Version-4 (Sep-Oct 2017)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Analysis Using Apriori Algorithm |
Country | : | India |
Authors | : | Nikita Chandekar || Priyanka Ashtikar || Rahul Motghare |
: | 10.9790/0661-1905040104 |
Abstract: Development of several case projects throughoffering a graduate level course on Data Mining. It then outlines a particular case project that describes the process of data extracting, data cleansing, data transfer, data warehouse design, and development. It also outlines the development of a data cube as well as application to understand business intelligence. The results can be beneficial to an instructor who wants to develop a practical course or a practitioner venturing into the data warehousing and data mining area. Apriori algorithm has been improved and applied to the substation data mining process. Ant colony algorithm is applied to get the optimal solution of reactive power allocation in substations. The state transition probability formula is amended and parameters are dynamically adjusted in this ant colony algorithm. The choice of the ant's path to the next node is determined by the table formulated according to the confidence level of the data mining. The switching strategy of the capacitor sets is given by algorithm.
Keywords: apriori, warehousing, datamining, OLAP, pattern evaluation, business intelligence (BI).
[1]. WierschemD.Mc.Millen.J. And McBroom, R., (2003),
[2]. "What Academia Can Gain from Building a Data Warehouse," Educes Quarterly, Number 1, pp. 41-46.
[3]. Fang, R. and Tuladhar, S. "Teaching Data Warehousing and Data Mining in a Graduate Program in Information Technology, "Journal of Computing Sciences in Colleges, Vol.21, Issue 5, pp. 137-144.
[4]. Pierce, E. M., "Developing and Delivering a Data Warehousing and Data Mining Course," Communications of the AIS, Vol. 2, Article 16, pp. 1-22.
[5]. Slazinski, E. D., "Teaching Data Warehousing to Undergraduates – Tales from the Warehouse Floor," CITC'03.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evaluation of Proactive Routing Protocol of Mobile AD HOC Networks |
Country | : | India |
Authors | : | Sonia Arora || Rohit Sharma |
: | 10.9790/0661-1905040509 |
Abstract: An Adhoc mobile network is an accumulation of mobile nodes that are energetically and arbitrarily situated such that the interconnections flanked by nodes are equipped for changing on a persistent premise. The main goal of such a specially appointed network routing protocol is honest and efficient course foundation between a pair of nodes so that communication might be conveyed in an opportune way. In this paper we examine routing protocols for adhocnetworks and evaluate these protocols in view of a given arrangement of parameters Multipath routing speaks to a promising routing technique for wireless mobile Adhocnetworks. Multipath routing accomplishes load balancing and is stronger to route failures. As of late, various multipath routing protocols have been proposed...............
Keywords: Proactive, Routing, Protocol, Mobile, Ad Hoc Networks,communication, Multi-path routing, wireless, bandwidth, consumption.
[1]. Ron Banner, and Ariel Orda, "Multipath routing Algorithms for Congestion Minimization", IEEE/ACM Trans. On Networking, vol. 15, n. 2, pp. 413-424, 2007.
[2]. D. Johnson, and D. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, , pp. 153-181, 2010.
[3]. C. Perkins, and E.M. Royer, "Ad-Hoc On Demand Distance Vector Routing", in Proc. of IEEE Workshop Mobile Computing Systems and Application, pp. 90-100, 2012.
[4]. S.J. Lee, and M. Gerla, "AODV-BR: Backup Routing in Ad Hoc Wireless Networks", in Proc. of IEEE Wireless Comm. and Networking Conf., pp. 1311- 1316, 2012.
