An Energy Balanced Algorithm of PEGASIS Protocol in WSN
Review Paper | Journal Paper
Vol.04 , Issue.07 , pp.53-57, Dec-2016
Abstract
Energy efficiency is the important work for wireless sensor network. Every node has limited energy .So to design Routing protocol in WSN ones should take care of less energy consumption. Already many routing algorithm has developed which result is less energy consumption. In this paper we have discussed all well-known PEGASIS routing algorithms based on grid which always focus on low energy consumption. Each algorithm is described in detail with their pros and cons along with their design issue .
Key-Words / Index Term
Wireless Sensor Network, PEGASIS, PDCH, EEPB, IEEPB,MH-PEGASIS, PEGASIS-ANT
References
[1]. S. Lindsey,. and C.S. Raghavendra, C.S. “PEGASIS: Power-efficient gathering in sensor information systems”. In IEEE proceeding on aerospace, 3, 1125-1130.
[2]. Meenu, and Vandana, “Modified PEGASIS in WSN to increase Network Lifetime,” in International Journal of Computer Applications (0975-8887), Volume 52- No. 19, August 2012.
[3]. J. Rana, S Vhatkar, and M. Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor Network,” in International Journal of Computer Applications (0975-8887).
[4]. Singhal, Vishakha, and Shrutika Suri. "Comparative study of hierarchical routing protocols in wireless sensor networks." International Journal of Computer Science and Engineering 2.5 (2014): 142-147.
[5]. Nathiya, R., and S. G. Santhi. "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)." International Journal of Computer Sciences and Engineering 2 (2014): 36-43.
[6]. S. Vhatkar, J Rana, and M. Atique, “Performance Evaluation and QOS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks,” IOSR Journal of Computer Enginering(IOSR-JCE) e-ISSN: 2278-0661,p-ISSN:2278-8727, Volume 17, Issue 5, ver. IV(Sep.-Oct. 2015), PP 101-109.
[7]. Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor Networks,” in Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), vol. 4, pp. 2230-2233, Shanghai, 2011.
[8]. Z. Aliouat and M. Aliouat, “Efficient Management of Energy Budget for PEGASIS Routing Protocol,” in 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 516-521, Sousse, March 2012.
[9]. Atul Rana, Manju Bala and Varsha , "Review Paper on MSEEC: Energy Efficient Clustering Protocol in HWSN", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (71-75), May -2016
[10]. P. Singh, S. Singh, “A Review: Power efficient Gathering in Sensor Information system(PEGASIS) protocol for WSN,” in International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056,p-ISSN:2395-0072,Volume 2, Issue 03,june-2015.
[11]. Sharma, Shamneesh, Dinesh Kumar, and Keshav Kishore. "Wireless Sensor Networks-A Review on Topologies and Node Architecture." International Journal of Computer Sciences and Engineering 1.2 (2013): 19-25.
[12]. Sujata Agrawal, K.D. Kulat and M. B.Daigavane, "Evaluation of Routing Algorithm for Ad-hoc and Wireless Sensor Network Protocol", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (11-18), Oct -2013
[13]. Obulapu Hiteshreddy, Pardeep Singh and Siddharth Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-08, Page No (37-45), Aug -2015,
[14]. Sanchita Gupta and Pooja Saini, "Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-02, Page No (21-23), May -Jun 2013
[15]. Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-03, Issue-02, Page No (1-14), Mar -Apr 2015
Citation
Kangka Chakravarty and Utpal Barman, "An Energy Balanced Algorithm of PEGASIS Protocol in WSN", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.53-57, 2016.
Customer Opinion from various E-commerce sitesusing Data Mining techniques: A Survey
Survey Paper | Journal Paper
Vol.04 , Issue.07 , pp.58-61, Dec-2016
Abstract
With the availability of huge number of products, it became quite difficult for a customer to judge the quality about the product. Publicly available opinions are very important for decision making process. With the increasing number of reviews and comments for a particular product it became difficult to get an optimized opinion for that product. In this paper, we will study various reviews and the quality of the reviews from a huge number of positive and negative opinions on the product. All the reviews will be analysed on the basis of sentiment and will give a final opinion on the product. It will help every buyer to take a quick decision and gain a precise opinion for the products.
