Version-6 (March-April 2014)
Ver-1
Ver-2
Ver-3
Ver-4
Ver-5
6
7
8
9
10
11
12
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multi-Resolution Pruning Based Co-Location Identification In Spatial Data |
Country | : | India |
Authors | : | Sruthi K. Surendran, S. Dhamodaran |
: | 10.9790/0661-16260105 |
Abstract: A co-location spatial pattern is a pattern of multiple groups which co-relates spatial features or events that are frequently located in same zone. Co-location pattern mining emphasizes overall analysis by manipulating the proportion of spatial features and other relevant information's. In this paper we are trying to remove the problem of co-location mining from the large data set. Data is generated from wide range of data sources that are available in geographical space. One method to mine the widely spread co-location is to compute the participation index in measuring the prevalence of the co-location. First option from the above said the measure is closely inter-related to cross function, which often used for measuring the statistical among various pair of spatial features. Second option focused on the property of anti-monotones which can be included for computational perspective efficiency. In this paper, we are trying to incorporate a novel multi-resolution pruning technique to address the problem of mining co-location data pattern with rare spatial features.
Keywords: Spatial colocation,spatially uncertain data set, possible world, probabilistic prevalent colocation(PPCs).
Keywords: Spatial colocation,spatially uncertain data set, possible world, probabilistic prevalent colocation(PPCs).
[1] C.C. Aggarwal et al., "Frequent Pattern Mining with Uncertain Data," Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 29-37, 2009.
[2] P. Agrawal, O. Benjelloun, A. Das Sarma, C. Hayworth, S. Nabar,T. Sugihara, and J. Widom, "Trio: A System for Data, Uncertainty, and Lineage," Proc. Int'l Conf. Very Large Data Bases (VLDB),pp. 1151-1154, 2006.
[3] R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules," Proc. Int'l Conf. Very Large Data Ba ses (VLDB),pp. 487-499, 1994.
[4] C.C. Aggarwal and P.S. Yu, "A Survey of Uncertain Data Algorithms and Applications," IEEE Trans. Knowledge and Data Eng. (TKDE), vol. 21, no. 5, pp. 609-623, May 2009.
[5] C.-K. Chui and B. Kao, "A Decremental Approach for Mining Frequent Itemsets from
[2] P. Agrawal, O. Benjelloun, A. Das Sarma, C. Hayworth, S. Nabar,T. Sugihara, and J. Widom, "Trio: A System for Data, Uncertainty, and Lineage," Proc. Int'l Conf. Very Large Data Bases (VLDB),pp. 1151-1154, 2006.
[3] R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules," Proc. Int'l Conf. Very Large Data Ba ses (VLDB),pp. 487-499, 1994.
[4] C.C. Aggarwal and P.S. Yu, "A Survey of Uncertain Data Algorithms and Applications," IEEE Trans. Knowledge and Data Eng. (TKDE), vol. 21, no. 5, pp. 609-623, May 2009.
[5] C.-K. Chui and B. Kao, "A Decremental Approach for Mining Frequent Itemsets from
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effective and Efficient Method for Web System Performance Forecasting |
Country | : | India |
Authors | : | Shraddha B. Rahane |
: | 10.9790/0661-16260613 |
Abstract: Recent development of Distributed computer systems (DCSs) in networked industrial and manufacturing applications on the World Wide Web (WWW) platform, including service-oriented architecture and Web of Things QoS-aware systems, it has become important to predict the Web performance prediction in time and in space .In this paper, we present Web performance prediction in time by making a forecast of a Web resource downloading using the Turning Bands (TB) geostatistical simulation method. Real-life data for the research were obtained from our own website named "Distributed forecasting system". We generate log file form our website and performing monitoring of a group of Web clients from connected LAN. For better web forecasting we used spatio temporal prediction method with time utility for downloading particular file from website with locations. Also perform comparison study in between spatio temporal method & TB methods. The results show good quality of Web performance prediction using the TB method.
Keyword: Distributed Computer System ,Turning Band,, Qos-Aware Systems, Geostatistics, Spatio-Temporal Prediction.
Keyword: Distributed Computer System ,Turning Band,, Qos-Aware Systems, Geostatistics, Spatio-Temporal Prediction.
[1] A. Kaminska-Chuchmala and A. Wilczynski, ―Application of simulation methods to spatial electric load forecasting,‖ Rynek Energii, vol. 80, no. 1, pp. 2–9, 2009.
[2] A. Kaminska-Chuchmala and A. Wilczynski, ―Spatial electric load forecasting in transmission networks with sequential Gaussian simulation method,‖ Rynek Energii, vol. 92, no. 1, pp. 35–40, 2011.