[5]. S.J. Lee, and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks", in Proc. of ICC, 2011..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis on AD HOC Networks for Multipath Routing |
Country | : | India |
Authors | : | Rohit Sharma || Sonia Arora |
: | 10.9790/0661-1905041015 |
Abstract: Multipath routing accomplishes load balancing and is stronger to route failures. As of late, various multipath routing protocols have been proposed for wireless mobile Adhoc networks. Execution assessments of these conventions demonstrated that they accomplish lower routing overhead, bring down end-to-end defer and reduce clog in correlation with single path routing protocols. Be that as it may, a quantitative examination ofmulti-path routingprotocols has not yet been led. The proliferation thinks about demonstrates that the AOMDV protocol achieves best execution in high mobility situations, while AODV Multipath performs better in situations with low mobility and higher node thickness. SMR performs best in networks with low node thickness, however as thickness builds, the protocol's performance is corrupting. Routing protocols assume an essential part for communications in MANET. The greater part.........
Keywords: Ad Hoc Networks, Multipath Routing, load balancing, wireless mobile ad hoc networks Performance, evaluations, protocols
[1]. Liu, J., Chen, J. and Y. Kuo, 2009. Multipath routing protocol for networks lifetime maximization in ad-hoc networks. Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, Sept. 24-26, IEEE Xplore Press, Beijing, pp: 1-4. DOI: 10.1109/WICOM.2009.5305828
[2]. Yoo, D., G. Jin, B. Jang, L.T. Tuan and S. Ro, 2011. A modified AOMDV routing protocol for maritime inter-ship communication. Proceedings of the International Conference on ICT Convergence, Sept. 28-30, IEEE Xplore Press, Seoul, pp: 605-607. DOI: 10.1109/ICTC.2011.6082694
[3]. Tamilarasan, S.M. and K. Eswariah, 2012. Energy aware and delay based ad hoc on-demand multipath distance vector routing in MANETs. Eur. J. Sci. Res., 85: 452-459.
[4]. SenthilMuruganTamilarasan and KannanEswariah "Link stability with energy awaread hoc on demand multipath routing protocol in mobile ad hoc networks" ISSN: 1546-9239 – 2013.
[5]. C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., Feb. 2012, pp. 90–100
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Techniques And Its Applications of Text Mining |
Country | : | India |
Authors | : | Swathi Agarwal || G.L.Anand Babu || G.Sekhar Reddy |
: | 10.9790/0661-1905041619 |
Abstract: Text mining is a procedure that utilizes an arrangement of algorithms for changing over unstructured content into organized data items and the quantitative techniques used to break down these data items. The principal target of Text mining is to empower clients to separate information from text based resources and deals with the operations like recovery, extraction, rundown, order (directed) and grouping (unsupervised). Keeping in mind the end goal to locate a productive and compelling system for text classification, different methods of text categorization is recently developed. Some of them are regulated and some of them unsupervised way of report course of action. In this paper, focus is text mining process, diverse technique for text classification, group examination for content reports and its applications.
Keywords: Clustering, Information Extraction, Information Retrieval, Natural Language Processing, Natural Language Text, Query Processing, Text mining.
[1]. Shilpa Dang, Peerzada Hamid Ahmad, "Text Mining: Techniques and its Application", International Journal of Engineering & Technology Innovations, ISSN (Online): 2348-0866, Volume 1, Issue 4, pp. 22-25, 2014. [2]. Swathi Agarwal, G. L. Anand Babu, Dr. K. S. Reddy, ―Classification Techniques in Data Mining-Case Study‖, International Organization of Scientific Research, Volume 18, Issue 6, 2016.
[3]. Shah Neha K, "Introduction of Text mines and an Analysis of Text mining Techniques", PARIPEX, ISSN: 2250-1991, Volume 2, Issue-2, 2013.
[4]. T. Nasukawa, T. Nagano, ―Text analysis and knowledge mining system‖, IBM Systems Journal, 2001, Volume: 40, Issue: 4, Pages: 967
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Security is very important and significant issue for transmission of information in WSNs. DNA-Cryptography plays a very vital role in the areas of communications and data transmission. In DNA cryptography, biological DNA concept can be used not only to store data and information carrier, but also to perform computations. This paper is based on computation security using DNA cryptography. An algorithm is proposed that uses DNA cryptography with secure socket layer (SSL) for providing a secure channel with more secure exchange of information in wireless sensor networks
Keywords: DNA cryptography; Secure Socket Layer (SSL); Wireless sensor networks; Encryption; Decryption.
