Adaptation of Six Sigma Method in Software Development
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.309-314, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.309314
Abstract
The six sigma is used in targeting the business process of the organization by reducing and fixing the defects being occurred by driving the six standard deviations among the mean and its specification limit, which is why it is known to be six. The research study of the paper suggests the application aspect in the software development that are proven to be eliminating the final defects from the overall products be delivered thus by reducing the variations.
Key-Words / Index Term
Agile, Lean, Six Sigma, Software Development
References
[1] Tauseef Aized, “Total Quality Management nd Six Sigma”, First Edition, Croatia, InTech, 2012.
[2] George Eckes, “The Six Sigma Revolution”, John Wiley & Sons, USA, 2001.
[3] Dr. Amit Gupta and Yogesh Bhardwaj, “Total Quality Managemen& Six Sigma Instrument”, IJMBS, Vol. 3, Iss. 4, Dec 2013.
[4] Rafa E. Al-Qutaish and Khalid T. Al-Sarayreh, “Applying Six Sigma Concepts to the Software Engineering: Myths and Facts”, 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS ’08), University of Cambridge, UK, 2008.
[5] Antonio Carlos Tonini, Mauro de Mesquita Spinola, Fernando Jose Barbin Laurindo, “Six Sigma and software development process DMAIC improvements”, Presented at: Technology Management for the Global Future [online], available at: https://www.researchgate.net.
[6] Ivan Marsic, “Software Engineering”, Rutgers University, USA, 2012.
[7] Jiju Antony and Maneesh Kumar, “Lean Six Sigma: Research and Practice”, BookBoon.com, UK, 2011.
[8] Mark Richards, “Software Architecture Patterns”, First Edition, O’Reilly Media, USA, 2015.
[9] Informit.com, “Software Quality Metrics Overview”, [online] Available: http://www.informit.com/articles/article.aspx?p=30306, 2002.
Citation
Aditya Pai H, Chimaya Dash, Prakash Behera, Piyush Kumar Pareek, "Adaptation of Six Sigma Method in Software Development", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.309-314, 2019.
Cross Layer Routing Protocol in WSN - Performance analysis
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.315-319, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.315319
Abstract
Wireless Sensor Network (WSN) is a self-configuring network of small sensor nodes communicating among themselves using radio signals and deployed in quantity to sense, monitor and understand the physical condition. In this paper, much of interest is shown towards the design of WSNs by using cross layer Adaptive Dynamic Retransmission technique. The objective of the work is to compare the performance of the DSR (Dynamic Source Routing) and PSR (Proactive Source Routing) protocol with the proposed work. The DSR and PSR protocols consumes more energy, hence it is required to design an energy efficient routing protocol for WSN. The performance of above mentioned techniques is compared on basis of parameters such as Throughput, Packet Delivery Ratio, Packet Loss Ratio and End to End Delay. Mechanism of the proposed work is adapted to transmit power between two nodes and to utilize the transmitted energy efficiently by making use of adaptive Dynamic Retransmission technique.
Key-Words / Index Term
Wireless Sensor Networks (WSN), Cross Layer Protocol (CLP), Adaptive Retransmission, Dynamic Source Routing (DSR), Destination Sequenced Distance Vector (DSDV)
References
[1] Yong Yuan, Zhihai He and Min Chen, “Virtual MIMO-based Cross Layer Design for Wireless Sensor Networks”, July 14, 2005.
[2] Surekha K B and T G Basavaraju, “Energy Efficient Cross Layer Routing Protocol with Adaptive Dynamic Retransmission for Wireless Sensor Networks”, IJCNWC ISSN: 2250-3501, Vol.4, No2, and April 2014.
[3] Guowei Wu, Feng Xia, Lin Yao, Yan Zhang and Yabwei Zhu, “A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks”, National Science Foundation, 60903153.
[4] Philipp Hurni, Torsten Braun, Bharat K. Bhargava and Yu Zhang, “Multi-Hop Cross-Layer Design in Wireless Sensor Networks: A case Study”, 7th Framework programme of the European Union, ICT-2008-224460 (WISEBED), United States National Science Foundation, ANI-0219110, IIS-0209059.
[5] Sanjeev Puri and S.P. Tripathi, “Adaptive Scalable Cross Layer Framework for Multi-hop Wireless Sensor Networks”, IACSIT International Journal of Engineering and Technology, Vol.3, No.3, June 2011.
[6] Ling Tan, Huiqiang Tang and Yujuan Liu, “Energy-Efficient Wireless Sensor Networks: A Novel Dynamic Clustered and Cross-Layer Cooperation Approach”, International Journal of Advancement in Computing Technology-IJACT, Vol.3, No.9, October 2011.
[7] Fatma Bouabdallah, Nizar Bouabdallah and Raouf Boutaba, “Cross-Layer Design for Energy Conservation in Wireless Sensor Networkss”.
[8] S.C. Chabalala, T.N. Muddenahalli and F. Takawira, “Energy-Efficient Dynamic Source Routing Protocol for Wireless Sensor Networks”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.10, October 2012.
[9] Zehua Wang, Yuanzhu Chen, and Cheng Li, “PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks”, IEEE Transactions On Vehicular Technology, Vol. 63, No. 2, February 2014
[10] Hussein Mohammed Salman, “Survey of routing protocols in wireless sensor networks”, International Journal of Sensors and Sensor Networks, 2014; 2(1): 1-6.
Citation
Lokesh S, Yuvaraju B N, "Cross Layer Routing Protocol in WSN - Performance analysis", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.315-319, 2019.
Traffic Signal Control Based on Vehicle Detection Algorithm & IOT
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.320-324, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.320324
Abstract
The fast development of road infrastructure, the volume of vehicle on the road network increases which leads to traffic Congestion. The same scenario exists in the Bangalore of India. Traffic congestions are amongst the top list of the problems faced in other Indian cities such as Mumbai,Delhi,Pune etc. This is mainly caused due to the rapid up rise in the number of vehicles in a short span of time. To overcome such impact of traffic congestions, it is required to develop an IoT and Vehicle detection-based algorithm traffic control system. The proposed system would be based on the measurement of the actual traffic density on the road. This would be achieved using a real time video and image processing techniques with machine learning algorithms. Propose a fast vehicle flow detection algorithm based on a learnt background dictionary. The proposed detection algorithm detects vehicles by background dictionary and has a robust and best performance in real-time. Combining the virtual region and the virtual detection line, the proposed detection algorithm is robust in accuracy.The theme is to control the traffic by determining the traffic density on each side of the road and enabling a controlling option of the traffic signal to the user through a software application and Raspberry Pi3
Key-Words / Index Term
IOT(Internet Of Things), Image processing, machine Learning, sensors, web application server
References
[1] Dr.Brenner,”Consultant for Intelligent Transportation System Studies,”Muscat, 2015.
