Mobility support in Wireless Sensor Network in Healthcare-A Survey
Survey Paper | Journal Paper
Vol.5 , Issue.1 , pp.60-65, Jan-2017
Abstract
Mobility in healthcare helps to promote clinical collaboration. By providing timely access to Patient Health Information, it helps doctors to take critical care decisions. Mobility in healthcare is enhancing the accessibility of critical firm and clinical systems. These days, condition devices are advancing closer to patient�s point-of-care. Network based mobility protocols are suitable for 6LoWPAN because in these protocols network initiates the message signaling and reduces the load on low power sensor nodes by relieving them from participating in mobility procedure, result in enhancing lifetime of network. Proxy Mobile IPv6 (PMIPv6) is suitable mobility solution as it is Network based mobility protocol alongside it provides single hop communication but single hop communication is not sufficient for LoWPAN. Sensor Proxy Mobile IPv6 (SPMIPv6) is an optimization of PMIPv6 and appropriate for low power sensor nodes as it reduces message signaling overload ,optimize power consumption and minimize mobility cost compare to PMIPv6 and MIPv6.
Key-Words / Index Term
Wireless sensor networks (WSN), Mobility Support, and MIPV6
References
[1] S. Kumar, M. Dave, and S. Dahiya, �ACO Based QoS Aware Routing for Wireless Sensor Networks with Heterogeneous Nodes,� Emerg. Trends Comput. Commun., vol. 298, pp. 157�168, 2014.
[2] A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, �Intra-mobility for hospital wireless sensor networks based on 6LoWPAN,� Proc. - 6th Int. Conf. Wirel. Mob. Commun. ICWMC 2010, pp. 389�394, 2010.
[3] M. S. Shahamabadi, B. M. Ali, N. K. Noordin, M. F. B. A. Rasid, P. Varahram, and A. J. Jara, �A NEMO-HWSN solution to support 6LoWPAN network mobility in hospital wireless sensor network,� Comput. Sci. Inf. Syst., vol. 11, no. 3, pp. 943�960, 2014.
[4] N. G. Arun, S. G. Surya, and M. Azath, �Survey on Mobile Healthcare,� no. 5, pp. 261�263, 2015.
[5] C. R. Suryawanshi and Y. C. Bhute, �International Journal of Computer Sciences A WSN based System for Enhancing Intra Mobility Solution for Healthcare � A Review,� no. 9, 2014.
[6] Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014
[7] J. M. L. P. Caldeira, J. J. P. C. Rodrigues, and P. Lorenz, �Toward ubiquitous mobility solutions for body sensor networks on healthcare,� IEEE Commun. Mag., vol. 50, no. 5, pp. 108�115, 2012.
[8] S. Sharma, R. K. Bansal, and S. Bansal, �Issues and Challenges in Wireless Sensor Networks,� 2013 Int. Conf. Mach. Intell. Res. Adv., no. August, pp. 58�62, 2013.
[9] D. Gurjar, I. Alam, P. B. B. Tiwari, and P. G. N. Pandey, �Wireless Sensor Network : an emerging entrant in Healthcare Wireless Sensor Network : an emerging entrant in Healthcare,� no. June, 2016.
[10] M. Bouaziz and A. Rachedi, �A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology To cite this version : A Survey on Mobility Management Protocols in Wireless Sensor Networks based on 6LoWPAN Technology,� 2015.
[11] S. Singh, �Security For Wireless Sensor Network,� vol. 3, no. 6, pp. 2393�2399, 2011.
[12] R. A. Khan and C. Engineering, �Performance Analysis of Host Based and Network Based IP Mobility Management Schemes,� vol. 6, pp. 1798�1803, 2008.
[13] J. Pieterse, R. Wolhuter, and N. Mitton, �Implementation and analysis of FMIPv6, an enhancement of MIPv6,� Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 111, pp. 351�364, 2013.
[14] F. T. Zohra, S. Azam, and M. Rahman, �Overview of IPv6 Mobility Management Protocols and their Handover Performances,� no. 3, 2014.
[15] A. Achour, L. Deru, and J. C. Deprez, �Mobility Management for Wireless Sensor Networks A State-of-the-Art,� Procedia Comput. Sci., vol. 52, no. Iupt, pp. 1101�1107, 2015.
[16] S. Salehian and R. Shamshiri, �A Survey on Mobility Management Protocols in Wireless Sensor Network-internet Protocol,� Indian J. Sci. Technol., vol. 8, no. 52998, pp. 974�6846, 2015.
[17] M. H. Habaebi, �Macro/micro-mobility fast handover in hierarchical mobile IPv6,� Comput. Commun., vol. 29, no. 5, pp. 611�617, 2006.
[18] J. Kim, R. Haw, S. Member, and E. J. Cho, �A 6LoWPAN Sensor Node Mobility Scheme Based on Proxy Mobile IPv6,� vol. 11, no. 12, pp. 2060�2072, 2012.
[19] M. M. Islam and E. N. Huh, �Sensor proxy mobile IPv6 (SPMIPv6)-a novel scheme for mobility supported IP-WSNs,� Sensors, vol. 11, no. 2, pp. 1865�1887, 2011.
[20] M. Ha, D. Kim, S. H. Kim, and S. Hong, �Inter-MARIO: A fast and seamless mobility protocol to support inter-PAN handover in 6LoWPAN,� GLOBECOM - IEEE Glob. Telecommun. Conf., pp. 1�6, 2010.
Citation
R. Narang, A. Malik, "Mobility support in Wireless Sensor Network in Healthcare-A Survey," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.60-65, 2017.