[1]. Neuman BC, Tso T. Kerberos: an authentication service for computer networks. Communications Magazine, IEEE 1994; 32(9): 33–38.
[2]. Diffie W, Hellman ME. New directions in cryptography. Information Theory, IEEE Transactions on 1976; 22: 644–654.
[3]. Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978; 21(2): 120–126.
[4]. Perrig A, Szewczyk R, Wen V, Cullar D, Tygar JD. Spins: Security protocols for sensor networks. Proceedings of the 7th annual international conference on Mobile computing and networking 2001. p. 189–199.
[5]. Du W, Deng J, Han YS, Chen S, Varshney PK. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper proposes a new easy paging operation that is a kind of improved swipe motion to be able to tie plural pages together for reading a 3D virtual book by applying augmented reality technology. Our previous system could display a virtual book by using 3DCG and could capture human hand motions via Leap Motion that is a very small and reasonable contact-less sensor, and it could make users the operational feeling such as a paper book on a PC, for the first time. However, this system had a problem that it is difficult for many users to learn the paging operations because the recognition accuracy of the Leap Motion is not enough to distinguish each fingers correctly, and then, it requires very complex hands and/or fingers form to control the 3D virtual book. To cope with the difficulty, the new function..........
Keywords: E-book, Augmented reality, contact-less motion sensor, 3DCG, WebGL, THREE.js
[1]. Ryota Kobayashi and Atsushi Ikeuchi, Effects of Text Understanding and Memory by Types of Display Media: Comparison between E-book Readers and Papers, Proceedings of Information Processing Society of Japan Technical Report, Vol. 2012-HCI-147, No.29, pp. 1-7, 2012 (In Japanese)
[2]. Kentaro Takano, Kengo Omura and Hirohito Shibata, Comparison between paper books and electronic books in reading short stories, Proceedings of Information Processing Society of Japan Technical Report, Vol. 2011-HCI-141, No.4, pp. 1-8, 2011 (In Japanese)
[3]. J.M. Noyes and K.J. Garland, Computer- vs. paper-based tasks: Are they equivalent?, Ergonomics, Vol. 51, No. 9, pp. 1352-1375, 2008
[4]. S. Sugiyama, M. Shibata, A. Ikuta, S. Saito and S. Miyashita, A Study of Displaying Electronic Text with Seamless Pages --Magnifying And Simplifying System for Text EXTension (MaSSTExt)--, International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), ISSN: 2150--7988, Vol. 2, pp. 137--145, 2010
[5]. S. Sugiyama, A. Ikuta and M. Shibata, A Basic Concept of Displaying Electronic Text with Seamless Pages: Wheel Action for Reeling Paragraphs (WaRP) in the MaSSTExt, International Conference on Computer Information Systems and Industrial Management Applications (CISIM2010), pp. 222-227, 2010
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Thanks to the convenience of the mobility and portability of mobile device, the paradigm of ICT has been changed leading to the shift from the era of PC to the era of mobiles. Most people use mobile devices and diverse services provided by mobile devices are used not only for business but also for convenience of life. Therefore, the development of applications that support accessibility so that everybody can use the services provided by mobiles is important. In this respect, in the present study, the actual conditions of use of mobiles by hearing-impaired persons that have been a little away from the targets of interest for accessibility were investigated, the elements of development of applications to support hearing-impaired persons' accessibility were examined, and an application was designed and implemented based on the results of the foregoing. The application implemented..........
Keywords: Web Accessibility, Mobile Accessibility, HCI, UI Design, Evaluation of Accessibility, Universal Design
[1] HeesunKim,"Usability Improvement Method of Shopping Mall based on Smartphone,"Journal of Korea Contents Association, 11(10), 2011, 77-84.