[2] Divya Vani P., Aruna. K. and Ragvendra Rao K., ”Internet of Things-APractical Approach to Certain Cloud Services using CC3200,” Internet ofThings-A Practical Approach to Certain Cloud Services using CC3200-Volume 117 No. 10 , 2017.
[3] S. Kumar Janahan, M. R.M. Veeramanickam, S. Arun, K. Narayanan, R.Anandan and S. Javed Parvez, ”IoT based smart traffic signal monitoringsystem using vehicles counts”, International Journal of Engineering andTechnology, vol. 7, no. 221, p. 309, 2018.
[4] Ashok P.V, SivaSankari. S and V. M. S. Sankaranarayanan,”IoT BasedTraffic Signalling System,” International Journal of Applied EngineeringResearch ISSN 0973-4562 Volume 12, Issue 19 (2017) pp. 8264-8269.
[5] V. Srinivasan, Y. Priyadharshini Rajesh, S. Yuvaraj and M. Manigandan”Smart traffic control with ambulance detection”, IOP ConferenceSeries: Materials Science and Engineering, vol. 402, p. 012015, 2018.
[6] R. P. Nimkar and C. N. Deshmukh,”Traffic Density Monitoring AndCattle Menace Alert System Using Iot”, International Journal of Researchin Engineering and Technology, pp. 96-104, 2018.
[7] K. Ramachandran and R. Priya,”Iot Based Traffic Management SystemAnd Congestion Control,” International Consortium of Scientists andResearchers, Volume 3, Issue 1, Dec, 2017
[8] N. Choosri, Y. Park, S. Grudpan, P. Chuarjedton, and A. Ongvisesphaiboon,”IoT-RFID Testbed for Supporting Traffic Light Control,”International Journal of Information and Electronics Engineering, Vol.5, No. 2, March 2015.
[9] M. Lakshminarasimhan, ”Advanced Traffic Management System UsingInternet of Things,” Researchgate, March 2016
[10] JU Yong-feng, ZHU Hui, PAN Yong. Vehicle flow detectionalgorithm based on computer vision[J]. Journal of Chang’anUniversity (Natural Science Edition), 2004, 24(1):92-95.
[12] Michalopoulos P G. Fiedld deployment of UTOSCOPE, in theFAST-TRAC ATMS/ATIS program[J]. Traffic engineering andControl, 1992, (9): 475-483.
[13] Du Yuren, Zhou Aijun. Atracking method of mobile vehicle based onvideo sequence images[J]. Journal Of Electron IC MeasurementandInstrument, 2009, 23(03): 45-48.
[14] Ribaric S, Adrinek G, Segvic S. Real-time active visual trackingsystem[C] IEEE Melecon. Vol. 1. May, 2004: 231-234.
[15] Jiang Han-xiang, WANG Shao-na, HUANG Ying, et. NitrationProcess and Structural Analysis on MnN. Journal of ChongqingUniversity, 2004, 2(05):31-33, 73.
[16] YangXuechao, Liu Wenping. Moving objects detection technology invideo sequen[J[. Computer Applications and Software, 2008, 25(1):215-218. (in Chinese)
[17] ZHU Hua-shengYE Jun. Adaptive vehicle detection and trafficstatistics algorithm based on improved Gaussian model[J].LASER&INFRARED, 2013, 43(10):1180-1183.
[18] LIU Jia-hui, LI Zhi. Application of Elastic Stress Absorbing Layer toDeal with Old Pavement[J]. Science Technology and Engineering,2010, 23(10): 5814-5817.
[19] WREN C, AZARBAYEJANI A, DARREL T, et al. Pfinder: real-timetracking of the human body[J]. IEEE Transactions on PatternAnalysis and Machine Intelligence, 1997, 19(7): 780-785.
[20] YANG Jun, SHI Zhong-ke. Improved Single Gaussian Method forTraffic Background Extraction[J]. ACTA PHOTONICA SINICA,2009, 38(5):1293-1296.
[21] Ramalingam S, Varsani V. Vehicle detection for traffic flowanalysis[C]// IEEE International Carnahan Conference on SecurityTechnology. IEEE, 2016:1-8.
[21] Jiang Peng, Qin Xiaolin. Robust foreground detection with adaptivethreshold estimation[J]. Journal of Image and Graphics, 2011,16(1):37-43.
[23] Jiang C., Ward M.O. Shadow Identification. Proceedings of 1992IEEE Computer Society Conference on Computer Vision and PatternRecognition. 1992, pp.606-612.
[24] Lea G.F., Bafcsy R. Combining Color and Geometry for the Active,Visual Recognition of Shadows, Proceedings of the 5th InternationalCongerence on Computer Vision. 1995, pp.203-209.
[25] Sonnoda Y., Ogata.T. Separation of Moving bjects and their Shadows,and Application to Tracking of Loci in the Monitoring Images.Proceedings of 1998 IEEE International Conference on SignalProcessing. 1998, pp.1261-1264.
Citation
Basavaraja CG, Mangala CN, "Traffic Signal Control Based on Vehicle Detection Algorithm & IOT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.320-324, 2019.
Garbage Management using Internet of Things
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.325-328, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.325328
Abstract
The garbage bins placed at public or in a campus places are overflowing and it creates unhygienic conditions and also ugliness to that place. At the same time bad smell is spread with diseases. To avoid all such situations a project called Garbage collection bin overflow indicator using IOT (Internet of Things) technology can be implemented. Resultantly, smart cities with smart waste management systems can be implemented. One of the applications of IoT is the effectivein management of garbage for healthy environment for life on this green planet with greater efficiency. The purpose is to develop an IoT based costeffective system that can monitor the everyday garbage in real time by using smart technology with the help of android and web applicationand Ultrasonic sensors.
