Agriculture Portal for Decsion making, Plantation and Marketing of Crops
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.361-366, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.361366
Abstract
India is said to be a land of agriculture. Engineering techniques in agriculture brings a lot of advantages to the farmer. The proposed system aims to provide support to farmers during all three stages of farming preprocessing, plantation and post production. Preproduction support includes providing the various crop demand information to farmers through android application. The plantation support includes the automation in monitoring of crops and post production support includes providing the information regarding the market rates for every crop. Preproduction support has an algorithm that calculates the crop demand in real time considering the crop demand input from the surveys and the crops grown by various farmers. This information will be made available to farmers to help them choose the crop that is in demand and hence get a good profit at the end. The plantation support includes automatic irrigation based on dryness of land. The other plantation support includes the intruder detection, providing temperature sensing, humidity sensing and intruder detection. The post production support includes providing information regarding the market rate for various crops on their android phones.
Key-Words / Index Term
Agriculture, pre-production, decision making, demand and supply of crops, crop maintenance, market rate
References
[1] C. Brewster, I. Roussaki, N. Kalatzis, K. Doolin and K. Ellis, "IoTin Agriculture: Designing a Europe-Wide Large-Scale Pilot,"IEEE Communications Magazine, vol. 55, no. 9, pp. 26-33,2017.
[2] P. P. Ray, M. Mukherjee and L. Shu, "Internet of Things for Disaster Management: State-of-the-Art and Prospects," IEEE Access, vol. 5, pp. 18818-18835, 2017.
[3] J. Haxhibeqiri, A. Karaagac, F. Van den Abeele, W. Joseph, I. Moerman and J. Hoebeke, "LoRa indoor coverage and performance in an industrial environment: Case study," Proceedings of the IEEE International Conference on Emerging Technologies and Factory Automation, pp. 1-8, 2017.
[4] S. Persia, C. Carciofi and M. Faccioli, "NB-IoT and LoRA connectivity analysis for M2M/IoT smart grids applications," Proceedings of the AEIT International Annual Conference, pp.1-6, 2017.
[5] O. Georgiou and U. Raza, "Low Power Wide Area Network Analysis: Can LoRa Scale?," IEEE Wireless Communications Letters, vol. 6, no. 2, pp. 162-165, 2017.
[6] A. Makhoul and H. Harb, "Data Reduction in Sensor Networks:Performance Evaluation in a Real Environment," IEEEEmbedded Systems Letters, vol. 9, no. 4, pp. 101-104, 2017.
[7] Z. F. Liu, L. Wang, G. S. Xi, Z. Luo and Y. Li, "Temperature and Humidity Sensor Location Optimization Based on BP Neural Network," Proceedings of the International Conference on Instrumentation and Measurement, Computer,Communication and Control, pp. 283-287, 2015.
[8] A. A. Raorane, R. V. Kulkarni, "Data Mining: An effective tool for yield estimation in the agricultural sector", IJETTCS, vol. 1, no. 2, pp. 75-79, 2012
Citation
Gayathri R S, Mangala C N, "Agriculture Portal for Decsion making, Plantation and Marketing of Crops", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.361-366, 2019.
Implementing and Evaluating the Performance Metrics using Energy Consumption Protocols in MANETs using Multi-Path Routing- Fitness Function
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.367-372, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.367372
Abstract
The energy consumption plays a key role in Mobile Adhoc Network in a day to day life. Mobile Ad Hoc Network (MANET) structure is a temporary network organized dynamically with a possible set of wireless mobile nodes without depending on extra any infrastructural facilities and central administration requirements additionally based on the solutions to overcome the minimal energy consumption issues. Nodes are battery operated temporarily does not operated on permanent batteries, so energy consumed by a battery depends on the lifetime of the battery and its energy utilization dynamically decreases as the nodes change their position in MANETs. Multi-path routing algorithm in MANETs provides a best optimal; solution to transmit the information in multiple paths to minimize the end to end delay, reduce energy consumption and also increases life time of the network. The research mainly focused on minimum energy consumption techniques in MANET is of a great challenge in industries. In this paper, the author highlights a novel approach Adhoc on Demand Multipath Distance Vector (AOMDV) routing protocol to minimize energy consumption algorithm in MANET by incorporating the demand multipath distance and fitness function. The Adhoc on Demand Multipath Distance Vector-Fitness Function (AOMDV-FF) routing protocol short out the path that consumes minimum energy and the simulation performance is evaluated using network simulator 2 (NS2)tool. Two protocols are proposed in this work AOMDV and AOMDV-FF and compared their performance parameters such as energy consumption, throughput, packet delivery ratio, end to end delay, network life time and routing overhead in terms of speed, packet size and simulation time. The overall simulation results of the proposed AOMDV-FF method is considered a network with 49 nodes and the network performance factor-end to end delay 14.4358x10-3 sec, energy consumption 18.3673 joules, packet delivery ratio 0.9911 and routing overhead ratio 4.68 are evaluated the results show an improvement as compared to other methods AOMDV and AOMR-LM
Key-Words / Index Term
Energy Efficient, MANET, Multipath Routing, Fitness Function. Packet Delivery Ratio, Throughput
References
[1]. Aqeel Taha, Raed Alsaqour, Mueen Uddin, Mah Abdelhaq, And Tanzila Saba, ―Energy Efficie Multipath Routing Protocol for Mobile Ad-Ho Network Using the Fitness Function”, June 2 2017, Vol 5, pp 10369-10381, DOI 10.110 ACCESS. 2017.2707537.