[2] KS. Hong, and H. K. Min, "The Improvement of Smart Devices Apps Accessibility for Student with Disabilities,"Journal of Rehabilitation Welfare Engineering & Assistive Technology, 8(2), 2014, 125-131.
[3] DMC REPORT, "2017 Smartphone app use behavior," Digieco Issue & Trend, Republic of Korea, 2017.
[4] Eun-Ju Park, Yang-Won Lim and Han-Kyu Lim, "A Study on mobile accessibility to mobile web site,"Proceeding of Korean Institute of Information Scientists and Engineering,2013(11), 2013, 426-428.
[5] Hyunju MoonandSukil Kim, "A Study on the Amendment of the Mobile Application Accessibility Guideline based on User Evaluation," Journal of Rehabilitation Research, 18(2), 2014, 181-205.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | New programming framework for Wireless sensor network |
Country | : | Morocco |
Authors | : | FIHRI Mohammed || EZZATI Abdellah |
: | 10.9790/0661-1905044650 |
Abstract: Wireless sensor networking is an innovating area. Where we use specific equipment in order to measure small rated data, which often have a major importance to the user such as temperature or input output state and share it wirelessly. In this paper we will try to make WSN simple to use by common developers that not necessary have the WSN networking knowledge; by creating a new programming framework that is specially created for Linux based operating systems. The use of wireless sensor network involves the use of a routing protocol, security mechanism, application communication layer… How we can provide those solutions and there applications without many coding and in easy way? It's the role of our new programming framework that will be describe in this paper, it.s concept of external calling system depending on the functionality, and its architecture. Finally we present the conformity of our framework with the SCADA System.
Keywords: Framework, WSN, Programming
[1] CARVALLO, A. AND COOPER, J. THE ADVANCED SMART GRID. BOSTON: ARTECH HOUSE, 2015. PRINT.
[2] THOMAS, M. AND MCDONALD, J. POWER SYSTEM SCADA AND SMART GRIDS. CRC PRESS, 2015.PRINT
[3] MCCRADY, S. DESIGNING SCADA APPLICATION SOFTWARE: A PRACTICAL APPROACH. ELSEVIER, 2013. PRINT.
[4] Z. ZHAO, G.-H. YANG, Q. LIU, V.O.K. LI AND L. CUI. IMPLEMENTATION AND APPLICATION OF A MULTI-RADIO WIRELESS SENSOR NETWORKS TESTBED. WIRELESS SENSOR SYSTEMS, IET, VOL. 1, NO. 4, PAGES 191–199, 2011. 28
[5] G. BARRENETXEA, F. INGELREST, G. SCHAEFER, AND M. VETTERLI, ―SENSORSCOPE: OUT-OF-THE-BOX ENVIRONMENTAL MONITORING,‖ IN ACM/IEEE IPSN , 2008 BAYDERE, S.,SAFKAN, Y., AND DURMAZ, O. 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computer Programming Applied to Operations Research |
Country | : | Saudi Arabia |
Authors | : | Mobin Ahmad |
: | 10.9790/0661-1905045155 |
Abstract: Operation research is the portrayal of real-worldsystems by mathematical models together with the utilization of quantitative methods algorithms) for comprehending such models, with a view to advancing. As we probably are aware, C++ Computer Programming language is a center level dialect and a computer program with this language is executed speedier than application software's of the operation research zone. In this paper, a straightforward layout program with basic C++ Computer Programming directions is displayed for reproducing many sorts of optimization problems. This layout is anything but difficult to learn and comprehend for any individual who works in the operation research territory. They can rapidly and effectively recreate many sorts of optimization problems with this template..
Keywords: Computer, Programming, Operations Research, mathematical models, algorithms, program.
