Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of related distributive applications to mobile entertainment. VANETs are self-organized networks built up from moving vehicles, and are part of the broader class of MANETs. Because of these peculiar characteristics, VANETs require new networking techniques, whose feasibility and performance are usually tested by means of simulation. In order to meet performance goals, it is widely agreed that VANETs must rely heavily on node-to-node communication. In VANET, each vehicle acts as a node and communicates with other vehicles within the range or communicates with base stations. The main idea is to deploy a wireless communication network that has a capability of sending and receiving messages between transmitter and mobile devices in the particular network. Results can be shown using an effective VEINS Simulator. This Simulator can produce detailed vehicular movement traces and can simulate different traffic conditions through fully customizable scenarios. The Framework is expected to be employed using such simulator that makes use of traffic modulator, network simulator and coupling module that integrates the traffic and network.
One of the most important design problems for multi-UAV (Unmanned Air Vehicle) systems is the communication which is crucial for cooperation and collaboration between the UAVs. If all UAVs are directly connected to an infrastructure, such as a ground base or a satellite, the communication between UAVs can be realized through the in-frastructure. However, this infrastructure based communication architecture restricts the capabilities of the multi-UAV systems. Ad-hoc networking between UAVs can solve the problems arising from a fully infrastructure based UAV networks. In this paper, Flying Ad-Hoc Networks (FANETs) are surveyed which is an ad hoc network connecting the UAVs. The differences between FANETs, MANETs (Mobile Ad-hoc Networks) and VANETs (Vehicle Ad-Hoc Networks) are clarified first, and then the main FANET design challenges are introduced. Along with the existing MANET protocols, open research issues are also discussed.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of related distributive applications to mobile entertainment. VANETs are self-organized networks built up from moving vehicles, and are part of the broader class of MANETs. Because of these peculiar characteristics, VANETs require new networking techniques, whose feasibility and performance are usually tested by means of simulation. In order to meet performance goals, it is widely agreed that VANETs must rely heavily on node-to-node communication. In VANET, each vehicle acts as a node and communicates with other vehicles within the range or communicates with base stations. The main idea is to deploy a wireless communication network that has a capability of sending and receiving messages between transmitter and mobile devices in the particular network. Results can be shown using an effective VEINS Simulator. This Simulator can produce detailed vehicular movement traces and can simulate different traffic conditions through fully customizable scenarios. The Framework is expected to be employed using such simulator that makes use of traffic modulator, network simulator and coupling module that integrates the traffic and network.
One of the most important design problems for multi-UAV (Unmanned Air Vehicle) systems is the communication which is crucial for cooperation and collaboration between the UAVs. If all UAVs are directly connected to an infrastructure, such as a ground base or a satellite, the communication between UAVs can be realized through the in-frastructure. However, this infrastructure based communication architecture restricts the capabilities of the multi-UAV systems. Ad-hoc networking between UAVs can solve the problems arising from a fully infrastructure based UAV networks. In this paper, Flying Ad-Hoc Networks (FANETs) are surveyed which is an ad hoc network connecting the UAVs. The differences between FANETs, MANETs (Mobile Ad-hoc Networks) and VANETs (Vehicle Ad-Hoc Networks) are clarified first, and then the main FANET design challenges are introduced. Along with the existing MANET protocols, open research issues are also discussed.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Predictive Data Dissemination in VanetDhruvMarothi
The vehicle itself is an information source that produces a large amount of various information including actual vehicle and environment sensors. The implementation of an efficient and scalable model for information dissemination in VANETs possesses major issues. In this dynamic environment, an ever-growing number of context dissemination messages are leveling up the usage of the channel which affects the network performance. This presentation tries to analyze and assess the key ideas of how to overcome the context data dissemination and how to reduce the amounts of transferred and stored data in a vehicular cooperation environment. This is one of the most prominent topics of pervasive computing.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
VANET Clustering for Protected and Steady Network
Mukesh Bathre1, Alok Sahelay2
Abstract— Vehicular on demand ad-hoc network (VANET) is understood as a necessary issue of good Transportation systems. The key advantage of VANET communication is looked in dynamic protection systems, that objective to improve security of travelers by exchanging caution messages between vehicles. Alternative applications and private services also are allowed so as to lower management expenses and to market VANET exploitation. To effectively established VANET, security is one amongst key challenges that has got to be tackled. Another vital concern is measurability could be a serious issue for a network designer a way to maintain stable communication and services in VANET. Extraordinarily dynamic atmosphere of VANETs looks it troublesome. This paper introduced an automatic reliability management method for VANETs that uses machine learning to categories nodes as malicious. Cluster creation is one effective method for the measurability drawback. Here conjointly given associate entropy-based WCA (EWCA) cluster maintained method which may handle the steady of the automobile network.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
VCN is Vehicular Cloud Network which is the combination of VANET and cloud. Vehicular ad hoc networks (VANETs) technology has been used in many of the applications such as avoiding traffic jam on roadways and airways, preventing the vehicles from accidents and so on. It serve as one of the best platform to meet with group-oriented services which comes under one of the primary application classes. Multicast routing is used to support such services. In such cases one must have to ensure better packet delivery ratio, lower delays and reduced control overheads. Thus, there is a need to design stable and reliable multicast routing protocols for VANETs. In this paper, we proposed a Receiver Based Multicast Routing Protocol that finds a best way to perform the multicast traffic. RBMulticast stores destination list inside the packet header, this destination list provides information on all multicast members to which this packet is targeted .And it stores the traced information or data in the cloud for given period of time. Thus, the multicast tree is not required for this process and therefore no tree state stored at the intermediate nodes.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
Abstract: Distributed computing is a situated of IT administrations that are given to a client more than a system on a rented premise and with the capacity to scale up or down their administration necessities. Generally cloud registering administrations are conveyed by an outsider supplier who possesses the foundation. It favorable circumstances to specify yet a couple incorporate versatility, strength, adaptability, productivity and outsourcing non-center exercises. Distributed computing offers an imaginative plan of action for associations to receive IT benefits without forthright speculation. Notwithstanding the potential increases accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the significant issues which hamper the development of cloud. The thought of giving over vital information to another organization is troubling; such that the shoppers should be cautious in comprehension the dangers of information breaks in this new environment. This paper presents a point by point examination of the distributed computing security issues furthermore, difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.Keywords: Cloud Computing, Scalability, Infrastructure, IT.
