Distribution of Work Load at Main Controller Level Using Enhanced Round Robin Scheduling Algorithm in A Public Cloud
Review Paper | Journal Paper
Vol.3 , Issue.12 , pp.75-78, Dec-2015
Abstract
The enormous development in the computer and communication technology led to use various web based software applications using with the Internet. Cloud computing is an emerging technology where millions of clients and individuals use various cloud services like storage, software’s and infrastructure on rental basis. Tremendous increase in the number of users has led to some issues and problems. One of the main issues is balancing the work load and increasing the performance of the system. An efficient and dynamic algorithm called “Enhanced Round Robin scheduling algorithm” has been proposed in this paper for balancing the load. The work distribution to the various balancers by the main controller is done using two parameters: one is balancer status (idle, normal and overload) and the other is percentage of overall balancer status (idleness and normalness). Based upon these parameters, the balancers are sorted and stored in a list. The work is distributed to various balancers in a round robin fashion.
Key-Words / Index Term
Main controller,Balancer, Nodes, Enhanced Round Robin Sceduling, Idle, Normal and Overload
References
[1] B. Adler, Load balancing in the cloud: Tools, tips and techniques, http://www.rightscale. com/info center/whitepapers/Load-Balancing-in-the-Cloud.pdf, 2012
[2] K. Nishant, P. Sharma, V. Krishna, C. Gupta, K. P. Singh, N. Nitin, and R. Rastogi, Load balancing of nodes in cloud using ant colony optimization, in Proc. 14th International Conference on Computer Modelling and Simulation (UKSim), Cambridgeshire, United Kingdom, Mar. 2012, pp. 28-30.
[3] Jasp reetKaur et al. “Comparison of load balancing algorithms in a Cloud”, International Journal of En gineerin g Research and Applications (IJERA), May-Jun 2012.
[4] K. Nuaimi, N. Mohamed, M. Nuaimi and J. Al-Jaroodi, “A Survey of Load Balancing in Cloud Computing: Challenes and Algorithmsg,” 2012 IEEE Second Symposium on Network Cloud Computing and Applications, 2012.
[5] T. Zuhori, T. Shamrin, R. Tanbin and F. Mahmud, “An Efficient Load Balancing Approach in Cloud Environment by using Round Robin Algorithm,” International Journal of Artificial Intelligence and Mechatronics, vol. 1, 2013, pp. 1-4.
[6] T. Kokilavani and G. Amalarethinam, “Load Balanced Min-Min Algorithm for Static Meta-Task Scheduling in Grid Computing” International Journal of Computer Applications, vol. 20, No. 2, April 2011, pp. 43-49.
[7] Rajesh George rajan,V. jeyakrishna “A survey on Load balancing in cloud computing environment”, International journal of advanced research in computer engineering, December 2013 .
[8] Ajaltouni, E. E., Boukerche, A., & Zhang, M. (2008). An Efficient Dynamic Load Balancing Scheme for Distributed Simulations on a Grid Infrastructure. 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 61-68. Ieee. doi:10.1109/DS-RT.2008.38
[9] Wang, S-C., K-Q. Yan, W-P. Liao and S-S. Wang, "Towards a load balancing in a three-level cloud computing network," in proc. 3rd International Conference on. Computer Science and Information Technology (ICCSIT), IEEE, Vol. 1, pp: 108-113, July 2010.
[10] Radojevic, B. and M. Zagar, "Analysis of issues with load balancing algorithms in hosted (cloud) environments." In proc. 34th International Convention on MIPRO, IEEE, 2011.
[11] K. S. Rashmi, V. Suma and M. Vaidehi, “Enhanced Load Balancing Approach to Avoid Deadlocks in Cloud,” Special Issue of International Journal of Computer Applications (0975 – 8887) on Advanced Computing and Communication Technologies for HPC Applications (ACCTHPCA), June 2012, pp. 31–35.
[12] Z. Chaczko, V. Mahadevan, Sh. Aslanzadeh and Ch. Mcdermid, “ Availability and Load Balancing in Cloud Computing, ” 2011 International Conference on Computer and Software Modeling, IACSIT Press, Singapore, vol.14, pp. 134-140.
[13] S.Penmatsa and A. T. Chronopoulos , Game- theoretic static load balancing for distributed systems, Journal of parallel and Distributing Computing, vol. 71, no.4, pp. 537-555, Apr.2011.
[14] Ruhi Guptha, Rekha Bhatia “An Enhanced and secure approach of load balancing in cloud computing” International Journal of computer Science and Engineering(IJCSE), vol.02, Issue.08, pp.112-116, Aug-2014.
Citation
G.Thejesvi and T.Anuradha, "Distribution of Work Load at Main Controller Level Using Enhanced Round Robin Scheduling Algorithm in A Public Cloud," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.75-78, 2015.
Graph Analysis with Big-data
Review Paper | Journal Paper
Vol.3 , Issue.12 , pp.79-81, Dec-2015
Abstract
Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model from the data mining perspective. The planning of several optimal tuning processes, the comparison of different designs (through graphics or the numeric results obtained), and the management of data files saved during the planned optimal tunings process. The developed tool was made available to students for them to solve a practical problem and, subsequently, the impact of its use was evaluated. There are techniques to learn the categories (clustering). Methods of pattern recognition are useful in many applications such as information retrieval, data mining.
Key-Words / Index Term
MIMO,NLP,RGA,PIP
References
[1]. W. L. Luyben, Practical Distillation Control, W. L. Luyben, Ed.New York: Springer, 1992.
[2]. F. G. Shinskey, Process Control System. New York: McGraw-Hill, 1995.
[3]. A. Niederlinski, “A heuristic approach to the design of linear multivariable interacting control systems,” Automatica, vol. 7, pp. 691–701, 1971.
[4]. M. Zhuang and D. Athertoon, “PID controllers design for a TITO system,” Inst. Elect. Eng. Proc. Control Theory Appl, vol. 141, no. 2,pp. 111–120, 1994.
[5]. Y. Halevy, Z. Palmor, and T. Efrati, “Automatic tuning of decentralized PID controllers for MIMO processes,” J. Process Control, vol. 7, no.2, pp. 119–128, 1998.
Citation
Kalpana, "Graph Analysis with Big-data," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.79-81, 2015.