Key-Words / Index Term
Optimized opinion; Quality; Sentiment
References
[1] Zheng-Jun Zha, Member, IEEE, Jianxing Yu, Jinhui Tang, Member, IEEE, Meng Wang, Member, IEEE, and Tat-SengChua,Product Aspect Ranking and Its Applications.
[2] GeorgLackermair, Daniel Kailer, KenanKanmaz, Importance of Online Product Reviews from a Consumer’s Perspective.
[3] Minqing Hu and Bing Liu Department of Computer Science University of Illinois at Chicago, Mining and Summarizing Customer Reviews.
[4] DrS Vijayarani, Ms J Ilamathi,Ms. Nithya,Preprocessing technique for text mining-An overview.
[5] Theresa Wilson, JanyceWiebe, Paul Hoffmann, Recognizing Contextual Polarity in Phrase-level Sentiment analysis.
[6] WalaaMedhat, Ahmed Hassan, HodaKorashy, Sentiment analysis algorithms and applications: A survey.
[7] Lina L. Dhande, Dr. Prof. Girish K Patnaik,Analysing sentiments of movie review data using naïve bayes neural classifier.
[8] ChetanKaushik and Atul Mishra Computer Engg. Department, YMCA University of Science & Technology, Faridabad, A Scalable, Lexicon Based Technique For Sentiment Analysis.
[9] Ms. Gaurangi Patil1, Ms. Varsha Galande2, Mr. VedantKekan3, Ms. Kalpana Dange4, Sentiment Analysis Using Support Vector Machine.
[10] Haiyang Sui,Christopher Khoo,Syin Chan, Sentiment Classification of Product Review using SVM and Decision Tree Induction.
[11] Vijay Murari T 1, Sunil 2, Suchitra V3, Asst. Professor, Dept. of Computer Science, NMAMIT, Nitte, India, Survey on Product Recommendation Using Customer Reviews Based on Opinion Mining.
[12] S. Chandra Kala and C. SindhuDepartment of Computer Science and Engineering, Velammal Engineering College, India, Opinion Mining and Sentiment Classification: A Survey.
[13] Anascollomb, CrinaCostea, DamienJoyeux, OmarHasan, LionelBrunie,Study and Comparision of Sentiment Analysis methods for Reputation Evaluation.
[14] MaiteTaboada,Julian Brooke, Milan Tofiloski, Kimberly Voll, Manfred Stede, Lexicon-Based Methods for Sentiment Analysis.
Citation
PinkySaikiaDutta*1, AvishekSaha, AmarendraSharma, AbhishekSarmah, JugalKishorTalukdar, "Customer Opinion from various E-commerce sitesusing Data Mining techniques: A Survey", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.58-61, 2016.
A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges
Survey Paper | Journal Paper
Vol.04 , Issue.07 , pp.62-66, Dec-2016
Abstract
This paper presents a survey of man-in-the-middle attacks in communication networks and methods of protection against them. Man in the middle attack allows the attacker to gain unauthorized entry into the connection between two devices and listen to the network traffic. This paper focuses on the areas where man-in-the-middle attack can occur and the different methods with which we can defense against the attack.
Key-Words / Index Term
Man-in-the-middle attack, attacker, victim, ARP Cache Poisoning, DNS spoofing, Session Hijacking
References
[1] Kapil M Jain & Manoj V Jain, International Journal of Science Technology and Engineering, Man in the Middle Attack survey, March 2016.
[2] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security, Vol-9, No.4, pp (106-111), April 2011.ISSN: 1947-5500,
[3] Pushpendra Kumar Pateriya, Analysis on Man in the Middle attack on SSL, International Journal Of Computer Application, 23 May 2012.
[4] Animesh Dubey, Ravindra Gupta, Gajendra Singh, Survey and Analysis of Client Side Detection of Content Sniffing Attack, March,2013
[5] Margaret Rouse, Hijacking, 2012.
[6] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp(1-5), Mar, 2016. Doi: 10.1109/CDAN.2016.7570921,
[7] S. Kak, Quantum information and entropy, 2007.
[8] G. N. Nayak and S. G. Samaddar, different flavours of man-in-the-middle-attack, consequences and feasible solutions, 2010.