Title: Cloud Computing Security Issues and Challenges
Author: Nishant Katiyar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: With development of the information technology, the scale of data is increasing quickly. The massive data poses a great challenge for data processing and classification. In order to classify the data, there were several algorithm proposed to efficiently cluster the data. One among that is the random forest algorithm, which is used for the feature subset selection. The feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. It is achieved by classifying the given data. The efficiency is calculated based on the time required to find a subset of features, the effectiveness is related to the quality of the subset of features. The existing system deals with fast clustering based feature selection algorithm, which is proven to be powerful, but when the size of the dataset increases rapidly, the current algorithm is found to be less efficient as the clustering of datasets takes quiet more number of time. Hence the new method of implementation is proposed in this project to efficiently cluster the data and persist on the back-end database accordingly to reduce the time. It is achieved by scalable random forest algorithm. The Scalable random forest is implemented using Map Reduce Programming (An implementation of Big Data) to efficiently cluster the data. In works on two phases, the first step deals with the gathering the datasets and persisting on the datastore and the second step deals with the clustering and classification of data. This process is completely implemented using Google App Engine’s hadoop platform, which is a widely used open-source implementation of Google's distributed file system using MapReduce framework for scalable distributed computing or cloud computing. MapReduce programming model provides an efficient framework for processing large datasets in an extremely parallel mining. And it comes to being the most popular parallel model for data processing in cloud computing platform. However, designing the traditional machine learning algorithms with MapReduce programming framework is very necessary in dealing with massive datasets.Keywords: Data mining, Hadoop, Map Reduce, Clustering Tree.
Title: Big Data on Implementation of Many to Many Clustering
Author: Ravi. R, Michael. G
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: Traditional approaches for document classification need data which is labelled for the construction reliable classifiers which are even accurate. Unfortunately, data which is already labelled are rarely available, and often too costly to obtain. For the given learning task for which data which is trained is unavailable, abundant labelled data may be there for a different and related domain. One would like to use the related labelled data as auxiliary information to accomplish the classification task in the target domain. Recently, the paradigm of transfer learning has been introduced to enable effective learning strategies when auxiliary data obey a different probability distribution. A co-clustering based classification algorithm has been previously proposed to tackle cross-domain text classification. In this work, we extend the idea underlying this approach by making the latent semantic relationship between the two domains explicit. This goal is achieved with the use of Wikipedia. As a result, the pathway that allows propagating labels between the two domains not only captures common words, but also semantic concepts based on the content of documents. We empirically demonstrate the efficacy of our semantic-based approach to cross-domain classification using a variety of real data.Keywords: Classification, Clustering, Cross-domain Text Classification, Co-clustering, Labelled data, Traditional Approaches.
Title: Co-Clustering For Cross-Domain Text Classification
Author: Rayala Venkat, Mahanthi Kasaragadda
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
Abstract: Ramanujan’s lost notebook contains many results on mock theta functions. In particular, the lost notebook contains eight identities for tenth order mock theta functions. Previously many authors proved the first six of Ramanujan’s tenth order mock theta function identities. It is the purpose of this paper to prove the seventh and eighth identities of Ramanujan’s tenth order mock theta function identities which are expressed by mock theta functions and also a definite integral. The properties of modular forms are used for the proofs of theta function identities and L. J. Mordell’s transformation formula for the definite integral.Keywords: Mock Theta Functions from Ramanujan’s Lost Notebook.
Title: Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Author: MOHAMMADI BEGUM JEELANI SHAIKH
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Using ψ-Operator to Formulate a New Definition of Local Functionpaperpublications3
Abstract:In this paper, we use ψ-operator in order to get a new version of local function. The concepts of maps, dense, resolvable and Housdorff have been investigated in this paper, as well as modified to be useful in general الخلاصة: استخدمنافيهذاالبحثالعمليةابسايمنأجلالحصولعلىنسخهجديدهمنالدالةالمحلية.وقدتمالتحقيقفيمفاهيمالدوال, الكثافة,المجموعاتالقابلةللحلوفضاءالهاوسدورف,وكذلكتعديلهالتكونمفيدةبشكلعام. Keywords:ψ-operator, dense, resolvable and Housdorff.
Title:Using ψ-Operator to Formulate a New Definition of Local Function
Author:Dr.Luay A.A.AL-Swidi, Dr.Asaad M.A.AL-Hosainy, Reyam Q.M.AL-Feehan
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Applying Agile Methodologies on Large Software Projectspaperpublications3
Abstract: Agile is suitable for Small projects as contrasted with the large projects. There is some problem in the execution of large projects. Large Projects are not easy to execute. When we use agile methodologies, Large projects are very difficult to implement. To construct a product framework by utilizing agile methodologies we found that the large projects need more practices as compare them with Small projects.
In this paper, I will present an arrangement of latest and changed development practices, which will help in building up a large project. The Agile Framework for Large Projects (AFLP) was connected to four industry cases. The AFLP gives a structured approach to programming associations to adopt agile practices and evaluate the outcomes. The system incorporates an extended Scrum procedure and agile practices, which consist of agility and critical success factors in agile software projects under that chosen from the XP, Scrum and Crystal Clear.Keywords: Agile Methods (Scrum), Large Software Projects, Industrial Case Study.
