Image Super Resolution In View of Sparse Representation
Research Paper | Conference Paper
Vol.04 , Issue.03 , pp.97-100, May-2016
Abstract
Sparse representation has attracted it interests in the field of image resolution. On small images with certain constraints the sparsity based methods enforce sparse coding. For the observed low resolution images it has certain limitations on small scale and different scales for image sparse representation. In this paper a joint super resolution framework has been proposed to improve sparsity based image performances. The algorithm proposed here optimizes the problem for high resolution image recovery. Both the ridge regression and the gradient histogram is incorporated to solve the problem.
Key-Words / Index Term
super resolution, ridge regression, sparse representation, gradient histogram.
References
[1] X. Zhang, M. Tang, and R. Tong, “Robust super resolution of compressed video,” Vis. Comput., vol. 28, no. 12, pp. 1167–1180, 2012. I
[2] R. Y. Tsai and T. S. Huang, “Multiple frame image restoration and registration,” in Advances in Computer Vision and Image Processing, vol. 1. Greenwich, CT, USA: JAI Press, 1984
[3] Divesh N. Agrawal and Deepak Kapgate, "Face Recognition Using PCA Technique", International Journal of Computer Sciences and Engineering, Volume-02, Issue-10, Page No (59-61), Oct -2014, E-ISSN: 2347-2693
[4] M. Irani and S. Peleg, “Improving resolution by image registration,”CVGIP, Graph. Models Image Process., vol. 53, no. 3, pp. 231–239,1991.
[5] R. C. Hardie, K. J. Barnard, and E. E. Armstrong, “Joint MAP registration and high-resolution image estimation using a sequence of undersampled images,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1621–1633, Dec. 1997.
[6] S. Farsiu, M. Elad, and P. Milanfar, “Video-to-video dynamic superresolution for grayscale and color sequences,” EURASIP J. Appl. SignalProcess., vol.2006, pp. 1-15, Feb. 2006, Art. ID 061859.
[7] A. Marquina and S. J. Osher, “Image super-resolution by TV-regularization and Bregman iteration,” J. Sci. Comput., vol. 37, no. 3, pp. 367-382,2008
Citation
Keerthi P N, Shruthi M K, "Image Super Resolution In View of Sparse Representation", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.97-100, 2016.
Secure Data Transfer and 802.11 Channel Usage in Networking
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.101-104, May-2016
Abstract
Data exchange rate is an estimation of the measure of information sent between two focuses on a system in a given time period. It is a profoundly critical idea in cutting edge business organizing, with high information exchange rates permitting systems to be utilized for complex undertakings, for example, internet spilling. Understanding information exchange rate could offer you some assistance with improving the execution of your business' own particular system. Today remote sensors system is broadly utilized as a part of all the association for their day-by-day correspondence. A remote sensors system is accumulation of hubs in a system. Each individual performs all their day by day exchange and correspondence with the assistance of web. In this paper we discuss mainly about Wi-Fi and its general utilization all over as it required no wire association it generally its work with the assistance of unguided media. The individual dependably imparts their data and information to the assistance of remote transmission some time they share private data, which required more security. As in the system, some unapproved individual expected to get to the individual and secret data of data.
Key-Words / Index Term
Remote Sensor, Wi-Fi, Remote Transmission.
References
[1] Cheng Chen, Rapeepat Ratasuk, Amitava Ghosh ,” -“ Downlink performance analysis of lte and WIFI coexistence in unlicensed bands with a simple listen-before-talk scheme” vehicular technology conference (vtc spring), 2015 ieee 81st,2015
[2] Attiuttama and Kanojia Sindhuben babulal, "Analyzing Superiority of Tail Drop over Random Early Discard by evaluating throughput using varying queue length in 802.11", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (23-27), Nov -2015, E-ISSN: 2347-2693
[3] Zhenxing Liu1 , Lu Liu1,2, Richard Hill1 , Yongzhao Zhan2 “-“Base62x: An Alternative Approach to Base64 for non-Alphanumeric Characters”, 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
[4] Gurpreet Singh, Supriya,-“ Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES”, 2013 Second International Conference on Advanced Computing, Networking and Security
[5] Junhua Wang, Zhuoming Xu (), Jin Zhang”-“ Implementation Strategies for CSV Fragment Retrieval over HTTP”, 2015 12th Web Information System and Application Conference
Citation
Divya M V , G S Girish , "Secure Data Transfer and 802.11 Channel Usage in Networking", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.101-104, 2016.