Intrusion Detection System for Black Hole Detection and Prevention in MANET Using Adaptive Neural Fuzzy Inference Systems
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.82-88, Dec-2015
Abstract
Mobile ad hoc network (MANET) is a self-configuring network of mobile nodes formed anytime and anywhere without the help of a fixed infrastructure or centralized management. It has many potential applications in disaster relief operations, military network, and commercial environments. Due to dynamic, infrastructure-less nature, the ad hoc networks are vulnerable to various attacks. AODV is an important on-demand distance vector routing protocol for mobile ad hoc networks. It is more vulnerable to black & gray hole attack. In MANET, black hole is an attack in which a node shows malicious behavior by claiming false RREP (route reply) message to the source node and correspondingly malicious node drops the entire receiving packet. In fuzzy based IDS an intrusion detection system is presented for MANETs against black hole attack detection as well as prevention using fuzzy logic. But it has some issues such as the attack detection accuracy and speed are less, and also it emphasized on very limited features for data collection towards detection of very specific range of attacks. To overcome above issues, the Adaptive Neural Fuzzy Inference Systems (ANFIS) is proposed and detect black hole attack in MANETs. The proposed system will identify the attack over the node as well as provide the solute on to reduce the data loss over the network. Through simulations, the results prove the proficiency of proposed technique which detect the black hole and improves the network performance.
Key-Words / Index Term
MANETs, ANFIS, Intrusion detection, Black hole Attack, AODV
References
[1] Y. Li and J. Wei., “Guidelines on selecting intrusion detection methods in MANET”, In Proceedings of the Information Systems Educators Conference, 2004.
[2] A. Hasti, “Study of Impact of Mobile Ad – Hoc Networking and its Future Applications”, BIJIT – 2012; January - June, 2012; Vol. 4 No. 1; ISSN 0973 – 5658.
[3] Y. Zhang and W. Lee., “ Intrusion detection in wireless ad hoc networks” , In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), pages 275-283, 2000.
[4] IETF Mobile Ad-Hoc Networks Working Group (MANET),IETFwebsitewww.ietf.org/dyn/wg/charter/manet-charter.html.
[5] R. Heady, G. Luger, A. Maccabe, and M. Servilla, “The architecture of a network level intrusion detection system” Technical report, Computer Science Department, University of New Mexico, August 1990.
[6] Dokurer,Seimih “Simulation of Black hole Attack in wireless ad-hoc etworks” Master’s Thesis AtihmUniversity,Septeber 2006.
[7] Deng H., Li W. and Agrawal, D.P., "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.
[8] MonitaWahengbam,” Intrusion Detection in MANET using Fuzzy Logic”, 978-1-4577-0748-3/12/$26.00 © 2012 IEEE.
[9] G.Kalpana, Dr..M.Punithavalli," fuzzy logic technique for gossip based reliable broadcasting in mobile ad hoc networks", Journal of Theoretical and Applied Information Technology 31st May 2013. Vol. 51 No.3.
[10] ElmarGerhards-Padilla,” Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”, 32nd IEEE Conference on Local Computer Networks 0742- 1303/07© 2007 IEEE.
[11] LathaTamilselvan “Prevention of Co-operative Black Hole Attack in MANET” JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008
[12] K.Selvavinayaki, K.K.Shyam Shankar” “Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANET”International Journal of Computer Applications (0975-8887).volume7-volume11, October 2010.
[13] Jathe S.R, Dakhane D.M ,” A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques “International Journal of Cryptography and Security ISSN: 2249-7013 & EISSN: 2249-7021
[14] Rashid Sheikhl, Mahakal Singh Chande et.al “Security Issues in MANET: Review” 978-1- 4244-7202-4/10/$26.00 ©2010 IEEE
[15] Ochola EO,” A Review of Black Hole Attack on AODV Routing in MANET. Information Security South Africa Conference, Proceedings ISSA 2011.
[16] A. Mitra, R. Ghosh, A. Chakraborty, D. Srivastva, “An Alternative Approach to Detect Presence of Black HoleNodes in Mobile Ad-Hoc Network Using Artificial Neural Network” in IJARCSSE, 2013.
[17] G. Wahane, A. Kanthe, s”Techniques for detection of cooperative Black hole Attack in MANET” in IOSR-JCE, 2014.
[18] AvinashSavaliya, Hardik Patel, BhavikPandya,"Fuzzy Based IDS for Black Hole Detection and Prevention in MANET", www.academia.edu.
Citation
K.Santhi and V.Abinaya, "Intrusion Detection System for Black Hole Detection and Prevention in MANET Using Adaptive Neural Fuzzy Inference Systems," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.82-88, 2015.
Image Segmentation Techniques Based on Fuzzy C-Means and Otsu, Applied to the Brain MRI in Tumor Detection
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.89-101, Dec-2015
Abstract
Visual information is the richest probably different existing information sources in our daily lives. The extraction of this information by processing systems and image analysis has attracted growing interest. The image processing is a process involving several stages, that it was born from the need to replace the human observer by the machine. He works in many fields such as medicine. A must in all image analysis process is the segmentation. By providing a compact description of the image, more exploitable than all the pixels, the image segmentation facilitates automatic interpretation of an image similar to human interpretation. Indeed, she was inspired by the human visual perception system that uses the concept of similarity and difference in order to locate and delineate the objects in an image. It can be defined as following: the image segmentation is a low-level process of creating a partition of the image into subsets called regions in a way that no region is empty; the intersection between the two regions is empty and covers all regions throughout the image. A region is a set of connected pixels having common properties that differentiate the pixels neighboring regions. This task although fluently although raised by the human visual system, is actually complex and remains a challenge for the image processing community despite several decades of research. Thus, several segmentation methods have been proposed in the literature, and can be classified into three major approaches: Approach area, Approach contour, cooperative approach. This article studies the problem of segmentation of MRI brain images. We worked precisely on cooperating more automatic classifiers to exploit complementarities between different methods or operators and increase the strength of the segmentation process. Our approach focuses on the FCM algorithm (Fuzzy c-means), the sum of degrees of membership of an individual given to all possible classes being 1. To make the algorithm robust to inaccuracies and ambiguous data that can considerably affect on the classes centers, we introduce the notion of ambiguity rejection.
Key-Words / Index Term
Segmentation, C-means, MRI brain, thresholding, Otsu
References
[1]’’Image segmentation ‘’, chapter 10, https: //courses. cs.washington. edu/courses/ cse576/book /ch10.pdf.,Page No (1-51),March 2000.
[2] Rajeshwar Dass, 2Priyanka, 3Swapna Devi,’’ Image Segmentation Techniques’’, ISSN : 2230-7109 (Online) | ISSN : 2230-9543 (Print), International Journal of Electronics & Communication Technology, IJECT Vol. 3, Issue 1,Page No (66-70) ,Jan. - March 2012.
[3] Anna Blasiak,’’ A Comparison of Image Segmentation Methods’’, Senior Thesis in Computer Science Middlebury College, Page No (53-79), May 2007.
[4]‘’Segmentation’’,Chapter 10, http://www.cs.uu.nl /docs /vakken /ibv/reader/chapter10.pdf, Page No (24-69).
[5] A. M. Khan, Ravi. S,’’ Image Segmentation Methods: A Comparative Study’’, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-4, Page No (1-9),September 2013.
