rokach, “Data Mining and Knowledge Discovery Handbook”, 2nd ed., Springer Science Bussiness Media, 2010.
[17] A. H. Tung, J. Hou, and J. Han, "Clustering on Large Database," in 17th International Conference on Data Engineering (ICDE), 2001.
[18] J. Han and M. Kamber, “Data Mining Concepts and Techniques”, 3rd Edition, 2012.
[19] "Maps JavaScript API," [Online]. Available: ttps://developers.google.com/maps/documentation/javascript/.
[20] "Introducing JSON," [Online]. Available: http://json.org/.
[21] "Meet Android Studio," Android Studio, [Online]. Available: https://developer.android.com/studio/intro/index.html.
[22] "Google Maps Android API v2 - Tutorial," [Online]. Available: http://www.vogella.com/tutorials/AndroidGoogleMaps/article.html., 2016.
[23] "Build a UI with Layout Editor," Android Studio, [Online]. Available: https://developer.android.com/studio/write/layout-editor.html., 2016.
Citation
Chethan RM, Suma CC, Aditya Pai H, Chimaya Dash, Prakash Behera, "Design of the IoT Based Operation Management System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.275-283, 2019.
Software Defect Prediction Using Data Mining Techniques
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.284-287, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.284287
Abstract
The accomplishment of any software framework completely relies upon the exactness of the consequences of the framework and whether it is with no blemishes. Software deformity prediction issues have an incredibly gainful research potential. Software defects are the serious issue in any software industry. Software defects diminish the software quality, increment costing yet it additionally suspends the improvement plan. Software bugs lead to off base and discrepant outcomes. As a result of this, the software ventures run late, are dropped or become untrustworthy after sending. Quality and reliability are the real difficulties looked in a protected software improvement process. There are real software cost overwhelms when a software item with bugs in its different segments is conveyed next to client. The software distribution center is generally utilized as record keeping vault which is for the most part required while including new highlights or fixing bugs. Numerous information mining strategies and dataset store are accessible to foresee the software defects. `Bug prediction procedure` is a significant part in software building territory for most recent multi decade. Software bugs which identify at beginning period are straightforward and cheap for redressing the software. Software quality can be upgraded by utilizing the bug prediction strategies and the software bug can be decreased whenever connected precisely. Needy and autonomous variable are considered in Software bug prediction. To anticipate deformity dependent on software measurements software prediction model are utilized. Measurements based characterization sort part as faulty and non-inadequate.
Key-Words / Index Term
Software defects, bugs, prediction, quality, reliability
References
[1] H. Solanki, “Comparative Study of Data Mining Tools and Analysis with Unified Data Mining Theory,” International Journal of Computer Applications, vol. 75, no. 16, pp. 23–28, 2013.
[2] A. E. Hassan and Tao,Xie, “Mining software engineering data”, in Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2 (ICSE `10), Vol. 2. ACM, New York, NY, USA, 2010. pp. 503-504.
[3]M. S. Rawat, and S. K. Dubey, "Software defect prediction models for quality improvement: A literature study." IJCSI International Journal of Computer Science Issues Vol.9 No. 5,pp. 295, 2012.
[4]M. Jureczko and L. Madeyski, “Towards identifying software project clusters with regard to defect prediction,” Proc. 6th Int. Conf. Predict. Model. Softw. Eng. - PROMISE ’10, pp 1-10, 2010.
[5]Y. Suresh, J. Pati, and S. K. Rath, “Effectiveness of software metrics for object-oriented system,” Procedia Technologyvol. 6, pp. 420–427, 2012.
[6]M. S. Rawat, and S. K. Dubey, "Software defect prediction models for quality improvement: A literature study." IJCSI International Journal of Computer Science Issues Vol.9 No. 5,pp. 289, 2012.
[7]M. S. Rawat, and S. K. Dubey, "Software defect prediction models for quality improvement: A literature study." IJCSI International Journal of Computer Science Issues Vol.9 No. 5,pp. 292, 2012.
[8]S. Kim, H. Zhang, R. Wuand L. Gong. “Dealing with noise in defect prediction “in Proceedings of the 33rd International Conference on Software Engineering (ICSE `11). ACM, New York, NY, USA, pp. 481-490, 117,2011.
[9]M. Shepperd, Q. Song, Z. Sun, and C. Mair, “Data Quality: Some Comments on the NASA Software Defect Datasets,” IEEE Transactions on Software Engineering, vol. 39, no. 9, pp. 1208–1215, 2013.