Novel approach for data stream clustering through micro-clusters shared Density
Review Paper | Journal Paper
Vol.5 , Issue.1 , pp.66-69, Jan-2017
Abstract
Clustering is the process of organizing objects into groups whose members are similar in some way and is very important technique in data mining as it has its applications spread extensively, e.g. marketing, biology, pattern recognition etc. So summarize the data stream in the real life with the online process is called as micro-cluster but it shows the density when we are combining the data in the one place. In the offline process we are using the modification clustering algorithm to re-clustering into larger cluster. For that the center of micro-cluster point as the pseudo point with density randomly calculates their weight. That density information area of micro-cluster is not preserved the online process. So used DBSTREAM, the first micro-cluster based on online clustering component capture the density between micro-cluster via shared density graph. We develop and evaluate a new method to address this problem for micro-cluster-based algorithms. The density information in this graph is then exploited for re-clustering based on actual density between adjacent micro-clusters. For that shared density graph improves clustering quality over other popular data stream clustering methods which require the creation of a larger number of smaller micro-clusters to achieve comparable results.
Key-Words / Index Term
Data mining, data stream clustering, density-based clustering
References
[1]. C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu, �A framework for clustering evolving data streams,� in Proceedings of the International Conference on Very Large Data Bases (VLDB �03), 2003, pp. 81�92.
[2]. F. Cao, M. Ester, W. Qian, and A. Zhou, �Density-based clustering over an evolving data stream with noise,� in Proceedings of the 2006 SIAM International Conference on Data Mining. SIAM, 2006, pp. 328�339.
[3]. Y. Chen and L. Tu, �Density-based clustering for real-time stream data,� in Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2007, pp. 133�142.
[4]. J. A. Silva, E. R. Faria, R. C. Barros, E. R. Hruschka, A. C. P. L. F. d. Carvalho, and J. a. Gama, �Data stream clustering: A survey,� ACM Computing Surveys, vol. 46, no. 1, pp. 13:1�13:31, Jul. 2013.
[5]. A . Bifet, G. de Francisci Morales, J. Read, G. Holmes, and B. Pfahringer,� Efficient Online Evaluation of Big Data Stream Classifiers.� 2015
[6]. H. Kremer, P. Kranen, T. Jansen, T. Seidl, A. Bifet, G. Holmes, and B. Pfahringer.� An Effective Evaluation Measure for Clustering on Evolving Data Streams.� 2011
[7]. M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, �A density-based algorithm for discovering clusters in large spatial databases with noise,� in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD�1996), 1996.
[8]. Komkrit Udommanetanakit, Thanawin Rakthanmanon, and Kitsana Waiyamai.� Estream: Evolution-based technique for stream clustering. � 2007
[9]. Dimitris K. Tasoulis, Niall M. Adams, David J. Hand.� Unsupervised clustering in streaming data.� 2006
[10]. Sudipto Guha, Adam Meyerson, Nina Mishra, Rajeev Motwani, Member, IEEE, and Liadan O�Callaghan. �Clustering data streams: Theory and practice.�2013
[11]. F. Cao, M. Ester, W. Qian, and A. Zhou, �Density-based clustering over an evolving data stream with noise,� in Proceedings of the 2006 SIAM International Conference on Data Mining. SIAM, 2006, pp. 328�339.
[12]. M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, �A density-based algorithm for discovering clusters in large spatial databases with noise,� in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD�1996), 1996, pp. 226�231.
[13]. G. Karypis, E.-H. S. Han, and V. Kumar, �Chameleon: Hierarchical clustering using dynamic modeling,� Computer, vol. 32, no. 8, pp. 68�75, Aug. 1999. [Online]. Available:http://dx.doi.org/10.1109/2.781637
[14]. Enakshmi Nandi1, Debabrata Sarddar �A Modified MapReduce-K-Means Clustering Based Load Distribution Method for Wireless Sensor Network in Mobile Cloud computing� ,2016
[15]. Pritika goel, �An Improved Load Balancing Technique in Weighted Clustering Algorithm� ,2016.Available: http://www.ijcseonline.org/pdf_paper_view.php?paper_id=972&18-IJCSE-01678.pdf
Citation
P.V. Desai, V.S. Gaikawad, "Novel approach for data stream clustering through micro-clusters shared Density," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.66-69, 2017.
Interlinking OF IoT, Big data, Smart Mobile app with Smart Garbage Monitoring
Review Paper | Journal Paper
Vol.5 , Issue.1 , pp.70-74, Jan-2017
Abstract
Interlinking of IOT, Big Data and Android, Now arises a question, what�s link between these technologies? As, IoT is a technology where world is stepping towards future development, Internet of Things (IOT), Internet is interconnecting of networks, Things means Devices or Objects (Interaction between Objects),IOT is not mainly creating smart gadgets or connecting more things to the internet, machine-to-machine(M2M) technologies can be seen as the first phase, In the next phase the connectivity of physical objects together connected in support of intelligent decision making operating with Sensors and Actuators. A sensor is used for grasping the input from any object and an Actuator is used for activating the device based on the input taken from a sensor, here comes the need of Big data Analytics, Data was getting seriously big even before IOT entered the picture. If Big data is �Heart� of advancement, IoT is the �Soul�. Where sensors sense objects continuously time to time and forward in every bit of second for processing which in cause memory load that should be maintained, so the huge amounts of data should be collected and maintenance with Big data and Data Analytics for extracting actual information from huge amounts of data. Now comes Smart App which has more scope with introducing of smart gadgets where maximum people are aware the applications in them. So for user interaction purpose we introduce mobile apps by directly giving access to the users. In this paper I have given brief introduction of Interlinking of IoT, Big Data and Smart mobiles focusing on one major problem in society, Garbage Monitoring replacing with Smart Garbage Monitoring.
Key-Words / Index Term
IoT, Big Data, Android, Sensor, Actuator, Smart Gadgets, Data Analytics
References
[1]. Pranay Kujur and Kiran Gautam, "Smart Interaction of Object on Internet of Things", International Journal of Computer Sciences and Engineering, Volume-03, Issue-02, Page No (15-19), Feb -2015, E-ISSN: 2347-2693
[2]. J. P. Conti, �The Internet of Things�, Communications Engineer, 2006, pp.20-25.