[2]. ] J. Iswarya, R. Sureka, S. R. Santhalakshmi “Energy Efficiency Multipath Routing Protoco For Mobile Ad-Hoc Network Using The Fitnes Function”, International Journal of Innovative Research in Computer Science and Engineering (IJIRCSE) www.ioirp.com ISSN: 2394-6364, Vo
– 3, Issue – 3. PP 11- 15, May 2018.
[3]. MueenUddin, AqeelTaha, RaedAlsaqour, Tanzila Saba, “Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function”, DOI 10.1109 ACCESS.2017.2707537, IEEE Access.
[4]. Ramya.V, Sangeetha.M, Ms. A. Rajeswari M.E
―Energy Efficient Multipath Routing Protocol fo
Manet Using Fitness Function”, IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021 ISSN (p): 2278-8719 PP 59-63.
[5]. May Cho Aye and Aye Moe Aung, “Energy Efficient Multipath Routing For Mobile Ad Hoc Networks”, International Journal of Information Technology, Modeling and Computing Vol. 2 No.3, August 2014.
[6]. M. Tekaya, N. Tabbane, and S. Tabbane ‘‘Multipath routing mechanism with load balancing in ad hoc network’’, Int. Conf Comput. Eng. Syst (ICCES), pp 67–72 Nov 2010.
[7]. L. Gatani, G. L. Re, and S. Gaglio, „„Notice o violation of IEEE publication principles an adaptive routing protocol for ad hoc peer-to-pee network”, 6thIEEE Int. Symp. World Wireles Mobile Multimedia Netw, pp. 44–50, Jun. 2005,
[8]. Y. Chaba, R. B. Patel, and R. Gargi, „„Issues and challenges involved in multipath routing with DYMO protocol‟‟, Int. J. Inf. Technol. Knowl Manage, vol.5, no1, pp. 21–25, Jan/Jun. 2012.
[9]. S. Mueller, R. P. Tsang, and D. Ghosal
„„Multipath routing in mobile ad hoc networks Issues and challenges‟‟ in Performance Tool and Applications to Networked Systems. Berlin Germany: Springer, pp. 209–234, 2004.
[10]. V. Balaji, V. Duraisamy, „„Varying overhead ad hoc on demand vector routing in highly mobile ad hoc network‟‟, Jrn. Comput. Sci., vol. 7, no. 5 pp. 678–682, 2011.
[11]. S Carson, J Macker, “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evolution Considerations. RFC Editor, 1999
[12]. M Poonam, D Preeti, “Packet Forwarding using AOMDV algorithm in WSN”, Int. Jrn. Appl Innov Eng. Manage (IJAIEM), Vol 3, no. 5, pp. 456-459. May 2014.
[13]. Y.-F. Hu, Y.-S. Ding, L.-H.Ren, K.-R.Hao, H. Han, „„An endocrine cooperative particle swarm optimization algorithm for routing recovery problem of wireless sensor networks with multiple mobile sinks‟’ Inf. Sci., vol. 300, pp. 100–113, Apr. 2015.
[14]. Hiremath, P. S, Joshi, S. M, “Energy efficient routing protocol with adaptive fuzzy threshold energy for MANETs “, Intl Jrnal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol, 2, (2012).
[15]. A. Montazeri, J. Poshtan, A. Youse Koma,
``The use of `particle swarm` to optimize the control system in a PZT laminated plate``, Smart Mater. Struct., vol. 17, no. 4, p. 045027, 200
Citation
Mounika P, Prasanna Kumar M, "Implementing and Evaluating the Performance Metrics using Energy Consumption Protocols in MANETs using Multi-Path Routing- Fitness Function", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.367-372, 2019.
A Literature Survey on Road Accident Automobile Detection Using Image Processing and IoT
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.373-376, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.373376
Abstract
A lot of life loss due to road accidents every day because of careless drives of drivers, Human life most important to save and to know cause .A system with newer technology needs to be work effectively to save the life of the injured people. In this paper we have done survey over different method for road accident detection and proposed algorithm using IoT and Image technique .An intelligent accident detection system, when the accident is met the number plate of vehicle number is captured and converted to texted form and location is send it to the cloud and nearby police station.
Key-Words / Index Term
IOT, Raspberry pi
References
[1] World Health Rankings, “Health Profile: Pakistan,” Last accessed on 01 May 2017. [Online]. Available: http://www.worldlifeexpectancy.com/pakistan-road-traffic- accidents
[2].M.KhanandA.Tehreem,“CausesofroadaccidentsinPakistan,” Journal of Asian Development Studies, vol. 1, no. 1, pp. 22–29, 2012.