[9] B. Issac, Secure ARP and secure DHCP protocols to Mitigate Security Attacks. International Journal of network security 8, 2009.
[10] Tanmay Patange, How to defend yourself against MITM or Man-in-the-Middle attack, October 2013.
[11] http://destroyadware.com/articles/security/3-effective-ways-defend-man-middle-attack-mitm/, 3 effective ways to defend against a Man-in-the-Middle Attack (MITM)
[12] Rachna Jain, Sushila Madan and Bindu Garg, "Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment", International Journal of Computer Sciences and Engineering, Volume-03, Issue-01, Page No (130-135), Jan -2015,
[13] Trend Micro, What is the Man-In-The-Middle attack and how can I protect myself from them? , 28 November 2012.
[14] Michael Gregg, How new technologies are reshaping MITM attacks, 23 July 2013.
[15] Dinu P S, Deepa S Kumar, Dr. M Abdul Rehman, Preventing SQL injection Attacks Using Cryptography Methods, 5 May 2015.
Citation
Manjula Kalita, Sukanya Dutta and Ayesha Yesmin, "A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.62-66, 2016.
Human Gait Recognition Based on Principal Component Analysis
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.67-70, Dec-2016
Abstract
This paper represents a method to recognize the human walking individuals by their gait using Principal Component Analysis (PCA). Human Gait is used as principal identifying feature to generate the unique gait sequence for each individual. Gait is an important biometric feature which delineates the way of locomotion. The generation of binary silhouette frames of walking subjects is the initial step in this method. Some distinguishable gait features, viz., centroid, aspect ratio, orientation, height and width are extracted from the silhouette frames to acquire feature vectors. Then, the PCA is employed over the generated feature vectors to condense the information contained and produces the principal components which are used as gait sequences or signatures to represent each walking individuals. Finally the generated gait sequences are recognized by using a minimum distance classifier based on eluclidean distance. A classification rate of 93% is achieved from the proposed human recognition method which is tested using CASIA dataset.
Key-Words / Index Term
PCA, Gait, Silhouette, Feature Vector Human Recognition, CASIA dataset
References
[1]. Dong Ming, Cong Zhang, Yanru Bai, Baikun Wan, Yong Hu and KDK Luk, “Gait Recognition Based on Multiple Views Fusion of Wavelet Descriptor and Human Skeleton Model”, IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurements Systems, pp. 246-249, 2009.
[2]. M. Nixon, J.D.Cunado, P. Huang and S. Stevenage, “Automatic Gait Recognition”, Biometrics Personal Identification in Networked Soc. A. Jain, ed., 1999.
[3]. S. Saharia, S.N.N. Pandit, M. Borah, “Orthogonal Moments and principal component analysis in Image Reconstruction and Pattern Recognition” in Proceeding of the International Symposium on Intelligent Robotic Systems, January 10-12, 1998, Bangalore.
[4]. G. Johansson, Visual motion perception. Scientific American, (232):76–88, 1975
[5]. Jianqiang Huang, Zhengming Yi, Xiaoying Wang and Huan Wu, “Gait recognition System based on (2D) 2 PCA and HMM”, Proc. SPIE10033, Eight International Conference on Digitial Image Processing (ICDIP 2016), 1003310, August 29, 2016; doi: 10.1117/12.224484
[6]. Sa-Mun KIM, Dae-Jong Lee, HO-Hyun Lee, Myung-Geun Chun, “Person Recognition Using Gait and Face features on thermal images”, The Transactions of Korean Institute of Electrical Engineering, vol. 65(2), pp. 130-135, 2016.
[7]. Amamoto and A. Fujii, “Detecting obstructions and tracking moving objectsby image processing technique”, Electronics and Communications in Japan, Part 3, vol. 82, no. 11, pp. 28–37, 1999.
[8]. E. J. Marey, Analysecin´ematique de la marche [chronophotograph]. C.R.S ´eances Acad. Sci. 98:1218- 1225, 1884
[9]. L. Lee and W.E.L. Grimson, “Gait analysis for recognition and classification”, Fifth IEEE Conference on Face and Gesture Recognition, 155-161, 2002.