[3]. https://www.edgefx.in/different-types-of-sensors-with-applications/
[4]. Evans, D. The Internet of Things. 2011. Cisco Blog. Available online: �http://blogs.cisco.com/ news/the-internet-of-things-info graphic/�, accessed on 22 September 2014.
[5]. Yunchuan Sun,Houbing Song, Antonio J. Jara, Internet of Things and Big Data Analytics for Smart and Connected Communities IEEE Access ( Volume: 4 ) Page(s): 766 � 773 Online ISSN: 2169-3536
[6]. http://sensorwiki.org/doku.php/sensors/ultrasound
[7]. http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
[8]. http://www.sas.com/en_us/insights/analytics/big-data-analytics.html
Citation
R. Gorli , "Interlinking OF IoT, Big data, Smart Mobile app with Smart Garbage Monitoring," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.70-74, 2017.
Device-to-Device Communication in Wireless Network using mmWave within Small Cells and Exploiting Spatial Reuse
Review Paper | Journal Paper
Vol.5 , Issue.1 , pp.75-79, Jan-2017
Abstract
Recently, extreme demand of mobile communication, small cells in millimeter wave bands within macro-cell network is attracting the attention in academics as well as the industries. Evolution of 4G is essential in keeping up with the exponential growth of mobile data network traffic. Up to 7GHz bandwidth has been allocated worldwide for license-free 60GHz radio frequency. Multiple giga-bites per second can be transmitted by utilizing the huge unlicensed bandwidth using mmWave communication in the 60GHz band. Numerous amount of spectrum available in micro frequencies are able to provide cost effective communication between the nodes in small cell via high capacity backhaul. Wireless backhaul is an attractive option for small cells as it provides a less expensive and easy-to-deploy over fiber. However, there are multitude of bands and features (e.g. LOS/NLOS, spatial multiplexing etc.) connected to wireless backhaul that need to be used smartly for small cells. Candidate bands include: sub-6 GHz band that is useful in non-line-of-sight (NLOS) scenarios, microwave band (6�42 GHz) that is used in point-to-point line-of-sight (LOS) scenarios, and mmWave bands (e.g. 60, 70 and 80 GHz) that are recently being commercially used in LOS scenarios. In many deployment topologies, it is more beneficial to use aggregator nodes, located at the roof tops of tall buildings near small cells. The protocol supports concurrent transmission in minimum frequency to the greater extent. Further to enhance the efficiency of network, performance analysis and different parameters will be calculated.
Key-Words / Index Term
Device-to-Device communication (D2D), Heterogeneous cellular network, millimeter wave, MAC scheduling, spatial re-use
References
[1]. �Exploiting Device-to-Device Communication in Joint Scheduling of access and Backhaul for mmWave Small Cells� Yong Niu; Chuhan Gao; Yong Li; Li Su; Depeng Jin; Athanasios V. Vasilakos, 2015
[2]. �Exploiting Device-to-Device Communications to Enhance Spatial Reuse for Popular Content Downloading in Directional mmWave Small Cells� Yong Niu, Li Su, Chuhan Gao, Yong Li, Member,IEEE, Depeng Jin, and Zhu Han, Fellow, IEEE, 2016
[3]. White_paper_c11-481360, �Cisco Visual Networking Index: Forecast and Methodology,� June 2010
[4]. �Directional MAC protocol for millimeter wave based wireless personal area networks�. Xueli An and Ramin Hekmat Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology, Delft, The Netherlands {X.An, R.Hekmat}@ewi.tudelft.nl 2008
[5]. �Millimeter-wave propagation channel characterization for short-range wireless communications�. Suiyan Geng, Jarmo Kivinen, Xiongwen Zhao, and Pertti Vainikainen, Member, IEEE 2009
[6]. C. Sum et al., �Virtual time-slot allocation scheme for throughput enhancement ina millimeter-wave multi-Gbps WPAN system,� IEEEJ. Sel. Areas Commun., vol. 27, no. 8, pp. 1379�1389, Oct. 2009.
[7]. C.-S. Sum et al., �A multi-Gbps millimeter-wave WPAN system based on STDMA with heuristic scheduling,� in Proc. IEEE GLOBECOM, Honolulu, HI, USA, Nov. 30�Dec. 4, 2009, pp. 1�6
[8]. L. X. Cai, L. Cai, X. Shen, and J. W. Mark, �REX: A randomized exclusive region based scheduling scheme for mmWave WPANs with directional antenna,� IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 113�121, Jan. 2010.
[9]. J. Qiao, L. X. Cai, X. Shen, and J. W. Mark, �Enabling multi-hop concurrent transmissions in 60 GHz wireless personal area networks,� IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3824�3833, Nov. 2011.
[10]. S. Singh, F. Ziliotto, U. Madhow, E. M. Belding, and M. Rodwell, �Blockage and directivity in 60 GHz wireless personal area networks: From cross-layer model to multi hop MAC design,� IEEE J. Sel. Areas Commun., vol. 27, no. 8, pp. 1400�1413, Oct. 2009.
[11]. I. K. Son, S. Mao, M. X. Gong, and Y. Li, �On frame-based scheduling for directional mmWave WPANs,� in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 25�30, 2012, pp. 2149�2157
[12]. A. Lebedev et al., �Feasibility study and experimental veriï¬cation of simpliï¬ed ï¬ber-supported 60-GHz picocell mobile backhaul links,� IEEE Photon. J., vol. 5, no. 4, Aug. 2013, Art. ID. 7200913.
[13]. Y. Zhu et al., �Demystifying 60 GHz outdoor picocells,� in Proc. 20th Annu. Int. Conf. Mobile Comput. Netw., Maui, HI, USA, Sep. 7�11, 2014, pp. 5�16.