Key-Words / Index Term
IoT(Internet of Things); garbage monitoring; Ultrasonic sensor, Android and web application
References
[1]S.S.Navghane1,M.S.Killedar2,Dr.V.M.Rohokale3. ”IoT Based Smart Garbage and Waste Collection Bin” , ISSN: 2278 – 909X, International Journal of Advanced Research in Electronics and Communication Engineering(IJARECE), Volume 5, Issue 5, May 2018.
[2]Prof. Dr. Sandeep M. Chaware1, Shriram Dighe2, Akshay Joshi3, Namrata Bajare4, Rohini Korke5, “Smart Garbage Monitoring System using Internet of Things (IOT)” ,International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering ISO3297:2007 Certified Vol. 5, Issue 1, January 2018, ISSN(Online) 2321 – 2004 ISSN (Print) 2321 – 55263.
[3]Vishesh Kumar Kurre1 “Smart Garbage Collection Binoverflows Indicator using IOT” , International Research Journal of Engineering and Technology (IRJET), Volume:03 Issue: 05 | May-2017, e-ISSN: 2395 -0056
[4]P.R. Naregalkar, Krishna Kishore
Thanvi, Rajat Srivastava, “IOT Based Smart Garbage Monitoring System” , International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO 3297: 2007 Certified Organization) Vol. 6, Issue 5, May 2017
[5]SomuDhana Satyamanikanta1, M.Narayanan2, ”smart arbage monitoring system using sensors with rfid over internet of things”, Journal of Advanced Research in Dynamical and Control Systems Vol. 9. Sp– 6 / 2017
[6]Akash k t, Dineshchoudhari S Y, Sandeep C U, Prof. Rashmi.P.M. ” IOT BASED GARBAG MONITORING SYSTEM”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 6, Issue 4, April 2017, ISSN: 2278 – 1323.
[7]. A Anitha,” Garbage monitoring system using IoT”, 14thICSET-2017, IOP Conf. Series: Materials Science andEngineering 263 (2016) 042027 doi:10.1088/1757-899X/263/4/042027
[8]. Ruhin Mary Saji1 , Drishya Gopakumar2 , Harish KumarS3 , K N Mohammed Sayed4 , Lakshmi s5,” ASurveyonSmart Garbage Management in Cities using IoT”,International Journal Of Engineering And ComputerScience ISSN: 2319-7242 Volume 5 Issue 11 Nov. 2016,Page No. 18749-18754(2017).
[9].Shashank Shukla, Neeraj Shukla, PhD,” Smart Waste Collection System based on IoT (Internet of Things): A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 162 – No 3, March 2016.
[10]Vikrant Bhor, PankajMorajkar, MaheshwarGurav, Dishant Pandya, “Smart Garbage Management System”,International Journal of EnginneringReasarchandtechnology(IJERT) ISSN: 2278 -0181 Vol..4 Issue03, March-201611. S. Raza, L.Wallgren, and T. Voigt, “SVELTE: Real-Time Intrusion Detection in the InternetofThings”, Ad Hoc Networks, Elsevier, pp 2661–2674, May 2016.]
Citation
D. Chaitra, ChetanaSrinivas, "Garbage Management using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.325-328, 2019.
Smart Parking Sensors, Technologies and Application Based IoT
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.329-333, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.329333
Abstract
the major problem in day to day life is parking of vehicles especially the car parking at an particular place. And this issue indirectly leads to traffic congestion. A basic concept of using IoT insmart parking services in the smart cities as an important application of the Internet of Things (IoT). the system can will be accessible through a mobile app or through the webpage and it can be used to monitor then to find the empty slots in that area. the user can be parking their vehicle in the empty slot through the mobile application and before only he can book his slot for the particular time in particular place.
Key-Words / Index Term
IoT Internet of things Car parking, Connectivity(c), Constrained Applicatio), Protocol (CoAP), End node(e), Hypertext transfer protocol(HTTP), Internet of Things (IoT), Internet protocol(IP), Message queuing transport telemetry protocol(MQTT), Processing node(p), Smart cities, Transmission control protocol(TCP),
References
[1] Zahid Mahmood1 ,Osama Haneef2 ,Nazeer Muhammad3 et al.,’towards a fully automated car parking system’, IET intel. Transp. Syst., 2019, vol. 13 iss.2, pp. 293-2302
[2]Muhammad, N., Bibi, N., Mahmood, Z., et al.: ‘Reversible integer wavelet transform for blind image hiding method’, 10.1371/journal.pone.0176979,2018
[3] Vijay Paidi1 ,Hasan Fleyeh2 ,Johan Hakansson3 ,Roger G.Nyber4 ,’smart parking sensors, technologies and application for open parking IoTs;a review’ IET intel. Transp. System 2018
[4] Alarik, O.: ‘Kameraövervakningslagen. 2018, https://
www.datainspektionen.se/lagar-och-regler/kameraovervakningslagen/,
accessed 25 February 2018
[5] Amir O. Kotb, Yao-Chun Shen, Xu Zhu, ‘iParker—A New Smart Car-Parking System Basedon Dynamic Resource allocation and pricing’
1524-9050 © 2017 IEEE
[6] National Travel Survey England, Department for Transport, London,
U.K.,Sep.2,2016[Online].Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/457752/nts2015-01.pdf.
[7] SFpark, 2015. Accessed on: Feb. 30, 2015. [Online]. Available: http://
sfpark.org/.
[8] G. M. Dias, B. Bellalta, and S. Oechsner, “Predicting occupancy trendsin Barcelona’s bicycle service stations using open data,” in Proc. SAIIntell. Syst. Conf. (IntelliSys), Nov. 2015, pp. 439–445.