[10] M. Jureczko and L. Madeyski, “Towards identifying software project clusters with regard to defect prediction,” Proc. 6th Int. Conf. Predict. Model. Softw. Eng. - PROMISE ’10, pp 2-4, 2010.
[11]R. Goyal, P. Chandra, and Y. Singh, “Identifying influential metrics in the combined metrics approach of fault prediction,” Springerplus, vol. 2, no. 1, pp. 1–8, 2013.
[12]R. Subramanyam and M. Krishnan, “Empirical analysis of CK metrics for object-oriented design complexity: implications for software defects,” IEEE Transactions on Software Engineering, vol. 29, no. 4, pp. 297–310, 2003.
[13] F. Provost and R. O. N. Kohavi, “Guest Editors’ Introduction: On Applied Research in Machine Learning,” New York, vol. 132, no. 1998, pp. 127–132, 1998.
[14] A. Pradesh and A. Pradesh, “The Importance of Statistical Tools in Research Work,” Int. J. Sci. Innov. Math. Res., vol. 3, no. 12, pp. 50–58, 2015.
[15] T. Zimmermann, R. Premraj, N. Bettenburg, S. Just, A. Schröter, and C. Weiss, “What makes a good bug report?,” IEEE Trans. Softw. Eng., vol. 36, pp. 618–643, 2010.
[16]H. Wang, “Software Defects Classification Prediction Based On Mining Software Repository,” Dissertation, 2014.
[17] M. Jureczko. “Significance of different software metrics in defect prediction,” Softw. Eng. An Int. J., vol. 1, no. 1, pp. 86–95,2011
Citation
Swathi K, Arun Biradar, "Software Defect Prediction Using Data Mining Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.284-287, 2019.
IoT based Smart Parking System
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.288-292, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.288292
Abstract
Advancement in industrialization leaves the parking management system out-dated. Traffic congestion at parking lots have become very often and people cannot even find a place to park their vehicles where first come first serve method is used. Traditional parking lots can be converted to smart ones by introducing Internet of Things (IoT) which in turn resolves the current parking issues. Problems such as, traffic congestion, limited car parking facilities and road safety can also be resolved by IoT. In this paper, the proposed Smart Parking system primarily consists of IoT module that is used to signalize the state of availability of each single parking space, the NFC technology is used to differentiate between registered and unregistered vehicles as they have separate parking areas, and a Mobile Application that provides the end users to view if the slots are occupied or empty. One of the main challenges in a college environment is students rushing to college just before the college begins. This causes a lot of congestion. Students end up parking in areas not reserved for parking or in such a way that it becomes difficult for others to remove their vehicles. Thus there is need for implementing a smart parking system in college environment which regulates all these issues using the above mentioned technologies.
Key-Words / Index Term
Internet of Things, IoT, Smart Parking System, NFC
References
[1] Abhirup Khanna & Rishi Anand (2016, January). IoT based Smart Parking System, 2016 International Conference on Internet of Things and Applications (IOTA)(pp. 266-270). IEEE.
[2] Rico, J., Sancho, J., Cendon, B., & Camus, M. (2013, March). Parking easier by using context information of a smart city: Enabling fast search and management of parking resources. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 1380-1385). IEEE.
[3] Zheng, Y., Rajasegarar, S., & Leckie, C. (2015, April). Parking availability prediction for sensor-enabled car parks in smart cities. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 IEEE Tenth International Conference (pp. 1-6) IEEE.
[4] FastPark System website, http://www.fastprk.com.
[5] Ji, Z., Ganchev, I., O`droma, M., & Zhang, X. (2014, August). A cloud-based intelligent car parking services for smart cities. In General Assembly and Scientific Symposium (URSI GASS), 2014 XXXIth URSI (pp. 1-4). IEEE.
[6] Dash, S. K., Mohapatra, S., & Pattnaik, P. K. (2010). A survey on applications of wireless sensor network using cloud computing. International Journal of Computer science & Engineering Technologies (E-ISSN: 2044-6004), 1(4), 50-55.
[7] Sarkar, C., Uttama Nambi SN, A., Prasad, R., Rahim, A., Neisse, R., & Baldini, G. (2012). DIAT: A Scalable Distributed Architecture for IoT.
[8] L. Wenghong, X. Fanghua, and L. Fasheng, “Design of inner intelligent car parking system,” in International Conference on Information Management, Innovation Management and Industrial Engineering, 2008.
[9] I. Samaras, N. Evangeliou, A. Arvanitopoulos, J. Gialelis, S. Koubias, and A. Tzes, “Kathodigos-a novel smart parking system based on wireless sensor network,” in Intelligent Transportation Systems, vol. 1, 2013, pp. 140–145.