Title: Applying Agile Methodologies on Large Software Projects
Author: Nida Rashid
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Predictive Data Dissemination in VanetDhruvMarothi
The vehicle itself is an information source that produces a large amount of various information including actual vehicle and environment sensors. The implementation of an efficient and scalable model for information dissemination in VANETs possesses major issues. In this dynamic environment, an ever-growing number of context dissemination messages are leveling up the usage of the channel which affects the network performance. This presentation tries to analyze and assess the key ideas of how to overcome the context data dissemination and how to reduce the amounts of transferred and stored data in a vehicular cooperation environment. This is one of the most prominent topics of pervasive computing.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
VANET Clustering for Protected and Steady Network
Mukesh Bathre1, Alok Sahelay2
Abstract— Vehicular on demand ad-hoc network (VANET) is understood as a necessary issue of good Transportation systems. The key advantage of VANET communication is looked in dynamic protection systems, that objective to improve security of travelers by exchanging caution messages between vehicles. Alternative applications and private services also are allowed so as to lower management expenses and to market VANET exploitation. To effectively established VANET, security is one amongst key challenges that has got to be tackled. Another vital concern is measurability could be a serious issue for a network designer a way to maintain stable communication and services in VANET. Extraordinarily dynamic atmosphere of VANETs looks it troublesome. This paper introduced an automatic reliability management method for VANETs that uses machine learning to categories nodes as malicious. Cluster creation is one effective method for the measurability drawback. Here conjointly given associate entropy-based WCA (EWCA) cluster maintained method which may handle the steady of the automobile network.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...IJLT EMAS
VCN is Vehicular Cloud Network which is the combination of VANET and cloud. Vehicular ad hoc networks (VANETs) technology has been used in many of the applications such as avoiding traffic jam on roadways and airways, preventing the vehicles from accidents and so on. It serve as one of the best platform to meet with group-oriented services which comes under one of the primary application classes. Multicast routing is used to support such services. In such cases one must have to ensure better packet delivery ratio, lower delays and reduced control overheads. Thus, there is a need to design stable and reliable multicast routing protocols for VANETs. In this paper, we proposed a Receiver Based Multicast Routing Protocol that finds a best way to perform the multicast traffic. RBMulticast stores destination list inside the packet header, this destination list provides information on all multicast members to which this packet is targeted .And it stores the traced information or data in the cloud for given period of time. Thus, the multicast tree is not required for this process and therefore no tree state stored at the intermediate nodes.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
Abstract: Distributed computing is a situated of IT administrations that are given to a client more than a system on a rented premise and with the capacity to scale up or down their administration necessities. Generally cloud registering administrations are conveyed by an outsider supplier who possesses the foundation. It favorable circumstances to specify yet a couple incorporate versatility, strength, adaptability, productivity and outsourcing non-center exercises. Distributed computing offers an imaginative plan of action for associations to receive IT benefits without forthright speculation. Notwithstanding the potential increases accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the significant issues which hamper the development of cloud. The thought of giving over vital information to another organization is troubling; such that the shoppers should be cautious in comprehension the dangers of information breaks in this new environment. This paper presents a point by point examination of the distributed computing security issues furthermore, difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.Keywords: Cloud Computing, Scalability, Infrastructure, IT.
Title: Cloud Computing Security Issues and Challenges
Author: Nishant Katiyar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: With development of the information technology, the scale of data is increasing quickly. The massive data poses a great challenge for data processing and classification. In order to classify the data, there were several algorithm proposed to efficiently cluster the data. One among that is the random forest algorithm, which is used for the feature subset selection. The feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. It is achieved by classifying the given data. The efficiency is calculated based on the time required to find a subset of features, the effectiveness is related to the quality of the subset of features. The existing system deals with fast clustering based feature selection algorithm, which is proven to be powerful, but when the size of the dataset increases rapidly, the current algorithm is found to be less efficient as the clustering of datasets takes quiet more number of time. Hence the new method of implementation is proposed in this project to efficiently cluster the data and persist on the back-end database accordingly to reduce the time. It is achieved by scalable random forest algorithm. The Scalable random forest is implemented using Map Reduce Programming (An implementation of Big Data) to efficiently cluster the data. In works on two phases, the first step deals with the gathering the datasets and persisting on the datastore and the second step deals with the clustering and classification of data. This process is completely implemented using Google App Engine’s hadoop platform, which is a widely used open-source implementation of Google's distributed file system using MapReduce framework for scalable distributed computing or cloud computing. MapReduce programming model provides an efficient framework for processing large datasets in an extremely parallel mining. And it comes to being the most popular parallel model for data processing in cloud computing platform. However, designing the traditional machine learning algorithms with MapReduce programming framework is very necessary in dealing with massive datasets.Keywords: Data mining, Hadoop, Map Reduce, Clustering Tree.
Title: Big Data on Implementation of Many to Many Clustering
Author: Ravi. R, Michael. G
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: Traditional approaches for document classification need data which is labelled for the construction reliable classifiers which are even accurate. Unfortunately, data which is already labelled are rarely available, and often too costly to obtain. For the given learning task for which data which is trained is unavailable, abundant labelled data may be there for a different and related domain. One would like to use the related labelled data as auxiliary information to accomplish the classification task in the target domain. Recently, the paradigm of transfer learning has been introduced to enable effective learning strategies when auxiliary data obey a different probability distribution. A co-clustering based classification algorithm has been previously proposed to tackle cross-domain text classification. In this work, we extend the idea underlying this approach by making the latent semantic relationship between the two domains explicit. This goal is achieved with the use of Wikipedia. As a result, the pathway that allows propagating labels between the two domains not only captures common words, but also semantic concepts based on the content of documents. We empirically demonstrate the efficacy of our semantic-based approach to cross-domain classification using a variety of real data.Keywords: Classification, Clustering, Cross-domain Text Classification, Co-clustering, Labelled data, Traditional Approaches.
Title: Co-Clustering For Cross-Domain Text Classification
Author: Rayala Venkat, Mahanthi Kasaragadda
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
Abstract: Ramanujan’s lost notebook contains many results on mock theta functions. In particular, the lost notebook contains eight identities for tenth order mock theta functions. Previously many authors proved the first six of Ramanujan’s tenth order mock theta function identities. It is the purpose of this paper to prove the seventh and eighth identities of Ramanujan’s tenth order mock theta function identities which are expressed by mock theta functions and also a definite integral. The properties of modular forms are used for the proofs of theta function identities and L. J. Mordell’s transformation formula for the definite integral.Keywords: Mock Theta Functions from Ramanujan’s Lost Notebook.
Title: Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Author: MOHAMMADI BEGUM JEELANI SHAIKH
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Using ψ-Operator to Formulate a New Definition of Local Functionpaperpublications3
Abstract:In this paper, we use ψ-operator in order to get a new version of local function. The concepts of maps, dense, resolvable and Housdorff have been investigated in this paper, as well as modified to be useful in general الخلاصة: استخدمنافيهذاالبحثالعمليةابسايمنأجلالحصولعلىنسخهجديدهمنالدالةالمحلية.وقدتمالتحقيقفيمفاهيمالدوال, الكثافة,المجموعاتالقابلةللحلوفضاءالهاوسدورف,وكذلكتعديلهالتكونمفيدةبشكلعام. Keywords:ψ-operator, dense, resolvable and Housdorff.
Title:Using ψ-Operator to Formulate a New Definition of Local Function
Author:Dr.Luay A.A.AL-Swidi, Dr.Asaad M.A.AL-Hosainy, Reyam Q.M.AL-Feehan
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Applying Agile Methodologies on Large Software Projectspaperpublications3
Abstract: Agile is suitable for Small projects as contrasted with the large projects. There is some problem in the execution of large projects. Large Projects are not easy to execute. When we use agile methodologies, Large projects are very difficult to implement. To construct a product framework by utilizing agile methodologies we found that the large projects need more practices as compare them with Small projects.