[3] A. Kaminska-Chuchmala and A. Wilczynski, ―Analysis of different methodological factors on accuracy of spatial electric load forecast performed with turning bands method,‖ Rynek Energii, vol. 87, no. 2, pp. 54–59, 2010
[4] M. Ulieru and S. Grobbelaar, ―Engineering industrial ecosystems in a networked world,‖ in Proc. 5th Int. IEEE Conf. Ind. Informat., Vienna, Austria, Jul. 23–27, 2007, keynote address.
[5] Internet-based Control Systems: Design and Applications, Advances in Industrial Control, S-H. Yang, Ed. London, U.K.: Springer-Verlag, 2011.
[2] A. Kaminska-Chuchmala and A. Wilczynski, ―Spatial electric load forecasting in transmission networks with sequential Gaussian simulation method,‖ Rynek Energii, vol. 92, no. 1, pp. 35–40, 2011.
[3] A. Kaminska-Chuchmala and A. Wilczynski, ―Analysis of different methodological factors on accuracy of spatial electric load forecast performed with turning bands method,‖ Rynek Energii, vol. 87, no. 2, pp. 54–59, 2010
[4] M. Ulieru and S. Grobbelaar, ―Engineering industrial ecosystems in a networked world,‖ in Proc. 5th Int. IEEE Conf. Ind. Informat., Vienna, Austria, Jul. 23–27, 2007, keynote address.
[5] Internet-based Control Systems: Design and Applications, Advances in Industrial Control, S-H. Yang, Ed. London, U.K.: Springer-Verlag, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Educational data mining is an emerging research area where the traditional data mining techniques are applied on Intelligent Tutoring System (ITS) to study the learning pattern of students. This paper conducts a survey on various ITS that are used currently. An agent-based ITS that fosters the use of Self Regulated Learning (SRL) processes mainly concentrates on two questions: (1) How can students be grouped according to their performance and their type of interaction with the system? (2) How do specific learning behaviors of high and low performing students differ, in particular regarding their use of SRL processes ?.The study helps in understanding how data can be mined and how the learners can be grouped into different clusters based on their learning activities.
Index Terms: Educational Data Mining, ITS, SRL, Clustering, Pattern Mining.
Index Terms: Educational Data Mining, ITS, SRL, Clustering, Pattern Mining.
[1] Michell T.M, "Does Machine Learning Work?" AI magazineVol.18,No.3pp 11-20,1997.
[2] http://www.educationaldatamining.org,. Educational Datamining,2008.
[3] VincentA.W.M.M.Aleven,, KennethR.Koedinger "An effective metacognitive strategy: learning by doing and explaining with a computer-based Cognitive Tutor" CognitiveScience, Vol-26,pp147–179, Jan 2002.
[4] Aurthur C Grasser,,ShulanLU,George Tanner Jackson "AutoTutor:A tutor with dialogue in natural language"IEEE Transactions on education,vol. 48, no. 4,pp 612 -618, November 2005.
[5] Aurthur C Grasser, A C Wiemer,"Autotutor : A simulation of a human turor ", Journal of Cognitive Systems Research, pp 35-37, 1999.
[2] http://www.educationaldatamining.org,. Educational Datamining,2008.
[3] VincentA.W.M.M.Aleven,, KennethR.Koedinger "An effective metacognitive strategy: learning by doing and explaining with a computer-based Cognitive Tutor" CognitiveScience, Vol-26,pp147–179, Jan 2002.
[4] Aurthur C Grasser,,ShulanLU,George Tanner Jackson "AutoTutor:A tutor with dialogue in natural language"IEEE Transactions on education,vol. 48, no. 4,pp 612 -618, November 2005.
[5] Aurthur C Grasser, A C Wiemer,"Autotutor : A simulation of a human turor ", Journal of Cognitive Systems Research, pp 35-37, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improving Fault Detection Capability Using Coverage Based Analysis |
Country | : | India |
Authors | : | Sanyogita Chaturvedi, A. Kulothungan |
: | 10.9790/0661-16262230< |
Abstract: A test suite for a system consists of several test cases and as the number of test cases is more, execution of all of these will take much time. If the number of test cases are reduced the execution time could be reduced. Moreover, if the execution of these is done in an ordered fashion ,it is observed to give an increased rate of fault detection. This can further be beneficial by providing feedback to system developers , improving fault fixing activity and thus ,software delivery. The reduction of test cases can be done in several ways. But the scenario is different when functional dependencies exists between some test cases, that is, one test case is needed to be executed before another. In this paper, two test case reduction techniques will be presented which will be followed by using the dependency information from a test suite. The first reduction technique considers all of the test cases while the second one is applied on the rejected suite obtained after implementing the first technique. This work is actually based on the hypothesis that lesser number of test cases will reduce the execution time, provided that the reduced test suite contains cases which collectively will cover the testing of every statement in the source code. Existing dependencies between different tests represent the interaction in the system under test, and hence, execution of complex instructions earlier is supposed to increase the fault detection rate, compared to arbitrary or untreated test orderings. Thus, the dependency information could further be used for prioritization of the test cases.