[6] Vinay Lowanshi, Shweta Shrivastava,’’ Two Tier Architecture for Content Based Image Retrieval Using Modified SVM and knn-GA’’, International Journal of Computer Sciences and Engineering, Volume-2Issue-10,Page No (41-45),2014.
[7]Bryan S.Morse ,‘’Thresholding’’, Brigham Young University, 2000, http:// homepages .inf.ed.ac .uk/rbf/ CVonline/LOCAL_COPIES/MORSE/threshold.pdf, Page No (1-23).
[8] Mehmet Sezgin, Bulent Sankur,’’ Survey over image thresholding techniques and quantitative performance evaluation’’, Journal of Electronic Imaging 13(1), 146–165, Page No (1-18), (January 2004).
[9] S. Jansi, P. Subashini,’’ Optimized Adaptive Thresholding based Edge Detection Method for MRI Brain Images’’, International Journal of Computer Applications (0975 – 8887) Volume 51– No.20, Page No (1-8) ,August 2012.
[10] ‘’nonparametric methods’’, contaminated sites statistical applications guidance document no. 12-5,Page No(1-4),April 2001.
[11] Junmo Kim_, John W. Fisher III_, Anthony Yezzi, Jr., Mujdat Cetin_, and Alan S. Willsky,’’ nonparametric methods for image segmentation using information theory and curve evolution’’, this paper appeared in Proceedings of the 2002 IEEE International Conference on Image Processing, Rochester, NY, Page No(1-4),September 2002.
[12] Ahmed Elgammal ,Dept of Computer Science,Rutgers University,’’ CS 534: Computer Vision Segmentation III Statistical Nonparametric Methods for Segmentation’’, http://www.cs.rutgers.edu/~elgammal/classes/cs534/lectures/Segmentation3_meanshift.pdf., Page No(4-14).
[13] Junmo Kim, Member, IEEE, John W. Fisher, III, Member, IEEE, Anthony Yezzi, Member, IEEE, Müjdat Çetin, Member, IEEE, and Alan S. Willsky, Fellow, IEEE,’’ A Nonparametric Statistical Method for Image Segmentation Using Information Theory and Curve Evolution’’, IEEE Transactions On Image Processing, Vol. 14, NO. 10, Page No (1-17),OCTOBER 2005.
[14] DongjuLiu, JianYu,’’ Otsu method and K-means’’, Ninth International Conference on Hybrid Intelligent Systems, 978-0-7695-3745-0/09 $25.00 © 2009 IEEE DOI 10.1109/HIS.2009.74,Page No (344-349), 2009.
[15] Julie DELON, Agnès DESOLNEUX, José-Luis LISANI, Ana-Belén PETRO,’’ A non parametric approach for histogram Segmentation’’, http://desolneux .perso.math.cnrs. fr/ papers /DDLP_HistIP_07.pdf., Page No (1-9).
[16] Giovanna Menardi , ‘’a Nonparametric Clustering Method For Image Segmentation’’, http:// convegni.unica.it/cla dag2015 /files /2015 /10/Menardi.pdf.,Page No (1-4).
[17] Yaoyong Liu, Shuguang Li,’’ Two-Dimensional Arimoto Entropy Image Thresholding based on Ellipsoid Region Search Strategy’’, 978-1-4244-7874-3/10/$26.00 © IEEE,Page No(1-4), 2010 .
[18] Ahmad Adel Abu Shareha, Mandava Rajeswari, Dhanesh Ramachandram,’’ Textured Renyi Entropy for Image Thresholding’’, Fifth International Conference on Computer Graphics, Imaging and Visualisation, DOl 10.1109/CGIV.2008.48 ,978-0-7695-3359_9/08 $25.00 © IEEE ,Page No (185-192),2008 .
[19] Yang Xiao , Zhiguo Cao , Junsong Yuan,’’ Entropic image thresholding based on GLGM histogram ‘’, Pattern Recognition Letters 40 (2014), Elsevier , Page No (47–55),2014 .
[20] Prasanna K. Sahoo, Gurdial Arora,’’ A thresholding method based on two-dimensional Renyi’s entropy’’, Pattern Recognition 37 1149 – 1161, 0031-3203/$30.00 ? 2003 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved, doi: 10.1016/ j. patcog. 2003.10.008, Page No (1149-1161),(2004).
[21] Mohamed. A. El-Sayed, S. Abdel-Khalek, and Eman Abdel-Aziz,’’ Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding’’, International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 3 No. 9 ,Page No (3125-3138),September 2011.
[22] Martin Lindquist,’’ Statistical Methods in functional MRI’’, Overview of fMRI Data Analysis, 04/02/13.Page No (1-8),2013.
[23] Alexei A. S amsn o v ,Ros,s T. Whiti kerE.ug,e ne G. Kholmovki’Chi,i s R. Johnson’, ‘’Parametric Method for Correction of Intensity Inhomogeneity in MRI Data’’, © Proc. Intl. Soc. Mag. Reson. Med. 10 (2002).
[24] Amy herlihy,Lada Krasnosselskaia,Agilent technologies, Yarnton , ‘’MRI methods for collecting and analyzing parametric maps of the mouse brain at 7T ‘’, Page No(1-8),2012.
[25] Vitali Zagorodnov, Member, IEEE, and Arridhana Ciptadi, Student Member, IEEE, Component Analysis Approach to Estimation of Tissue Intensity Distributions of 3D Images’’, IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 30, NO. 3,Page No(838-848) ,MARCH 2011.
[26] Jan-Philip Bergeest, Florian Jager,’’ A Comparison of Five Methods for Signal Intensity Standardization in MRI’’,Springer,Page No(36-40) ,2008.
[27] Florian Jäger and Joachim Hornegger, Member, IEEE,’’ Nonrigid Registration of Joint Histograms for Intensity Standardization in Magnetic Resonance Imaging’’, IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 28, NO. 1,Page No(137-149) ,JANUARY 2009.
[28] Francisco J. Galdames, Fabrice Jaillet, Claudio A. Perez,’’ An Accurate Skull Stripping Method Based on Simplex Meshes and Histogram Analysis in Magnetic Resonance Images’ ,http://liris.cnrs.fr/Documents/Liris-5295.pdf. , Page No(1-17).
[29] Eugene Weinstein,’’Expectation –Maximization Algorithm and applications’’, Courant Institute of Mathematical Sciences,Page No(1-31) ,Nov 14th, 2006.
[30] Derek Bradley, Gerhard Roth,’’ Adaptive Thresholding Using the Integral Image’’, Page No (1-6), 2007.
[31] T .Romen Singh,Sudipta Roy,O.Imocha Singh,Tejmani Sinam, Kh .Manglem Singh,’’ A New Local Adaptive Thresholding Technique in Binarization’’, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, Page No(271-277) ,November 2011 ISSN (Online): 1694-0814 www.IJCSI.org,2011.