[1]. M. Galati, "Introduction to Operation Research", pp.5, Available: http://coral.ie.lehigh.edu/~maghpresent/stetson01.pdf
[2]. Y.liker, Topcu, "Operations Research", pp.6, Available: http://pdfebooks.org/pdf/41997/OPERATIONS-RESEARCH-LECTURENOTES-pdf.pdf
[3]. F.S. Hillier, G.J. Lieberman, "Introduction to Operation Research", 9nd Ed. New York: McGraw-Hill, 2010, pp.30-60.
[4]. M. Moddares, A. Asefvaziri, "Operation Research, Mathematical Programming", 3rd Ed. Tehran :Javan Pub, 2007, pp.184-240.
[5]. M. Razavi, "An Introduction to Operation Research", First Ed. Tehran: Iran Industrial Research and Education Center Pub, 2006, pp.256-258..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Study on Encryption Techniques for H.264/AVC Videos |
Country | : | India |
Authors | : | Fatma K Tabash || M. Izharuddin |
: | 10.9790/0661-1905045660 |
Abstract: H.264/AVC is one of the most popular video encoding standards that is widely used for many real time applications. Encryption process is the effective method used to protect videos from the illegal use. Encryption techniques in H.264/AVC videos depends on which stage through the coding process is applied. For instance, Encryption techniques can be applied before the compression process, through the compression process or after the compression process. Through the compression process, the encryption techniques can be applied through prediction process, preparation of motion vectors, transformation process, entropy coding process or etc. Each type of these encryption techniques has its advantages and disadvantages. Thus, this paper compares between the different types of encryption techniques for H.264/AVC that are applied into different stages of encoding process.
[1] P. Carrillo, H. Kalva, and S. Magliveras, "Compression independent object encryption for ensuring privacy in video surveillance," in Proc. ICME, Jun. 2008, pp. 273–276.
[2] Dufaux and T. Ebrahimi, "H.264/AVC video scrambling for privacy protection," in Proc. IEEE ICIP, Oct. 2008, pp. 1688–1691.
[3] F. Dufaux and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, pp. 1168–1174, Aug. 2008.
[4] Ahn J, Shim H, Jeon B, Choi I (2004) Digital video scrambling method using intra prediction mode. PCM2004, Springer, LNCS 3333, pp 386–393 (November).
[5] S. Lian, J. Sun, G. Liu, and Z. Wang, "Efficient video encryption scheme based on advanced video coding," Multimedia Tools Applicat., vol. 38, no. 1, pp. 75–89, Mar. 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: With the increase in the usage over the internet over the globe ,the security regarding the confidentiality of the data that is being transferred and received while Internet is being used is the area of major concern. In the recent years, the increase in the use and development in IoT has made it necessary to facilitate keys storage that is cost efficient. The traditional methods that were used before ,proved to be expensive for key storage. An alternative solution for cost minimization, keys were being generated using the noisy entropy. The keys could be secured and made cost efficient when bounded with fuzzy extractor which also made the keys strong cryptographically. To balance the entropy loss at the time of key extraction process, the theoretical fuzzy extractors needed a enormous...........
Keywords: IoT (internet of things),CFE(computational Fuzzy Extractor),PUF(Physical Unclonable Function),LWE(Learning with Errors),TRG(True Random Generator) Introduction.
[1] A.Blum, A. (2003). "Noise-tolerant learning the parity problem and the statistical qyery model". ACM(JACM) , 50, 506-519.
[2] A.Van Herrewege, S.-R. (2012). "Reverse fuzzy Extractor:Enabling lightweight mutual authentication for puf-enabled rfids ". Springer , 374-389.
[3] B.Fuller, X. (2013). "Computaional Fuzzy Extractors". Springer , 174- 193.
[4] D.Bandyopadhyay, J. (2011). "Internet of things:Application and challenges in Technology and Standardization". Springer , 58, 49-69.