Keywords: test case reduction, functional dependency, regression testing.
Keywords: test case reduction, functional dependency, regression testing.
[1] J. Bach, "Useful Features of a Test Automation System (Part iii)," Testing Techniques Newsletter, Oct. 1996.
[2] Siripong Roongruangsuwan and Jirapun Daengdej, "Test Case Reduction Methods By Using CBR" Assumption University.
[3] Roger S. Pressman, "Softwae Engineering, A Practitioner's Approach",Fifth Edition.
[4] Barry W. Boehm, "A Spiral Model of Software Development and Enhancement", TRW Defense Systems Group, 1998.
[5] R.W. Floyd, "Algorithm 97: Shortest Path," Comm. ACM, vol. 5, no. 6, p. 345, June 1962.
[2] Siripong Roongruangsuwan and Jirapun Daengdej, "Test Case Reduction Methods By Using CBR" Assumption University.
[3] Roger S. Pressman, "Softwae Engineering, A Practitioner's Approach",Fifth Edition.
[4] Barry W. Boehm, "A Spiral Model of Software Development and Enhancement", TRW Defense Systems Group, 1998.
[5] R.W. Floyd, "Algorithm 97: Shortest Path," Comm. ACM, vol. 5, no. 6, p. 345, June 1962.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This article focuses on the research on the complex processes of joint integration of PDM and ERP systems. The relevance of introducing an integrated system within a single information space is justified. The main challenges of systems integration under a unified automation approach are described, including production planning and better management of production data. To successfully solve such problems ERP system needs to operate a certain amount of reference data, without which the production plan will be ineffective or impossible. Due to the fact that such data is often generated and stored in the product data management systems, it becomes necessary to provide data exchange between ERP and PDM systems. A number of key issues relating to the development and establishment of systems are determined. The functions of ERP and PDM systems that require a creation of an interaction interface between them are allocated and described. In conclusion, the positive trends, achievable through integration are reviewed.
Keywords: integration, Enterprise Resource Planning (ERP), Product Data Management (PDM), Unified Information Space (UIS), Continuous Acquisition and Life-cycle Support (CALS).
Keywords: integration, Enterprise Resource Planning (ERP), Product Data Management (PDM), Unified Information Space (UIS), Continuous Acquisition and Life-cycle Support (CALS).
[1] Yurchik P.F., Golubkova P.F., Gromova K.N., Gusenitsa D.O. Use of automated system on PDM platform to maintain the operability of conference hall equipment.In the World of Scientific Discoveries. 2012. №12.
[2] Yurchik P.F., Gusenitsa D.O., Golubkova P.F. Increasing the efficiency of decision support systems through integration of applied information systems. Automation and Control in Technical Systems. 2013. No 4.1. DOI: 10.12731/2306-1561-2013-4-11.
[3] Goryachev S.A., Saakyan I.E., Makarenko L.F., Mazurenko S.V. The role of electronic document automation in management of the enterprise. Innovative methods of automation of technological processes and production: MADI collection of scientific papers. 2008. pp. 103-107.
[4] Sokol A.A., Zamytskikh P.V. Electronic documents synchronization technology. Flow control methods in transport systems: MADI collection of scientific papers. 2009. pp. 95-98.
[5] Sokol A.A., Zamytskikh P.V. Approaches to modeling of automated document management systems of industrial enterprises. Simulationmodelingofcontrol systems. Moscow. MADI. 2012. pp. 104-106.
[2] Yurchik P.F., Gusenitsa D.O., Golubkova P.F. Increasing the efficiency of decision support systems through integration of applied information systems. Automation and Control in Technical Systems. 2013. No 4.1. DOI: 10.12731/2306-1561-2013-4-11.
[3] Goryachev S.A., Saakyan I.E., Makarenko L.F., Mazurenko S.V. The role of electronic document automation in management of the enterprise. Innovative methods of automation of technological processes and production: MADI collection of scientific papers. 2008. pp. 103-107.
[4] Sokol A.A., Zamytskikh P.V. Electronic documents synchronization technology. Flow control methods in transport systems: MADI collection of scientific papers. 2009. pp. 95-98.
[5] Sokol A.A., Zamytskikh P.V. Approaches to modeling of automated document management systems of industrial enterprises. Simulationmodelingofcontrol systems. Moscow. MADI. 2012. pp. 104-106.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Keywords: Cloud Computing, Cloud Security, Service Provider, SaaS.
Keywords: Cloud Computing, Cloud Security, Service Provider, SaaS.
[1]. Force.com, "The Force.com Multitenant Architecture Understanding the Design of Salesforce.com's Internet Application Development Platform", White paper.
[2]. Qihong Shao "Towards Effective and Intelligent Multi-tenancy SaaS" ,UMI Dissertation publishing, May 2011.