Internet of Things: Smart College
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.105-109, May-2016
Abstract
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Concept of smart college can one be of the emerging trend in IoT in coming up years where the thought of ‘Smart Campus, Secure Campus’ may become the new mantra. The vision of such an Internet Of Things (IoT) system, supported by private industries and governments globally will have the potential to mark an evolution in the way concept of education is viewed currently and will surely have a great impact on our environment and our lives. This paper hence provides an comprehensive thought and survey on enabling and using of IoT technologies in the educational institutions, Furthermore, the paper will present and discuss an idea about smart college using the concepts of IoT.
Key-Words / Index Term
Internet of Things (IoT), device-to-device (D2D), Machine-to-Machine (M2M), Radio frequency identification (RFID), IoT standardization.
References
[1] Intelligent Device-to-Device Communication in the Internet of ThingsOladayo Bello, Member, IEEE, and Sherali Zeadally, Senior Member, IEEE.december 2013
[2] Pranay Kujur and Kiran Gautam, "Smart Interaction of Object on Internet of Things", International Journal of Computer Sciences and Engineering, Volume-03, Issue-02, Page No (15-19), Feb -2015,
[3] Internet of Things in Industries: A Survey Li Da Xu, Senior Member, IEEE, Wu He, and Shancang Li.november 2014
[4] Securing the Internet of Things:A Standardization Perspective Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig.June 2014
[5] An Information Framework for Creating a Smart City through Internet of Things Jiong Jin, Member, IEEE, Jayavardhana Gubbi, Member, IEEE, Slaven Marusic, and Marimuthu Palaniswami, Fellow, IEEE.April 2014
[6] Andrea Zanella, Senior Member, IEEE, Nicola Bui, Angelo Castellani,Lorenzo Vangelista, Senior Member, IEEE, and Michele Zorzi, Fellow, IEEE” Internet of Things for Smart Cities” IEEE internet of things journal, vol. 1, no. 1, february 2014
[7] Internet of Things for Remote Healthcare , "P K Mishra, M. R Pradhan and M.Panda", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (106-111), Apr -2016,
[8] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey
Citation
Swaroopa P T, Chaitra H K , "Internet of Things: Smart College", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.105-109, 2016.
Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.110-113, May-2016
Abstract
In wireless sensor networks various security threats are encountered, so various security providing algorithms are available. Compromised node and denial of service are the two key attacks in wireless sensor networks. Here, we study routing mechanisms that circumvent black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes know to the source, and hence endanger all information sent over these routes. We develop mechanism that generate randomized multipath routes. Under our design, the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy efficient, making them quite capable of bypassing black holes at low energy cost. Here we propose four algorithms those are purely random propagation, non-repetitive random propagation, direct random propagation and optimized random propagation and we compare the four different algorithm to study the performance. Graphical results are used to verify the effectiveness of our design.
Key-Words / Index Term
Wireless sensor networks, Security, Attacks, Routing
References
[1] S.G. Santhi and R.Nathiya, "Power Consumption Based Efficient Routing With Mobile Collector in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-2(4), Page No (64-70), Apr -2014
[2] W. Lou, W. Liu. Fang, “SPREAD: Enhancing data confidentiality in mobile ad-hoc networks, IEEE INFOCOM 2004, Hong Kong, China, March 2004.