[32] F. P. Kressler , M. Franzen , K. Steinnocher,’’ SEGMENTATION BASED CLASSIFICATION OF AERIAL IMAGES AND ITS POTENTIAL TO SUPPORT THE UPDATE OF EXISTING LAND USE DATA BASES’’, Page No (1-6),Sep 29, 2014.
[33] Azzeddine Riahi ,’’MRI Image Segmentation by K-Means Clustering Method and Detection of Lesions’’, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064, Volume 4 Issue 6, Page No(2484-2492),June 2015
[34] Emre Akbas and Narendra Ahuja,’’ Low-level Image Segmentation Based Scene Classification’’, International Conference on Pattern Recognition, 1051-4651/10 $26.00 © 2010 IEEE ,DOI 10.1109/ICPR.2010.884,Page No(3623-3626),2010.
[35] Xiaofeng Ren and Jitendra Malik,’’ Learning a Classification Model for Segmentation’’, http://ttic.uchicago.edu/~xren/publication/xren_iccv03_discrim.pdf.,Page No (1-8).
[36] Chap. 7 — Region Segmentation, Computação Visual e-Multimédia http://www.di .ubi.pt /~agomes/cvm/teoricas/07-regionsegmentation.pdf. , Page No (1-32).
[37] Stephen Gould,Tianshi Gao,Daphne Koller,’’ Region-based Segmentation and Object Detection’’, http://ai.stanford.edu/~koller/Papers/Gould+al:NIPS09.pdf., Page No (1-9).
[38] Bryan S. Morse, ‘’Lecture 18: Segmentation (Region Based)’’, Brigham Young University, Page No (1-6), March 3, 2000.
[39] Yu-Hsiang Wang,’’ Tutorial: Image Segmentation’’, Graduate Institute of Communication Engineering National Taiwan University, Taipei, Taiwan, ROC, http:// disp.ee.ntu.edu.tw/meeting/%E6%98%B1% E7%B %94/ Segmentation %20tutorial.pdf. , Page No (1-36).
[40] YI-WEI YU andJUNG-WA WANG,’’ Image Segmentation Based on Region Growing and Edge Detection’’, 0-7803-5731-0/99$$10.00 01999 IEEE, Page No (798-803),1999.
[41] Yinghua Lu, TinghuaiMa, Changhong Yin, Xiaoyu Xie, Wei Tian and ShuiMing Zhong,’’ Implementation of the Fuzzy C-Means Clustering Algorithm in Meteorological Data’’, International Journal of Database Theory and Application Vol.6, No.6 (2013), pp.1-18 http://dx.doi.org/10.14257/ijdta.2013.6.6.01, ISSN: 2005-4270 IJDTA Copyright 2013 SERSC,Page No(1-18),2013.
[42] Subhagata Chattopadhyay, Dilip Kumar Pratihar, Sanjib Chandra De Sarkar’’ A COMPARATIVE STUDY OF FUZZY C-MEANS ALGORITHM AND ENTROPY-BASED FUZZY CLUSTERING ALGORITHMS’’, Computing and Informatics, Vol. 30, 2011, 701–720, Page No (701-720) ,2012.
[43] Soumi Ghosh, Sanjay Kumar Dubey,’’ Comparative Analysis of K-Means and Fuzzy C-Means Algorithms’’, www.ijacsa.thesai.org, ((IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No.4,Page No (35-39), 2013.
[44] S. Ramathilaga, James Jiunn-Yin Leu, Yueh-Min Huang,’’ Adapted Mean Variable Distance to Fuzzy-Cmeans for Effective Image Clustering’’, First International Conference on Robot, Vision and Signal Processing, 978-0-7695-4581-3/11 $26.00 © 2011 IEEE ,DOI 10.1109 /RVSP.2011.58,Page No(48-51),2011.
[45]chapter4‘’FUZZY CLUSTERING’’ https: //homes. di.unimi.it /valenti/ Slide Corsi/Bioinformatic a05/Fuzzy-Clustering-lecture-Babuska.pdf. ,Page No(55-71).
[46] Xiao Ying Wang, Jon Garibaldi, Turhan Ozen,’’ Application of the Fuzzy C-Means Clustering Method on the Analysis of non Preprocessed FTIR Data for Cancer Diagnosis’’,2003, http://ima.ac.uk/papers/wang2003.pdf., Page No (1-6).
[47] Keh-Shih Chuang , Hong-Long Tzeng , Sharon Chen , Jay Wu , Tzong-Jer Chen,’’ Fuzzy c-means clustering with spatial information for image segmentation’’, 0895-6111/$ - see front matter q 2005 Published by Elsevier Ltd,doi:10.1016/j.compmedimag.2005.10.001,Page No (9-15),2005.
[48] Tina Geweniger, Dietlind Zühlkeand Barbara Hammer and Thomas Villmann,’’ Median Variant of Fuzzy c-Means’’, ESANN'2009 proceedings, European Symposium on Artificial Neural Networks - Advances in Computational Intelligence and Learning. Bruges (Belgium), 22-24 April 2009, d-side publi, ISBN 2-930307-09-9, Page No (523-528), 2009.
[49] Stelios Krinidis and Vassilios Chatzis,’’ A Robust Fuzzy Local Information C-means ClusteringAlgorithm’’, http://infoman.teikav.edu .gr/~stkrini/pdfFiles/journals /2010_TIP.pdf. ,2010. , Page No (2-11),2010.
[50] Mathias Bank and Friedhelm Schwenker,’’ Fuzzification of Agglomerative Hierarchical Crisp Clustering
Citation
Azzeddine Riahi, "Image Segmentation Techniques Based on Fuzzy C-Means and Otsu, Applied to the Brain MRI in Tumor Detection," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.89-101, 2015.
Image Segmentation of Cranial Vault for Clinical Analysis
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.102-105, Dec-2015
Abstract
For several applications, segmented images gives better insight with increased accuracy and repeatability. Several segmentation algorithms were proposed for clinical purposes to diagnose, treatment and for tracking the progress of disease. Segmenting structures from medical images and reconstruction of specific anatomical shapes is difficult due to large size of datasets, complexity and variability of a given image. It is therefore, better to view the segmented images than the whole scan obtained from CT or MRI. Particularly, in surgical planning over diseased organ, segmented part is enough for visualization than the whole image. For example, if there is fracture in skull bone, it would be sufficient to view the fractured bone from a diagnostic image. Watershed segmentation is widely used in medical image processing applications because it is relatively fast in terms of computational time. An algorithm to segment the cranial vault bone based on Watershed method is presented. It is also implemented for few specific cranial vault abnormalities to demonstrate the results.