[3]. UNDERSTANDING The Cloud Computing Stack SaaS, Paas, IaaS, © Diversity Limited, 2011 Non-commercial reuse with attribution permitted.
[4]. Volume 2, Issue 1, January 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
[5]. K.H. Bennett et al., "An Architectural Model for Service-Based Software with Ultra Rapid Evolution," Proc.IEEE Int'l Conf. Software Maintenance (ICSM 01),IEEE CS Press, 2001, pp. 292–300.
[2]. Qihong Shao "Towards Effective and Intelligent Multi-tenancy SaaS" ,UMI Dissertation publishing, May 2011.
[3]. UNDERSTANDING The Cloud Computing Stack SaaS, Paas, IaaS, © Diversity Limited, 2011 Non-commercial reuse with attribution permitted.
[4]. Volume 2, Issue 1, January 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
[5]. K.H. Bennett et al., "An Architectural Model for Service-Based Software with Ultra Rapid Evolution," Proc.IEEE Int'l Conf. Software Maintenance (ICSM 01),IEEE CS Press, 2001, pp. 292–300.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Trust Based Secure Payment Scheme for Multi-hop Wireless Networks |
Country | : | India |
Authors | : | Mrs. Chinchu V. S., Ms. Meji Jose |
: | 10.9790/0661-16263843 |
Abstract: In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks. This micro payment scheme enhances the cooperation of nodes and fairness of the network. Each node is assigned a trust value. Based on the trust value, a trust based routing protocol is maintained to route the packet. A report is submitted by each node to a trusted party after the communication. Based on the consistency of the report the payment is cleared. For the fair reports without any processing overhead the payment is cleared. In the case of cheater nodes more cryptographic operations and processing is required to analyze the evidences, which is submitted by each node to the trusted party ,when an inconsistent report is submitted. The report contains the alleged charges for relaying the packets. The RACE performs less cryptographic operation and processing overhead. It uses the micro payment and the overhead cost is much less than the payment value. Moreover, RACE can secure the payment and precisely identify the cheating nodes without false accusations.
Keywords: Payment scheme; selfish nodes; micro payment; multihop networks.
Keywords: Payment scheme; selfish nodes; micro payment; multihop networks.
[1] Mohamed M.E.A, Mahmoud and Xuemin Shen, "A secure payment scheme with low communication and processing overhead for multihop wireless networks," Ieee Transactions On Parallel and Distributed Systems, Vol. 24, No. 2, February 2013
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, "An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications Over Mobile Ad-Hoc Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 192-203, Jan. 2007
[3] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wiley's J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, 319-332, 2006
[4] Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Net-works, vol. 13, no. 5, pp. 663-678, Oct. 2007.
[5] L. Buttyan and J. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, "An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications Over Mobile Ad-Hoc Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 192-203, Jan. 2007
[3] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wiley's J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, 319-332, 2006
[4] Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Net-works, vol. 13, no. 5, pp. 663-678, Oct. 2007.
[5] L. Buttyan and J. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Credit card fraud detection is an important application of outlier detection. Due to drastic increase in digital frauds, there is a loss of billions dollars and therefore various techniques are evolved for fraud detection and applied to diverse business fields. The traditional fraud detection schemes use data analysis methods that require knowledge about different domains such as financial, economics, law and business practices. The current fraud detection techniques may be offline or online, and may use neural networks, clustering, genetic algorithm, decision tree etc. There are various outlier detection techniques are available such as statistical based, density based, clustering based and so on. This paper projected to find credit card fraud by using appropriate outlier detection technique, which is suitable for online applications where large scale data is involved. The method should also work efficiently for applications where memory and computation limitations are present. Here we have discussed one such unsupervised method Principal Component Analysis(PCA) to detect an outlier.
Keywords: Clustering, Fraud detection, Neural Networks, Outlier detection, Principal Component Analysis.
Keywords: Clustering, Fraud detection, Neural Networks, Outlier detection, Principal Component Analysis.
[1] Y Kou, C. Lu, S. Sinvongwattana and Y. Huang, Survey of Fraud Detection Techniques, IEEE International Conference on Networking, Sensing & Control, 21-23(3),2004.
[2] C. Aggarwal, Outlier analysis (Boston/Dordrecht/London, Kluwer Academic).
[3] T. Anh and S. Mägi, Principal Component Analysis, Final Paper in Financial Pricing, 2009.
[4] Y. Lee, Y. Yeh, and Y. Wang, Anomaly Detection via Online Oversampling Principal Component Analysis, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, July 2013.
[5] M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, LOF: Identifying Density-Based Local Outliers, Proc. ACM SIGMOD Int'l Conf. Management of Data, 2000.
[2] C. Aggarwal, Outlier analysis (Boston/Dordrecht/London, Kluwer Academic).
[3] T. Anh and S. Mägi, Principal Component Analysis, Final Paper in Financial Pricing, 2009.