[3] W. Lou and Y. Kwon. H-Spread: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transaction on Vehicular Technology, 55(4):1320-1330, July 2006.
[4] P.C. Lee, V. Mishra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transaction on Networking, 15(6):1490-1501, Dec. 2007.
[5] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
Citation
Priyanka .B, Mahesh .A, "Randomized Routing Algorithms for Secure Data Transmission in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.110-113, 2016.
An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks
Research Paper | Conference Paper
Vol.04 , Issue.03 , pp.114-119, May-2016
Abstract
For establishing stable and reliable routes in heterogeneous multi-hop wireless networks (HMWNs) a secure protocol for Establishing STable and reliable Routes (E-STAR) is proposed. It integrates incentive and trust systems with a trust-and energy-aware routing protocol. Compensating the nodes that relay others packets and charge those that send packets are main aims of incentive systems. The nodes competence and reliability in relaying packets in terms of multi-dimensional trust values are main attractions. The trust values are attached to the nodes public-key certificates to be used in making routing decisions. Two routing protocols is developed to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can prompt the nodes in maintaining route stability and reporting correct battery energy capability. Because any loss of trust will result in loss of future gains. Moreover, for the efficient implementation processing the incentive receipts for computing trust values are necessary. Analytical results demonstrate protocol is without false allegations. Improvement in the packet delivery ratio and route stability are proved through simulation results.
Key-Words / Index Term
Securing heterogeneous multi-hop wireless networks, packet dropping and selfishness attacks, trust systems, and secure routing protocols
References
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[2] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, pp. 255-265, Aug. 2000.
[4] X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3, pp. 229-242, 2012. SIGMOBILE Mob. Comput. Commun. Rev., vol. 9, no. 2, pp. 4–18, Apr. 2005.
[5] Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014
[6] M. Mahmoud and X. Shen, “PIS: A Practical Incentive System For Multi-Hop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
[7] M. Mahmoud and X. Shen, “ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011.
[8] M. Mahmoud and X. Shen, “An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Drop in Multihop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 60, no. 8, pp. 3947-3962, Oct. 2011.
[9] G. Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
[10] P. Velloso, R. Laufer, D. Cunha, O. Duarte, and G. Pujolle, “Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,” IEEE Trans. Network and Service Management, vol. 7, no. 3, pp. 172-185, Sept. 2010.
[11] Harkiranpreet Kaur and Rasneet Kaur, "To Study the Various Attacks and Protocols in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (210-212), Apr -2016, E-ISSN: 2347-2693
[12] Mohamed M.E.A. Mahmoud, Xiaodong Lin, and Xuemin (Sherman) Shen, “Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks,” IEEE transactions on parallel and distributed systems, vol. 26, no. 4, April 2015
[13] A.Sreelatha , Dr.A.VinayaBabu , K.Madhukar , S.Nagaprasad , D.Marlene Grace Verghese , V.Mallaiah , A.Pratima ,” Mobile Wireless Enhanced Routing Protocol in Adhoc Networks” IJCSE, 2010; 2(7) 2398–2401
Citation
Megha Rani R, Harshavardhan H , "An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.114-119, 2016.
A Survey on Data Protection Schemes on Multipath WSN
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.120-125, May-2016
Abstract
WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. The deployment of such a network is accompanied by several security issues such as data confidentiality. Many encryption algorithms addressed to network communication exist, but they do not always match the low resources restrictions like low processor, memory, and limited energy which are set upon the sensors. To overcome this we propose solution such as the Securing Data based on Multi-Path routing method, or an application of the Shamir's Secret Sharing Scheme, both the techniques use distinct paths in the network to send pieces of data obtained by splitting the original message. This paper addresses the two methods named above, and proposes a solution based on traffic classification, using alternatively the Securing Data based on Multi-Path routing method, the Shamir's Secret Sharing Scheme, and strong encryption algorithms.