[10]. R. Mukundan and K. R. Ramakrishnan, “Moment Functions in Image Analysis Theory and Applications”, Moment functions in image analysis. World Scientific, 1998.
[11]. L. Wang, W.M. Hu, and T.N. Tan, “Recent Developments in Human Motion Analysis” Pattern Recognition, vol. 36, no. 3, pp. 585-601, 2003.
[12]. Haritaoglu, D. Harwood, and L.S. Davis, “W4: real-time surveillance of people and their activities,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 809–830, Aug. 2000.
[13]. Troje, N. F. Decomposing biological motion: A framework for analysis and synthesis of Human gait patterns. Journal of Vision, 2, 2002.
[14]. J. H. Yoo, D. Hwang, and M.S. Nixon, “Gender Classification in Human Gait Using Support Vector Machine”, Springer Berlin / Heidelberg, 2005.
[15]. C. Y. Yam and M.S. Nixon, “Model-based Gait Recognition”, Encyclopedia of Biometrics,1082-1088, 2009
[16]. G. Johansson, “Visual perception of biological motion and a model for its analysis”, Perception and Psychophysics 14 (1973) 201–211
[17]. S. NiyogI and E. Adelson, “Analyzing and Recognizing Walking Figures in XYT”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Seattle, Wash, USA, pp. 469-474, 1994.
[18]. J. Boyd and J, Little, “Phase in model-free perception of gait”, in Proc. IEEE Workshop Human Motion, 2000.
[19]. C. Y. Yam, M. S. Nixon and J. N. Carter, “Gait recognition by walking and running: A model based approch”, in Proc. 5th Asian Conf. Computerr Vision, Melbourn, Australia, 2002, pp. 1-6.
[20]. Chiraz BenAbdelkader, Ross Cutler and Larry Davis,
“View-Invariant Estimation of Height and Stride for Gait
Recognition”, Biometric Authentication, European Conference on Computer Vision: International. Workshop, vol.4, pp. 155-167, 2002.
[21]. Jinyan Chen, Jiansheng Liu, ”Average Gait Differential Image Based Human Recognition”, The Scientific World Journal, vol. 2014, pp. 1-8, 2014.
[22]. Murat Ekinci, “A New Attempt to Silhouette-Based Gait
Recognition for Human Identification”, Computer Science
Journals, vol. 4013, pp. 443-454, 2006.
[23]. Hu Ng, Hau-Lee Tong, Wooi-Haw Tan and Timothy TzenVun Yap, ”Human Identification Based on Extracted Gait Features”, International Journal on New Computer Architectures and Their Applications, vol. 1, pp. 358-370, 2011.
[24]. Emdad Hossain and Girija Chetty, ”Person Identification in
Surveillance Video Using Gait Biometric cues”, International Conference on Fuzzy Systems and Knowledge Discovery, pp. 1877-1881, 2012.
[25]. Bissacco, A. Chiuso, Y. Ma, S. Soatto, “ Recognition of human gaits”, in Computer Vision and Pattern Recognition, 2001, Volume II., Kauai, HI (2001) 52–57.
[26]. P. Das, D. Das and S. Saharia, “Gait Analysis and Recognition for Human Identification”, in International Journal of Electronics and Applied Research (IJEAR) 2014, 1, 45-54, SSN NO: 2395-0064.
[27]. Javed, O., Shafique, K., Shah, M.: A hierarchical approach to robust background subtraction using color and gradient information. In: IEEE Workshop on Motion and Video Computing, Orlando, FL (2002) 22–27.
[28]. Stauffer, W.E.L. Grimson, “Adaptive background mixture models for real-time tracking”, in Computer Vision and Pattern Recognition 99, VolumeII, (1999) 246–252
[29]. M. Garcia, A. Chatterjee, A. Ruina, M. Coleman, “The simplest walking model, “stability, complexity, and scaling”, ASME Journal of Biomechanical Engineering 120 (1998) 281–288.
[30]. http://www.cbsr.ia.ac.cn
[31]. http://www.abi.auckland.ac.nz
Citation
Pranjit Das and Sarat Saharia, "Human Gait Recognition Based on Principal Component Analysis", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.67-70, 2016.