In this paper, I will present an arrangement of latest and changed development practices, which will help in building up a large project. The Agile Framework for Large Projects (AFLP) was connected to four industry cases. The AFLP gives a structured approach to programming associations to adopt agile practices and evaluate the outcomes. The system incorporates an extended Scrum procedure and agile practices, which consist of agility and critical success factors in agile software projects under that chosen from the XP, Scrum and Crystal Clear.Keywords: Agile Methods (Scrum), Large Software Projects, Industrial Case Study.
Title: Applying Agile Methodologies on Large Software Projects
Author: Nida Rashid
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Research on Lexicographic Linear Goal Programming Problem Based on LINGO and ...paperpublications3
Abstract: Lexicographic Linear Goal programming within a pre-emptive priority structure including Column-dropping Rule has been one of the useful techniques considered in solving multiple objective problems. The basic ideas to solve goal programming are transforming goal programming into single-objective linear programming. An optimal solution is attained when all the goals are reached as close as possible to their aspiration level, while satisfying a set of constraints. One of the Goal Programming algorithm – the Lexicographic method including Column-dropping Rule and the method of LINGO software are discussed in this paper. Finally goal programming model are applied to the actual management decisions, multi-objective programming model are established and used LINGO software and Column-dropping Rule to achieve satisfied solution.Keywords: Goal programming, Lexicographic Goal programming, multi-objective, LINGO software, Column-dropping Rule.
Title: Research on Lexicographic Linear Goal Programming Problem Based on LINGO and Column-Dropping Rule
Author: N. R. Neelavathi
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Study of Color Image Processing For Capturing and Comparing Imagespaperpublications3
Abstract: Study of processing techniques applicable to full color images. Although the process followed by the human brain in perceiving and interpreting color is a phenomenon that is fully understood, the physical nature of color can be expressed on the formal basis supported by experimental and theoretical results. By examining some principal areas it can be applied for detecting, Capturing, Comparing the images. The objective of this article is to educate newcomer to basic and fundamental techniques of detecting & Comparing images and to find out the compared result. All fundamental algorithms of color image processing will be discussed and quality of processed image output comparison will be shown to find out comparison.
Abstract: We extend some existing results on the zeros of polar derivatives of polynomials by considering more general coefficient conditions. As special cases the extended results yield much simpler expressions for the upper bounds of zeros than those of the existing results.
Mathematics Subject Classification: 30C10, 30C15.Keywords: Zeros of polynomial, Eneström - Kakeya theorem, Polar derivatives.
Title: On the Zeros of Polar Derivatives
Author: P. Ramulu, G.L. Reddy
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: This paper tackles, studying and introducing a new types of Kc – spaces that are called be βKc_i-spaces where (i = 1 , 2 , 3 ) . As well as discussion the important results which are arriving to during this studying.Keywords: βω-open, βω-closed, β-closed map, βω-compactβ Kc_i-spaces.
Title:Study Kc - Spaces Via ω-Open Sets
Author: Dr. Luay A.A.AL-Swidi, Salam. H. Ubeid
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: An edge dominating set D of a fuzzy graph G= (σ, µ) is a non-split edge dominating set if the induced fuzzy sub graph H= (<e-d>, σ¢, µ¢) is connected. The split edge domination number γ¢ns(G)or γ¢ns is the minimum fuzzy cardinality of a non-split edge dominating set. In this paper we study a non-split edge dominating set of fuzzy graphs and investigate the relationship of γ¢ns(G)with other known parameter of G. Keywords: Fuzzy graphs, fuzzy domination, fuzzy edge domination, fuzzy non split edge domination number.
Title: Non Split Edge Domination in Fuzzy Graphs
Author: C.Y. Ponnappan, S. Basheer Ahamed, P. Surulinathan
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: Smartphones have become very common. It has claims in all the fields such as private use, in government groups such as defence, military etc. It has become common because of occurrence of huge number of applications. Smartphones convey large amount of personal material, such as user’s private details, contacts, messages, emails, credit card information, etc. This delicate- materialpresent, needs security and privacy. The project suggests the idea of securing the Private information such as contacts, browsing history, cookies, credit card information etc, present on the user profile of a personalized search engine. Security is provided by locking and wiping the data of the phone from a remote server, in the event of phone getting lost or stolen. To achieve this, message authentication code technique is used. The authenticity and integrity of the message is proved by a short piece of information. Integrity governs accidental and intentional message changes and authenticity governs the message’s origin. It stops malicious users from launching denial of service attacks. A Secure Hash Algorithm is used to produce a hash value which Converts plaintext to encoded message and outputs a MAC. The MAC defends both message data integrity and its authenticity by permitting receivers who also possess the secret key to detect any changes to message content.Keywords: Clickthrough data, abstraction, location search, mobile search engine, ontology, user profiling.
Title: Private Mobile Search Engine Using RSVM Training
Author: Ms. Mayuri A. Auti, Dr. S. V. Gumaste
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Enhance The Technique For Searching Dimension Incomplete Databasespaperpublications3
Abstract: Data ambiguity is major problem in the information retrieval ambiguity is due to the loss in the data dimension it causes lot of problem in various real life application. Database may incomplete due to missing dimension and value. In previous work is totally based on the missing value. We focus on the problem is to find the missing dimension in our work. Missing dimension leads towards the problem in the traditional query approach. Missing dimension information create computational problem, so large number of possible combinations of missing dimensions need to be examined to check similarity between the query object and the data objects . Our aim is to reduce the all recovery version to increase the system performance as number of possible recovery data is reduces the time to estimate the true result is also reduces. Keywords: Missing Dimensions, Similarity search, Whole sequence query, Probability triangle inequality, Temporal data.
Title: Enhance The Technique For Searching Dimension Incomplete Databases
Author: Mr. Amol Patil, Prof. Saba Siraj, Miss. Ashwini Sagade
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: This paper displays the main 6 information mining calculations distinguished by the IEEE Global Conference on Data Mining (ICDM: C4.5, k-Means, SVM, Apriori, EM, Page Rank. These main 6 calculations are among the most persuasive information mining calculations in the examination community. With each calculation, we give a depiction of the calculation, examine the effect of the calculation, and review current and further research on the calculation. These 6 calculations spread grouping, bunching, measurable learning, affiliation examination, and connection mining, which are all among the most vital subjects in information mining innovative work.Keywords: Data mining, K-Means, Apriori.