Key-Words / Index Term
Wireless communication, Sensor networks,Network level security
References
[1] S. Alouneh, A. Agarwal, and A. En-Nouaary, "A novel path protection scheme for MPLS networks using multi-path routing," Computer Networks, vol. 53, no. 9, pp. 1530-1545, Jun. 2009.
[2] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol-01, Issue-04, pp (8-11), Sep -Oct 2013.
[3] Y. Mao, "A feedback-based multipath approach for secure data collection in wireless sensor networks," Ubiquitous Computing and Communication Journal, vol. 5, no. 2, pp. 27-32, Jun. 2010.
[4] Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014,
[5] M. A. Simplicio, Jr, B. T. de Oliveira, P. S. L. M. Barreto, C. B. Margi, T. C. M. B. Carvalho, and M. Naslund, "Comparison of authenticatedencryption schemes in wireless sensor networks," in Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, Oct. 2011, pp. 454-461.
[6] P. Ballarini, L. Mokdad, and Q. Monnet, "Modeling tools for detecting DoS attacks in WSNs," Security and Communication Networks, 2013, not published yet.
[7] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[8] Madhavi S. Kukade and Kapil N. Hande, "Analysis of Uniform Distribution of Storage Nodes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-02, Issue-01, Page No (43-47), Jan -2014
[9] J. Ben-Othman and L. Mokdad, "Enhancing data security in ad hoc networks on based multipath routing," Journal of Parallel and Distributed Computing, vol. 70, no. 3, pp. 309-316, Mar. 2010.
[10] S.G. Santhi and R.Nathiya, "Power Consumption Based Efficient Routing With Mobile Collector in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (64-70), Apr -2014
Citation
Priyanka R, "A Survey on Data Protection Schemes on Multipath WSN", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.120-125, 2016.
A Survey on Congestion in Wireless Multimedia Sensor Networks
Survey Paper | Conference Paper
Vol.04 , Issue.03 , pp.126-130, May-2016
Abstract
Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques. In this paper, we outline the congestion, types of congestion, congestion control. As congestion has a significant impact on Quality of Services (QoS).
Key-Words / Index Term
Congestion, QoS, WMSN,Congestion Control, CH
References
[1] L. Ang et al., “Wireless Multimedia Sensor Network Technology, Wireless Multimedia Sensor Networks on Reconfigurable Hardware”, Chapter 2, Springer-Verlag Berlin Heidelberg, Pages 5-35,2013
[2] Enzo Baccarelli et al, “Green Multimedia Wireless Sensor Networks: Distributed Intelligent Data Fusion, In-network Processing, and Optimized Resource Management”, IEEE Wireless Communications , August 2014
[3] Mohammad Hossein Yaghmaee,Donald Adjeroh,”A New Priority Based Congestion Control Protocol for Wireless Multimedia Sensor Networks”, IEEE ,2008
[4] Cagatay Sonmez, Sinan Isik, Mehmet Yunus Donmez, Ozlem Durmaz Incel, Cem Ersoy, “ SUIT: A Cross Layer Image Transport Protocol with Fuzzy Logic Based Congestion Control for Wireless Multimedia Sensor Networks”, IEEE ,2012
[5] P. Dhivya and S. Meenakshi, "A Review of Congestion Control Techniques in Mobile Ad-hoc Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (44-49), Sep -2015
[6] Madhavi S. Kukade and Kapil N. Hande, "Analysis of Uniform Distribution of Storage Nodes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-02, Issue-01, Page No (43-47), Jan -2014
[7] Shahin Mahdizadeh Aghdam , Mohammad Khansari , Hamid R. Rabiee , Mostafa Salehi ,“ WCCP: A congestion control protocol for wireless multimedia communication in sensor networks”, Ad Hoc Networks Vol 13 Pages 516-534, 2014.