[4] Y. Lee, Y. Yeh, and Y. Wang, Anomaly Detection via Online Oversampling Principal Component Analysis, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, July 2013.
[5] M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, LOF: Identifying Density-Based Local Outliers, Proc. ACM SIGMOD Int'l Conf. Management of Data, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Dumbbell topology evolved as a key topology for a large variety of applications ranging from home networking to transportation systems, campus network and medical systems. TCP is one of the core protocols of the internet protocol suite, reliability is the main constraint for the traffic flows in TCP. Even though congestion control mechanisms are implemented, packet losses are encountered which leads to performance degradation. In this paper, the congestion control algorithms are implemented and corresponding results are analyzed in Dumbbell topology, it is typically used to analyze the TCP traffic flows. Fairness of throughput is evaluated for different TCP variants using network simulator.
Index Terms: Acknowledgement, Congestion Window, Dumbbell Topology, Slow-start Threshold.
Index Terms: Acknowledgement, Congestion Window, Dumbbell Topology, Slow-start Threshold.
[1] Mohith P. Tahilaini "Comparative study of High Speed TCP variants in Multihop Wireless Networks," IJCTE, Vol. 5, No. 5,Oct 2013
[2] I. F. Akylidiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Elsevier, pp. 445-487, January 2005.
[3] T. Kelly, "Scalable TCP: Improving Performance in High Speed Wide Area Networks," ACM SIGCOMM Computer Communication Review, vol. 33, pp. 83-91, 2003.
[4] V. Jacobson, "Congestion avoidance and control," Proceedings of SIGCOMM ‟88, ACM, Stanford, CA, Aug. 1988.
[5] K. Fall and S. Floyd, "Simulation-based comparisons of Tahoe, Reno, and SACK TCP," ACM Computer Communication Review, vol. 26, no. 3, pp. 5-21, 1996.
[2] I. F. Akylidiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Elsevier, pp. 445-487, January 2005.
[3] T. Kelly, "Scalable TCP: Improving Performance in High Speed Wide Area Networks," ACM SIGCOMM Computer Communication Review, vol. 33, pp. 83-91, 2003.
[4] V. Jacobson, "Congestion avoidance and control," Proceedings of SIGCOMM ‟88, ACM, Stanford, CA, Aug. 1988.
[5] K. Fall and S. Floyd, "Simulation-based comparisons of Tahoe, Reno, and SACK TCP," ACM Computer Communication Review, vol. 26, no. 3, pp. 5-21, 1996.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Multi-hop Ad-hoc Networks: A Review |
Country | : | India |
Authors | : | Chander Prabha, Dr. Surender Kumar, Dr. Ravinder Khanna |
: | 10.9790/0661-16265462 |
Abstract: Over the past decade wireless multi-hop ad-hoc networks have received a tremendous amount of research focus. Mobile devices equipped with wireless short range communication technologies make possible new applications for spontaneous communication, interaction and collaboration. The collaboration is used to facilitate communication when mobile devices are not able to establish direct communication paths. So the communication is multi-hop with intermediate nodes acting as routers that forward the messages addressed to other nodes. The concept of multi-hop ad-hoc networking was successfully applied in several classes of networks. This paper reviews the categories of wireless multi-hop ad-hoc networks and discusses main evolutions of wireless multi-hop ad-hoc networks specially the opportunistic networks.
Keywords: Delay tolerant Network, MANET, Mobile Devices, Opportunistic Network, WLAN.
Keywords: Delay tolerant Network, MANET, Mobile Devices, Opportunistic Network, WLAN.
[1] M.Grossglauser and D.N.C.Tse, Mobility increases the capacity of Ad-hoc wireless network, IEEE/ACM Transactions on Networking, Vol. 10, no.4 Aug. 2002.
[2] P.Gupta and R.P Kumar, The Capacity of Wireless Networks, IEEE Transactions on Information Theory, Vol. 46, Mar. 2000, pp. 388-404.
[3] Macro Conti, Silvia Giordano, Multi-hop Ad-hoc networking: The Theory, IEEE Communications Magazine, pp.78-86, April 2007.
[4] Macro Conti, Silvia Giordano, Multi-hop Ad-hoc networking: The Reality, IEEE Communications Magazine, pp. 88-95, April 2007.
[5] IETF Mobile Ad-hoc Networking Group. http://www.ietf.org/html.charters/manet-charter.html.
[2] P.Gupta and R.P Kumar, The Capacity of Wireless Networks, IEEE Transactions on Information Theory, Vol. 46, Mar. 2000, pp. 388-404.
[3] Macro Conti, Silvia Giordano, Multi-hop Ad-hoc networking: The Theory, IEEE Communications Magazine, pp.78-86, April 2007.
[4] Macro Conti, Silvia Giordano, Multi-hop Ad-hoc networking: The Reality, IEEE Communications Magazine, pp. 88-95, April 2007.