Title: An Algorithm Analysis on Data Mining
Author: Nida Rashid
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Delay Constrained Energy Efficient Data Transmission over WSNpaperpublications3
Abstract: In wireless sensor network generally concentrate on minimization of energy Consumption, Also reducing energy saving and end to end delay. Reduced the end to end delay is one of the main challenges in the Wireless Sensor Networks. In TDMA providing reliable packet transmission and two transmission scheduling schemes are used to maximize the end-end reliability within a delay bound in packet transmission called dedicated scheduling and shared scheduling. In addition, they formulate solutions for implementing two algorithms into two basic routing algorithms, single-path routing and any-path routing algorithm. The proposed system presented energy efficient sleep scheduling algorithm for reducing the energy for delay constrained in WLAN. This algorithm to maximize the energy saving for packet delay constraints and it determines sleep period and wake up time to be minimized, the aim of this project is proposed to maximize the length of sleep time under packet deadline constraints using green call algorithm. Keywords: Delay-constrained applications, energy efficiency, Sleep scheduling, wireless sensor network.
Title: Delay Constrained Energy Efficient Data Transmission over WSN
Author: H. Hasina Begaum
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Abstract: Object Classification is an important task within the field of computer vision. Image classification refers to the labelling of images into one of a number of predefined categories. Classification includes image sensors, image pre-processing, object detection, object segmentation, feature extraction and object classification. Many classification techniques have been developed for image classification. In this survey various classification techniques are considered; Artificial Neural Network (ANN), Decision Tree (DT), Support Vector Machine (SVM) and Fuzzy Classification.Keywords: Image Classification, Artificial Neural Network, Decision Tree, Support Vector Machine, Fuzzy Classifier.
Title: Analysis of Classification Approaches
Author: Robin Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Comparative Performance Analysis & Complexity of Different Sorting Algorithmpaperpublications3
Abstract: An Algorithm is mix of guidelines without further order in offered request to take care of the predetermined issue. Sorting considered as the crucial operation for masterminding the rundown of components in a specific request either in rising or diving request in view of their key quality. Sorting system like: Insertion, Bubble, and Selection all have the quadratic time multifaceted ideal models O (N2) that breaking point their utilization as per the amount of parts. The objective of this paper audited different type of sorting algorithm like Insertion Sort, Selection, Bubble, Merge sort their execution investigation as for their time complexity nature.Keywords: Sorting Algorithm, Bubble, Selection, Insertion, Merge Sort, Complexity.
Title: Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Author: Shiv Shankar Maurya, Arti Rana, Ajay Vikram Singh
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
An Advanced IR System of Relational Keyword Search Techniquepaperpublications3
Abstract: Now these days keyword search to relational data set becomes an area of research within the data base and Information Retrieval. There is no standard process of information retrieval, which will clearly show the accurate result also it shows keyword search with ranking. Execution time is retrieving of data is more in existing system. We propose a system for increasing performance of relational keyword search systems. In the proposed system we combine schema-based and graph-based approaches and propose a Relational Keyword Search System to overcome the mentioned disadvantages of existing systems and manage the information and user access the information very efficiently. Keyword Search with the ranking requires very low execution time. Execution time of retrieving information and file length during Information retrieval can be display using chart.Keywords: Keyword Search, Datasets, Information Retrieval Query Workloads, Schema-based Systems, Graph-based Systems, ranking, relational databases.
Title: An Advanced IR System of Relational Keyword Search Technique
Author: Dhananjay A. Gholap, Gumaste S. V
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)paperpublications3
Abstract: This paper presents an evaluation of open source e-learning platforms with the aim of finding the most suitable platform for extending to an adaptive one. The extended platform will be utilized in an operational teaching environment. Therefore, the overall functionality of the platform is as important as the adaptation capabilities, and the evaluation treats both issues in this paper .in this paper we will explain the proper and best learning platform for Users . In this we will compare one of the best learning platforms (Moodle and Blackbox) both are all of them best virtual learning platform. We will compare both virtual system its functionality and using best tool. This paper is focused on the Moodle Architecture and comparative study of Moodle, thus we discusses comparisons it between different virtual learning platform at last conclusion we will describe which learning platform is best for users.Keywords: E-learning, Blackboard, Moodle, tools, function, methodology.
Title: A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
Author: Kanak Sachan, Dr. Rajiv Singh
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETpaperpublications3
Abstract: The Security is the most important aspect of Database, for maintain the integrity and as well as security of the system image watermarking is technique proposed at the year of 1996, in this paper we also implement image watermarking using 2-D biorthogonal Wavelt. The importance of transmitting digital information in digital watermarking system and the dissymmetric digital watermarking framework lived on media content communication is also being discussed in this paper. Then we apply watermarking embedding algorithm to keep the balance between watermarks’ imperceptibility and its robustness while the data is being sent on the communication channel.Keywords: Discrete Wavelet Transform (DWT), Gray Scale, Peak Signal to Noise Ratio (PSNR).
Title: Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Author: Abhinav Kumar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Vehicular Ad Hoc Networks (VANETs) are classified as a special application of mobile ad hoc networks (MANETs)
which promise the new possibilities to improve traffic efficiency, road safety driving convenience. By providing the safety and
non-safety applications and sharing the useful information through vehicle to vehicle (V2V) or vehicle to roadside (V2R)
communications to avoid accidents and provide reliable information to travellers, such hot issues seeks much attention of
researchers in this field. VANET and MANET having several common characteristics but VANET differ with applications,
architecture, challenges and data dissemination. The survey of routing protocols in VANETs is important and necessary issue for
smart ITS. The objective of this paper is to design an algorithm for the detection and correction of routing attacks made by
obstructive nodes in VANETS and also drawn the comparison between various metrics like Cost, Average Packet loss,
Throughput and Energy Consumed.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
The Vehicular Ad-hoc Network is a novel technology. It has the property of higher node mobility. Vehicular Adhoc
networks offer wireless communications between vehicles themselves (V2V) and between vehicles to the
roadside units (V2R). The VANET is an active research area, as it has great prospective to enhance the road and
vehicle safety, efficiency of traffic. Vehicular Ad-hoc Network not only just provides the safety applications, but
also provides communication to the users. The QoS support in VANET is a challenge when the existing routing
paths become no longer are available as a result of changes in the velocity and position of node, and distance
between the vehicular nodes or network topology. In this study we designed a framework which provides us the
facility to enhance various Quality of Service parameters, such as End to End Delay, throughput and packet loss
ratio etc. The proposed model uses layered approach, deep classification as existed QoS components are further
broken down and provides Quality of Experience to the users. NCTUns is used as simulation tool to build up
simulations. After getting the results of simulation we carried out the performance analysis of various routing
protocols. The simulation results indicate that the proposed scheme provides much better performance in terms
of various QoS parameters like End to End Delay, throughput and packet loss ratio
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Abstract: VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols like GPRS, GPRS-MV & GPSR. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols.