[8] CAl Wen-Yu, YANG Hai-Bo,” A Hierarchical QoS Framework for
Wireless Multimedia Network” , IEEE ,2008
[9] Ghalib A. Shah,Weifa Liang,and Ozgur B. Akan,"Cross-Layer Framework for QoS Support in Wireless Multimedia Sensor Networks",IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 5, OCTOBER 2012
[10] Priyanka Rawat, Kamal Deep Singh, Hakima Chaouchi,Jean Marie Bonnin, ” a survey on recent developments and potential synergies”, Springer Science Business Media New York 2013
[11] Moufida Maimour C. Pham Julien Amelot ,”Load Repartition for Congestion Control in Multimedia Wireless Sensor Networks with Multipath Routing “,IEEE ,2008
[12] Ali Ghaffari,” Congestion control mechanisms in wireless sensor networks :A survey”, Journal of Network and Computer Applications
Volume 52,Pages 101–115, June 2015.
[13] Ian F. Akyildiz , Tommaso Melodia, Kaushik R. Chowdhury,"A survey on wireless multimedia sensor networks"
[14] Fernaz Narin Nur, Selina Sharmin,M. Abdullah-Al-Wadud,"Congestion Aware Fair Data Delivery inWireless Multimedia Sensor Networks",Recent Advances in Computer Engineering, Communications and Information Technology,
[15] Ian f. akyildiz,tommaso melodia,kaushik r. chowdury,"wireless multimedia sensor networks:a survey", IEEE wireless communications,2007
[16] Youssef Charfi, Bell Canada ,Naoki Wakamiya and Masayuki Marata," Challenging Issues In visual sensor networks",IEEE Wireless Communications,April 2009
[17] Honggang Wang,Michael Hempel,Dongming Peng,Wei Wang,Hamid Sharif,and Hsiao-Hwa Chen,"Index-Based Selective Audio Encryption
[18] for Wireless Multimedia Sensor Networks",IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 12, NO. 3, APRIL 2010
[19] Pu Wang,RuiDai,and Ian F. Akyildiz,"A Differential Coding-Based Scheduling Framework for Wireless Multimedia Sensor Networks",IEEE Transactions on Multimedia, VOL. 15, NO. 3, APRIL 2013
[20] Yun Ye1,Ssong ci,Aggelos k. Katsaggelos,Yyanwei Liu3, and Yi qian, "Wireless Video Surveillance: A Survey",IEEE, 2013
[21] Yun Ye, Song Ci, Ni Lin, and Yi Qian,"cross-layer design for delay-and energy-constrained multimedia delivery in mobile terminals", IEEE Wireless Communications, August 2014
[22] Jasleen Kaur,Rubal Grewal,Kamaljit Singh Saini,"A Survey on Recent Congestion Control Schemes in Wireless Sensor Network", IEEE International Advance Computing Conference (IACC) ,2015
[23] http://www2.ece.gatech.edu/research/labs/bwn/WMSN/projectdescri ption.html, April 13, 2016
[24] Bambang A.B. Sarif, Victor C.M. Leung, Panos Nasiopoulos,"Energy Efficient Multiple Description Coding for Video Sensor Network" 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops,2011
[25] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693
Citation
Panchaxari Mamadapur and Shiva Prasad K.H, "A Survey on Congestion in Wireless Multimedia Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.126-130, 2016.