Study on Accurate Temperature Measurement Using Different Sensors and Microcontroller Based System
Survey Paper | Journal Paper
Vol.04 , Issue.07 , pp.71-73, Dec-2016
Abstract
Much of technology advances in the field of temperature measurement have led to a huge variety of sensors and measuring instruments now being available for making accurate measurements at relatively low costs. This paper makes an attempt to do a study on improving the accuracy of temperature measurement using most popular temperature measurement sensors and implementing in a microcontroller based measurement system, that will help to choose the correct method and sensor for specific application of temperature measurement.
Key-Words / Index Term
RTD(Resistance Temperature Detector), ADC(Analog to Digital Converter), CJC(cold junction compensation), I2C(Inter Integrated Circuit), PWM(Pulse Width Modulation), PRT(Platinum Resistance Thermometer)
References
[1] Performing High Performance Temperature Measurements, http://www.ni.com, September 2015
[2] Garry Prentice, Temperature Measurement Accuracy Guidelines, Flow Control Magazine, http://www.flowcontrolnetwork.com, July 2015
[3] K.A Akpado, C.O Ezeagwu, A. Ejiofor, A.O Nwokeke, Design, Modeling and Simulation of a Microcontroller Based Temperature Control in a Ventilation System, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 7, July 2013.
[4] TMP275, Datasheet TMP275: 0.5°C Digital out temperature sensor, SBOS363D-June2006-Revised August 2007.
[5] S.Jayasri, D.Karthika, "Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (272-279), Apr -2016
[6] D. Ibrahim, Microcontroller Based Temperature Monitoring and Control, Elsevier Science & Technology Books, 2002, pp. 2–61
[7] S.Rajesh Kumar, S.Rameshkumar, Industrial Temperature Monitoring and Control System Through Ethernet LAN, International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume 2 Issue 6 June, 2013 Page No. 1988-1991
Citation
Jayanta Kumar Nath and Himadri Baruah, "Study on Accurate Temperature Measurement Using Different Sensors and Microcontroller Based System", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.71-73, 2016.
A Survey on Smart Health Care Using Data Mining
Survey Paper | Journal Paper
Vol.04 , Issue.07 , pp.74-79, Dec-2016
Abstract
In this data-rich world, people are running out of information. This can be a matter of risk for the person who needs immediate remedies regarding their poor health. To unfold this hurdle, the concept of data mining is the best suited. Here, the traditional approaches have been replaced by smart technologies. The main purpose of data mining application in healthcare system is to develop an automated tool for identifying and disseminating relevant healthcare information. In this paper, we present a methodology for Prediction of diseases based on user input symptoms. It predicts probable diseases by mining data sets and provides suggested doctors and remedial solutions for Effective Treatment. It will also guide the users by giving tips to live a healthy life. We have discussed in detail on the existing Data mining techniques with data mining algorithms and its application tools which are more valuable for healthcare services.
Key-Words / Index Term
Data Mining, E-health care, Prediction, Effective remedies
References
[1] Han, J, Kamber, M.: “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishers, 2006
[2] K. Srinivas, B. Kavitha Rani and Dr. A. Govardhan, ―Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks International Journal on Computer Science and Engineering (2010).
[3] ShwetaKharya, ―Using Data Mining Techniques for Diagnosis and Prognosis of Cancer Disease‖, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012.
[4] Arvind Sharma and P.C. Gupta ―Predicting the Number of Blood Donors through their Age and Blood Group by using Data Mining Tool| International Journal of Communication and Computer Technologies Volume 01 – No.6, Issue: 02 September 2012.
[5] M. Durairaj, V. Ranjani- Data Mining Applications in Healthcare Sector: A Study International Journal of Scientific& Technology Research Volume 2, Issue 10, October 2013
[6] Gitanjali J., C.Ranichandra, M. Pounambal, ―APROIRI algorithm based medical data mining for frequent disease identification, ‖ Univ. VIT, Vellore, 4, April 4, 2014, Vol 2.
[7] S. Nagaparameshwara Chary, B.Ram, "Analysis of Classification Technique Algorithms in Data mining- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (180-185), Jun -2016,
[8] Priyanka Vijay Pawar, MeghaSakharamWalunj, PallaviChitte, Estimation based on Data Mining Approach for Health Analysis,International Journal on Recent and Innovation Trends in Computing and Communication
[9]. David Page and Mark Craven,― Biological Applications of Multi Relational Data Mining‖.