[3] World Health Organization, “Road traffic accidents,” Last accessed on 01 May 2017.
[4] H. Loimer and M. Guarnieri, “Accidents and acts of God: A history of the terms,” American Journal of Public Health, vol. 86, no. 1, pp. 101–107,1996.
[5] Y.Zia, M. Sabir, I.U. Saeedet al., “Pedestrian injuries and fatalitiesby patterns in reported road traffic crashes–Islamabad,” Journal of the PakistanMedicalAssociation,vol.64,no.10,pp.1162– 1165,2014.
[6] Department for Transport, “Facts on pedal cy- clists,” Last accessed on 01 May 2017.
[7] V. Melcher, F. Diederichs, R. Maestre, C. Hofmann, J.-M.Nacenta, J.vanGent,D.Kusic´,andB.Zˇagar,“Smartvitalsignsandaccident monitoring system for motorcyclists embedded in helmets and garmentsforadvancedecallemergencyassistanceandhealthanalysism onitoring,” ProcediaManufacturing,vol.3,pp.3208–3213,2015.
[8] Calaculateme, “Where do most car accidents happen?” Last accessed on 01 May 2017.
[9] Gaar Law Firm, “Common types of motor vehicle accidents,” Last accessedon01May2017
[10] W. Yun, Z. J. Piao, G. Lei, X. Y. Wang, Y. P. Kong, and C.Jiding, “Roadmortalitiesofvertebratespeciesonringchangbaimountainsceni c highway, Jilin province, China.” North-Western Journal of Zoology, vol. 9, no. 2,2013.
[11]J.Kioko, C.Kiffner,P.Phillips,C. Patterson- Abrolat,W.Collinson,and S. Katers, “Driver knowledge and attitudes on animal vehicle collisions in Northern Tanzania,” Tropical Conservation Science, vol. 8, no. 2, pp. 352–366, 2015.
[12] DelValleInstitute Office of Public Health Preparedness, “What is mass casualty incident?” Last accessed on 01 May 2017.
[13] HG.org legal resources, “Legally speaking, What is an act of God?” Last accessed on 01 May 2017.
[14] J. White, C. Thompson, H. Turner, B. Dougherty, and D. C. Schmidt, “Wreckwatch: Automatic traffic accident detection and notification with smartphones,” Mobile Networks and Applications, vol. 16, no. 3, p. 285, 2011.
[15] S. K. C. Varmaand T. V. Poornesh, “Harsha,AutomaticVehicle Accident Detection And Messaging System Using GPS and GSM Modems,”InternationalJournalofScientific&EngineeringResearch, vol.4,no.8, p. 1937,2013.
[16] V. Praveena, A. R. Sankar, S. Jeyabalaji, and V. Srivatsan, “Efficient accident detection and rescue system using ABEONA algorithm,” In- ternational Journal of Emerging Trends and Technology in Computer Science, vol. 3, no. 5,2014.
[17]J.B.Kenney,“Dedicated-shortrangecommunications (DSRC) standards in the United States,” Proceedings of the IEEE, vol. 99, no. 7, pp. 1162– 1182,2011.
[18] B. Fernandes, V. Gomes, J. Ferreira, and A. Oliveira, “Mobile applica- tion for automatic accident detection and multimodal alert,” inVehicular Technology Conference (VTC Spring). IEEE, 2015, pp.1–5.
Citation
Nagaraj B Kalligudd, Chetana Srinivas, "A Literature Survey on Road Accident Automobile Detection Using Image Processing and IoT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.373-376, 2019.
Performance Evaluation of Unicast Reactive Ad-hoc Routing Protocols for Underwater Wireless Sensor Networks
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.377-380, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.377380
Abstract
UWC (Under Water Communications) will enable many safety, military, Environmental and scientific applications. Instruments can be remotely controlled in ocean observatories using wireless signal transmission which is crucial and coordination of autonomous underwater vehicles and robots will be enabled, which plays the role of mobile nodes in future ocean observation networks with their re-configurability and flexibility. Underwater applications can be made viable with efficient communication protocols among underwater devices which are based on acoustic wireless technology with distance over one hundred meters will be enabled to make underwater applications viable because of its high attenuation and scattering which will affect radio and optical waves. New efficient and reliable communication protocols are required to network multiple devices which are mobile or static over the multiple hops which are required for the unique characteristics of an underwater acoustic channel, such as time varying multipath, fading, distance and limited dependent bandwidth and high propagation delays. For packet transmission, MANETs use varieties of routing protocols which are classified as pro-active, re-active and hybrid routing protocols. In this paper, two on-demand unicast reactive routing protocols are considered namely Ad-hoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) in order to evaluate their performance based on Quality of Service (QoS) for UWSN. Both AODV and DSR routing protocols are implemented on the basis of on-demand gateway discovery algorithm where each node can communicate with each other through the entry and exit point of a network as and when required. Through simulation with increasing the node density using ns2 network simulator, we perceive that the performance parameters of AODV and DSR routing protocols are analysed.