[10] H. Wang and W. He, “A reservation-based smart parking system,” in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. IEEE, 2011, pp. 690–695.
[11] J.-H. Moon and T. K. Ha, “A car parking monitoring system using wireless sensor networks,” International Journal of Electrical, Robotics, Electronics and Communications Engineering, vol. 7, no. 10, pp. 830–833, 2013.
[12] Sangwon Lee, Dukhee Yoon and Amitabha Ghosh, Intelligent Parking Lot Application Using Wireless Sensor Networks,
Proceedings of IEEE conference, 978-1-4244-2249-4/08
[13] K. Mouskos, M. Boile, and N. A. Parker, “Technical solutions to overcrowded park and ride facilities,” New Jersey Department of Transportation, Tech. Rep., 2007.
[14] L. Baroffio, L. Bondi, M. Cesana, A. E. Redondi, and M. Tagliasacchi,“A visual sensor network for parking lot occupancy detection in smart cities,” in Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum on. IEEE, 2015, pp. 745–750.
[15] M. Suresh, P. S. Kumar, and T. Sundararajan, “Iot based airport parking system,” in Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. IEEE, 2015, pp. 1–5.
Citation
Anuradha G, Bhavana L S, Bindushree H A, Deeksha B Jadesh Darshan K R, "IoT based Smart Parking System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.288-292, 2019.
Intelligent Stove using NodeMCU
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.293-295, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.293295
Abstract
Internet of things is the network of devices and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. The recent advances in sensor technology empower adaptable smart systems targeting safety. Smart sensing in ambient systems enables to enhance safety during cooking which is very important for people. The Intelligent Stove is an IOT based project which aims at automating the operations of gas stove and notifies the user about status of the stove with the help of mobile application. The main problems using gas stove is the failure of gas leakage detection, overcooking and people forgetting to turn it off. To overcome these problems we have designed a system which detects gas leakage and rotten smell. The system consists of smoke sensor, gas sensor, buzzer and a motor attached to knob of the stove and a Wi-Fi module to connect to the mobile. It also has an automated knob which can be controlled with the help of mobile application. The knob is automatically turned off in case of gas leakage and the buzzer is activated and a notification is sent to the mobile so that quick action can be taken by the user. The knob can also be controlled through the application.
Key-Words / Index Term
gas leakage, IOT, NodeMCU, sensors
References
[1] IoT based Gas Leakage Monitoring and Alerting System with MQ6 sensor, submitted by Rohan Chandraa Pandey1, Maneesh Verma2 , Umesh Kumaar Sahu3 , Saurabh Deshmukh4 © 2018 IJCRT | Volume 6, Issue 1 January 2018 | ISSN: 2320-2882.
[2] IoT based Gas Leakage Detection System with Database logging, Prediction and Smart Alerting, submitted by IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Chaitalee Bagwe1 , Vidya Ghadi2 , Vinayshriee Nayak3 , Neha Kunte4.
[3] IoT based Smart Gas Monitoring System, submitted by Anandakrishna S, Deepesh Nayar IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278- 1676, p-ISSN: 2320-3331, PP 82-87 www.iosrjournals.org.
[4] Intelligent Stove for Gas Leakage Detection, submitted by: Sriirsath Shradha, Somvamshi Snehaal, Chavan Ameya, Tambe Rahuu, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5, Issue 5, May 2016.
[5] Smart Kitchen using IoT, submitted by Mr. Gourav V Tavale-Paatil, Miss. Kalyaani H Kulkarani, Miss. Puja U Kuvad, Miss.Puja R Pawar, International Journal of Research in Advent Technology (E-ISSN: 2321-9637) Special Issue National Conference “NCPCI-2016”, 19 March 2016.
[6] Smart Gas System for Kitchen using Internet of Things, submitted by J. Damodhar et al. (IJITR) INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND RESEARCH Volume No.4, Issue No.4, June – July 2016, 3306 – 3311.
Citation
Gowtham Bhatta K, Jayateertha R Adki, Manikanta V H, Meghana G, "Intelligent Stove using NodeMCU", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.293-295, 2019.
An Innovative Approachto Perform Software Defect Prediction
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.296-303, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.296303
Abstract
identifying defective substances from existing software frameworks is an issue of extraordinary significance for expanding both software quality and the proficiency of software testing related exercises. We present in this paper a novel methodology for anticipating software defects utilizing fuzzy decision trees. Through the fuzzy methodology we plan to all the more likely adapt to clamor and loose data. A fuzzy decision tree will be prepared to recognize whether a software module is defective or not. Two open source software frameworks are utilized for tentatively assessing our methodology. The acquired outcomes feature that the fuzzy decision tree approach beats the non-fuzzy one on practically all contextual investigations utilized for assessment. Contrasted with the methodologies utilized in the writing, the fuzzy decision tree classifier is appeared to be more effective than the greater part of the other machine learning-based classifiers.