[9] F. Marchal. (2014). Track matching. Accessed: Mar. 22, 2017. [Online].Available: https://mapmatching.3scale.net/
[10] Mahmood, Z., Khan, M., Jawad, M., et al.: ‘A parallel framework for objectdetection and recognition for secure vehicle parking’. 17th Int. Conf. on HighPerformance Computing and Communications (HPCC), New York, NY, USA,2014, pp. 892–895
[11]Statista: ‘Average age of light vehicles in the U.S. from 2003 to 2016 (in years)’, 2014, https://www.statista.com/statistics/261881/average-age-oflight-vehicles-in-the-united-states/, accessed 17 November 2017
[12] European Automobile Manufacturers Association: ‘Average vehicle age’,2013, http://www.acea.be/statistics/tag/category/average-vehicle-age,accessed 17 November 2013
[13] Thierer, A., Hagemann, R.: ‘Removing roadblocks to intelligent vehicles and driverless cars’, 2013
[14] Harding, J., Powell, G., Yoon, R., et al.: ‘Vehicle-to-vehicle communications: readiness of V2V technology for application’. 2012
[15] Gluer, S.I., Menendez, M., Meier, L.: ‘Using connected vehicle technology toimprove the efficiency of intersections’, Transp. Res. C, Emerge. Technol.,2014, 46, pp. 121–131
[16] Liu, K., Matty’s, G.: ‘Fast multiclass vehicle detection on aerial images’, IEEE Geosci. Remote Sens. Lett., 2015, 12, (9), pp. 1938–1942
[17] Zusheng, Z., Ming, T., Huaqiang, Y.: ‘A parking occupancy detectionalgorithm based on AMR sensor’, IEEE Sens. J., 2015, 15, (2), pp. 1261–1269
[18] Wen, X., Shao, L., Fang, W., et al.: ‘Efficient feature selection and
classification for vehicle detection’, IEEE Trans. Circuits Syst. Video
Technol., 2015, 25, (3), pp. 508–517
[19] Mahmood, Z., Nazeer, M., Arif, M.: ‘Boosting the accuracy of AdaBoost forobject detection and recognition’. 14th Int. Conf. on Frontiers of InformationTechnology (FIT), Islamabad, Pakistan, 2016, pp. 105–110[12] V. O. Ethos. (2015). Case Study: Guildford. Accessed: Apr. 26, 2015.[Online]. Available: http://geomii.co/case-study-1-guildford/
[20] Siemens. (2015). Integrated Smart Parking Solution. Accessed:
Apr.28,2017. [Online]. Available: www.mobility.siemens.com/mobility/
global/en/urbanmobility/roadsolutions/integratedsmartparkingsolution/Pages/integrated-smart-parking-solution.aspx
[21] Ford. (2015). Parking Spotter. Accessed: Apr. 28, 2017. [Online].
Available: https://media.ford.com/content/fordmedia/fna/us/en/news/
2015/01/06/mobility-experiment-parking-spotter-atlanta.html
[22] S. Parking. (2015). On-Street Parking. Accessed: Apr. 28, 2017.
[Online]. Available: http://www.smartparking.com/on-street
[23] Smart Santander. (2015). Santander Facility—Future Internet Researchand Experimentation. Accessed: Apr. 28, 2017. [Online]. Available:www.smartsantander.eu/index.php/testbeds/item/132-santandersummary
[24] P. Ball, R. Liao, C. Roman, S. Ou, and E. Pow, “Analysis of fixed andmobile sensor systems for parking space detection,” in Proc. 10th Int.
Symp. Commun. Syst., Netw. Digit. Signal Process. (CSNDSP), Jul. 2014,pp. 1–6.
[25] G. M. Dias, B. Bellalta, and S. Oechsner, “Predicting occupancy trendsin Barcelona’s bicycle service stations using open data,” in Proc. SAIIntell. Syst. Conf. (IntelliSys), Nov. 20145pp. 439–445.
[26] F. Marchal. (2014). Trackmatching. Accessed: Mar. 22, 2017. [Online].Available: https://mapmatching.3scale.net/
[27] P. Newson and J. Krumm, “Hidden Markov map matching through
noise and sparseness,” in Proc. 17th ACM SIGSPATIAL Int. Conf. Adv.
Geograph. Inf. Syst., New York, NY, USA, 2009, pp. 336–343.
[28] Idris, M., Leng, Y.Y., Tamil, E.M., et al.: ‘Саг park system: a review of smartparking system and its technology’, Inf. Technol. J., 2009, 8, (2), pp. 101–113
[29] Shaheen, S.: ‘Smart parking management field test: a bay area rapid transit(bart) district parking demonstration’ (Institute of Transportation Studies,Davis, CA, USA, 2005)
[30] Mouskos, K., Boile, M., Parker, N.A.: ‘Technical solutions to overcrowdedpark and ride facilities’ (New Jersey Department of Transportation, New
Jersey, NY, USA, 2007)
[31] Kianpisheh, A., Mustaffa, N., Limtrairut, P., et al.: ‘Smart parking system(SPS) architecture using ultrasonic detector’, Int. J. Softw. Eng. Appl., 2007,
6, (3), pp. 51–58[32] Idris, M., Tamil, E.M., Noor, N.M., et al.: ‘Parking guidance system utilizingwireless sensor network and ultrasonic sensor’, Inf. Technol. J., 2010, 8, (2),pp. 138–146
[33] Mathur, S., Jin, T., Kasturirangan, N., et al.: ‘Parknet: drive-by sensing ofroad-side parking statistics’. Proc. of the 8th Int. Conf. on Mobile Systems,Applications, and Services, ACM, San Francisco, CA, USA, 2010
[34] Waterson, B., Hansell, N., Chatterjee, K.: ‘Quantifying the potential savingsin travel time resulting from parking guidance systems-a simulation casestudy’, J. Oper. Res. Soc., 2001, 52, (10), pp. 1067–1077
[35] Rahman, M.S., Park, Y., Kim, K.-D.: ‘Relative location estimation of vehiclesin parking management system’. 11th Int. Conf. on IEEE AdvancedCommunication Technology, ICACT 2009, Phoenix Park, South Korea, 2009
Citation
Prakruthi G R, Arun biradar, "Smart Parking Sensors, Technologies and Application Based IoT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.329-333, 2019.
Survey: Proactive and Reactive Routing Protocols
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.334-338, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.334338
Abstract
Routing is a mechanism to build links or connections between two or more nodes with or without the infrastructure. A Routing algorithm is a method for determining the routing of packets in a node. For each node of network, the algorithm determines a routing table, which in each destination, matches an output line. The algorithm should lead to a consistent routing, that is to say without loop. This means that you should not route a packet a node to another node that could send back the package.There are three main types of routing algorithms- Vector (distance-vector routing),To link state (link state routing), Path to vector (path-vector routing).This paper focus on the survey of reactive and proactive routing protocols like OLSR, AODV, RIP, OSPF, DSR.