Key-Words / Index Term
Under Water Communication, Unicast, AODV, DSR, Ad-hoc
References
[1] J. Jornet, M. Stojanovic, and M. Zorzi “Focused Beam Routing Protocolfor Underwater Acoustic Networks,” Proc. IEEE INFOCOM , Phoenix, AZ, Apr 2008.
[2] S. Kumari, P. Boora and R. Singh “Ad Hoc Network Routing Protocols: An overview ”, International Journal of Technology and Applied Science, Vol.1, pp.19-23, 2010.
[3] R. Ahuja, “Simulation based performance Evaluation and Comparision of Reactive, Proactove, Hybrid Routing Protocols based on Random Waypoint Mobolity Model”, International Journal of Computer Applications, Vol.7_ pp20-24, 2010.
[4] H. Li and A. Dhavan, “MOSOR: A Secure On-Demand Routing Protocol for Mobile Multilevel Ad Hoc Networks ”, International Journal of Network Security, Vol.10, pp.121-134, 2010.
[5] C.E. Perkins and E. M. Royer, “Ad-hoc ON-Demand Distance Vector Routing”, Proc. 2nd IEEEWKsp. Mobile Comp. Sys. and Apps.,pp.99-100,1999.
[6] Royer, E.M. Chai-Keong Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, IEEE Personal Communications, vol. 6, pp.46-55, 1999.
[7] Y.C. Hu, D.B.Jhonson, “Casing Strategies in on-demand routing protocols for wireless ad hoc networks”, Processing of the Sixth Annual IEEE/ACM International Conference on Mobile Computing and Networking (Mobicom’ 00), pp. 231-242,2000.
[8] D. B. Jhonson and D.A. Maltz, “Dynamic Source Routing in Ad-Hoc Wireless Networks”,Mobile Computing, Eds.,Kluwer, vol. 353, pp.153-181, 1996.
Citation
Suhasini S Gunagi, Rajashekar S A, "Performance Evaluation of Unicast Reactive Ad-hoc Routing Protocols for Underwater Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.377-380, 2019.
Image Pattern Analysis Using Local Binary Pattern and Histogram Orient Gradient Methodology and Classification using K-NN
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.381-387, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.381387
Abstract
Characterizationxofxtextureximages with various orientation,xbrightness and scale changes is a difficult issue in Computer vision. This venture proposes two descriptors and utilizations them together to satisfy such assignment for example Histogram Orient Gradient-Local Binary Pattern(HOG-LBP) include extraction. The proposed framework comprises of pretreatment, highlight extraction and grouping. Initial, a HOG-LBP highlight descriptor is proposed to speak to multi-scale, multi-edge signal data. The HOG segment gives the gesturexedgexgradientxinformation and the LBP gives the texture feature data, which can adjust for the absence of revolution invariance of a solitary element and improve the acknowledgment rate of motions at different scales and numerous edges. At long last, the K-NN classifier is used to understand the image characterization. Trial results on the Brodatz informational collections demonstrate that the proposed strategy can accomplish best accuracy than the other metods. Investigations on the Brodatz database likewise exhibit the execution of the proposed strategy, on the first picture apply create LBP and HOG. Also, log-polar (LP) change is connected on the first picture, and the energies of coefficients on detail sub groups of the log-polar picture these are taken as worldwide texture highlights. We meld the two sorts of highlights for texture order, and the exploratory outcomes on benchmark datasets demonstrate that our proposed technique can accomplish preferable execution over other cutting edge strategies.
Key-Words / Index Term
orientation, HOG-LBP, K-NN, Brodatz, cutting edge
References
[1] S.C. Kim, T.J. Kang. Texture classification and segmentation using wavelet packet frame and Gaussian mixture model. Pattern Recognition, 2007, 40(4): 1207-1221.
[2] M. Kokare, P.K. Biswas, B.N. Chatterji. Texture image retrieval using new rotated complex wavelet filters. IEEE Transactions on Systems, Man, and Cybernetics, 2005,35(6):1168–1178.
[3] K. Jafari-Khouzani, H. Soltanian-Zadeh. Rotation-invariant multiresolution texture analysis using Radon and wavelet transforms. IEEE Transactions on Image Processing, 2005, 14(6):783-795.
[4] E.D. Ves, D. Acevedo, A. Ruedin, X. Benavent. A statistical model for magnitudes and angles of wavelet frame coefficients and its application to texture retrieval. Pattern Recognition, 2014,47(9): 2925–2939.
[5] M. Heikkila, M. Pietikainen, C. Schmid. Description of interest regions with local binary patterns. Pattern Recognition, 2009,42(3): 425–436.