Key-Words / Index Term
Watershed; segmentation; cranial vault; MRI; Lesions
References
[1] M. Stytz., Frieder, G. and Frieder, O. “Three - dimensional medical imaging: Algorithms and computer systems”. ACM Computing Surveys Vol. 23 Issue 4, 1991, pp.421–499.
[2] N. Ayache. “ Medical computer vision, virtual reality and robotics”. Image and Vision Computing. Vol. 13, Iss. 4, 1995a , pp.295–313.
[3] AS. Romer., and Parsons, T. S. “The Vertebrate Body”. Saunders College, Philadelphia, 1977.
[4] DA. Wecht, Sawaya R. Lesions of the calvaia: “Surgical experience with 42 patients”. Ann. Surg. Oncol., Vol.4, 1997, pp. 28-36.
[5] F. Hodges, “Pathology of the skull”. In. Taveras J, Ferrucci J. eds. Radiology: diagnosis, imaging and intervention. 2nd ed. Vol. 3, 1989, pp. 1-21.
[6] D. Bastug, Ortiz O, Sydney S. Schochet. “Hemangiomas in the Calvaria: Imaging Findings”. AJR; Vol. 164, March 1995; pp.683-687.
[7] NR. Pal and Pal SK. “A review on image segmentation techniques”. Pattern Recogn. Vol. 26, Issue-9, 1993, pp 1273-1294.
[8] Pritee Gupta, Vandana Malik and Mallika Gandhi. “Implementation of Multilevel Threshold Method for Digital Images Used In Medical Image Processing”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue-2, 2012.
[9] Y.J.Zhang and J.J.Gerbrands, “Objective and quantitative segmentation evaluation and comparison”, Signal Processing 39, 1994, pp.43-54.
[10] T. Law, Itoh H, Seki H. “Image filtering, edge detection, and edge tracing using fuzzy reasoning”. IEEE Trans PAMI. 1996;18, pp.481–91.
[11] G. Chen, T. Hu, X. Guo, and X. Meng, "A fast region-based image segmentation based on least square method," in Proc. IEEE International Conference on Systems, Man and Cybernetics, SMC, 2009, pp.972-977.
[12]N. Ramesh, Yoo JH, Sethi IK. “Thresholding based on histogram approximation”. IEEE Proc Vision Image Signal Proc. 1995; 142, pp.271–9.
[13] S. Zhu, X. Xia, Q. Zhang, and K. Belloulata, "An image segmentation algorithm in image processing based on threshold segmentation," in Proc. Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, SITIS'0., 2007, pp. 673-678.
[14] Fitz Simmons, Ellen; Jack H. Prost & Sharon Peniston . "Infant Head Molding, A Cultural Practice,"Arch. Fam. Med., 7 (January/February) 1998.
[15] L. Vincent and P. Soille, “Watersheds in digital spaces: an efficient algorithm based on immersion simulations,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 13, no. 6, 1991, pp. 583–598.
[16] L. Vincent, “Morphological grayscale reconstruction in image analysis: applications and efficient algorithms,” IEEE Transactions on Image Processing, vol. 2, no. 2, 1993, pp. 176–201.
[17] Wafa Abid Fourati and Mohamed Salim Bouhlel, “Trabecular Bone Image Segmentation Using Wavelet and Marker-Controlled Watershed Transformation,” Chinese Journal of Engineering, 2014.
[18] S. Ravi, Khan AM. “Bio-Medical Image Segmentation Using Marker Controlled Watershed Algorithm: A Case Study”. IJRET, Vol 3, Spl. Issue- 3, May 2014, pp 26-30.
[19] H. Digabel and C. Lantuéjoul, “Iterative algorithms,” in Proceedings of the 2nd European Symposium on Quantitative Analysis of Microstructures in Materials Sciences, Biology and Medicine, 1977, pp. 85–99.
[20] Lázaro Amaral; Miriam Chiurciu; João Ricardo Almeida; Nelson Fortes Ferreira; Renato Mendonça; Sérgio Santos Lima. “MR imaging for evaluation of lesions of the cranial vault: a pictorial essay”. Arq. Neuro-Psiquiatr. vol.61 Issue-.3A São Paulo Sept. 2003.
[21] P K Nayak M Ch, A K Mahapatra M Ch.” Primary reconstruction of depressed skull fracture - The changing scenario”. Indian Journal of Neurotrauma (IJNT) 2007, Vol. 5, No. 1, pp. 35-38.
[22] M. Seruya, Tan SY, Wray AC, Penington AJ, Greensmith AL, Holmes AD, Chong DK. “Total cranial vault remodeling for isolated sagittal synostosis: part I. Postoperative cranial suture patency”. Plast Reconstr Surg. 2013 Oct; 132(4): pp.602e-610e
[23] J. Rajiv. Iyengar, BS, Petra M. Klinge, Wendy Chen, Stephen R. Sullivan, Helena O. Taylor, “Management of craniosynostosis at an advanced age: Clinical findings and interdisciplinary treatment in a 17 year-old with pan-suture synostosis”. Interdisciplinary Neurosurgery. Vol. 2, Iss.1, 2015, pp. 61-64.
Citation
K. Prahlad Rao, "Image Segmentation of Cranial Vault for Clinical Analysis," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.102-105, 2015.
A Survey Paper on Digital Modulation Techniques
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.107-111, Dec-2015
Abstract
Wireless communications has become a new field to growing rapidly in our recent life and creates a huge impact on almost all the features of our daily lives. An enormous technological transformation in the prior two decades has been provided a potential growth in the area of digital communication and lots of the most recent applications and technologies are to come each day as a result of these valid reasons. Digital modulation contributes to the growth of mobile communications by increasing the quality, speed and capacity of the wireless network. In the communication, the idea of modulation is a primary factor for the reason that without a scheme of appropriate modulation, it would be not possible to attain a planned flow. The offered bandwidth, allowable power and the level of inherent noise of the system are the constraints which must be taken into account in the development of communication systems. Because of the error free capacity in the digital modulation, it is chosen over the techniques of analogue modulation. The WiMax uses combinations of distinct modulation schemes such as BPSK, QPSK, 4-QAM and 16-QAM and it is a capable technology which provides video, data and high speed voice services. In this literature the review of documentation on the various digital modulation techniques that are typically used for wireless communication is presented.
Key-Words / Index Term
Digital Modulation; Amplitude Shift Keying; Phase Shift Keying; Binary Phase Shift Keying (BPSK); Quadrature Phase Shift Keying (QPSK); QAM; Bit Error Rate
References
[1] J.T. Haitham, M.F.M Salleh, “Multi-carrier Transmission Techniques for Wireless Communication Systems: A Survey,” WSEAS Transactions on Communications, Vol. 8, Issue 5, pp. 215-225, 2009.
[2] B.W. Hiroshi, W.M. Ramjee, “Digital Communication,” Artech House, London, pp. 5-8, 2005.