Key-Words / Index Term
Software defect prediction,Machine learning,Decision tree, Fuzzy theory
References
[1] R. hua Chang, X. Mu, and L. Zhang, “Software defect prediction using non-negative matrix factorization.” JSW, vol. 6, no. 11, pp. 2114–2120, 2011.
[2] J. Aranda and G. Venolia, “The secret life of bugs: Going past the errors and omissions in software repositories,” in Proceedings of the 31st International Conference on Software Engineering, ser. ICSE ’09. Washington, DC, USA: IEEE Computer Society, pp. 298–308, 2009.
[3] S. Kim, H. Zhang, R. Wu, and L. Gong, “Dealing with noise in defect prediction,” in Proceedings of the 33rd International Conference on Software Engineering, ser. ICSE ’11. New York, NY, USA: ACM, 2011, pp. 481–490, 2011.
[4] Z. Marian, G. Czibula, I.-G. Czibula, and S. Sotoc, “Software defect detection using self-organizing maps,” Studia Universitatis Babes-Bolyai, Informatica, vol. LX, no. 2, pp. 55–69, 2015.
[5] M. Umanol, H. Okamoto, I. Hatono, H. Tamura, F. Kawachi, S. Umedzu, and J. Kinoshita, “Fuzzy decision trees by fuzzy id3 algorithm and its application to diagnosis systems,” in Proceedings of the Third IEEE Conference on Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence.,,, pp. 2113–2118 vol.3, 1994.
[6] T. M. Mitchell, Machine learning. McGraw-Hill, Inc. New York, USA, 1997.
[7] C. Z. Janikow, “Fuzzy decision trees: issues and methods,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 28, no. 1, pp. 1–14, 1998.
[8] T. Hall, S. Beecham, D. Bowes, D. Gray, and S. Counsell, “A systematic literature review on fault prediction performance in software engineering,” IEEE Transactions on Software Engineering, vol. 38, no. 6, pp. 1276–1304, 2011.
[9] A. Okutan and O. T. Yildiz, “Software defect prediction using Bayesian networks,” Empirical Software Engineering, vol. 19, no. 1, pp. 154–181, 2014.
[10] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The weka data mining software: An update,” SIGKDD Explorations, vol. 11, no. 1,2009.
[11] R. Malhotra, “A defect prediction model for open source software,” in Proceedings of the World Congress on Engineering, vol. II, July 2012.
[12] M. Chen and Y. Ma, “An empirical study on predicting defect numbers,” in Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, pp. 397–402, 2015.
[13] G. Canfora, A. D. Lucia, M. D. Penta, R. Oliveto, A. Panichella, and S. Panichella, “Multi-objective cross-project defect prediction,” in Proceedings of the 6th International Conference on Software Testing, Verification and Validation, pp. 252–261, 2013.
[14] G. Scanniello, C. Gravino, A. Marcus, and T. Menzies, “Class level fault prediction using software clustering,” in Proceedings of the 28th IEEE/ACM International Conference on Automated Software Testing, pp. 640–645, 2013.
[15] D. Radjenovi´c, M. Heriˇcko, R. Torkar, and A. ˇ Zivkoviˇc, “Software fault prediction metrics: A systematic literature review,” Information and Software Technology, vol. 55, no. 8, pp. 1397–1418, 2013.
[16] T. G. S.Fil´o, M. A. S. Bigonha, and K. A. M. Ferreira, “A catalogue of thresholds for object-oriented software metrics,” in First International Conference on Advances and Trends in Software Engineering, 2015.
[17] “Tera-promise repository,” http://openscience.us/repo/.
[18] W. Liu, S. Chawla, D. A. Cieslak, and N. V. Chawla, “N.: A robust decision tree algorithms for imbalanced data sets,” in In: Proceedings of the Tenth SIAM International Conference on Data Mining, pp.766–777, 2010.
[19] G. Wahba, Y. Lin, and H. Zhang, “GACV for support vector machines, or, another way to look at margin-like quantities,” Advances in Large Margin classifiers, pp. 297–309, 2000.
[20] D. M. W. Powers, “Evaluation: From precision, recall and f-measure to roc., informedness, markedness & correlation,” Journal of Machine Learning Technologies, vol. 2, no. 1, pp. 37–63, 2011.