[6] Z. Guo, L. Zhang L, D. Zhang. A completed modeling of local binary pattern operator for texture classification. IEEE Transactions on Image Processing, 2010,19(6):1657–1663.
[7] Y. He, N. Sang, C. Gao. Pyramid-Based Multi-structure Local Binary Pattern for Texture Classification. Formal Pattern Analysis & Applications, 2010, 6494:133-144.
[8] X. Qian, X.S. Hua, P. Chen, L. Ke. PLBP: An effective local binary patterns texture descriptor with pyramid representation. Pattern Recognition, 2011,44(10-11): 2502–2515.
[9] B. Ameur, S. Masmoudi, A.G. Derbel, A.B. Hamida. Fusing Gabor and LBP feature sets for KNN and SRC-based face recognition. in: Proceedings of the ATSIP, 2016, 453-458.
[10] Shuai ZHOU and Yanhong LIU, Member, IEEE and Keqiang LI. Recognition of Multi-scale Multi-angle Gestures Based on HOG-LBP Feature, 2018 IEEE 978-1-5386-9582-1/18
[11] Kennedy Chengeta, Serestina Viriri School of Maths, Statistics & Computer Science, A Survey on Facial Recognition based on Local Directional and Local Binary Patterns,2018 978-1-5386-1001-5/18
[12] Taha J. Alhindi, Shivam Kalra, Ka Hin Ng, Anika Afrin, Hamid R. Tizhoosh, Comparing LBP, HOG and Deep Features for Classification of Histopathology Images, 8-3 July, 2018
[13] S. P. Priyal, P. K. Bora, A robust static hand gesture recognition system using geometry based normalizations and Krawtchouk moments, Pattern Recognition, vol. 46, no. 8, pp.2202-2219, 2013.
[14] J. Žemgulys, V. Raudonis, and R. Maskeliūnas Recognition of basketball referee signals from videos using histogram of oriented gradients (HOG) and support vector machine (SVM), Procedia Computer Science, vol. 130, pp.953-960, 2018.
[15] J. Konecny, M. Hagara, One-shot-learning gesture recognition using HOG-HOF features, Journal of Machine Leaning Research, vol. 15, pp. 2513-2532, 2014.
[16] Y. Zhou, G. Jiang, and Y. Lin, A novel finger and hand pose estimation technique for real-time hand gesture recognition, Pattern Recognition, vol. 49, pp.102-114, 2015.
[17] Ding, Y., H. Pang, and X. Wu. Static hand-gesture recognition using HOG and improved LBP features, International Journal of Digital Content Technology & Its Application, vol. 5, no.11, pp.236-243, 2011.
[18] Peng Yang, Fanlong Zhang and Guowei Yang. Fusing DTCWT and LBP based Features for Rotation, Illumination and Scale Invariant Texture Classification, IEEE Access journal 2169-3536 2018
[19] X. Qian, X.S. Hua, P. Chen, L. Ke. PLBP: An effective local binary patterns texture descriptor with pyramid representation. Pattern Recognition, 2011,44(10-11): 2502–2515.
Citation
Sunanda, Arun Biradar, "Image Pattern Analysis Using Local Binary Pattern and Histogram Orient Gradient Methodology and Classification using K-NN", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.381-387, 2019.
Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.388-393, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.388393
Abstract
IOT Smart home system is becoming common now a days. In this ecosystem if a data packets are corrupted or manipulated by a faulty or compromised node, then detecting the faulty node is difficult because of multi hop mesh like network. The faulty Node might lead to wrong decision and operation failure of system thus impacting the Quality of Service (QoS) of different client devices. In this paper we first create a smart home ecosystem by usingIOT nodes like Raspberry pi and Node MCU models. We apply unsupervised learning technique on statistical data collected from these nodes to accurately detect faulty/Malicious nodes. We also provide alternate route depending up on the QoS of client device.
Key-Words / Index Term
IOT, Node MCU, Raspberry pi, smart home, unsupervised learning, QoS
References
[1] C. Withanage, R. Ashok, C. Yuen, and K. Otto, “A comparison of the popular home automation technologies,” in Innovative Smart Grid Technologies-Asia (ISGT Asia). IEEE, 2014, pp. 600–605.
[2] J. Zheng and M. J. Lee, “A comprehensive performance study of ieee 802.15. 4,” Sensor network operations, vol. 4, pp. 218–237, 2006.
[3] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Ddos in the iot: Mirai and other botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017.
[4] S. Kriaa, M. Bouissou, and L. Pi`etre-Cambac´ed`es, “Modeling the stuxnet attack with bdmp: Towards moreformalriskassessments,”in7thInternational Conference on Risk and Security of Internet and Systems (CRiSIS). IEEE, 2012, pp. 1–8.
[5] S.J.Shackelford,A.A.Proia,B.Martell,andA.N. Craig, “Toward a global cybersecurity standard of care: Exploring the implications of the 2014 nist cybersecurity framework on shaping reasonable national and international cybersecurity practices,” Tex. Int’l LJ, vol. 50, p. 305, 2015.