Key-Words / Index Term
DV,LSR,RIP,DSR, AODV
References
[1]. The AODV protocol is basically flat routing protocol so it does not require any inner organizational methodto handle the routing process.
[2]. In AODV routes established on demand and that destination sequence numbers are applied for find the latest route to thedestination.
[3]. The connection setup delay islower.
[4]. The AODV protocols are a loop free and avoid the counting to infinityproblem.
[5]. At most one route per destination maintain at each node.
[6]. It can lead to heavy controloverhead.
[7]. MorigereSubramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T.”Scenario Based Study of on denmand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards”ISSN: 2249-57 Vol 1(2), 128-135 published in October-november2011.
[8]. Ashish Bagwari,RamanJee,PankajJoshi,SourabhBisht “Performance of AODV Routing Protocol with increasing the MANET Nodes and it’s effects on QoS of Mobile Ad hoc Networks” 2012 International ConferenceonCommunicationSystemsandNetworkTechnologies.
[9]. XuHuang,MuhammadAhmedandDharmendraSharma”Protectingfrom Inside Attacks in Wireless Sensor Networks” 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10]. Naveen Bilandi and Harsh K Verma “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET” International Journal of Electronics and Computer Science Engineering 1660 ISSN- 2277-1956.
[11]. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao “A survey of black hole attacks in wireless mobile ad hoc networks” Tseng et al. Human- centric Computing and Information Sciences 2011, a Springer open journal.
[12]. Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala “DoS Attacksin Mobile Ad-hoc Networks: A Survey” 2012 Second International ConferenceonAdvancedComputing&CommunicationTechnologies.
[13]. Ashok M.Kanthe, Dina Simunic and Ramjee Prasad Comparison of AODV and DSR on-Demand Routing Protocols in Mobile Ad hoc Networks.
[14]. PremChandandM.K.Soni“PerformancecomparisonofAODVandDSR ON-DemandRoutingprotocolsforMobilead-hocnetworks”Published in July2012.
[15]. Michel Healy, Thomas News and Elfed Lewis “Security for Wireless Sensors Networks: A Review”.in Feb2009.
[16]. Harmandeep Singh, Gurpreetsingh and Manpreet Singh “Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack”International Journal of Computer Applications (0975 – 8887) Volume 42– No.18, March2012.
[17]. IrshadUllahShoia Ur Rehman “Analysis of Black Hole Attack on MANETs Using Different MANET RoutingProtocols”.
[18]. ShailyMittel and Prabhjot Kaur “Performance comparison of AODV, DSRandZRPRoutingprotocolinMANET’s”Publishedin2009.
[19]. NicklesBeijar “Zone Routing Protocol” Networking Laboratory, Helsinki University ofTechnology.
[20]. HimaniYadavandRakeshKumar“IdentificationandRemovalofBlack Hole Attack for Secure Communication in MANETs” Volume 3, Issue 9, September 2012, ISSN2047-3338.
Citation
Prapulla G, Prasanna Kumar M, "Survey: Proactive and Reactive Routing Protocols", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.334-338, 2019.
Digital Privacy and Security: A Survey on the Modern Threat on the Digitization
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.339-343, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.339343
Abstract
Today’s software industry is operating on loses because of a modern threat known as Digital Piracy. Not only the software industry, various sectors of the industry like the cinematography, authors, inventers and discoverers are facing a threat wherein their work may attain a global attention without bringing them anything. A recent studies has shown that due to recent craze of digitization and the socio-economic condition, people are more inclined towards acquiring everything without even giving it time and money. This is becoming a threat to the intellectual property owners. This paper is all about understanding the factors affecting digital piracy, the types of digital piracy and the various steps and measures needed to stop the digital piracy from spreading its wings.
Key-Words / Index Term
Piracy, factors, types, peer-to-peer applications, BitTorrent
References
[1] Sulaiman Al-Rafee, Timothy Paul Cronan, “Digital Piracy: Factors that Influence Attitude Toward Behaviour”, 2006
[2] Paul Kocher, Joshua Jaffe, Benjamin Jun, Carter Laren, Nate Lawson, “Self-Protecting Digital Content”,2003
[3] B. Srinivas, Dr. Koduganti Venkata Rao, Dr. P. Suresh Varma, “Piracy Detection and Prevention using SIFT Based On Earth Mover’s Distance”, 2012
[4] K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu, “BTM – An Automated Rule-based BT Monitoring System for Piracy Detection”, 2007
[5] A. Parker, Peer-to-Peer in 2005, CacheLogic Research, available at http://www.cachelogic.com/home/pages/studies/ 2005_01.php
[6] BitTorrent Protocol, BitTorrent.org, available at http://www.bit torrent.org/protocol.html
[7] Yawei Zhang, Lei Jin, Xiaojun Ye, “Software Piracy Prevention: Splitting on Client”, IEEE International Conference on Security Technology, December 13-15, 2008
[8] H. Chang and M. Atallah. Protecting software code by guards. Security and Privacy in Digital Rights Management,LNC S, 2320:160–175, 2002.
[9] George Coulouris, Jean Dollimore & Tim Kindberg. Election Algorithm, Bully Algo & Ring based algo. In Distributed Systems, 2006
[10] A. G., Galletta, D. F., & Thong, J. Y. L. “Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems”, 2003
[11] Leugimap, Why “Free Software” is better than “Open Source”, http://www.gnu.org/philosophy/freesoftware-forfreedom.html Free Software Foundation. October 6, 2004.
Citation
Soumee Maschatak, Chandan Raj BR, "Digital Privacy and Security: A Survey on the Modern Threat on the Digitization", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.339-343, 2019.
IOT and Agriculture Data Analysis for Smart Farm
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.344-348, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.344348
Abstract
IOT plays a important role in agriculture. IOT uses sensors which are capable of providing information about agriculture field. Smart farming is managing farms using technologies like IOT to increase the quantity and quality of products by improving yields of crops. Wireless sensor network are being proposed for watering of crops to increase the productivity and gives the new direction for research in agriculture and farming through a mobile application in a smartphone. Wisekar is used to detect the disease in crops and report the type of crop disease to the farmer. As Farmer is the backbone of our country this work help the farmers handle various operation wirelessly through mobile applications and providing smart agriculture to farmers.