[3] G. Tharakanatha, S.K. Mahaboob, V.B. Chanda, I. Hemalatha, “Implementation and Bit Error Rate analysis of BPSK Modulation and Demodulation Technique using MATLAB,” IJETT, vol. 4, Issue 9, 2013.
[4] V.Chauhan, M. Arora, R.S. Chauhan, “Comparative BER Performance of PSK based Modulation Techniques under Multipath Fading,” Advances in Applied Science Research, vol. 2, no. 4, pp. 521-524, 2011.
[5] J. Bagga, N. Tripathi, “Study and Comparison of Various Modulation Classification Techniques under Noisy Channel Conditions,” IJETAE, vol. 2, Issue 4, 2012.
[6] R. Pandey, K. Pandey, “An Introduction of Analog and Digital Modulation Techniques in Communication System,” Journal of Innovative Trends in Science Pharmacy & Technology, vol. 1, pp. 15-21, 2014.
[7] R. R.Bhambare, R.D. Raut., “A Survey on Digital Modulation Techniques for Software Defined Radio Applications,” IRACST, vol. 3, no. 3, 2013.
[8] R. Mongre, M. Kapoor, “Compative Analysis of Digital modulation Techniques on the Basis of their Bit Error Rate in VHDL,” IJETR, vol. 2, Issue 6, pp. 55-60, 2013.
[9] K. Hamid, I. Khider, A. Babiker, “Performance Evaluation of Digital Modulation Techniques on DS-WCDMA,” IJCA vol. 74, no. 8, 2013.
[10] J.D. Oetting, “A Comparison of Modulation Techniques for Digital Radio,” IEEE Transactions on Communications, vol. 27, no. 12, pp 1752-1762, 1979.
[11] B.Sklar, P.K.Ray, “Digital Communications, Fundamentals and Applications,” Second Edition, Pearson Education, Inc., 2001.
[12] T.Schilling, “Principles of Communications Systems,” Second Edition, Tata McGraw-Hill Publishing Company Limited, New Delhi.
[13] M.Tao, “Principles of Communications, Chapter-8: Digital Modulation Techniques,” Shanghai Jiao Tong University.
[14] O. A. Adeleke and R.O. Abolade, “Modulation Methods Employed in Digital Communication: An Analysis,” IJECS-IJENS, vol. 12 , no. 03, 2012.
[15] R. Singh, “MIMO System using Space-Time Block Code with Digital Modulation Techniques,” IJEER, vol. 1, Issue 1, pp. 26-31, 2013.
[16] A.Rehman, T.Khan, S.K.Chaudhry, “Study of Wi-Max Physical Layer under Adaptive Modulation Technique using Simulink,” IJSRET, vol. 1, Issue 5, pp 05-11, 2012.
[17] S. Gupta, H.Sharma, “Performance Investigation for Different Modulation Techniques in WCDMA with Multipath Fading Channels,” IJARCSSE, vol. 2, Issue 7, 2012.
[18] A. Islam, Z. Hasan, “Performance Evaluation of Wi-Max Physical Layer under Adaptive Modulation Techniques and Communication Channels,” IJCSIS, vol. 5, no. 1, 2009.
[19] S.A. Oyetunji, A.A. Akinninranye, “Performance Evaluation of Digital Modulation Techniques in AWGN Communication Channel,” IJERT, vol. 2, Issue 5, pp. 34-39, 2013.
[20] V.Tilwari, A.S. Kushwah, “Performance Analysis of Wi-Max 802.16e Physical Layer using Digital Modulation Techniques and Code Rates,” IJERA, vol. 3, Issue 4, pp. 1449-1454, 2013.
[21] P.Aulin,W.C.Sundberg, “Continuous Phase Modulation Part-1: Full Response Signaling,” IEEE Transactions on Communications, vol. 29, no. 3, pp. 196-209, 1981.
[22] S.Haykin, M. Moher, “Introduction to Analog and Digital Communications,” John Wiley & Sons, Inc., 2007.
[23] M.A.Masud, M.Samsuzzaman, M.A.Rahman, “Bit Error Rate Performance Analysis on Modulation Techniques of Wideband Code Division Multiple Access,” Journal of Telecommunications, vol. 1, Issue 2, pp. 8-14, 2010.
Citation
Shadbhawana Jain and Shailendra Yadav, "A Survey Paper on Digital Modulation Techniques," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.107-111, 2015.
An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network
Research Paper | Journal Paper
Vol.3 , Issue.12 , pp.112-117, Dec-2015
Abstract
A mobile ad-hoc network (MANET) is a group of wireless mobile devices or nodes that communicate with each other without any help of a pre-installed infrastructure and centralized access points. Security is the most important concern for the functionality of network in MANET. MANET is unsecure from various attacks in the routing path and understanding the form of attacks is always the primary step towards the secured communication between mobile nodes. A number of attacks affect the safe exchange of information in MANET and among them the occurrence of black hole attack causes several limitations such as fault tolerance, packet loss, denial of service and jamming of network while transmitting data between nodes in the route. In order to preserve the security of MANET from attacks, routing protocols are important to ensure proper functioning of the path from source to destination nodes. In this research paper an improved dynamic source routing (IDSR) technique has been proposed to detect and remove the black hole attack nodes in the routing path and ensures reliable communication between nodes by constructing the black hole attack free route in MANET.
Key-Words / Index Term
MANET, black hole attack, routing protocols, dynamic source routing technique
References
[1] Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi, “A Review of Routing Protocols for Mobile Ad-Hoc Networks (MANET)”, International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013.
[2] S. Anusuya, Dr. S.Meenakshi, “A Review of Routing Protocols and Attacks in Mobile Ad-hoc Network”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 4, Issue 9, pp.3485-3493, September 2015.
[3] T.Ashish Bhole, Prachee ,N. Patil “Study Of Black hole Attack In MANET”, International Journal of Engineering and Innovative Technology, Vol.2, No. 4, October 2012.
[4] C-C Chiang, H-K Wu, W .Liu, M.Gerla “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel”, In Proceedings of IEEE SICON, pp.197–211, 1997.
[5] H. Deng, W. Li, and Dharma P. Agrawal, “Routing Security in Ad Hoc Networks,” IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, pp. 70-75, October 2002.
[6] M. Girish Chandra ,S.G.HarishReddy,JaydipSen “A Mechanism for Detection of black hole attack in Manets”, In Proceeding of the 6th International Conference on Information, Communication and Signal Processing(ICICS07), Singapore, December 2010.
[7] HesiriWeerasinghe and Huirong Fu, Member of IEEE, “Preventing Cooperative Black Hole Attacks in Mobile Ad-hoc Networks”, Simulation implementation and evaluation, Vol. 2, No.3, July 2008.