CF Based and Location Aware Filtering for Web Service Recommendations
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.131-137, May-2016
Abstract
Collaborative Filtering (CF) is comprehensively used for making Web organization proposal. CF-based Web organization proposition intends to predict missing QoS (Quality-of-Service) estimations of Web organizations. Web organizations are consolidated programming parts for the sponsorship of interoperable machine-to-machine correspondence over a framework. Web organizations have been for the most part used for building organization arranged applications in both industry and the insightful world starting late. An ill-advised organization decision may achieve various issues to the ensuing applications. In this paper, we propose an area mindful customized CF strategy for Web administration suggestion. The proposed technique influences both areas of clients and Web administrations while selecting comparative neighbors for the objective client or administration, furthermore aggregate separating based Web organization recommender structure to offer customers some help with selecting organizations with perfect Quality-of-Service (QoS) execution. Our recommender structure uses the territory information and QoS qualities to gathering customers and organizations, and makes redid organization proposition for customers in light of the bundling results. Differentiated and existing organization recommendation techniques, our system finishes broad change on the proposition precision. The proposed game plan involves two stages: first, we use mixed number programming (MIP) to find the perfect breaking down of overall QoS impediments into close-by prerequisites. Second, we use coursed neighborhood decision to find the best web advantages that satisfy these close-by prerequisites. The outcomes of trial appraisal demonstrate that our system significantly beats existing courses of action similarly as computation time while fulfilling near ideal results.
Key-Words / Index Term
Collaborative filtering, Web Service Recommendation, QoS prediction, and Location Aware
References
[1] L.-J. Zhang, J. Zhang, and H. Cai, “Service Computing”. Springer and Tsinghua University Press, 2007.
[2] M. P. Papazoglouand D. Georgakopoulos,
“ServiceOriented computing,” Communications of the
ACM, 2003, pp. 46(10):24–28.
Shubhie Agarwal, Seema Maitrey, Pankaj Singh Yadav, "A Comparative Analysis of Data Mining Techniques in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (126-131), Apr -2016
[3] Y. Zhang, Z. Zheng, M. R. Lyu, “WSExpress: a QoSaware search engine for Web services”, in Proc. 8th
IEEE International Conference on Web Services, Miami, FL, USA, July, 2010, pp.83-90.
[4] S. S. Yau, Y. Yin, “QoS-based service ranking and selection for servicbased systems,” in Proc. of the
International conferenceon Services Computing, Washington DC, USA, July, 2011, pp. 56 - 63.
[5] G. Kang, J. Liu, M. Tang, X.F. Liu, and K. K. Fletcher,
“Web Service Selection for Resolving Conflicting Service Requests,” in Proc. 9th International
Conference on Web Services, Washington, DC, USA, July, 2011, pp. 387-394.
[6] L. Shao, J. Zhang, Y. Wei, J. Zhao, B. Xie, and H. Mei, “Personalized QoS prediction for Web services via collaborative filtering, ” in Proc. 5th International
Conference on Web Services, 2007, pp. 439-446.
[7] Z. Zheng, H. Ma, M.R. Lyu, and I. King. “WSRec: A
Collabora-tiveFilteringBasedWebService
Recommendation System,” in Proc. 7th International Conference on Web Services, Los Angeles, CA, USA,
pp. 437444, 2009.
[8] Z. Zheng, H. Ma, M. R. Lyu, and I. King “QoS-Aware Web Service Recommendation by Collaborative
Filtering”, IEEE Trans. on Services Computing, 2011, vol.4, no.2, pp.140-152.
[9] M. Tang, Y. Jiang, J. Liu, X. F. Liu: Location-Aware Collaborative Filtering for QoS-Based Service Recommendation. in Proc. 10th International.
[10] R. Liu, C.X. Jia, T. Zhou, D, Sun, and B.H. Wang,
“Personal recommendation via modified collaborative filtering,” Physics and Society 388(4): 2009, pp.462-468.
[12] G. Adomavicius and A. Tuzhilin. Recommender Systems Handbook, chapter Context-aware Recommender Systems. Springer, 2010.
[13] G. Kang, J. Liu, M. Tang, X. Liu, B. Cao, and Y. Xu, “AWSR: Active web service recommendation based on usage history,” in Proc. Int. Conf. Web Services, 2012, pp. 186–193.
[14] L. Liu, F. Lecue, and N. Mehandjiev, “Semantic content-based recommendation of software services using context,” ACM Trans. Web, vol. 7, no. 3, pp. 17–20, 2013.
