Volume-7 ~ Issue-5
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey over VANET Routing Protocols for Vehicle to Vehicle Communication |
Country | : | Bangladesh |
Authors | : | Bijan Paul, Mohammed J. Islam |
: | 10.9790/0661-0750109 | |
Keywords: Proactive, Reactive, Routing Protocol, VANET, MANET.
Websites
[1] Ericson, "Communication and Mobility by Cellular Advanced Radio", ComCar project, www.comcar.de,2002.
[2] Online, http://www.ist-drive.org/index2.html.
Thesis Papers
[3] W. Franz, H. Hartenstein, and M. Mauve, Eds., Inter-Vehicle-Communications Based on Ad Hoc Networking Principles-The Fleet
Net Project. Karlshue, Germany: Universitatverlag Karlsuhe, November 2005.
[4] Forderer, D (2005). "Street-Topology Based Routing." Master's thesis, University of Mannheim, May 2005.
[5] Rainer Baumann, "Vehicular Ad hoc Networks", Master's Thesis in Computer Science, ETH Zurich (2004).
Workshop Papers
[6] Festag, et. al., "NoW-Network on Wheels: Project Objectives, Technology and Achievements", Proceedings of 6th International
Workshop on Intelligent Transportations (WIT), Hamburg, Germany, March 2008.
[7] Lochert, C., Hartenstein, H., Tian, J., Fussler, H., Hermann, D., Mauve, M. (2003), "A routing strategy for vehicular ad hoc
networks in city environments," Intelligent Vehicles Symposium, 2003. Proceedings. IEEE, vol., no., pp. 156-161, 9-11 June 2003.
[8] O. K. Tonguz, N. Wisitpongphan, F. Bai, P. Mudalige and V. Sadekar, "Broadcasting in VANET", Proc. IEEE INFOCOM MOVE
Workshop 2007, Anchorage, USA, (2007).
Journal Papers
[9] Perkins, C.; Belding-Royer, E.; Das, S. (July 2003)"Adhoc On-Demand Distance Vector (AODV) Routing".
[10] Johnson, D. B. and Maltz, D. A. (1996), "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, T.
Imielinski and H. Korth, Eds., Ch. 5, Kluwer, 1996, pp. 153–81.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Media Independent Handover (MIH), unmanned aerial vehicles(UAVs),disaster detection, handover.
[1] Rong Jyh Kang, Hsung-Pin Chang, Ruei-Chuan Chang: A seamless Vertical Handoff Scheme. Proceedings on First International
Conference on Wireless Internet. 0-7695-2382-X (2005).
[2] Witayangkurn, M. Nagai,K. Honda,M. Dailey and R. Shibasaki Real-time monitoring system using unmanned aerialvehicle
integrated with sensor observation service",Remote Sensing and Spatial Information Sciences, Vol. XXXVIII -1/C22 UAV-g 2011.
[3] Felipe A. Cruz-Perez, Arturo Seguin-Jimenez, Lauro Ortigoza-Guerrero: Effects of Handoff Margins and Shadowing on the
Residence Time in Cellular Systems with Link Adaptation. 0-7803-521-7/04.IEEE (2004).
[4] Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Kuan Tsai, Sheng-Wen Lai, Chun-Po Chen: The Design and
Implementation of IEEE 802.21and Its Application on Wireless IEEE (2010).
[5] White (2004) Paper on Emergency Communications prepared by the Space & Advanced Communications Research Institute
(SACRI) George Washington University 2006.
[6] IEEE P802.21/D14.0 Media Independent Handover Services, Sept 2008.
[7] Aiswaria Ramachandran, Baliji Haiharan,"Collaborative Mobile Device based Data Collection and Dissemination using MIH for
Effective Emergency Management".
[8] Woochul Kang, Krasimira Kapitanova, "RDDS: A Real-Time Data Distribution Service for Cyber Physical Systems".
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Failure detector, P2P storage, availability, Failure Recovery.
[1] CleversafeInc.,http://www.cleversafe.org/dispersed-storage,2011.