Key-Words / Index Term
Smart farming;IOT(Internet Of Things); wireless sensor network; wisekar; Smartphone
References
[1] Muangprathub,J.,Boonnam,N.,Kajornkasirat,S.,Nillaor,p.,2018.IOT
and agriculture data analysis for smart farm. Comput. Electron. Agric.156,467-474.https://doi.org/10.1016/j.compag.2018.12.011.
[2] Kamilaris, A., Kartakoullis, A., Prenafeta-Bold, F.X., 2017. A review on the practice of big dataanalysis in agriculture. Comput. Electron. Agric. 143, 23–37.
[3]Xian, K., 2017. Internet of things online monitoring system based on cloud computing. Int. Jo. Online Eng. (iJOE) 13 (9), 123–131. https://doi.org/10.3991/ijoe.v13i09.7591.
[4] Capello, F., Toja, M., Trapani, N., 2016. A real-time monitoring service based on industrialinternet of things to manage agrifood logistics. In: 6th International Conference onInformation Systems, Logistics and Supply Chain, pp. 1–8
[5]Sarangi, S., Umadikar, J., Kar, S., 2016. Automation of agriculture support systems using Wisekar: case study of a crop-disease advisory service. Comput. Electron. Agric. 122, 200–210. https://doi.org/10.1016/j.compag.2016.01.009
[6] Ojha, T., Misra, S., Raghuwanshi, N.S., 2015. Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput. Electron. Agric. 118, 66–84.
[7]Luan, Q., Fang, X., Ye, C., Liu, Y., 2015. An integrated service system for agricultural droughtmonitoring and forecasting and irrigation amount forecasting. In: 23rd InternationalConference on Geoinformatics. IEEE, pp. 1–7.
[8] Lukas, Tanumihardja, W.A., Gunawan, E., 2015. On the application of IoT: monitoring of troughs water level using WSN. In: Conference on Wireless Sensors (ICWiSe). IEEE, pp. 58–62. https://doi.org/10.1109/ICWISE.2015.738035.
[9] Kanoun, O., Khriji, S., El Houssaini, D., Viehweger, C., Jmal, M.W., Abid, M., 2014. Precision irrigation based on wireless sensor network. IET Sci. Meas. Technol. 8, 98–106. https://doi.org/10.1049/iet-smt.2013.0137
[10] Pang, Z., Chen, Q., Han, W., Zheng, L., 2015. Value-centric design of the internet-of things solution for food supply Chain: value creation, sensor portfolio and information fusion. Inform. Syst. Front. 17, 289–319. https://doi.org/10.1007/s10796-012-9374-9.
[11] UCI Machine Learning Repository, 2015.
[12] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M., 2015. Internet of things: a survey on enabling technologies, protocols and applications. IEEE Commun. Surv. Tutorials. http://dx.doi.org/10.1109/COMST.2015.2444095.
[13] Chen, K.T., Zhang, H.H., Wu, T.T., Hu, J., Zhai, C.Y., Wang, D., 2014. Design of monitoring system for multilayer soil temperature and moisture based on WSN. In: International Conference on Wireless Communication and Sensor Network (WCSN). IEEE, Wuhan, pp. 425–430. https://doi.org/10.1109/WCSN.2014.9.
[14] Hashmi, N., Mazlan, S., Aziz, M.A., Salleh, A., Jaafar, A., Mohamad,N
2015. Agriculture monitoring system: a study. J. Teknologi 77, 53–59.
https://doi.org/10.11113/jt.v77.
[15] Kaewmard, N., Saiyod, S., 2014. Sensor data collection and irrigation control on vegetable cropusing smart phone and wireless sensor networks for smart farm. In: Conference on WirelessSensors (ICWiSE). IEEE, pp. 106–112.
[16]Surendrababu, V., Sumathi, C., Umapathy, E., 2014. Detection of rice leaf diseasesusing chaos and fractal dimension in image processing. Int. J. Comput. Sci. Eng.(IJCSE) 6 (1), 69–74.
[17]Adamala, S., Raghuwanshi, N.S., Mishra, A., 2014. Development of surface irrigationsystems design and evaluation software (SIDES). Comput. Electron. Agric. 100,100–109.
[18] Anandaraja, N., Sankri, S., Sriram, N., Venkatachalam, R., 2013. TNAU agri techportal: content design and validation. CSI Commun., 21–25.
[19] Surendrababu, V., Sumathi, C., Umapathy, E., 2014. Detection of rice leaf diseasesusing chaos and fractal dimension in image processing. Int. J. Comput. Sci. Eng.(IJCSE) 6 (1), 69–74.
[20] Sarangi, S., Kar, S., 2013. Wireless sensor knowledge archive. In: IEEE International Conference on Electronics, Computing and Communication Technology (CONECCT), pp. 1–6.
[21] Amaral, J.P., Oliveira, L.M.L., Rodrigues, J.J.P.C., Han, G., Shu, L., 2014. Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: Proceedings of International Communication on Communications, Sydney, Australia, pp. 1796–1801.
[22] Barcelo-Ordinas, J.M., Chanet, J.P., Hou, K.M., García-Vidal, J., 2013. A survey ofwireless sensor technologies applied to precision agriculture. In: Stafford, J.(Ed.), Precision Agriculture’13. Wageningen Academic Publishers, pp. 801–808.
[23] Bhargava, K., Kashyap, A., Gonsalves, T.A., 2014. Wireless sensor network based advisory system for apple scab prevention. In: Proceedings of National Conference on Communications, Kanpur, India, pp. 1–6.
[24] Bhave, A.G., Mishra, A., Raghuwanshi, N.S., 2013. A combined bottom-up and top-down approach for assessment of climate change adaptation options. J. Hydrol. http://dx.doi.org/10.1016/j.jhydrol.2013.08.039.
[25] Goumopoulos, C., O’Flynn, B., Kameas, A., 2014. Automated zone-specific irrigationwith wireless sensor/actuator network and adaptable decision support.Comput. Electron. Agric. 105, 20–33
[26] Dong, X., Vuran, M.C., Irmak, S., 2013. Autonomous precision agriculture throughintegration of wireless underground sensor networks with center pivotirrigation systems. Ad Hoc Netw. 11 (7), 1975–1987.