[15] K. Huang, Y. Fan, W. Tan. Recommendation in an Evolving Service Ecosystem Based on Network Prediction. IEEE T. Automation Science and Engineering 11(3): 906-920 (2014)
Citation
Akshitha N, Manjunath R, "CF Based and Location Aware Filtering for Web Service Recommendations", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.131-137, 2016.
Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.138-142, May-2016
Abstract
Deployment of sensor networks are used in many applications data that are collected by these sensors are used in decision making such as in Supervisory control and data Acquisition, Battlefield monitoring systems and in many other applications. Data are collected from multiple sources through intermediate nodes. Malicious adversary may introduce additional nodes in the network or compromise existing ones. So trustworthiness of the data collected from different sources is important for decision making. In evaluating the trustworthiness of the sensor data provenance plays a key factor. Several challenges that affect the provenance management include secure transmission and efficient storage, bandwidth consumption and low energy. A novel lightweight schema was proposed to transmit provenance of the sensor data securely. Bloom filters are used in the proposed technique to encode provenance. Efficient mechanisms are introduced for reconstruction of the base station and provenance verification. The secure provenance scheme was extended with the functionality to detect packet drop attacks done by malicious data forwarding nodes. We evaluate the proposed technique and the results prove the effectiveness and efficiency of the lightweight secure provenance scheme in detecting packet forgery and loss attacks.
Key-Words / Index Term
Trustworthiness, Bloom filters, wireless sensor network.
References
[1] H. Lim, Y. Moon and E. Bertino, “Provenance based trustworthiness assessment in sensor network” proc seventh int’l workshop, pp. 2-7, 2010.
[2] I. Foster, J. Vockler, “Chimera: A virtual data system for representing, querying and automating data derivation” proc. conf. scientistical database management, pp. 37-46, 2002.
[3] K. Muniswamy-Reddy, D. Holland, “Provenance-A ware storage systems” proc. USENIX Ann. Technical conf., pp. 4-4, 2006.
[4] Y. Simmhan, B. Plale, “A survey of data provenance in E-Science” ACM SIGMOD record, vol. 34, pp. 31-36, 2005.
[5] Rohit Aggarwal and Khushboo Bansal , "An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (64-68), Apr -2016
Citation
Ujwala N, Siddaramappa V, "Sspp: Secure Scheme for Provenance Forgery and Packet Drop Detection in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.138-142, 2016.
Advance Security for Identifying Users without Their Login Ids
Review Paper | Conference Paper
Vol.04 , Issue.03 , pp.143-146, May-2016
Abstract
Authentication to a computing system is composed of two parts, identification and verification. Traditionally, login IDs have been used for identification and passwords for verification. The method that can augment the current password-based system by strengthening the identification process. It utilizes personal secret data instead of a login ID to identify a user uniquely. It then asks the user to choose a correct login ID among multiple choices of partially obscured IDs. Since it does not accept a login ID during the authentication process, a stolen or cracked password cannot be used for gaining an access to the computing system unless the attacker provides a correct identification material. Hence in this paper, provide more security in the system. The security can be provided using user authentication, device authentication and captcha as a protocol step.
Key-Words / Index Term
Cybersecurity, authentication, identification, Password
References
[1] R. Dhamija, and A. Perrig. “Déjà Vu: A User StudyUsing Images for Authentication”. In 9th USENIX Security Symposium, 2000.
[2] Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
[3] A. F. Syukri, E. Okamoto, and M. Mambo, "A User identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
[4] Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang.Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing.”
[5] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy,,N.Memon, “Design and longitudinal evaluation of a>graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.
[6] H. Zhao and X. Li, "S3PAS: A Scalable ShoulderSurfing Resistant Textual-Graphical Password Authentication Scheme," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467-472.
[7] S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme,,”in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
Citation
Manjunath R, Suresha T G , Ashok kumar P S, "Advance Security for Identifying Users without Their Login Ids", International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.143-146, 2016.