[2] Wuala, Peer-to-peer storage system, http://wua.la/en/home.html, 2010.
[3] R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G.M. Voelker,"Total Recall: System Support for Automated Availability
Management," Proc. Symp. Networked Systems Design and Implementation (NSDI '04), 2004.
[4] C. Blake and R. Rodrigues, "High Availability,Scalable Storage,Dynamic Peer Networks: Pick Two," Proc. Ninth Workshop Hot
Topicsin Operating Systems (HotOS '03), 2003.
[5] R.Koo and S. Toueg, "Checkpointing and Rollback-Recovery for Distributed Systems," IEEE Trans. Software Eng., vol. 13, no. 1,
pp 23-31, Jan. 1987.
[6] D. Manivannan and M. Singhal, "A Low-Overhead Recovery Technique Using Quasi Synchronous Check pointing," Proc. IEEE
Int'l Conf. Distributed Computing Systems, pp. 100-107, 1996.
[7] J.C. Laprie, A. Avizienis, and H. Kopetz. Dependability: Basic Concepts and Terminology. Springer-Verlag New York, Inc.
Secaucus, NJ, USA, 1992.
[8] D.N. Tran, F. Chiang, and J. Li, "Friendstore: Cooperative Online Backup Using Trusted Nodes," Proc. First Workshop Social.
Network Systems (SocialNets '08), 2008.
[9] H. Weatherspoon, B.G. Chun, C. So, and J. Kubiatowicz, "Long-Term Data Maintenance in Wide-Area Storage Systems: A
Quantitative Approach," Computer, 2005.
[10] Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage Zhi Yang, Jing Tian, Ben Y. Zhao, Wei Chen,
and Yafei Dai, Member, IEEE Transaction on parallel and distributed systems, VOL. 22, NO. 9, Sep 2011
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Natural Language Processing; Machine Learning, Medical abstracts, semantic relations
[1] Rindflesch,T. EDGAR: extraction of drugs, genes and relations from the biomedical literature.
[2] Asma Ben Abacha, Pierre Zweigenbaum Automatic extraction of semantic relations between medical entities: a rule based
approach
[3] Anna Divoli and Teresa K. Attwood BioIE: extracting informative sentences from the biomedical literature
[4] Alan R. Aronson Effective Mapping of Biomedical Text to the UMLS Metathesaurus: The MetaMap
[5] Rindflesch TC and Aronson AR. Ambiguity Resolution while Mapping Free Text to the UMLS Metathesaurus
[6] McCray AT, Srinivasan S and Browne AC. Lexical methods for managing variation in biomedical terminologies.
[7] Lee CH, Khoo C, Na JC: Automatic identification of treatment relations for medical ontology learning: An exploratory study.
[8] Ben Abacha A, Zweigenbaum P: Medical Entity Recognition: A Comparison of Semantic and Statistical Methods.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Assessment of Different Classification Techniques for Intrusion Detection |
Country | : | India |
Authors | : | G. Kalyani , A. Jaya Lakshmi |
: | 10.9790/0661-0752529 | |
Keywords: Intrusion detection, Classification, Machine Learning, WEKA , j48,PART.
[1] http://nsl.cs.unb.ca/NSL-KDD/KDDTrain+_20Percent.arff
[2] Richard Power. 1999 CSI/FBI computer crime and security survey. Computer Security Journal Volume XV (2), 1999
[3] Jian Pei Shambhu J. Upadhyaya Faisal Farooq Venugopal Govindaraju. Proceedings of the 20th International Conference on Data
Engineering (ICDE‟04) 1063-6382/04 $ 20.00 © 2004 IEEE
[4] Debar, H., Dacier, M., and Wespi, A., A Revised taxonomy for intrusion detection systems, Annales des Telecommunications, Vol.
55, No. 7–8, 361–378, 2000.
[5] Bace, R. (2000). Intrusion Detection. Macmillan Technical Publishing
[6] Markou, M. and Singh, S., Novelty Detection: A review, Part 1: Statistical Approaches, Signal Processing, 8(12), 2003, pp. 2481-
2497.