[27] Bhattacharjee, S., Roy, P., Ghosh, S., Misra, S., Obaidat, M.S., 2012. Wireless sensornetwork-based fire detection, alarming, monitoring and prevention system forBord-and-Pillar coal mines. J. Syst. Softw. 85 (3), 571–581.
[28] Misra, S., Jain, A., 2011. Policy controlled self-configuration in unattended wirelesssensor networks. J. Netw. Comput. Appl. 34 (5), 1530–1544.
[29] Fukatsu, T., Kiura, T., Hirafuji, M., 2011. A web-based sensor network system withdistributed data processing approach via web application. Comput. Stand.Interfaces 33 (6), 565–573
[30].Greenwood, D.J., Zhang, K., Hilton, H.W., Thompson, A.J., 2010. Opportunities forimproving irrigation efficiency with quantitative models, soil water sensors andwireless technology. J. Agric. Sci. 148, 1–16
Citation
Sowmyashree S, Arun Biradar, "IOT and Agriculture Data Analysis for Smart Farm", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.344-348, 2019.
Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.349-355, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.349355
Abstract
Major bank hacking cases and bank robbery is reported constantly. The digital forensic evidence is the most important thing for incident response. Therefore, this paper proposes IP (Internet Protocol) traceback technique for better digital forensic. The paper considers one of the most important components in the modern banking system, namely the direction related to ensuring the security of customer data. The number of bank cards is rapidly growing, and accordingly the network of automated teller machines (ATMs). There are smart cards, which provide higher reliability than cards with a magnetic line. This system allows the issuance of money to the client only when scanning his face. The explosive usage of mobile devices enables conducting electronic transactions involving direct signature on such devices. Thus, user signature verification becomes critical to ensure the success deployment of online transactions such as approving legal documents and authenticating financial transactions. This paper proposes a critical segment based online signature verification system to secure mobile transactions on multi-touch mobile devices. The system extracts useful features from a user’s signature that describe both the geometric layout of the signature as well as behavioral and physiological characteristics in the user’s signing process. The experimental evaluation provide signature verification and robust to signature forging attacks.
Key-Words / Index Term
digital forensic, IP traceback technique, financial network, financial institutions; biometric ATMs, online handwriting signatures, signature authentication, signature verification, critical segment
References
[1]. Sungmoon Kwon, Jaehan Jeong, Taeshik Shon. Digital Forensic Readiness for Financial Network, 2019 International Conference on Platform Technology and Service (PlatCon), 2019 IEEE.
[2]. Alexey V. Bataev. The Model of Assessing Economic Efficiency of Biometric ATMs, 2019 IEEE, pp. 1365-1370.
[3]. Yanzhi Ren, Chen Wang, Yingying Chen. Signature Verification Using Critical Segments for Securing Mobile Transactions, 2018 IEEE, pp. 1536-1233
[4]. Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson. Practical Network Support for IP Traceback, 2000
[5]. Andrey Belenky, Nirwan Ansari. IP Traceback With Deterministic Packet Marking, 2003 IEEE, pp. 62-64
[6]. Christiawan, Bayu Aji Sahar, Azel Fayyad Rahardian, Elvayandri Muchtar. Fingershield ATM – ATM Security System using Fingerprint Authentication.
[7]. Guang Yao, Jun Bi, Athanasios V. Vasilakos. Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter. 2014 IEEE
[8]. G. Renee Jebaline, S. Gomathi. A Novel Method to Enhance the Security of ATM using Biometrics, 2015 [ICCPCT]
[9]. H. Lasisi, A.A. Ajisafe. Development of Stripe Biometric based Fingerprint Authentications Systems in Automated Teller Machines, 2012 [ACTEA]
[10]. Akio Ogihara, Hiroyuki Matsumura, Akira Shiozaki. Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication, 2016 [ISPACS]
[11]. Apurva Taralekar, Gopalsingh Chouhan, Rutuja Tangade, Nikhilkumar Shardoor. One Touch Multi-banking Transaction ATM System using Biometric and GSM Authentication. 2017 (BID)
[12]. Christian Gruber, Thiemo Gruber, Sebastian Krinninger, Bernhard Sick. Online Signature Verification With Support Vector Machines Based on LCSS Kernel Functions, 2009 IEEE
[13]. Donato Impedovo and Giuseppe Pirlo, Automatic Signature Verification: The State of the Art, 2008 IEEE
[14]. Napa Sae-Bae, Nasir Memon, Online Signature Verification on Mobile Devices, 2014 IEEE
[15]. J. Sun, R. Zhang, J. Zhang, Y. Zhang. Touchin: Sightless two factor authentication on multi-touch mobile devices, in Proceedings of CNS, 2014.
[16]. N. L. Clarke, S. Furnell. Authentication of users on mobile telephones - a survey of attitudes and practices, Computers and Security, 2005.
[17]. T. Clancy, N. Kiyavash, and D. Lin. Secure smartcard-based fingerprint authentication in Proceedings of the ACM SIGMM workshop on Biometrics methods and applications, 2003.
[18]. G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, A. de Santos Sierra. Analysis of pattern recognition techniques for in-air signature biometrics, Pattern Recognition, 2011.
[19]. M. Shahzad, A. X. Liu, A. Samuel. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you cannot do it, in Proceedings of ACM MobiCom, 2013.
[20]. Yao, Guang, Jun Bi, Athanasios V. Vasilakos. Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter, IEEE Transactions on Information Forensics and Security 10.3 (2015): 471-484.
Citation
Pawanraj S P, Prasanna Kumar M, "Internet Protocol Traceback Technique and Signature & Biometric Authentication for Financial Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.349-355, 2019.
Enhancing the Lifetime of Underwater Wireless Sensor Networks
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.356-360, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.356360
Abstract
There is no denial in the fact that a huge portion of the underwater world whether its seas, oceans or rivers not been explored yet. In recent year, researchers are finding ways to explore and study the underwater resources. Underwater wireless sensor networks, developed for gathering information from the undersea environment. Due to the undersea environment features, enhancing the network lifetime is a significant object. In this paper a 3D node deployment strategy, an algorithm for relay node setting in underwater wireless sensor network (UWSN) with enhancing performance of routing in underwater wireless sensor network has presented. The 3D node deployment strategy targets 3D UWSN and not only improves the routing protocol performance in terms of end-to-end delay and energy consumption but also provides reliability in data transmission and increases network lifetime. For fixing a relay node in an appropriate place, an algorithm which is named Relay Node Setting Algorithm (RNSA) that works in a 3D UWSN has presented. The proposed algorithm for improving the network lifetime, upon entry the relay node, finds an appropriate place for it. Routing protocol performs route discovery and route maintenance phase which tries to minimize the network data and packet collision.