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONRK CONSULTANCY SERVICES
VANET navigators have been popularly adopts by using drivers. However, due to these sensibilities of GPS signals to terrains, vehicles cannot to get their locations, when they are anyone inside a tunnel or a road it’s surrounded by high rises, where satellite signal is ended. This mainly used for safety and convenience problems. But the VANETS advance into their critical areas and to become more dependent on these localization systems. GPS is starting to locate some uncertain problems, such not always being the available or not being robust enough for this some different applications. For the reason, a number of other localizations techniques such as Cellular Localization, Dead Reckoning, and Image Video Localization have been used in VANETs to overcome the GPS limitations. To address this issues, to proposes a novel Grid based On road localization system (GOT), where these vehicles with and without accurate of GPS signals self organizes into a Vehicular Ad Hoc Network (VANET), exchange the locations and distance information and helps to each others to calculate an accurate position for all these vehicles inside the network. The location information’s can be exchanged among vehicles one or multiple hops away in this paper.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
Design Of Hand-Held Alert System Providing Security For Individuals Using Veh...IJMER
Vehicular Ad-hoc Network (VANET) and Mobile Ad-hoc Network (MANET) provide a distinguish approach for Intelligent Transport System (ITS). The existing applications in VANET provide secure message passing and circulation of data within the range, but there are very few applications where individual's security is taken into consideration. In new applications we can make one which provides safety for individuals on road or indirectly related to roads or vehicles. For making such an application we will be using Radio Frequency (RF) signals, VANET network, GPS and GSM techniques. RF signals will be generating input signals; vehicles for making an alarm for generated signals; VANET network to spread the information about panic area to the other vehicles in range; GPS & GSM to track the location & position of victim and send this information to authorized helping system respectively. Thus using all above techniques and principles we are designing a scheme which provides safety using VANET protocols
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
Similar to Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network (20)
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
1. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 259
Paper Publications
Deterministic AODV Routing Protocol for
Vehicular Ad-Hoc Network
1
Dalbir Singh, 2
Amit Jain (Asst. Prof.)
1,2
Panchkula Engineering College, Mouli, Panchkula (Haryana), India
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications
such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless
communication. To function properly, these applications require efficient routing protocols. However, existing
mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This
dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such
as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure
to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion
we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by
selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time
and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the
end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet
delivery ratio.
Keywords: VANET, AODV, ROUTING, ROUT TABLE.
I. INTRODUCTION
Vehicular Ad Hoc Network (VANETs) is a mobile network where a short lived and self organizing network is formed
among the vehicles. Network operates either in an infrastructure network (V2X) or in an infrastructure less network
(V2V). In an infrastructure network, Road Side Units (RSUs) interacts with vehicles’ wireless equipments in a
sporadically mode when a vehicle passes by it. In an infrastructure less network, Vehicles communicate with other
vehicles’ on-Board Units (OBUs) to exchange security messages. Each vehicle is equipped with a set of sensors such as
GPS, Radar, and Directional antenna [1].
The characteristics of this network are: wireless medium, mobile nature, high mobility, absence of infrastructure, high
dynamic network topology [2].
Due to lack of fixed infrastructure, nodes are prone to varied attacks. Securing the communication among vehicles is the
main challenge that lies in the vehicular network. Deployment of network intrusion detection system helps in identifying
the attack taken place in vehicular network [3]. Nodes in VANET are subjected to various types of impersonation attacks,
few of which are hard to deal with, even if any security mechanisms are enforced. Some of which are Sybil attack, stolen
identity attack, Man-in-the- Middle attack. Identification of the node and its authentication are of fundamental importance
within a secure network [4].
Over the last few decades, many researches and efforts have been done to investigate various issues related to V2I, V2X
areas. Several approaches to deal with identification of the node and its authentication in VANET have been proposed in
the literature. Norbert Bibmeyer [9] et al proposes a scheme based on data plausibility check that ensures positional
reliability in order to assess the trustworthiness of the neighboring node. S. RoselinMary [3] et al proposes an attacked
packet detection algorithm to detect the position of the vehicle and checks whether the packet sent by the vehicle has been
2. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 260
Paper Publications
attacked or not. The proposed scheme floods the beacons into the network to discover the presence of the neighboring
vehicles and accurate position of the messaged vehicle is detected. It verifies the MD5 hashes assigned to the VANET
nodes and once a malicious node is detected, warning message will be broadcasted to all the trusted VANET nodes and
the malicious node is isolated from the communication environment. Authentication is done through VANET Content
Fragile Watermarking. In this paper
We focus on security, faulty node detection and authentication schemes. A city scenario is considered with 10 vehicles
and 3 RSUs and it is further analyzed on the basis of various performance metrics. In this section we thoroughly discussed
about different routing methods used for VANET. The reason of conducting detailed literature review for VANET routing
methods was to check how the VANET routing is influenced by routi ng protocols which are currently being used by
MANET and VANET. Furthermore, MANET routing protocols which are suitable to some extent for VANET were also
kept in context while conducting the literature review. In addition, it also assisted us in selecting the suitable routing
protocols in order to make comparison with VANET routing protocols. This comparison was based on evaluating the
performance of these routing protocols in VANET.
In general, there are two methods of vehicle detection: intrusive technologies (pneumatic road tubes, inductive loop
detectors, piezoelectric sensors) and non-intrusive technologies (video image processors, microwave radars, infrared
sensors, and ultrasonic sensors) [25]. An inductive loop detector consists of three components: a loop, a loop extension
cable and a detector [26]. Loop detectors are placed at specified locations on roadways to count vehicles and to estimate
vehicle speed based on the occupancy time of vehicles on the detectors. However, installing these detectors requires a
great number of saw-cuts on roadway surfaces, which makes them difficult to deploy and maintain. This work is much
more expensive on roadway sections which need a large number of loop detectors. Moreover, loop detectors can provide
data only from vehicle to infrastructure and not vice versa.