[5] IETF Mobile Ad-hoc Networking Group. http://www.ietf.org/html.charters/manet-charter.html.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Quality Perspective and Software Quality Models |
Country | : | India |
Authors | : | Sony Tripathi |
: | 10.9790/0661-16266372 |
Abstract: This paper presents acomprehensive overview ofQuality, definition of quality by different person and alsothis paper present overview on Software Quality Models, McCall's Quality Model, Boehm's Quality Model, Dromey's Quality Model, FURPS Quality Model, ISO 9126 Quality Modeland a comparison among these models are presented.
Keywords: Software Quality Models, McCall model, Dorsey's model, FURPS model, ISO 9126 model.
Keywords: Software Quality Models, McCall model, Dorsey's model, FURPS model, ISO 9126 model.
[1] R. G. Dromey, "A model for software product quality". IEEE Transactions on Software Engineering, 21(2):146– 162, 1995.
[2] Crosby, P. B., Quality is free : the art of making quality certain, New York : McGraw-Hill, 1979.
[3] Feigenbaum, A. V., Total quality control, McGraw-Hill, 1983.
[4] Ishikawa, K., What is total quality control? : the Japanese way, Prentice-Hall, 1985.
[5] Juran, J. M., Juran's Quality Control Handbook, McGraw-Hill, 1988.
[2] Crosby, P. B., Quality is free : the art of making quality certain, New York : McGraw-Hill, 1979.
[3] Feigenbaum, A. V., Total quality control, McGraw-Hill, 1983.
[4] Ishikawa, K., What is total quality control? : the Japanese way, Prentice-Hall, 1985.
[5] Juran, J. M., Juran's Quality Control Handbook, McGraw-Hill, 1988.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Gateless Electronic Toll Collection using RFID |
Country | : | India |
Authors | : | Anish Dhurat, Parag Magal, Manish Chheda, Darshan Ingle |
: | 10.9790/0661-16267380 |
Abstract: An effective and efficient utilization of communication link between RF Modems over a wireless channel to facilitate monitoring, authentication and automated toll collection of vehicles on the highways is proposed in the paper. The system is implemented to automatically register vehicles getting on or off a motorway or highway, shortening the amount of time for paying toll in large queues. This paper also introduces the implementation and design of an active RFID tag based system for automatically identifying running vehicles on roads and collecting their data. The architecture and the basic principles of design of the system are presented; including reading equipment (readers and antennas) and active electronic tag. Finally, the effectiveness and efficiency of the system is analysed as a whole.
Keywords: Gateless Tax Collection, ETC- Electronic Toll Collection, RFID-Radio Frequency Identification, Toll booth, COM-Communication Port.
Keywords: Gateless Tax Collection, ETC- Electronic Toll Collection, RFID-Radio Frequency Identification, Toll booth, COM-Communication Port.
[1] Don, "Electronic Toll Collection: An Introduction and Brief Look at Potential Vulnerabilities," in Sans Institute InfoSec Reading Room, 1.4b ed. 2004.
[2] S.Lauren, B. Mariko (2007, June 20).Electronic Toll Collection [Online]. Available: http://www.atm.com
[3] C.M. Roberts, "Radio Frequency Identification (RFID)," Computers & Security, Elsevier, 2006.
[4] L. Jerry, C. Barbara "Shrouds of Time: The History of RFID", AIM Publication, ver. 1.0, 2001.
[5] M. Ayoub Khan, S. Manoj and R. B. Prahbu "A Survey of RFID Tags", International Journal of Recents Trends in Engineering, vol 1, no 4, May 2009.
[2] S.Lauren, B. Mariko (2007, June 20).Electronic Toll Collection [Online]. Available: http://www.atm.com
[3] C.M. Roberts, "Radio Frequency Identification (RFID)," Computers & Security, Elsevier, 2006.
[4] L. Jerry, C. Barbara "Shrouds of Time: The History of RFID", AIM Publication, ver. 1.0, 2001.
[5] M. Ayoub Khan, S. Manoj and R. B. Prahbu "A Survey of RFID Tags", International Journal of Recents Trends in Engineering, vol 1, no 4, May 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Case Study on Environmental Impact of Cloud Computing |
Country | : | India |
Authors | : | Rajender Kumar Trivedi, Rajani Sharma |
: | 10.9790/0661-16268186 |
Abstract: With ever increasing usage of IT infrastructure around the globe, the increase in energy consumption and carbon emission is a worrisome situation for everyone because of its direct effect on environment. The environment is being dangerously impacted by Information Technology infrastructure extensive use and its waste. Cloud computing has emerged as one step further solution to deploy all virtualized IT resources as per need on self-service basis as a rental method for the users. Different cloud deployment methods have emerged according to the need of users, institutions and communities. In last decade virtualization has been a milestone in enabling optimal usage of information technology resources. Cloud computing has provided a platform for deploying everything as a Service in IT, which has changed the economics of IT based business and organizations from Capital Expenditure to Operational Expenditure. For enabling Cloud services we first need to understand our existing infrastructure. In second step we should be able to virtualize it for optimal usage. Then with the help of existing cloud applications we can deliver and deploy information technology as a resource at various levels such as infrastructure, platform, and software.