[14]. M. X. Gong, R. J. Stacey, D. Akhmetov, and S. Mao, �A directional CSMA/CA protocol for mmWave wireless PANs,� in Proc. IEEE WCNC, Sydney, NSW, Australia, Apr. 18�21, 2010, pp. 1�6.
[15]. V. Chandrasekhar, J. G. Andrews, and A. Gatherer, �Femtocell networks: A survey,� IEEE Commun. Mag., vol. 46, no. 9, pp. 59�67, Sep. 2008.
Citation
H.K. Dandage, V.S. Gaikwad, "Device-to-Device Communication in Wireless Network using mmWave within Small Cells and Exploiting Spatial Reuse," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.75-79, 2017.
V-Share: An Energy Efficient Collaborative Video Download and Sharing Application using Ad-hoc Cloud
Research Paper | Journal Paper
Vol.5 , Issue.1 , pp.80-84, Jan-2017
Abstract
Video download and sharing is one of the most popular applications in the field of mobile computing. Reducing the energy consumption of the mobile devices is a major challenge in sustaining multimedia applications. In this work, an adaptive framework called V-Share is developed for group of users with common interest to collaboratively download a video file from the cloud and share it among them. In V-Share, each node downloads only a segment of video file and the downloaded segments are reassembled and merged into a complete file by the coordinator node and then it is shared to all users of the ad-hoc group. Only the mobile nodes with relatively good battery level participate in download process whereas the nodes with low battery level remain futile. This greatly reduces the battery consumption of the mobile devices. Seamless connectivity is established between the mobile devices and the cloud using 3G and WiFi links enable cooperation among smart phones to smoothen the service.
Key-Words / Index Term
Ad hoc cloud; Seamless connectivity; File sharing; Energy saving, Collaborative download
References
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] Neeraj Paliwal , "Relevance Multipath Forwarding in Intended Wireless Mesh Networks", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Volume-03, Issue-02, Page No (5-10), Apr 2015
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] P.Sangeetha and Dr.R.Mala, "Cross-Layer arrangement for Wireless Mesh Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-09, Page No (85-89), Sep -2014
Citation
G. Santhi, "V-Share: An Energy Efficient Collaborative Video Download and Sharing Application using Ad-hoc Cloud," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.80-84, 2017.
OBL-GA based FCM with level sets for automatic GBM tumor segmentation in MR Images
Research Paper | Journal Paper
Vol.5 , Issue.1 , pp.85-20, Jan-2017
Abstract
This paper presents an automatic method for the segmentation of Glioblastoma multiforme(GBM) tumors from MRI images. The global search ability of Genetic Algorithm (GA) to optimize the Fuzzy C-means (FCM) clustering algorithm to obtain better clustering center. But the prematurity problem of GA itself has bad effects on the whole clustering. Therefore, in order to optimize the traditional GA-FCM algorithm�s clustering effect, in this work, we introduce the Opposition-based learning mechanism into GA, to construct an OBL-Genetic Algorithm (OBL-GA). The improved algorithm forms the next generation of evolutionary population by selecting the superior individuals in the collection of the sub generation and reverse sub generation, to increase the population diversity, and final to overcome the prematurity problem of GA. Then applying the improved algorithm to FCM, which gives better results and then resultant image, is applied with level sets, to exact delineation of GBM tumor. The validation is performed on a labeled BRATS data set. Our segmentation results are highly accurate, and compare favorably to the state of the art.
Key-Words / Index Term
Fuzzy-c means,Glioblastoma multiforme,Segmentation,Genetic Algorithm,Opposition based learning,MRI
References
[1] A. Rovira, J. Swanton, M. Tintor, E. Huerga, F. Barkhof, M. Filippi, J.L. Frederiksen, A. Langkilde, K. Miszkiel, C. Polman, M. Rovaris, J. Sastre-Garriga, D. Miller, X. Montalban, A single, early magnetic resonance imaging study in the diagnosis of multiple sclerosis. Arch. Neurol. vol. 66, no. 5, pp. 587-592, 2009.
[2] Y. Ge, Multiple sclerosis: the role of MR imaging. Am. J. Neuroradiol. vol. 27, no. 6, pp. 1165-1176, 2006.
[3] D. Hill, Neuroimaging to assess safety and efficacy of AD therapies. Expert Opin. Investig. Drugs. vol. 19, no. 1, pp. 23-26, 2010.
[4] R.E. Jung, J.M. Segall, H.J. Bockholt, R.A. Flores, S.M. Smith, R.S. Chavez, R.J. Haier, Neuroanatomy of creativity.Hum.Brain Mapp. vol. 31, no. 3, pp. 398-409n 2010.
[5] Verma R, Zacharaki EI, Ou Y, Cai H, Chawla S, Lee SK, et al. Multiparametric tissue characterization of brain neoplasms and their recurrence using pattern classification of MR images. Academic Radiology. 2008; 15: 966�977.
[6] Ruan S, Zhang N, Liao Q, Zhu Y. Image fusion for following-up brain tumor evolution. IEEE International Symposium on Biomedical Imaging: From Nano to Macro. 2011; 1: 281�284.
[7] Knopp EA, Cha S, Johnson G, et al. Glial neoplasms: dynamic contrast-enhanced T2*-weighted MR imaging. Radiology 1999;211: 791�798.
[8] Lev MH, Ozsunar Y, Henson JW, et al. Glial tumor grading and outcome prediction using dynamic spin-echo MR susceptibility mapping compared with conventional contrast-enhanced MR: confounding effect of elevated rCBV of oligodendrogliomas. AJNR Am J Neuroradiol 2004;25:214�221.
[9]. Vannier MW, Butterfield RL, Jordan D, Murphy WA, Levitt RG,Gado M. Multispectral analysis of magnetic resonance images.Radiology 1985;154:221�224.