[7] WEKA at http://www.cs.waikato.ac.nz/~ml/weka
[8] Http://en.wikipedia.org/wiki/C4.5_algorithm
[9] Http://www.saedsayad.com/oner.html
[10] S.Vijayarani, M.Divya " An efficient algorithm for Generating classification rules".International Journal of Computer Science &
Technology issue4 october- December 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evaluation of Token Based Mutual Exclusion Algorithms In Distributed Systems |
Country | : | India |
Authors | : | Ami Patel, Sanjay Patel |
: | 10.9790/0661-0753034 | |
Keywords: Critical Section, Inverted Tree Structure, Logical Ring, Mutual Exclusion, Token
[1] W. Stallings, "Operating Systems Internals and Design Principles", Prentice Hall, pp.205-261(2009).
[2] M.G.Velaquez, "A Survey Of Distributed Mutual Exclusion Algorithms", Technical Report CS. Colarido State University,
September 1993.
[3] Ichiro Suzuki and Tadao Kasami, "A Distributed Mutual Exclusion Algorithm", ACM Transactions on Computer Systems, Vol. 3,
No. 4, pp. 344-349, November 1985.
[4] Kerry Raymond, "A Tree-Based Algorithm for Distributed Mutual Exclusion", ACM Transactions on Computer Systems, Vol. 7,
No. 1, pp. 61-77, February 1989.
[5] Mohamed NAIMI, Michel TREHEL, André ARNOLD, "A LOG (N) Distributed Mutual Exclusion Based On The Path
Reversal", Journal Of Parallel And Distributed Computing, 34(1), pp. 1-13, April 1996.
[6] J. Sopena, L. Arantes, M. Bertier and Pierre Sens, "A Fault-tolerant Token based Mutual Exclusion Algorithm Using A Dynamic
Tree", 2005
[7] Sandipan Basu, "Token Ring Algorithm To Achieve Mutual Exclusion In Distributed System – A Centralized Approach", IJCSI
International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011.
[8] Sujata Banerjee and Panos K. Chrysanthis, "A New Token Passing Distributed Mutual Exclusion Algorithm", In Proceedings of the
Intl. Conf. on Distributed Computing Systems (ICDCS), 1996.
[9] Sukendu Kanrar and Nabendu Chaki, "FAPP: A New Fairness Algorithm for Priority Process Mutual Exclusion in Distributed
Systems", Journal Of Networks, VOL. 5, NO. 1, January 2010.
[10] Ousmane THIARE, "Several Several Tokens Distributed Mutual Exclusion Algorithm in a Logical Ring Network", 2009
international Conference on Machine Learning and Computing IPCSIT vol. 3, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Age Group Estimation Using Face Angle |
Country | : | India |
Authors | : | Ranjan Jana, Harekrishna Pal, Amrita Roy Chowdhury |
: | 10.9790/0661-0753539 | |
Keywords: Age estimation, Eyeball detection, Face angle, Face triangle, Mouth point detection
[1] Y.H.Kwno and N.daVitoria Lobo, "Age Classification from Facial Images," Computer Vision and Image Understanding, vol.74,
no.1, pp.1-21, 1999.
[2] N.Ramanathan and R. Chellappa, "Face verification across age progression," in Proc. IEEE Conf. Computer Vision and Pattern
Recognition, San Diego, CA, 2005, vol.2, pp.462-469.
[3] P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman. Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):711–720, July 1997.
[4] M. A. Turk and A. P. Pentland. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1): 71–86, 1991.
[5] V. Blanz and T. Vetter. Face recognition based on fitting a 3D morphable model. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 25(9):1063 –1074, September 2003.
[6] R. Kimmel A. M. Bronstein, M. M. Bronstein. Three-dimensional face recognition. Intl. Journal of Computer Vision, 64(1):5–30,
August 2005.
[7] B.D., Zarit, B.J., Super, AND F.K.H. Quek, "Comparison of five color models in skin pixel classification". In Int. Workshop on
Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems, pages 58-63, Corfu, Greece, Sept. 1999.