Keywords: cloud computing, carbon emission, energy consumption, IT waste, virtualization.
Keywords: cloud computing, carbon emission, energy consumption, IT waste, virtualization.
[1] R. Buyya, High Performance Cluster Computing: Systems and Architectures, Prentice Hall, 1999.
[2] J. Yu and R. Buyya, ―A taxonomy of scientific workflow systems for grid computing,‖ ACM Sigmod Record, vol. 34, no. 3, 2005, pp. 44-49.
[3] M. Almorsy, et al., ―Collaboration-Based Cloud Computing Security Management Framework,‖ Proc. Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 364-371.
[4] A. Behl and K. Behl, ―An analysis of cloud computing security issues,‖ Proc. Information and Communication Technologies (WICT), 2012 World Congress on, pp. 109-114.
[5] R. Buyya, et al., Cloud computing: principles and paradigms, Wiley, USA.
[2] J. Yu and R. Buyya, ―A taxonomy of scientific workflow systems for grid computing,‖ ACM Sigmod Record, vol. 34, no. 3, 2005, pp. 44-49.
[3] M. Almorsy, et al., ―Collaboration-Based Cloud Computing Security Management Framework,‖ Proc. Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 364-371.
[4] A. Behl and K. Behl, ―An analysis of cloud computing security issues,‖ Proc. Information and Communication Technologies (WICT), 2012 World Congress on, pp. 109-114.
[5] R. Buyya, et al., Cloud computing: principles and paradigms, Wiley, USA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Quality standards for a software industry –A review |
Country | : | India |
Authors | : | Monika Yadav, Sanjeev Kumar, Kaushik Kumar |
: | 10.9790/0661-16268794 |
Abstract: In the present era of globalization QUALITY has immerged as the major factor for survival and the organizations are issuing various standards in order to achieve the same. But for any organization pursuing the quality and the subsequently continuously improving the same, the challenge is to select a particular standard. For a software organization the task has become more difficult as majority of the globally existing standards have been set considering the manufacturing sector – the dominant industry in 19th century. The main objective of this paper is to evaluate the available quality standards for the software industry with an intention to describe the strengths and weaknesses of each of them. A particular software organization depending on their specific requirement can select the best possible option amongst these for successful implementation and in the end survival.
Keywords: Capability maturity model, Capability Maturity Model Integration, ISO 9001, ISO 9000-3.
Keywords: Capability maturity model, Capability Maturity Model Integration, ISO 9001, ISO 9000-3.
[1] "ISO 9000-1: 1994", Quality management and quality assurance standards, (Part 1: Guidelines for selection and use, 1994).
[2] "ISO 9001: 1994", Quality systems. Model for quality assurance in design, development, production, installation and servicing, 1994.
[3] "ISO 9002: 1994", Quality systems. Model for quality assurance in production, installation and servicing.
[4] "ISO 9003: 1994", Quality systems. Model for quality assurance in final inspection and test.
[5] "ISO 9004-1: 1994", Quality management and quality system elements. (Part 1: Guidelines, 1994).
[2] "ISO 9001: 1994", Quality systems. Model for quality assurance in design, development, production, installation and servicing, 1994.
[3] "ISO 9002: 1994", Quality systems. Model for quality assurance in production, installation and servicing.
[4] "ISO 9003: 1994", Quality systems. Model for quality assurance in final inspection and test.
[5] "ISO 9004-1: 1994", Quality management and quality system elements. (Part 1: Guidelines, 1994).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Approach to Steadfast and Reliable Resource Scheduling in Cloud Environment |
Country | : | India |
Authors | : | A. Aalan Babu, S. Roselin Mary |
: | 10.9790/0661-162695101 |
Abstract: In cloud computing, resource allocation and scheduling are the necessary requirements which helps the cloud users to access the resources that are available. Applications implemented in the cloud often required to interact amongst themselves and, in case, rarely depend on other implemented applications. Present cloud schedulers do not consider the infrastructure properties of cloud during resource allocation and scheduling process. In this paper, we propose a reliable resource scheduling algorithm that can automatically manage the cloud infrastructure by considering both user requirements and infrastructure properties and policies. A new prototype is presented based on Openstack and it implements the proposed cloud scheduler. Our work specifically focuses on providing the cloud scheduler with trustworthy input that expose the trust status of cloud infrastructure and it also further establish the foundations of planned future work to cover other properties. It further provides an implementation of the past work on trust management of cloud which provides the cloud scheduler with input about the accurate trust status of that cloud infrastructure.