[8] JaydipSen, M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamurlidhar (Embedded System Research Group, TCS), “Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks”, IEEE 2007.
[9] D. B. Johnson, DA.Maltz and J.Broch “Dynamic Source Routing Protocol (DSR)”, ACM Digital Library, pp 210-215, October 1996.
[10] M.Mohanapriya, krishnamurthi “DSR protocol for detection and removal of black hole attack in MANET”, ELSEVIER computer and electrical engineering, pp.530-538, 2014.
[11] V. G. Muralishankar and Dr. E. George Dharma Prakash Raj, “Routing Protocols for MANET: A Literature Survey”, International Journal of Computer Science and Mobile Applications, Vol. 2, No.3, March 2014.
[12] D.B.Roy, R.Chaki and N.Chaki, “A New Cluster-Based black hole Intrusion Detection Algorithm for Mobile Ad Hoc Networks”, International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1, April, 2009.
[13] Shalini, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by dynamic learning method”, International Journal of Network Security”, Vol.5, No.3, pp. 338-346, 2007.
[14] Tamilselvan, L.Sankaranarayanan, “Prevention of black hole Attack in MANET”, International Journal of networks Network Security, Vol.3, No.5, May 2008.
Citation
S.Anusuya and S.Meenakshi, "An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.112-117, 2015.
Automatic Ventilation Control System for Energy Efficient buildings using CO2 Sensors
Review Paper | Journal Paper
Vol.3 , Issue.12 , pp.118-125, Dec-2015
Abstract
In this paper, the proposed work states automatic control strategy for ventilation systems in energy-efficient buildings. To maintain indoor CO2 in the comfort zone to the accurate level and minimum ventilation rate is the main design goal of automatic ventilation controller. The system uses CO2 as the main indicator of human comfort. The intelligent system as compared to traditional ON/OFF or fixed ventilation system gives better results in energy saving and also provide high indoor air quality.
Key-Words / Index Term
AVR controller, LCD, Sensor, CO2 Predictive model, KEIL µVision3
References
[1]. ANSI/ASHRAE Standard 62.1-2004: “Ventilation for Acceptable Indoor Air Quality”.American Society of Heating, Refrigerating and Air-Conditioning Engineers.
[2]. Tuan Anh Nguyen, Marco Aiello Distributed Systems Group, Johann Bernoulli Institute for Mathematics and Computer Science,“Energy intelligent buildings based on user activity: A survey”, University of Groningen, Nijenborgh 9, 9747 AG Groningen, The Netherlands
[3]. M. Wigginton, J. Harris,” Intelligent Skins”, Architectural Press, Oxford, 2002.
[4]. Y. Kim, Z. Charbiwala, A. Singhania, T. Schmid, M. B. Srivastava, SPORTLIGHT:Personal Natural Resource Consumption Profiler, HotEmNets 2008, 2008.
[5]. J. Lu, T. Sookoor, V. Srinivasan, G. Gao, B. Holben, J. Stankovic, E. Field, K. Whitehouse,“The smart thermostat: using occupancy sensors to save energy in homes”, in: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys’10), 2010.
[6]. A. Kamthe, L. Jiang, M. Dudys, A. Cerpa, SCOPES: “Smart cameras object position estimation system”, in: Proceedings of the 6th European Conference on Wireless Sensor Networks, EWSN ’09, Springer-Verlag, Berlin, Heidelberg, 2009, pp.279–295.
[7]. V.L. Erickson, Y. Lin, A. Kamthe, B. Rohini, A. Surana, A.E. Cerpa, M.D. Sohn, S.Narayanan, “Energy Efficient building environment control strategies using realtime occupancy measurements”, in: Proceedings of the First ACM Workshop on Embedded Sensing Systems for Energy Efficiency in Buildings, BuildSys ’09, ACM, New York, NY, USA, 2009, pp. 19–24.
[8]. Y. Agarwal, B. Balaji, R. Gupta, J. Lyles, M. Wei, T. Weng, “Occupancy-driven energy management for smart building automation”, in: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys ’10, ACM, New York, NY, USA, 2010, pp. 1–6.
[9]. W. J. Fisk and A. T. de Almeida, “Sensor-based demand-controlled ventilation: a review,” Energy Building, vol. 29, no. 1, pp. 35–44, 1998.
Citation
Rupam S. Rote and Rupali R. Jagtap, "Automatic Ventilation Control System for Energy Efficient buildings using CO2 Sensors," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.118-125, 2015.
A Survey on Data Mining Algorithms
Survey Paper | Journal Paper
Vol.3 , Issue.12 , pp.126-129, Dec-2015
Abstract
This research paper presents a review of data mining algorithms which is useful to predict the accuracy in the educational domain. It discusses and compares various data mining algorithms in the educational domain. Nowadays it is becoming increasingly important to develop powerful tools for analysis of the enormous data that is stored in databases and data warehouses, and mining such data and arriving at values focused on interesting knowledge from it. Modern organizations focus and put on much thrust in developing data mining procedures and derive benefit from it. Data mining is a process of inferring knowledge from such huge data. There are three major components in Data Mining Viz Clustering, Classification and Association Rules. By discussing the various algorithms this research paper has the scope to extend it further, in order to develop it further in the direction of new and innovative algorithms. The main aim of the paper is to study the effectiveness of various algorithms in the educational environment.
Key-Words / Index Term
Clustering, Classification, Association rule, Data mining, innovative algorithms
References
[1]. Hemlata Sahu et al. A Brief Overview on Data Mining Survey, International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, pp. 114-121. ISSN 2249-6343.
[2]. Chen, Shaoyong, Min Lin, Huanming Zhang. Research of mobile learning system based on cloud computing,e- Education, Entertainment and e-Management. International conference on IEEE,vol.,no.,pp.121-123,27-29 Dec.2011
[3]. Shuai,Qin,zhou Ming-quan. Cloud computing promotes the progress of m-learning, Uncertainty Reasoning and knowledge Engineering. International conference on IEEE, vol.2, no.,pp. 162-164,4-7 Aug.2011.
[4]. Hirsch, Benjamin, Jason WP Ng., “Education beyond the Cloud: Anytime-anywhere learning in a smart campus environment”, Internet Technology and Secured Transactions (ICITST), International conference on IEEE, vol., no., pp. 718-723, 11-14 Dec.2011.
[5]. Carsten Ullrich, Ruimin Shen, Ren Tong and Xiaohong Tan. A mobile live video learning system for large scale learning system design and Evaluation. IEEE Transactions on learning Technologies. Vol .3, No.1, January –March 2010.
[6]. N. Mallikharjuna Rao, C. Sasidhar, V. Satyendra Kumar. Cloud Computing Through Mobile – Learning.