In order to improve the vehicle detection technique for ITS, wireless communication systems have already been studied.
Wireless communication systems used in ITS can be classified into 2 types: vehicle-to-vehicle communication (V2V) and
vehicle-to-infrastructure communication (V2I). Some systems such as VETRAC [14] and COC [15] which employ V2V
and V2I to provide more functions for roadway security and management are being developed.
Azzedine Boukerche et.al (2008) [17] paper proposes a vehicle volume and speed measurement method using wireless
communications between roadside equipment and vehicles. Vehicles are equipped with Global Positioning System (GPS)
receivers and wireless communication devices, to detect their geographical location and to provide ad-hoc network
connectivity with the roadside unit respectively. To carry out the functions of a loop detector, roadside equipment collects
data from vehicles to detect their locations periodically and then counts the number of vehicles passing a given position in
a period, but the authors have taken the scenario that the ranges of RSUs are set in such a way that they do not overlap
with each other but also there should not be any gap in the coverage range of the RSUs. This scenario gives a good
detection result but could not be applied to the sparse RSUs region where no of RSUs are less.
Rajendra Prasad et al. (2013) [18] the authors propose a novel RF-based Vehicle detection and Speed Estimation system
(ReVISE). It makes use of the fact that the wireless signal strength in an RF environment is affected by the presence and
motion of objects and hence the wireless signals can be used to infer the state of the environment and identify objects in
the area Of interest only, not in all regions. So a vehicle can move to any speed in the area where there is no existence of
RF signal. In order to overcome these all drawbacks we propose a novel detection system which can detect vehicles in all
regions.
SeonYeong Han et al. (2013) [19] coveys that in mobile ad-hoc networks, local link connectivity information is
extremely important for route establishment and maintenance. Periodic Hello messaging is a widely used scheme to
obtain local link connectivity information. However, unnecessary Hello messaging can drain batteries while mobile
devices are not in use. This paper proposes an adaptive Hello messaging scheme to suppress unnecessary Hello messages
without reduced detect ability of broken links. Simulation results show that the proposed scheme reduces energy
consumption and network overhead without any explicit difference in throughput. In this paper, they proposed an adaptive
Hello interval to reduce battery drain through practical suppression of unnecessary Hello messaging. Based on the event
interval of a node, the Hello interval can be enlarged without reduced detects ability of a broken link, which decreases
network overhead and hidden energy consumption.
3. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 261
Paper Publications
Ehsan Mostajeran, RafidahMd Noor et al. (2013) [20] conveys that Ad-hoc On-Demand Distance Vector (AODV) is
one of the ad-hoc routing protocols utilized in MANET and VANET. On-Demand routing protocols find their destinations
based on the process of flooding a request to neighbors searching for their destinations. Neighbors of nodes are detected
based on the neighbor discovery method, which periodically broadcasts HELLO messages to detect available neighbors at
time. Generating routing packets and neighbor discovery messages produce high overhead in the On-Demand routing
protocol, such as AODV. In order to overcome such issues, a novel scheme in Ad-hoc networks based on Intelligent-
AODV (I-AODV) is proposed. This scheme functions to exploit neighbor discovery and reduce the overhead of neighbor
discovery processes. This paper introduced an innovative, improved neighbor discovery method for Mobile Ad-hoc
routing protocols, called Intelligent-AODV. It provides reasonable performance by updating the neighbor list based on
routing packets such as RREQ, RREP and RERR. Moreover, the broadcast of HELLO messages is filtered by checking
the destination node in the neighbor list to reduce overhead. Simulation results of the proposed neighbor discovery
method based on mobility in various scenarios and compared with the original AODV demonstrate that I-AODV performs
better.
II. PROBLEM EXPLANATION AND PROPOSED WORK
a) PROPOSED WORK:
The AODV maintains the neighbors which used in recently transmission sending event of the node. But AODV does not
validate next neighbor frequently as VANET are highly dynamic scenario so nodes changing its position very frequently.
To solve this problem of the AODV we have proposed a dynamic neighborhood expiry time so that whenever nodes
changing its position frequently they can dynamically update neighbor table and nodes transmitted its packet to the nodes
which is more trusted as compare to the nodes which already exist in the neighbor table, to solve this problem we
basically reduces the neighbor hood expiry time of protocol as well as improve the packet salvaging, in the next section of
the paper our results proves the effectiveness of our approach.
III. RESULTS AND DISCUSSIONS
The performance of I-AODV and OLSR routing protocol is compared against representatives from the main classes of
routing protocols that are AODV and OLSR. where AODV and OLSR are topology based routing protocols. A review of
these routing protocols already taken in previous chapters. In this chapter, we describe how simulation is done and what
the results of the simulation are. The simulation is done in 2 phases and two different simulator have been used One is
SUMO(Simulation of Urban Mobility) for road traffic simulation and Veins (Vehicular environment in Network
Simulation) for network simulation
We use simulation to evaluate the performance of the proposed I-AODV, AODV and OLSR routing protocols with
respect to PDR (packet delivery ratio) and end to end delay time features. We simulate network consisting of nodes field
of 2500m × 8000m square area. Nodes have different transmission rate 100,200,300,400,500,600,700 and 800. The
simplest and usually the first thing to setup a network is creating a node. A network is build up from its layers components
such as Link layer, MAC layer and PHY layer. The components have to be defined before a node can be configured.
Table 5.1 shows the parameters used in the simulation.
Table 1.1: Network parameter definition
Parameter Name Parameter Value
channel type Channel/Wireless Channel
mac protocol Mac/802_11
number of nodes 10, 20, 30, 40, 60
routing protocol AODV, IAODV,OLSR
grid size 2500 x 800 sq.m
packet size 1000
simulation time Different
traffic type Cbr
4. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 262
Paper Publications
Figure 1.1: This scenario shows that the initial position of the vehicle at time 316.2ms
Graphs Display
Figure 1.2: End to End delay comparison of AODV, OLSR and I-AODV
End to end delay in highway scenario: The simulation results of end to end delay in highway scenario vehicle
environment is shown in below figure 5.20 from this figure it is clear that I-AODV and OLSR are perform better than
AODV routing protocols. It means that end to end delay is reduced while we uses I-AODV and OLSR routing protocols
in highway scenario. In highway scenario it is clear from below figure 5.20 that AODV is worst routing protocol when we
considering end to end delay. AODV routing protocol working very well in MANET but in VANET area it is not give
optimum results as it give in MANET environment. When we talking about end to end delay then I-AODV has also better
perform than OLSR because I-AODV consumes some time in calculation of trust value of nodes.