[10].Kvinnsland Y, Brekke N, Taxt TM, Gru�ner R. Multispectral analysisof multimodal images. Acta Oncol 2009; 48:277�284.
[11]. Dickson S, Thomas BT, Goddard P. Using neural networks to automatically detect brain tumours in MR images. Int J Neural Syst 1997;8:91�99.
[12]. Abdolmaleki P, Mihara F, Masuda K, Buadu LD. Neural networks analysis of astrocytic gliomas from MRI appearances. Cancer Lett 1997;118:69�78.
[13]. Zhou J, Chan K, Chong H, Krishnan S. Extraction of brain tumor from MR images using one-class support vector machine. Conf Proc IEEE Eng Med Biol Soc 2005;6:6411�6414.
[14]. V.Vani, M. Kalaiselvi Geetha , "Automatic Tumor Classification of Brain MRI Images", International Journal of Computer Sciences and Engineering, Volume-04, Issue-10, Page No (144-151), Oct -2016.
[15]. Clark MC, Hall LO, Goldgof DB, Velthuizen R, Murtagh FR, Silbiger MS. Automatic tumor segmentation using knowledge-based techniques. IEEE Trans Med Imaging 1998;17:187�201.
[16]. Bezdek JC, Hall LO, Clark MC, Goldgof DB, Clarke LP. Medical image analysis with fuzzy models. Stat Methods Med Res 1997;6: 191�214.
[17] Azzeddine Riahi, "Image Segmentation Techniques Based on Fuzzy C-Means and Otsu, Applied to the Brain MRI in Tumor Detection", International Journal of Computer Sciences and Engineering, Volume-03, Issue-12, Page No (89-101), Dec -2015.
18] J.C. Bezdek, Pattern Recognization with Fuzzy Objective Function Algorithms, Advanced Applications in Pattern Recognization, Springer, Boston, Mass, USA, 1981.
[19] BackT, Evolutionary algorithms in theory and practice: evolution strategies evolutionary programming genetic algorithms. NewYork: Oxford University Press, 1996.
[20] Sabau, A. S, �Variable Density Based Genetic Clustering,� Symbolic and Numeric Algorithms for Scientific Computing.Timisoara, Romania, pp.200-206, September 2012.
[21] Wen-jie Ma, Wen-xia Yun, �Research progress of genetically algorithm,� Application Research of Computers, vol.29, no.4, pp.1201-1206, April 2012.
[22] Quan Liu, Xiao-yan Wang, and Qi-ming Fu, �Double Elite Coevolutionary Genetic Algorithm,� Journal of Software, vol.23, no.4, pp.765-775, April 2012.
[23] T. Chan and L. Vese, "Active contours without edges� in IEEE transactions on image processing 10(2), 2001, pp. 266-277.
[24] Vishnumurthy T D, Mohana H S Vaibhav A Meshram and Pramod Kammar, "Suppression of Herringbone Artifact in MR Images of Brain Using Combined Wavelet and FFT Based Filtering Technique", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (66-71), Feb -2016.
[25] B. Menze, A. Jakab, S. Bauer, J. Kalpathy-Cramer, K. Farahani, and et al. on Medical Imaging, 2014.
[26] Bandhyopadhyay SK, Paul TU. Automatic segmentation of brain tumour from multiple images of brain MRI. Int J Appl Innovat Eng Manage (IJAIEM) 2013;2(1):240�8
[27] LJun-Hao Zhang, Ming Hu HA , Jing Wu,� Implementation of Rough Fuzzy K-means Clustering Algorithm in Matlab�, Proceedings of Ninth International Conference on Machine Learning and Cybernetics�, July 2010.
[28] Biju.V.G, Mythili.P, �A Genetic Algorithm based Fuzzy C Mean Clustering Model for Segmenting Microarray Images� IJCA , Volume 52� No.11, 2012
[29] Vipin Y. Borole, Seema S. Kawathekar, "Study of various DIP Techniques used for Brain Tumor detection and tumor area calculation using MRI images", International Journal of Computer Sciences and Engineering, Volume-04, Issue-07, Page No (39-43), Jul -2016.
Citation
B.S. Rao, E.S. Reddy, "OBL-GA based FCM with level sets for automatic GBM tumor segmentation in MR Images," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.85-20, 2017.
A Study on Virtue and Faults of Security in Cloud Computing
Survey Paper | Journal Paper
Vol.5 , Issue.1 , pp.93-94, Jan-2017
Abstract
Cloud computing is a web technology computing which requires large scale processing and computing. For this extensive processing, it requires security and protection in cloud computing for shareable configurable resources for on-demand access. This paper describes about the cloud computing merits and demerits of existing security and protection models in cloud computing
Key-Words / Index Term
indexing, private cloud,protected cloud, public cloud, service provider, client owner
References
[1] A. K. Singh, �A Study on Merits and Demerits of SAN Protocols,� vol. 3, no. X, pp. 1�5, 2015.
[2] X. Qiu, Y. Dai, Y. Xiang, L. Xing, and S. Member, �Reliability, Performance , and Power Consumption of a Cloud Service,� vol. 46, no. 3
[3] Surabhi Shukla and Dharamjeet kumar, "Cloud�s Software- Security as a Service(S-SaaS) via Biometrics", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (119-124), Mar -2014
[4] W. Li, Y. Yang, and D. Yuan, �Ensuring Cloud Data Reliability with Minimum Replication by Proactive Replica Checking,� IEEE Trans. Comput., vol. 65, no. 5
[5] M. Kangas, S. Glisic, S. Member, Y. Fang, and P. Li, �Resource Harvesting in Cognitive Wireless Computing Networks With Mobile Clouds and Virtualized Distributed Data Centers : Performance Limits,� IEEE Trans. Cogn. Commun. Netw., vol. 1, no. 3
[6] Richa Arya , "Triple Security of File System for Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (148-154), Mar -2014
[7] G. Fan, H. Yu, S. Member, and L. Chen, �A Formal Aspect-Oriented Method for Modeling and Analyzing Adaptive Resource Scheduling in Cloud Computing,� vol. 13, no. 2, p.