[6] C.Wang,T.Feng,J.Kim,G.Wang,andW.Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” IEEE Transactions on ParallelandDistributedSystems,vol.23,no.5,pp. 835–843, 2012.
[7] K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. of the 13th European Wireless Conference, 2007, pp. 1–10.
[8] X. Yang, J. Lin, W. Yu, P.-M. Moulema, X. Fu, and W. Zhao, “A novel en-route filtering scheme against false data injection attacks in cyberphysical networked systems,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 4–18, 2015.
[9] M. Abdelhakim, L. E. Lightfoot, J. Ren, and T. Li, “Distributed detection in mobile access wireless sensor networks under byzantine attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 950–959, 2014.
[10] T. Hayajneh, P. Krishnamurthy, D. Tipper, and T. Kim, “Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks,” in IEEE International ConferenceonCommunications. IEEE,2009,pp. 1–6.
[11] M. Abdelhakim, L. Lightfoot, J. Ren, and T. Li, “Reliable communications overmultihop networks under routing attacks,” in Global Communications Conference(GLOBECOM). IEEE,2015,pp.1–6.
[12] M. Abdelhakim, X. Liu, and P. Krishnamurthy, “Diversityfordetectingroutingattacksinmultihop networks,” in International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018, pp. 1–6.
[13] S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, “Detecting selective forwarding attacks in wireless sensor networks using support vector machines,” in 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007, pp. 335–340.
[14] J. F. C. Joseph, B.-S. Lee, A. Das, and B.-C. Seet, “Cross-layer detection of sinking behavior in wireless ad hoc networks using svm and fda,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 233–245, 2011.
[15] A. I. Moustapha and R. R. Selmic, “Wireless sensor network modeling using modified recurrent neural networks: Application to fault detection,” IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 5, pp. 981–988, 2008.
[16] D. Janakiram, V. Reddy, and A. P. Kumar, “Outlier detection in wireless sensor networks using bayesian belief networks,” in First International Conference on Communication System Software and Middleware. IEEE, 2006, pp. 1–6.
[17] K. Leung and C. Leckie, “Unsupervised anomaly detection in network intrusion detection using clusters,” in Proceedings of the Twenty-eighth Australasian conference on Computer Science, vol. 38. Australian Computer Society, Inc., 2005, pp. 333–342.
[18] S. Ruoti, S. Heidbrink, M. O’Neill, E. Gustafson, and Y. R. Choe, “Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization,” in IEEE InternationalConferenceonWebServices. IEEE, 2017, pp. 862–865.
[19] Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper, “Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning” Open Journal of Internet of Things (OJIOT) Volume 4, Issue 1, 2018
[20] Tiankai Liang , Bi Zeng, Jianqi Liu, Linfeng Ye,Caifeng Zou “An Unsupervised User Behavior Prediction Algorithm Based on Machine Learning and Neural Network For Smart Home” IEEE Access ( Volume: 6 ),Page(s): 49237 – 49247,Page(s): 812 – 821
[21] Irfan Awan, Muhammad Younas, Wajia Naveed “Modelling QoS in IoT Applications” 2014 17th International Conference on Network-Based Information Systems
[22] Hajar Elhammouti, Essaid Sabir, Mustapha Benjillali, Loubna Echabbi, Hamidou Tembine, “Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services” : IEEE Communications Magazine ( Volume: 55 , Issue: 9 , Sept. 2017 )Page(s): 41 – 47
[23] Oladayo Bello, Sherali Zeadally,“Toward efficient smartification of the Internet of Things (IoT) services”Future Generation Computer SystemsVolume 92, March 2019, Pages 663-673
Citation
B.R. Susheel Kumar, Arun Biradar, "Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.388-393, 2019.
Urban Traffic Congestion Avoidanceand Peer to Peer Vehicle communication system
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.394-399, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.394399
Abstract
Traffic Congestion is increasingly becoming a major bottleneck for everyday life in smaller and bigger cities across the world.Due to increase in traffic road accidents have become common in contemporary world. Sophisticated and smart transportation system is need of the hour.This paper explains some of mechanism to avoid the congestion, accidents by communicating with peer vehicle or with any of the communicating devices mounted on the Infrastructure elements like traffic signal poles, Access points like fourth or fifth generation NodeB. Components like microcontroller, Encoder, Decoders and Driver circuits are used to perform the proof of concept.ItImprove the efficiency of existing transportation facilities and accommodate the growing traffic demand in bigger cities.