Key-Words / Index Term
Underwater Wireless Sensor Networks, Network Lifetime, 3D Node deployment, relay node, routing techniques
References
[1] P. Xie, Z. Zhou, N. Nicolaou, A. See, J. Cui and Z.Shi, "Efficient vector-based forwarding for underwater sensor networks," EURASIP Journal on Wireless Communications and Networking, vol.2010, pp. 1-13, 2010.
[2] J. M. Jornet, M. Stojanovic and M. Zorzi, "Focused beam routing protocol for underwater acoustic networks," in Proceedings of the Third ACM International Workshop on Underwater Networks, 2008, pp. 75-82
.
[3] H. Yan, Z. J. Shi and J. Cui, "DBR: Depth-based routing for underwater sensor networks," in NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Springer, 2008, pp. 72-86
.[4] M. Ayaz and A. Abdullah, "Hop-by-hop dynamic addressing based (H2-DAB) routing protocol for underwater wireless sensor networks," in Information and Multimedia Technology, 2009. ICIMT`09. International Conference on, 2009, pp. 436-441.
[5] N. Chirdchoo, W. Soh and K. C. Chua, "Sector-based routing with destination location prediction for underwater mobile networks," in Advanced Information Networking and Applications Workshops, 2009. WAINA`09. International Conference on, 2009, pp. 1148-1153.
[6] A. Wahid and K. Dongkyun, “Analyzing routing protocols for underwater wireless sensor networks,” International Journal of Communication Networks and Information Security Ijcnis2(3), 2010.
[7] B. Ayaz, A. Allen and M. Wiercigroch, "Dynamically
reconfigurable routing protocol design for underwater wireless sensor network," in International Conference on Sensing Technology, 2014.
[8] W. K. Seah and H. Tan, "Multipath virtual sink architecture for underwater sensor networks," in OCEANS 2006-Asia Pacific, 2007, pp. 1-6.
[9] D. Pompili, T. Melodia and I. F. Akyildiz, "A resilient routing algorithm for long-term applications in underwater sensor networks," in Proc. Of Mediterranean Ad Hoc Networking Workshop (Med- Hoc-Net), 2006.
[10] J. Chen, X. Wu and G. Chen, "REBAR: A reliable and energy balanced routing algorithm for UWSNs," in Grid and Cooperative Computing, 2008. GCC`08. Seventh International Conference on, 2008, pp. 349-355.
[11] G.-H. Lin and G. Xue, "Steiner tree problem with minimum number of Steiner points and bounded edge-length," Information Processing Letters, vol. 69, pp. 53-57, 1999.
[12] J. Tang, B. Hao, and A. Sen, "Relay node placement in large scale wireless sensor networks," Computer communications, vol. 29, pp. 490- 501, 2006.
[13] X. Han, X. Cao, E. L. Lloyd, and C.-C. Shen, "Fault-tolerant relay node placement in heterogeneous wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 9, pp. 643-656, 2010.
[14] K. Lu, G. Liu, R. Mao, and Y. Feng, "Relay node placement based on balancing power consumption in wireless sensor networks," IET wireless sensor systems, vol. 1, pp. 1-6, 2011.
[15] K. Suganthi and V. B. Sundaram, "A constraint based relay node deployment in heterogeneous wireless sensor networks for lifetime maximization," in Advanced Computing.
[16] S. Kohli, P. P. Bhattacharya, "Simulation and analysis of greedy routing protocol in view of energy consumption and network lifetime in three dimensional underwater wireless sensor network," Journal of Engineering Science and Technology, vol. 12, pp. 3068-3081, 2017.
[17] L. Liu, M. Ma, C. Liu, and Y. Shu, "Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks," IEEE Transactions on Communications, 2017.
[18] G.L.Saini, and Deepak Dembla, “Modeling, Implementation and Performance Evaluation of E-AODV Routing Protocol in MANETs,” International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, no.7, pp. 1221-1227, July 2013.
[19] Andrej Stefanov and Milica Stojanovic, “Design and Performance Analysis of Underwater Acoustic Networks,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 10, pp. 2012-2021, December 2011.
[20] Ruiqin Zhao, Yufei Hu, Xiaohong Shen and Haiyan Wang, “Research on Underwater Acoustic Networks Routing using Simulations,” IEEE International Conference on Signal Processing, Communication and Computing, vol. 3, no. 14, pp. 384-387, August 2012.
[21] P. Xie, Z. Zhou, Z. Peng, H. Yan, T. Hu, J. Cui, Z.Shi, Y.Fei and S. Zhou, "Aqua-Sim: An NS2 based simulator for underwater sensor networks," 2009.
[22] L. Liu, M. Ma, C. Liu, and Y. Shu, "Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks," IEEE Transactions on Communications, 2017.
[23] Beenish ayaz,Alastair allen,Marian Wiercigroch, “Improving Routing Performance of Underwater wireless sensor networks” 2017.
[24] Tanya Koohpayeh Araghi, Mazdak Zamani and Azizah BT Abdul Mnaf, “Performance Analysis in Reactive Routing Protocols in Wireless Mobile Ad Hoc Networks Using DSR, AODV and AOMDV,” International Conference on Informatics and Creative Multimedia, vol.3, no.8, pp 81-84, September 2013.
[25] R.Vithiya, G Sharmila, S.Karthika, “Enhancing the Performance of Routing Protocol in Underwater Acoustic Sensor Networks”.
[26] Z.Mohammadi, M.Soleimanpour-moghadam, S. Talebi, D.Abbasi-moghadam “A New Optimization Algorithm For Relay Node setting in Underwater Acoustic Sensor Networks” 2018 IEEE.
Citation
Yashwanth Kumar K S, Rajshekar S A, "Enhancing the Lifetime of Underwater Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.356-360, 2019.