Citation
Pinky Saikia Dutta, Sunayana Dutta, Tridisha Das, Sweety Buragohain, Susmita Sarma, "A Survey on Smart Health Care Using Data Mining", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.74-79, 2016.
Determination of Variation of Strain Anisotropy of Wood due to change in Relative Humidity
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.80-84, Dec-2016
Abstract
Wood is an anisotropic biological material with a multitude use. The paper describes variation of strain of wood samples due to the change in relative humidity (RH). The strain developed due to change in RH is measured by strain gauge method. In this paper, the strain is measured in longitudinal (L) and tangential (T) direction. For that purpose strain gauge is attached in the prescribed direction and the strain developed due to change in RH is recorded by data acquisition system. The developed data acquisition recorded ambient temperature, RH with temperature compensated and strain of the wood samples in different L and T direction. Strain anisotropies of two wood samples of different thickness are tested at different relative humidity conditions and the results are reported in the paper. Experimental results show that the strain developed in the wood sample is anisotropic.
Key-Words / Index Term
MPLAB-IDE, RISC Processor, Measurement System
References
[1]GTR-FPL-I13.USDA Forest Service Wood Handbook:Wood as an Engineering Material., Forest Product Laboratory, (1999) Madison
[2] Kollmann F.F.P, Cote W.A, Principles of wood science and technology I solid wood, Springer-Verlag(1968), New York Inc.
[3] Eckelman A,The shrinkage and swelling of wood and its effects on furniture, Forestry & natural resources, FNR 163, Purdue University,Cooperative extension service West Lafayette IN
[4] Rafsanjani A, Stiefel M, Jefimovs K, Mokso R, Derome D, Carmeliet J, Hygroscopic swelling and shrinkage of latewood cell wall micropillars reveal ultrastructural anisotropy. Journal of the Royal society interface, (2014) ,11:95
[4] Dahl KB, Malo KA, Planar strain measurements on wood specimens, Experimental Mechanics (2009), 49:575–586
[5] Derome D, Rafsanjani A, Patera A, Guyer R, Carmeliet J,Hygromorphic behavior of cellular material: hysterectic swelling and shrinkage of wood probed by phase contrast X- ray Tomography. Philosophical Magazine, (2012) 92:28-30
[6] Hering S, Kennecke D, Niemz P, Moisture-dependent orthotropic elasticity of beech wood, Wood Sci Technol (2011) , DOI 10.1007/s00226-011-0449-4
[7] Kalita K, Das N, Sarma U, Boruah PK, Development of a strain measurement system for the study of effect of relative humidity on wood, Measurement Journal(2016), 94:265-272
[8] IST innovative sensor technology, Tsic 506F TO 92, accessed on 2nd August, 2015
[9] Honeywell, HIH-5030, accessed on 1st August, 2015
[10] Datasheet of strain gauge, accessed on 12th June, 2015
[11] Kalita K, Das N, Sarma U, Boruah PK, Design and uncertainty evaluation of a strain measurement system, MAPAN-Journal of Metrology Society of India,Springer(2015), 31: 17-24
[12]Wiederhold PR Water vapor measurement: Methods and Instrumentation, CRC Press, (1997),
Citation
Kunjalata Kalita and Nipan Das, "Determination of Variation of Strain Anisotropy of Wood due to change in Relative Humidity", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.80-84, 2016.
Single Stage Chain Routing Protocol (SCRP) For Wireless Sensor Networks
Review Paper | Journal Paper
Vol.04 , Issue.07 , pp.85-88, Dec-2016
Abstract
In recent years there has been development of systems to make human life easier. One of the emerging fields is wireless sensor networking. There have been many development in the last few years to make smart farming worldwide popular and several research works has been done by researchers to find the most efficient routing protocol as the sensor nodes used in smart farming have limited energy and thus its a challenge to utilize that limited energy efficiently for a long period of time. To address these issues we propose a new routing algorithm called Single Stage Chain Routing Protocol.