[8] R.L., Hsu, M., Abdel-Mottaleb, and A.K.Jain, "Face detection in color images". IEEE Trans. on Pattern Analysis and Machine
Intelligence, 24(5):696-706, May 2002.
[9] A.Lanitis and C.J.Taylor, "Towards Automatic Face Identification Robust to Ageing Variation," IEEE Trans. on Pattern Analysis
and Machine Intelligence, vol.24, no.24, p.442-455, 2002.
[10] A.Lanitis, C.Draganova, and C.Christodoulou, "Comparing different classifiers for automatic age estimation," IEEE
Trans.Syst.Man, Cybern.B, Cybern, vol34, no.1, pp.621-628, Feb.2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Customized Mechanism to Detect, Monitor and Block Data Packets Selectively |
Country | : | India |
Authors | : | Anjamma Nomula , Dr.R.V.Krishnaiah |
: | 10.9790/0661-0754044 | |
Keywords: data packets, packet sniffers, intrusion detection, firewall, data stream
[1] The New Lexicon Webster's Encyclopedic Dictionary of the English Language. New York: Lexicon.
[2] Associating Network Flows with User and Application Information, Ralf Ackerman, UtzRoedig, Michael
Zink, Carsten Griwodz , Ralf Steinmetz, ACM Multimedia Workshop, 2000, Marina Del Rey CA USA
[3] Detecting Intruders on a Campus Network: Might the Threat Be Coming From Within? Rich Henders,
Bill Opdyke, SIGUCCS'05, November 6–9, 2005, Monterey, California, USA
[4] A Taxonomy of free network sniffers for teaching and Research, Victor A Clincy and Nael Abu-
Halaweh, JCSC 21, 1(October 2005), Midwestern Conference, Consortium for Computing Sciences in
Colleges
[5] A History and Survey of Network Firewalls, Kenneth Ingham, Stephanie Forrest,The University of New
Mexico Computer Science Department Technical Report 2002-3
[6] Evolution of the Firewall Industry, Cisco Documentation, Network Security
[7] While Paper, Firewall Software and Internet Security, 2002 Vicomsoft Ltd
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Text Classification Method for Data Cleaning |
Country | : | India |
Authors | : | L.Gomathi, R.Pushpa priya |
: | 10.9790/0661-0754554 | |
Keywords: Classification, Clustering, Naïve Bayes, Support, Training Data Cleaning
Journal Papers:
[1] H. H. Malik, J. R. Kender, D. Fradkin, and F. Moerchen. Hierarchical document clustering using local patterns. Data
Min. Knowl. Discov., 21:153–185, July 2010.
[2] F. Sebastiani and C. N. D. Ricerche. Machine learning in automated text categorization. ACM Computing Surveys,
34:1–47, 2002.
[3] Journal Article: Text Classification using Artificial Intelligence, S. M. Kamruzzaman
[4] Conference Proceeding: QUILT: Implementing a Large-scale Cross-language Text Retrieval System., Mark W. Davis, William C.
Ogden
Books:
[5] S. Abney, R. E. Schapire, and Y. Singer. Boosting applied to tagging and pp attachment. In Proceedings of the Joint SIGDAT
Conference on Empirical Methods in Natural Language Processing and Very Large Corpora, pages 38–45, 1999.
[6] V. Bhardwaj, R. J. Passonneau, A. Salleb-Aouissi, and N. Ide. Anveshan: A framework for
[7] analysis of multiple annotators‟ labeling behavior. 2010.
[8] G. Cong, W. S. Lee, H. Wu, and B. Liu. Semi-supervised text classification using partitioned em. In 11 th Int. Conference on
Database Systems for Advanced Applications (DASFAA, page 482493, 2004.
[ 9 ] A. Esuli and F. Sebastiani. Training data cleaning for text classification. In Proceedings of the 2nd International
Conference on Theory of Information Retrieval: Advances in Information Retrieval Theory, ICTIR ‟09, pages 29–41, Berlin,
Heidelberg, 2009. Springer-Verlag.