Figure 1.3: Packet Delivery ratio of AODV, OLSR and I-AODV
5. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 263
Paper Publications
PDR in highway scenario: The simulation results of highway scenario vehicle environment is shown in below figure
5.21 from this figure it is clear that I-AODV is perform better than AODV and OLSR routing protocols. It means that
packet drop is reduced while we uses I-AODV routing protocol either in open scenario or highway scenario. In highway
scenario it is clear from below figure 5.21 that AODV is worst routing protocol when talking about PDR values.
Figure 1.4: Comparison of throughput between AODV, OLSR and I-AODV
Throughput in highway scenario: The simulation results of highway scenario vehicle environment is shown in below
figure 5.22 from this figure it is clear that I-AODV is perform better than AODV and OLSR routing protocols. It means
that throughput increases while we use I-AODV routing protocol either in open scenario or highway scenario. In highway
scenario it is clear from below figure 5.22 that OLSR is worst routing protocol when talking about THROUGHPUT
values.
This thesis work briefly describes about the four routing protocols for VANETS. It includes detailed discussion of
AODV, OLSR and I-AODV which is the most widely used protocols that perform better than the rest of protocols. These
are compared with our proposed routing protocol I-AODV which takes the benefit of AODV. I-AODV improves the PDR
as compared to AODV because I-AODV selects the node on basis of trust value and trust value for any node becomes low
if that node drops packets. If we have two equidistant nodes form source and destination, then we select the node with
higher trust value to forward the packet. This approach results in reducing the total number of packets dropped and hence
will result in increased packet delivery ratio of the network.
The advantage of I-AODV protocol is that it selects the most trustworthy node which drops less number of packets. So the
selection of the node with highest trust value increases packet delivery ratio of I-AODV in comparison to AODV and
OLSR.
The drawback of the I-AODV protocol is the computation required for calculating trust value of node, results in increase
of end to end delay. So end to end delay is slightly more than AODV but it is very less as compared to OLSR.
IV. CONCLUSION
In this paper briefly describes about the routing protocols for VANETS. It includes detailed discussion of AODV and
OLSR which are the most widely used protocols that perform better than the rest of protocols. In further we improved
AODV in terms PDR, End to End Delay and throughput and successfully compared with existing AODV and OLSR
protocol.
REFERENCES
[1] Manvi S.S., Kakkasageri M.S., Mahapurush C.V., “Performance Analysis of AODV, DSR, and Swarm Intelligence
Routing Protocols In Vehicular Ad hoc Network Environment” In International conference on future Computer and
Communication., pp. 31-35, April. 2009.
[2] Bernsen, J. Manivannan, D., “Routing Protocols for Vehicular Ad Hoc Networks That Ensure Quality of Service” In
the fourth international conference on Wireless and Mobile Communications., pp.1-6, Aug. 2008.
6. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (259-264), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 264
Paper Publications
[3] Wex, P. Breuer, J. Held, A. Leinmuller, T. Delgrossi, L., “Trust Issues for Vehicular Ad Hoc Networks” IEEE,VTC
Spring 2008., pp. 2800-2804, May.2008.
[4] R. Lind et al, “The network vehicle. A glimpse into the future of mobile multimedia”, IEEE Aerosp. Electron. Syst.
Mag., 1999.
[5] Car-to-Car Communications, www.car-2-car.org.
[6] H Fussler, S Schnaufer, M Transier , W Effelsberg, ”Vehicular Ad-Hoc Networks: From Vision to Reality and
Back”, Proc. Of IEEE Wireless on Demand Network Systems and Services, 2007.
[7] Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures, “Security Analysis of Vehicular Ad Hoc Networks”, Second
International Conference on Network Applications, Protocols and Services, 2010.
[8] R. Parker, S.Valaee, "Vehicle localization in Vehicular Networks", Vehicular Technology Conference, 2006. VTC-
2006 Fall. 2006 IEEE 64th, 2006, pp. 1–5.
[9] A. Benslimane, "Localization in Vehicular Ad Hoc Networks", Proceedings Systems Communications, 2005.
[10] T. Taleb, E. Sakhaee, A. Jamalipour, K. Hashimoto, N. Kato, and Y. Nemoto, “A stable routing protocol to support
its services in vanet networks” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3337–3347,
November 2007.
[11] C.Perkins and E. Royer, “Ad-hoc on-demand Distance Vector Routing”, IEEE Workshop. Mobile Comp.sys.App.,
pp. 90-100, Feb. 1999.
[12] David B. Johnson, David A. Maltz, and Josh Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop
WirelessAd Hoc Networks”, in Ad Hoc Networking, Editor: Charles E.Perkins, Chapter 5, pp. 139-172, Addison-
Wesley, 2001.
[13] Ding Y, Wang C, Xiao L “A static-node assisted adaptive routing protocol in vehicular networks” In Proceedings of
the Fourth ACM international Workshop on Vehicular Ad Hoc Networks VANET, pp 59–68, 2007.
[14] J. Chennikara-Varghese, W. Chen, O. Altintas, S. Cai, “Survey of routing protocols for inter-vehicle
communications,” 3rd Annual International Conference on Mobile and Ubiquitous Systems -Workshops, 2006.
[15] Kevin C. Lee, UCLA, USA Uichin Lee, UCLA, USA Mario Gerla, UCLA, USA,“Survey of Routing Protocols in
Vehicular Ad Hoc Networks”.
[16] R. Gass, J. Scott, and C. Diot, “Measurements of In-Motion 802.11 Networking”, In IEEE Workshop on Mobile
Computing System and Applications (Hotmobile 2006), April 2006.
[17] Boukerche, Azzedine, et al. "Vehicular ad hoc networks: A new challenge for localization-based
systems." Computer communications 31.12 (2008): 2838-2849.
[18] Nayak, Rajendra Prasad. High Speed Vehicle Detection in Vehicular Ad-hoc Network. Diss. 2013.
[19] Han, Seon Yeong, and Dongman Lee. "An adaptive hello messaging scheme for neighbor discovery in on-demand
MANET routing protocols."Communications Letters, IEEE 17.5 (2013): 1040-1043.
[20] Keshavarz, Hassan, Rafidah Md Noor, and Ehsan Mostajeran. "Using routing table flag to improve performance of
AODV routing protocol for VANETs environment." The 9th International Conference on Computing and
Information Technology (IC2IT2013). Springer Berlin Heidelberg, 2013.