Key-Words / Index Term
CCM, PEGASIS, SPCRP and WSN
References
[1] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014
[2] Lindsey, Stephanie, and Cauligi S. Raghavendra. "PEGASIS: Power-efficient gathering in sensor information systems." Aerospace conference proceedings, 2002. IEEE. Vol. 3. IEEE, 2002.
[3] Hiteshreddy, Obulapu, Pardeep Singh, and Siddharth Chahuan. "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network." (2015).
[4] Jigish Rana, Sangeeta Vhatkar, Mohommad Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor Network”, International Journal of Computer Applications (0975 – 8887) International Conference and Workshop on Emerging Trends in Technology (ICWET 2015).
[5] S L Mewada and Umesh Kumar Singh, “Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN”, Int. Journal of advanced research in Computer Science and Software Engineering, Vol. 1, No. 1, pp(1-4), Dec.-2011
[6] Vishakha Singhal and Shrutika Suri, "Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (142-147), May -2014.
[7] Sujata Agrawal, K.D. Kulat and M. B.Daigavane, "Evaluation of Routing Algorithm for Ad-hoc and Wireless Sensor Network Protocol", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (11-18), Oct -2013
Citation
Utpal Barman, Pranoy Bhowmick, Kunal Gunjan Talukdar, Mrinal Goswami, Amit Mundra, "Single Stage Chain Routing Protocol (SCRP) For Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.85-88, 2016.
A Study on Feature Extraction Techniques in Image Processing
Review Paper | Journal Paper
Vol.04 , Issue.07 , pp.89-93, Dec-2016
Abstract
This paper presents a study on feature extraction techniques for image processing which is an important research subject in the field of computer vision. Representation and Feature extraction is an important step for multimedia processing. It manages how to concentrate perfect features that can mirror the intrinsic content of the picture. Feature extraction strategy extracts the distinct components from the picture like edges, corners and so on which can be used to match the similarity for estimation of relative transformation between the images. So in this paper we focus our study on the different methods used for image feature extraction, texture feature extraction and shape feature extraction.
Key-Words / Index Term
Color feature, Color Histogram, Feature extraction, ,Haralik texture feature, Hu-Moment Shape Features, Tamura texture feature
References
[1] Dong ping Tian,” A Review on Image Feature Extraction and Representation Techniques”, International Journal of Multimedia and Ubiquitous Engineering Vol. 8, No. 4, July, 2013
[2] R.Venkata Ramana Chary1, Dr.D.Rajya Lakshmi2 and Dr. K.V.N Sunitha“Feature Extraction Methods For Color Image Similarity”, Advanced Computing: An International Journal (ACIJ), Vol.3, No.2, March 2012
[3] N.Krishnaraj, "Feature Extraction Techniques in Keystroke Dynamics for Securing Personal Devices", International Journal of Computer Sciences and Engineering, Volume-03, Issue-03, Page No (98-101), Mar -2015
[4] Neelima Bagri1 and Punit Kumar Johari2, “A Comparative Study on Feature Extraction using Texture and Shape for Content Based Image Retrieval”, International Journal of Advanced Science and Technology Vol.80 (2015), pp.41-52.
[5] A. K. Jain and A. Vailaya, “Image retrieval using colour and shape”, Pattern Recognition, vol. 29, no. 8, (1996), pp. 1233-1244.
[6] M. Flickner, H. Sawhney, W. Niblack, et al., “Query by image and video content: the QBIC system”, IEEE Computer, vol. 28, no. 9, (1995), pp. 23-32.
[7] G. Pass and R. Zabith, “Histogram refinement for content-based image retrieval”, In Proc. Workshop on Applications of Computer Vision, (1996), pp. 96-102.
[8] J. Huang, S. Kuamr, M. Mitra, et al., “Image indexing using colour correlogram”, In Proc. CVPR, (1997), pp. 762-765.
[9] D. S. Zhang, Md. M. Islam and G. J. Lu, “A review on automatic image annotation techniques”, Pattern Recognition, vol. 45, no. 1, (2012), pp. 346-362.
[10] Priyarani S. Jagatap and Rupali R. Jagtap, "Electrocardiogram (ECG) Signal Analysis and Feature Extraction: A Survey", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (1-3), May -2014
[11] S. Mori Tamura and T. Yamawaki, “Textural Features Corresponding to Visual Perception”, IEEE Transactions on Systems, Man and Cybernetics, vol. smc-8, no. 6, (1978) June, pp. 460-473.