[10] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.- J. Lin. LIBLINEAR: a library for large linear classification. Journal
of Machine Learning Research, 9:1871–1874, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Transaction Security Using Input Based Shared Key Cryptography |
Country | : | India |
Authors | : | Mayank Swarnkar, Shivani Singh, Dr. Shekhar Verma |
: | 10.9790/0661-0755560 | |
Keywords: transactions, Shared key Cryptography, Wireless Network, Security.
[1] Ziyad Tariq Abdul-Mehdi FIST-MMU Ali Bin Mamat& Hamidah Ibrahim
FSKTM-UPM Mustafa. M.Dirs FITM," MULTI-CHECK-OUT TIMESTAMP ORDER TECHNIQUE (MCTO) FOR PLANNED
DISCONNECTIONS IN MOBILE DATABASE",2006.
[2] Margaret H. Dunham a,_, Abdelsalam Helal b,__ and Santosh Balakrishnan c a Department of Computer Science and Engineering
Southern Methodist University, Dallas, "A mobile transaction model that captures both the data and movement behaviour",1997
[3] Ziyad.T.Abdul-Mehdi , Ramlan Mahmod, "Security Management Model for Mobile Databases Transaction Management",2008
[4] [1] Forouzan. B. 2007. "Data Communications and Networking", Fourth edition, Mc Graw Hill, Singapore, ISBN 007 - 125442-0.
[5] Lubinski. A. 1999. "Adaptation Concepts for Mobile Database Security" University of Rostock,
Rostock, Germany.
[6] Abdul-Mehdi, Z.T. Mamat, A.B. Ibrahim, H. Dirs, Mustafa.M. 2006."Multi-Check-Out Timestamp Order Technique (MCTO) for
Planned Disconnections in Mobile Database", The 2nd IEEE International Conference on Information & Communication
Technologies: from Theory to Applications , 24-28 April, Damascus, Syria,Vol.1, p.p 491-498.
[7] Abdul-Mehdi.Z.T, Mamat.A, Ibrahim.H and Deris.M. 2006. "Transaction Management ModelFor Mobile Databases". PhD Thesis
in Computer Science, Faculty of Computer Science and Information Technology, University Putra Malaysia, P.P.3.
- Citation
- Abstract
- Reference
- Full PDF
Keywords:WSN, BFA, LEACH, routing protocol, cluster head election.
1] D. Stephens and J. Krebs, Foraging Theory. Princeton, NJ: Princeton Univ.Press, 1986.
[2] W. O'Brien, H. Browman, and B. Evans, "Search strategies of foraging animals,"Amer. Scientist, vol. 78, pp. 152-160, Mar./Apr.
1990.
[3] Giuseppe Anastasi, Marco Conti, Mario Di Francesco, Andrea Passarella, "Energy Conservation in Wireless Sensor networks: A
Survey", Ad Hoc Networks 7 (2009) 537-568
[4] I. Banerjee, H. Rahaman, B. Sikdar, "UDDN: Unidirectional Data Dissemination via Negotiation", IEEE International Conference
on Information Networking 2008,23-25 January, Pusan, Korea.
[5] Christopher Ho, Katia Obraczka, Gene Tsudik, and Kumar Viswanath, "Flooding for reliable multicast in multi-hop ad hoc
networks", In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and
Communications (DIAL-M'99), 1999, pp. 64–71.
[6] Ming Liu, Jiannong Cao, Guihai Chen, and Xiaomin Wang, "An Energy-Aware Routing Protocol in Wireless Sensor Networks",
Sensors 2009, vol. 9, pp. 445-462.
[7] Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera, and Cláudia Jacy Barenco Abbas, "Routing
Protocol in Wireless Sensor Networks", Sensors 2009, vol. 9, pp. 8399- 8421.
[8] E. Zanaj, M. Baldi, and F. Chiaraluce, "Efficiency of the Gossip Algorithm for Wireless Sensor Networks", In Proceedings of the
15th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split–Dubrovnik, Croatia,
September, 2007.
[9] Kelvin.M.Passino " Biomimicry of bacterial foraging for distributed and optimization control".IEEE control system magazine.2002.