[8] Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013.
[9] J. Bacon, D. Eyers, T. F. J.-M. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, �Information Flow Control for Secure Cloud Computing,� IEEE Trans. Netw. Serv. Manag., vol. 11, no. 1,
[10] M. Amoon, �Adaptive Framework for Reliable Cloud Computing Environment,� IEEE Access, vol. 3536, no. c
[11] K. Goyal, �International Journal of Advanced Research in Computer Science and Software Engineering Review of Different Energy Saving Techniques in Cloud Computing,� vol. 3, no. 7, pp. 1038�1042, 2013.
[12] A. Sharma, S. Gupta, D. Mann, and S. Akhtar, �A Combined Model to Ensure Complete Security and Reliability in Cloud Computing,� vol. I, pp. 21�24, 2015.
Citation
N.K. Singh, A.K. Singh, "A Study on Virtue and Faults of Security in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.93-94, 2017.
Load Balancing and its Algorithms in Cloud Computing: A Survey
Survey Paper | Journal Paper
Vol.5 , Issue.1 , pp.95-100, Jan-2017
Abstract
Cloud computing provides on-demand access to distributed resources on paid basis. Everybody wants to use these services to reduce the cost of infrastructure and maintenance, therefore the load on cloud is increasing day by day. Balancing the load is one of the most important issue that cloud computing is facing today. The load should be distributed fairly among all the nodes. Proper load balancing can reduce the energy consumption and carbon emission. This will helps to achieve Green Computing. There are many algorithms for load balancing. All these algorithms work in different ways and have some advantages and limitations. The most important for load balancing algorithms is to consider the characteristics like fairness, throughput, fault tolerance, overhead, performance, and response time and resource utilization. This paper mainly focuses on the concept of load balancing, literature survey on load balancing techniques and different measurement parameters.
Key-Words / Index Term
Cloud Computing; Load Balancing; Static Algorithms; Dynamic Algorithms;Hierarchical Load Balancing
References
[1] Peter Mell Timothy Grance�, The NIST Definition of Cloud Computing�, National Institute of Standards and Technology Special Publication 800-145(September 2011),csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[2] Rajwinder Kaur and Pawan Luthra,� Load Balancing in Cloud Computing�, Association of Computer Electronics and Electrical Engineers, 2014, DOI: 02.ITC.2014.5.92
[3] Ashalatha R; J. Agarkhed, �Dynamic load balancing methods for resource optimization in cloud computing environment �, 2015 Annual IEEE India Conference (INDICON) , Pages: 1 - 6, DOI: 10.1109/INDICON.2015.7443148
[4] Garima Rastogi, Dr Rama Sushil, �Analytical Literature Survey on Existing Load Balancing Schemes in Cloud Computing�, 2015 International Conference on Green Computing and Internet of Things (ICGCloT), pages:1506-1510
[5] R. Kanakala; V. K. Reddy; K. Karthik, " Performance analysis of load balancing techniques in cloud computing environment�, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Pages: 1 - 6, DOI: 10.1109/ICECCT.2015.7226052
[6] K. Garala; N. Goswami; P. D. Maheta, " A performance analysis of load Balancing algorithms in Cloud environment �, 2015 International conference on Computer Communication and Informatics (ICCCI), Pages: 1 - 6, DOI: 10.1109/ICCCI.2015.7218063
[7] A.N. Ivanisenko; T. A. Radivilova , �Survey of major load balancing algorithms in distributed system �, Information Technologies in Innovation Business Conference (ITIB), 2015 ,Pages: 89 - 92, DOI: 10.1109/ITIB.2015.7355061
[8] Sidra Aslam, Munam Ali Shah, �Load Balancing Algorithms in Cloud Computing: A Survey of Modern Techniques�, 2015 National Software Engineering Conference (NSEC 2015)
[9] A. A. Jaiswal, Dr. Sanjeev Jain,� An Approach towards the Dynamic Load Management Techniques in Cloud Computing Environment�, 2014 International Conference on Power, Automation and Communication (INPAC)
[10] G.Punetha Sarmila,Dr.N.Gnanambigai, Dr.P.Dinadayalan,� Survey on Fault Tolerant �Load Balancing Algorithms in Cloud Computing�, IEEE Sponsored 2nd International Conference On Electronics And Communication System (ICECS 2015), Pages-1715-1720
[11] Surbhi Kapoor, Dr. Chetna Dabas,� Cluster Based Load Balancing in Cloud Computing�, 2015 Eighth International Conference on Contemporary Computing (IC3)
[12] Shridhar G.Domanal and G.Ram Mohana Reddy, � Load Balancing in Cloud Computing Using Modified Throttled Algorithm �, 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
[13] Aarti Vig, Rajendra Singh Kushwah and Shivpratap Singh Kushwah, �An Efficient distributed Approach for Load Balancing in Cloud Computing�, 2015 International Conference on Computational Intelligence and Communication Networks
Citation
R.S Sajjan, R.Y. Biradar, "Load Balancing and its Algorithms in Cloud Computing: A Survey," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.95-100, 2017.