Key-Words / Index Term
Traffic Congestion, Raspberry Pi, Ultrasonic Sensor, Encoder, Decoder, Driver Circuit
References
[1] LTE; Service requirements for V2X services (3GPP TS 22.185 version 14.3.0 Release 14)
[2] 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on enhancement of 3GPP Support for 5G V2X Services (Release 16)
[3] Raspberry Pi Compute Module 3 (CM3), Version 1.0, October 2016, Copyright 2016 Raspberry Pi (Trading) Ltd. All rights reserved
[4] Ultrasonic Ranging Module HC - SR04 by ELEC FREAKS
[5] HT12A/HT12E, 212 Series of Encoders by Holtek
[6] HT12A/HT12D, 212 Series of Encoders by Holtek
[7] User Guide:4 Channel 5V Optical Isolated Relay Module by Handson Technology
[8] Understanding and Using DC Motor Specifications by Gears Educational Systems, LLC
[9] 5GAA releases White Paper on C-V2X Conclusions based on Evaluation of Available Architectural Options by 5GAA
[10] V2X White Paper v 1.0 by NGMN
[11] Transparency Market Research, “Connected car market—Global industry analysis, size, share, growth, trends and forecast, 2013–2019,” Transparency Market Res., Albany, NY, USA, 2013.
[12] D. Schrank, B. Eisele, and T. Lomax, “TTI’s 2012 urban mobility report,” Texas A&M Transport. Inst. and Texas A&M Univ. Syst., College Station, TX, USA, 2012.
[13] J. Anda, J. LeBrun, D. Ghosal, C.-N. Chuah, and M. Zhang, “VGrid: Vehicular adhoc networking and computing grid for intelligent traffic control,” in Proc. IEEE 61st Veh. Technol. Conf. (VTC’05 Spring), Stockholm, Sweden, Jun. 2005, pp. 2905–2909. TABLE IV SUMMARY OF REAL-WORLD MEASUREMENT RESULTS 296 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 4, AUGUST 2014.
[14] C. Olaverri-Monreal, P. Gomes, R. Fernandes, F. Vieira, and M. Ferreira, “The see-through system: A VANET-enabled assistant for overtaking maneuvers,” in Proc. IEEE Intell. Veh. Symp. (IV), San Diego, CA, USA, Jun. 2010, pp. 123–128.
[15] S. A. Balasubramanian, R. Mahajan, A. Venkataramani, B. N. Levine, and J. Zahorjan, “Interactive WiFi connectivity for moving vehicles,” ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 427–438, 2008.
[16] C.Wang,T.Feng,J.Kim,G.Wang,andW.Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” IEEE Transactions on ParallelandDistributedSystems,vol.23,no.5,pp. 835–843, 2012.
[17] K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. of the 13th European Wireless Conference, 2007, pp. 1–10.
Citation
Basavaraj Kiragi, Chandan Raj B R, "Urban Traffic Congestion Avoidanceand Peer to Peer Vehicle communication system", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.394-399, 2019.
Soil characteristics analysis using IoT RM
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.400-403, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.400403
Abstract
With the advance in IOT and Sensors have influenced Agriculture in better environment monitoring and rise in yields. Farmers need to know the field environment conditions before sowing during anyseason. Mixed farming and Crop rotation are practiced widely. In different part of the season the soil fertility characteristics would vary. Farmers facing several challenges related to knowing the nutrients of soil. In this work experiment existing models are reviewed and proposed a modelto demonstrate how soil characteristics can be instantly measured to accurate using sensors and monitored in real time. We have used IOT solutions using affordable sensors that reports Air temperature, Soiltemperature, Soil moisture and Water sensors. The collected data is automatically uploaded to cloud using Wi-Fi connectivity. Data analytics is carried out in cloud server and the report can be viewed in real time using Mobile application
Key-Words / Index Term
IOT, Smart Agriculture, Cloud,Node MCU
References
[1] Research on the Agriculture Intelligent System
Based on IOT, 2College of Computer Science, Yangtze University, Jingzhou Hubei, China IEEE 2016
[2]Dr P. Viswanathan Mahammad Shareef Mekala A Survey : Smart Agriculture IoT with Cloud Computing 2017 IEE
[3] Joaquín Gutiérrez, Juan Francisco Villa-Medina, Aracely López-
Guzmán, and Miguel Ángel Porta-Gándara SmartphoneIrrigation Sensor 1530-437X (c) 2015 IEEE
[4] N. R. Kale K.A.Patil A Model for Smart Agriculture Using IoT IEEE 2016
[5] Pallavi S., Jayashree D. Mallapur, Kirankumar Y. Bendigeri Remote Sensing and Controlling of Greenhouse Agriculture Parameters based on IoT IEEE 2017
[6] Soumil Heble, Ajay Kumar, K.V.V Durga Prasad, Soumya Samirana, P.Rajalakshmi, U. B. Desai Indian Institute of Technology - Hyderabad A Low Power IoT Network for Smart Agriculture IEEE 2018
[7] Danco Davcev, Kosta Mitreski, Stefan Trajkovic, Viktor Nikolovski, Nikola Koteli IoT agriculture system based on LoRaWAN IEEE 2018
[8] G. Sushanth1 and S. Sujatha2 IOT Based Smart Agriculture System IEEE 2018
Citation
Mallikarjunaiah H B, Prasanna Kumar, "Soil characteristics analysis using IoT RM", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.400-403, 2019.