[7]. Mohamed Osman M. EI-Hussein and Johannes C.Cronje. Defining Mobile Learning in the Higher Education Landscape. Educational Technology & Society.13 (3), 12-21.
[8]. Mrs. Bhuvana Raghvendra Bajpai. M- Learning & Mobile Knowledge Management: Emerging new stages of E-Learning & Knowledge Management. IEEE ICC 2011
[9]. Kritika Verma, Sonal Dubey, Dr.M.A.Rizvi. Mobile Cloud a New vehicle for Learning: M-Learning its issues and Challenges. International Journal of Science and Applied Information Technology, Volume 1,No.3, July – August 2012.
[10]. Minjuan Wang, Yong Chen and Muhammad Jahanzaib Khan. Mobile Cloud Learning for Higher Education: A Case Study of Moodle in the cloud. The International Review of Research in Open and Distance Learning.
[11]. Hoand T.Dinh, Chonho Lee, Dusit Niyato and Ping Wang. A Survey of Mobile Cloud Computing: Architecture, Applications and Approaches. Wireless Communication and Mobile Computing, 2013; 13: 1587-1611.
[12]. Meilian Chen, Yan Ma, Yikun Liu, Fan Jia, Yanhui Ran and Jie Wang. Mobile learning System Based on Cloud Computing. Journal of Networks, Volume 8, No. 11, November 2013.
[13]. Mohssen M. Alabbadi. Mobile Learning (m-Learning) Based on Cloud Computing: M-Learning as a Service (mLaaS). The Fifth International conference on mobile Ubiquitous Computing, Systems, Services and Technologies, 2011.
[14]. Pragaladan R, Leelavathi. M. A Study of Mobile Cloud Computing and Challenges. International Journal of Advanced Research in Computer and Communication Engineering. Volume 3, Issue 7, July 2014.
[15]. Anwar Hossain Masud, Xiaodi Huang. A Cloud Based M-Learning Architecture for Higher Education. http://www.researchgate.net/publications/235758554
[16]. Hossein Movafegh Ghadirli and Maryam Rastgarpour. A Paradigm for the Application of Cloud Computing in Mobile Intelligent Tutoring Systems. International Journal of Software Engineering & Applications (IJSEA), Volume 4, No.2, March 2013.
[17]. Mike chapple, Data mining definition, downloaded from the web site http://databases.about.com / od / datamining /g/clustering.html.
[18]. Manjunath et al. world wide web information retrieval using clustering RD, International Journal for Scientific Research & Development| Vol. 2, Issue 04, 2014 | ISSN (online): 2321-0613,
Citation
Uma, L. Jayasimman, and V. Upendran, "A Survey on Data Mining Algorithms," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.126-129, 2015.
A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV
Review Paper | Journal Paper
Vol.3 , Issue.12 , pp.130-135, Dec-2015
Abstract
A mobile ad hoc network (MANET) is auto-configuring network without any infrastructure. It is temporary network created by, mobile nodes which are capable to communicating with each other without the use of network infrastructure. Ad hoc networks are vulnerable to many type of security attacks due to their open medium, dynamic topology, distributed co-operation. For successful data transfer nodes are depend on each other. To believe on the other node for wireless data transmission, consider as trust problem. Our aim in this review is to present schemes which are mainly focused on security based on trust value of node in MANET. This work proposes a approach for trust calculation based on Trust proxy node (TPN). The route discovery is achieved through a routing decision based on trust sequence certificate exchange by Trust proxy node (TPN). Trust proxy node (TPN) is an additional node having extra responsibility for trust calculation of Black hole node. Trust proxy node (TPN) will act as monitoring node for routing decision. After the trust value index is calculated the TPN node issues a certificate to every node in its network. To participate in routing the nodes must have two trust index (TI) certificates & can be consider as a reliable node by TPN. The directory of this certificate is maintained in a Trust Index (TI) Table. This TI table is shared with the server by this centralized TPN. This TPN will also monitors the behavior of nodes in a specific range continuously to avoid unwanted action.
Key-Words / Index Term
MANET, AODV, TPN(Trust proxy node), Milisious Node, Black Hole
References
[1] D He, C Chen, S Chen, J Bu & A B. Vasilakos, “ReTrust:Attack Resistant & Lightweight Trust for Sensor Network” in IEEE Transaction on IT in volume- 16/ No 4 Page No (623-632), July 2012.
[2] Z Min & Z Jiliu, “Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks” in IEEE Transaction ISBN 978-0-7695- 3686 Page No(26-30),16-17 May 2009.
[3] S Ramaswamy, H Fu, M Sreekantaradhya, J Dixon & K Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks” in Department of Computer Science, IACC 258, Page No(1-7) March, 2008.
[4] K E Defrawy& G Tsudik, “Privacy-Preserving Location-Based OnDemand Routing in MANETs” in IEEE Transaction of selected Journal in communication, Volume 29 Issue 10, Page No(1926-1934), Dec. 2011.
[5] Xu Li, R Lu, X Liang, & X Shen, “Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks” in IEEE ICC, Nov.2011.
[6] E. A .Mary Anita & V. Vasudevan, “Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining” in IJCA (0975 – 8887) Volume 1 – No. 12, Page No (1-8), Jan 2010.
[7] P H. Yu and U W. Pooch, “Chapter on Security and Dynamic Encryption System in Mobile Ad-Hoc Network” in A&M University, Dept of CSE Texas, USA, ISBN 978-953-307-402-3 Page No(469-490), Jan 2011
[8] G. S. Mamatha& Dr. S. C. Sharma, “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS” in IJCSS Volume 4, Issue 3, page No(275-284), July 2010.
[9] J Cal, P Yi, J Chen, Z Wang & N Liu, “An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network” in IEEE Proceedings, 1550-445X/10, 2010.
[10] R Karandikar, R K Khanuja, S Shukla, “Proposed solution to prevent Black Hole Attack in MANET” in IJRIM ,Vol 2, Issue 2, ISSN 2231- 4334, Page No(1-5), Feb 2012.
[11] H Weerasinghe and H Fu “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation” in IJCA, Volume 2 ,No 3 July, 2008.
[12] PoojaJaiswal& Dr. Rakesh Kumar “Prevention of Black Hole Attack in MANET” in IRACST, ISSN: 2250-3501 Voume.2, No5,Page No (599-606) October 2012.
[13] Sarita Choudhary & Kriti Sachdeva “Discovering a Secure Path in MANET by Avoiding Black/Gray Holes” in IJRTE ISSN: 2277-3878, Volume-1, Issue-3 Page No(1-6), August 2012.
[14] M S Ashraf & M Raheel, “RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks” in IJCSI, ISSN (Online): 1694-0814 Volume. 9, Issue 2, No 2, Page No (306-313),March 2012.
Citation
Amit Saraf and Megha Singh, "A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV," International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.130-135, 2015.