A Survey on Existing CAPTCHA Techniques and Proposed Gaming CAPTCHA for Better Security Analysis
Survey Paper | Journal Paper
Vol.5 , Issue.1 , pp.101-106, Jan-2017
Abstract
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a method which is used to identify whether user is robot or human. For security concern it is required to know by using some kind of Turing Test. Traditionally, distorted letters in non-uniform positions are generally used for this test, because it has been considered that, it is easy to analyze the distorted letters by human which cannot by robot or bots. But later it could also be recognized by robot, then various research has been made, based on 3d alphanumeric letters, numerical calculations, moving alphanumeric letters, OTP & gaming. But some time distorted letters, 3d letters & moving alphabets are also difficult to recognize by human, it becomes irritating. And numerical calculation is often become easy now by robot, based on neural networks & OTP[4] takes longer time because it is depend on mobile network, so that is why these techniques are also not convenient for human. It should be very easy for human and almost impossible by robots. Then a new promising way was introduced i.e. gaming based CAPTCHA, it is most attractive and cognitive way in the world of CAPTCHA. This is the most recent method used by various personals. But the game which is used for is static, it means you will have to drag & drop static object to the given static target which may be breakable by some intelligent systems. So, that is why here it is the solution which proposes a dynamic object & target gaming based CAPTCHA, it means that here the target is not static as well as object, you will have to drag & drop moving object to moving target which is considered as impossible for robot in given time, because we are also using a CAPTCHA session, you will get 10-15 seconds to achieve your goal and it can be achieved by 5 to 8 seconds by human or may be less. But not possible by robot because after given session time another CAPTCHA will be appeared to achieve. So this technique is based on totally dynamic features and sessions which is very easy for human but almost impossible by robots. This is the newest way in the world of gaming CAPTCHA. Here a little survey has been made on existing systems.
Key-Words / Index Term
CAPTCHA, Drag and Drop, 3-D Alphabets etc
References
[1] Jing Song Cui, Li Jing Wang, Jing Ting Mei, Da Zhang, Xia Wang, Yang Peng, Wu Zhou Zhang in IEEE 2009, �CAPTCHA Design Based on Moving Object Recognition Problem.�
[2] Jing-Song Cui, Jing-Ting Mei, Xia Wang, Da Zhang, Wu-Zhou Zhang, �A CAPTCHA Implementation Based on 3D Animation� 2009 International Conference on Multimedia Information Networking and Security of IEEE.
[3] Ibrahim Furkan Ince, Yucel Batu Salman, Mustafa ErenYildirim and Tae-Cheon Yang , �Execution time prediction for 3d interactive captcha by keystroke level model�, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology of IEEE.
[4] P.Arthy and J.Revathi, "Against Spyware by Captcha in Graphical Pin Arrangement", International Journal of Computer Sciences and Engineering, Volume-03, Issue-01, Page No (165-172), Jan -2015
[5] Yang-Wai Chow1, Willy Susilo2, Hua-Yu Zhou1, �CAPTCHA Challenges for Massively Multiplayer Online Games�, 2010 International Conference on Cyberworlds of IEEE.
[6] Aadhirai R, Sathish Kumar P J and Vishnupriya S , �Image CAPTCHA: Based on Human Understanding of Real World Distances �, IEEE Proceedings of 4th International Conference on Intelligent Human Computer Interaction, Kharagpur, India, December 27-29, 2012.
[7] Song Gao, Manar Mohamed, NiteshSaxena and Chengcui Zhang , �Gaming the game: Defeating a game CAPTCHA with efficient and robust hybrid attacks� , IEEE 2014.
[8] Seyed Mohammad Reza SaadatBeheshti, PanosLiatsis , �How Humans Can Help Computers to Solve an Artificial Problem� ,international conference IEEE ,2015.
[9] Artem Shumilov, Andrey Philippovich , �Cloud-Based CAPTCHA Service�.
[10] Luis von Ahn, Manuel Blum, Nicholas J Hopper and John Lanford, � CAPTCHA : Using Hard AI Problems for Security�,Carnegie Mellon University.
Citation
V. Kumar, A. Barve, "A Survey on Existing CAPTCHA Techniques and Proposed Gaming CAPTCHA for Better Security Analysis," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.101-106, 2017.
Renewable Energies in MOROCCO: Situation of the Sector, Development Potential of the Sector
Survey Paper | Journal Paper
Vol.5 , Issue.1 , pp.107-114, Jan-2017
Abstract
A smart grid is an electrical grid linking electricity production, consumption and storage and coordinating them autonomously. This type of network therefore makes it possible to switch from a demand-driven production system to a supply-based consumption system, which will have to adapt in future to the random variations of the production of wind and solar energies. Combined with other technologies such as pumped storage or gas combined cycle facilities, particularly flexible, this network must contribute to improving security of supply, reducing costs related to the distribution network and the to integrate renewable energies into the grid and to improve the efficiency of the entire system. A smart grid combines the existing electricity grid with information and communication technology applications. However, if several current technologies can already be used, they must first be tested in the form of individual components, since the technical implementation depends on the stability and effectiveness of their interaction. Indeed, except in some research projects, no smart grid ensures a fully automated control consumer devices and production facilities exist in the world: it is still a concept. The current tests on smart meters, already deployed on a large scale in some countries, are a first step in the implementation of these smart grids. This technology should encourage final users to save electricity and encourage decentralized injection control. However, their introduction in Switzerland is hampered by data protection issues, lack of standards in this field and a lack of clarity in the allocation of roles and costs. The success of smart grids will depend in large part on the economic interests of the various stakeholders. Once this happens, the likelihood of a change in our existing grid in smart grid will also emerge.
Key-Words / Index Term
Smart Grid, Renewable Energy, Energy Transition, Innovation, Energy Consumption
References
[1] Rajkumari Pandey, Payal Suhane,�� Voltage Stability Analysis of Smart Grid and Application of FACTS Controller: A Review��, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064, Volume 4 Issue 4, April 2015.Page No(243-247).
[2] Yuvaraj S. Patil, Dr. Mrs. Swati V. Sankpal,�� A Survey on Cyber Security for Smart Grid Networks��, International Journal on Recent and Innovation Trends in Computing and Communication, IJRITCC | May 2015.Page No(2503-2507) .
[3] Hemant Joshi, Vivek Pandya,�� Development of Smart Plug and Energy Price Forecasting
Technique to Reduce Peak Demand and Cost of Energy in Smart Grid��, International Journal of Innovative Research in Advanced Engineering (IJIRAE), Issue 12, Volume 2 (December 2015).Page No(90-99).