Citation
Shrabani Medhi, Chandraleena Ahmed and Rabi Gayan, "A Study on Feature Extraction Techniques in Image Processing", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.89-93, 2016.
Design of a Microcontroller Based Wireless Measurement and Monitoring of Temperature and Relative Humidity using Zigbee
Review Paper | Journal Paper
Vol.04 , Issue.07 , pp.94-97, Dec-2016
Abstract
This paper proposes an advanced remote monitoring system for the farmers to monitor the various environmental parameters required for the growth of crops. This method is cost effective and an improvisation of old techniques. It mainly measures the ambient temperature and relative humidity, using temperature and humidity sensor DHT11 and sends the data wirelessly to remote location using Zigbee based Wireless sensor network and is also displayed on LCD. An application is developed in LABVIEW to acquire the data corresponding to temperature and relative humidity graphically in real time.
Key-Words / Index Term
Embedded System, AT89S52 Microcontroller, LCD, DHT11, Zigbee WSN, Graphical user interface(GUI), LABVIEW (Laboratory Virtual Instruments Engineering Workbench)
References
[1]. Awati J. S., PATIL V. S. andAWATI S.B, Application of Wireless Sensor Networks for Agricultural Parameters, International Journal of Agriculture Sciences(0975 – 9107), Volume 4, Issue 3, April 2012
[2]. B.VidyaSagar, Green House Monitoring and Automatation using GSM, International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012
[3]. Vimal Mishra, I S Naveen, Subhadeep Purkayastha, Swastik Gupta , Design of Adaptive Humidity Controller and Practical Implementation for Humidity and Temperature Exclusiveness, International Journal of Advanced Research in Computer Science and Software Engineering
[4]. Kirandeep Kaur, Rita Mahajan and Deepak Bagai, Zigbee Based Soil Moisture Monitoring System, International Journal of Innovative Research in Computer and Communication Engineering (3297 – 2007) Volume 4 Issue 6, June 2016
[5]. Mr.P.V. Karande, Prof. Zameer Farooqui, Prof. S.R. Madkar, Wireless Monitoring Of Soil Moisture & Humidity using ZigBee in Agriculture, International Journal of Scientific Research and Management, ISSN: 2321-3418 (Online) http://www.ijsrm.in Vol. 3, No. 2, 2015
[6]. Mewada Shivlal, Sharma Pradeep, Gautam S.S., Sharma Sarita, Agiwal Priyanka, Shrivastava Arti , “Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2”, Research Journal of Computer and Information Technology Sciences, Vol-4, Issue-1, pp (1-7), Jan 2016.
[7]. J. Pont, Embedded C, Pearson Education Ltd.
[8]. Shibu K V, Introduction to embedded systems, Mc Graw Hill.
[9]. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security, Vol-9, No.4, pp (106-111), April 2011
[10]. Wang Tianmiao, The embedded system design and the example, Beijing: Tsinghua University Press, 2003. pp. 4-5
[11]. C. Johnson, Process Control Instrumentation Technology, Prentice Hall of India Pvt. Ltd., New Delhi (1996).
[12]. Limin Cai, Temperature Measurement and Control System Based on Embedded WEB, Journal of Computer and Information Science, Vol. 2, No. 2, May 2009, www.ccsenet.org/journal.html
[13]. N.M. Singh, K. C. Sarma, “Design and Development of Low Cost PC Based Real Time Temperature and Humidity Monitoring System,” International Journal of Electronics and Computer Science Engineering, vol. 1, No. 3, pp. 1588-1592, June, 2012
[14]. D. Ibrahim, Microcontroller Based Temperature Monitoring and Control, Elsevier Science & Technology Books, 2002, pp. 2–61.
[15]. I. Oghogho, “PC Based Temperature Monitoring and Alarm System,” Indian Journal of Science and Research, vol. 3, No. 2, pp. 17-20, 2012
Citation
Sharmila Nath and Himadri Baruah, "Design of a Microcontroller Based Wireless Measurement and Monitoring of Temperature and Relative Humidity using Zigbee", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.94-97, 2016.