[5] D.Kristinsson. (2011). "Ardrand:The arduino as a hardware random- number generator"..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study of Two Different Attacks to IPv6 Network |
Country | : | India |
Authors | : | Ayman M. A. Shabour || M.A. Elshaikh |
: | 10.9790/0661-1905046670 |
Abstract: In the lights of today and future advancing technologies, the demand of IPv6 internet protocol, had becomes crucial for its usages & benefits. This paper investigates the use of information messages to build a visual perception and follow-up of IPv6-based cyber-attacks on IPv6 networks IPv6 , (DOS)& ARP poisoning , Packet analyzer( wireshark ) and open source tools( virtualbox, Linux kali system, Ubuntu Linux server ) are used ,to verify the existence of attacks on IPV6. The experimental results ,proved that the traces of simulated attacks extend form the link layer to the application layer.
Keywords: Internet Protocol version 6(IPv6), Internet Protocol version 4(IPv4) Transfer Control Protocol(TCP), Address Resolution Protocol(ARP), Denial of Service(DOS), Internet Control Message Protocol version6 (ICMPv6)..
[1] ICANN. Available Pool of Unallocated IPv4 Interne Addresses .Internet : https://www.icann.org/en/system/files/press-materials/release-03feb11-en.pdf .February.3,2011 accessed [May.10,2017]
[2] UK ESSAYS . Ipv4 Internet Protocol Security Features Computer Science Essay. Internet : https://www.ukessays.com/essays/computer-science/ipv4-internet-protocol-security-features-computer-science-essay.php#ftn1. March.23,2015 accessed [May.10,2017]
[3] [RFC 4861] Narten, T., Nordmark, E., Simpson, W., Soliman,H. "Neighbor Discovery for IP version 6 (IPv6)". September 2007.Available : https://tools.ietf.org/html/rfc4861 .accessed [June .16,2017]
[4] [RFC 5175] B.Haberman,R .Hinden "IPv6 Router Advertisement Flags Option" March 2008 Available : https://tools.ietf.org/html/rfc5175 . accessed [June .16,2017] https://www.virtualbox.org/ accessed March.20, 2017
[5] Wireshark User's Guide :for Wireshark 1.7 by Ulf Lamping,Richard Sharpe,Ed.Warnicke Copyright © 2004-2011; Source: https://www.wireshark.org/about.html accessed March.20, 2017..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Creating voice control for robots is very important and difficult task. Therefore, we consider different systems of speech recognition. We divided them into two main classes: (1) open-source and (2) close-source code. As close-source software the following were selected: Dragon Mobile SDK, Google Speech Recognition API, Siri, Yandex SpeechKit and Microsoft Speech API. While the following were selected as open-source software: CMU Sphinx, Kaldi, Julius, HTK, iAtros, RWTH ASR and Simon. The comparison mainly based on accuracy, API, performance, speed in real-time, response time and compatibility. the variety of comparison axes allow us to make detailed description of the differences and similarities, which in turn enabled us to adopt a careful decision to choose the appropriate system depending on our need.
Keywords: Robot, Speech recognition, Voice systems with closed source code, Voice systems with open source code.
[1] Caute, A., & Woolf, C. (2016). Using voice recognition software to improve communicative writing and social participation in an individual with severe acquired dysgraphia: An experimental single-case therapy study. Aphasiology, 30(2-3), 245-268.
[2] Godwin-Jones, R. (2011). Mobile apps for language learning. Language Learning & Technology, 15(2), 2-11.
[3] Duarte, T., Prikladnicki, R., Calefato, F., & Lanubile, F. (2014). Speech recognition for voice-based machine translation. IEEE software, 31(1), 26-31.
[4] Ciobanu, D. (2014). Of Dragons and Speech Recognition Wizards and Apprentices. Tradumàtica, (12), 0524-538.
[5] Kumar, K., Aggarwal, R. K., & Jain, A. (2012). A Hindi speech recognition system for connected words using HTK. International Journal of Computational Systems Engineering, 1(1), 25-32...