Smart Health Care Kit based on IoT
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.404-409, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.404409
Abstract
the past few years have witnessed an increase in the development of wearable sensors for health monitoring systems. This increase has been due to several factors such as development in sensor technology as well as directed efforts on political and stakeholder levels to promote projects, which address the need for providing new methods for care given increasing challenges with an aging population. An important aspect of study in such system is how the data is treated and processed.This project provides a recent review of the latest methods and algorithms used to analyze data from wearable sensors used for physiological monitoring of vital signs in healthcare services. In particular, the project outlines the more common data mining tasks that have been applied such as anomaly detection, prediction and decision-making when considering in particular continuous time series measurements
Key-Words / Index Term
Wearable sensor,IoT,Health Monitoring, Raspberry Pi, Healthcare Kit, Blynk software, ADC, ECG, Pulse
References
[1] Sow, D.; Turaga, D.; Schmidt, M. Mining of Sensor Data in Healthcare: A Survey. In Managing and Mining Sensor Data; Aggarwal, C.C., Ed.; Springer: Berlin, Germany, 2013; pp. 459–504.
[2] Suh, M.K.; Chen, C.A.; Woodbridge, J.; Tu, M.; Kim, J.; Nahapetian, A.; Evangelista, L.; Sarrafzadeh, M. A remote patient monitoring system for congestive heart failure. J. Med. Syst. 2011, 35, 1165–1179.
[3] Youm, S.; Lee, G.; Park, S.; Zhu, W. Development of remote healthcare system for measuring and promoting healthy lifestyle. Expert Syst. Appl. 2011, 38, 2828–2834.
[4] Malhi, K.; Mukhopadhyay, S.C.; Schnepper, J.; Haefke, M.; Ewald, H. A Zigbee-based wearable physiological parameters monitoring system. IEEE Sens. J. 2012, 12, 423–430.
[5] Yamada, I.; Lopez, G. Wearable Sensing Systems for Healthcare Monitoring. In Proceedings of the Symposium on VLSI Technology, Honolulu, HI, USA, 12–14 June 2012; pp. 5–10.
[6] Chen, M.; Gonzalez, S.; Vasilakos, A.; Cao, H.; Leung, V.C. Body area networks: A survey. Mob. Netw. Appl. 2011, 16, 171–193.
[7] Custodio, V.; Herrera, F.J.; Lopez, G.; Moreno, J.I. A review on architectures and ´ communications technologies for wearable health-monitoring systems. Sensors 2012, 12, 13907–13946.
[8] Pantelopoulos, A.; Bourbakis, N.G. A survey on wearable sensor-based systems for health monitoring and prognosis. Trans. Syst. Man Cyber. Part C 2010, 40, 1–12.
[9] Alemdar, H.; Ersoy, C. Wireless sensor networks for healthcare: A survey. Comput. Netw. 2010, 54, 2688–2710.
[10] Baig, M.; Gholamhosseini, H. Smart health monitoring systems: An overview of design and modeling. J. Med. Syst. 2013, 37, 1–14.
[11] Rashidi, P.; Mihailidis, A. A survey on ambient-assisted living tools for older adults. IEEE J. Biomed. Health Inform. 2013, 17, 579–590.
[12] Atallah, L.; Lo, B.; Yang, G.Z. Can pervasive sensing address current challenges in global healthcare? J. Epidemiol. Glob. Health 2012, 2, 1–13. 13. Lara, O.D.; Labrador, M.A. A survey on ambient-assisted.
[13] K.A. Townsend, J.W. Haslett, T.K.K. Tsang, M.N. El-Gamal, K. Iniewski, ‚Recent Advances and Future Trends in low power wireless systems for medical applications‛, in Proc. 5th Intl. Conf. Work-shop on System-on-Chip for Real-Time Applications, 2005, pp. 476-481.
[14] S.L.P. Tang, ‚Recent developments in flexible wearable electronics for monitoring applications‛,
[15] Trans. Of the Inst. Of Measurement and Control, Vol. 29, pp. 283-300, 2007.
[16] Bluetooth. (2009, 9 October). [Online]. Available: www.bluetooth.com
[17] Zigbee Alliance. (2009, 9 October). [Online]. Available: www.zigbee.orG
[18] M.R. Yuce, S.W.P. Ng, N.L. Myo, C.H. Lee, J.Y. Khan, W. Liu, ‚A MICS Band Wireless Body Sensor Network‛, in Proc. IEEE WCNC, 2007, pp. 2473-2478.
[19] C.T. Hager, S.F. Midkiff, ‚An Analysis of Bluetooth Security Vulnerabilities‛, in Proc. IEEE WCNC, 2003, pp. 1825-1831.
[20] A. Sikora, V. Groza, ‚Coexistence of IEEE802.1.4 with other Systems in the 2.4 GHz ISM-Band‛, in Proc. IEEE IMTC, 2005, pp.1786-1791.
Citation
Praveen Kumar V M, Rajshekhar S A, "Smart Health Care Kit based on IoT", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.404-409, 2019.