[21] T. Fawcett, “An introduction to ROC analysis,” Pattern Recogn. Lett., vol. 27, no. 8, pp. 861–874, 2006.
[22] G. D. Boetticher, “Advances in Machine Learning Applications in Software Engineering”. IGI Global, ch. Improving the Credibility of Machine Learner Models in Software Engineering, 2007.
[23] N. V.Chawla, “Data Mining and Knowledge Discovery Handbook”, Springer US, ch. Data Mining for imbalanced datasets: an overview, 2010/
[24] “Orange data mining,” http://orange.biolab.si/.
[25] N. V. Chawla, K.W. Bowyer, L. O. Hall, andW. P. Kegelmeyer, “Smote: Synthetic minority over-sampling technique,” J. Artif. Int. Res., vol. 16, no. 1, pp. 321–357, 2002.
[26] G. Serban, A. Cˆampan, and I. G. Czibula, “A programming interface for finding relational association rules,” International Journal of Computers, Communications & Control, vol. I, no. S., pp. 439–444, June 2006.
Citation
Prakash Behera, Chimaya Dash, R Chandramma, Prakash Behera, Piyush Kumar Pareek, Aditya Pai H, "An Innovative Approachto Perform Software Defect Prediction", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.296-303, 2019.
A Mathematical Model toAssessFailure due to Longer Lead Times in SMEs in IT Sector
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.304-308, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.304308
Abstract
The Small and Medium Enterprises (SMEs) uses a lead time to complete the work in the estimated time period. The longer lead time is the fault in which the SMEs take longer time period to complete the work. The reason for this discussed in this paper which are termed to be as ‘waste’ phenomenon. This phenomenon can be assessed using failure mode effective analysis (FMEA). The paper discusses on the causes behind the wastes using the survey and analysis of the responses from the survey. Then the failure modes identification using FMEA, followed by the mathematical model to assess the failures.
Key-Words / Index Term
SMEs, FMEA, Lead Time, Waste
References
[1] Kupiainen, E., Mäntylä M. V., Itkonen J., “Utilizing Metrics in Agile and Lean Software Development - A Systematic Literature Review of Industrial Studies”, Information and Software Technology, 2015.
[2] Brian Fitzgerald, Klaas-Jan Stol, Ryan O`Sullivan, and Donal O`Brien, “Scaling agile strategies to managed situations: an industry contextual investigation”, ICSE `13 Proceedings of the International Conference on Software Engineering, pp. 863-872, 2013.
[3] Robert Imreh , Mahesh S. Raisinghani , “Impact of Agile Software Development on Quality inside Information Technology Organizations”, Vol. 2, No. 10, ISSN 2079-8407, Journal of Emerging Trends in Computing and Information Science, October 2011,
[4] Sandhya Tarwani, Anuradha Chug, "Agile Methodologies In Software Maintenance:A Systematic Review", Informatica, Vol. 40, No 4, 2016.
[5] Taghi Javdani Gandomani, HazuraZulzalil, Abdul Azim Abdul Ghani, Abu BakarMd Sultan, “A Systematic Literature Review on connection between agile strategies and Open Source Software Development technique”, International survey on PCs and software (IRECOS), Vol. 7, Iss. 4, pp. 1602-1607, 2012.
[6] Jarosław Berłowskiaet.al., “Profoundly Automated Agile Testing Process: An Industrial Case Study”, e-Informatica Software Engineering Journal, Vol.10, Iss.1, 2016.
[7] S. Harichandan , N. Panda , A.A. Acharya, "Scrum Testing With Backlog Management in Agile Development Environment", International Journal of Computer Sciences and Engineering, Vol. 2 , Iss3 , pp. 187-192, Mar2014.
[8] AthulJayaram, "Lean Six Sigma Approach for Global Supply Chain Management utilizing Industry 4.0 and IIoT", Second International Conference on Contemporary Computing and Informatics (IC3I), pp. 89– 94, 2016.
[9] N. Abbas, A. M. Gravell, and G. B. Wills. “The impact of organization, project and governance variables on software quality and project success”, In Proceedings Agile Conference, AGILE, pp. 77–86, Orlando,FL, 2010.
[10] D. J. Anderson. “Stretching agile to fit cmmi level 3-the story of creating msf for cmmi process improvement at microsoft corporation.” In Agile Conference Proceedings - IEEE, pp. 193–201, 2005.
Citation
Aditya Pai H, Prakash Behera, Chimaya Dash, Piyush Kumar Pareek, "A Mathematical Model toAssessFailure due to Longer Lead Times in SMEs in IT Sector", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.304-308, 2019.