[4] Mario FAschang, Mark Stefan, Friederich Kupzog, Alfred Einfalt, Stephan Cejka,�� A Flexible And Performant Framework Hosting Smart Grid Applications��, Cired Workshop - Helsinki 14-15 June 2016.Paper 0255,Page No(1-4).
[5] Vinay Kumar K and Balakrishna R,�� Smart Grid: Advanced Metering Infrastructure (AMI) & Distribution Management Systems (DMS)��, International Journal of Computer Sciences and Engineering,IJCSE, Vol.-3(11), PP(19-22) Nov 2015, E-ISSN: 2347-2693
[6] Mag. Inż. Indrajeet Prasad,�� Smart Grid Technology: Application and Control��, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 5, May 2014,Page No(9533-9542).
[7] Marian NOGA1, Andrzej OŻADOWICZ1, Jakub GRELA1, Grzegorz HAYDUk,�� Active Consumers in Smart Grid Systems - Applications of the Building Automation Technologies��, Przegląd Elektrotechniczny, ISSN 0033-2097, R. 89 NR 6/2013,Page No(227-233).
[8] Palak Kalra,�� Theft Detection Schemes For Smart Grid Application��, International Journal Of Electrical Engineering & Technology (Ijeet), Volume 5, Issue 12, December (2014), Page No (321-327).
[9] Jaimala Gambhir,�� An Overview Of Smart GRID��, International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 7(October2012) Page No( 90-99).
[10]SMART Grids Laboratories Inventory 2015, ISSN 1018-5593 (print) doi: 10.2790/451423 (online), Luxembourg: Publications Office of the European Union, 2015 , European Union, 2015,Page No (1-93).
[11] Rucha Vilasrao Deshmukh, Sunita A Upasani,�� Future Scope in Smart Grid��, ISSN: 2455-2631, May 2016 IJSDR | Volume 1, Issue 5,Page No(540-542).
[12] P.Vijayapriya, Garauv Bapna, Dr.D.P.Kothari,�� Smart Tariff for Smart Meters In Smart Grid��, P.Vijayapriya et al. / International Journal of Engineering and Technology Vol.2 (5), 2010, 310-315, ISSN : 0975-4024,Page No( 310-315).
[13] Viren Patel, Prof. Mithila S. Zodape,�� Implementation of Smart Grid System using Digital Energy Meter��, International Journal of Advance Engineering and Research Development, Volume 2,Issue 5, May -2015, IJAERD-2015,PageNo(1533-1537).
[14] Archana S. Talhar (Belge), Sanjay B. Bodkhe,�� MODERNIZATION OF TRADITIONAL GRID INTO SMART GRID THROUGH RENEWABLE SOURCES��, ISSN 0976 � 6545(Print),ISSN 0976 � 6553(Online),Volume 5, Issue 2, February (2014), Page No(1-11).
[15]U. Suganya, C.Subhalakshmipriya,�� Smart-Grid In Electrical And Electronical Communication Technology��, International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 2015 ISSN 2091-2730,Page No(386-393).
[16] S Priyadharshini , Dr.B.Meenakshi,�� Reduction of Energy Storage Requirements in Future Smart Grid Using Electric Springs��, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Special Issue 1, February 2014,Page No(201-205).
[17] Anil K Jain, Toshi Mandloi,�� Integration of Renewable Energy Sources in Smart Grid Systems, and their constraints��, International Journal of Modern Trends in Engineering and Research, IJMTER-2015,Page No(429- 434).
[18] Gueddouch Touria and Saad Abdallah, "Modeling of a Building With The Aim of The Evaluation of its Energy Consumption Application to a Typical Building in Morocco", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (1-5), Feb -2014, E-ISSN: 2347-2693.
[19] Raksha Kala,�� Energy Conservation and Monitoring System for Smart City using Internet of Things��, SSRG International Journal of Computer Science and Engin eering (SSRG-IJCSE) � volume 3 Issue 8�August 2016,Page No(20-24).
[20] Monika Saxena, Dr. C.K. Jha,�� Heterogeneous Big Smart data in Perspective of Smart Cities Development��, Monika Saxena et al. / International Journal of Computer Science Engineering (IJCSE), ISSN : 2319-7323, Vol. 5 No.03 May 2016,Page No(137- 141).
[21] Soumya Mukherjee, Sougata Jana, Amartya Roy, Swapan Santra,�� Hybrid Power Generation Model using Wind Energy and Solar Energy��, International Journal of Computer Sciences and Engineering, Vol.-4(6), Aug 2016, E-ISSN: 2347-2693,Page No(60-64).
[22] Tayeb Amegroud,�� Morocco�s Power Sector Transition: Achievements and Potential��, ISSN 2280-4341 | ISBN 978-88-98650-29-3, 2015 IAIIAI Working papers 15 | 05 - February 2015.Page No(1-21).
[23] Mohamed Oukili , Smail Zouggar , Mohamed Seddik , Taoufik Ouchbel , Fran�ois Vall�e , Mohamed El Hafiani,�� Comparative Study of the Moroccan Power Grid Reliability in Presence of Photovoltaic and Wind Generation��, Smart Grid and Renewable Energy, 2013, 4, 366-377 http://dx.doi.org/10.4236/sgre.2013.44043 Published Online July 2013 .
[24] Vinay Kumar K and Dr. Balakrishna R, "Smart Grid: Advanced Metering Infrastructure (AMI) & Distribution Management Systems (DMS)", International Journal of Computer Sciences and Engineering (IJCSE), Volume-03, Issue-11, Page No (19-22), Nov -2015, E-ISSN: 2347-2693
Citation
S. Riahi, Y. Riahi, "Renewable Energies in MOROCCO: Situation of the Sector, Development Potential of the Sector," International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.107-114, 2017.