Keywords: Cloud; Resource Scheduling; Cloud Scheduler; Openstack; Trust status.
Keywords: Cloud; Resource Scheduling; Cloud Scheduler; Openstack; Trust status.
[1] Brian Hay, Kara Nance & Matt Bishop, (2011), "Storm Clouds Rising: Security Challenges For IaaS Cloud Computing‟, Proceedings of the Hawaii International Conference on System Sciences.
[2] Frank Doelitzscher, Christian Fischer, Denis Moskal, Christoph Reich, Martin Knahl and Nathan Clarke. (2012) "Validating Cloud Infrastructure Changes By Cloud Audits‟, IEEE Eighth World Congress on Services.
[3] Imad M. Abbadi & Cornelius Namiluko, (2011) "Dynamics of trust in Clouds — Challenges and research agenda‟, 6th International Conference on Internet Technology & Secured Transactions. [4] Imad M. Abbadi, (2011) "Operational Trust in Clouds‟ Environment‟: IEEE Symposium on Computers and Communications (ISCC).
[5] Jemal Abawajy, (2009) "Determining Service Trustworthiness in Intercloud Computing Environments,‟ 10th International symposium on Pervasive Systems, Algorithms & Networks.
[2] Frank Doelitzscher, Christian Fischer, Denis Moskal, Christoph Reich, Martin Knahl and Nathan Clarke. (2012) "Validating Cloud Infrastructure Changes By Cloud Audits‟, IEEE Eighth World Congress on Services.
[3] Imad M. Abbadi & Cornelius Namiluko, (2011) "Dynamics of trust in Clouds — Challenges and research agenda‟, 6th International Conference on Internet Technology & Secured Transactions. [4] Imad M. Abbadi, (2011) "Operational Trust in Clouds‟ Environment‟: IEEE Symposium on Computers and Communications (ISCC).
[5] Jemal Abawajy, (2009) "Determining Service Trustworthiness in Intercloud Computing Environments,‟ 10th International symposium on Pervasive Systems, Algorithms & Networks.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Library Management and Access System Using Bluetooth |
Country | : | India |
Authors | : | SarkarTanvir, Kundu Subhajit |
: | 10.9790/0661-1626102106 |
Abstract: In this project we developed a Bluetooth based library management & access system coded in python programming language.The methodology section describes the design and implementation of the proposed system in details. The system provides a user friendly and convenient way to access any library in a very less hectic manner. It provides user a magnificent platform to navigate through huge stockpile of books in an easy digital format with help of a "client-server protocol" using Bluetooth technology. The system navigates the search of a user for his/ her desired book by categorizing it in three major divisions; i)search by topic ii)search by book iii)search by author, thus making the search a time efficient and convenient one and also supplying the user with the perfect match for his search.
Keywords: Bluetooth, Library Management System, Python, Server Client protocol.
Keywords: Bluetooth, Library Management System, Python, Server Client protocol.
[1] Mainak Samanta, Ankur Bhattacharya, Koushik Ghosh, Ritidrita Dhara, "Bluetooth Based Airport Enquiry System Using Python",
International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013.
[2] Avranil Tah, "A deadline-driven epidemic data collection protocol suitable for tracking interpersonal rendezvous" (January 1,
2010). Collection for University of Texas, El Paso. PaperAAI1483985. http://digitalcommons.utep.edu/dissertations/AAI1483985
[3] Nagadeepa N, "Enhanced Bluetooth Technology to Assist the High Way Vehicle Drivers", Research Journal of Recent Sciences,
ISCA, Vol. 1(8), 82-85, August (2012).
[4] Ronojoy Ghosh, Vivek Shah, Hitesh Agarwal, Ashutosh Bhushan, Prasun Kanti Ghosh, "Intelligent ambulance traffic assistance
system", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 8, 2013.
[5] Naveen Ersala, David C. Yen, "Bluetooth technology: a strategic analysis of its role in global 3G wireless communication era",
Computer Standards & Interfaces 24 (2002) 193 – 206.
International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013.
[2] Avranil Tah, "A deadline-driven epidemic data collection protocol suitable for tracking interpersonal rendezvous" (January 1,
2010). Collection for University of Texas, El Paso. PaperAAI1483985. http://digitalcommons.utep.edu/dissertations/AAI1483985
[3] Nagadeepa N, "Enhanced Bluetooth Technology to Assist the High Way Vehicle Drivers", Research Journal of Recent Sciences,
ISCA, Vol. 1(8), 82-85, August (2012).
[4] Ronojoy Ghosh, Vivek Shah, Hitesh Agarwal, Ashutosh Bhushan, Prasun Kanti Ghosh, "Intelligent ambulance traffic assistance
system", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 8, 2013.
[5] Naveen Ersala, David C. Yen, "Bluetooth technology: a strategic analysis of its role in global 3G wireless communication era",
Computer Standards & Interfaces 24 (2002) 193 – 206.